Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
A mobile ad-hoc network is an infrastructure less network which consists of a number of mobile nodes that dynamically form a temporary network for the transmission of data from source to destination. Most of the routing protocols rely on the cooperation among the nodes for secure transmission due to lack of centralized administration. Thus the security of MANET is an important concern for all the times. There is no general algorithm for security of principle routing protocols like AODV against commonly known attacks like black hole attack, wormhole attack, rushing attack, etc. In this paper, we survey the different network layer attacks of MANET and compare the existing solutions to combat the single or cooperative black hole attack. , © IAEME 95
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with misbehavior in MANET, an incentive mechanism should be integrated into routing decision making. However manets are vulnerable to various attack .in this paper we present introduction to manets and types of attack.
International Journal of Research in Engineering and Technology, 2013
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any fixed and preexisting infrastructure in which each node can act as a router. In MANET, both legitimate as well as malicious nodes are there. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as blackhole, impersonation, wormhole etc. These attacks are the major problem in MANET because of different factor in MANET
Mobile ad hoc networks known to be vulnerable to many attacks due to their lack of centralized control and their energy-consumed operation and dynamic topology. Security is a primary concern in mobile ad hoc network. MANETs are more vulnerable to security attacks due to mobility of nodes. In this paper, we have focused on a specific kind of attacks i.e. Network layer attacks such as Gray hole, Black hole, Rushing or Sybil attacks and Sleep deprivation. We analyzed various kinds of network layer attacks and their impact in MANET and how a malicious node wants to preserve own resources along with using the services of other nodes and consumed its resources and break the rules and reduce the performance of well-behaved nodes significantly
Mobile Ad-hoc NETworks (MANETS) have seen tremendous gmwth in recent years. It is a new paradigm of communication' in which t h m is no fixed infrasmrcture. Nodes within the radio range of each other can communicate directly over the wireless link, while those that are far apart use other nodes as relays.
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad-hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. These mobile nodes communicate with each other without any infrastructure, furthermore, all of the transmission links are established through wireless medium. There is no guarantee that a communication path is free from malicious or compromised nodes which deliberately wish to disrupt the network communication. So protecting the mobile ad-hoc network from malicious attacks is very important and challenging issue. In this paper we address the study of different types of attack, problem of packet forwarding misbehavior and propose a mechanism to detect the black and gray hole attacks.
2010): Niedriglohnbeschäftigung 2008: Stagnation auf hohem Niveau -Lohnspektrum franst nach unten aus. IAQ-Report Nr. 2010-06. Duisburg. Kalinowski Michael / Quinke, Hermann (2010): Projektion des Arbeitskräfteangebots bis 2025 nach Qualifikationsstufen und Berufsfeldern. In: Helmrich/Zika (Hg.): 103-123. Kettner, Anja / Rebien, Martina (2007): Hartz-IV-Reform: Impulse für den Arbeitsmarkt. IAB-Kurzbericht 19. Nürnberg. Klös, Hans Peter (1997): Dienstleistungslücke und Niedriglohnsektor in Deutschland. iwtrends 3. Knuth, Matthias (2006): Hartz IV -die unbegriffene Reform. Wandel der Erwerbsordnung durch Verallgemeinerung des Fürsorge-Regimes. In: Sozialer Fortschritt 7: 160-168.
The concept of Virtual Prints (ViPs), as digital counterparts of real-life tracks that people leave behind, has been introduced for supporting navigation, orientation and wayfinding in Virtual Environments (VEs) and has been explored using a prototype VE equipped with a simplified ViPs mechanism. This paper describes an elaboration of the ViPs mechanism with the aim to support a number of functions, popular, if not standard, in conventional applications, but also useful and required in VEs.
Buddhism in World Cultures: Comparative Perspectives, 2006
2016
Int J Adv Engg Tech/Vol. VII/Issue II/April-June,2016/101-110 Research Paper ANALYTICAL STUDY ON THE IMPACT OF SELFISH NODE BEHAVIORS ATTACK AND BLACK HOLE ATTACK UNDER MANET K.Rama Abirami, Sumithra M G,J.Rajasekaran Address for Correspondence Assistant Professor, Professor, Assistant Professor Department of Computer Science and Engineering, Department of Electronics and Communication Engineering, Department of Information Technology, PSNA College of Engineering and Technology, Dindigul, Tamilnadu, India. Bannari Amman Institute of Technology, Erode, Tamilnadu, India. Sri Subramanya College of Engineering & Technology,Palani,Tamilnadu,India.
International Journal of Computer Sciences and Engineering, 2018
Mobile Ad hoc Network (MANET) provides on the fly solution for those areas where wired network implementation is difficult. MANETs are network without infrastructure. They do not have central control. All nodes help each other in data communication. The life span of MANET is very small. The main features of MANET are: nodes are dynamic in nature resources availability in scarce and open channel. Due to resource scarcity some nodes may not provide their services to other nodes and some nodes may not participate in data transmission, to save their resources and they become selfish node. MANETs are susceptible for attacks. The open channel, resource scarcity and deployment type of network attract intruders for malicious activities. This survey paper has reviewed various articles from 1999 to 2018, in the view to look at how malicious nodes in a network make attacks on other nodes and what impact goes on network. Earlier work have been discussed about one or two types of attacks. This paper has studied and tried to bring all attacks under the one umbrella. The paper discussed these attacks in following categories: External and internal, active and passive, at protocol stack layer, security goals, attacks affecting routing. This paper also come along with defense line, have been proposed by various researchers for different attacks. Paper also tries to put attacks and their effect on one place. It includes type of attack, status of attacker, interaction, layer and security goals. It is suggested that what type of, defense, line of action should be taken, so that a network must sustain in adverse situation and available for its users.
2013
Mobile ad-hoc network (MANET) is a collection of mobile nodes with wireless network capable of communicating with each without any centralized administration and network infrastructure. Due to open environment and vulnerable to many types of attacks. Therefore, Security is an important issue for mobile ad hoc network to provide secure communication between nodes. This paper presents various malicious attacks possibilities, and related security actions for network layer black holeattack as well as depth evolution of routing protocols in mobile ad hoc network.
ijana.in
In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.
Social Science Research Network, 2019
MANETs routing protocols are vulnerable to various hole and black-hole attacks. These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of a as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the packet loss and consumption of energy.
Quantum Electronics, 2013
We consider process of generation of difference frequency in a GaAs crystal with periodic domain structure during propagation of a few-cycle laser pulse in the crystal in the regime when chromatic dispersion is expressed weakly. Method of lines is used to obtain numerical solution to the system of coupled nonlinear differential equations in partial derivatives describing the evolution of the electric field of a few-cycle laser pulse in GaAs crystal both with periodic and aperiodic domain structure. Time-frequency distribution is obtained, with use of Wigner transformation, for linearlypolarized femtosecond laser pulse and for orthogonally polarized difference-frequency pulse generated via filtration of the orthogonally-polarized pulse at the crystal output.
2013
Impact Assessment (IA) is increasingly used by the European Commission and Member States to assess the potential economic, social and environmental consequences of new policy initiatives. To support the IA process, the European Network of Excellence LIAISE is developing a Toolbox which is simultaneously accessible and useful for policy makers as well as for the research community. This paper introduces the developed Toolbox, which provides an interactive library of models, publications, projects, good practices, and experts to support IAs. Special emphasis has been given to enable access to adding and editing information
The Ear of Dionysius was a part of ancient quarries near the area were the old city of Syracuse was located. It is a man-made large grotto with an open S-shaped plan having a variable width. Lateral walls converge toward the top rapidly giving the grotto a vague resemblance to an ear pinna. A myth reports that the Syracuse Tyrant Dionysius used to overhear the conversation of war prisoners through a narrow opening well above the floor of the grotto. After a personal visit, W.C. Sabine reported in his Collected Papers on Acoustics a qualitative discussion about the acoustics of the Ear of Dionysius. He concluded that "…the distinctness of enunciation is blurred by excessive reverberation.". The authors present an analysis of the results of acoustic measurements carried out in the Ear of Dionysius in terms of modern objective descriptors of reverberation and speech intelligibility which quantify and confirm the opinion expressed by Sabine.
International Journal of Modern Physics A, 2000
In this paper we propose a "second quantization" scheme especially suitable for dealing with nontrivial, highly symmetric phase spaces, implemented within a more general group approach to quantization, which recovers the standard quantum field theory (QFT) for ordinary relativistic linear fields. We emphasize, among its main virtues, greater suitability in characterizing vacuum states in a QFT on a highly symmetric curved space-time and the absence of the usual requirement of global hyperbolicity. This can be achieved in the special case of the Anti-de Sitter universe, on which we explicitly construct a QFT.