scispace - formally typeset
Search or ask a question
Author

Neha Chaudhary

Bio: Neha Chaudhary is an academic researcher from Lovely Professional University. The author has an hindex of 1, co-authored 1 publications receiving 5 citations.

Papers
More filters
Proceedings ArticleDOI
10 Nov 2014
TL;DR: Simulation results using Network Simulator 2(NS2) shows that, in a high mobility environment, malicious node could be detected and the packet delivery ratio has been improved.
Abstract: Mobile Adhoc Network (MANET) is vulnerable to many security issues and network attacks. We presented the comparison of three different routing protocols (AODV, DSR and DSDV) on the basis of different parameters. In this paper, black hole attack is implemented on AODV protocol which reduce the performance parameters of network by exploiting the packet sequence number included in any packet header. The proposed mechanism of Intrusion Detection System (IDS) is also implemented to enhance the network performance. Simulation results using Network Simulator 2(NS2) shows that, in a high mobility environment, malicious node could be detected and the packet delivery ratio has been improved.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The framework, challenges and trends of Smart city IoT, use case for the smart street highlights the importance of proposed structure, and Smart City projects are discussed to recognize the importanceof IoT in smart cities and its future are identified.

33 citations

Proceedings ArticleDOI
01 Nov 2017
TL;DR: Different techniques that can be used to detect and prevent MANETs from black hole attacks are discussed.
Abstract: Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in dynamic topology without any centralized system. MANET's nodes communicate with each other by forming a dynamic wireless link without using previous infrastructure. In the MANETs any node can enter or leave a network at any time. Nodes can send or receive the data by using defined routing protocols and mobility models. Due to the unavailability of centralized system, MANETs are exposed to different network layer attacks. Worm Hole, Black Hole, Gray Hole, Byzantine and Sybil Attacks are some of the examples of network layer attacks, which destroys network topology resulting in data loss and network degradation. In the Black Hole Attack, a node proclaims itself as having closest paths to all the destinations. This node absorbs all the data packets of network by exploiting the routing protocol thus degrading network performance. In this Paper, we have discussed different techniques that can be used to detect and prevent MANETs from black hole attacks.

11 citations

Journal ArticleDOI
TL;DR: A combined approach which is used to detect both the black hole and worm hole attack is proposed and it is found that the parameters for Quality of Services (QoS) in MANET improved significantly as compare to conventional techniques.
Abstract: MANET is vulnerable to most of the security threats and we proposed a combined approach which is used to detect both the black hole and worm hole attack. We also carried out black hole and worm hole attack on MANET using Ad hoc On Demand Distance Vector (AODV) routing protocol and analyzed the performance parameters like Throughput, Packet Delivery Ratio(PDR) and Normalized Routing Load (NRL). After implementation of proposed technique, we found that the parameters for Quality of Services (QoS) in MANET improved significantly as compare to conventional techniques.

5 citations

Proceedings ArticleDOI
09 Jun 2017-Rice
TL;DR: How the mobility in VANET networks, impacts a continuous flow of data on TCP, is discussed, by modeling a scenario in NetLogo and its simulation with NS2.
Abstract: In this article is considered Vehicular Ad-Hoc Networks (VANETs) as a technology aimed at the exchange of information between vehicles, where the nodes/vehicles of origin and destination, do not have a direct communication. Also is emphasized and analized the use interest of a TCP (Transition Control Protocol) traffic flow, since it is one of the fundamental protocols for Internet of things (IoT). Most Internet applications use TCP to create “connections” with each other, in order to maintain applications with a continuous data flow, it is, TCP over Internet guarantees the integrity and delivery of the data to its destination without errors and in the same order in which they were originally transmitted. At the end of the article, it is discussed how the mobility in VANET networks, impacts a continuous flow of data on TCP, performing this analysis by modeling a scenario in NetLogo and its simulation with NS2.

2 citations

Journal ArticleDOI
01 Jan 2021
TL;DR: A combination between source routing technique and on‐demand ad hoc routing algorithm to increase link reliability in power line communications over low‐tension power grid and unique lightweight packet structure is proposed to minimize algorithm overhead and to enhance the system robustness.
Abstract: This article proposes a combination between source routing technique and on‐demand ad hoc routing algorithm to increase link reliability in power line communications over low‐tension power...