SlideShare a Scribd company logo
Minimum Cost Blocking Problem in Multi-path Wireless
Routing Protocols
ABSTRACT:
We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh
Networks (WMNs) with multi-path wireless routing protocols. We establish the
provable superiority of multi-path routing protocols over conventional protocols
against blocking, node-isolation and network-partitioning type attacks. In our
attack model, an adversary is considered successful if he is able to capture/isolate a
subset of nodes such that no more than a certain amount of traffic from source
nodes reaches the gateways. Two scenarios, viz. (a) low mobility for network
nodes, and (b) high degree of node mobility, are evaluated. Scenario (a) is proven
to be NP-hard and scenario (b) is proven to be #P-hard for the adversary to realize
the goal. Further, several approximation algorithms are presented which show that
even in the best case scenario it is at least exponentially hard for the adversary to
optimally succeed in such blocking-type attacks. These results are verified through
simulations which demonstrate the robustness of multi-path routing protocols
against such attacks. To the best of our knowledge, this is the first work that
theoretically evaluates the attack-resiliency and performance of multi-path
protocols with network node mobility.
EXISTING SYSTEM:
MULTI-PATH traffic scheduling and routing protocols in wired networks are
deemed superior over conventional single path protocols in terms of both enhanced
throughput and robustness. In wireless networks, even though the dynamic nature
of networks and resource constraints entail additional overhead in maintaining and
reconfiguring multiple routes, which could offset the benefits seen in wired
networks, research has proven that multi-path routing provides better Quality of
Service (QoS) guarantees.
DISADVANTAGES OF EXISTING SYSTEM:
Blocking, node-isolation and network-partitioning type attacks are easy to launch
and are effective in the wireless networks domain due to channel constraints and
dynamic network topologies
PROPOSED SYSTEM:
• The identification of the Minimum Cost Blocking (MCB) problem. Though we
consider MCB in the WMN setting, the problem is applicable to other wireless or
wired networks.
• Evaluating the hardness of the problem. MCB is NPhard for the low/no node
mobility scenario and #P-hard for networks with patterned node mobility. The
reduction for no-mobility is derived from the basic Set Cover problem and for
mobility scenario, from the 3SAT and #SAT problems.
• Development of approximation algorithms for the best case scenario and the
performance testing of these algorithms in different settings through random
graphs based experiments.
• Laying direction for future research to evaluate the performance of multi-path
protocols against sophisticated attacks in mobile wireless networks.
ADVANTAGES OF PROPOSED SYSTEM:
Our proposed system demonstrates the superiority of multi-path protocols over
traditional single-path protocols in terms of resiliency against blocking and node
isolation-type attacks, especially in the wireless networks domain. Multi-path
protocols for WMNs make it extremely hard for an adversary to efficiently launch
such attacks.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA
 Java Version : JDK 1.6 & above.
REFERENCE:
Qi Duan, Mohit Virendra, Shambhu Upadhyaya, Senior Member, IEEE, Ameya
Sanzgiri, “Minimum Cost Blocking Problem in Multi-path Wireless Routing
Protocols”, IEEE TRANSACTIONS ON COMPUTERS, VOL. X, NO. X,
FEBRUARY 2013.

More Related Content

What's hot (17)

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Random walk based approach to detect clone attacks in wireless sensor networks
Random walk based approach to detect clone attacks in wireless sensor networksRandom walk based approach to detect clone attacks in wireless sensor networks
Random walk based approach to detect clone attacks in wireless sensor networks
Shakas Technologies
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
IJMER
 
Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...
Nexgen Technology
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
ijsptm
 
autonomous mobile mesh networks
autonomous mobile mesh networksautonomous mobile mesh networks
autonomous mobile mesh networks
swathi78
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
I030102056063
I030102056063I030102056063
I030102056063
theijes
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer in
Iaetsd Iaetsd
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
Kunal Prajapati
 
Ramac
RamacRamac
Ramac
liangxiao0315
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
chennaijp
 
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
Nexgen Technology
 
Java capacity of hybrid wireless mesh networks with random a ps
Java  capacity of hybrid wireless mesh networks with random a psJava  capacity of hybrid wireless mesh networks with random a ps
Java capacity of hybrid wireless mesh networks with random a ps
Ecway Technologies
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
 
20
2020
20
IMPULSE_TECHNOLOGY
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Random walk based approach to detect clone attacks in wireless sensor networks
Random walk based approach to detect clone attacks in wireless sensor networksRandom walk based approach to detect clone attacks in wireless sensor networks
Random walk based approach to detect clone attacks in wireless sensor networks
Shakas Technologies
 
Cm32996999
Cm32996999Cm32996999
Cm32996999
IJMER
 
Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...
Nexgen Technology
 
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANETMLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
ijsptm
 
autonomous mobile mesh networks
autonomous mobile mesh networksautonomous mobile mesh networks
autonomous mobile mesh networks
swathi78
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
Vijay Karan
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
I030102056063
I030102056063I030102056063
I030102056063
theijes
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer in
Iaetsd Iaetsd
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
chennaijp
 
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
NETWORK CODING AS A PERFORMANCE BOOSTER FORCONCURRENT MULTI-PATH TRANSFER OF ...
Nexgen Technology
 
Java capacity of hybrid wireless mesh networks with random a ps
Java  capacity of hybrid wireless mesh networks with random a psJava  capacity of hybrid wireless mesh networks with random a ps
Java capacity of hybrid wireless mesh networks with random a ps
Ecway Technologies
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
 

Viewers also liked (19)

Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
JPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...
JPINFOTECH JAYAPRAKASH
 
Ip geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regionsIp geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regions
JPINFOTECH JAYAPRAKASH
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
JPINFOTECH JAYAPRAKASH
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
JPINFOTECH JAYAPRAKASH
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
JPINFOTECH JAYAPRAKASH
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computing
JPINFOTECH JAYAPRAKASH
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
JPINFOTECH JAYAPRAKASH
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
JPINFOTECH JAYAPRAKASH
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
JPINFOTECH JAYAPRAKASH
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysis
JPINFOTECH JAYAPRAKASH
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
JPINFOTECH JAYAPRAKASH
 
Understanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysisUnderstanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysis
JPINFOTECH JAYAPRAKASH
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
JPINFOTECH JAYAPRAKASH
 
Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...
JPINFOTECH JAYAPRAKASH
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
JPINFOTECH JAYAPRAKASH
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
JPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...
JPINFOTECH JAYAPRAKASH
 
Ip geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regionsIp geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regions
JPINFOTECH JAYAPRAKASH
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
JPINFOTECH JAYAPRAKASH
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
JPINFOTECH JAYAPRAKASH
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
JPINFOTECH JAYAPRAKASH
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
JPINFOTECH JAYAPRAKASH
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
JPINFOTECH JAYAPRAKASH
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computing
JPINFOTECH JAYAPRAKASH
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
JPINFOTECH JAYAPRAKASH
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
JPINFOTECH JAYAPRAKASH
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
JPINFOTECH JAYAPRAKASH
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysis
JPINFOTECH JAYAPRAKASH
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
JPINFOTECH JAYAPRAKASH
 
Understanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysisUnderstanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysis
JPINFOTECH JAYAPRAKASH
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
JPINFOTECH JAYAPRAKASH
 
Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...
JPINFOTECH JAYAPRAKASH
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
JPINFOTECH JAYAPRAKASH
 

Similar to Minimum cost blocking problem in multi path wireless routing protocols (20)

[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
IJET - International Journal of Engineering and Techniques
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
IOSR Journals
 
Ccn ppt
Ccn pptCcn ppt
Ccn ppt
Bhagyashree s patil
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
Alexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
chetan1nonly
 
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdfLecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
bilqesahmed60
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
IJECEIAES
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Yayah Zakaria
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Pranjal Das
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Dynamic Manycasting in Optical Split-Incapable WDM Networksf
Dynamic Manycasting in Optical Split-Incapable WDM NetworksfDynamic Manycasting in Optical Split-Incapable WDM Networksf
Dynamic Manycasting in Optical Split-Incapable WDM Networksf
AlyciaGold776
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
Vijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
Vijay Karan
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
Kumar Dlk
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
ijwmn
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
IOSR Journals
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
Alexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
chetan1nonly
 
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdfLecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
Lecture 7 Overview of Wireless Mesh Networks_Part 1.pdf
bilqesahmed60
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
IJECEIAES
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Yayah Zakaria
 
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...Performance analysis of CSMA/CA and TDMA  MAC protocols in Wireless Mesh Netw...
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...
Pranjal Das
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Dynamic Manycasting in Optical Split-Incapable WDM Networksf
Dynamic Manycasting in Optical Split-Incapable WDM NetworksfDynamic Manycasting in Optical Split-Incapable WDM Networksf
Dynamic Manycasting in Optical Split-Incapable WDM Networksf
AlyciaGold776
 
M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
Vijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
Vijay Karan
 
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing ProjectsM.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Mobile Computing Projects
Vijay Karan
 
Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...Improved eaack develop secure intrusion detection system for mane ts using hy...
Improved eaack develop secure intrusion detection system for mane ts using hy...
Kumar Dlk
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
Vijay Karan
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
ijwmn
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
Vijay Karan
 

Recently uploaded (20)

Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18
Celine George
 
How to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 InventoryHow to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 Inventory
Celine George
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
PoojaSen20
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 5-14-2025  .pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 5-14-2025 .pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
Look Up, Look Down: Spotting Local History Everywhere
Look Up, Look Down: Spotting Local History EverywhereLook Up, Look Down: Spotting Local History Everywhere
Look Up, Look Down: Spotting Local History Everywhere
History of Stoke Newington
 
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Redesigning Education as a Cognitive Ecosystem: Practical Insights into Emerg...
Leonel Morgado
 
The role of wall art in interior designing
The role of wall art in interior designingThe role of wall art in interior designing
The role of wall art in interior designing
meghaark2110
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18How to Configure Public Holidays & Mandatory Days in Odoo 18
How to Configure Public Holidays & Mandatory Days in Odoo 18
Celine George
 
How to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 InventoryHow to Manage Manual Reordering Rule in Odoo 18 Inventory
How to Manage Manual Reordering Rule in Odoo 18 Inventory
Celine George
 
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
MCQ PHYSIOLOGY II (DR. NASIR MUSTAFA) MCQS)
Dr. Nasir Mustafa
 
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
DEATH & ITS TYPES AND PHYSIOLOGICAL CHANGES IN BODY AFTER DEATH, PATIENT WILL...
PoojaSen20
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Botany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic ExcellenceBotany Assignment Help Guide - Academic Excellence
Botany Assignment Help Guide - Academic Excellence
online college homework help
 
CNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscessCNS infections (encephalitis, meningitis & Brain abscess
CNS infections (encephalitis, meningitis & Brain abscess
Mohamed Rizk Khodair
 
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptxU3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
U3 ANTITUBERCULAR DRUGS Pharmacology 3.pptx
Mayuri Chavan
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFAMCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
MCQS (EMERGENCY NURSING) DR. NASIR MUSTAFA
Dr. Nasir Mustafa
 
2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx2025 The Senior Landscape and SET plan preparations.pptx
2025 The Senior Landscape and SET plan preparations.pptx
mansk2
 
Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...Classification of mental disorder in 5th semester bsc. nursing and also used ...
Classification of mental disorder in 5th semester bsc. nursing and also used ...
parmarjuli1412
 
Final Evaluation.docx...........................
Final Evaluation.docx...........................Final Evaluation.docx...........................
Final Evaluation.docx...........................
l1bbyburrell
 
Look Up, Look Down: Spotting Local History Everywhere
Look Up, Look Down: Spotting Local History EverywhereLook Up, Look Down: Spotting Local History Everywhere
Look Up, Look Down: Spotting Local History Everywhere
History of Stoke Newington
 

Minimum cost blocking problem in multi path wireless routing protocols

  • 1. Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols ABSTRACT: We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered successful if he is able to capture/isolate a subset of nodes such that no more than a certain amount of traffic from source nodes reaches the gateways. Two scenarios, viz. (a) low mobility for network nodes, and (b) high degree of node mobility, are evaluated. Scenario (a) is proven to be NP-hard and scenario (b) is proven to be #P-hard for the adversary to realize the goal. Further, several approximation algorithms are presented which show that even in the best case scenario it is at least exponentially hard for the adversary to optimally succeed in such blocking-type attacks. These results are verified through simulations which demonstrate the robustness of multi-path routing protocols against such attacks. To the best of our knowledge, this is the first work that theoretically evaluates the attack-resiliency and performance of multi-path protocols with network node mobility.
  • 2. EXISTING SYSTEM: MULTI-PATH traffic scheduling and routing protocols in wired networks are deemed superior over conventional single path protocols in terms of both enhanced throughput and robustness. In wireless networks, even though the dynamic nature of networks and resource constraints entail additional overhead in maintaining and reconfiguring multiple routes, which could offset the benefits seen in wired networks, research has proven that multi-path routing provides better Quality of Service (QoS) guarantees. DISADVANTAGES OF EXISTING SYSTEM: Blocking, node-isolation and network-partitioning type attacks are easy to launch and are effective in the wireless networks domain due to channel constraints and dynamic network topologies PROPOSED SYSTEM: • The identification of the Minimum Cost Blocking (MCB) problem. Though we consider MCB in the WMN setting, the problem is applicable to other wireless or wired networks. • Evaluating the hardness of the problem. MCB is NPhard for the low/no node mobility scenario and #P-hard for networks with patterned node mobility. The
  • 3. reduction for no-mobility is derived from the basic Set Cover problem and for mobility scenario, from the 3SAT and #SAT problems. • Development of approximation algorithms for the best case scenario and the performance testing of these algorithms in different settings through random graphs based experiments. • Laying direction for future research to evaluate the performance of multi-path protocols against sophisticated attacks in mobile wireless networks. ADVANTAGES OF PROPOSED SYSTEM: Our proposed system demonstrates the superiority of multi-path protocols over traditional single-path protocols in terms of resiliency against blocking and node isolation-type attacks, especially in the wireless networks domain. Multi-path protocols for WMNs make it extremely hard for an adversary to efficiently launch such attacks. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB
  • 4.  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA  Java Version : JDK 1.6 & above. REFERENCE: Qi Duan, Mohit Virendra, Shambhu Upadhyaya, Senior Member, IEEE, Ameya Sanzgiri, “Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols”, IEEE TRANSACTIONS ON COMPUTERS, VOL. X, NO. X, FEBRUARY 2013.
  翻译: