Volume-11 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A New Approach for Improving Performance of Intrusion Detection System over MANET |
| Country | : | India |
| Authors | : | Kusum Nara, Aman Dureja |
| : | 10.9790/0661-1120109 ![]() |
|
Abstract: A Mobile Ad-hoc Network (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that falsely claim itself as a valid node. It will accept the information and will not forward the information to next nodes. Intrusion Detection System (IDS) will be used to detect such kind of attacks, but these attacks slows down the performance of IDS. To improve the performance of IDS and to handle these attacks we have presented an attack avoidance scheme. In which a preventive path will be discovered in which not attacker node will be covered. The detected path may be wider than the shortest path but will provide the higher throughput and reduce the data loss over the network. In our present work we record an interconnection table to track the communication information over the network. The INVERTED TABLE APPROACH will be used to maintain this table. Once the table will be defined, the DATA MINING APPROACH will be used to identify the attacker nodes. The work will be implemented in NS2.35 and the result analysis will be driven based on throughput and the loss analysis.
Keywords: Mobile Ad-Hoc Network (MANET), routing protocol, Black Hole Attack, AODV.
[1] SaurbhGoyal," An Improved Inverted table Approach to Detect Selfish Node In Mobile Ad Hoc Network", International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
[2] MonitaWahengbam," Intrusion Detection in MANET using Fuzzy Logic", 978-1-4577-0748-3/12 © 2012 IEEE [3] Xiao Yang Zhang," Proposal of a Method to Detect Black Hole Attack in MANET".
[4] Neelam Sharma," Layered Approach for Intrusion Detection Using Naïve Bayes Classifier", ICACCI'12, August 3-5, 2012, Chennai, T Nadu, India.Copyright 2012 ACM 978-1-4503-1196-0/12/08 (pp 639-644)
[5] G.V. Nadiammai," An Evaluation of Clustering Technique over Intrusion Detection System", International Conference on Advances in Computing, Communications and Informatics (ICACCI-2012) (pp 1054-1060)
[6] Rajib Das," Security Measures for Black Hole Attack in MANET: An Approach", International Journal of Engineering Science and Technology (IJEST) ISSN: 0975-5462 Vol. 3 No. 4 Apr 2011 (pp 2832-2838)
[7] K C Nalavade," Intrusion Prevention Systems: Data Mining Approach", International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) – TCET, Mumbai, India ICWET'10, February 26–27, 2010, Mumbai, Maharashtra, India. Copyright 2010 ACM 978-1-60558-812-4 (pp 211-214)
[8] Athira.M.Nambiar," Wireless Intrusion Detection Based on Different Clustering Approaches", A2CWiC 2010, September 16-17, 2010, India Copyright © 2010 978-1-4503-0194-7/10/0009
[9] Mehdi Kargar," Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes", International Journal of Security and its Applications Vol. 3, No. 1, January, 2009 (pp 117-128)
[10] Daniela Brauckhoff," Anomaly Extraction in Backbone Networks using Association Rules", IMC'09, November 4–6, 2009, Chicago, Illinois, USA. ACM 978-1-60558-770-7/09/11 (pp 28-34)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the present era of Information Technology, Transmission of information in a secured manner is the primary concern of all agencies. Security is highly essential, as intruders are very keen to rob the information with all their might and intelligence. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. The objective of this paper is to encrypt a text using a technique different from the conventional Hill Cipher. The Advanced Hill Cipher uses an involutory matrix and permuted key. In this paper, we implement a second level of encryption using permutation approach, which makes the cipher highly secure. This encryption scheme is highly reliable as it uses tamper detection of the cipher text ensuring successful decryption of the cipher. All of these functions and transformations that are introduced ensure that this cipher is a very strong one and it cannot be broken by any cryptanalytic attack.
Keywords - Advanced Hill Cipher, Decryption, Encryption, Public Key Cryptosystem, Permuted key, and Tamper detection.
[1] A Modern Advanced Hill Cipher Involving a Permuted Key and Modular Arithmetic Addition Operation, V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011
[2] A Modern Advanced Hill Cipher Involving XOR Operation and Permuted Key,A Research paper by V.U.K.Sastry, Aruna Varanasi and S.Udaya Kumar Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011
[3] Advanced Hill Cipher Involving a Pair of Keys, V.U.K.Sastry, Aruna Varanasi, S.Udaya Kumar," International Journal of Computational Intelligence and Information Security, Vol.2 No.1, pp 100-108, January2011
[4] A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes, 1A.F.A. Abidin, 1O.Y. Chuan and 2M.R.K. Ariffin, Journal of Computer Science 7 (5): 785-789, 2011ISSN 1549-3636© 2011 Science Publications
[5]A Modified Hill Cipher Involving Interweaving and Iteration. V. Umakanta Sastry, N. Ravi Shankar, and S Durga Bhavani, International Journal of Network Security, Vol.11, No.1,2010.
[5] A Modified Hill Cipher Involving Interweaving and Iteration. V. Umakanta Sastry, N. Ravi Shankar, and S Durga Bhavani, International Journal of Network Security, Vol.11, No.1,2010.
[6] Public key cryptosystem and a key exchange protocol using tools of non-abelian group, Dr. H.K. Pathak et. al./ International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1029-1033
[7] A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm, Min-Shiang-Hwang, Cheng-Chi Lee, and Shiang-Feng Tzeng, World Academy of Science, Engineering and Technology 33 2009
[8] Recommendation for Cryptographic Key Generation,NIST Special Publication,July 2011.
[9] Advanced Hill Cipher Involving Permutation and Iteration", V.U.K.Sastry, Aruna Varanasi, S.Udaya Kumar International Journal of Advanced Research in Computer Science, Vol.1, No.4, pp. 141- 145, Nov-Dec. 2010.
[10] Image Encryption Using Advanced Hill CipherAlgorithm, Bibhudendra Acharya, Saroj Kumar Panigrahy, Sarat Kumar Patra, and Ganapati Panda, ACEEE International Journal on Signal and Image Processing Vol 1, No. 1, Jan 2010
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The intent of this paper is to present an analysis of reactive power control and voltage stability in power systems. It identifies a new model used to enhance voltage stability and exposes several key issues that had remained as research challenges in this area. The steady state voltage and reactive power control in distribution systems can be properly controlled by coordinating the available voltage and reactive power control equipment, such as on-load tap-changers, substation shunt capacitors and feeder shunt capacitors. It began with an overview of reactive power and voltage stability in transmission, distribution and load, and the importance of providing reactive power locally. The description of selected control features of shunt power systems such as SVC (Static Var Compensator) – static compensators of reactive power, STATCOM-type systems (Static Compensator) static reactive power generators and systems that combine both these solutions, which are referred to as SVC based on STATCOM where not left out. It explains the need to improve the voltage safety of Power system, as well as the increasing requirements for energy quality and security. It also discusses the techniques that were adopted in controlling and monitoring of the rate of power flow in the entire power system topology. This investigates the system to an optimal level in order to reduce losses and ensures sufficiency of reactive power control during normal and emergency conditions and to prevent voltage collapse.
Keywords: Reactive Power, Voltage stability, Voltage Collapse, Power system security, voltage control
[I] Proceedings of Bulk Power System Voltage Phenomena- Voltage Stability and Security. Potosi, MO, September 19-24, 1988.
[2] Proceedings of NSF Workshop on Bulk Power System Voltage Phenomena-Voltage Stability and Security. Deep Creek Lake, MD, August 4-7, 1991.
[3] Proceedings of Bulk Power System Voltage Phenomena 111- Seminar on Voltage Stability, Security and Control. Davos, Switzerland, August 22-26, 1994.
[4] Proceedings of the Symposium on Bulk Power System Dynamics and Control IV-Restructuring. Santorini, Greece, August 24-28, 1998.
[5] Proceedings of Bulk Power Systems Dynamics and Control Security and Reliability in a Changing Environment. Onomichi, Japan, August 26-31, 2001.
[6] C.D. Vournas, P.W. Sauer, and M.A. Pai. Relationships between Voltage and Angel Stability of Power Systems. International Journal of Electrical Power and Energy Systems, 18:493-500, 1996.
[7] H.P. St. Clair. Practical Concepts in Capability and Performance of Transmission Lines. AIEE Dansactions, 72: 1152-1 157, 1953.
