This document proposes a novel method called Basil's Numbering Scheme (BNS) to overcome denial-of-service (DoS) attacks in Wi-Fi networks. In a BNS, the source node checks if communicating nodes are authorized using an Intruder Check Table. For suspicious packets, BNS redirects them and asks the user to enter a custom initial sequence number rather than a random one. This makes it difficult for hackers to predict sequence numbers and launch MAC spoofing attacks. Simulations show that under DoS attack, BNS improves throughput to near 100% and reduces packet loss compared to no security method.
Wireless Disassociation and Deauthentication AttacksDavid Sweigert
This document proposes a lightweight solution called the "Letter-envelop protocol" to defend against deauthentication/disassociation attacks on 802.11 wireless networks. The protocol uses a one-way hard function based on prime factorization to authenticate management frames. When a device wants to disconnect, it sends the frame along with a "letter" that divides the previously exchanged "envelope" number, proving its identity. The protocol modifies the association process to exchange envelopes without requiring new cryptographic capabilities from legacy devices. Experimental results show the protocol effectively prevents spoofing of disconnect frames.
Hybrid Technique for Detection of Denial of Service (DOS) Attack in Wireless ...Eswar Publications
Wireless Sensor Network (WSNs) are deployed at aggressive environments which are vulnerable to various security attacks such as Wormholes, Denial of Attacks and Sybil Attacks. There are various intrusion detection techniques that are used to identify attacks in a network with high accuracy level. This paper has focused on Denial of Service attack, since it is the most common attack that affects the environment severely. Therefore a new hybrid technique combining Hidden Markov Model with Ant Colony Optimization (HMM+ACO) has been
proposed that gives improved performance than the other techniques.
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
This document discusses secure routing in ad hoc networks and various attacks. It begins with an abstract that introduces the need for secure and efficient communication protocols in ad hoc wireless networks. It then discusses types of attacks like external vs internal and passive vs active attacks. It reviews various routing protocols for mobile ad hoc networks like proactive, reactive, and hybrid protocols. It also discusses security issues in ad hoc networks and security requirements like confidentiality, authentication, integrity, availability, and non-repudiation. Finally, it discusses security mechanisms needed to address these security requirements.
IRJET- The Hidden Virus Propagation Search Engine AttackIRJET Journal
1) The document discusses virus propagation through search engines, even when nodes and communities are not directly connected in social networks. It refers to this as the "propagation wormhole effect".
2) It proposes analyzing how search engines increase the number of infection sources and routes to better understand this phenomenon.
3) It describes modules for a search engine, detecting unofficial links spreading viruses, and analyzing virus propagation paths and affected nodes using the search engine.
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
This document summarizes a survey on distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). It begins by introducing MANETs and some of the key security issues they face, including DDoS attacks. It then discusses different types of DDoS attacks like flooding and amplification/reflection attacks. The document proposes a new defense scheme against amplification attacks, which exploit protocols like DNS and NTP to amplify traffic. It describes using the Network Security Simulator to model and simulate DDoS attacks with master, zombie, and server entities to evaluate defense techniques and compare the impact of protocols like DNS and NTP.
A Novel Multipoint Relay based Secure Routing in MANETIJNSA Journal
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
This document summarizes a research paper that proposes an energy efficient certificate revocation scheme (EECCRVC) for secure communications in mobile ad hoc networks. The scheme aims to both revoke intruder certificates to exclude them from the network and utilize node energy effectively. It adopts a certificate revocation scheme (CCRVC) that deals with false accusations while outperforming other techniques in revoking intruder certificates. The scheme also enhances reliability and accuracy by promptly vindicating warned nodes based on a threshold mechanism. Experimental results using the NS-2 simulator show that the proposed EECCRVC scheme provides secure communications with effective energy utilization in mobile ad hoc networks.
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wirele...IRJET Journal
This document discusses a self-adaptive automatch protocol for batch identification in wireless mobile networks. It proposes two algorithms, Condensed Binary Identification (CBI) and Multiple Rounds Identification (MRI), to improve the performance of identifying invalid signatures when batch verification fails at the receiver or sink node. The system forms nodes, transmits encrypted messages through intermediate nodes which may include attackers, and uses the sink node to perform batch verification and identify invalid signatures using the most suitable identification algorithm based on the transaction history of attackers.
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
1) The document discusses detection and prevention of denial of service (DoS) attacks in mobile ad-hoc networks.
2) It focuses on identifying malicious nodes that conduct traffic jamming attacks by disrupting communication.
3) The proposed approach detects malicious nodes using a reliability value determined by broadcast reliability packets, where nodes that don't respond in a set time have their reliability value decreased until it reaches below zero, identifying them as malicious.
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
This document proposes a secure method for the Ad Hoc On-Demand Distance Vector (AODV) routing protocol to detect wormhole attacks in mobile ad hoc networks. The proposed method uses nested authentication technique (NMAC) and key pre-distribution to authenticate routing messages and secure packet transmissions. NMAC requires two keys selected based on the hop count value in control packets. At each node, the message digest is recalculated using the new hop count value and compared to the received digest to authenticate the message. The key pre-distribution technique aims to minimize overhead by sharing keys dependent on hop counts. The method aims to efficiently detect and prevent wormhole attacks on AODV routing in MANETs with low processing overhead.
Elimination of Malicious Node by using Clustering Technique in Mobile Ad Hoc ...IRJET Journal
This document discusses techniques for eliminating malicious nodes in mobile ad hoc networks (MANETs) through clustering. Specifically, it proposes finding a single trusted cluster head node based on both transmission range and highest energy, rather than just highest energy, in order to avoid selecting malicious nodes as cluster heads. The proposed approach is tested through simulation in NS2, showing improved network performance compared to existing techniques. Distributed denial of service (DDoS) attacks pose a challenge in MANETs due to their open nature, and trust-based routing protocols have been developed to help mitigate such attacks by identifying malicious or untrusted nodes.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Design and implementation of secured agent based NoC using shortest path rout...IJECEIAES
Network on chip (NoC) is a scalable interconnection architecture for every increasing communication demand between many processing cores in system on chip design. Reliability aspects are becoming an important issue in fault tolerant architecture. Hence there is a demand for fault tolerant Agent architecture with suitable routing algorithm which plays a vital role in order to enhance the NoC performance. The proposed fault tolerant Agent based NoC method is used to enhance the reliability and performance of the Multiprocessor System on Chip (MPSoC) design against faulty links and nodes. These agents are placed in hierarchical manner to collect, process, classify and distribute different fault information related to the faulty links and nodes of the network. This fault information is used for further packet routing in the network with the help of shortest path routing algorithm. In addition to this the agent will provide the security for the node by setting firewall, which then decides whether the packet has to be processed or not. This intern provides high performance, low latency NoC by avoiding deadlock and live lock with low area overhead.
Mitigation of Selfish Node Attacks In Autoconfiguration of MANETsIJAAS Team
Mobile ad-hoc networks (MANETs) are composed of mobile nodes connected by wireless links without using any pre-existent infrastructure. Hence the assigning of unique IP address to the incoming node becomes difficult. There are various dynamic auto configuration protocols available to assign IP address to the incoming nodes including grid based protocol which assigns IP address with less delay and low protocol overhead. Such protocols get affected by presence of either selfish nodes or malicious nodes. Moreover there is no centralized approach to defend against these threats like in wired network such as firewall, intrusion detection system, proxy etc. The selfish nodes are the nodes which receive packet destined to it and drop packet destined to other nodes in order to save its energy and resources. This behavior of nodes affects normal functioning of auto configuration protocol. Many algorithms are available to isolate selfish nodes but they do not deal with presence of false alarm and protocol overhead. And also there are certain algorithms which use complex formulae and tedious mathematical calculations. The proposed algorithm in this paper helps to overcome the attack of selfish nodes effect in an efficient and scalable address auto configuration protocol that automatically configures a network by assigning unique IP addresses to all nodes with a very low protocol overhead, minimal address acquisition delay and computational overhead.
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...IJCNCJournal
Flooding attack is a network attack that sends a large amount of traffic to the victim networks or services to cause denial-of-service. In Software-Defined Networking (SDN) environment, this attack might not only breach the hosts and services but also the SDN controller. Besides, it will also cause a disconnection of links between the controller and the switches. Thus, an effective detection and mitigation technique of flooding attacks is required. Statistical analysis techniques are widely used for the detection and mitigation of flooding attacks. However, the effectiveness of these techniques strongly depends on the defined threshold. Defining the static threshold is a tedious job and most of the time produces a high false positive alarm .In this paper, we proposed the dynamic threshold which is calculated using modified adaptive threshold algorithm (MATA). The original ATA is based on the Exponential Weighted Moving Average (EWMA) formula which produces the high number of false alarms. To reduce the false alarms, the alarm signal will only be generated after a minimum number of consecutive violations of the threshold. This, however, has increased the false negative rate when the network is under attack. In order to reduce this false negative rate, MATA adapted the baseline traffic info of the network infrastructure. The comparative analysis of MATA and ATA are performed through the measurement of false negative rate, and accuracy of detection rate. Our experimental results show that MATA is able to reduce false negative rates up to 17.74% and increase the detection accuracy of 16.11%over the various types of flooding attacks at the transport layer.
IRJET- Reliable Data Transmission in Wireless Network using Secure Trust ...IRJET Journal
This document proposes an Authenticated Anonymous Secure Routing (AASR) scheme to ensure reliable data transmission in wireless networks even against advanced attacks like false trust reporting or compromised node attacks. The AASR scheme improves routing performance by avoiding malicious nodes, isolating false trust information through a weight function, and considering both nodal and directional trust to select more reliable routing paths. Simulation results show AASR provides better performance than existing ATR and SPR schemes in dealing with Byzantine and compromised node attacks.
The IEEE 802.15.4 standard is used in networks that entail wireless technology within short distances and low traffic of exchange messages. This type of network is an approach of the Low Rate Wireless Personal Area Network (LR-WPAN) that provides the description for a physical layer (PHY) and media access control (MAC). There are four security services to protect the exchange of data and control frames in the IEEE 802.15.4. The MAC layer in IEEE 802.15.4 allows association devices to disconnect within the network. It also allows the coordinator PAN to run the disassociation process by imposing the associated device disconnection within the network. However, one of the challenges the disassociation process faces is DoS attacks, which impact the services of the network. Therefore, this paper aims at improving security through a review and analysis of the procedure of the disassociation process and identify the shortcomings of the security. The main result is to identify a new possible attack against the disassociation process. The attacker can impersonate either the coordinator PAN or the associated device to execute this potential attack. The implementation of the potential attack in the Castalia tool using the OMNET++ environment is explained and discussed in the results.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A two tier approach for preventing black hole attack and improving efficiencyeSAT Journals
Abstract One of the most emerging and trending in the field of networking is secure routing to overcome many hindrances that are occurring in day to day lives. Thus providing efficient mechanisms for such networks is the most challenging one. MANET’s (Mobile Adhoc Networks) are a combination of several independent nodes without any fixed infrastructure, dynamic topology, battery constraints, and lack of centralized mechanism, because of its architecture/outlier they are more vulnerable to various kinds of passive and active attacks, such as black hole attack, grey hole attack, wormhole attack. Providing/Implementing a multi tier/two tier security mechanism helps in elevating such kinds of active attacks to some extent. Keywords: Black Hole attack, MANET, Clustering, Encryption.
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
This document presents a technique for classifying network traffic and detecting unknown flows in wireless sensor networks. The technique aims to improve on previous work by using fewer labeled training samples and investigating flow correlation in real-world network environments. It proposes a method that selects a sender and receiver node, establishes a path between them by avoiding faulty nodes, and evaluates the system based on propagation rate, training purity, and accuracy. The results show the proposed method achieves higher propagation rate, training purity, and overall accuracy compared to an existing semi-supervised technique.
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
This document discusses software defined networks (SDNs) and detecting distributed denial-of-service (DDoS) attacks in SDNs. It provides background on SDN architecture and how DDoS attacks work. The paper aims to address risks of DDoS attacks in SDNs and focuses on detection. It describes existing DDoS attack techniques and solutions. The document proposes using algorithms like TCM-KNN and DPTCM-KNN for detection of attacks in network traffic flows, and compares the two algorithms using parameters like packet length and response time.
A Survey on Black Hole & Gray Hole Attacks Detection Scheme for Vehicular Ad-...IRJET Journal
This document discusses security threats in vehicular ad hoc networks (VANETs) called black hole attacks and gray hole attacks. It begins with an introduction to VANETs and the types of attacks they face, including impersonation attacks, denial-of-service attacks, and routing attacks such as worm hole attacks, black hole attacks, and gray hole attacks. Black hole attacks involve malicious nodes dropping all packets, while gray hole attacks involve selectively dropping packets. The document compares the impacts of black hole attacks and gray hole attacks, finding that black hole attacks result in more packet drops. It concludes that securing applications in VANETs is important for road safety, and future work is needed to better identify attacks and control malicious
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
This document summarizes various techniques that have been proposed for secure data transmission in mobile ad hoc networks in the face of security attacks. It discusses works that use techniques like self-protocol trustiness and the Dempster-Shafer theory to detect blackhole attacks. A dynamic forwarding window technique is described for detecting denial of service attacks in wireless sensor networks. The document also reviews improved CONFIDANT and other techniques for detecting grayhole, sinkhole, and jellyfish attacks on AODV routing. Cryptographic techniques including elliptic curve cryptography have also been proposed and evaluated for secure transmission and misbehavior detection in MANETs.
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
This document discusses securing the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol from wormhole attacks in mobile ad-hoc networks. It proposes using clustering to mitigate the effects of wormhole attacks. Wormhole attacks are powerful attacks in ad-hoc networks that involve tunneling network traffic between two colluding attackers. The document reviews related work on clustering algorithms, TCP and SYN cookies, security-enhanced RFID systems, wormhole detection algorithms, analyzing the impact of wormhole attacks, and new clustering protocols for mobile ad-hoc networks. It aims to simulate the effect of wormhole attacks on AODV and analyze network performance with and without such attacks using the NS2 network simulator.
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
This document discusses detecting black hole attacks in wireless sensor networks. It begins with an abstract that introduces black hole attacks as a security threat in mobile ad hoc networks (MANETs) where malicious nodes drop packets. The document then reviews previous work on defending against black hole attacks, including using trust values, dummy nodes, and sequence number verification. It proposes using a "preventor node" to create a secure environment and detect black hole attacks in MANETs to improve network performance and security.
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
This document discusses a proposed wireless sensor network system for border monitoring using clusters. Sensor nodes would be deployed randomly along the border to detect intruders. The nodes would be organized into clusters with cluster heads that form a virtual grid network. If a cluster head detects an inconsistency in border activity compared to expected states, it would inform neighboring nodes and the base station that a border breach has occurred. The system aims to enhance border security while reducing human presence through use of an autonomous wireless sensor network.
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
This document summarizes research on secure data aggregation protocols for wireless sensor networks. It first introduces wireless sensor networks and discusses how data aggregation can help reduce energy usage by aggregating sensor data as it travels towards a base station. However, data aggregation also presents security risks if sensor data is compromised. The document then reviews different types of attacks against wireless sensor networks, such as denial of service attacks and false data injection attacks. It also discusses security goals like data confidentiality, integrity, and availability. Several existing secure data aggregation protocols are then summarized, including techniques using public/private key cryptography and probabilistic encryption to securely aggregate and transmit sensor data while preventing attacks. The document concludes that security is an important challenge for data aggregation in wireless sensor
A Review on various Security Attacks in Mobile Adhoc NetworkIRJET Journal
This document reviews security attacks in mobile ad hoc networks (MANETs). It begins with an introduction to MANETs and their characteristics, such as self-configuration, decentralization, and lack of fixed infrastructure. It then discusses various types of security attacks against MANETs, including passive attacks (e.g. eavesdropping), active attacks (e.g. jamming), and attacks at different layers of the network such as the physical, data link, and routing layers. Examples of routing layer attacks include black hole attacks and wormhole attacks. Current secure routing protocols are also summarized and compared, such as SEAD, SAODV, ARAN, and SLSP. The document concludes with a discussion of
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
IRJET- Machine Learning based Network SecurityIRJET Journal
The document discusses using machine learning algorithms to classify network traffic as malicious or non-malicious. It describes capturing packets from a dummy website under distributed denial of service (DDoS) attack to create a dataset. Two machine learning algorithms, naive Bayes and support vector machines (SVM), are used to classify the network traffic. Both algorithms achieved over 98% accuracy in detecting spam traffic. The paper proposes creating a real-time network traffic classification system using machine learning algorithms to improve network security.
IRJET- Detection of Black Hole Attacks in AODV Routing Protocol in MANETIRJET Journal
This document discusses the detection of black hole attacks in the AODV routing protocol in mobile ad hoc networks (MANETs). It begins with an abstract that introduces black hole attacks and their impact on AODV. The body then provides details on MANETs and AODV routing, including how black hole attacks work by modifying routing packets. It evaluates the performance of AODV under black hole attacks based on metrics like throughput, delay, and overhead. Tables and graphs are presented comparing the performance of normal AODV routing to AODV with black hole attacks. The conclusion finds that minimizing packet loss can help reduce the impact of black hole attacks on AODV in certain scenarios.
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...IRJET Journal
This document proposes a hybrid algorithm to detect and eliminate wormhole attacks in wireless mesh networks. It describes how wormhole attacks work by establishing a tunnel between two malicious nodes. Most existing defenses are not secure against different types of wormhole attacks. The proposed algorithm aims to detect wormholes by calculating the neighbor list and directional neighbor list of the source node to approximate node locations and identify the effects of wormhole attacks. The performance is evaluated by varying the number of wormholes. The results show the algorithm is effective at detecting wormholes and its impact on the network.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical
locations where human intervention is not possible. The data transferred through the sensor nodes are majorly
used in crucial decision making process. Since WSN is a wireless infrastructure it tempts the attackers to
tamper/misuse the data. Privacy-preserving routing is important for some ad hoc networks that require stronger
privacy protection. Hence a routing protocol to achieve total unobservability by anonymous key establishment
using secret session keys and group signature is used. The unobservable routing protocol is divided into two
main phases. First phases define an anonymous key establishment process to construct secret session keys.
Second phase consist of unobservable route discovery process to find appropriate as well as secure route to the
destination. A node establishes a key with its direct neighbour and uses the same key to encrypt the packet
before transferring.
De-Authentication attack on wireless network 802.11i using Kali LinuxIRJET Journal
This document discusses conducting a de-authentication attack on a wireless network using Kali Linux. It begins by introducing de-authentication attacks and how they work by spoofing management frames to disconnect clients from access points. It then provides steps to implement a de-authentication attack, including putting the wireless card in monitor mode, packet capturing to find access points and clients, and using aireplay-ng to inject de-authentication frames to a specific client or all connected clients. The goal of the attack is to disrupt communication between the access point and wireless clients.
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
Routing in VANETs (pure ad hoc architectures) with dynamic nature of the network becomes a challenging task for finding and maintaining routes. So, detecting the misbehaving vehicles is an important task in for improving the efficiency of the vehicles and to incorporate the reliable and secure routing in the transport system. Due to the self -configure (mobility) characteristic of the VANETS, it is very difficult to the road side and base station units to keep track of the actions happening among the vehicles. Obviously the attackers will have the fraudulent nature that same will persist over time with them that will be effected to the normal vehicles which is travelling in the
network from the non trustworthy vehicles. So detection and proper action is needed to improve the efficient routing of the vehicles in the network. Earlier we have many techniques for detecting and preventing the misbehaving vehicles depending upon the threshold values, mobility factors, power ratios etc., now we are proposing a new technique called Bloom-Filter based IP Choke Mechanism for locating the harmful vehicle. In
this paper we will discuss about the proposed technique on how to identify the malicious vehicle and how to defend the attacked vehicle by blocking it form the routing process.
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
This document proposes a new secure routing technique for wireless mesh networks using unmanned aerial vehicles. The technique uses encryption algorithms like Data Encryption Standard and neural networks to establish a secure routing algorithm. It generates unique IDs for nodes, uses a key distribution center for authentication, and implements encryption to prevent attacks. Simulation results show the proposed approach reduces delay and improves packet delivery rate compared to existing routing protocols like PASER when there is frame error.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
Similar to Novel Method to Overcome Vulnerability in Wi-Fi Network (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.