• Title/Summary/Keyword: Black nodes

Search Result 45, Processing Time 0.024 seconds

A Light Weight Non-Cryptographic Solution for Defending Black Hole Attacks in Mobile Ad Hoc Networks

  • M.Mohanapriya;M.Mohanapriya
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.125-134
    • /
    • 2024
  • Mobile Ad hoc Network (MANET) is a self organizing network in which a group of wireless nodes communicate among themselves without requiring any centralized infrastructure. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different emergency situations such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved only by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. In this paper we propose a light weight non cryptographic solution to defend the network from black hole attack and enables communication even in the presence of the attack. In this scheme, by analyzing only the control packets used for routing in the network, the nodes identify the presence of black hole attack. Based on the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution in the presence of attack.

Development of Protective Scheme against Collaborative Black Hole Attacks in Mobile Ad hoc Networks

  • Farooq, Muhammad Umar;Wang, Xingfu;Sajjad, Moizza;Qaisar, Sara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1330-1347
    • /
    • 2018
  • Mobile Ad hoc Network (MANET) is a collection of nodes or communication devices that wish to communicate without any fixed infrastructure and predetermined organization of available links. The effort has been made by proposing a scheme to overcome the critical security issue in MANET. The insufficiency of security considerations in the design of Ad hoc On-Demand Distance Vector protocol makes it vulnerable to the threats of collaborative black hole attacks, where hacker nodes attack the data packets and drop them instead of forwarding. To secure mobile ad hoc networks from collaborative black hole attacks, we implement our scheme and considered sensor's energy as a key feature with a better packet delivery ratio, less delay time and high throughput. The proposed scheme has offered an improved solution to diminish collaborative black hole attacks with high performance and benchmark results as compared to the existing schemes EDRIAODV and DRIAODV respectively. This paper has shown that throughput and packet delivery ratio increase while the end to end delay decreases as compared to existing schemes. It also reduces the overall energy consumption and network traffic by maintaining accuracy and high detection rate which is more safe and reliable for future work.

A Hybrid Approach for Black-hole Intrusion Detection using Fuzzy Logic and PSO Algorithm

  • M. Rohani hajiabadi;S. Gheisari;A. Ahvazi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.109-114
    • /
    • 2024
  • Wireless Sensor Networks (WSN) includes a large number of small sensor nodes and low cost, which are randomly located in a region. The wireless sensor network has attracted much attention from universities and industry around the world over the past decades, with features denser levels of node deployment, self-configuration, uncertainty of sensor nodes, computing, and memory constraints. Black-hole attack is one of the most known attacks on this network. In this study, the combination of fuzzy logic and particle swarm optimization (PSO) algorithms is proposed as an effective method for detecting black-hole attack in the AODV protocol. In the current study, a new function has been proposed in order to determine the membership of fuzzy parameters based on the particle swarm optimization algorithm. The proposed method was evaluated in different scenarios and was compared with other state of arts. The simulation result of this method proved the better performance in both detection rate and delivered packet rate.

A Swapping Red-black Tree for Wear-leveling of Non-volatile Memory (비휘발성 메모리의 마모도 평준화를 위한 레드블랙 트리)

  • Jeong, Minseong;Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.139-144
    • /
    • 2019
  • For recent decades, Non-volatile Memory (NVM) technologies have been drawing a high attention both in industry and academia due to its high density and short latency comparable to that of DRAM. However, NVM devices has write endurance problem and thus the current data structures that have been built around DRAM-specific features including unlimited program cycles is inadequate for NVM, reducing the device lifetime significantly. In this paper, we revisit a red-black tree extensively adopted for data indexing across a wide range of applications, and make it to better fit for NVM. Specifically, we observe that the conventional red-black tree wears out the specific location of memory because of its rebalancing operation to ensure fast access time over a whole dataset. However, this rebalancing operation frequently updates the long-lived nodes, which leads to the skewed wear out across the NVM cells. To resolve this problem, we present a new swapping wear-leveling red-black tree that periodically moves data in the worn-out node into the young node. The performance study with real-world traces demonstrates the proposed red-black tree reduces the standard deviation of the write count across nodes by up to 12.5%.

A Study on the Hierarchical Representation of Images: An Efficient Representation of Quadtrees BF Linear Quadtree (화상의 구조적 표현에 관한 연구- 4진트리의 효율적인 표현법:BF선형 4진트)

  • Kim, Min-Hwan;Han, Sang-Ho;Hwang, Hee-Yeung
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.37 no.7
    • /
    • pp.498-509
    • /
    • 1988
  • A BF(breadth-first) linear quadtree as a new data structure for image data is suggested, which enables us to compress the image data efficiently and to make operations of the compressed data easily. It is a list of path names for black nodes as the linear quadtree is. The path name for each black node of a BF linear quadtree is represented as a sequence of path codes from the root node to itself, whereas that of linear quadtree as a sequence of path codes from the root node to itself and fill characters for cut-offed path from it to any n-level node which corresponds to a pixel of an image. The BF linear quadtree provides a more efficent compression ratio than the linear quadtree does, because the former does not require redundant characters, fill characters, for the cut-offed paths. Several operations for image processing can be also implemented on this hierarchical structure efficiently, because it is composed of only the black nodes ad the linear quadtree is . In this paper, algorithms for several operations on the BF linear quadtree are defined and analyzed. Experimental results for forur image data are also given and discussed.

Fast Implementation of the Progressive Edge-Growth Algorithm

  • Chen, Lin;Feng, Da-Zheng
    • ETRI Journal
    • /
    • v.31 no.2
    • /
    • pp.240-242
    • /
    • 2009
  • A computationally efficient implementation of the progressive edge-growth algorithm is presented. This implementation uses an array of red-black (RB) trees to manage the layered structure of check nodes and adopts a new strategy to expand the Tanner graph. The complexity analysis and the simulation results show that the proposed approach reduces the computational effort effectively. In constructing a low-density parity check code with a length of $10^4$, the RB-tree-array-based implementation takes no more 10% of the time required by the original method.

  • PDF

A Study on Attack Detection using Hierarchy Architecture in Mobile Ad Hoc Network (MANET에서 계층 구조를 이용한 공격 탐지 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.75-82
    • /
    • 2014
  • MANET has various types of attacks. In particular, routing attacks using characteristics of movement of nodes and wireless communication is the most threatening because all nodes which configure network perform a function of router which forwards packets. Therefore, mechanisms that detect routing attacks and defense must be applied. In this paper, we proposed hierarchical structure attack detection techniques in order to improve the detection ability against routing attacks. Black hole detection is performed using PIT for monitoring about control packets within cluster and packet information management on the cluster head. Flooding attack prevention is performed using cooperation-based distributed detection technique by member nodes. For this, member node uses NTT for information management of neighbor nodes and threshold whether attack or not receives from cluster head. The performance of attack detection could be further improved by calculating at regular intervals threshold considering the total traffic within cluster in the cluster head.

Morphological studies on hemal nodes and hemolymph nodes in the water deer(Hydropotes inermis) (고라니 혈절과 혈림프절에 관한 형태학적 연구)

  • Yoon, Yeo-sung;Lee, Joon-sup
    • Korean Journal of Veterinary Research
    • /
    • v.37 no.3
    • /
    • pp.463-469
    • /
    • 1997
  • This study was performed to investigate the gross anatomical features and microscopical structures of the hemal nodes and the hemolymph nodes in the water deer (Hydropotes inermis) found in Kangwon-do, Korea. The hemal nodes and hemolymph nodes were observed mainly in the periphery of the thoracic and abdominal aortae of the animals. The size of hemal nodes was generally smaller than that of the hemolymph nodes, and the shape of the both organs was spherical or ovoid. The color of the hemal nodes was red or black while that of the hemolymph nodes was gray with red bands. The hemal nodes were surrounded by a thin connective tissue capsule and there were extensive subcapsular and deep sinuses distended by a great number of erythrocytes. Although a few number of lymphatic nodules and small areas of diffuse lymphatic tissues were observed in the parenchyma, no typical cortex and medulla were defined in the hemal node. Small numbers of blood vessels were found at the connective tissue capsule but lymph vessel was not observed microscopically in this organ. The hemolymph nodes were covered by a relatively thick connective tissue capsule and there was a hilus in each node. The parenchyma was divided into cortex and medulla. The cortex was composed of a few numbers of lymphatic nodules and some diffuse lymphatic tissues. The medulla comprised medullary sinus and cords. Afferent and efferent lymph vessels were observed at the periphery of the capsule and the hilus, respectively. The subcapsular and medullary sinuses were not extensive but filled with small numbers of erythrocytes. The stroma of hemal node and hemolymph node was composed of reticular cells and fibers, and the capsule and trabecula consisted of collagenous fibers with smooth muscle fibers.

  • PDF

A Study on Detection Improvement Technique of Black Hole Node in Ad Hoc Network (Ad Hoc Network에서 블랙 홀 노드 탐지 향상 기법에 관한 연구)

  • Yang, HwanSeok;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.11-16
    • /
    • 2013
  • Mobile node must move optionally and perform the router and the host functions at the same time. These characteristics of nodes have become a potential threatening element of a variety of attacks. In particular, a black hole which malicious node causes packet loss among them is one of the most important issues. In this paper, we propose distributed detection technique using monitoring tables in all node and cooperative detection technique based cluster for an efficient detection of black hole attack. The proposed technique performs by dividing into local detection and cooperative detection process which is composed of process of step 4 in order to improve the accuracy of the attack detection. Cluster head uses a black hole list to cooperative detection. The performance of the proposed technique was evaluated using ns-2 simulator and its excellent performance could be confirmed in the experiment result.

Morphological studies on the hemal node in the Korean native cattle (한우 혈절에 관한 형태학적 연구)

  • Yoon, Yeo-sung
    • Korean Journal of Veterinary Research
    • /
    • v.34 no.2
    • /
    • pp.229-235
    • /
    • 1994
  • The hemal nodes of the Korean native cattle were studied by gross anatomy and light microscopy. Hemal nodes were spherical or ovoid in shape, and red or black in colors. A hemal node consisted of a thick capsule and a hilum, and had extensive subcapsular and deep sinuses distended by a great number of erythrocytes. Although a few lymphatic nodules and tissues were seen in the parenchyma, no typical cortex and medulla was defined. Blood vessels occurred, but lymph vessel was not observed in nodes. The stroma of the hemal node was composed of reticular cells and fibers. The parenchyma consisted of many erythrocytes and lymphocytes, and a few macrophages and megakaryocytes. The capsule and trabecula was a collagenous connective tissue with smooth muscle cells. B-lymphocytes were principally located in the lymphatic nodules of the hemal node. T-lymphocytes were scattered in the diffuse lymphatic tissues of the hemal node.

  • PDF