Abstract Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics, dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO) of the sender and attack in such a way so the sender is always transmitting in the slow start phase. Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Mobile Ad Hoc Network (MANET) is one kind of new wireless network
structures which is also known as infrastructure less network. Unlike devices in traditional
wireless LAN solution, all nodes are movable and the topology of the network is changing
dynamically in an Ad Hoc Network, which brings great challenges to the security of Mobile
Ad Hoc Networks. MANET is particularly vulnerable to various types of security attacks
due to its fundamental characteristics e.g. the lack of centralized monitoring, dynamic
network topology, open medium, autonomous terminal and management. As a result,
attackers can take advantage of flaws in routing protocols to carry out various attacks. The
black hole attack is one of such security issue in MANET. It could disturb the routing
protocol and bring about huge damage to the network’s topology. In this attack, a malicious
node gives false information of having shortest route to the destination node so as to get all
data packets and drops it. In this paper, we propose an algorithm which mitigates the
impact of black hole attack in AODV routing.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
Delay Tolerant Networking (DTN) is a promising technology that aims to provide efficient communication
between devices in a network with no guaranteed continuous connectivity. Most existing routing schemes
for DTNs exploit the advantage of message replication to achieve high message delivery rate. However,
these schemes commonly suffer from large communication overhead due to the lack of efficient mechanisms
to control message replication. In this paper we give a brief survey on routing protocols designed for
DTNs, and evaluate the performance of several representative routing protocols including Epidemic, Spray
and Wait, PRoPHET, and 3R through extensive trace-driven simulations. Another objective of this work is
to evaluate the security strength of different routing schemes under common DTN attacks such as the black
hole attack. The results and analysis presented in this paper can provide useful guidance on the design and
selection of routing protocols for given delay-tolerant applications.
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
Wireless Mesh Network is designed static or limited mobility environment .In multicast routing for
wireless mesh networks has focused on metrics that estimate link quality to maximize throughput
andtoprovide secure communication. Nodes must collaborate in order to compute the path metric and
forward data.Node identify the novel attacks against high- throughput multicast protocols in wireless
mesh network.. The attacks exploit the local estimation and global aggregation of the metric to allow
attackers to attract a large amount of traffic These attacks are very effective b a s e d on high
throughput metrics. The aggressive path selection is a double-edged sword: It is maximizes throughput,
it also increases attack effectiveness. so Rate guard mechanism will be used.Rate guard mechanism
means combines Measurement-based detection and accusation-based reaction techniques.The attacks
and the defense using ODMRP, a representative multicast protocol for wireless mesh networks, and
SPP, an adaptation of the well-known ETX unicast metric to the multicast setting
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, There are several familiar routing protocols like DSDV, AODV, DSR, etc. which have been proposed for providing communication among all the nodes in the network. This paper presents a performance comparison of proactive and reactive protocols ADSDV, OLSR and TORA based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
This document evaluates the performance of the AODV and DSR routing protocols under wormhole attacks in a mobile ad hoc network (MANET) simulation. The simulation analyzed packet delivery ratio, end-to-end delay, and throughput with and without wormhole attacks. Without attacks, AODV performed better than DSR for packet delivery ratio and end-to-end delay, while DSR had higher throughput due to using multiple paths. Under wormhole attacks, both protocols saw degraded performance, with DSR being more severely impacted due to its vulnerability to the attacks. The study aims to compare how the two reactive routing protocols are affected by wormhole attacks in MANETs.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
This document analyzes and compares the performance of the multicast routing protocols MAODV and ODMRP under black hole attacks in MANETs. Simulation results show that both protocols experience a significant reduction in packet delivery ratio in the presence of black hole attackers. However, the impact is greater on MAODV compared to ODMRP due to ODMRP's use of alternate data delivery paths. The packet delivery ratio and average end-to-end delay are negatively affected by increased node mobility and number of attackers. ODMRP generally performs better than MAODV under black hole attacks due to its mesh-based structure providing redundant routes.
Delay Tolerant Network (DTN) is a promising technology which aims to provide efficient
communication between devices in a network with no guaranteed continuous connectivity. Most
of the existing routing schemes for DTNs achieve message delivery through message replication
and forwarding. However, due to the lack of contemporaneous end-to-end communication path,
designing routing protocols that can achieve high delivery rate with low communication
overhead is a challenging problem. Some routing protocols appear with high similarity, but
their performance are significantly different. In this paper, we evaluate several popular routing
protocols in DTNs, including Epidemic, Spray and Wait, PRoPHET, and 3R through extensive
trace-driven simulations. The objective is to evaluate the performance of different routing
schemes using different data traces and investigate the optimal configuration setting for each
routing scheme. This paper provides important guidances on the design and selection of routing
protocols for given delay tolerant networks.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An ad hoc wireless network contains mobile
networks which creates an underlying architecture for
communication without the help of traditional fixed-position
routers. Nevertheless, the architecture must maintain
communication routes although the hosts are mobile and they
have limited transmission range. There are different protocols for
handling the routing in the mobile environment. This paper will
focus on two well know algorithms: Optimized Link State
Routing Protocol and Optimized Linked State Routing Protocol
for Energy Consumption.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
Abstract DTN (Delay Tolerant Network) is a new concept in the field of wireless networks. It enables communication in challenged environment where traditional network fails. Unlike other ad hoc wireless network it does not demand for end to end node connectivity. DTN is based on store carry and forward principle. This mechanism is implemented using bundle protocol. DTN nodes have capabilities such as radio interface, movement, persistent storage, message routing and energy consumption .Here a node might accumulate a message in its buffer and carry it for limited time, waiting till a suitable forwarding opportunity is acquired. Multiple message duplication into the network is done to increase delivery probability. The main objective of DTN Routing is to build a powerful network between various nodes (mobile devices, planetary vehicles etc) so that good delivery probability and less delay are obtained. This unique mechanism poses a security challenge. A sophisticated attack observed is black hole attack in which malicious intermediate node are present in network that can provide attacked forged metrics to another node. The aim of this work is to simulate and analyze routing protocol of DTN when nodes enter in environment with black hole attack. The work has been carried out with ONE (opportunistic network environment) simulator. The performance of routing protocols (RAPID and Spray and Wait) are tested for different number of attacking nodes. The analysis indicates there is decrease in delivery probability, hop count average and buffer time average. But latency average first increases and then start decreasing. The overhead ratio increases using Spray and Wait Protocol but with RAPID protocol, it decreases with increasing black hole attacking nodes. Index Terms: DTN, ONE, etc.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document surveys different types of black hole attacks in wireless mobile ad hoc networks and various detection schemes that have been proposed. It discusses single black hole attacks, where a single malicious node drops packets to disrupt routing, and collaborative black hole attacks, where multiple nodes work together. The document analyzes and compares detection schemes for single black hole attacks in terms of the routing protocol used, detection method, results reported, and limitations. It finds that while many schemes can effectively detect a single attacker, they often fail against collaborative black hole attacks.
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
This document discusses evaluating trust and reputation using uncertain reasoning in mobile ad hoc networks (MANETs). It first defines trust, reputation, and uncertain reasoning. It then discusses different routing protocols used in MANETs like AODV, OLSR, and DSR. It also discusses security attacks in MANETs and how trust and reputation models can be used to address these issues. Finally, it discusses probabilistic reasoning and Dempster-Shafer theory as ways to handle uncertainty in evaluating trust and reputation.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attackijcncs
This document evaluates the performance of the AODV and DSR routing protocols under wormhole attacks in a mobile ad hoc network (MANET) simulation. The simulation analyzed packet delivery ratio, end-to-end delay, and throughput with and without wormhole attacks. Without attacks, AODV performed better than DSR for packet delivery ratio and end-to-end delay, while DSR had higher throughput due to using multiple paths. Under wormhole attacks, both protocols saw degraded performance, with DSR being more severely impacted due to its vulnerability to the attacks. The study aims to compare how the two reactive routing protocols are affected by wormhole attacks in MANETs.
Review on Grey- Hole Attack Detection and PreventionIJARIIT
These Grey Hole attacks poses a serious security threat to the routing services by attacking the reactive routing protocols resulting in drastic drop of data packets. AODV (Ad hoc on demand Distance Vector) routing being one of the many protocols often becomes an easy victim to such attacks. The survey also gives up-to-date information of all the works that have been done in this area. Besides the security issues they also described the layered architecture of MANET, their applications and a brief summary of the proposed works that have been done in this area to secure the network from Grey Hole attacks
The document discusses the gray hole attack in MANETs using the AODV routing protocol. The gray hole attack involves a malicious node selectively dropping packets in a manner that is difficult to detect. The summary proposes a detection method that involves (1) the source node broadcasting a fake RREQ to identify malicious nodes, (2) comparing the destination sequence numbers of replying nodes to a threshold value to identify attackers, and (3) broadcasting identified gray hole nodes to other nodes in the network. The method aims to improve on existing detection techniques by using destination-based routing and sequence number comparisons to more accurately detect gray hole attacks.
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
Performance Evaluation and Comparison of On Demand Multicast Reactive Routing...CSCJournals
This document analyzes and compares the performance of the multicast routing protocols MAODV and ODMRP under black hole attacks in MANETs. Simulation results show that both protocols experience a significant reduction in packet delivery ratio in the presence of black hole attackers. However, the impact is greater on MAODV compared to ODMRP due to ODMRP's use of alternate data delivery paths. The packet delivery ratio and average end-to-end delay are negatively affected by increased node mobility and number of attackers. ODMRP generally performs better than MAODV under black hole attacks due to its mesh-based structure providing redundant routes.
Delay Tolerant Network (DTN) is a promising technology which aims to provide efficient
communication between devices in a network with no guaranteed continuous connectivity. Most
of the existing routing schemes for DTNs achieve message delivery through message replication
and forwarding. However, due to the lack of contemporaneous end-to-end communication path,
designing routing protocols that can achieve high delivery rate with low communication
overhead is a challenging problem. Some routing protocols appear with high similarity, but
their performance are significantly different. In this paper, we evaluate several popular routing
protocols in DTNs, including Epidemic, Spray and Wait, PRoPHET, and 3R through extensive
trace-driven simulations. The objective is to evaluate the performance of different routing
schemes using different data traces and investigate the optimal configuration setting for each
routing scheme. This paper provides important guidances on the design and selection of routing
protocols for given delay tolerant networks.
Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. A distributed denial-of-service attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The proposed system suggests a mechanism based on entropy variations between normal and DDoS attack traffic. Entropy is an information theoretic concept, which is a measure of randomness. The proposed method employs entropy variation to measure changes of randomness of flows. The implementation of the proposed method brings no modifications on current routing software.
1) The document analyzes the performance of the OLSR routing protocol in MANETs in terms of throughput and delay. It implements RSA encryption at the protocol level to detect and prevent black hole attacks.
2) The simulation results show that OLSR with the RSA-based security mechanism is effective at improving security against black hole attacks. It analyzes throughput and delay under different network conditions using the OLSR protocol.
3) Common routing protocols for MANETs like DSDV, DSR, AODV, and OLSR are discussed. Security is a major challenge for MANETs due to the open wireless medium and lack of centralized monitoring. The paper aims to enhance OLSR
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An ad hoc wireless network contains mobile
networks which creates an underlying architecture for
communication without the help of traditional fixed-position
routers. Nevertheless, the architecture must maintain
communication routes although the hosts are mobile and they
have limited transmission range. There are different protocols for
handling the routing in the mobile environment. This paper will
focus on two well know algorithms: Optimized Link State
Routing Protocol and Optimized Linked State Routing Protocol
for Energy Consumption.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
Abstract DTN (Delay Tolerant Network) is a new concept in the field of wireless networks. It enables communication in challenged environment where traditional network fails. Unlike other ad hoc wireless network it does not demand for end to end node connectivity. DTN is based on store carry and forward principle. This mechanism is implemented using bundle protocol. DTN nodes have capabilities such as radio interface, movement, persistent storage, message routing and energy consumption .Here a node might accumulate a message in its buffer and carry it for limited time, waiting till a suitable forwarding opportunity is acquired. Multiple message duplication into the network is done to increase delivery probability. The main objective of DTN Routing is to build a powerful network between various nodes (mobile devices, planetary vehicles etc) so that good delivery probability and less delay are obtained. This unique mechanism poses a security challenge. A sophisticated attack observed is black hole attack in which malicious intermediate node are present in network that can provide attacked forged metrics to another node. The aim of this work is to simulate and analyze routing protocol of DTN when nodes enter in environment with black hole attack. The work has been carried out with ONE (opportunistic network environment) simulator. The performance of routing protocols (RAPID and Spray and Wait) are tested for different number of attacking nodes. The analysis indicates there is decrease in delivery probability, hop count average and buffer time average. But latency average first increases and then start decreasing. The overhead ratio increases using Spray and Wait Protocol but with RAPID protocol, it decreases with increasing black hole attacking nodes. Index Terms: DTN, ONE, etc.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document surveys different types of black hole attacks in wireless mobile ad hoc networks and various detection schemes that have been proposed. It discusses single black hole attacks, where a single malicious node drops packets to disrupt routing, and collaborative black hole attacks, where multiple nodes work together. The document analyzes and compares detection schemes for single black hole attacks in terms of the routing protocol used, detection method, results reported, and limitations. It finds that while many schemes can effectively detect a single attacker, they often fail against collaborative black hole attacks.
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...IJARIIE JOURNAL
This document discusses evaluating trust and reputation using uncertain reasoning in mobile ad hoc networks (MANETs). It first defines trust, reputation, and uncertain reasoning. It then discusses different routing protocols used in MANETs like AODV, OLSR, and DSR. It also discusses security attacks in MANETs and how trust and reputation models can be used to address these issues. Finally, it discusses probabilistic reasoning and Dempster-Shafer theory as ways to handle uncertainty in evaluating trust and reputation.
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Comprehensive Guide to Distribution Line DesignRadharaman48
The Comprehensive Guide to Distribution Line Design offers an in-depth overview of the key principles and best practices involved in designing electrical distribution lines. It covers essential aspects such as line routing, structural layout, pole placement, and coordination with terrain and infrastructure. The guide also explores the two main types of distribution systems Overhead and Underground distribution lines highlighting their construction methods, design considerations, and areas of application.
It provides a clear comparison between overhead and underground systems in terms of installation, maintenance, reliability, safety, and visual impact. Additionally, it discusses various types of cables used in distribution networks, including their classifications based on voltage levels, insulation, and usage in either overhead or underground settings.
Emphasizing safety, reliability, regulatory compliance, and environmental factors, this guide serves as a foundational resource for professionals and students looking to understand how distribution networks are designed to efficiently and securely deliver electricity from substations to consumers.
Optimize Indoor Air Quality with Our Latest HVAC Air Filter Equipment Catalogue
Discover our complete range of high-performance HVAC air filtration solutions in this comprehensive catalogue. Designed for industrial, commercial, and residential applications, our equipment ensures superior air quality, energy efficiency, and compliance with international standards.
📘 What You'll Find Inside:
Detailed product specifications
High-efficiency particulate and gas phase filters
Custom filtration solutions
Application-specific recommendations
Maintenance and installation guidelines
Whether you're an HVAC engineer, facilities manager, or procurement specialist, this catalogue provides everything you need to select the right air filtration system for your needs.
🛠️ Cleaner Air Starts Here — Explore Our Finalized Catalogue Now!
Peak ground acceleration (PGA) is a critical parameter in ground-motion investigations, in particular in earthquake-prone areas such as Iran. In the current study, a new method based on particle swarm optimization (PSO) is developed to obtain an efficient attenuation relationship for the vertical PGA component within the northern Iranian plateau. The main purpose of this study is to propose suitable attenuation relationships for calculating the PGA for the Alborz, Tabriz and Kopet Dag faults in the vertical direction. To this aim, the available catalogs of the study area are investigated, and finally about 240 earthquake records (with a moment magnitude of 4.1 to 6.4) are chosen to develop the model. Afterward, the PSO algorithm is used to estimate model parameters, i.e., unknown coefficients of the model (attenuation relationship). Different statistical criteria showed the acceptable performance of the proposed relationships in the estimation of vertical PGA components in comparison to the previously developed relationships for the northern plateau of Iran. Developed attenuation relationships in the current study are independent of shear wave velocity. This issue is the advantage of proposed relationships for utilizing in the situations where there are not sufficient shear wave velocity data.
Scilab Chemical Engineering application.pptxOmPandey85
This presentation explores the use of Scilab, a powerful open-source alternative to MATLAB, in solving key problems in chemical engineering. Developed during an academic internship, the project demonstrates how Scilab can be effectively applied for simulation, modeling, and optimization of various chemical processes. It covers mass and energy balance calculations for both steady and unsteady-state systems, including the use of differential equations to model dynamic behavior. The report also delves into heat transfer simulations, such as conduction and heat exchanger design, showcasing iterative solutions and energy conservation.
In reaction engineering, Scilab is used to model batch reactors and compare performance metrics between plug flow and continuous stirred tank reactors. The presentation further includes fluid flow simulations using advection-diffusion models and the Navier-Stokes equation, helping visualize mixing and flow behavior. For separation processes, it offers distillation sensitivity analysis using Underwood’s and Gilliland’s correlations. Optimization techniques like gradient descent and genetic algorithms are applied to a plant-wide scenario to minimize energy consumption.
Designed for students, educators, and engineers, this report highlights Scilab's capabilities as a cost-effective and versatile tool for chemical process modeling and control, making it an excellent resource for those seeking practical, open-source engineering solutions. By integrating real-world examples and detailed Scilab code, this presentation serves as a practical guide for anyone interested in chemical process simulation, computational modeling, and open-source software in engineering. Whether you're working on chemical reactor design, heat exchanger analysis, fluid dynamics, or process optimization, Scilab provides a reliable and flexible platform for performing numerical analysis and system simulations. This resource is particularly valuable for chemical engineering students, academic researchers, and professionals looking to reduce software costs while maintaining computational power. With keywords like chemical engineering simulation, Scilab tutorial, MATLAB alternative, and process optimization, this presentation is a go-to reference for mastering Scilab in the context of chemical process engineering.
Department of Environment (DOE) Mix Design with Fly Ash.MdManikurRahman
Concrete Mix Design with Fly Ash by DOE Method. The Department of Environmental (DOE) approach to fly ash-based concrete mix design is covered in this study.
The Department of Environment (DOE) method of mix design is a British method originally developed in the UK in the 1970s. It is widely used for concrete mix design, including mixes that incorporate supplementary cementitious materials (SCMs) such as fly ash.
When using fly ash in concrete, the DOE method can be adapted to account for its properties and effects on workability, strength, and durability. Here's a step-by-step overview of how the DOE method is applied with fly ash.
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
In this lecture, I explain the fundamentals of electromagnetic compatibility (EMC), the basic coupling model and coupling paths via cables, electric fields, magnetic fields and wave fields. We also look at electric vehicles as an example of systems with many conducted EMC problems due to power electronic devices such as rectifiers and inverters with non-linear components such as diodes and fast switching components such as MOSFETs or IGBTs. After a brief review of circuit analysis fundamentals and an experimental investigation of the frequency-dependent impedance of resistors, capacitors and inductors, we look at a simple low-pass filter. The input impedance from both sides as well as the transfer function are measured.
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 500
ADVISEDLY DELAYED PACKET ATTACK ON TCP-BASED MOBILE
AD-HOC NETWORKS
Romil Nehra1
, Narendra Yadav2
1, 2
Department of Computer Science and Engineering, Sri Balaji College of Engineering and Technology, Jaipur,
Rajasthan, India, [email protected], [email protected]
Abstract
Efficient routing in mobile ad-hoc networks (MANETs) is a challenging task due to its varying physical channel characteristics,
dynamic topology and un-centralized communication. Furthermore, multihop routing is required when the source-destination pairs
are not in each other’s communication range. Due to the above challenges these networks are vulnerable to various types of attacks
on various layers of the TCP/IP protocol stack. In this thesis, we implement and analyze an attack called advisedly delay packet attack
on ad-hoc on-demand distance vector (AODV) routing protocol. The advisedly delay packet attack is an attack that effects the TCP-
based as well as UDP-based data transmissions but in this thesis we will also see how it exploits the TCP congestion control
mechanism to decrease the throughput of the network. In this attack, the attacker exploit the period of retransmission time out (RTO)
of the sender and attack in such a way so the sender is always transmitting in the slow start phase.
Keywords- MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Mobile ad-hoc network is a dynamic network formed by
independent system of randomly moving mobile nodes. Nodes
are connected through wireless links without utilizing the
existing network infrastructure or any form of centralized
administration. Each node is able to communicate directly
with nodes in its transmission range. For nodes outside
communication range, intermediate nodes are used to relay the
message hop by hop. Hence, such networks are called ―multi-
hop‖ networks.
In an ad-hoc network, it is required that a node forwards or
routes data packets on behalf of other nodes. Each node,
therefore, acts as a host and a router, necessitating use of
routing protocols to make routing decisions. Many routing
protocols have been proposed by the researchers. The biggest
challenge for routing protocols is to establish and re-establish
routes in the face of dynamically varying network topology
and network partitions due to node mobility. Depending on
how the mobile nodes acquire and maintain routing
information, MANET routing protocols can be classified as
either reactive or proactive.
This paper is organized in the following manner. In Section II,
we present the related work done in our area which includes
the papers that are proposed the effective routing methods.
This is followed by the proposed work for efficient routing for
delay-sensitive applications in Section III. We also
summarize the key features, basic operation, as well as major
pros and cons of our proposed approach. In Section IV, We
will conclude the paper with present state of the art and future
work.
2. RELATED WORK
In this section, we discuss the past works done in MANET
that includes the evolution of many new attacks.
In [1] and [2], the attack is one of the most serious attacks on
MANETs. In wormhole attack at least two attackers are
required to perform the attack very effectively. These two
attackers resides on different areas of the network makes a
tunnel through the network to communicate with each other.
The attackers broadcast the wrong information to the other
nodes in the network that the destination is only one hop away
from them. Sometimes they also broadcast the wrong
information that they are true neighbors of each other due to
this the attacker one which is near to source node is easily
selected on the route between the source destination pair when
the route is discovered on the basis of lowest number of hops
on the route.
In [3], the attacker when received a route request (RREQ)
message it modifies the sequence number in the RREQ
message to perform the attack. The attacker increases the
sequence number more than the usual number and reply back
to the source to make it believe that it has the better and
fresher route to the destination node. Once the source node got
this reply it start the transmission of data packet on the route
which consists of the attacker i.e., one of the intermediate
node of the established route is the attacker. Till now half of
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 501
the attack is performed by the attacker by spreading the false
information and making himself the part of the route. Now
when the data communication is started using the route the
attacker will drop all the data packets that reaches to it that is
when the attacker got the data packet for forwarding it drops
the packet without forwarding any of the data packets.
In [4], Flooding attack is the simplest attack to implement but
it is one of the most dangerous attacks. In this attack, the
attacker broadcast the false control or data packets in the
network due to which the network bandwidth is wasted largely
and the non-false packets are not able to reach their
destinations.
In [5]: As the communication in MANETs is multi hop
therefore the intermediate nodes plays an important role in
data communication over MANETs. The intermediate nodes
can become selfish by either using the wireless channel
unnecessary due to which the other nearby channels has to
contend more time to access the channel.
In [6] has analyzed the impact of packet re-ordering attack
over various TCP-variants using the MANET routing
protocols named AODV and DSR. Although authors claim
that they have investigated various versions of TCP but the
simulation results show graphs for TCP-Reno and TCP-
NewReno. Furthermore, the effect of packet re-ordering is not
analyzed in UDP-based data communications. Also, the
author’s uses only network throughput as an metric for the
performance evaluation but other important metric such as
number of retransmissions which greatly increases network
congestion and delay in the network is not examined. Finally,
it is not understandable that why the authors uses and
compares AODV and DSR routing protocols in his paper
because the re-ordering attack is used to effect the close-loop
attacks only and are independent on the underlying protocol
used for the routing.
3. PROPOSED METHODOLOGY
In proposed advisedly delayed data packets attack an attacker
node delays some or all packets with randomly or selectively
chosen delay periods during the data communication process.
The attacker node should be one of the intermediate nodes on
the route between the source destination pair to effectively
perform this attack. The attacker can perform the proposed
delaying attack in one of the following two ways:
a) The attacker can delay a percentage of the total
number of packets it receives in a fixed amount of
time all the delay time can be chosen same or
differently over a range. For example, the attacker
can delay 200 data packets from every 1000 data
packets it receives for the forwarding towards the
destination. Also, it can delay 100 packets from these
200 packets with the fixed delay period say 200
milliseconds while the other 100 packets are delayed
by selected a random period from 100 to 300
milliseconds.
b) The second way in which the attacker node can
perform the delayed attack is by delaying all data
packets that are arrived for a fixed period of time
each time from a fixed amount of time. For example,
the attacker node will start delaying all the packets it
receives in the first 100 milliseconds of every second.
Again the delayed period can either be fixed or
variable chosen from a given interval of time.
When the above mentioned packet delaying attack is
performed on a data communication session that is
transmitting data packets using the TCP protocol The
following can be result: due to the data packets delays at
intermediate nodes the retransmission time out of delayed data
packets triggers their retransmissions at the source node either
due to the time out of the RTO used by the source TCP.
Figure1 Packet dropping attack
Pseudo Code for proposed Delay-Aware Routing
Protocol
Processing of data packet received by an attacker
node
Variable used:
////////////////////////////////////
S = Source node
D = Destination node
A = Attacker node
I = Intermediate node
T_window = time window from which the attacker node
selects the delay period
T_period = delay duration selected randomly from the
T_window
//////////////////////////////////
IF1 (I got a data packet)
I check its AODV routing table
IF2 (Route is present in the routing table)
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 502
IF3 (I != A)
I forward the data packet towards D
ELSE
WHILE (output queue has data packet to send)
A selects the T_period from T_window
A pauses the fetch function for next T_period duration
A forwards the data packet once the timer set at the time of the
start of the fetch pause expires
ENDWHILE
ENDIF3
ENDIF2
ENDIF1
4. SIMULATION RESULTS AND
PERFORMANCE EVALUATION
In this section, we present the detailed performance analysis
and impact analysis of the proposed Re-shuffling data packet
attack (RSA) on different variants of TCP protocol over
mobile ad-hoc networks. The network scenarios used in the
simulation process are designed in such a way so that the
effects of the wireless channel and environment can be
mitigated. This is done to discover the exact impact of Re-
shuffling data packet attack on the TCP-based MANETs.
Therefore, we ignore the congestion and mobility induced
situation from the network scenarios used for simulation
process. As already mentioned above that the network
simulator used for the simulation process is the trail version of
the well knows network simulator called EXata.
Table1. Simulation Parameter Table
Parameters Values
Simulator EXata
Network Size 800 x 800 meter square
Simulation time 700 Seconds
Application Layer
Process
Generic File transfer
protocol (FTP)
Transport Layer Protocols TCP (Tahoe, Reno,
NewReno) and UDP
Routing protocol AODV
Number of Nodes 30
Mobility model None
MAC specification IEEE 802.11
Network Bandwidth 12 Mbps
Performance Metrics Network Throughput,
End-to-End Delay and
Number of
Retransmissions
PHY Specification 802.11a/g
Parameters Values
A .Simulation Setup
Furthermore, the performance measurement metrics used are
as follows and the graphs will show that the attack is
independent from the effect of routing protocol on both TCP
as well as UDP:
a) Network throughput: The network throughput is
defined as the ratio of the total number of data bytes
received to the total duration of the communication
process.
b) Packet delivery ratio (PDR): The ratio of the
application data packets that are received without any
error at destination nodes to the total data packets
generated by the CBR sources are called Packet
delivery ratio (PDR) of the network.
c) Average end-to-end delay of data packets: This
metric is calculated by the destination node whenever
it receives a data packet. The destination node will
calculate the delay of each received data packet by
using its send timestamp and its received timestamp
at the destination.
d) Number of retransmission (NOR): This is the
important evaluation metric as we are using TCP-
based MANETs.
B. Performance Evaluation
1. Effects of Increase in Packet Delayed Period
In figure 2, we have shown the effects on network throughput
for three variants of TCP protocol when the attacker increases
its delay period time. As it can be seen from Figure 2 that the
throughput of the network decreases with the increase in the
delay period time because as the delay period of the data
communication increases the number of data packets that are
delayed intentionally instead of forwarding them without
introducing any delay by the attacker also increases.
Figure 2 Throughput with increase in delayed period time of
attackers (TCP-based MANET scenario)
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 503
Figure 3 Number of retransmissions with increase in
percentage drop time of attackers (TCP-based MANET
scenario)
2. Effects of Increase Number of Attackers in TCP-
Based Manets
In this section, we analyze the performance of three TCP
protocol variants with the increase in the number of attackers
in an active route between any source-destination pair. The
metrics used for the analysis are network throughput and
number of re-transmissions caused during the whole duration
of data communication of a data session.
Figure 4 Throughput with increase in number of attackers on
the route (TCP-based MANET scenario)
Figure 5 Number of retransmissions with increase in number
of attackers on the route (TCP-based MANET scenario)
CONCLUSIONS AND FUTURE WORK
In this section, we have presented the conclusion and future
work for the paper. To perform the work proposed in this
thesis we start with the basics of the mobile ad-hoc networks.
We have studied about the MANETs and its characteristics
and its challenges and issues that are faced by the researchers
when performing the routing over these networks. After the
in-depth introduction of MANETs we started the related work
which is similar to our proposed work in this thesis. For this
we have studied all forms of existing attacks over Mobile ad-
hoc networks. As it can be easily seen from the work
presented in Chapter 4 that the proposed Advisedly Delaying
Packet (ADP) attack is a simple yet very powerful denial of
service (DoS) attack that is effective on both TCP and UDP
based MANETs. The simulation results clearly show the
impact of proposed attack on the network throughput,
bandwidth wastage and end-to-end delay data quality. It has
also been observed that even though the TCP congestion
control is adaptable to the packet losses but in case of the
forced delayed attack it is fully unable to detect whether the
packet is dropped or delayed and these are the result of the
attacker misbehaving or it is due to the congestion or other
wireless environmental problem. For this we have studied all
forms of existing attacks over Mobile ad-hoc networks. The
simulation results clearly show the impact of proposed attack
on the network throughput, bandwidth wastage and received
data quality.
For the future work, we will try to discover a detection
mechanism for the attacker nodes so that they can be removed
from further communications. Once detected the source node
or network has to make sure that this attacker will not become
the part of any active routes in the network. Also, we will try
to figure out the other closely related attacks that can be
possible to induce by a simple modification on our attack.
REFRENCES
George Hoffman, Yoko Ono, Akiko Kawakami,
Kenichi Kusano, and Takashi Manabe Japan
Communications 2012 Top 10 Predictions
http://www.idc.com/getdoc.jsp?containerId=JP1376002
U.
Trends — Survey Says Wireless Net- works Expand for
Mobile Growth.
http://edtechdigest.wordpress.com/2011/10/18/trends-
survey-says-wirele
Raza, I. and Hussain, S.A. and Ali, A. and Hassan
Raza, M. : Persistent packet reordering attack in TCP
based Ad hoc wireless networks, Information and
Emerging Technologies (ICIET), 2010 International
Conference, 2010.
C. Perkins and E. Royer. Ad hoc on-demand distance
vector routing. 1999.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 504
A. Mishra, R. Jaiswal, and S. Sharma. A novel
approach for detecting and eliminating cooperative
black hole attack using advanced dri table in ad hoc
network. In Advance Computing Conference (IACC),
2013 IEEE 3rd International, 2013.
Yih-Chun Hu; Perrig, A.; Johnson, D.B., "Wormhole
attacks in wireless networks," Selected Areas in
Communications, IEEE Journal on , vol.24, no.2,
pp.370,380, Feb. 2006.
Hoang Lan Nguyen and Uyen Trang Nguyen. A study
of different types of attacks in mobile ad hoc networks.
In Electrical Computer Engineering (CCECE), 2012
25th IEEE Canadian Conference on, 2012.
M.T.Refaei V.Srivastava L.Dasilva and M.Eltoweissy.
A reputation-based mechanism for isolating selfish
nodes in ad hoc networks. In International Conference
on Mobile and Ubiquitous Systems, Networking and
Services, July 2005.
Ping Yi; Zhoulin Dai; Yi-ping Zhong; Shiyong Zhang,
"Resisting flooding attacks in ad hoc networks,"
Information Technology: Coding and Computing, 2005.
ITCC 2005. International Conference on , vol.2, no.,
pp.657,662 Vol. 2, 4-6 April 2005.
Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of-
service attack-detection techniques," Internet
Computing, IEEE , vol.10, no.1, pp.82,89, Jan.-Feb.
2006.
JOHNSON David B. The dynamic source routing
protocol for mobile ad hoc networks (dsr). Internet-
Draft, 2004.
Chen, S., Nahrstedt, K.: Distributed quality-of-service
routing in ad hoc networks. Selected Areas in
Communications, IEEE Journal 17, 1488–1505 (1999).
Zeadally, Sherali and Hunt, Ray and Chen, Yuh-Shyan
and Irwin, Angela and Hassan, Aamir,‖ Vehicular ad
hoc networks (VANETS): status, results,
and challenges‖, Telecommunication Systems, Springer
US, 2012.
Chakrabarti, S., Mishra, A.: QoS issues in ad hoc
wireless networks. Communications Magazine, IEEE
39, 142–148 (2001).
Imrich Chlamtac, Marco Conti, and Jennifer J.-N. Liu.
Mobile ad hoc networking: imperatives and challenges.
Ad Hoc Networks, 1(1):13 – 64, 2003.
Tsu-Wei Chen and Gerla, M.: Global state routing: a
new routing scheme for ad-hoc wireless networks,
Communications, 1998. ICC 98. Conference Record.
1998 IEEE International Conference.
E.M. Royer and Chai-Keong Toh. A review of current
routing protocols for ad hoc mobile wireless networks.
Personal Communications, IEEE, 6(2):46 –55, apr
1999.
P. Jacquet, P. Mhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, and L. Viennot. Optimized link state routing
protocol for ad hoc networks. 3626, 2001.
Charles E. Perkins and Pravin Bhagwat. Highly
dynamic destination-sequenced distance-vector routing
(dsdv) for mobile computers. SIGCOMM Comput.
Commun. Rev., 24:234–244, October 1994.