851 research outputs found
DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute
Secure Routing Protocols Comparison Analysis Between RNBR, SAA, A-UPK
The advent of wireless communications and the development of mobile devices have made great strides in the development of roaming communications. The MANET mobile network was developed with the ability for mobile devices to quickly self-configure and extend wireless coverage without infrastructure support. Security is one of the most important areas of research and plays a vital role in determining the success of personal and commercial telephone systems.Therefore, this study focuses on systematically examining MANET security and accountability issues and analyzing the performance of solutions proposed by three different design approaches to security systems.First, it provides an approach for identifying trusted nodes employing the proposed RNBR method for secure routing.it provides a Self-Assured Assessment (SAA) method to estimate node stability. Its main goal is to contribute to a self-assessment-based reliability assessment mechanism that provides a reliable and reliable pathway.it provides a new authentication method to prevent forgery attacks. It supports authentication mechanisms to prevent RF attacks and ensure secure routing development.The main Objective of this paper is compare to packet delivery Ratio ,Control Overhead, Packet Drop Ratio in different secure RNBR,SAA,A-UPK Routing Protocols in MANETS
Quality of Service (QoS) security in mobile ad hoc networks
With the rapid proliferation of wireless networks and mobile computing applications,
Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased
attention. Security is a critical aspect of QoS provisioning in the MANET environment.
Without protection from a security mechanism, attacks on QoS signaling system could
result in QoS routing malfunction, interference of resource reservation, or even failure of
QoS provision.
Due to the characteristics of the MANETs, such as rapid topology change and limited
communication and computation capacity, the conventional security measures cannot be
applied and new security techniques are necessary. However, little research has been
done on this topic. In this dissertation, the security issues will be addressed for MANET
QoS systems.
The major contributions of this research are: (a) design of an authentication mechanism
for ad hoc networks; (b) design of a security mechanism to prevent and detect attacks on
the QoS signaling system; (c) design of an intrusion detection mechanism for bandwidth
reservation to detect QoS attacks and Denial of Service (DoS) attacks. These three
mechanisms are evaluated through simulation
Communication Technologies for Smart Grid: A Comprehensive Survey
With the ongoing trends in the energy sector such as vehicular
electrification and renewable energy, smart grid is clearly playing a more and
more important role in the electric power system industry. One essential
feature of the smart grid is the information flow over the high-speed, reliable
and secure data communication network in order to manage the complex power
systems effectively and intelligently. Smart grids utilize bidirectional
communication to function where traditional power grids mainly only use one-way
communication. The communication requirements and suitable technique differ
depending on the specific environment and scenario. In this paper, we provide a
comprehensive and up-to-date survey on the communication technologies used in
the smart grid, including the communication requirements, physical layer
technologies, network architectures, and research challenges. This survey aims
to help the readers identify the potential research problems in the continued
research on the topic of smart grid communications
Project BeARCAT : Baselining, Automation and Response for CAV Testbed Cyber Security : Connected Vehicle & Infrastructure Security Assessment
Connected, software-based systems are a driver in advancing the technology of transportation systems. Advanced automated and autonomous vehicles, together with electrification, will help reduce congestion, accidents and emissions. Meanwhile, vehicle manufacturers see advanced technology as enhancing their products in a competitive market. However, as many decades of using home and enterprise computer systems have shown, connectivity allows a system to become a target for criminal intentions. Cyber-based threats to any system are a problem; in transportation, there is the added safety implication of dealing with moving vehicles and the passengers within
- …