Conference PaperPDF Available

Survey and New Security methodology of Routing Protocol in AD-Hoc Network

Authors:
A preview of the PDF is not available
... The sheer volume of this data makes it difficult to store and analyze using standard visual approaches [11,12]. Data sets are heterogeneous in the sense that they include many various kinds of information, such as text, photos, audio, video, clickstreams, and log files [2,[12][13][14][15][16][17][18][19][26][27][28][29][30]. ...
... Data is collected in the HDFS after the suggested coding scheme has been applied, and then HADOOP files for HDFS are stored in batches. When a user requests data, the server will access encrypted data to perform the decryption, and the user can then recover the decrypted data using the private key [21][22][23][24][25][26][27][28][29][30]. ...
Article
Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-demand, and cost-effective collaboration options for consumers. Due to the increasing prevalence of hosted services, data security has become an increasingly critical concern. Hadoop, the engine at the heart of cloud computing, causes serious problems for the cloud. Any public, private, or hybrid cloud environment can use this security solution without any hassle (IaaS). Furthermore, it is compatible with the vast majority of Cloud computing's capabilities. Increase cloud security using NTRU encryption. This study made advantage of the (NTRUEncrypt) algorithms residing in Hadoop to speed up the file encryption and decryption processes. If HDFS is engaged in the Map Task, then HDFS will take care of both the encryption and decryption processes. Data on the cloud can be kept private and secure thanks to the proposed protection technique, which makes use of cryptography. Combining the proposed technique with preexisting infrastructure and web-based.
... Government intelligence services rely on personal, corporate and adverse government eavesdropping and competitive advantage systems. Most recent, highly publicized cyber-attacks against commercial attacks demonstrate this potential for damage, and government targets, it pays millions of dollars to these organizations and causes severe damage to the affected individuals and organizations (Kareem & Hussein, 2017). Furthermore, protection across cloud services is under its developing stage; a huge quantity about safety vulnerabilities would risk data in the cloud. ...
Article
Full-text available
The amount of data processed and stored in the cloud is growing dramatically. The traditional storage devices at both hardware and software levels cannot meet the requirement of the cloud. This fact motivates the need for a platform which can handle this problem. Hadoop is a deployed platform proposed to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data of the cloud system. Hadoop has no strategy to assure the safety and confidentiality of the files saved inside the Hadoop distributed File system (HDFS). In the cloud, the protection of sensitive data is a critical issue in which data encryption schemes plays avital rule. This research proposes a hybrid system between two well-known asymmetric key cryptosystems (RSA, and Paillier) to encrypt the files stored in HDFS. Thus before saving data in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in comparison to the RSA cryptosystem alone.
... Notwithstanding the effective computing solution and commercial benefits compared with cloud computing, users are very concerned about the protection and confidentiality of data collected and prepared in the cloud. Those safety concerns are affected by amazing protection opportunities such as insider threats, protection gap, and possible hackers (Shahab and Hussein, 2017). ...
Article
Full-text available
Developing a confident Hadoop essentially a cloud computing is an essential challenge as the cloud. The protection policy can be utilized during various cloud services such as Platform as a Service (PaaS), Infrastructure as a Service (IaaS), and Software as a Service (SaaS) and also can support most requirements in cloud computing. This event motivates the need of a policy which will control these challenges. Hadoop may be a used policy recommended to beat this big data problem which usually utilizes MapReduce design to arrange huge amounts of information of the cloud system. Hadoop has no policy to ensure the privacy and protection of the files saved within the Hadoop Distributed File System (HDFS). Within the cloud, the safety of sensitive data may be a significant problem within which encryption schemes play an avital rule. This paper proposes a hybrid method between pair well-known asymmetric key cryptosystems (RSA and Rabin) to cipher the files saved in HDFS. Therefore, before storing data in HDFS, the proposed cryptosystem is employed to cipher the information. In the proposed system, the user of the cloud might upload files in two ways, secure or non-secure. The hybrid method presents more powerful computational complexity and smaller latency as compared to the RSA cryptosystem alone.
... Government intelligence services rely on personal, corporate and adverse government eavesdropping and competitive advantage systems. Most recent, highly publicized cyber-attacks against commercial attacks demonstrate this potential for damage, and government targets, it pays millions of dollars to these organizations and causes severe damage to the affected individuals and organizations (Kareem & Hussein, 2017). Furthermore, protection across cloud services is under its developing stage; a huge quantity about safety vulnerabilities would risk data in the cloud. ...
Article
The amount of data processed and stored in the cloud is growing dramatically. The traditional storage devices at both hardware and software levels cannot meet the requirement of the cloud. This fact motivates the need for a platform which can handle this problem. Hadoop is a deployed platform proposed to overcome this big data problem which often uses MapReduce architecture to process vast amounts of data of the cloud system. Hadoop has no strategy to assure the safety and confidentiality of the files saved inside the Hadoop distributed File system (HDFS). In the cloud, the protection of sensitive data is a critical issue in which data encryption schemes plays avital rule. This research proposes a hybrid system between two well-known asymmetric key cryptosystems (RSA, and Paillier) to encrypt the files stored in HDFS. Thus before saving data in HDFS, the proposed cryptosystem is utilized for encrypting the data. Each user of the cloud might upload files in two ways, non-safe or secure. The hybrid system shows higher computational complexity and less latency in comparison to the RSA cryptosystem alone
Conference Paper
Full-text available
A Mobile Ad Hoc Network (MANET) is a group of wireless mobile nodes which dynamically form a network without any established infrastructure. The application is considered in an agro-based project and therefore, Routing protocols are mandatory to send and receive packets. In this paper, we have evaluated the most commonly used routing protocols in MANET and compared the performance of reactive routing protocols such as Dynamic Source Routing (DSR), Adhoc On-demand Distance Vector (AODV) and proactive routing protocols such as Geographic Routing Protocol (GRP), and Destination-Sequenced Distance Vector (DSDV) routing protocol by using OPNET simulator 17.5. The OPNET simulator is optimal for core level network design and parameters of sensor nodes are detailed enough to design a sensor network as the MANET in this paper. Analysis of the performance of protocols are certainly depending on End to End delay (average), Network Load and the throughput. These parameters are the common primary issues behind routing and sensor nodes in the MANET will coordinate themselves following these issues staying in an environment of proactive or reactive routing. The result shows that AODV performs better than the other two.
Conference Paper
Full-text available
An Ad-Hoc Wireless Network is a group of mobile, wireless nodes which cooperatively form a network independent of any fixed infrastructure or centralized administration. In this scenario, Network continuity is the ability of a network keeping connected under various attacks and failures, which is the most important issue in the design and performance of wireless ad hoc and sensor networks. Wireless Ad-hoc low-power networks are an exciting research direction in Network Durability, sensing and ubiquitous computing. The deployment of sensor networks in security and safety critical environments requires secure communication primitives. In this article, we explore resource depletion attacks at the routing protocol layer and packet forwarding, which invariably disable networks by quickly draining nodes power, is called "Vampire Attack". These attacks are not specific to any protocol, but rather depend on the properties of many classes of routing protocols. In existing systems finding out the vampire attack is done at destination for each received packet. In our proposed system, we developed a system which mitigates these vampire attacks by saving bandwidth, power and time. Validation of route will be checked at each node to find out persistence of vampire attacks quickly and if found avoids it immediately.
Conference Paper
Mobile ad hoc Networks (MANETs) are created by a collection of mobile nodes (MNs), which communicate and exchange information with each other via wireless links. These networks are widely known by their unique characteristics such as mobility, changing topology, multi-hop communication and lack of infrastructure. In the last few years, various routing protocols have been proposed for these networks. It is worthy to note that mobility brings many challenges when designing protocols for these networks. In this paper, we assessed the influence of Reference Point Group mobility model (RPGM) on the performance of both reactive and proactive protocols. Simulation results indicate that the hop-by-hop AODV performs better in high stressful environments, which makes AODV the robust protocol for RPGM model. We also observed that DSR is suitable for less tense environments. Furthermore, we found interesting facts about proactive routing protocols. These protocols are evaluated in terms of packet delivery Ratio (PDR), dropped packets, routing overhead and end-to-end delay.
Conference Paper
Vehicle Ad hoc Network (VANET) is an emerging technology and a new application of mobile Ad Hoc technology in the field of traffic. As the simulation experiments cost less manpower and material resources and they are easy to reproduce the same scenario, VANET simulation technology has become a focus of scholars. But node mobility is strictly limited in the realistic traffic environment and fast moving speed leads to more frequent changes in network topology. So in VANET simulation, it is not appropriate to use traffic simulation tools or network simulation tools alone. In this paper, we integrated SUMO, middleware tool TraCI with NS3 to compare and evaluate the performance of four different topology based routing protocols. They are AODV, DSR, TORA and DSDV. We changed the node mobility and density to observe the experiment results. The main performance metrics for protocols are Packet Drop Ratio, Average Delay and Normalized Routing Load. We concluded that there are many differences and advantages under the proactive and reactive routing protocols from the values of metrics.
Conference Paper
The MANET [mobile ad-hoc network] is most popular and most applicable term and MANET consists of number of mobile nodes, and each independent node in the MANET can communicate with the other node without any wire connections. In the presence of malicious nodes in the MANET, Leads to serious security problem because it will disturb the entire routing processes. So in this paper we are introducing a new method to solve this problem. This papergives a new method called CBDS [co-operative bait discovery method] to detect a malicious attack caused by malicious nodes in the MANET, and establish the efficient route in the network to carry the data from source node to destination node without any data loss and establish the efficient route by using the routing scheme called DSR [Dynamic source routing scheme]. This CBDS method implements a new technique to detect the exact position of malicious nodes in the network called Reverse trapping technique. The CBDS scheme takes the advantage of both proactive and reactive mechanism to achieve the goal of this paper. Simulation results are shown, this simulation results of our CBDS scheme is compare with the existing scheme called DSR scheme in relations of delay, routing overhead, PDR (Packet delivery ratio) and finally Throughput.
Conference Paper
MANET technology develops when the mobile device users are faced situation without support of a fixed network infrastructure. This technology allows communication without a fixed infrastructure. The high mobility in MANET network makes it very vulnerable to attack. Attacks in MANET can destructive routing scheme formed by routing protocols. This study designed a MANET network using AOMDV (Ad Hoc on-demand Multipath Distance Vector) routing protocol. In this network is given rushing and flooding attack. There are three scenarios used in this study, namely network conditions exposed rushing attack, flooding attacks, and the rushing and flooding attack simultaneously. The parameters used in analysis AOMDV protocol are Packet Delivery Ratio (PDR), Throughput, and Delay.
Conference Paper
DSDV (Destination-Sequenced Distance Vector), AODV (Ad hoc On-Demand Distance Vector), AOMDV (Ad hoc On-Demand Multipath Distance Vector) and DSR (Dynamic Source Routing) are among the most widely used routing protocols in Mobile Ad-hoc Networks (MANET) due to their compatibility with multi hop routing environments and scalability towards increased traffic and mobility. On the other hand due to the differences in the routing schemes where DSDV is a table driven routing scheme and AODV, AOMDV and DSR are on-demand routing schemes, each routing protocol has its advantages and disadvantages. In this paper we investigate the performance of these routing protocols in Ship Ad-hoc Networks (SANET) in a maritime environment where ships communicate using Very High Frequency (VHF) as the physical layer. A mobile ad-hoc network is achieved so that ships can use it to share data networking facilities or to send particular sensor data such as sea depth, temperature, wind speed and direction, etc. to a central server to produce a public information map.