SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1043
MALICIOUS ATTACK DETECTION AND PREVENTION IN AD HOC
NETWORK BASED ON REAL TIME OPERATING SYSTEM
ENVIRONMENT
JITHESH PUTHENKOVILAKAM
M-Tech Student, Electrical and Electronics Department, Amrita School of Engineering, Tamil Nadu, India,
jithesh_kovil@rediffmail.com
Abstract
This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The
wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and
location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two
nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by
defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure
for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of
wormhole attack in the ad hoc network.
Index Terms: An algorithm to detect worm hole attack in a wireless network…
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
An ad-hoc network is a decentralized wireless network in
which each node can participate in routing by forwarding data
to other nodes .A wireless network uses radio waves instead of
cables to relay information to and from your computer. There
is less need for technical support in setting up due to their
simple nature .Even though the wireless networking provides
many advantages, but it is also prone to many security threats
which can potentially alter organization’s overall information
security risk profile. The reason is that in many organizations
the security information flows through the wireless network
.The worm hole attack is one of the those security threats. The
proposed algorithm for worm hole attack detection and
prevention can provide better understanding to a designer in
setting up wireless networks which have high productivity
with fewer security risks. The ad-hoc network which is free
from worm hole attack will have the capacity to avoid
unauthorized intrusions to a wireless network.
The wormhole attack is one of the severe malicious attacks,
happening in the ad-hoc network .The two nodes in any end
points in the network form a tunnel, known as worm hole
tunnel. In this attack two existing nodes become malicious or
two node can intrude into any point in the network and create
worm hole link. These nodes are called worm hole nodes. In
the wormhole attack, a worm hole node copies packets at one
location in the network, tunnels them to another location
through the another worm hole node. These packets can be
retransmitted into the network or captured, depends on the
intention of the attacker who establishes this attack.
The wormhole attack is very powerful, and preventing the
attack is very difficult because all the nodes between the
worm hole link are shielded or got bypassed A strategic
placement of this worm hole link can result in a significant
breakdown in communication across a wireless network. In
the optimized link state routing protocol (OLSR), if a
wormhole attack is launched routing is easily disrupted
because of the combined effect of two worm hole nodes.
2. RELATED WORKS
In the paper by Farid Na¨ıt-Abdesselam[1] an efficient method
is devised to detect and avoid wormhole attacks in the OLSR
protocol. These methods first attempts to pinpoint links that
may, potentially, be part of a wormhole tunnel. Then, a proper
wormhole detection mechanism is applied to suspicious links
by means of an exchange of encrypted probing packets
between the two supposed neighbours (endpoints of the
wormhole).The proposed solution exhibits several advantages,
among which its non-reliance on any time synchronization or
location information, and its high detection rate under various
scenarios .In the paper by Shalini Jain, Dr.Satbir Jain[2] a
novel trust-based scheme for identifying and isolating nodes
that create a wormhole in the network without engaging any
cryptographic means is presented. In the paper by Yih-Chun
Hu [3] a general mechanism, called packet leashes, for
detecting and thus defending against wormhole attacks, and
implementing leashes is presented.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1044
3. SYSTEM ARCHITECTURE
A wireless network is set up using Zig Bee based on
Optimized Link State Protocol Optimized Link State Protocol
(OLSR) which is a proactive routing protocol, so the routes
are always immediately available when needed. It is a
proactive protocol which does not maintain the routing table
even it does not want transmission. Proactive protocols
produce higher routing efficiency than reactive protocol.
It provides low single packet transmission latency. Routing
table structure is the main data structure where all needed
information about the routes is stored. The routing table has
the information about next hop as well as predecessor node.
Initially a wired network consists of five nodes, is established.
The first node communicate with the second one through DB-
9 serial port connector, connected to the UART0 of ARM
LPC2148..The UART1 of the second node communicate to
the UART1 of the third node using another DB-9 connector
and so on. The computer is used as fifth node.The
handshaking messages traversed from node 4 are displayed on
the hyper terminal of the computer which is the fifth node.
3.1 METHODOLOGY
OLSR uses control messages: Hello .Hello messages are used
for finding the information about the link status and the host’s
neighbours. Each node in the network establishes bidirectional
link with the neighbor node by transmitting and receiving
Hello packet through single hop communication. The Hello
packet contain information about source addresse,destination
addresse,size of data message ,status of willingness.The
typical hello message used here is “A008”.A is the source
address .’0’ is the willingness bit.8 indicates the size of the
data message transmitted in bits.
Upon receiving the node sends back “A1B8”.Here willingness
bit is changed to 1.B is the address of the second node. The
wired network is changed to wireless network using Zig Bee.
The Zigbee module is connected to the UART of ARM
LPC2148 development board. Zigbee is a low power spin off
of Wi-Fi. It is a specification for small, low power radios
based on IEEE 802.15.4 – 2003 Wireless Personal Area
Networks standard. ZigBee is a wireless technology developed
as an open global standard to address the unique needs of low-
cost, low-power wireless M2M networks. The ZigBee
standard operates on the IEEE 802.15.4 physical radio
specification and operates in unlicensed bands including 2.4
GHz, 900 MHz and 868 MHz. The each ZigBee module is
configured using X-CTU software before connecting to the
node.
3.2 WORM HOLE ATTACK IN WIRELESS
NETWORK
A particularly severe attack on routing protocols in ad hoc
networks is the so-called wormhole attack in which two or
more colluding attackers record packets at one location, and
tunnel them to another location for a replay at that remote
location
Figure 1 System Flow Diagram
The wormhole attack is very powerful, and preventing the
attack has proven to be very difficult. A strategic placement of
the wormhole can result in a significant breakdown in
communication across a wireless network. In such attacks two
or more malicious colluding nodes create a higher-level virtual
tunnel in the network, which is employed to transport packets
between the tunnel endpoints. In this paper, we devise an
efficient method to detect and avoid wormhole attacks in the
OLSR protocol. This method have detecting suspicious link
and verification procedure The proposed solution exhibits
several advantages, among which its non-reliance on any time
synchronization or location information, and its high detection
rate under various scenarios.
We study the problem of characterizing the wormhole attack,
an attack that can be mounted on a wide range of wireless
network protocols without compromising any cryptographic
quantity or network node. To launch a wormhole attack, an
adversary establishes a direct link referred as wormhole link
between two points in the network. A direct link can be
established via a wire line, a long-range wireless transmission,
or an optical link. Once the wormhole link is operational, the
adversary eavesdrop messages at one end, referred as the
origin point, tunnels them through the wormhole link and
replays them in a timely fashion at the other end, referred as
the destination point. In the wormhole model, it is assumed
that the adversary does not compromise the integrity and
authenticity of the communication, and any cryptographic
quantity remains secret.
4 DESIGN OF WORM HOLE DTECTION AND
PREVENTION ALGORITHM
An algorithm for detecting and preventing the worm hole
attack in wireless network and preventing the same is
designed. Wormhole attacks are severe attacks that can be
easily launched even in networks with confidentiality and
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1045
authenticity. The malicious nodes usually target the routing
control messages that are related to the topology information
or routing information. In this paper, we have presented an
effective method for detecting and preventing wormhole
attacks in OLSR. The proposed solution is an easy-to-deploy
solution. It does not require any complex computation or
special hardware. The performance of this approach shows
high detection rate under various scenarios.
4.1 ALGORITHM
After network is set up data transmission is to be done. Each
node has to store the details of immediate successor and
predecessor nodes .When each node receives data
succesfully,it has to send acknowledgement back to the
predecessor within the time constraints.Store the details of all
active nodes in the first node. Make node 2 and 4 worm hole
nodes by creating a link between 2 and 4
Figure 2 Event Flow Diagrams
The data transmission is started from node1.The node 3 and
node 4 receives data from node 2.The node 4 forwards to
node5.The node 3 receives data and sends to node 4.The node
4 does not respond to it as it is part of worm hole link. Within
the time limits, Node 3 does not receive the acknowledgement
from Node 4. It sends the information to Node 1 The Node 1
put successor node status as malicious. In the verification
procedure, node 1sends probe packets to node2,4 and 5.From
the response it confirms that worm hole link is established
between 2 and 4.Node 2 and 4 is removed from the network
by changing the link.The successful data transmission is done
through node 1,3 and 5
5. EXPERIMENTAL SET UP
The hardware required for the wired network based on the
OLSR is four ARM LPC2148 development boards and one
personal computer, and DB-9 connectors. The hardware
implementation of wireless network with worm hole detection
and prevention include LPC ARM 2148 micro controller and
Zig Bee. The network consists of five nodes, out of which four
are ARM micro controllers and one is computer. The Zig Bee
attached to each microcontroller act as transmitter as well as
receiver. Upon setting up of bidirectional link successfully, a
led on each node should blink. After this, data is transmitted
from source to destination. The computer at the destination
will have to display the received data. Afterwards node 2 and
node 4 are made malicious. The worm hole detection
algorithm executes after which isolate and monitor the worm
hole link. This should prevent it and finally new network is
established which is free from worm hole attack.
Figure 3: Zig Bee board
Figure 4 ARM LPC2148 DEVELOPMENT BOARD
6 PORTING ON RTOS
MicroC/OS-II (commonly termed as uC/OS-II), is a low-cost
priority based pre-emptive real time multitasking operating
system kernel for microprocessors, written mainly in the C
programming language. It is mainly intended for use in
embedded systems. uC/OS-II stands for Micro-Controller
Operating System Version 2. The uC/OS-II is a highly
portable, scalable, preemptive, real-time, multitasking kernel
specifically designed for embedded applications
Porting is the process of writing the application code intended
for a target on a specific OS or an RTOS. In classical
definition porting is defined as “The process of adapting a
Software so that an executable program can be created for a
computing environment that is different from the one for
which it was originally designed for”. For the port of uC/OS-II
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1046
to any target embedded platform we first need the uC/OS-II
kernel, which is CPU independent. For any port this kernel
will be the same. Now the CPU specific code for the
corresponding embedded platform used is needed. The third
requirement is the BSP corresponding to the board carrying
the microcontroller or microprocessor. The code written in c
for worm hole detection and prevention is ported on uC/OS-II
and built into ARMLPC 2148 development board. The
priorities are set for various tasks required to set up the ad-hoc
network, introduce worm hole attack, detect and prevent it.
Figure 5 Code required for uC/OS-II Porting
CONCLUSIONS
The proposed algorithm used for implementing this project is
developed keeping in mind the fact that it can provide better
understanding to a designer in setting up wireless networks
which have high productivity with fewer security risks. The
wireless networking provides many advantages, but it is also
coupled with new security threats which can potentially alter
organization’s overall information security risk profile.
Properly enhanced, this developed system will have the
capacity to avoid unauthorized intrusions to a wireless
network.
ACKNOWLEDGEMENTS
Author gratefully acknowledges the facilities available at the
Amrita school of engineering, Coimbatore, sincerely thanks to
my guide Dr.Madhu and Mr. Anu Kumar for helping me in
theoretical and practical section.
REFERENCES:
[1]Issa Khalil, SaurabhBagchi & Ness B. Shroff,
“LITEWORP: Detection and Isolation of the Wormhole
Attack in Static MultihopWireless Networks”. The
International Journal of Computer and Telecommunications
Networking, Vol. 51, Issue 13, pp 3750- 3772, 2007
[2] Issah Khalil, “Mitigation of Control and data traffic
attacks in wireless ad-hoc and sensor networks” IEEE Vol. 6,
Issue 3, pp 344-362
[3]Sun Choi, Doo-young Kim, Do-hyeon Lee &Jae-il Jung
“WAP: Wormhole Attack Prevention Algorithm in Mobile Ad
Hoc Networks” IEEE International Conference on Sensor
Networks,Ubiquitous, and Trustworthy Computing
SUTC’08.pp 343- 348,2008
[4] Y.C. Hu, A. Perrig, and D.B. Johnson, “Wormhole Attacks
in WirelessNetworks,” In IEEE JSAC, Vol. 24, No. 2, pp.
370-380,2006
BIOGRAPHIES
Jithesh Puthenkovilakam is a student
at at the Amrita University at
Coimbatore and presently doing Master
Of Technology in Embedded System. He
received the BTech .Degree in Electrical
and Electronics Engineering from the
Kannur University .Post that he worked
as a software Engineer .He was involved
in avionics and automotive projects as a low level designer
and programmer. In his thesis work at Amrita School of
Engineering, he focused on security and performance in
wireless ad hoc networks and malicious attacks. His research
interests include systems and network security.
Ad

More Related Content

What's hot (18)

Ijetr042106
Ijetr042106Ijetr042106
Ijetr042106
Engineering Research Publication
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
IJNSA Journal
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
iosrjce
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
IJNSA Journal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
Thesis Scientist Private Limited
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
 
A43030104
A43030104A43030104
A43030104
IJERA Editor
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
IJNSA Journal
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
iosrjce
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
IJNSA Journal
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
Editor IJCATR
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 

Viewers also liked (20)

Study of bad block management and wear leveling in
Study of bad block management and wear leveling inStudy of bad block management and wear leveling in
Study of bad block management and wear leveling in
eSAT Publishing House
 
Capacity and performance analysis of suame
Capacity and performance analysis of suameCapacity and performance analysis of suame
Capacity and performance analysis of suame
eSAT Publishing House
 
Brain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filterBrain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filter
eSAT Publishing House
 
Analysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by femAnalysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by fem
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Simulation of convolutional encoder
Simulation of convolutional encoderSimulation of convolutional encoder
Simulation of convolutional encoder
eSAT Publishing House
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysis
eSAT Publishing House
 
Study of in filter phosphorus removal mechanisms in an
Study of in filter phosphorus removal mechanisms in anStudy of in filter phosphorus removal mechanisms in an
Study of in filter phosphorus removal mechanisms in an
eSAT Publishing House
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
eSAT Publishing House
 
Determinants of productivity improvement –
Determinants of productivity improvement –Determinants of productivity improvement –
Determinants of productivity improvement –
eSAT Publishing House
 
Detection of chlorpyrifos pesticide in various water
Detection of chlorpyrifos pesticide in various waterDetection of chlorpyrifos pesticide in various water
Detection of chlorpyrifos pesticide in various water
eSAT Publishing House
 
Seismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings withSeismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings with
eSAT Publishing House
 
Biodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignitionBiodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignition
eSAT Publishing House
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-
eSAT Publishing House
 
An approach of composite materials in industrial
An approach of composite materials in industrialAn approach of composite materials in industrial
An approach of composite materials in industrial
eSAT Publishing House
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
 
Optical and surface properties of al doped ga2 o3 by
Optical and surface properties of al doped ga2 o3 byOptical and surface properties of al doped ga2 o3 by
Optical and surface properties of al doped ga2 o3 by
eSAT Publishing House
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...
eSAT Publishing House
 
Fault identification in transformer winding
Fault identification in transformer windingFault identification in transformer winding
Fault identification in transformer winding
eSAT Publishing House
 
Index and engineering properties of spent wash blended soils a comparative s...
Index and engineering properties of spent wash blended soils  a comparative s...Index and engineering properties of spent wash blended soils  a comparative s...
Index and engineering properties of spent wash blended soils a comparative s...
eSAT Publishing House
 
Study of bad block management and wear leveling in
Study of bad block management and wear leveling inStudy of bad block management and wear leveling in
Study of bad block management and wear leveling in
eSAT Publishing House
 
Capacity and performance analysis of suame
Capacity and performance analysis of suameCapacity and performance analysis of suame
Capacity and performance analysis of suame
eSAT Publishing House
 
Brain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filterBrain tumor pattern recognition using correlation filter
Brain tumor pattern recognition using correlation filter
eSAT Publishing House
 
Analysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by femAnalysis of grading techniques in xlpe cable insulation by fem
Analysis of grading techniques in xlpe cable insulation by fem
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysis
eSAT Publishing House
 
Study of in filter phosphorus removal mechanisms in an
Study of in filter phosphorus removal mechanisms in anStudy of in filter phosphorus removal mechanisms in an
Study of in filter phosphorus removal mechanisms in an
eSAT Publishing House
 
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
Analysis of mhd non darcian boundary layer flow and heat transfer over an exp...
eSAT Publishing House
 
Determinants of productivity improvement –
Determinants of productivity improvement –Determinants of productivity improvement –
Determinants of productivity improvement –
eSAT Publishing House
 
Detection of chlorpyrifos pesticide in various water
Detection of chlorpyrifos pesticide in various waterDetection of chlorpyrifos pesticide in various water
Detection of chlorpyrifos pesticide in various water
eSAT Publishing House
 
Seismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings withSeismic evaluation of rc framed buildings with
Seismic evaluation of rc framed buildings with
eSAT Publishing House
 
Biodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignitionBiodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignition
eSAT Publishing House
 
Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-Comparative analysis of singularities of 3 prs and 3-
Comparative analysis of singularities of 3 prs and 3-
eSAT Publishing House
 
An approach of composite materials in industrial
An approach of composite materials in industrialAn approach of composite materials in industrial
An approach of composite materials in industrial
eSAT Publishing House
 
Privacy preservation techniques in data mining
Privacy preservation techniques in data miningPrivacy preservation techniques in data mining
Privacy preservation techniques in data mining
eSAT Publishing House
 
Optical and surface properties of al doped ga2 o3 by
Optical and surface properties of al doped ga2 o3 byOptical and surface properties of al doped ga2 o3 by
Optical and surface properties of al doped ga2 o3 by
eSAT Publishing House
 
Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...Identification of isomorphism and detection of distinct mechanism of kinemati...
Identification of isomorphism and detection of distinct mechanism of kinemati...
eSAT Publishing House
 
Fault identification in transformer winding
Fault identification in transformer windingFault identification in transformer winding
Fault identification in transformer winding
eSAT Publishing House
 
Index and engineering properties of spent wash blended soils a comparative s...
Index and engineering properties of spent wash blended soils  a comparative s...Index and engineering properties of spent wash blended soils  a comparative s...
Index and engineering properties of spent wash blended soils a comparative s...
eSAT Publishing House
 
Ad

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
eSAT Publishing House
 
Ad

Recently uploaded (20)

Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
PYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptxPYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptx
rmvigram
 
ldr darkness sensor circuit.pptx for engineers
ldr darkness sensor circuit.pptx for engineersldr darkness sensor circuit.pptx for engineers
ldr darkness sensor circuit.pptx for engineers
PravalikaChidurala
 
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
Jimmy Lai
 
Understand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panelUnderstand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panel
NaveenBotsa
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Espresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptxEspresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptx
NingChacha1
 
A Study of Bank Line Shifting of the Selected Reach of Jamuna River Using Mul...
A Study of Bank Line Shifting of the Selected Reach of Jamuna River Using Mul...A Study of Bank Line Shifting of the Selected Reach of Jamuna River Using Mul...
A Study of Bank Line Shifting of the Selected Reach of Jamuna River Using Mul...
Journal of Soft Computing in Civil Engineering
 
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
22PCOAM16 ML Unit 3 Full notes PDF & QB.pdf
Guru Nanak Technical Institutions
 
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdfWHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
Floyd Burgess
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
Guru Nanak Technical Institutions
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
22PCOAM16_MACHINE_LEARNING_UNIT_IV_NOTES_with_QB
22PCOAM16_MACHINE_LEARNING_UNIT_IV_NOTES_with_QB22PCOAM16_MACHINE_LEARNING_UNIT_IV_NOTES_with_QB
22PCOAM16_MACHINE_LEARNING_UNIT_IV_NOTES_with_QB
Guru Nanak Technical Institutions
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Python Functions, Modules and Packages
Python Functions, Modules and PackagesPython Functions, Modules and Packages
Python Functions, Modules and Packages
Dr. A. B. Shinde
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
PYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptxPYTHON--QUIZ-1_20250422_002514_0000.pptx
PYTHON--QUIZ-1_20250422_002514_0000.pptx
rmvigram
 
ldr darkness sensor circuit.pptx for engineers
ldr darkness sensor circuit.pptx for engineersldr darkness sensor circuit.pptx for engineers
ldr darkness sensor circuit.pptx for engineers
PravalikaChidurala
 
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
[PyCon US 2025] Scaling the Mountain_ A Framework for Tackling Large-Scale Te...
Jimmy Lai
 
Understand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panelUnderstand water laser communication using Arduino laser and solar panel
Understand water laser communication using Arduino laser and solar panel
NaveenBotsa
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Espresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptxEspresso PD Official MP_eng Version.pptx
Espresso PD Official MP_eng Version.pptx
NingChacha1
 
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdfWHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
WHITE PAPER-Best Practices in Syngas Plant Optimization.pdf
Floyd Burgess
 
Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)Introduction to Additive Manufacturing(3D printing)
Introduction to Additive Manufacturing(3D printing)
vijimech408
 
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx22PCOAM16 Unit 3 Session 23  Different ways to Combine Classifiers.pptx
22PCOAM16 Unit 3 Session 23 Different ways to Combine Classifiers.pptx
Guru Nanak Technical Institutions
 
vtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdfvtc2018fall_otfs_tutorial_presentation_1.pdf
vtc2018fall_otfs_tutorial_presentation_1.pdf
RaghavaGD1
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
AI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in RetailAI-Powered Data Management and Governance in Retail
AI-Powered Data Management and Governance in Retail
IJDKP
 
Zeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdfZeiss-Ultra-Optimeter metrology subject.pdf
Zeiss-Ultra-Optimeter metrology subject.pdf
Saikumar174642
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Python Functions, Modules and Packages
Python Functions, Modules and PackagesPython Functions, Modules and Packages
Python Functions, Modules and Packages
Dr. A. B. Shinde
 

Malicious attack detection and prevention in ad hoc network based on real time operating system environment

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1043 MALICIOUS ATTACK DETECTION AND PREVENTION IN AD HOC NETWORK BASED ON REAL TIME OPERATING SYSTEM ENVIRONMENT JITHESH PUTHENKOVILAKAM M-Tech Student, Electrical and Electronics Department, Amrita School of Engineering, Tamil Nadu, India, [email protected] Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network. Index Terms: An algorithm to detect worm hole attack in a wireless network… -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION An ad-hoc network is a decentralized wireless network in which each node can participate in routing by forwarding data to other nodes .A wireless network uses radio waves instead of cables to relay information to and from your computer. There is less need for technical support in setting up due to their simple nature .Even though the wireless networking provides many advantages, but it is also prone to many security threats which can potentially alter organization’s overall information security risk profile. The reason is that in many organizations the security information flows through the wireless network .The worm hole attack is one of the those security threats. The proposed algorithm for worm hole attack detection and prevention can provide better understanding to a designer in setting up wireless networks which have high productivity with fewer security risks. The ad-hoc network which is free from worm hole attack will have the capacity to avoid unauthorized intrusions to a wireless network. The wormhole attack is one of the severe malicious attacks, happening in the ad-hoc network .The two nodes in any end points in the network form a tunnel, known as worm hole tunnel. In this attack two existing nodes become malicious or two node can intrude into any point in the network and create worm hole link. These nodes are called worm hole nodes. In the wormhole attack, a worm hole node copies packets at one location in the network, tunnels them to another location through the another worm hole node. These packets can be retransmitted into the network or captured, depends on the intention of the attacker who establishes this attack. The wormhole attack is very powerful, and preventing the attack is very difficult because all the nodes between the worm hole link are shielded or got bypassed A strategic placement of this worm hole link can result in a significant breakdown in communication across a wireless network. In the optimized link state routing protocol (OLSR), if a wormhole attack is launched routing is easily disrupted because of the combined effect of two worm hole nodes. 2. RELATED WORKS In the paper by Farid Na¨ıt-Abdesselam[1] an efficient method is devised to detect and avoid wormhole attacks in the OLSR protocol. These methods first attempts to pinpoint links that may, potentially, be part of a wormhole tunnel. Then, a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbours (endpoints of the wormhole).The proposed solution exhibits several advantages, among which its non-reliance on any time synchronization or location information, and its high detection rate under various scenarios .In the paper by Shalini Jain, Dr.Satbir Jain[2] a novel trust-based scheme for identifying and isolating nodes that create a wormhole in the network without engaging any cryptographic means is presented. In the paper by Yih-Chun Hu [3] a general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and implementing leashes is presented.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1044 3. SYSTEM ARCHITECTURE A wireless network is set up using Zig Bee based on Optimized Link State Protocol Optimized Link State Protocol (OLSR) which is a proactive routing protocol, so the routes are always immediately available when needed. It is a proactive protocol which does not maintain the routing table even it does not want transmission. Proactive protocols produce higher routing efficiency than reactive protocol. It provides low single packet transmission latency. Routing table structure is the main data structure where all needed information about the routes is stored. The routing table has the information about next hop as well as predecessor node. Initially a wired network consists of five nodes, is established. The first node communicate with the second one through DB- 9 serial port connector, connected to the UART0 of ARM LPC2148..The UART1 of the second node communicate to the UART1 of the third node using another DB-9 connector and so on. The computer is used as fifth node.The handshaking messages traversed from node 4 are displayed on the hyper terminal of the computer which is the fifth node. 3.1 METHODOLOGY OLSR uses control messages: Hello .Hello messages are used for finding the information about the link status and the host’s neighbours. Each node in the network establishes bidirectional link with the neighbor node by transmitting and receiving Hello packet through single hop communication. The Hello packet contain information about source addresse,destination addresse,size of data message ,status of willingness.The typical hello message used here is “A008”.A is the source address .’0’ is the willingness bit.8 indicates the size of the data message transmitted in bits. Upon receiving the node sends back “A1B8”.Here willingness bit is changed to 1.B is the address of the second node. The wired network is changed to wireless network using Zig Bee. The Zigbee module is connected to the UART of ARM LPC2148 development board. Zigbee is a low power spin off of Wi-Fi. It is a specification for small, low power radios based on IEEE 802.15.4 – 2003 Wireless Personal Area Networks standard. ZigBee is a wireless technology developed as an open global standard to address the unique needs of low- cost, low-power wireless M2M networks. The ZigBee standard operates on the IEEE 802.15.4 physical radio specification and operates in unlicensed bands including 2.4 GHz, 900 MHz and 868 MHz. The each ZigBee module is configured using X-CTU software before connecting to the node. 3.2 WORM HOLE ATTACK IN WIRELESS NETWORK A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location Figure 1 System Flow Diagram The wormhole attack is very powerful, and preventing the attack has proven to be very difficult. A strategic placement of the wormhole can result in a significant breakdown in communication across a wireless network. In such attacks two or more malicious colluding nodes create a higher-level virtual tunnel in the network, which is employed to transport packets between the tunnel endpoints. In this paper, we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocol. This method have detecting suspicious link and verification procedure The proposed solution exhibits several advantages, among which its non-reliance on any time synchronization or location information, and its high detection rate under various scenarios. We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. To launch a wormhole attack, an adversary establishes a direct link referred as wormhole link between two points in the network. A direct link can be established via a wire line, a long-range wireless transmission, or an optical link. Once the wormhole link is operational, the adversary eavesdrop messages at one end, referred as the origin point, tunnels them through the wormhole link and replays them in a timely fashion at the other end, referred as the destination point. In the wormhole model, it is assumed that the adversary does not compromise the integrity and authenticity of the communication, and any cryptographic quantity remains secret. 4 DESIGN OF WORM HOLE DTECTION AND PREVENTION ALGORITHM An algorithm for detecting and preventing the worm hole attack in wireless network and preventing the same is designed. Wormhole attacks are severe attacks that can be easily launched even in networks with confidentiality and
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1045 authenticity. The malicious nodes usually target the routing control messages that are related to the topology information or routing information. In this paper, we have presented an effective method for detecting and preventing wormhole attacks in OLSR. The proposed solution is an easy-to-deploy solution. It does not require any complex computation or special hardware. The performance of this approach shows high detection rate under various scenarios. 4.1 ALGORITHM After network is set up data transmission is to be done. Each node has to store the details of immediate successor and predecessor nodes .When each node receives data succesfully,it has to send acknowledgement back to the predecessor within the time constraints.Store the details of all active nodes in the first node. Make node 2 and 4 worm hole nodes by creating a link between 2 and 4 Figure 2 Event Flow Diagrams The data transmission is started from node1.The node 3 and node 4 receives data from node 2.The node 4 forwards to node5.The node 3 receives data and sends to node 4.The node 4 does not respond to it as it is part of worm hole link. Within the time limits, Node 3 does not receive the acknowledgement from Node 4. It sends the information to Node 1 The Node 1 put successor node status as malicious. In the verification procedure, node 1sends probe packets to node2,4 and 5.From the response it confirms that worm hole link is established between 2 and 4.Node 2 and 4 is removed from the network by changing the link.The successful data transmission is done through node 1,3 and 5 5. EXPERIMENTAL SET UP The hardware required for the wired network based on the OLSR is four ARM LPC2148 development boards and one personal computer, and DB-9 connectors. The hardware implementation of wireless network with worm hole detection and prevention include LPC ARM 2148 micro controller and Zig Bee. The network consists of five nodes, out of which four are ARM micro controllers and one is computer. The Zig Bee attached to each microcontroller act as transmitter as well as receiver. Upon setting up of bidirectional link successfully, a led on each node should blink. After this, data is transmitted from source to destination. The computer at the destination will have to display the received data. Afterwards node 2 and node 4 are made malicious. The worm hole detection algorithm executes after which isolate and monitor the worm hole link. This should prevent it and finally new network is established which is free from worm hole attack. Figure 3: Zig Bee board Figure 4 ARM LPC2148 DEVELOPMENT BOARD 6 PORTING ON RTOS MicroC/OS-II (commonly termed as uC/OS-II), is a low-cost priority based pre-emptive real time multitasking operating system kernel for microprocessors, written mainly in the C programming language. It is mainly intended for use in embedded systems. uC/OS-II stands for Micro-Controller Operating System Version 2. The uC/OS-II is a highly portable, scalable, preemptive, real-time, multitasking kernel specifically designed for embedded applications Porting is the process of writing the application code intended for a target on a specific OS or an RTOS. In classical definition porting is defined as “The process of adapting a Software so that an executable program can be created for a computing environment that is different from the one for which it was originally designed for”. For the port of uC/OS-II
  • 4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 1046 to any target embedded platform we first need the uC/OS-II kernel, which is CPU independent. For any port this kernel will be the same. Now the CPU specific code for the corresponding embedded platform used is needed. The third requirement is the BSP corresponding to the board carrying the microcontroller or microprocessor. The code written in c for worm hole detection and prevention is ported on uC/OS-II and built into ARMLPC 2148 development board. The priorities are set for various tasks required to set up the ad-hoc network, introduce worm hole attack, detect and prevent it. Figure 5 Code required for uC/OS-II Porting CONCLUSIONS The proposed algorithm used for implementing this project is developed keeping in mind the fact that it can provide better understanding to a designer in setting up wireless networks which have high productivity with fewer security risks. The wireless networking provides many advantages, but it is also coupled with new security threats which can potentially alter organization’s overall information security risk profile. Properly enhanced, this developed system will have the capacity to avoid unauthorized intrusions to a wireless network. ACKNOWLEDGEMENTS Author gratefully acknowledges the facilities available at the Amrita school of engineering, Coimbatore, sincerely thanks to my guide Dr.Madhu and Mr. Anu Kumar for helping me in theoretical and practical section. REFERENCES: [1]Issa Khalil, SaurabhBagchi & Ness B. Shroff, “LITEWORP: Detection and Isolation of the Wormhole Attack in Static MultihopWireless Networks”. The International Journal of Computer and Telecommunications Networking, Vol. 51, Issue 13, pp 3750- 3772, 2007 [2] Issah Khalil, “Mitigation of Control and data traffic attacks in wireless ad-hoc and sensor networks” IEEE Vol. 6, Issue 3, pp 344-362 [3]Sun Choi, Doo-young Kim, Do-hyeon Lee &Jae-il Jung “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks” IEEE International Conference on Sensor Networks,Ubiquitous, and Trustworthy Computing SUTC’08.pp 343- 348,2008 [4] Y.C. Hu, A. Perrig, and D.B. Johnson, “Wormhole Attacks in WirelessNetworks,” In IEEE JSAC, Vol. 24, No. 2, pp. 370-380,2006 BIOGRAPHIES Jithesh Puthenkovilakam is a student at at the Amrita University at Coimbatore and presently doing Master Of Technology in Embedded System. He received the BTech .Degree in Electrical and Electronics Engineering from the Kannur University .Post that he worked as a software Engineer .He was involved in avionics and automotive projects as a low level designer and programmer. In his thesis work at Amrita School of Engineering, he focused on security and performance in wireless ad hoc networks and malicious attacks. His research interests include systems and network security.