A collection of wireless nodes which exchange various information among each other through wireless links as per the coverage boundary, directly or with the support of midway nodes as routers called infrastructure less in ADHOC networks. The Mac 802.11 wireless standard supports multiple data rates at the physical layer. Wireless network is dynamic because of frequent changes take place inside the topology due to mobility or energy loss. Accordingly any node can join or else leave the network in order to that changes in membership causes trust relationship among nodes is a big issue. During this circumstances security is the main concern in AD HOC networks. The existing protocols are inadequate to discover various types of threats. To overcome this problem designing a new routing protocol to provide solution for detecting and preventing nodes from security threats. Our proposed network security protocol includes with Intrusion detection system. It observe the network traffics and trying to investigate the misbehave activities like attackers, wormhole, anomalies, failure, channel blocked success plus other anonymous behavior in network and maintenance. We implement this algorithm using network simulator [ns-2].The performance of the protocol is measured using packet delivery ratio, Avg end-to-end delay, routing overhead and throughput General TermsSecure protocol, attacks, malicious and wireless nodes Keywords
Safe operation of elements of power systems plays a crucial role in maintaining the reliability and safety of the system. Transformers being a key element in power systems need to be maintained and monitored on a regular basis. Dissolved gas analysis 978-1-4799-6432-1114/$31.00
ABSTRACT:Transformers being a key element in power systems need to be maintained and monitored on a regular basis. Dissolved Gas Analysis (DGA) has been used as a reliable tool in maintaining the safe operation of transformers for a long time. In this paper, genetic algorithm based back propagation neural network (GA -ANN) has been proposed for analyzing Dissolved Gases in Transformer Oil. The proposed approach utilizes a hybrid algorithm that integrates genetic algorithm and the back propagation neural network. The GA-based weight optimization during training of an ANN is employed to improve diagnostic accuracy. The primary motivation for the work is to provide a platform for analysis of dissolved gases to help in the early detection and diagnosis of transformer faults. This work is carried out with assistance from with Andhra Pradesh State Transmission Corporation (APTRANSCO) in the form of required transformer analysis data and expert opinion for validation of the tool.
Mobile Ad hoc Network (MANET) is assembled as a self-organized network with mobile nodes with a dynamic infrastructure. Designing of secure routing protocols is very difficult because of its characteristics. Moreover, protocols are designed with assumption of no malicious or selfish nodes in network. Hence, to design robust and secured routing protocols several effects made from researchers. In this paper, review on literature survey on basic secure routing protocols presented. The survey is categorized to Basic Routing Security Schemes, Trust-Based Routing Schemes, Incentive-base schemes, Schemes which employ detection and isolation mechanisms.
Wormhole attacks in Mobile ad hoc networks is impermeable to traditional security measures. The attack can be launched regardless of the MAC, routing, or security protocol used in the network. Two or more malicious nodes in conspiracy usually perform the wormhole attack. Two malicious nodes at different locations send received routing messages to each other via a secrete channel. In this way, although the two malicious nodes are located far from each other, they appear to be within one-hop communications range. Wormhole nodes can successfully execute such attacks without compromising any computer, and are inevitable even though some ad hoc wireless networks provide authenticity and confidentiality protection. Practically all widespread security extensions are proposed for popular routing protocols but they do not alleviate wormhole attacks. However, since wormhole attack such a severe thread to MANET security. In this situation wormhole attack methodology presented is motivated by WARP and the same procedure and terminology is used but slight modification In this work wormhole attack is detected and eliminated by simply modifying AODV routing protocol and its performance is measured.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.