ARCHIVES(Journal of Harmonized Research in Engineering)


Title: PREVENTION MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE AD HOC NETWORK
Author: Harsh Pratap Singh and Rashmi Singh
Keyword: Black hole attack, Jamming attack, MANET, Network Simulator
Page No: 01-07
DOI: 10.30876/JOHR.8.1.2020.01-07
Abstract: Mobile ad hoc network (MANET) is more susceptible to severe kind of security threats like denial of service attack, black hole attack, jamming attack and Sybil attack because of its dynamic behavior a nd lack of central administration. In such network any number of nodes can join or leave the network easily. In this paper, focuses on the prevention of black hole and jamming attack which is one of the serious threats. Black hole node advertises itself that it has the shortest route to destination while jamming occurs due to uninterrupted radio waves to put down the transmission between receiver and sender. We propose IDPS (Intrusion Detection and Prevention Scheme) scheme to thwart the black hole node and Distributed monitoring mechanism to choose monitor nodes responsible for identifying channel accessibility. The proposed security scheme is able to handle the jamming attack conditions and resolve the problem of link blockage from jamming. The simulation & analysis of proposed work is performed on NS-2.34 network simulator and it is found that our proposed scheme outperforms in prevention for black hole and identifying the jamming nodes.Download PDF


Title: A LITERATURE REVIEW ON POWER LINE COMMUNICATION (PLC) AND THEIR APPLICATIONS
Author: Devendra Singh and Alka Thakur
Keyword: PLC, Channel model, Smart Grid, Multiple scheme.
Page No: 08-15
Abstract: Power line communication (PLC) is mostly intended for carrying not merely the electric power but also the data over the conductors and as the application amends so do the need to alter the technologie s, like the prerequisite to alter the technology in case of home automation and for internet access and in order to produce a adequate level of separation among them, they are ordinarily differentiated by means of frequency alteration. In general, the transformer existent at the substation generally prevents the propagation of signal. Data rates and the distance differ in accordance with power line communication standards. For the power line communication various authors or researchers presented their views and technology. In this paper, we present the literature survey on the power line communication technology. Download PDF


Title: STUDY ON SECURITY ISSUES, CHALLENGES AND SOLUTIONS OF INTERNET OF THINGS (IOT)
Author: Manoj Verma and Dr. Jitendra Sheetlani
Keyword: Internet of Things, Security, Challenges, threats, IoT
Page No: 16-22
Abstract: Internet of Things (IoT) is an innovative automation and analytics system which exploits networking, sensing, artificial technology and big data to provide comprehensive system for product or services . An IoT offers better transparency, performance, and control when smeared to whichever Industry or system. The IoT system aspires to link anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers Due to unique flexibility and suitability to work in any environment it is widely used for many applications. Security is the major issues in this because of their flexible behavior. It also does not fulfill the security requirement of the network as Cisco said this system will be used extensively in forthcoming years. This paper presents the survey on security issues challenges and their solution at each layer of the IoT.Download PDF