Abstr act. An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wireless networks is to compare the performances of different solutions using simulation results. However, variance in multiple configuration aspects including that due to different underlying routing protocols, makes the task of simulation based comparative evaluation of IDS solutions somewhat unrealistic. In stead, the authors have followed an analytic approach to identify the gaps in the existing IDS solutions for MANETs and wireless mesh networks. The paper aims to ease the job of a new researcher by exposing him to the state of the art research issues on IDS. Nearly 80% of the works cited in this paper are published with in last 3 to 4 years.
Abstract. Multi-path routing protocols are used for different types of wireless networks primarily to enhance reliability of packet delivery. The frequency of route discovery is also less for multi-path routing protocols as these are more fault-tolerant. However, the overhead of route discovery in terms of congestion and energy requirement is much higher for multi-path routing as compared to single-path routing. In this paper, a restricted multi-path routing algorithm has been proposed that dynamically selects the number of neighboring nodes through which packets would be transmitted. The selection and degree of multipath depends on multiple factors like the remaining energy of the node, trust value of that node, number of already existing paths through that node etc. The protocol is designed in such a way, that the burden of routing is lower on the weaker nodes and the nodes with more resources will have to perform more tasks. Consequently, the lifetime of the network would be higher as compared to multi-path routing protocols. Besides, the data reception rate, defined as the ratio of the total number of packets received by the sink node and the total number of packets sent by the source node, is much higher for the proposed protocol than any single path routing. While the routing load is balanced among the nodes, the multiple routes also increase the reliability.
Abstract-Smart Grid is an integrated power grid with a. reliable, communication network running in parallel towards providing two way communications in the grid. It's trivial to mention that a network like this would connect a huge number of IP-enabled devices. IPv6 that offers 18-bit address space becomes an obvious choice in this context. In a smart grid, functionalities like neighborhood discovery, autonomic address configuration of a node or its router identification may often be invoked whenever newer equipments are introduced for capacity enhancement at some level of hierarchy. In IPv6, these basic functionalities like neighborhood discovery, autonomic address configuration of networking require to use Internet Control Message Protocol version 6 (ICMPv6). Such usage may lead to security breaches in the grid as a result of possible abuses of ICMPv6 protocol. In this paper, some potential newer attacks on Smart Grid have been discussed. Subsequently, intrusion prevention mechanisms for these attacks are proposed to plugin the threats.
Part 4: Engineering of Enterprise Software ProductsInternational audienceTraffic engineering governs the operational performance of a network and its optimization. Splitting the network traffic using multipath routing is one of the standard techniques of traffic engineering. Multipath routing maximizes network resource utilization and throughput by giving nodes a choice of next hops for the same destination along with minimizing the delay. On the other hand, Opportunistic routing minimizes operational cost and the burden of redundant route maintenance by using a constrained redundancy in route selection. POMSec: Pseudo Opportunistic, Multipath Secure routing is one such algorithm that combines the advantages of both the routing methods and additionally implements an underlying trust model to secure the communication in Smart Grid
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.