SlideShare a Scribd company logo
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
DOI : 10.5121/ijdps.2014.5303 29
DERIVATIVE THRESHOLD ACTUATION FOR SINGLE
PHASE WORMHOLE DETECTION WITH REDUCED
FALSE ALARM RATE
K.Aathi Dharshini1
C.Susil Kumar2
E.Babu Thirumangai Alwar3
1,2
Department of Electronics and Communication Engineering, VCET,Madurai.
3
Department of Computer Science Engineering,Hindusthan Institute of Technology,
Coimbatore.
ABSTRACT
Communication in mobile Ad hoc networks is completed via multi-hop ways. Owing to the distributed
specification and restricted resource of nodes, MANET is a lot prone to wormhole attacks i.e. wormhole
attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus, so as
to discover wormholes, totally different techniques are in use. In all those techniques fixation of threshold
is merely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin
part by putting the nodes that is higher than the edge in a suspicious set, however predicting the node as a
wormhole by using some other algorithms. Our aim in this paper is to deduce the traffic threshold level by
derivational approach for identifying wormholes in a very single phase in relay network having dissimilar
characteristics.
KEYWORDS
MANET, wormhole, Traffic prediction, parametric threshold implication, derivational approach.
1. INTRODUCTION
A mobile unintended network (MANET) could be a self configuration infrastructure less network
with non centralized administration. A mobile Ad hoc or unintended network is an autonomous
assortment of mobile devices (laptops, smart phones, sensors, etc.,)that communicate with one
another over wireless links and collaborate in a distributed manner so as to produce the required
network practically within the absence of a fixed infrastructure. Every device in a MANET is
unengaged to move independently in any direction, and can amend its links to different devices
often. This type of network, operating as a complete network or with one or multiple points of
attachments to cellular networks or the web, paves the approach for variable new and exciting
applications. Application scenarios embrace, however are not restricted to: emergency and rescue
operations, conferences are field settings, automobile networks, personal networking, etc. In
wormhole attack, malicious node receives knowledge packet at one point within the network and
tunnels them to a different malicious node. The tunnel existing between two malicious nodes is
named as a wormhole. The tunnel gets the information from one network and replicates to
different network. A wormhole therefore permits an attacker to form two attacker controlled
choke points which may be utilized by the attacker to degrade or analyze traffic at a desired point.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
30
TPIDS is a lightweight traffic prediction intrusion detection theme that tumbling the value of
communication and energy by hastily detecting the behaviour of the intrusions. Some work has
been done to wormhole attack in mobile unintended networks however it cause excessive false
alarm rate. In this paper we are focusing on reducing warning rate by choosing optimum
threshold value to save lots of wastage of energy and information measure of mobile nodes in
sleuthing wormholes. The remaining components of this paper is organized as follows: section III
provides traffic prediction supported ARMA, section IV provides experimental analysis and
results, section V presents relation between attributes of the network and threshold values, section
VI presents threshold selection, finally conclusion is conferred in section VII.
2. RELATED WORK
The discussion starts by Yu Bo’s paper, that relies on the discovery of multi-hop recognition
theme to detect attacks caused by the selection of transmitting the irregular packet loss. In this
theme, a region of the transmission path, nodes are going to be randomly selected for testing.
Detection point is going to be generated for every incident packet to the upstream transmission
methods, any node within the middle, if not adequately recognized package, can generate warning
data of abnormal packet loss and to submit a multi-hop to the supply node. Here, we have
considered ton choosing transmission attack is taken into account, that introduces larger
communications and computing prices. Then khin sandar win [6] proposes solely an analysis of
detecting wormhole attack in wireless network, simply by quoting the benefits and drawbacks not
suggesting for the foremost economical one. Han zhijie[1] instructed traffic prediction
methodology, however he didn’t decrease the false alarm rate whereas detecting wormholes.
Faizal M.A.[2] offers regarding solely a way to verify threshold values by using SPC approach
that are more necessary for detection of wormholes and conjointly to scale back false alarm rate
within the MANET. This observation is finished on real time network traffic having the aim of
distinguishing the typical connection created by the host or hosts to single victim among one
second interval.
3. TRAFFIC PREDICTION BASED ON ARMA
The existing traffic prediction model includes Poisson model, Markov model, auto-regressive
model where Poisson is not suitable for the flow characteristics of MANET. This paper gathers
information from Markov model and enhances it in auto-regressive moving average model to
predict MANET traffic and the specific prediction model which is shown below:
Each and every node in MANET has its own random variable sequence X0 , X1 , X 2... is used to
denote the state of the node at the same time; different nodes can be in different modes. Assume
Xn = i that is nodes are in the operational mode i when it is in time domain n and also assume
that the entire state transition take place at the beginning of any time domain, each node has
some fixed probability in the state i .if the next state is j , then this is denoted by Pij.
Pij = P Xm+1 = j | Xm =i (1)
Where
Pij The probability of entering the state j when a node is in the operational state i .
The migration probability of second-order is defined as P2
ij that is, a node in the current state of
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
31
i will enter the state j after having two state transitions. (i.e.)
This can be calculated by the following formula:
The migration probability of n order is denoted as
which is taken from the chapman- kolomogorov equation: P2
ij
Where
γ can take any arbitrary values between 0 and n.
A further notation of Markov chain for probability is to use M*M matrix of P which is called as
migration probability matrix. In this matrix, the element Pij represents the probability in the i th
row and j th column.
Here, P2
can be calculated by P*P and in general, P(m+n)
=P(m)
*P(n)
which is similar to
By migration probability matrix and the initial X0 of each node, we can build the sequence while
comparing energy consumption and mobility for the entire MANET. If a node travels from ith
state to sth
state, then the number of time domains the node remains in the sth
state is given by:
Assuming that BS is the data transmissible data quantity of a node stays at state s. then after
calculating the number of domains, the total data transmissible quantity is given by the formula:
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
32
And also the data of each node in the time can be calculated by equation (7).the transmissible data
quantity for the total number of nodes in a cluster is given by
Where
Ck→ it is to represent ith
node, in cluster Ck.
Pis
(t)
→ is the probability from i th state migrating to the sth
state.
4. EXPERIMENTAL ANALYSIS AND RESULTS
Generally, networks of nodes are created which generates its traffic randomly with specific
direction and velocity. Using ARMA algorithm, traffic prediction for single node is found by
equation (7) and also traffic prediction for cluster of different nodes is calculated by equation (8).
Using intrusion detection system, detected traffic for each node is analyzed which results node
with high traffic is finally concluded as wormhole. Further this paper focused on detecting
anomalies caused by the invasion and leaving decision making and counter measures.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
33
SCREEN SHOT 1:
This screen capture shows the combined execution of both prediction data algorithm and the
wormhole detection algorithm. Since the predicted data is got from the ARMA algorithm, it uses
probability matrix i.e the probability of a nodes to go from state 'i' to state 'j' after time ‘t’ is
shown in the above result.
In order to deduce the relation between the threshold and network attributes first we have to
stumble on the relationship between the varying network characteristics and the normalized data.
For this we reflect on the data present in each node, number of nodes, time instants etc.
Varying the network attributes like amount of data in nodes, number of nodes, number of time
instants, the results have been simulated.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
34
4.1. Analysis Using Data
By varying the amount of data in each node in both prediction algorithm and wormhole detection
algorithm, the total predicted data the actual data in the wormhole and the data in other nodes
after certain number of transmissions is analyzed.
S.NO Data in each node Predicted Data Actual data in
wormhole
Data in other
nodes
1 2,2,2 11.88001 12 5,3
2 2,4,6 28.20005 28 3,7
3 5,10,15 43.2000 55 6,16
4 20,30,40 129.60086 170 21,51
5 60,70,80 189.000031 410 61, 131
6 50,100, 150 180 550 51, 151
Table1.Analysis Using Data
This table (1) describes the relation between the predicted data and actual data in wormhole by
varying the amount of data in each node. The inference is that data in wormhole is more than data
in other nodes. More the increase in data in each node more will be the variation in predicted and
the actual one. With this variation into concern the below graph is plotted.
Fig. 1 Variance Vs Normalized data
The Fig 1 is plotted against variance calculated from the amount of data in each node, and the
normalized data calculated from the formula
Normalized data = Predicted Data – Actual Data (9)
Predicted Data
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
35
This graph infers that there is a diminishing relation between the amount of data in each node,
and the normalized data which is above calculated.
4.2. Analysis Using Number of nodes
By varying the number of nodes in both prediction algorithm and wormhole detection algorithm,
the total predicted data, the actual data in the wormhole and the data in other nodes after certain
number of transmissions is analyzed.
Table 2.Analysis Using Number of nodes
S.
No
No. of
nodes
Data in each node Prediction
data
Actual
data in
worm
hole
Data in other
nodes
No.
of txm
1 4 20,30,40,50 1783.5 291 22, 51,110 4
2 5 20,30,40,50,60 5723.22 391 22, 51, 91 5
3 6 20,30,40,50,60,70 9007.2 551 22,52,91,110,101 6
4 7 20,30,40,50,60,70,80 25278 651 22,51,91, 111 7
5 8 20,30,40,50,60,
70,80,90
33282 811 22,51,91,111,131 8
6 9 20,30,40,50,60 5116.4 991 22,51,91,111 9
This table 2 infers that while varying the number of nodes a suitable relation is formed between
the predicted data and actual value of data from which a graph is plotted.
Fig. 2 No. of Nodes Vs Normalized data
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
36
This Fig. 2 infers that there is some linear relation between the varying nodes and the normalized
value calculated from the above equation (9) by tagging the varying number of nodes in the X-
axis.
4.3. Analysis Using Number of Time instants
By varying the time instants in this table (3) a graph with some relation between the normalized
data and the variable instants is plotted.
This fig (3) shows a decreasing relation on comparing the normalized data and the number of
time instants by labelling them in the Y-axis and X- axis respectively.
The scenario of a Mobile Ad hoc network with a source node, destination node, route and
wormholes is shaped in NS2 and the NAM output visualizes the node topology, connectivity,
traffic or packet trace information carried out in MANET.
Comprehensive analysis of node.cc and its header files should be done, alterations should be
made in NS2. Then by varying the parameters one by one threshold is deduced.
Table 3. Analysis using no. of Time Instants
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
37
Fig.3. No. of Time Instants Vs Normalized Data
5. RELATION BETWEEN NETWORK ATTRIBUTES AND
THRESHOLD VALUES
Assume different threshold values and then experiment it with a network having characteristics
like number of nodes, traffic intensity, node density and also wormhole density. And then, find
false alarm rates for each assumed threshold values. The detection rate performance is highest for
one threshold value for this network of certain parameters. The experiment is then repeated by
varying the characteristics of the network and similar threshold values with best performance are
obtained. Such threshold values of highest detection rate performance are found for each network
with varying parameters. A mathematical relation is then deduced between the parameters of the
network and such obtained threshold values. Based on this relation, an optimal threshold value
with least false alarm rate can be selected for a network with any parameter set. This experiment
is simulated in NS2 and the expected result would be in the form of a mathematical expression
obtained by theoretical analysis.
6. THRESHOLD SELECTION
The normal and the abnormal traffic are differentiated using a threshold value. Thus suitable
selection and the correct threshold value add an extra advantage for IDS to detect anomalies in
the network. Selecting inaccurate threshold value will cause an excessive false alarm especially if
the value is too low or if it is too high, it can cause the intrusion activity being considered as
normal traffic. Most of the research does not propose a proper technique to identify the threshold
technique. Here threshold is determined by dynamic techniques. Dynamic threshold technique
requires prior knowledge of the network traffic before the threshold value can be selected.
7. CONCLUSION
In this paper, anomaly detection and security scheme based on Markov model is used by each
node in MANET to predict traffic (TPIDS). All the above analysis shows that there exists a
perceptible relation obtained by altering the network attributes, with this noticeable relation it is
evident that there prevails an optimal threshold based on this relation. On deriving this relation
wormhole detection can be ended in single phase. This relation is malleable to the protocol
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
38
DSDV which finds the wormhole by using shortest distance, hence in future work the optimal
threshold for other routing protocols such as AODV etc can be deduced.
REFERENCES
[1] C Han Zhijie, Wang Ruchuang: ‘Intrusion Detection for Wireless Sensor Network Based on Traffic
Prediction Model’, 2012 International Conference on Solid State Devices and Materials Science.
[2] Faizal M. A., Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B.: ‘Threshold
Verification Technique for Network Intrusion Detection System’, (IJCSIS) International Journal of
Computer Science and Information Security,Vol. 2, No. 1, 2009.
[3] Ankita Gupta,Sanjay Prakash Ranga: ‘Wormhole Detection Methods In Manet’,International Journal
Of Enterprise Computing And Business Systems(IJECBS), Vol. 2 Issue 2 July 2012.
[4] Moutushi Singh, Rupayan Das: ‘A Survey Of Different Techniques For Detection of Wormhole
Attack In Wireless Sensor Network’ , International Journal of Scientific & Engineering Research
Volume 3, Issue 10, October-2012 .
[5] Murad A. Rassam, M.A. Maarof and Anazida Zainal: ‘A Survey of Intrusion Detection Schemes in
Wireless Sensor Networks’ American Journal of Applied Sciences, 2012.
[6] Khin Sandar Win, Pathein Gyi: ‘Analysis of Detecting Wormhole Attack in Wireless Networks’,
World Academy of Science, Engineering and Technology , 2008.
[7] Lukman Sharif and Munir Ahmed, ‘The Wormhole Routing Attack in Wireless Sensor Networks
(WSN)’, Journal of Information Processing Systems, Vol.6, No.2, June 2010.
[8] Jing Deng, Richard Han, and Shivakant Mishra, ‘Defending against Pathbased DoS Attacks in
Wireless Sensor Networks’ SASN’05, November 7, 2005.
[9] Llker Demirkol, Fatih Alag¨oz,Hakan Delic, Cem Ersoy. Wireless Sensor Networks for
IntrusionDetection:PacketTrafficModeling[EB/OL].www.cmpe.boun.edu.tr/~ilker/IlkerDE
MIRKOL_COMML_ext_abstract . pdf.
[10] Onat I , Miri A. ‘An intrusion detection system for wireless sensor networks/Proceedings of the IEEE
International Conference on Wireless and Mobile Computing’ , Networking and Communications
(WiMOB’05) Mont real , Canada , 2005.
Authors
C.Susil Kumar received his B.E degree in Electronics and Instrumentation from
Madras University, India in 2001 and M.Tech degree in Communication Engineering
from Vellore Institute of Technology, India, in 2004. He is working as Assistant
Professor in the Department of Electronics and Communication Engineering,
Velammal College of Engineering and Technology, Madurai. His research interests
include Wireless Communication and Ad hoc Networks.
K.Aathi Dharshini is pursuing M.E Communication systems in Velammal College of
Engineering and Technology,Madurai.She received her B.E degree in R.V.S College
of Engineering and Technology, affiliated under Anna university, India, in 2012. Her
area of interest include Wireless Ad hoc Networks.
E.BabuThirumangaiAlwar received his B.E degree in Electronics and
Communication Engineering from Manonmaniam Sundaranar University, India in
1998 and M.E degree in Computer Science and Engineering from Anna University of
Technology, Tiruchirappalli, India, in 2010. He is working as Assistant Professor in
the Department of Computer Science and Engineering, Hindusthan Institute of
Technology, Coimbatore. His research interests include Wireless Communication
and Adhoc Networks.

More Related Content

PDF
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
PDF
Impact of black hole attack on aodv routing protocol
Zac Darcy
 
PDF
E0392031034
ijceronline
 
PDF
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
ijwmn
 
PDF
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
IJCNCJournal
 
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
Alexander Decker
 
PDF
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
ijwmn
 
PDF
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
IRJET Journal
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
Impact of black hole attack on aodv routing protocol
Zac Darcy
 
E0392031034
ijceronline
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
ijwmn
 
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELS
IJCNCJournal
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Alexander Decker
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
ijwmn
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
IRJET Journal
 

What's hot (18)

PDF
A novel approach for preventing black hole
ijasa
 
PDF
Wormhole attack mitigation in manet a
IJCNCJournal
 
PDF
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
IJMIT JOURNAL
 
PDF
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
IJNSA Journal
 
PDF
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
 
PDF
Ijcatr04041022
Editor IJCATR
 
PDF
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
eSAT Journals
 
PDF
A novel defence scheme against selfish Node attack in manet
ijcsa
 
PDF
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 
PDF
Paper id 71201999
IJRAT
 
PDF
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
TELKOMNIKA JOURNAL
 
PDF
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
csandit
 
PDF
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
IOSR Journals
 
PDF
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
IJCNCJournal
 
PDF
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
B035410013
ijceronline
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
A1803060110
IOSR Journals
 
A novel approach for preventing black hole
ijasa
 
Wormhole attack mitigation in manet a
IJCNCJournal
 
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
IJMIT JOURNAL
 
PREDICTION OF MALICIOUS OBJECTS IN COMPUTER NETWORK AND DEFENSE
IJNSA Journal
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
 
Ijcatr04041022
Editor IJCATR
 
Comparison of the performance of trsaodv with aodv under blackhole attack in ...
eSAT Journals
 
A novel defence scheme against selfish Node attack in manet
ijcsa
 
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 
Paper id 71201999
IJRAT
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
TELKOMNIKA JOURNAL
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
csandit
 
Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET ...
IOSR Journals
 
FUZZY LOGIC-BASED EFFICIENT MESSAGE ROUTE SELECTION METHOD TO PROLONG THE NET...
IJCNCJournal
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
B035410013
ijceronline
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A1803060110
IOSR Journals
 
Ad

Viewers also liked (19)

PDF
Spectrum requirement estimation for imt systems in developing countries
ijdpsjournal
 
PDF
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
ijdpsjournal
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
Management of context aware software resources deployed in a cloud environmen...
ijdpsjournal
 
PDF
On the fly porn video blocking using distributed multi gpu and data mining ap...
ijdpsjournal
 
PDF
Implementing database lookup method in mobile wimax for location management a...
ijdpsjournal
 
PDF
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
ijdpsjournal
 
PDF
Advanced delay reduction algorithm based on GPS with Load Balancing
ijdpsjournal
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
ijdpsjournal
 
PDF
GPU Accelerated Automated Feature Extraction From Satellite Images
ijdpsjournal
 
PDF
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
ijdpsjournal
 
PDF
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
PDF
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
ijdpsjournal
 
PDF
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
ijdpsjournal
 
PDF
4213ijdps03
ijdpsjournal
 
PDF
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
ijdpsjournal
 
PDF
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
ijdpsjournal
 
PDF
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
ijdpsjournal
 
Spectrum requirement estimation for imt systems in developing countries
ijdpsjournal
 
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Management of context aware software resources deployed in a cloud environmen...
ijdpsjournal
 
On the fly porn video blocking using distributed multi gpu and data mining ap...
ijdpsjournal
 
Implementing database lookup method in mobile wimax for location management a...
ijdpsjournal
 
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
ijdpsjournal
 
Advanced delay reduction algorithm based on GPS with Load Balancing
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
ijdpsjournal
 
GPU Accelerated Automated Feature Extraction From Satellite Images
ijdpsjournal
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
ijdpsjournal
 
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
ijdpsjournal
 
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
ijdpsjournal
 
4213ijdps03
ijdpsjournal
 
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
ijdpsjournal
 
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
ijdpsjournal
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
ijdpsjournal
 
Ad

Similar to Derivative threshold actuation for single phase wormhole detection with reduced false alarm rate (20)

PDF
Link Reliability based Detection and Predecessor base Route Establishment for...
IJERA Editor
 
PDF
A New Approach for Improving Performance of Intrusion Detection System over M...
IOSR Journals
 
PDF
Detection of suspected nodes in MANET
IDES Editor
 
PDF
Science journal
graphicdesigner79
 
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
PDF
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
IJCNCJournal
 
PDF
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
rahulmonikasharma
 
PDF
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
IJCNCJournal
 
PDF
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
IJNSA Journal
 
PDF
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
IJNSA Journal
 
PDF
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
 
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
PDF
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
PDF
A2546035115
Prafull Maktedar
 
PPTX
Wormhole attack in Mobile Ad hoc NetworkET.pptx
GeethaChillarge
 
PDF
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
PDF
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
PDF
Route Stability in Mobile Ad-Hoc Networks
arpublication
 
PDF
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
IJCNCJournal
 
PDF
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
 
Link Reliability based Detection and Predecessor base Route Establishment for...
IJERA Editor
 
A New Approach for Improving Performance of Intrusion Detection System over M...
IOSR Journals
 
Detection of suspected nodes in MANET
IDES Editor
 
Science journal
graphicdesigner79
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
IJCNCJournal
 
Mitigating the Problem of Packet Dropping & Energy Management in AD-HOC Wirel...
rahulmonikasharma
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
IJCNCJournal
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
IJNSA Journal
 
A NOVEL TECHNIQUE TO DETECT INTRUSION IN MANET
IJNSA Journal
 
A dynamic approach for improving performance of intrusion detection system ov...
IAEME Publication
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
A2546035115
Prafull Maktedar
 
Wormhole attack in Mobile Ad hoc NetworkET.pptx
GeethaChillarge
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
Route Stability in Mobile Ad-Hoc Networks
arpublication
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
IJCNCJournal
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
 

Recently uploaded (20)

PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 

Derivative threshold actuation for single phase wormhole detection with reduced false alarm rate

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 DOI : 10.5121/ijdps.2014.5303 29 DERIVATIVE THRESHOLD ACTUATION FOR SINGLE PHASE WORMHOLE DETECTION WITH REDUCED FALSE ALARM RATE K.Aathi Dharshini1 C.Susil Kumar2 E.Babu Thirumangai Alwar3 1,2 Department of Electronics and Communication Engineering, VCET,Madurai. 3 Department of Computer Science Engineering,Hindusthan Institute of Technology, Coimbatore. ABSTRACT Communication in mobile Ad hoc networks is completed via multi-hop ways. Owing to the distributed specification and restricted resource of nodes, MANET is a lot prone to wormhole attacks i.e. wormhole attacks place severe threats to each Ad hoc routing protocol and a few security enhancements. Thus, so as to discover wormholes, totally different techniques are in use. In all those techniques fixation of threshold is merely by trial & error methodology or by random manner. Conjointly wormhole detection is in twin part by putting the nodes that is higher than the edge in a suspicious set, however predicting the node as a wormhole by using some other algorithms. Our aim in this paper is to deduce the traffic threshold level by derivational approach for identifying wormholes in a very single phase in relay network having dissimilar characteristics. KEYWORDS MANET, wormhole, Traffic prediction, parametric threshold implication, derivational approach. 1. INTRODUCTION A mobile unintended network (MANET) could be a self configuration infrastructure less network with non centralized administration. A mobile Ad hoc or unintended network is an autonomous assortment of mobile devices (laptops, smart phones, sensors, etc.,)that communicate with one another over wireless links and collaborate in a distributed manner so as to produce the required network practically within the absence of a fixed infrastructure. Every device in a MANET is unengaged to move independently in any direction, and can amend its links to different devices often. This type of network, operating as a complete network or with one or multiple points of attachments to cellular networks or the web, paves the approach for variable new and exciting applications. Application scenarios embrace, however are not restricted to: emergency and rescue operations, conferences are field settings, automobile networks, personal networking, etc. In wormhole attack, malicious node receives knowledge packet at one point within the network and tunnels them to a different malicious node. The tunnel existing between two malicious nodes is named as a wormhole. The tunnel gets the information from one network and replicates to different network. A wormhole therefore permits an attacker to form two attacker controlled choke points which may be utilized by the attacker to degrade or analyze traffic at a desired point.
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 30 TPIDS is a lightweight traffic prediction intrusion detection theme that tumbling the value of communication and energy by hastily detecting the behaviour of the intrusions. Some work has been done to wormhole attack in mobile unintended networks however it cause excessive false alarm rate. In this paper we are focusing on reducing warning rate by choosing optimum threshold value to save lots of wastage of energy and information measure of mobile nodes in sleuthing wormholes. The remaining components of this paper is organized as follows: section III provides traffic prediction supported ARMA, section IV provides experimental analysis and results, section V presents relation between attributes of the network and threshold values, section VI presents threshold selection, finally conclusion is conferred in section VII. 2. RELATED WORK The discussion starts by Yu Bo’s paper, that relies on the discovery of multi-hop recognition theme to detect attacks caused by the selection of transmitting the irregular packet loss. In this theme, a region of the transmission path, nodes are going to be randomly selected for testing. Detection point is going to be generated for every incident packet to the upstream transmission methods, any node within the middle, if not adequately recognized package, can generate warning data of abnormal packet loss and to submit a multi-hop to the supply node. Here, we have considered ton choosing transmission attack is taken into account, that introduces larger communications and computing prices. Then khin sandar win [6] proposes solely an analysis of detecting wormhole attack in wireless network, simply by quoting the benefits and drawbacks not suggesting for the foremost economical one. Han zhijie[1] instructed traffic prediction methodology, however he didn’t decrease the false alarm rate whereas detecting wormholes. Faizal M.A.[2] offers regarding solely a way to verify threshold values by using SPC approach that are more necessary for detection of wormholes and conjointly to scale back false alarm rate within the MANET. This observation is finished on real time network traffic having the aim of distinguishing the typical connection created by the host or hosts to single victim among one second interval. 3. TRAFFIC PREDICTION BASED ON ARMA The existing traffic prediction model includes Poisson model, Markov model, auto-regressive model where Poisson is not suitable for the flow characteristics of MANET. This paper gathers information from Markov model and enhances it in auto-regressive moving average model to predict MANET traffic and the specific prediction model which is shown below: Each and every node in MANET has its own random variable sequence X0 , X1 , X 2... is used to denote the state of the node at the same time; different nodes can be in different modes. Assume Xn = i that is nodes are in the operational mode i when it is in time domain n and also assume that the entire state transition take place at the beginning of any time domain, each node has some fixed probability in the state i .if the next state is j , then this is denoted by Pij. Pij = P Xm+1 = j | Xm =i (1) Where Pij The probability of entering the state j when a node is in the operational state i . The migration probability of second-order is defined as P2 ij that is, a node in the current state of
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 31 i will enter the state j after having two state transitions. (i.e.) This can be calculated by the following formula: The migration probability of n order is denoted as which is taken from the chapman- kolomogorov equation: P2 ij Where γ can take any arbitrary values between 0 and n. A further notation of Markov chain for probability is to use M*M matrix of P which is called as migration probability matrix. In this matrix, the element Pij represents the probability in the i th row and j th column. Here, P2 can be calculated by P*P and in general, P(m+n) =P(m) *P(n) which is similar to By migration probability matrix and the initial X0 of each node, we can build the sequence while comparing energy consumption and mobility for the entire MANET. If a node travels from ith state to sth state, then the number of time domains the node remains in the sth state is given by: Assuming that BS is the data transmissible data quantity of a node stays at state s. then after calculating the number of domains, the total data transmissible quantity is given by the formula:
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 32 And also the data of each node in the time can be calculated by equation (7).the transmissible data quantity for the total number of nodes in a cluster is given by Where Ck→ it is to represent ith node, in cluster Ck. Pis (t) → is the probability from i th state migrating to the sth state. 4. EXPERIMENTAL ANALYSIS AND RESULTS Generally, networks of nodes are created which generates its traffic randomly with specific direction and velocity. Using ARMA algorithm, traffic prediction for single node is found by equation (7) and also traffic prediction for cluster of different nodes is calculated by equation (8). Using intrusion detection system, detected traffic for each node is analyzed which results node with high traffic is finally concluded as wormhole. Further this paper focused on detecting anomalies caused by the invasion and leaving decision making and counter measures.
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 33 SCREEN SHOT 1: This screen capture shows the combined execution of both prediction data algorithm and the wormhole detection algorithm. Since the predicted data is got from the ARMA algorithm, it uses probability matrix i.e the probability of a nodes to go from state 'i' to state 'j' after time ‘t’ is shown in the above result. In order to deduce the relation between the threshold and network attributes first we have to stumble on the relationship between the varying network characteristics and the normalized data. For this we reflect on the data present in each node, number of nodes, time instants etc. Varying the network attributes like amount of data in nodes, number of nodes, number of time instants, the results have been simulated.
  • 6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 34 4.1. Analysis Using Data By varying the amount of data in each node in both prediction algorithm and wormhole detection algorithm, the total predicted data the actual data in the wormhole and the data in other nodes after certain number of transmissions is analyzed. S.NO Data in each node Predicted Data Actual data in wormhole Data in other nodes 1 2,2,2 11.88001 12 5,3 2 2,4,6 28.20005 28 3,7 3 5,10,15 43.2000 55 6,16 4 20,30,40 129.60086 170 21,51 5 60,70,80 189.000031 410 61, 131 6 50,100, 150 180 550 51, 151 Table1.Analysis Using Data This table (1) describes the relation between the predicted data and actual data in wormhole by varying the amount of data in each node. The inference is that data in wormhole is more than data in other nodes. More the increase in data in each node more will be the variation in predicted and the actual one. With this variation into concern the below graph is plotted. Fig. 1 Variance Vs Normalized data The Fig 1 is plotted against variance calculated from the amount of data in each node, and the normalized data calculated from the formula Normalized data = Predicted Data – Actual Data (9) Predicted Data
  • 7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 35 This graph infers that there is a diminishing relation between the amount of data in each node, and the normalized data which is above calculated. 4.2. Analysis Using Number of nodes By varying the number of nodes in both prediction algorithm and wormhole detection algorithm, the total predicted data, the actual data in the wormhole and the data in other nodes after certain number of transmissions is analyzed. Table 2.Analysis Using Number of nodes S. No No. of nodes Data in each node Prediction data Actual data in worm hole Data in other nodes No. of txm 1 4 20,30,40,50 1783.5 291 22, 51,110 4 2 5 20,30,40,50,60 5723.22 391 22, 51, 91 5 3 6 20,30,40,50,60,70 9007.2 551 22,52,91,110,101 6 4 7 20,30,40,50,60,70,80 25278 651 22,51,91, 111 7 5 8 20,30,40,50,60, 70,80,90 33282 811 22,51,91,111,131 8 6 9 20,30,40,50,60 5116.4 991 22,51,91,111 9 This table 2 infers that while varying the number of nodes a suitable relation is formed between the predicted data and actual value of data from which a graph is plotted. Fig. 2 No. of Nodes Vs Normalized data
  • 8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 36 This Fig. 2 infers that there is some linear relation between the varying nodes and the normalized value calculated from the above equation (9) by tagging the varying number of nodes in the X- axis. 4.3. Analysis Using Number of Time instants By varying the time instants in this table (3) a graph with some relation between the normalized data and the variable instants is plotted. This fig (3) shows a decreasing relation on comparing the normalized data and the number of time instants by labelling them in the Y-axis and X- axis respectively. The scenario of a Mobile Ad hoc network with a source node, destination node, route and wormholes is shaped in NS2 and the NAM output visualizes the node topology, connectivity, traffic or packet trace information carried out in MANET. Comprehensive analysis of node.cc and its header files should be done, alterations should be made in NS2. Then by varying the parameters one by one threshold is deduced. Table 3. Analysis using no. of Time Instants
  • 9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 37 Fig.3. No. of Time Instants Vs Normalized Data 5. RELATION BETWEEN NETWORK ATTRIBUTES AND THRESHOLD VALUES Assume different threshold values and then experiment it with a network having characteristics like number of nodes, traffic intensity, node density and also wormhole density. And then, find false alarm rates for each assumed threshold values. The detection rate performance is highest for one threshold value for this network of certain parameters. The experiment is then repeated by varying the characteristics of the network and similar threshold values with best performance are obtained. Such threshold values of highest detection rate performance are found for each network with varying parameters. A mathematical relation is then deduced between the parameters of the network and such obtained threshold values. Based on this relation, an optimal threshold value with least false alarm rate can be selected for a network with any parameter set. This experiment is simulated in NS2 and the expected result would be in the form of a mathematical expression obtained by theoretical analysis. 6. THRESHOLD SELECTION The normal and the abnormal traffic are differentiated using a threshold value. Thus suitable selection and the correct threshold value add an extra advantage for IDS to detect anomalies in the network. Selecting inaccurate threshold value will cause an excessive false alarm especially if the value is too low or if it is too high, it can cause the intrusion activity being considered as normal traffic. Most of the research does not propose a proper technique to identify the threshold technique. Here threshold is determined by dynamic techniques. Dynamic threshold technique requires prior knowledge of the network traffic before the threshold value can be selected. 7. CONCLUSION In this paper, anomaly detection and security scheme based on Markov model is used by each node in MANET to predict traffic (TPIDS). All the above analysis shows that there exists a perceptible relation obtained by altering the network attributes, with this noticeable relation it is evident that there prevails an optimal threshold based on this relation. On deriving this relation wormhole detection can be ended in single phase. This relation is malleable to the protocol
  • 10. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 38 DSDV which finds the wormhole by using shortest distance, hence in future work the optimal threshold for other routing protocols such as AODV etc can be deduced. REFERENCES [1] C Han Zhijie, Wang Ruchuang: ‘Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model’, 2012 International Conference on Solid State Devices and Materials Science. [2] Faizal M. A., Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B.: ‘Threshold Verification Technique for Network Intrusion Detection System’, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 2, No. 1, 2009. [3] Ankita Gupta,Sanjay Prakash Ranga: ‘Wormhole Detection Methods In Manet’,International Journal Of Enterprise Computing And Business Systems(IJECBS), Vol. 2 Issue 2 July 2012. [4] Moutushi Singh, Rupayan Das: ‘A Survey Of Different Techniques For Detection of Wormhole Attack In Wireless Sensor Network’ , International Journal of Scientific & Engineering Research Volume 3, Issue 10, October-2012 . [5] Murad A. Rassam, M.A. Maarof and Anazida Zainal: ‘A Survey of Intrusion Detection Schemes in Wireless Sensor Networks’ American Journal of Applied Sciences, 2012. [6] Khin Sandar Win, Pathein Gyi: ‘Analysis of Detecting Wormhole Attack in Wireless Networks’, World Academy of Science, Engineering and Technology , 2008. [7] Lukman Sharif and Munir Ahmed, ‘The Wormhole Routing Attack in Wireless Sensor Networks (WSN)’, Journal of Information Processing Systems, Vol.6, No.2, June 2010. [8] Jing Deng, Richard Han, and Shivakant Mishra, ‘Defending against Pathbased DoS Attacks in Wireless Sensor Networks’ SASN’05, November 7, 2005. [9] Llker Demirkol, Fatih Alag¨oz,Hakan Delic, Cem Ersoy. Wireless Sensor Networks for IntrusionDetection:PacketTrafficModeling[EB/OL].www.cmpe.boun.edu.tr/~ilker/IlkerDE MIRKOL_COMML_ext_abstract . pdf. [10] Onat I , Miri A. ‘An intrusion detection system for wireless sensor networks/Proceedings of the IEEE International Conference on Wireless and Mobile Computing’ , Networking and Communications (WiMOB’05) Mont real , Canada , 2005. Authors C.Susil Kumar received his B.E degree in Electronics and Instrumentation from Madras University, India in 2001 and M.Tech degree in Communication Engineering from Vellore Institute of Technology, India, in 2004. He is working as Assistant Professor in the Department of Electronics and Communication Engineering, Velammal College of Engineering and Technology, Madurai. His research interests include Wireless Communication and Ad hoc Networks. K.Aathi Dharshini is pursuing M.E Communication systems in Velammal College of Engineering and Technology,Madurai.She received her B.E degree in R.V.S College of Engineering and Technology, affiliated under Anna university, India, in 2012. Her area of interest include Wireless Ad hoc Networks. E.BabuThirumangaiAlwar received his B.E degree in Electronics and Communication Engineering from Manonmaniam Sundaranar University, India in 1998 and M.E degree in Computer Science and Engineering from Anna University of Technology, Tiruchirappalli, India, in 2010. He is working as Assistant Professor in the Department of Computer Science and Engineering, Hindusthan Institute of Technology, Coimbatore. His research interests include Wireless Communication and Adhoc Networks.