Saturday, August 31, 2019

Agiesm

Myths can be considered a common way for society as a whole to develop stereotypical Judgments upon the elderly community. Myths create negative attitudes that often create discrimination within society that enhances untruths about the elderly population. In order to see the myths that hinder society as a hole taking a look at what ageism Is is in fact beneficial to bring truth to the table. What Is ageism? Ageism Is a social attitude that has created myths wealth society that have endorsed society's stereotype of aging adults within communities.Myths are can be generated by many things such as demeaning comments passed on from person to person or by simply turning on the television and seeing negative adaptations of what life Is like as an elderly person. â€Å"Many social psychologists and gerontologists cite the media as a major source of negative stereotypes of the elderly' (Martin, 2007) (up. 141). Fear of growing old can generate the social attitudes seen in ageism that brings about negative behaviors to cloud people's Judgments and ultimately result In myths. Language is one of the most pervasive ways that ageism exists and persists In our society' (Wilkinson, Ferreira, & Nelson, 2004, up. 341-342). Terms used in daily conversations such as; old people, grumpy old men, they can't do it they are to old are all types of languages that support ageism in society today. Interventions and strategies with ageism are to educate the public on the rigorousness of discrimination and taunting language directed towards our aging adults.In today's societies many options are available for the elderly to seek refuge in these times of need. According to Martin (2007), † contrary to the common belief of many in the United States, most elderly individuals remain in their homes until death and are cared for by family members† (up. 142). In some situations a family member may move their aging relative or loved one into their homes to make it easier for them to m aintain constant care needed on a twenty- four hour basis. Retirement communities offer numerous accommodations that assist ND care for aging adults in a setting that creates an active lifestyle.Some communities offer clubs, crafts, physical health classes, cooking facilities, pools, beautiful landscapes to walk in and anything else that will empower yet keep a well balanced lifestyle. â€Å"Government subsidized senior housing can make housing costs more affordable for the elderly population, whether in the form of a subsidy provided directly to the elderly in form of tax credits, loans, or rental vouchers, or subsidies provided to the housing community, which passes on this discount to the enter† (Martin, 2007) (up. 143).Finally there is assisted living facilities (ODL) designed to accommodate individuals who need around the clock care and assistance. This option of residency is an apartment typesetting that is based around structured living. In an (ODL) environment there w ill be all types of assistance to various needs from the residence in the forms of eating, bathing, walking, exercising, getting dressed and even help with taking medications on time. Most (ODL) communities will have Can's (Certified Nursing Assistants) as well as on tie Urn's (Registered Nurses) that provide most of the assistance needed for care.

Friday, August 30, 2019

Han china and imperial rome Essay

Rome was very successful because of its superior military authority. That is the main influential factor that cemented Roman power for nearly a thousand years. They had several advantages – rapid development of the latest technology and vast numbers of infantry along with a stable senate system and much wealth to fuel their ambitions. It had sewers to control waste, aqueducts for plumbing and paved roads for transport – which many other nations simply did not have. Rome had a large assortment of choices when it came to battle. Their army usually consisted of Hastati, Principe’s or Legionary Cohort in the later years – marvelous soldiers and very useful ones to say the least. Having said this, they had access to exceptional horses as well and it was this mixture of troops that was a deciding factor in conflicts. Rome used its sheer force of numbers to overwhelm most enemies and surround them or cave in on their flanks causing a route very quickly. Mind you, tactics were used, but not effectively. The Romans took advantage of technological progressions and were only to happy to inflict deadly harm upon their foes with ballistae, catapults, onagers and numerous other siege equipment. The land they conquered poured much profit into the treasury which was distributed to the armed forces. This was able to give them the latest weapons, brand new armour, plenty of supplies and good morale. You can also look at the sheer amount of land they claimed through war – the empire covered Spain, France, Italy, Greece, Turkey, parts of the Middle-East, Egypt, and the Africa coastline. Finally, the Romans brought the ideology of Christianity to the people in Europe – influencing the events that were to proceed in the future greatly, something that has changed the world today. They will be looked upon in 1000 years (during the Middle Ages) with their beliefs, attitudes, values, lifestyle and ingenuity being emulated.

Thursday, August 29, 2019

Leadership in Workplace Research Paper Example | Topics and Well Written Essays - 1500 words

Leadership in Workplace - Research Paper Example Trust is the basis for success in every interpersonal association, both individual as well as social. Trust is the assurance or confidence an individual feels for a particular person or group. Thus, trust is one of the most important connecting forces in any interpersonal association. It allows individuals to rise above uncertainties and have peace of mind. The lack of trust creates uncertainty, concern, and apprehension. When interpersonal trust is there, a person experiences an assurance that everything will work out in some way. At the place of work, trust is a must for successful interpersonal interactions. Lacking trust, workers may experience ambiguity, anxiety, and a sense of uncertainty. No association, on individual or social level, can survive for even a small period of time if some aspect of trust is not there. Trust is an important leadership training component that unites any human association into a successful, effective partnership. Importance of Building Trust â€Å" Trust is an emotional as well as a rational act† (Reina & Reina, 2006). The emotions linked with it consist of friendliness, appreciation, safety, assurance, recognition, awareness, esteem, admiration, fondness, positive reception, satisfaction, and contentment - all of them essential components of psychosomatic wellbeing. â€Å"The logic of it is grounded in assessments of a party’s dependability, which play a significant role in decisions to trust† (Bednarz & Pawlak, 2011). As anticipated, there are various intensities to trust, reliant on why one gives trust as well as why it is acknowledged: identifying the different forms of trust informs decision making on every level. Within organizations, business processes are carries out by means of interaction. In view of the fact that trust is the basis of successful dealings, it makes sense that organizations can gather advantages from reinforcing it. In fact, high-trust situations associate completely with high leve ls of human resources participation, dedication, and organizational accomplishment. Certain benefits incorporate better assessment; accelerated development; better modernization; encouraging, transparent associations with employees and other shareholders; improved teamwork and collaborating; completely aligned structures and methods; sharp reliability; dominant involvements of flexible energy; strong improvement, commitment, assurance, and devotion; enhanced implementation; better adaptableness; and robust maintenance and replacement of well-informed staff. â€Å"Nothing is as relevant as the ubiquitous impact of high trust† (Bednarz & Pawlak, 2011). Trust - A Key Leadership Ability In companies, executives are originators of trust and are required to play a vital role in finding out its general level as well as particular beliefs in individual work units. Their capability to start, develop, expand, and reinstate trust is a most important managerial proficiency. A number of i ndividuals say that expanding trust is the primary job of every manager, to be carried out in ways that release the flair, imagination, aptitude, and involvement of individuals as well as teams and allow them to offer their best in synergy with others. The tasks of leaders cover five

Wednesday, August 28, 2019

Policy Agenda Essay Example | Topics and Well Written Essays - 3250 words

Policy Agenda - Essay Example Agenda setting can be a compound phenomenon. Indeed, the dominant metaphor in modern agenda-setting studies has been the "garbage can model of choice," in which streams of troubles, policies, and politics flow autonomously until the right combination of them guided to a "policy window" in which decisions can be made (Kingdon 1997, Baumgartner and Jones 1993, 2002). as these concepts were developed in studies of agenda setting in the United States, one should be cautious in pertaining them to other polities, particularly since parliamentary democracies typically feature more specific party policy commitments, better executive-legislative dexterity, and greater stress on less overtly visible interest group-executive contacts, amongst other things. In short, most other liberal democratic polities perhaps lean more toward the organization end of what has been called "organized anarchy" than does the United States. This is not to refute that there exists a "policy primeval soup" (Kingdon 1997) in each. though they use overlapping terms, there is not complete agreement amongst analysts about the major concepts, extent, and processes of agenda setting. generally, the agenda-setting literature can be separated into two major theoretical approaches, which resemble the pluralist and elitist schools of thought (Petracca 1990). The pluralist loom emphasizes the role of the public, interest groups, and the media in emergent the political agenda (Downs 1972). In contrast, the elitist approach to agenda setting sees the main initiatives coming from government officials as well as policy communities; other elements mainly act as veto groups (Kingdon 1997). Perhaps as the research stems from a U.S. base, neither orientation rates political parties extremely in the agenda-setting process. Cobb, Keith-Ross, and Ross ( 1976) give a bridge across these two approaches by positing three models of agenda setting outside inventiveness, mobilization, and inside initiative. The first is mass to elite, t he subsequent elite to mass, and the third elite to elite only. Major element of agenda setting is the procedure of problem identification/problem structuring of the policy issue. How a policy issue is prepared and identified in this initial stage will settle on the direction and content of the public discourse and the proposed solutions as it moves through the residual

Tuesday, August 27, 2019

Constitutional Issues Term Paper Example | Topics and Well Written Essays - 750 words

Constitutional Issues - Term Paper Example Her participation in this peaceful demonstration was more than moral—it was admirable and spirited and patriotic. There is an infringement of constitutional privileges of Lisa thus she stands a chance of getting legal remedy from courts. The court is one organ that must ensure the constitution is adhered to and respected by all. To extent, NRP events do not warranty constitutional uproar. This is because according to the NPR spokeswoman Anna Christopher; Simeone actions were against NPR's morals code. The code provides that "NPR journalists may not partake in marches and rallies" concerning issues NPR covers. The code notes that some requirements may not concern to outside providers. It uses an outworker who principally contributes arts reporting as an example. In the precedent year, NPR has come under inquiry for its dismissal of news forecaster Juan Williams after he supposed on Fox News that he was challenging on a plane with somebody wearing clothing that spots them as Mus lim. At the moment, NPR said William’s remarks violated its code of ethics by engaging in media "that support punditry and rumor rather than fact-based investigation." The system has been sensitive to allegations that it carries an open-minded bias. An NPR chief administrative was forced to quit; after a conventional activist posted a film online of NPR's chief charity performance, complaining about the tea party's pressure on the Republican Party. The case is a code of ethics verses constitution freedom. What is in the text of the Constitution that gives the Supreme Court authority under the Constitution to review an act of Congress? Section 2 of the constitution grants the Supreme Court unique jurisdiction in cases involving ambassadors, congress and consuls. It is true that the constitution grants that we have the right of free speech, however, that right is not unrestricted. It has frequently been curtailed in situations which generate a danger to others and when the comm unication defames others; as declared in libel and slander laws. This law, however, does not advocate infringing free speech; it advocates that our voted officials utilize their free speech rights in a responsible manner. What constitutional doctrine gives the Court the power to interpret whether the act is a valid exercise of Congressional power? In some cases, the Supreme Court has merely appellate jurisdiction that may be checked by the Congress. The legislative body may not, however, alter the Court's original jurisdiction, as was established in Marbury v. Madison, 5 United States Cranch 1803; the same verdict which established the code of judicial review. Marbury apprehended that Congress can neither increase nor restrict the inventive jurisdiction of the Supreme courtyard (Epstein, Walker & Thomas, 2007, pp 451). However, the appellate authority of the Court is diverse. The Court's appellate authority is given "with such exemptions, and under such system as the Congress shall constitute. What is in the text of the Constitution that may be argued to give Congress the power to enact the health care law? A provision of the foundation recognized as the â€Å"commerce clause† offers Congress power to â€Å"control commerce among the numerous states.† There is a long stripe of Supreme Court decisions making that Congress has wide power to enact laws that considerably affect prices, market locations,

Monday, August 26, 2019

CORPORATE FINANCE - MODULE 6 MINICASE Essay Example | Topics and Well Written Essays - 2750 words

CORPORATE FINANCE - MODULE 6 MINICASE - Essay Example This means that it generates enough cash to recover the cost of investment and the return that the investors want. If both franchise L and S are independent, then both of them should be accepted as both of them have a positive NPV. On the other hand, if they are mutually exclusive, then franchise S should be selected, as it gives a higher NPV value. (3) Would the NPV's change if the cost of capital changed (Ehrhardt & Brigham, 2006) The NPV inversely depends on the cost of capital. Therefore, if NPV increases then the cost of capital decreases; and, if the NPV decreases then the cost of capital increases. d. (1) Define the term internal rate of return (IRR). What is each franchise's IRR (Ehrhardt & Brigham, 2006) The IRR is the discount rate at which NPV is equal to zero. Expressed as an equation, we have: IRR: = $0 = NPV. 0 18.1% 1 2 3 | | | | -100.00 10 60 80 8.47 43.02 48.57 $ 0.06 $0 Franchise L's IRR is 18.1%. 0 23.6% 1 2 3 | | | | -100.00 70 50 20 56.63 32.73 10.59 $ (0.05) $0 Franchise S's IRR is 23.6% (2) How is the IRR on a project related to the YTM on a bond (Ehrhardt & Brigham, 2006) As the YTM is the promised rate of return on a bond, the IRR is the expected rate of return on a project. (3) What is the logic behind the IRR method According... Independent projects are those whose cash flows are not affected by the acceptance of another project. On the other hand, mutually exclusive projects are those whose cash flows are affected by the acceptance of another project. The rationale behind the NPV method is that if NPV=$0, then the project breakevens in a financial sense (but not in the accounting sense). This means that it generates enough cash to recover the cost of investment and the return that the investors want. If both franchise L and S are independent, then both of them should be accepted as both of them have a positive NPV. On the other hand, if they are mutually exclusive, then franchise S should be selected, as it gives a higher NPV value. IRR measures a project's profitability in the rate of return sense: if a project's IRR equals its cost of capital, then its cash flows are just sufficient to provide investors with their required rates of return. An IRR greater than r implies an economic profit, which accrues to the firm's shareholders, while an IRR less than r indicates an economic loss, or a project that will not earn enough to cover its cost of capital. No, the IRR wouldn't be affected by a change in the cost of capital. It should be noted, however, that the acceptability of the IRR may change if the cost of capital changes. For example, franchise L would be rejected if the cost of capital increases beyond 18.1%. (2)

Sunday, August 25, 2019

Book Critique on The Geography of Genocide Essay

Book Critique on The Geography of Genocide - Essay Example In his book, Allan D. Cooper also focuses and provides due emphasis on a unique perspective of genocide, that was never researched before. In this book, he explains the reason of genocides occurring mostly from ‘territorial interiors’ and never originating from any urban cosmopolitan hub or centers. This precious book has been published by the United Press of America. The book is really a treasure of knowledge and the systematic representation of facts and research materials which Allan tried to portray makes it all the more interesting. The book is divided into six chapters and two appendices, which step by step, puts forward the thesis of the author presented in the book. The six chapters are very symmetrical in terms of content. Chapter 1 deals exclusively with the meaning and understanding of the term genocide and it is named as ‘Defining Genocide’. The chapter defines genocide both in its social as well as political perspective. Here, author reminds us about the contention put forward by Raphael Lemkin regarding the term ‘genocide’. Chapter 2 is named as ‘Constructing Difference’ and it focuses on the issue that is very much relevant to the entire topic of discussion. This chapter explains whether there is any certainty about the cons tructions of â€Å"social identity† and analyzes whether this social identity truly lead to genocide in reality or not. At the last segment of this chapter, Allan explains how the concept of â€Å"creating others† plays a vital role in committing genocide and how the â€Å"imagined communities† make genocide unavoidable. In this chapter, the author also pits forward another vital point that the process of creating â€Å"other† does not solely depend upon the structures of religion, nationality, and race or on ethnicity. What is more serious or the constant thread running down all

Saturday, August 24, 2019

How to Use Facebook Assignment Example | Topics and Well Written Essays - 1000 words

How to Use Facebook - Assignment Example You first need to fill out a sign-up form which needs you to enter your first and last name, address, birthday, and finally, your gender. You would be required to come up with a password and an email which you will use to log in into the Facebook account. Verify your account: once you have completed the process of creating the account, you will see a message on the newsfeed at the top of the page notifying you that an activation email has been sent to the address you signed up with. Once the account is verified, you can commence making use of Facebook. By clicking the ‘Edit Profile link which underneath your picture in the top-left corner, you can add information your Facebook accounts such as relationship status, hometown, current home, favorite quotes, religious views, and political views. Next, is reviewing your available options. This menu permits you to modify the basic privacy settings that affect your whole Facebook account. Customizing your settings can assist you to keep personal information private. This is because as a result of the social nature of Facebook, persons have a tendency of posting a lot of personal information (Harri, 2104). Enter the name, phone number of the person into the search bar and search. Click the results from the list and then click the button ‘Add friend.’ When the other person accepts the friend request, you automatically become friends (Harri, 2104). Respond to friend requests. Since you have started to use Facebook, you will also receive friend requests from other users and you can accept or decline the request. Next, to each request, you will observe the number of mutual friends you have with that particular individual. You can also like pages on Facebook. Begin by searching for musicians, artists, businesses, famous people, organizations, and more using the Facebook search bar.  

Are genetically modified crops more harmful than beneficial to the Research Paper

Are genetically modified crops more harmful than beneficial to the environment - Research Paper Example It reviews scientific literature to investigate whether the genetically engineered crops are more harmful or more beneficial to the environment. Reports on scientific research and analyses have offered varied opinions on the impacts of genetically modified crops on the environment. A research initiative by Powel et al on the effects of genetically modified crops on their immediate soil identifies temporary effects on lives around the crops. The effect lasts for less than a year, especially when the crops are grown only once in an area. The crops are also associated with lowering the rate of organic compounds’ decomposition in soils for retention of primary nutrients in the soils to ensure a stable food chain that begins with plants. This therefore identifies advantages of genetic modification towards food security in an ecosystem (Powel et al, p. 394). Research by Brookes and Barfoot on the environmental effects of genetically modified crops also identifies significant benefits of the engineering. According to their research results, application of genetically modified crops that are resistant to weeds and insects have reduced the general trend in application of chemical based herbicides and pesticides to lower environmental pollution due to the involved chemicals. This has in effect promised a reduction of green house gas emission to environmental safety (Brookes and Barfoot, p. 193). The effect of the genetically modified crops’ ability to kill insects and weeds that threatens the crops is also a source of the technology’s harmful impacts on the environment. The crops for example extend their potential and kills insects and weeds that do not affect them. As a result, the genetic engineering leads to unnecessary destruction of abiotic factors. This harm is more significant if it affects insects or weeds with environmental value. The toxicity of the crops is similarly

Friday, August 23, 2019

Social determinants of health Essay Example | Topics and Well Written Essays - 1500 words - 1

Social determinants of health - Essay Example Remarkably, the health situation in Australia is extraordinary and impressive in most aspects compared to other neighboring countries; however, the cancer issues continue to multiply creating the need to counter them and understand those affected for utter support. Definitely, cancer is an ailment that changes lives of most people with the survivors having positive outcomes resulting from well adjustment over time; nonetheless, there are still those that face daily challenges. The common health problems that result from cancer include weariness, aching, sexual complications, despair, apprehension and frame of mind deficiency; largely, these problems appear to be the core disruptors of the affected lives but the most frustrating are the social struggles (AIHW 2010). Typically, while undergoing treatment, most cancer patients are able to change their morals and objectives, perspectives on life and how they relate with others as part of the social development program: however, there are barriers such as occupational challenges, hitches with insurance and health worries that also negatively affect their social lives hence there still lacks a sheer solution. This article gives a brief analysis of the social impact on cancer evaluating the different social determinants of health relevant to the cancer and low socio-economic groups in Australia. Currently, cancer is the leading burden disease in Australia and has dominated for the last eleven years; the burden is a result of lives lost over the years due to premature death and disabilities from prostate, colorectal, breast, lung and melanoma cancers (CVA 2013). Occupational and social environment aspects of the infected affect the mortality rate; however, these are not the only core contributors but they are key determinants of a significant number of dissimilar cancers. The occupation determinant is about the exposures that people face in their workplaces; for instance, some of the machines and equipment used

Thursday, August 22, 2019

Banking internarnal analysisl and exte Essay Example for Free

Banking internarnal analysisl and exte Essay Australia’s banking history can be described in four eras, the private banks, the commonwealth banks, the reserve bank and deregulation. Australian’s first bank was founded in 1817, the Bank of New of New South Wales. The main purpose of this bank is to take deposits and re-loaned the money by providing discounts of exchanged. Since there is no central bank, each private bank are taking their own risk and a lot of private banks stood and fall from its credit. As long as the bank’s assets were believed to be credible, its notes were freely accepted until the alarming incident happened. Two Thirds of the total banking Assets in Australia closed because of the failure of fraudulent land banks in Victoria triggered a wholesale run on banks. On the Commonwealth Bank Era, the crisis increased for the formation of central bank which will provide support to other banks backed by the resources from the people. Banking became more controlled with the central bank providing the overdraft rates. The Reserved Bank Era came and the influence of central bank was transferred to the reserved bank. In this time finance companies were growing quickly, the bank can lend on anything from appliances to cars, houses and companies. The investors generated huge profit on interest and fees but this became unsound when they realized that these profits are only papers since most loans were not collected. A lot of banks closed and other banks were taken by their mother company. Between 1982 and 1985 a deregulated system was established, these encourages more competition and banks reduced their rates to establish a market share because of these a number of banks collapsed and a new wave of managers took over the banks and created a system that by charging high rates to their good customers to make out for the losses. Australia’s big banks today have learned their lessons. Two of which are Hsbc bank a bank well known for its strategy to know where the growth is, connect customers, businesses and economies to be successful which will eventually encourage people to realize their ambitions and goals in life and Westpac which is a customer centric bank that provides assurance and confidence to their retails and investment business. Content: Macro environment Factors: PEST Analysis Political and Legal factors The Australian Government policies and the reserved bank of Australia greatly influence the banking sector with its reforms. Australia’s banking system is changed to a variety of measures to promote competition (Treasury, 2013). Reforms such as prohibition of mortgaged fees for home loans; this will encourage the people to avail bank loans. Credit card reforms were also made by the Australian Government to make it easier to credit cardholders to move their financial account to other financial institution. The impact of such is to will stimulate the people to invest. Depending on the situation of the country other policies such regulation of interest rates, prime lending rate and bank market operations are also influenced by the government. Having a control on this financial institution will put the Government in a better position to improve Australia’s economy. Economic factor The Government is aware that being a full time student is challenging enough to worry about money, since it has a control over the bank fees and operation all student account were free of service fees. This will encourage students to open bank accounts and use the facility of the bank without any additional fees. If economical banking is encourage then more deposits will be attracted towards the bank and in return the bank can invest to other financial sector making the economy to rise. Social Factors To adopt a social progress in the banking sector it is important to understand what stimulate people to bank such as economic development, reliable social justice and independent political system. Basically, banks were put up to provide support to those who are economically weaker section of the society and also provide financial assistance to all sectors of the economy with flexible payment terms. Nowadays, the bank provides various types of loans to professionals, working women, traders and students. Banks also have elite clients or huge companies that require a more personalized service. There are additional expenses in doing so but the bank still earns revenue because of the kind of business they bring to the bank. Technology Since the banking sectors are serviced based business, technology plays a vital role in its operation. Today, the banks are aggressively adapting to new technologies in creating new products and services. Because of innovation bankers were encouraged to change the concept of branch banking to anywhere banking. System applications were created for bankers to transact and access their account through their mobile phone. Banks also started to issue debit cards and these cards can be used to pay bills. With all of these innovations, the bank heavily devotes a huge amount of money on security to protect and continue to build confidence to its customers for them to invest more on the banking industry. Firm Level Analysis Porter’s 5 Forces in Bank Industry To help us analyze the banking industry where Westpac and Hsbc belong, an application of Porter’s five forces will be useful. According to these five forces act together to determine whether a business is attractive and profitable enough to enter. The Five forces are: 1) Threat of new forces to the market, 2) The power of suppliers, 3)The rivalry among firms, 4)The power of the customers, 5) Substitutes. An analysis before deciding to enter in an industry is vital because it will determine the success and failure of the business. By identifying if the forces are high and low we can determine if it’s favorable for the firm to enter (Dhillon, 2009) (allan, 2008). Force 1: Threats from new forces to market We can say that this force will be a low associated profit business because putting up a bank requires a huge amount of capital. The owner or every member of the top management or shareholders needs to be checked and verified. Approval of the request to put up the business requires long time (allan, 2008). Force 2: The rivalry among the firms The competition in this industry is high because most of the banks or financial institution are influence by the Government such as exchange rates and inflation rates. If the government passes a law for example an exit fees for home load to be ban. Another example is there are banks who offer free annual fee waivers and no service fees while other banks will not be able to compete because of the size of their business (allan, 2008). Force 3: The power of the suppliers These factors can also be considered under high associated profit industry because in Australia there is only one supplier and that is the Reserved Bank of Australia. These shows how controlled the banking system is. Force 4: The power of the customers The power of the customer is high in this industry because if the customer is not satisfied with the rates or service provided by the, the customer can always request to closed his/her bank account and open an account to other bank that will meet her needs. This is the reason why most of the bank now a days have 24/7 customer service to attend to their customer needs (allan, 2008). Force 5: Substitute products Customers can always invest their money to other financial institution that will suit their needs such as stocks, bonds and mutual funds. Although this institution will not be able to replace the process of cheque clearing that most of the bankers has (allan, 2008). Applying the Porters 5 Forces Model analysis provides us an idea that banking industry is unfavorable to enter since most of the forces scored high. I believe Hsbc will implement a broad based differentiation because for the past two years Hsbcs image was affected with the issues on money laundering and illegal behavior of its employees . The said incidents involved a huge amount of money and a lot of its customers lost their confidence with the world’s local bank. Currently, Hsbc is being cooperative but the impact continues to hurt Hsbcs business. The company have to cut 14000 jobs and sell some of its business that was cost by the lost of trust. With A broad based differentiation approach, Hsbc would be able to provide more attributes that is valued by the customer which is good for long term goals and a disadvantage of this is that it will take time and consistency to gain the confidence of its customers (Telegraph, 2013). One of the strengths of Westpac, is it Leads in terms of number of branches and ATMs in Australia. Applying a cost leadership strategy will be most effective because of the size and structure of the industry. In this way, it will attract more potential customers because of the convenience that it can offer to its customers by having a lot of branches. If Westpac can capitalize its competitive advantage and offer a lower rate other banks will not be able to compete. The downside of this approach is if the government will influence the bank in having fix rates, because the customer would not transfer to Westpac for the same rates (MBASKOOL, 2013). Conclusion: In conclusion, having a better understanding on the external environment and the industry level of the business can give us a clearer picture if it is attractive and favorable enough to enter in a certain industry. The theories are important as these will serve as a guide in our decision making process and what strategic choice would a company or banking industry chooses. It is vital that the strategy that the industry chooses is compatible with its capabilities and resources to increase the chances of the business to be successful. References allan. (2008, March 26). Applying Porters 5 Forces Model to Banking Inudstry . Retrieved October 10, 2013, from Wow Zone: http://awowzone.blogspot.com.au/2008/03/applying-porters-5-forces-model-to.html Dhillon, M. (2009, Aigust 15). Scribd. Retrieved October 10, 2013, from Industry Analysis: http://www.scribd.com/doc/82800029/4/PEST-Analysis-of-Banking-Industry hsbc. (2013). http://www.hsbc.com.au/1/2/. Retrieved October 10, 2013, from http://www.hsbc.com.au: http://www.hsbc.com.au/1/2/ MBASKOOL. (2013). Westpac Bankinng Group. Retrieved October 10, 2013, from MBA.skool.com:

Wednesday, August 21, 2019

Positive And Negative Effect Of Globalization On China

Positive And Negative Effect Of Globalization On China Introduction: todays world is a world of globalization. Every county in this world is directly and indirectly influenced by globalization. The world globalization means public from the different part of world connected together. There is a flow of money and knowledge between them. They can go beyond their geographical boundary. The goods and service which generate by one country can be consumed in all over the world. This truth has been called globalization. It is a system which linked various nations to promote global economy. Globalization carry chance and profit with it, but it depends on the nation how they are taking it. The advantages of globalization have been taken by much country like china. They accept domestic strategy which permit their civilian to get promote global market which helps in increasing their gdp. As there are two face of coin, globalization cans also effects in two ways. Either its positive or negative. There is positive and negative effect of globalization in china. Which we will mention below. Ambekar,Y.(2010) Effects of globalization in china we are going to see the effect of globalization in china. First we have to know about the condition of china. China is a largest country in term of population which is nearly 1.3 billion. There are the availability of cheap labour and less manufacturing cost in china. That attracts number of foreign investment. Due to this foreign investment china has decrease its poverty . china is running by the communual government . although driven by communist china plays a major role in following werstern approach as their strategy to develop their economic growth by becoming an efficient player of globalization. In 17 september 2001 china joined the world trade organisation after following fifteen year for the status. www.bizcovering.com(2010) Globalization has made many possitve impact of china. They are as follows:- 1. Economic growth- as per the statistics if 2003 china made nearly 1413us billion dollar which stand it in sixth posotion.during 1965 to 1979 the gdp of china grew with 6.4% but after entering into a global market china made its gdp nearly 10% in 1980 to 1990. In 2005 its stated that the industrial production in chin is increased by 15% while consumer demand is increased by 10%. 2.economic development- as per the index shown by human development china ranked 94th and according to the chinas current scenario only the 16.6% of popultion is in poverty. Which is deceasing continuing decreasing in last 23 years. 3.increase in savings:- us dollar 560 billion was the saving deposit of the civilians in china in 1997 which is around 218 times more than that in 1978. Which is 32% increases in this particular gap of year. Apart from this currency saving, stocks and debentures and the financial asset in also increases by us dollar 725 billion. 4.improve in tourism, export and import :- in 2003 when china takes the membership of wto this made china a more attractive country. People from all over the world come to visit china. Many big entrpreneur come here to invest in china. In 2003 export in increases around 32.3%and import is 40.5%. and tourism industry also increases by9.7%. 5. improve in life styele and increasing employment opportunity:- the best effect of globalization for the developong country like china is improving in the life style . the living standard of all community in that country will drasticaaly inmroved. The employment oppurtunity for public in developing country is also increases by the effect of globalization. Despite of possitve effect of there globalization there is some nagative effect too. They are as follows:- 1.as there are possitve effct of globalization there is negative effect too. Develop country out source thier business to developing country.because of the low manufacturing cost and cheap labour available. So the persons in developed country loss thier job due to this out sourcing 2.convictor and child are working in manucturing units due to cheap cost. This commits to the exploitation of the labour. Health safety and hygine has been neglected to produced cheap good. 3. due to this globalization there is a insecurity in jobs. now the jobs are not permanent. There is a competion in works ehich results to the decrease in wages due to the fear of job losing people start working in low wages. 4.where there is a poor check in pollution. By establishing a plant or an idustry there is a increase in the pollution in that particular area which effects the environment. And in todays scenerio plants and industry are playing a important role in global warming. 5. there is a great chance of catching hazardeous diseases like hiv/swine flu due to the rapic increase in the travelling of foriegn tourist. People suffering from their native country bring this type of diseases to the country where they visit. 6there will bre increasing in the human trafkling. due to this globalization thousand person move from one country to another country which increases in conjuctin in human traffic. 7. due to the effect of globalization small scale industry or medium sized industry has been taken by the huge mnc or large scale industries. There is a less scope of cottage and small scale industry in the world of globalization. 8.multinational companies which are previously not allowed to intervent in politics now poke their nose in political jaudgement. 9.as there are rapid increase in fast moving consumer good companies like mcdonalds and kfc. Due to this people consume lots of junk food which adverly effect in thier health. Pillai,p.(2010) this all are the positive and nagative effect of globalalization which impacts on china.gloabalization is a channel which helps in binding the gap betwwen the nation but also we can not neglect the nagative effect of it. Conclusion The role of gloablization in todays world is very vast. China a world largest economy which entered into a wto membership few year ago get benifited by it. As every coin has two face there are also some nagative effects of globalization which we cant ignore it. In todays world gloalization is necessary for prosperity and development of nation. Refences Ambekar,Y.(2010)[online] Available on url http://www.buzzle.com/editorials/8-17-2004-57988.asp [accessed on 5april 2010] www.bizcovering.com(2010) [online] available on url http://bizcovering.com/business-and-society/globalization-and-its-impact-on-china/ [accessed on 5 april 2010] Pillai,p.(2010)[online] Available on url http://www.buzzle.com/articles/negative-effects-of-globalization.html [accessed on 31 march 2010] Thesis statement The negative effect of globalization is more as compare with its positive effects. I going to explain the negative effect of globalization. Due to globalization the following point has been arises in china. They are as follows/:- Due to globalization there is a increase in the traffic of the people. Due to globalization many small scale and large-scale industries has been taken by big mnc. Globalization makes mnc to interfere in political issue of the country. In china where there is a cheap availability of labour and to produce cheap there is no strict action in working of child and a criminal in a particular industry. In today world where there is a problem of global warming by establish more and more plant it create environment pollution. Much fmcg company like mc d and kfc which started their product in china they sell junk food people are going to habituated with that which effects their health. There is an insecurity of a job due to this globalization competition is increasing peoples are agree to work in low wages also which create insecurity for the people. Due to globalization person Cumming from different part of the world carry different types of diseases like HIV or recently we seen swine flu which effects lots of people in other country. There is an open chance for terrorism by this they get chance to get the information about a particular country. they can use net for communication. Pillai,P.(2010) References Pillai,P.(2010)[online] Available on url http://www.buzzle.com/articles/negative-effects-of-globalization.html [accessed on 6 april 2010] Report writing Title: choose a company that has recently started marketing strategy in china. Outline thier marketing strategy and discuss the problem they have encountered. Your report includes suggestion for overcoming these difficulties. Executive summary: china one of the biggest economy in term of population. Burger king one on the popular fast food company recently started its business in china. It is already 20 years late than its competitor McDonald and kfc.Burger king have adopt different policy to capture market in china. There many problem which they have face recently and there are some suggestion given by us to overcome this problem which we will see in below problem. Introduction: burger king one of the famous fast moving consumer goods company in the world. in united state it is the second largest food chain restaurant after McDonalds. This company has been started by James McLamore and David Edgerton in year 1954. According figure in thier homepage there are 11,200 restaurant of burger king is operating in 56 countries in all over the world. They have recently started their service in china. www.fundinguniverse.com (2010) Methodology: the data which is taken in thise report is collected by the articles and journals. After reading the strategy what they have followed in expanding in thier business in china has been explained here. Much of this has been cover in literature review. The methodolgy is exploratory rather than explainatory. Mainbody: burger king has recently started its business in china.the strategy they have follow are: Buger kin have been sedreatly started its small restaurant in shanghai to chek the taste of the chinese. They have poened their two restaurant in airport i.e. bejing and shanghai. Thier strategis is to enter in airport catering industry .further planning to start open in some different air port. They attracts the youth and professional persons only. www.glgroup.com (2006) Problems which burger king faces are: Two major rivalry i.e. McDonalds and kfc already started thier business before 20 yrs.. In china brand awareness of mcdonalds and kfc is higher than burgerking. Expasion of business is in very slow pace because it has stated only 12 restaurant in the time span of three years. As compare with mcdonald they generally closed at night. www.chinaretailnews.com (2008) Suggestion for overcoming this problem are: They have to increase thier expansion speed. Participate or give sponsirship in some event like olympic. Make scheme which attracts whole falimy not only teenagers or professionals. Like mcdonald they also work 24x7routnine. Use local theme in advertising.. Provide some discounts or special coupoun at the time of event. They must make some strong step to make thier brand awarness. As they are managing thier restaurant in US they have to manage in same way in china. Giving proper tranning to develop skills of crew members and mangers. Conclusion: burger king is one of the famous chain restaurant group which recently started its business in china. as it is successful but also its facing some tough competition from its rivalry McDonalds and kfc which started their business twenty years before than burger king. There have to make strong strategy to be in a market and overcome their problem.

Tuesday, August 20, 2019

Security for Insider Attacks in Mobile Ad Hoc Networks

Security for Insider Attacks in Mobile Ad Hoc Networks Abstract Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this research work we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network. OMNET++ simulator is used to simulate and verify the proposed solution. Experimental results shows that E-SAODV (Enhanced Secure Ad hoc On Demand Distance Vector protocol) performs much better than conventional SAODV (Secure Ad hoc On Demand Distance Vector Protocol) Chapter 1 Introduction Overview Mobile Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. As there is no fixed infrastructure such as base stations for mobile switching. Nodes within each others range communicate directly via wireless links while those which are far apart rely on other nodes to transmit messages. Node mobility causes frequent changes in topology. The wireless nature of communication and lack of any security infrastructure raises several security problems. The following flowchart depicts the working of any general ad-hoc network. Features of Mobile Ad hoc Networks Based on the characteristics, Mobile Ad hoc Networks has following main features. Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between mobile nodes in the Ad hoc Network are not consistent for the communication participants. Due to the continuous motion of nodes, the topology of the mobile ad hoc network changes constantly, the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes. Lack of incorporation of security features in statically configured wireless routing protocol not meant for Ad hoc environments. Because the topology of the Ad hoc Networks is changing constantly, it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol. Mobile Ad hoc Network Routing Protocols Routing in Mobile Ad hoc Networks faces additional challenges when compared to routing in traditional wired networks with fixed infrastructure. There are several well-known protocols that have been specifically developed to cope with the limitations imposed by Ad hoc networking environments. The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth and high error rates [1]. Most of the existing routing protocols follow two different design approaches to confront the inherent characteristics of Ad hoc networks namely Proactive Routing Protocols, Reactive Routing Protocols. Proactive Routing Protocols Proactive ad hoc routing protocols maintain at all times routing information regarding the connectivity of every node to all other nodes that participate in the network. These protocols are also known as Table-driven Ad hoc Routing Protocols. These protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [1]. Therefore, all nodes are able to make immediate decisions regarding the forwarding of a specific packet. Two main protocols that fall into the category of proactive routing protocols are Destination-Sequenced Distance-Vector (DSDV) protocol [2] and the Optimized Link State Routing (OLSR) protocol [3]. Reactive Routing Protocols An alternative approach to the one followed by Proactive Routing Protocols also known as source-initiated on-demand routing, is Reactive Routing Protocols. According to this approach a route is created only when the source node requires one to a specific destination. A route is acquired by the initiation of a route discovery function by the source node. The data packets transmitted while a route discovery is in process are buffered and are sent when the path is established. An established route is maintained as long as it is required through a route maintenance procedure. The Ad hoc On-demand Distance Vector (AODV) routing protocol [4], Temporally Ordered Routing Algorithm (TORA) [5] and the Dynamic Source Routing protocol [6] are examples of this category of protocols. Security issues in Mobile Ad hoc Routing Protocols Any routing protocol must encapsulate an essential set of security mechanisms. These are mechanisms that help prevent, detect, and respond to security attacks. We can classify these major security goals into five main categories, which need to be addressed in order to maintain a reliable and secure ad-hoc network environment. Confidentiality Confidentiality is the protection of any information from being exposed to unintended entities. In ad-hoc networks this is more difficult to achieve because intermediates nodes receive the packets for other recipients, so they can easily eavesdrop the information being routed. Availability Availability means that a node should maintain its ability to provide all the designed services regardless of the security state of it . This security criterion is challenged mainly during the denial-of-service attacks, in which all the nodes in the network can be the attack target and thus some selfish nodes make some of the network services unavailable, such as the routing protocol or the key management service. Authentication Authentication assures that an entity of concern or the origin of a communication is what it claims to be or from. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. Integrity Integrity guarantees the identity of the messages when they are transmitted. Integrity can be compromised through malicious and accidental altering. A message can be dropped, replayed or revised by an adversary with malicious goal, which is regarded as malicious altering while if the message is lost or its content is changed due to some failures, which may be transmission errors or hardware errors such as hard disk failure, then it is categorized as accidental altering. Non-Repudiation Non-repudiation ensures that sending and receiving parties can never deny their sending or receiving the message. In order to achieve the overall goal of Mobile Ad hoc Network security, above five mechanisms must be implemented in any ad-hoc networks so as to ensure the security of the transmissions along that network. Secure Ad hoc Routing As discussed earlier over the past decade, many Ad hoc routing protocols have been proposed in literature. Among them the most widely used are AODV (Ad hoc On Demand Distance Vector) [4] and DSR (Dynamic Source Routing) [2] which comes in the category of re-active routing protocols of Ad hoc Networks. All of these protocols have been studied extensively. But as there were no security considerations in the original design of these protocols, these protocols remain under threat from the attackers. The main assumption of these protocols was that all participating nodes do so in good faith and without maliciously disrupting the operation of the protocol. However the existence of malicious entities can not be disregarded in the systems especially the environment used for Ad hoc Networks. To overcome the security vulnerabilities in existing routing protocols, many security enhancements in these protocols have been proposed but unfortunately these secure Ad hoc Routing Protocols were either designed for a particular protocol or to address a specific problem operation of the protocol. For example SAODV (Secure Ad hoc On Demand Distance Vector Protocol) [7] was proposed to secure AODV (Ad hoc On Demand Distance Vector) protocol, Ariadne [10] was proposed to protect DSR (Dynamic Source Routing) protocol, ARAN [7] was proposed to protect the Ad hoc Routing in general while SEAD [8] was proposed to protect the DSDV (Destination Sequence Distance Vector Routing) protocol. The purpose of SAR [9] (Security Aware Routing) was also to protect the Routing in Ad hoc Networks. Problem definition Thus ongoing studies on MANETs pose many challenging research areas including MANETs security. Since MANETs are made up entirely of wireless mobile nodes, they are inherently more susceptible to security threats compared to fixed networks [11]. Access to wireless links is virtually impossible to control thus adverse security events such as eavesdropping, spoofing and denial of service attacks are more easily accomplished. These security risks must be reduced to an acceptable level while maintaining an acceptable Quality of Service and network performance. However, in order to work properly, the routing protocols in MANETs need trusted working environments, which are not always available. There may be situations in which the environment may be adversarial. For example some nodes may be selfish, malicious, or compromised by attackers. Most of the work done regarding network security in MANETs focuses on preventing attackers from entering the network through secure key distribution and secure neighbor discovery [10],[12]. But these schemes become ineffective when the malicious nodes have entered the network, or some nodes in the network have been compromised. Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network. Since these attacks are initiated from inside the network by the participating malicious nodes which behave well before they are compromised, it is very hard to detect these attacks. Keeping in view the security threats faced by MANETs we focus on Packet Dropping Attack which is a serious threat to Mobile Ad hoc Networks. Although many research efforts have been put on secure routing protocols but the attacks like packet dropping is not adequately addressed. We study the packet dropping attack in which a malicious node intentionally drops the packets they received. Unlike all previous researches which attempt to tolerate Packet Dropping Attacks, our work makes the first effort to detect the malicious activity and then identify the malicious or compromised nodes in the network. Research Objective The fundamental objective of this research is to discuss the security attacks faced by Mobile Ad hoc Networks specially insider attacks and to review the security in existing routing protocols especially secure routing protocols in MANETs. We particularly focus on packet dropping attack which is a serious threat to Mobile Ad hoc Networks. A novel security enhancement scheme to address packet dropping attack has been proposed. Thesis Organization Chapter 2 provides a brief introduction of security threats faced by Mobile Ad hoc Networks and secure routing to address these attacks. Chapter 3 discusses about the related work and flaws identified in the related work. Chapter 4 presents the possible solutions to address the packet dropping attack in Mobile Ad hoc Networks. Chapter 5 includes the implementation of proposed mechanisms and Results of the proposed mechanism and the thesis is concluded in Chapter 6. Chapter 2 Security Threats and Secure Ad hoc Routing Protocols Introduction This chapter includes the threats and types of attacks faced by Mobile Ad hoc Networks. Secure Ad hoc routing protocols like SAODV [7] (Secure Ad hoc On Demand Distance Vector), SAR [16] (Security Aware Routing), and ARAN [9] (Authenticated Routing for Ad hoc Networks) etc and how these protocols are still vulnerable to attacks, are discussed in this chapter. Types of attacks in MANETs There are numerous kinds of attacks in the mobile ad hoc networks, almost all of which can be classified into two types, External Attacks and Insider Attacks. External Attacks External Attacks are those attacks, in which the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services. External attacks are similar to the normal attacks in the traditional wired networks such that the adversary is in the proximity but not a trusted node in the network, therefore, this type of attack can be prevented and detected by the security methods such as authentication or firewall, which are relatively conventional security solutions. Internal or Insider Attacks Due to the invasive nature and open network media in the mobile ad hoc network, internal also known as insider attacks are more dangerous than the external attacks because the compromised or malicious nodes are originally the legitimate users of the Ad hoc network, they can easily pass the authentication and get protection from the security mechanisms. As a result, the adversaries can make use of them to gain normal access to the services that should only be available to the authorized users in the network, and they can use the legal identity provided by the compromised nodes to conceal their malicious behaviors. Therefore, more attention should be paid to the internal attacks initiated by the malicious insider nodes when we consider the security issues in the mobile ad hoc networks. Internal or insider nodes when become part of the network can misuse the network in the following ways Packet Dropping A malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. Node Isolation An internal malicious node can prevent nodes from communicating with any other node. Route Disruption A malicious node can break down an existing route or prevent a new route from being established. Route Invasion An inside attacker adds itself between two endpoints of a communication channel. Attacks based on modification A very simplest way for a malicious node to disturb the operations of an ad-hoc network is to perform an attack based on modification. The only task the malicious or compromised node needs to perform is to announce better routes than the ones presently existing. This kind of attack is based on the modification of the metric value for a route or by altering control message fields. There are various ways to perform this type of attacks; some of them are discussed below Altering the Hop Count This attack is more specific to the AODV [4] protocol wherein the optimum path is chosen by the hop count metric. A malicious node can disturb the network by announcing the smallest hop count value to reach the compromised node. In general, an attacker would use a value zero to ensure to the smallest hop count. Changing the Route Sequence Number When a node decides the optimum path to take through a network, the node always relies on a metric of values, such as hop count delays etc. The smaller that value, the more optimum the path. Hence, a simple way to attack a network is to change this value with a smaller number than the last better value. Altering Routing Information This type of attack leads network toward Denial of Service (DoS) attack. For example in a situation where a node M wants to communicate with node S. At node M the routing path in the header would be M-N-O-P-Q-R-S. If N is a compromised node, it can alter this routing detail to M-N-O-P. But since there exists no direct route from O to P, P will drop the packet. Thus, A will never be able to access any service from P. This situation leads the network towards a DoS attack. Impersonation Attacks Impersonation is also known as spoofing. In this type of attack the malicious node hides its IP address or MAC address and uses the addresses of other nodes present in the network. Since current ad-hoc routing protocols like AODV [4] and DSR [6] do not authenticate source IP address. By exploiting this situation a malicious node can launch variety of attacks using spoofing. For example in a situation where an attacker creates loops in the network to isolate a node from the remainder of the network, the attacker needs to spoof the IP address of the node he wants to isolate from the network and then announce new route to the others nodes. By doing this, he can easily modify the network topology as he wants. Fabrication Attacks Fabrication attacks can be classified into three main categories. Detection is very difficult in all of these three cases. Routing table poisoning Routing protocols maintain tables which hold information regarding routes of the network. In routing table poisoning attacks the malicious nodes generate and send fabricated signaling traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. For example, an attacker can send routing updates that do not correspond to actual changes in the topology of the ad hoc network. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops and bottlenecks. Route Cache Poisoning This type of attack falls in the category of passive attacks that can occur especially in DSR [6] due to the promiscuous mode of updating routing tables. This type of situation arises when information stored in routing tables is deleted, altered or injected with false information. A node overhearing any packet may add the routing information contained in that packets header to its own route cache, even if that node is not on the path from source to destination. The vulnerability of this system is that an attacker could easily exploit this method of learning routes and poison route caches by broadcast a message with a spoofed IP address to other nodes. When they receive this message, the nodes would add this new route to their cache and would now communicate using the route to reach the malicious node. Rote Error Messages fabrication This attack is very common in AODV [4] and DSR [6], because when nodes move these two protocols use path maintenance to recover the optimum path. The weakness of this architecture is that whenever a node moves, the closest node sends an error message to the other nodes so as to inform them that a route is no longer accessible. If an attacker can cause a DoS attack by spoofing any node and sending error messages to the all other nodes. As a result malicious node can separate any node quite easily. Eavesdropping Eavesdropping is another kind of attack that usually happens in the mobile ad hoc networks. The goal of eavesdropping is to obtain some confidential information that should be kept secret during the communication. This information may include the location, public key, private key or even passwords of the nodes. Because such data are very important to the security state of the nodes, they should be kept away from the unauthorized access. Secure Ad hoc Routing Protocols Many solutions have been proposed for secure routing in ad hoc networks, in order to offer protection against the attacks discussed earlier. These proposed solutions are either completely new stand-alone protocols, or in some cases incorporations of security mechanisms into existing ones (like DSR [6] and AODV [4]). In order to analyze the proposed solutions and how they are still vulnerable to attacks we classified them into two main categories based on asymmetric cryptography and symmetric cryptography. Asymmetric Cryptographic Solution Protocols that use asymmetric cryptography to secure routing in mobile ad hoc networks require the existence of a universally trusted third party. This trusted third party can be either online or offline. The trusted third party issues certificates that bind a nodes public key with a nodes persistent identifier. Authenticated Routing for Ad hoc Networks ARAN [9] falls in this category of secure Ad hoc routing protocols; many of the other protocols presented in other categories that use asymmetric cryptography operate in a similar manner and have similar requirements. Authenticated Routing for Ad hoc Networks ARAN The Authenticated Routing for Ad hoc Networks (ARAN) proposed in [9] is a standalone solution for secure routing in ad hoc networking environments. ARAN use digital certificates and can successfully operate in the managed open scenario where no infrastructure is pre-deployed. The basic mechanism used in ARAN is certification that is achieved through the existence of a trusted certification authority (CA). All nodes are supposed to know their public key from the certification authority and also the public key of server. Prior to entering into the network, each node has to apply for a certificate that is signed by the certificate server. ARAN accomplishes the discovery of routes by a broadcast message from source node which is replied in a unicast manner. This route discovery of the ARAN protocol begins with a node broadcasting to its neighbors a route discovery packet (RDP). The RDP includes the certificate of the initiating node, a nonce, a timestamp and the address of the destinatio n node. Furthermore, the initiating node signs the RDP. Each node validates the signature with the certificate, updates its routing table with the neighbor from which it received the RDP, signs it, and forwards it to its neighbors after removing the certificate and the signature of the previous node (but not the initiators signature and certificate). The signature prevents malicious nodes from injecting arbitrary route discovery packets that alter routes or form loops [13]. The destination node eventually receives the RDP and replies with a reply packet (REP). The REP contains the address of the source node, the destinations certificate, a nonce, and the associated timestamp. The destination node signs the REP before transmitting it. The REP is forwarded back to the initiating node by a process similar to the one described for the route discovery, except that the REP is unicasted along the reverse path. The source node is able to verify that the destination node sent the REP by chec king the nonce and the signature. Figure 2 illustrates the process of route discovery in ARAN. All messages are authenticated at each hop from source to destination as well as on the reverse path. Due to heavy computation involved with the certificates, ARAN is vulnerable to many attacks e.g. DOS attacks. In situation when there are no malicious nodes in the network the load involved in the routing process force the legitimate nodes to drop the packets in order to save their resources. Symmetric Cryptography Solutions Symmetric cryptographic solutions rely solely on symmetric cryptography to secure the function of routing in wireless ad hoc networks. The mechanisms utilized is hash functions and hash chains. A one-way hash function is a function that takes an input of arbitrary length and returns an output of fixed length [14]. As hash functions are especially lightweight when compared to other symmetric and asymmetric cryptographic operations, they have been extensively used in the context of securing ad hoc routing. Secure Ad hoc On-demand Distance Vector Protocol (SAODV) The Secure Ad hoc On Demand Distance Vector (SAODV) [7] addresses the problem of securing a MANET network. SAODV is an extension of AODV[4] routing protocol that can be used to protect the route discovery mechanism by providing security features like authentication, integrity and non-repudiation. It uses digital signatures to authenticate the non-mutable fields of the message, and hash chains to secure the hop count information (the only mutable field in message) in both RREQ and RREP messages. The SAODV scheme is based on the assumption that each node possesses certified public keys of all network nodes . In order to facilitate the transmission of the information required for the security mechanisms, SAODV defines extensions to the standard AODV message format. These SAODV extensions consist of the following fields. The hash function field identifies the one-way hash function that is used. The field max hop count is a counter that specifies the maximum number of nodes a packet is al lowed to go through. The top hash field is the result of the application of the hash function max hop count times to a randomly generated number, and finally the field hash is this random number. When a node transmits a route request or a route reply AODV packet it sets the max hop count field equal to the time to live (TTL) field from the IP header, generates a random number and sets the hash field equal to it, and applies the hash function specified by the corresponding field max hop count times to the random number, storing the calculated result to the top hash field. Moreover, the node digitally signs all fields of the message, except the hop count field from the AODV header and the hash field from the SAODV extension header. An intermediate node that receives a route request or a route reply must verify the integrity of the message and the hop count AODV [4] field. The integrity requirement is accomplished by verifying the digital signature. The hop count field is verified by comparing the result of the application of the hash function max hop count minus hop count times to the hash field with the value of the top hash field. Before the packet is re-broadcasted by the in termediate node the value of the hash field is replaced by the result of the calculation of the one-way hash of the field itself in order to account for the new hop. In SAODV route error messages (RERR) that are generated by nodes that inform their neighbors that they are not going to be able to route messages to specific destinations are secured using digital signatures. A node that generates or forwards a route error message cryptographically signs the whole message, except the destination sequence numbers. Although SAODV provides reasonable security to MANETs routing, but it is still vulnerable to distance fraud attack [15] in which the forwarding node fails to increment the route metric because in SAODV there is no enforcement to do so. Further there is no method to detect the malicious nodes and DOS attacks because in SAODV it is assumed that DOS attacks are restricted to physical layer, but this assumption failed when colluding malicious nodes drop packets during the route discovery process. Security Aware Routing (SAR) SAR [16] (Security Aware Routing) is an extension to existing on demand routing protocols and used where nodes are grouped on the basis of trust level. In SAR each node has different security level which assigns them different trust levels. Two nodes can only communicate with each other if they have equal or greater trust values. If a node has lower security level it simply discards the packet. In case there is no node in the network with the desired level then communication cannot take place or we can say that, that particular packet cant be forwarded unless its security level is lowered. By exploiting this condition a malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. SAR al so fails in the situations of secure routing in general because it only focuses on the situations in which certain groups are assumed to be trustworthy. Conclusion From the above discussion, we observe that all Secure Ad hoc routing protocols are still vulnerable to many attacks. Although proposed techniques provide security against external attacks, insider attacks are still an open issue in MANETs. Chapter 3 Literature Review Introduction Many solutions have been proposed to prevent selfishness in MANETs. The main goal of all the schemes proposed in the literature is to make decisions regarding trustworthy entities and to encourage behavior that leads to increasing trust. In this section we discuss some of the solutions presented in the literature in order to detect the malicious nodes in the network in context of packet dropping attack. Watchdog and Pathrater In [17] Marti el al, proposed a mechanism called as watchdog and pathrater on DSR[6] to detect the misbehavior of nodes in MANETs. Nodes in this scheme operate in a promiscuous mode. The watchdog monitors one hop neighbor by overhearing the medium to check whether the next neighbor forwards the packet or not. It also maintains a buffer of recently sent packets. If a data packet remains in the buffer too long, the watchdog declares the next hop neighbor to be misbehaving. Every node that participates in the ad hoc network employs the watchdog functionality in order to verify that its neighbors correctly forward packets. When a node transmits a packet to the next node in the path, it tries to promiscuously listen if the next node will also transmit it. Furthermore, if there is no link encryption utilized in the network, the listening node can also verify that the next node did not modify the packet before transmitting it . The watchdog of a node maintains copies of recently forwarded p ackets and compares them with the packet transmissions overheard by the neighboring nodes. Positive comparisons result in the deletion of the buffered packet and the freeing of the related memory. If a node that was supposed to forward a packet fails to do so within a certain timeout period, the watchdog of an overhearing node increments a failure rating for the specific node. This effectively means that every node in the ad hoc network maintains a rating assessing the reliability of every other node that it can overhear packet transmissions from. A node is identified as misbehaving when the failure rating exceeds a certain threshold bandwidth. The source node of the route that contains the offending node is notified by a message send by the identifying watchdog. As the authors of the scheme note, the main problem with this approach is its vulnerability to blackmail attacks. The pathrater selects the path with the highest metric when there are multiple paths for the same destination node. The algorithm followed by the pathrater mechanism initially assigns a rating of 1.0 to itself and 0.5 to each node that it knows through the route discovery function. The nodes that participate on the active paths have their ratings increased by 0.01 at periodic intervals of 200 milliseconds to a maximum rating of 0.8. A rating is decremented by 0.05 when a link breakage is Security for Insider Attacks in Mobile Ad Hoc Networks Security for Insider Attacks in Mobile Ad Hoc Networks Abstract Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this research work we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network. OMNET++ simulator is used to simulate and verify the proposed solution. Experimental results shows that E-SAODV (Enhanced Secure Ad hoc On Demand Distance Vector protocol) performs much better than conventional SAODV (Secure Ad hoc On Demand Distance Vector Protocol) Chapter 1 Introduction Overview Mobile Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. As there is no fixed infrastructure such as base stations for mobile switching. Nodes within each others range communicate directly via wireless links while those which are far apart rely on other nodes to transmit messages. Node mobility causes frequent changes in topology. The wireless nature of communication and lack of any security infrastructure raises several security problems. The following flowchart depicts the working of any general ad-hoc network. Features of Mobile Ad hoc Networks Based on the characteristics, Mobile Ad hoc Networks has following main features. Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between mobile nodes in the Ad hoc Network are not consistent for the communication participants. Due to the continuous motion of nodes, the topology of the mobile ad hoc network changes constantly, the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes. Lack of incorporation of security features in statically configured wireless routing protocol not meant for Ad hoc environments. Because the topology of the Ad hoc Networks is changing constantly, it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol. Mobile Ad hoc Network Routing Protocols Routing in Mobile Ad hoc Networks faces additional challenges when compared to routing in traditional wired networks with fixed infrastructure. There are several well-known protocols that have been specifically developed to cope with the limitations imposed by Ad hoc networking environments. The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth and high error rates [1]. Most of the existing routing protocols follow two different design approaches to confront the inherent characteristics of Ad hoc networks namely Proactive Routing Protocols, Reactive Routing Protocols. Proactive Routing Protocols Proactive ad hoc routing protocols maintain at all times routing information regarding the connectivity of every node to all other nodes that participate in the network. These protocols are also known as Table-driven Ad hoc Routing Protocols. These protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [1]. Therefore, all nodes are able to make immediate decisions regarding the forwarding of a specific packet. Two main protocols that fall into the category of proactive routing protocols are Destination-Sequenced Distance-Vector (DSDV) protocol [2] and the Optimized Link State Routing (OLSR) protocol [3]. Reactive Routing Protocols An alternative approach to the one followed by Proactive Routing Protocols also known as source-initiated on-demand routing, is Reactive Routing Protocols. According to this approach a route is created only when the source node requires one to a specific destination. A route is acquired by the initiation of a route discovery function by the source node. The data packets transmitted while a route discovery is in process are buffered and are sent when the path is established. An established route is maintained as long as it is required through a route maintenance procedure. The Ad hoc On-demand Distance Vector (AODV) routing protocol [4], Temporally Ordered Routing Algorithm (TORA) [5] and the Dynamic Source Routing protocol [6] are examples of this category of protocols. Security issues in Mobile Ad hoc Routing Protocols Any routing protocol must encapsulate an essential set of security mechanisms. These are mechanisms that help prevent, detect, and respond to security attacks. We can classify these major security goals into five main categories, which need to be addressed in order to maintain a reliable and secure ad-hoc network environment. Confidentiality Confidentiality is the protection of any information from being exposed to unintended entities. In ad-hoc networks this is more difficult to achieve because intermediates nodes receive the packets for other recipients, so they can easily eavesdrop the information being routed. Availability Availability means that a node should maintain its ability to provide all the designed services regardless of the security state of it . This security criterion is challenged mainly during the denial-of-service attacks, in which all the nodes in the network can be the attack target and thus some selfish nodes make some of the network services unavailable, such as the routing protocol or the key management service. Authentication Authentication assures that an entity of concern or the origin of a communication is what it claims to be or from. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. Integrity Integrity guarantees the identity of the messages when they are transmitted. Integrity can be compromised through malicious and accidental altering. A message can be dropped, replayed or revised by an adversary with malicious goal, which is regarded as malicious altering while if the message is lost or its content is changed due to some failures, which may be transmission errors or hardware errors such as hard disk failure, then it is categorized as accidental altering. Non-Repudiation Non-repudiation ensures that sending and receiving parties can never deny their sending or receiving the message. In order to achieve the overall goal of Mobile Ad hoc Network security, above five mechanisms must be implemented in any ad-hoc networks so as to ensure the security of the transmissions along that network. Secure Ad hoc Routing As discussed earlier over the past decade, many Ad hoc routing protocols have been proposed in literature. Among them the most widely used are AODV (Ad hoc On Demand Distance Vector) [4] and DSR (Dynamic Source Routing) [2] which comes in the category of re-active routing protocols of Ad hoc Networks. All of these protocols have been studied extensively. But as there were no security considerations in the original design of these protocols, these protocols remain under threat from the attackers. The main assumption of these protocols was that all participating nodes do so in good faith and without maliciously disrupting the operation of the protocol. However the existence of malicious entities can not be disregarded in the systems especially the environment used for Ad hoc Networks. To overcome the security vulnerabilities in existing routing protocols, many security enhancements in these protocols have been proposed but unfortunately these secure Ad hoc Routing Protocols were either designed for a particular protocol or to address a specific problem operation of the protocol. For example SAODV (Secure Ad hoc On Demand Distance Vector Protocol) [7] was proposed to secure AODV (Ad hoc On Demand Distance Vector) protocol, Ariadne [10] was proposed to protect DSR (Dynamic Source Routing) protocol, ARAN [7] was proposed to protect the Ad hoc Routing in general while SEAD [8] was proposed to protect the DSDV (Destination Sequence Distance Vector Routing) protocol. The purpose of SAR [9] (Security Aware Routing) was also to protect the Routing in Ad hoc Networks. Problem definition Thus ongoing studies on MANETs pose many challenging research areas including MANETs security. Since MANETs are made up entirely of wireless mobile nodes, they are inherently more susceptible to security threats compared to fixed networks [11]. Access to wireless links is virtually impossible to control thus adverse security events such as eavesdropping, spoofing and denial of service attacks are more easily accomplished. These security risks must be reduced to an acceptable level while maintaining an acceptable Quality of Service and network performance. However, in order to work properly, the routing protocols in MANETs need trusted working environments, which are not always available. There may be situations in which the environment may be adversarial. For example some nodes may be selfish, malicious, or compromised by attackers. Most of the work done regarding network security in MANETs focuses on preventing attackers from entering the network through secure key distribution and secure neighbor discovery [10],[12]. But these schemes become ineffective when the malicious nodes have entered the network, or some nodes in the network have been compromised. Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network. Since these attacks are initiated from inside the network by the participating malicious nodes which behave well before they are compromised, it is very hard to detect these attacks. Keeping in view the security threats faced by MANETs we focus on Packet Dropping Attack which is a serious threat to Mobile Ad hoc Networks. Although many research efforts have been put on secure routing protocols but the attacks like packet dropping is not adequately addressed. We study the packet dropping attack in which a malicious node intentionally drops the packets they received. Unlike all previous researches which attempt to tolerate Packet Dropping Attacks, our work makes the first effort to detect the malicious activity and then identify the malicious or compromised nodes in the network. Research Objective The fundamental objective of this research is to discuss the security attacks faced by Mobile Ad hoc Networks specially insider attacks and to review the security in existing routing protocols especially secure routing protocols in MANETs. We particularly focus on packet dropping attack which is a serious threat to Mobile Ad hoc Networks. A novel security enhancement scheme to address packet dropping attack has been proposed. Thesis Organization Chapter 2 provides a brief introduction of security threats faced by Mobile Ad hoc Networks and secure routing to address these attacks. Chapter 3 discusses about the related work and flaws identified in the related work. Chapter 4 presents the possible solutions to address the packet dropping attack in Mobile Ad hoc Networks. Chapter 5 includes the implementation of proposed mechanisms and Results of the proposed mechanism and the thesis is concluded in Chapter 6. Chapter 2 Security Threats and Secure Ad hoc Routing Protocols Introduction This chapter includes the threats and types of attacks faced by Mobile Ad hoc Networks. Secure Ad hoc routing protocols like SAODV [7] (Secure Ad hoc On Demand Distance Vector), SAR [16] (Security Aware Routing), and ARAN [9] (Authenticated Routing for Ad hoc Networks) etc and how these protocols are still vulnerable to attacks, are discussed in this chapter. Types of attacks in MANETs There are numerous kinds of attacks in the mobile ad hoc networks, almost all of which can be classified into two types, External Attacks and Insider Attacks. External Attacks External Attacks are those attacks, in which the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services. External attacks are similar to the normal attacks in the traditional wired networks such that the adversary is in the proximity but not a trusted node in the network, therefore, this type of attack can be prevented and detected by the security methods such as authentication or firewall, which are relatively conventional security solutions. Internal or Insider Attacks Due to the invasive nature and open network media in the mobile ad hoc network, internal also known as insider attacks are more dangerous than the external attacks because the compromised or malicious nodes are originally the legitimate users of the Ad hoc network, they can easily pass the authentication and get protection from the security mechanisms. As a result, the adversaries can make use of them to gain normal access to the services that should only be available to the authorized users in the network, and they can use the legal identity provided by the compromised nodes to conceal their malicious behaviors. Therefore, more attention should be paid to the internal attacks initiated by the malicious insider nodes when we consider the security issues in the mobile ad hoc networks. Internal or insider nodes when become part of the network can misuse the network in the following ways Packet Dropping A malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. Node Isolation An internal malicious node can prevent nodes from communicating with any other node. Route Disruption A malicious node can break down an existing route or prevent a new route from being established. Route Invasion An inside attacker adds itself between two endpoints of a communication channel. Attacks based on modification A very simplest way for a malicious node to disturb the operations of an ad-hoc network is to perform an attack based on modification. The only task the malicious or compromised node needs to perform is to announce better routes than the ones presently existing. This kind of attack is based on the modification of the metric value for a route or by altering control message fields. There are various ways to perform this type of attacks; some of them are discussed below Altering the Hop Count This attack is more specific to the AODV [4] protocol wherein the optimum path is chosen by the hop count metric. A malicious node can disturb the network by announcing the smallest hop count value to reach the compromised node. In general, an attacker would use a value zero to ensure to the smallest hop count. Changing the Route Sequence Number When a node decides the optimum path to take through a network, the node always relies on a metric of values, such as hop count delays etc. The smaller that value, the more optimum the path. Hence, a simple way to attack a network is to change this value with a smaller number than the last better value. Altering Routing Information This type of attack leads network toward Denial of Service (DoS) attack. For example in a situation where a node M wants to communicate with node S. At node M the routing path in the header would be M-N-O-P-Q-R-S. If N is a compromised node, it can alter this routing detail to M-N-O-P. But since there exists no direct route from O to P, P will drop the packet. Thus, A will never be able to access any service from P. This situation leads the network towards a DoS attack. Impersonation Attacks Impersonation is also known as spoofing. In this type of attack the malicious node hides its IP address or MAC address and uses the addresses of other nodes present in the network. Since current ad-hoc routing protocols like AODV [4] and DSR [6] do not authenticate source IP address. By exploiting this situation a malicious node can launch variety of attacks using spoofing. For example in a situation where an attacker creates loops in the network to isolate a node from the remainder of the network, the attacker needs to spoof the IP address of the node he wants to isolate from the network and then announce new route to the others nodes. By doing this, he can easily modify the network topology as he wants. Fabrication Attacks Fabrication attacks can be classified into three main categories. Detection is very difficult in all of these three cases. Routing table poisoning Routing protocols maintain tables which hold information regarding routes of the network. In routing table poisoning attacks the malicious nodes generate and send fabricated signaling traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. For example, an attacker can send routing updates that do not correspond to actual changes in the topology of the ad hoc network. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops and bottlenecks. Route Cache Poisoning This type of attack falls in the category of passive attacks that can occur especially in DSR [6] due to the promiscuous mode of updating routing tables. This type of situation arises when information stored in routing tables is deleted, altered or injected with false information. A node overhearing any packet may add the routing information contained in that packets header to its own route cache, even if that node is not on the path from source to destination. The vulnerability of this system is that an attacker could easily exploit this method of learning routes and poison route caches by broadcast a message with a spoofed IP address to other nodes. When they receive this message, the nodes would add this new route to their cache and would now communicate using the route to reach the malicious node. Rote Error Messages fabrication This attack is very common in AODV [4] and DSR [6], because when nodes move these two protocols use path maintenance to recover the optimum path. The weakness of this architecture is that whenever a node moves, the closest node sends an error message to the other nodes so as to inform them that a route is no longer accessible. If an attacker can cause a DoS attack by spoofing any node and sending error messages to the all other nodes. As a result malicious node can separate any node quite easily. Eavesdropping Eavesdropping is another kind of attack that usually happens in the mobile ad hoc networks. The goal of eavesdropping is to obtain some confidential information that should be kept secret during the communication. This information may include the location, public key, private key or even passwords of the nodes. Because such data are very important to the security state of the nodes, they should be kept away from the unauthorized access. Secure Ad hoc Routing Protocols Many solutions have been proposed for secure routing in ad hoc networks, in order to offer protection against the attacks discussed earlier. These proposed solutions are either completely new stand-alone protocols, or in some cases incorporations of security mechanisms into existing ones (like DSR [6] and AODV [4]). In order to analyze the proposed solutions and how they are still vulnerable to attacks we classified them into two main categories based on asymmetric cryptography and symmetric cryptography. Asymmetric Cryptographic Solution Protocols that use asymmetric cryptography to secure routing in mobile ad hoc networks require the existence of a universally trusted third party. This trusted third party can be either online or offline. The trusted third party issues certificates that bind a nodes public key with a nodes persistent identifier. Authenticated Routing for Ad hoc Networks ARAN [9] falls in this category of secure Ad hoc routing protocols; many of the other protocols presented in other categories that use asymmetric cryptography operate in a similar manner and have similar requirements. Authenticated Routing for Ad hoc Networks ARAN The Authenticated Routing for Ad hoc Networks (ARAN) proposed in [9] is a standalone solution for secure routing in ad hoc networking environments. ARAN use digital certificates and can successfully operate in the managed open scenario where no infrastructure is pre-deployed. The basic mechanism used in ARAN is certification that is achieved through the existence of a trusted certification authority (CA). All nodes are supposed to know their public key from the certification authority and also the public key of server. Prior to entering into the network, each node has to apply for a certificate that is signed by the certificate server. ARAN accomplishes the discovery of routes by a broadcast message from source node which is replied in a unicast manner. This route discovery of the ARAN protocol begins with a node broadcasting to its neighbors a route discovery packet (RDP). The RDP includes the certificate of the initiating node, a nonce, a timestamp and the address of the destinatio n node. Furthermore, the initiating node signs the RDP. Each node validates the signature with the certificate, updates its routing table with the neighbor from which it received the RDP, signs it, and forwards it to its neighbors after removing the certificate and the signature of the previous node (but not the initiators signature and certificate). The signature prevents malicious nodes from injecting arbitrary route discovery packets that alter routes or form loops [13]. The destination node eventually receives the RDP and replies with a reply packet (REP). The REP contains the address of the source node, the destinations certificate, a nonce, and the associated timestamp. The destination node signs the REP before transmitting it. The REP is forwarded back to the initiating node by a process similar to the one described for the route discovery, except that the REP is unicasted along the reverse path. The source node is able to verify that the destination node sent the REP by chec king the nonce and the signature. Figure 2 illustrates the process of route discovery in ARAN. All messages are authenticated at each hop from source to destination as well as on the reverse path. Due to heavy computation involved with the certificates, ARAN is vulnerable to many attacks e.g. DOS attacks. In situation when there are no malicious nodes in the network the load involved in the routing process force the legitimate nodes to drop the packets in order to save their resources. Symmetric Cryptography Solutions Symmetric cryptographic solutions rely solely on symmetric cryptography to secure the function of routing in wireless ad hoc networks. The mechanisms utilized is hash functions and hash chains. A one-way hash function is a function that takes an input of arbitrary length and returns an output of fixed length [14]. As hash functions are especially lightweight when compared to other symmetric and asymmetric cryptographic operations, they have been extensively used in the context of securing ad hoc routing. Secure Ad hoc On-demand Distance Vector Protocol (SAODV) The Secure Ad hoc On Demand Distance Vector (SAODV) [7] addresses the problem of securing a MANET network. SAODV is an extension of AODV[4] routing protocol that can be used to protect the route discovery mechanism by providing security features like authentication, integrity and non-repudiation. It uses digital signatures to authenticate the non-mutable fields of the message, and hash chains to secure the hop count information (the only mutable field in message) in both RREQ and RREP messages. The SAODV scheme is based on the assumption that each node possesses certified public keys of all network nodes . In order to facilitate the transmission of the information required for the security mechanisms, SAODV defines extensions to the standard AODV message format. These SAODV extensions consist of the following fields. The hash function field identifies the one-way hash function that is used. The field max hop count is a counter that specifies the maximum number of nodes a packet is al lowed to go through. The top hash field is the result of the application of the hash function max hop count times to a randomly generated number, and finally the field hash is this random number. When a node transmits a route request or a route reply AODV packet it sets the max hop count field equal to the time to live (TTL) field from the IP header, generates a random number and sets the hash field equal to it, and applies the hash function specified by the corresponding field max hop count times to the random number, storing the calculated result to the top hash field. Moreover, the node digitally signs all fields of the message, except the hop count field from the AODV header and the hash field from the SAODV extension header. An intermediate node that receives a route request or a route reply must verify the integrity of the message and the hop count AODV [4] field. The integrity requirement is accomplished by verifying the digital signature. The hop count field is verified by comparing the result of the application of the hash function max hop count minus hop count times to the hash field with the value of the top hash field. Before the packet is re-broadcasted by the in termediate node the value of the hash field is replaced by the result of the calculation of the one-way hash of the field itself in order to account for the new hop. In SAODV route error messages (RERR) that are generated by nodes that inform their neighbors that they are not going to be able to route messages to specific destinations are secured using digital signatures. A node that generates or forwards a route error message cryptographically signs the whole message, except the destination sequence numbers. Although SAODV provides reasonable security to MANETs routing, but it is still vulnerable to distance fraud attack [15] in which the forwarding node fails to increment the route metric because in SAODV there is no enforcement to do so. Further there is no method to detect the malicious nodes and DOS attacks because in SAODV it is assumed that DOS attacks are restricted to physical layer, but this assumption failed when colluding malicious nodes drop packets during the route discovery process. Security Aware Routing (SAR) SAR [16] (Security Aware Routing) is an extension to existing on demand routing protocols and used where nodes are grouped on the basis of trust level. In SAR each node has different security level which assigns them different trust levels. Two nodes can only communicate with each other if they have equal or greater trust values. If a node has lower security level it simply discards the packet. In case there is no node in the network with the desired level then communication cannot take place or we can say that, that particular packet cant be forwarded unless its security level is lowered. By exploiting this condition a malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. SAR al so fails in the situations of secure routing in general because it only focuses on the situations in which certain groups are assumed to be trustworthy. Conclusion From the above discussion, we observe that all Secure Ad hoc routing protocols are still vulnerable to many attacks. Although proposed techniques provide security against external attacks, insider attacks are still an open issue in MANETs. Chapter 3 Literature Review Introduction Many solutions have been proposed to prevent selfishness in MANETs. The main goal of all the schemes proposed in the literature is to make decisions regarding trustworthy entities and to encourage behavior that leads to increasing trust. In this section we discuss some of the solutions presented in the literature in order to detect the malicious nodes in the network in context of packet dropping attack. Watchdog and Pathrater In [17] Marti el al, proposed a mechanism called as watchdog and pathrater on DSR[6] to detect the misbehavior of nodes in MANETs. Nodes in this scheme operate in a promiscuous mode. The watchdog monitors one hop neighbor by overhearing the medium to check whether the next neighbor forwards the packet or not. It also maintains a buffer of recently sent packets. If a data packet remains in the buffer too long, the watchdog declares the next hop neighbor to be misbehaving. Every node that participates in the ad hoc network employs the watchdog functionality in order to verify that its neighbors correctly forward packets. When a node transmits a packet to the next node in the path, it tries to promiscuously listen if the next node will also transmit it. Furthermore, if there is no link encryption utilized in the network, the listening node can also verify that the next node did not modify the packet before transmitting it . The watchdog of a node maintains copies of recently forwarded p ackets and compares them with the packet transmissions overheard by the neighboring nodes. Positive comparisons result in the deletion of the buffered packet and the freeing of the related memory. If a node that was supposed to forward a packet fails to do so within a certain timeout period, the watchdog of an overhearing node increments a failure rating for the specific node. This effectively means that every node in the ad hoc network maintains a rating assessing the reliability of every other node that it can overhear packet transmissions from. A node is identified as misbehaving when the failure rating exceeds a certain threshold bandwidth. The source node of the route that contains the offending node is notified by a message send by the identifying watchdog. As the authors of the scheme note, the main problem with this approach is its vulnerability to blackmail attacks. The pathrater selects the path with the highest metric when there are multiple paths for the same destination node. The algorithm followed by the pathrater mechanism initially assigns a rating of 1.0 to itself and 0.5 to each node that it knows through the route discovery function. The nodes that participate on the active paths have their ratings increased by 0.01 at periodic intervals of 200 milliseconds to a maximum rating of 0.8. A rating is decremented by 0.05 when a link breakage is