2 research outputs found

    FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks

    Full text link
    © 2019 Ngoc T. Luong et al. Request route flooding attack is one of the main challenges in the security of Mobile Ad Hoc Networks (MANETs) as it is easy to initiate and difficult to prevent. A malicious node can launch an attack simply by sending an excessively high number of route request (RREQ) packets or useless data packets to nonexistent destinations. As a result, the network is rendered useless as all its resources are used up to serve this storm of RREQ packets and hence unable to perform its normal routing duty. Most existing research efforts on detecting such a flooding attack use the number of RREQs originated by a node per unit time as the threshold to classify an attacker. These algorithms work to some extent; however, they suffer high misdetection rate and reduce network performance. This paper proposes a new flooding attacks detection algorithm (FADA) for MANETs based on a machine learning approach. The algorithm relies on the route discovery history information of each node to capture similar characteristics and behaviors of nodes belonging to the same class to decide if a node is malicious. The paper also proposes a new flooding attacks prevention routing protocol (FAPRP) by extending the original AODV protocol and integrating FADA algorithm. The performance of the proposed solution is evaluated in terms of successful attack detection ratio, packet delivery ratio, and routing load both in normal and under RREQ attack scenarios using NS2 simulation. The simulation results show that the proposed FAPRP can detect over 99% of RREQ flooding attacks for all scenarios using route discovery frequency vector of sizes larger than 35 and performs better in terms of packet delivery ratio and routing load compared to existing solutions for RREQ flooding attacks

    5G και IoT και σύγχρονες εφαρμογές

    Get PDF
    Η παρούσα εργασία ασχολείται με το ΙοΤ με δυνατότητα 5G. Αρχικά στην εργασία γίνεται αναφορά στην ιστορική εξέλιξη του 5G. Ακολουθεί αναφορά στην τεχνολογία 5G, όπου αναφέρονται τα χαρακτηριστικά του 5G, τα οφέλη της τεχνολογίας 5G και παρουσιάζονται αναλυτικά οι τεχνολογίες για αλληλεπίδραση με ΙοΤ. Επίσης, γίνεται περιγραφή της τεχνολογίας ΙοΤ, όπου αποτυπώνονται οι προκλήσεις και τα χαρακτηριστικά του ΙοΤ, οι τεχνολογίες IoT και οι τεχνολογίες για αλληλεπίδραση με 5G. Ακολουθεί εκτενής αναφορά στην αρχιτεκτονική του συστήματος 5G - IoT, καθώς και στις απαιτήσεις ασφαλείας και τις πιθανές επιθέσεις σε επικοινωνία IoT με δυνατότητα. Στη συνέχεια, αναφέρονται τα υπάρχοντα πρωτόκολλα ασφαλείας σε περιβάλλον επικοινωνιών IoT με δυνατότητα 5G. Η εργασία ολοκληρώνεται με αναφορά στο υφιστάμενο εμπορικό πλαίσιο του 5G στην παγκόσμια βιομηχανία, αλλά και με ιδιαίτερη αναφορά στις μελλοντικές προκλήσεις της τεχνολογίας που μελετήθηκε.The present work deals with IoT with 5G capability. Initially, the work refers to the historical development of 5G. The following is a reference to 5G technology, which mentions the features of 5G, the benefits of 5G technology and presents in detail the technologies for interaction with IoT. It also describes IoT technology, which captures the challenges and features of IoT, IoT technologies and technologies for 5G interaction. The following is an extensive reference to the 5G - IoT system architecture, as well as security requirements and possible attacks on IoT communication capabilities. The following is a list of existing security protocols in a 5G IoT communication environment. The work concludes with a reference to the current commercial context of 5G in the global industry, but also with a special reference to the future challenges of the technology studied
    corecore