IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Fault Detection in Military Communication Network Using RNS Mr. Karambir Bidhan , Tanu Singh Asst. Professor, Department of computer Engineering UIET, Kurukshetra University Kurukshetra, Haryana, India [email protected] Student, Department of computer Engineering UIET, Kurukshetra University Kurukshetra, Haryana, India [email protected]

Abstract Mobile adhoc network allows movable mobile nodes to establish a connection path for fault free communication. The fault tolerant mechanism is proposed to detect faults in Military communication network. The faults include crash faults, value faults and black holes. In this research a mechanism will be established so as to reduce overhead and increase security in the MANET. Residue number system (RNS) will detect faulty nodes in the network. This method has the capability of error detection and correction. The RNS is much more suitable for parallel structures of the system than the Binary Number System because arithmetic operations are fully independent between digits. For the implementation of proposed work the author made a new system by mixing Redundant Residue Number System (RRNS), Multi-Level Residue Number System (ML RNS) which was perfect for parallel, carry free, high speed arithmetic and the system supports secure data communication.

Keywords: - RNS (residue number system), MANET, fault detection, WSN

1.

Introduction

Wireless sensor networks are composed of an oversized range of small sensor nodes equipped with restricted computing and communication capabilities [5]. Since inexpensive sensor nodes are typically deployed in an uncontrolled or perhaps harsh atmosphere they are vulnerable to have faults. MANETS rely on wireless transmission that is the most secured manner of message transmission. Nodes in the within the need some type of identity before taking part in any type of communication [9]. Every end host within the MANET has to be unambiguously addressed so that the packets may be relayed hop by hop and delivered ultimately to the destination. A wireless ad-hoc network may be a suburbanised kind of wireless network [12]. The network is ad hoc as a result of it doesn't rely on a pre-existing infrastructure, like routers in wired networks or access points in managed infrastructure wireless networks.

Mr. Karambir Bidhan,IJRIT

368

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

Intermediate node Destination node Source node

Transmission range

Fig: 1 Architecture of WSN [12]

1.1

What is MANET?

A MANET is an autonomous collection of mobile nodes with none centralized infrastructure like base station. This network has the potential to set up itself each time once a mobile node changes its location. In any form of MANETs, reliable delivery of information to the specified destination is of major interest to users sending information across that network. The knowledge on the network won't be delivered to the destination because it is discontinuous by the system. The characteristics of MANETs impose a challenge for real time applications like multimedia system traffic that has tight information measure, delay and loss necessities [9]. Faults in MANET are vulnerable to node mobility because the primary cause. completely . Different faults are-: i) Routing Attacks ii) Resource Depletion Attacks iii) Crash Faults iv) Traffic Analysis v) Value Faults Crash Faults: - In MANET crash faulty mobile nodes are those that are unable to communicate with the rest of the system, as a result of physical harm, battery depletion or being out of range [1]. The faulty node crashes, stops functioning and sends no additional messages within the network. Value Faults: - In MANET value faulty nodes typically perform incorrect computation and communicate wrong results or values whereas processing the information packet. A value faulty node can also corrupt the header of the message.

1.2

Diagnosis Model

Ad-hoc network is initially developed for military application. Fast formation of network and survivability are key necessities in military field of battle. Military networks have three-tiered structure based on procedure and communication capabilities of the networking nodes [11]. This network comprises three main tiers as UAVs (unmanned aerial vehicle), MBN (mobile backbone nodes) and RGN tiers. The UAV tier consists of an aerial mobile backbone having UAVs in a circle with a diameter of around eight transportation miles. Second tier of the UAV-MBN network includes MBN kind nodes that are classical land force units like tanks and armored personnel carriers [11]. These vehicles have robust communication and process capabilities at the side of beam-forming antennas. Third tier of the UAV-MBN network is that the RGN tier. RGN tier contains of comprises equipped with restricted communication and computation devices. RGN tier is usually strictly infrastructure less [7].

Mr. Karambir Bidhan,IJRIT

369

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

1.1

Technique Used

The Residue number system is employed for Arithmetic computations on every moduli and is continual until each terribly tiny moduli is working using residue number system properties in increasing calculations speed, decreasing power consumption, increasing security and fault tolerance [1]. The RNS is far additional appropriate for parallel structures of the system than the Binary numeration system as a result of arithmetic operations are totally independent between digits. The bases of RNS are represented by N-tuple of integers [2] wherever every of those bases is termed a modulus. RNS obeys the following form:X= qi mi + ri where I = 1,2,………N Where x is an integer number represented in residue form. [8] The residue illustration is additionally an Ntuple outlined by a group of N equations. qi is an integer chosen in such a way that 0
Forwa rd Conve rsation

Oprends

Modul o m1 Modul o m2

Revers e Conve rsation

Results

Modulo mn

Fig 2. Structure of RNS

2.

Related Work

G. A. Ray [1] proposed that the core function provide an easily implemented and efficient means for performing the traditionally difficult residue operations. However two problems with core algorithms were the difficult in choosing core coefficients and the much iteration were required for some operations. In this paper the author presented an efficient core design method and develops multiple core algorithms which could form the basis for solving many of the difficult RNS operations. Ahmad A. Hiasat et. al [2] explained that the new algorithm for one of the long standing problems in Residue Number System namely division was presented. The algorithm was so simple. It approached the paper and pencil division procedure where the quotient was selected to guarantee a non-negative remainder. This algorithm do not require sign and overflow detection, scaling or redundant moduli. Lie-Liang Yang [3] described that scheme was presented where a set of orthogonal signals were transmitted in parallel. The signals were selected according to the so called RNS. Hence the system was essentially a multiple code parallel communication scheme using high modulation alphabets. Expressions of the error probability for the above-mentioned scenarios were presented and the associated BER performance was evaluated numerically with respect to specific system parameters. Subbiah et. al [4] elaborated that the problem of distributed diagnosis in the presence of dynamic failure and repair. Though the algorithm was developed for dynamic fault environment they assume a crash fault model without using clustering. This increases the diagnosis overhead for large class wireless networks such as MANET. The algorithm also suffered from increase in diagnosis overhead for Mr. Karambir Bidhan,IJRIT

370

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

large MANET without using clustering. The diagnosis overhead was reduced to a great extent in large MANETs using a hierarchical and adaptive clustering technique for diagnosis purposes. Xuanwen Luo et. al [5] suggested that two important problems for distributed fault-tolerant detection in wireless sensor networks: 1) how to address both the noise-related measurement error and sensor fault simultaneously in fault-tolerant detection and 2) how to choose a proper neighborhood size n for a sensor node in fault correction such that the energy could be conserved. The author proposed a fault-tolerant detection scheme that explicitly introduces the sensor fault probability into the optimal event detection process. The author mathematically show that the optimal detection error decreases exponentially with the increase of the neighborhood size. The author’s work makes it possible to perform energy efficient fault-tolerant detection in a wireless sensor network. Mourad Elhadef et. al [6] described that the role of the failure detection service was to provide information on which hosts have crashed and which ones were still alive. In this work the author introduced an adaptable failure detector (AFD) that can tolerate mobility and topology changes. The new AFD was shown to be eventually perfect by satisfying both strong completeness i.e. there was a time after which every faulty host was permanently suspected by every fault-free host and eventual strong accuracy i.e. no host will be suspected before it crashed. Viren Mahajan et. al [7] described that Wormhole refers to an attack on MANET routing protocols in which colluding nodes create an illusion that two remote regions of a MANET were directly connected through nodes that appear to be neighbors but they were actually distant from one another. The author analyzed the criterion for successful wormhole attack on a MANET. The author classified the wormhole scenarios into successful, unsuccessful, doubtful, interesting, and uninteresting. The author also defined wormhole strength and observes that the detection ratio of the technique proposed in varies with wormhole strength as well as with the network topology. Ehsan Khazaei et. al [8] described faulty sensor nodes were identified based on comparisons between neighboring nodes and own central node and dissemination of the decision made at each node. RNS system was used to tolerate transient faults in sensing and communication. In this system arithmetic operations act on residues reminder of dividing original number in several definite modules in parallel. Computations were achieved on these residues which were smaller than the original number so speed up arithmetic and decreased power consumption. The drawback of this research was that will not check the time redundancy factor using RNS which in turn increase the overload. Min-Hua Shao et. al [9] suggested that MANET are particularly vulnerable on account of its intrinsic characteristics of open medium, dynamic topology, absence of central authorities, distributed cooperation and constrained capability. These vulnerabilities create significant challenges for routing protocols operating in the entire network. A clustering architecture provides network scalability and fault tolerance and results in more efficient use of network resources. Back-propagation neural networks were used for the purpose of anomaly detection and the feature was selected from the packets. The effectiveness of the proposed scheme was illustrated by means of extensive simulations using NS-2 simulator. Agnieszka Betkowska et. al [10] elaborated that the Emerging technologies of autonomic networks impose demanding requirements on self-healing capabilities of networks. The author investigated a fault propagation model developed for the needs of a unified architecture for resilience, survivability and autonomic fault management in MANETs. In particular the author proposed a model to address the problem of frequent topology changes a common scenario in mobile ad hoc networks. Simulations showed that in such environments the proposed model can detect multiple faults with high probability. R.Sivakami et. al [11] suggested that there was a new way to increase the security of data transmission of mobile ad hoc networks was presented in that work. There was a massive increase in using MANETS for unmanned army system for both surveillance and future combat operations. Security and reliability were crucial aspects of MANET especially in security sensitive applications like military. Secure Message Transmission SMT protocol secure the data transmission phase by tailoring an end to end secure data forwarding protocol to the MANET communication requirements and increases the reliability through transmitting the messages in multiple paths with minimal redundancy. This work increases the through the removal of Byzantine Faults in the multiple paths. A binary search probing technique which is resilient to Byzantine failures caused by individual or colluding nodes is incorporated in the SMT protocol to provide more secured transmission. Predicting the nodes location and reducing the unnecessary traffic with the aid of Spatial and Temporal mining is the second phase of this work. Shabnam Parveen et. al [12] described that fault diagnosis became an important building block to establish fidelity in MANET. The parameters such as diagnostic latency and message complexity was used for evaluating the proposed diagnosis algorithm Crash fault and value faults were challenging problem in MANET. Cluster based architecture was used for diagnosis the fault. The dynamic environments of nodes were used in mobile ad hoc network. Crash faults occurred due to out of transmission range, battery depletion or Mr. Karambir Bidhan,IJRIT

371

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

physical damage. Value faults occurred due to improper communication of nodes. The drawbacks of those approaches were poor clustering algorithm and large failure detection time. Basil Etefia et. al [13] proposed a new approach which allow the nodes of NDNs to take advantage more easily to broadcast capabilities found in many of today’s networking devices while also avoiding many of the problems and inefficiencies that exist within IP networks. This paper presented an emulation analysis of NDN aided military communication networks. Philip B. Charles et. al [14] elaborated that UAV could be used as military communications relays to supplement the capabilities offered by satellites. The main purpose of the research was to provide a test-bed for potential navigation algorithms written in MATLAB in an environment that could simulate the movement of the UAV mobiles and the communications links. This paper outline the requirements of the simulation environment and described how it was implemented. It then described the models used for each of the objects and where appropriate states the key equations used in each model. Kulvinder Singh et. al [15] considered the problem of identifying faulty host by fault free ones. This paper reviewed the history of fault diagnosis in networks. Node faults may be frequent in a mobile ad-hoc network. This survey integrated the vast amount of research efforts that were produced in that field from the earliest theoretical models to new promising applications.

3. Proposed Work Earlier work related to fault detection approach in MANET was based on DSDP (distributed self-diagnosis protocol) algorithm which identifies both crash faults and value faults in finite amount of time in heartbeat. This work uses the clustering technique using Hi-ADSD. The drawback of this method was it was not applicable for parallel execution of the algorithm which enforces to propose a new method to overcome the problems occurred. New approach for Fault detection is based on RNS (residue number system). This approach is applied on Military communication network. The RNS system can be used for larger manipulations such as addition and subtraction of nodes in network and transfer of data between the networks. This approach is used to reduce overhead and increase security in the network. In this system the author present a method for detecting faults and black hole attack using residue number system for mobile systems and wireless networks based on peer to peer paradigm. In proposed method the author made a new system by mixing Redundant Residue Number System (RRNS), Multi-Level Residue Number System (ML RNS) which was perfect for parallel, carry free, high speed arithmetic and the system supports secure data communication. It had ability of error detection and correction in comparison to other number systems.

References [1] G. A. Ray “Multiple Core Algorithms For Residue Number Systems” IEEE, 1990 [2] Ahmad A. Hiasat and Hoda S. Abdel-Aty-Zohdy “A High-Speed Division Algorithm For Residue Number System”, IEEE, 1995 [3] Lie-Liang Yang “A Residue Number System Based Parallel Communication Scheme Using Orthogonal Signalling: Part II—Multipath Fading Channels” Transactions On Vehicular Technology, Vol. 51, No.6, IEEE, Nov 2002 [4] A.Subbiah and Douglas M.Blough “Distributed Diagnosis in Dynamic Fault Environment”, Transactions on parallel and distributed system, IEEE, 2004 [5] Xuanwen Luo, Ming Dong and Yinlun Huang “On Distributed Fault-Tolerant Detection in Wireless Sensor Networks” Transactions On Computers, Vol. 55, No. 1, IEEE, January 2006 [6] Mourad Elhadef and Fahim Abdun-Nur “An Adaptable Crash Faults Detector for Mobile Ad-Hoc Networks” 21st International Conference on Advanced Information Networking and Applications Workshops IEEE, 2007 [7] Viren Mahajan, Maitreya Natu, and Adarshpal Sethi “Analysis Of Wormhole Intrusion Attacks In MANETs” ,IEEE, 2008 [8] Ehsan Khazaei and Ali Barati “Improvement of Fault detection in wireless sensor networks” published in ISECS, 2009 [9] Min-Hua Shao, Ji-Bin Lin and Yi-Ping Lee “Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET” 10th IEEE International Conference on Computer and Information Technology, 2010 [10] Agnieszka Betkowska Cavalcante and Monika Grajzer “Fault Propagation Model for Ad Hoc Mr. Karambir Bidhan,IJRIT

372

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 368-373

Networks”, IEEE Communications Society, 2011 [11] R.Sivakami and Dr.G.M.Kadhar Nawaz “Secured Communication for MANETS in Military”, International Conference on Computer, Communication and Electrical Technology – ICCCET 18th & 19th March, 2011 [12] Shabnam Parveen and Avni Jindal “Survey of Cluster based Adaptive Distributed Fault Diagnosis in MANET” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 4, April 2013 [13] Basil Etefia, Mario Gerla and Lixia Zhang “Supporting Military Communications with Named Data Networking: An Emulation Analysis”, IEEE, 2013 [14] Philip B. Charles worth “Simulating Missions of a UAV with a Communications Payload” International Conference on Computer Modelling and Simulation, 2013 [15] Kulvinder Singh and Aditi “Survey On Fault Diagnosis In MANETs” International Journal of Software and Web Sciences 2013

Mr. Karambir Bidhan,IJRIT

373

Fault Detection in Military Communication Network ...

[7] Viren Mahajan, Maitreya Natu, and Adarshpal Sethi “Analysis Of Wormhole Intrusion Attacks In. MANETs” ,IEEE, 2008. [8] Ehsan Khazaei and Ali Barati “Improvement of Fault detection in wireless sensor networks” published in ISECS, 2009. [9] Min-Hua Shao, Ji-Bin Lin and Yi-Ping Lee “Cluster-based Cooperative Back ...

56KB Sizes 7 Downloads 185 Views

Recommend Documents

Fault Detection in Military Communication Network ...
... mobile nodes to establish a connection path for fault free communication. The ... speed, decreasing power consumption, increasing security and fault tolerance [1]. .... The drawback of this research was that will not check the time redundancy.

COMPUTATION OF FAULT DETECTION DELAY IN ...
event of type Σfi , L may still be diagnosable as ... servation as st should be faulty in terms of type. Σfi. Note that ..... Proc. of CDC 2002, IEEE Conference on De-.

Abrupt Change Detection in Power System Fault ...
Jun 23, 2005 - (FDI) systems; one such domains viz., power systems fault analysis is the .... between zero hertz and half the data sampling frequency. The.

Robust Subspace Based Fault Detection
4. EFFICIENT COMPUTATION OF Σ2. The covariance Σ2 of the robust residual ζ2 defined in (11) depends on the covariance of vec U1 and hence on the first n singular vectors of H, which can be linked to the covariance of the subspace matrix H by a sen

Maximum Network Lifetime in Fault Tolerant Sensor ...
The sender node uses erasure coding and splits each packet into multiple fragments and transmits the fragments over multiple parallel paths. The erasure ...

Dynamic collaborative in-network event detection in ...
Springer Science+Business Media New York 2015. Abstract Many ... This framework enables a flexible number of sensor nodes ...... Small scale. Large scale .... 800. Event detection delay(ms). Fig. 12 Delay in the 400-node network.

A Fault Detection and Protection Scheme for Three ... - IEEE Xplore
Jan 9, 2012 - remedy for the system as faults occur and save the remaining com- ponents. ... by the proposed protection method through monitoring the flying.

Spatio-temporal Pattern Modeling for Fault Detection ...
has grown an average of 15% per year. This steady ... function of 25%-30% per year [1]–[3]. To improve wafer ... Computer Science, ASRI Seoul National University, Seoul, Korea (e-mail: ...... is currently a candidate for the Ph.D. degree in the.

Fault Detection Using an LSTM-based Predictive Data ...
data set with labeled faults, we used an LSTM architecture with a forecasting error threshold to ... data. Numerous approaches to fault detection (FD) in industrial and other types of multivariate time series have been proposed: classic methods like

Detection of Masquerade Attacks in Wireless Network
2 Lecturer, BTL Institute of Technology & Management, ECE Dept., ... Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of.

Distributed Online Simultaneous Fault Detection for ...
paper presents a distributed, online, sequential algorithm for detecting ... group of sensors. Each sensor has a ... We call this change point detection. In order for ...

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

qualitative fuzzy model-based fault detection
fuzzy model based observer (FMBO) that compares the qualitative prediction with the measured or estimated ..... HVAC buildings in order to provide security and self maintenance at low cost. In. [13] a quasi-real time .... AFSHARI, A., FAUSSE, A. and

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

Detection of Masquerade Attacks in Wireless Network
2 Lecturer, BTL Institute of Technology & Management, ECE Dept., Bangalore, Karnataka, India. [email protected] , [email protected]. Abstract. Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attac

Detection of Masquerade Attacks in Wireless Network - International ...
1.4 WEB Spoofing. When malicious action causes the reality of the browsing session to differ significantly from the mental model a sophisticated user has of that session. It allows the attacker creates misleading context in order trick the victim for

Detection of Masquerade Attacks in Wireless Network
This paper briefly discussed types of attacks in wireless network and mainly how .... Most of the time, an internet service provider (ISP) registers the client's MAC ...

Network-Based Intrusion Detection in Eucalyptus ...
the working of an NIDS system and Snort, in a Eucalyptus private cloud environment. ... get into the system. Without a suitable intrusion detection mechanism, cloud users may not be able to assure that the service is thoroughly secure which may, in t

Credit Card Fraud Detection Using Neural Network
some of the techniques used for creating false and counterfeit cards. ..... The illustration merges ... Neural network is a latest technique that is being used in.

Masquerade Detection Using IA Network
lenge to the computer security, where an illegitimate entity poses as (and assumes the identity of) a legitimate entity. The illegitimate user, called masquerader ...