138 research outputs found

    A Survey on Secure Cooperative Bait Detection Approach for Detecting Malicious Nodes in MANETs

    Get PDF
    In Mobile Ad-hoc Networks (MANETs), the main problem is the security as well as formation of communication amongst nodes is that nodes must work together with each other. Avoiding or sensing malicious nodes initiation grayhole or collaborative blackhole attacks is the main challenge. Cooperative bait detection approach mixes the advantages of both proactive and reactive defense architectures. Here it uses the technique of transposition for implementing security and the CBDA technique outfits a reverse tracing method to help in attaining the specified aim. The demonstration in the occurrence of malicious-node attacks, the CBDA outperforms the DSR, and Best-Effort Fault-Tolerant Routing (BFTR) protocols in relations to packet delivery ratio and routing overhead. In the transposition method we use the key which is the askey value of the character which is encrypted at sender side and decrypted at receiver. DOI: 10.17762/ijritcc2321-8169.15033

    A Bibliometric Perspective Survey of IoT controlled AI based Swarm robots

    Get PDF
    Robotics is the ­new-age domain of technology that deals with bringing a collaboration of all disciplines of sciences and engineering to create a mechanical machine that may or may not work entirely independently but definitely focuses on making human lives much easier. It has repeatedly shown its ability to change lives at home and in the industry. As the field of robotics research grows and reaches new worlds, the military is one area where advances can have a significant impact, and the government is aware of this. Military technology has come a long way from the days where soldiers had to walk into traps, putting their own lives in danger for their fellow soldiers, to today, when soldiers have robots walk into the same traps with possibility and result of zero human casualties. High-risk military operations such as mine detection, bomb defusing, fighter pilot aviation, and entering enemy territory without complete knowledge of what is to come are all tasks that can be programmed in a way that makes them accustomed to scenarios like these, either by intensive machine learning algorithms or artificially intelligent robot systems. Military soldiers are human capital; they are not self-driving robots; they are living beings with emotions, fears, and weaknesses, and they will almost always be unreliable as compared to computers and robots. They are easily affected by environmental effects and are vulnerable to external influences. The government\u27s costs for deployed troops, such as training and salaries, are extremely high. As a result, the solution is to build AI robots for defence operations that can sense, collect data by observing surroundings as any human soldier would, and report it back to a workstation where it can be used for strategy building and planning on what the next step should be during a mission, thus making the army better prepared for any kind of trouble that might be on their way. In this paper, the survey and bibliometric analysis of AI-based IoT managed Swarm Robots from the Scopus repository is discussed, which analyses research by area, notable authors, organizations, funding agencies and countries. Statistical analysis of literature published as journals, articles and papers that aids in understanding the global influence of publication is called Bibliometric analysis. This paper is a thorough analysis of 84 research papers as obtained from the Scopus repository on the 3rd of April 2021. GPS Visualizer, Gephi, wordcloud, and ScienceScape are open source softwares used in the visualization review. As previously mentioned, the visualization assists in a quick and easy interpretation of the different viewpoints in a particular study domain pursuit

    Mobile Ad hoc Networking: Imperatives and Challenges

    Get PDF
    Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking concept is not a new one, having been around in various forms for over 20 years. Traditionally, tactical networks have been the only communication networking application that followed the ad hoc paradigm. Recently, the introduction of new technologies such as the Bluetooth, IEEE 802.11 and Hyperlan are helping enable eventual commercial MANET deployments outside the military domain. These recent evolutions have been generating a renewed and growing interest in the research and development of MANET. This paper attempts to provide a comprehensive overview of this dynamic field. It first explains the important role that mobile ad hoc networks play in the evolution of future wireless technologies. Then, it reviews the latest research activities in these areas, including a summary of MANET\u27s characteristics, capabilities, applications, and design constraints. The paper concludes by presenting a set of challenges and problems requiring further research in the future

    Mobile-IP ad-hoc network MPLS-based with QoS support.

    Get PDF
    The support for Quality of Service (QoS) is the main focus of this thesis. Major issues and challenges for Mobile-IP Ad-Hoc Networks (MANETs) to support QoS in a multi-layer manner are considered discussed and investigated through simulation setups. Different parameters contributing to the subjective measures of QoS have been considered and consequently, appropriate testbeds were formed to measure these parameters and compare them to other schemes to check for superiority. These parameters are: Maximum Round-Trip Delay (MRTD), Minimum Bandwidth Guaranteed (MBG), Bit Error Rate (BER), Packet Loss Ratio (PER), End-To-End Delay (ETED), and Packet Drop Ratio (PDR) to name a few. For network simulations, NS-II (Network Simulator Version II) and OPNET simulation software systems were used.Dept. of Electrical and Computer Engineering. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2005 .A355. Source: Masters Abstracts International, Volume: 44-03, page: 1444. Thesis (M.Sc.)--University of Windsor (Canada), 2005

    Design and implementation of architectures for the deployment of secure community wireless networks

    Full text link
    Recientes avances en las tecnologías de la comunicación, así como la proliferación de nuevos dispositivos de computación, están plasmando nuestro entorno hacia un Internet ubicuo. Internet ofrece una plataforma global para acceder con bajo coste a una vasta gama de servicios de telecomunicaciones, como el correo electrónico, comercio electrónico, tele-educación, tele-salud y tele-medicina a bajo coste. Sin embargo, incluso en los países más desarrollados, un gran número de áreas rurales todavía están pobremente equipadas con una infraestructura básica de telecomunicaciones. Hoy en día, existen algunos esfuerzos para resolver esta falta de infraestructura, pero resultan todavía insuficientes. Con este objetivo presentamos en esta tesis RuralNet, una red comunitaria inalámbrica para proveer acceso a Internet de forma personalizada a los subscriptores de un área rural. Los objetivos de este estudio han sido el desarrollo de una nueva arquitectura para ofrecer un acceso a Internet flexible y seguro para zonas rurales aisladas. RuralNet combina el paradigma de las redes mesh y el uso de los dispositivos inalámbricos embebidos más económicos para ofrecer un gran número de servicios y aplicaciones basados en Internet. La solución desarrollada por RuralNet es capaz de cubrir grandes áreas a bajo coste, y puede también ser fácilmente desplegado y extendido tanto en términos de cobertura como de servicios ofrecidos. Dado que la implementación y la evaluación de RuralNet requiere un alto coste y una gran cantidad de mano de obra, hemos considerado que la simulación y la emulación eran una alternativa válida para ahorrar costes. Con este objetivo hemos desarrollado Castadiva, un emulador flexible proyectado para la evaluación de redes MANET y mesh. Castadiva es un emulador basado en dispositivos de bajo coste, utilizado para evaluar los protocolos y las aplicaciones desarrolladas.Hortelano Otero, J. (2011). Design and implementation of architectures for the deployment of secure community wireless networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/10079Palanci

    Efficient Routing in Mobile Adhoc Networks Emphasizing Quality of Service by Trust & Energy based AODV

    Get PDF
    Attention in the region of Mobile Ad-hoc Network (MANET) is increasing because of its realistic applications and necessity of communication in mobile devices. A mobile ad hoc network consists of mobile self configuring wireless nodes and these nodes communicate between them without any centralized management. The dynamic characteristics of MANET, has made it fairly demanding to uphold connectivity and guarantee Quality of Service (QoS). The trust based routing is one way to form cooperation among nodes for performing an efficient routing between nodes. In this paper a trust and energy based AODV is presented where nodes are selected for routing based on its trust and energy value. Trust is calculated based on the nodes success and failure rate. Energy calculated based on consumed and remaining energy values. A threshold value is defined and nodes are preferred for routing only if its trust and energy levels are higher than threshold. The work is implemented and simulated on NS-2. The simulation results have shown improvement on QoS metrics when compared with traditional AODV and DSR

    Design a framework for IoT- Identification, Authentication and Anomaly detection using Deep Learning: A Review

    Get PDF
    The Internet of Things (IoT) connects billions of smart gadgets so that they may communicate with one another without the need for human intervention. With an expected 50 billion devices by the end of 2020, it is one of the fastest-growing industries in computer history. On the one hand, IoT technologies are critical in increasing a variety of real-world smart applications that can help people live better lives. The cross-cutting nature of IoT systems, on the other hand, has presented new security concerns due to the diverse components involved in their deployment. For IoT devices and their inherent weaknesses, security techniques such as encryption, authentication, permissions, network monitoring, \& application security are ineffective. To properly protect the IoT ecosystem, existing security solutions need to be strengthened. Machine learning and deep learning (ML/DL) have come a long way in recent years, and machine intelligence has gone from being a laboratory curiosity to being used in a variety of significant applications. The ability to intelligently monitor IoT devices is an important defense against new or negligible assaults. ML/DL are effective data exploration techniques for learning about 'normal' and 'bad' behavior in IoT devices and systems. Following a comprehensive literature analysis on Machine Learning methods as well as the importance of IoT security within the framework of different sorts of potential attacks, multiple DL algorithms have been evaluated in terms of detecting attacks as well as anomaly detection in this work. We propose a taxonomy of authorization and authentication systems in the Internet of Things based on the review, with a focus on DL-based schemes. The authentication security threats and problems for IoT are thoroughly examined using the taxonomy supplied. This article provides an overview of projects that involve the use of deep learning to efficiently and automatically provide IoT applications
    corecore