5 research outputs found

    Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent System in MANETS

    Get PDF
    Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. 聽The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system

    Frad-hoc: a framework to routing ad-hoc networks

    Get PDF
    This article presents a routing framework for mobile ad-hoc networks, which was called as FRAd-hoc. The main goal of the contribution was the design and implementation of a structure that could gather generic characteristics from hybrid routing algorithm domains.Therefore, it is possible to offer a specializing framework to produce and make available reusable software components. The results present in this research work indicate that the FRAd-hoc environment has reached a successful level, because it was possible to produce others algorithms starting from the proposed framework.1st IFIP International Conference on Ad-Hoc NetWorkingRed de Universidades con Carreras en Inform谩tica (RedUNCI

    Frad-hoc: a framework to routing ad-hoc networks

    Get PDF
    This article presents a routing framework for mobile ad-hoc networks, which was called as FRAd-hoc. The main goal of the contribution was the design and implementation of a structure that could gather generic characteristics from hybrid routing algorithm domains.Therefore, it is possible to offer a specializing framework to produce and make available reusable software components. The results present in this research work indicate that the FRAd-hoc environment has reached a successful level, because it was possible to produce others algorithms starting from the proposed framework.1st IFIP International Conference on Ad-Hoc NetWorkingRed de Universidades con Carreras en Inform谩tica (RedUNCI

    Multi-Agent System Concepts Theory and Application Phases

    Get PDF

    A Black Hole Attack Model for Reactive Ad-Hoc Protocols

    Get PDF
    Net-Centric Warfare places the network in the center of all operations, making it a critical resource to attack and defend during wartime. This thesis examines one particular network attack, the Black Hole attack, to determine if an analytical model can be used to predict the impact of this attack on ad-hoc networks. An analytical Black Hole attack model is developed for reactive ad-hoc network protocols DSR and AODV. To simplify topology analysis, a hypercube topology is used to approximate ad-hoc topologies that have the same average node degree. An experiment is conducted to compare the predicted results of the analytical model against simulated Black Hole attacks on a variety of ad-hoc networks. The results show that the model describes the general order of growth in Black Hole attacks as a function of the number of Black Holes in a given network. The model accuracy maximizes when both the hypercube approximation matches the average degree and number of nodes of the ad-hoc topology. For this case, the model falls within the 95% confidence intervals of the estimated network performance loss for 17 out of 20 measured scenarios for AODV and 7 out of 20 for DSR
    corecore