4 research outputs found
Reliable Multipath Secure Routing In Mobile Computer Networks
This paper analyzes the security and reliability of data transmission over wireless networks. We propose a method for determining the optimal parameter of separation message with specified given security level and reliability of data transmission in mobile networks. Keywords: Multipath routing, Mobile network, Securit
Distribution Systems Efficiency
This paper constructing a measurement system for determining the efficiency of the distributed system. This efficiency depends on many parameters like number of terminals, number of customers and kind of information, number of nodes, and number of messages. It is found that the efficiency depends strongly on number of messages sent or received inside the distributed system, as the number of messages increased the efficiency decreased. Keywords: distributed system, terminals, efficiency
A Method of Forming the Optimal Set of Disjoint Path in Computer Networks
This work provides a short analysis of algorithms of
multipath routing. The modified algorithm of formation of the
maximum set of not crossed paths taking into account their
metrics is offered. Optimization of paths is carried out due to
their reconfiguration with adjacent deadlock path.
Reconfigurations are realized within the subgraphs including
only peaks of the main and an adjacent deadlock path. It allows
to reduce the field of formation of an optimum path and time
complexity of its formation
Hybrid Chain: Blockchain Enabled Framework for Bi-Level Intrusion Detection and Graph-Based Mitigation for Security Provisioning in Edge Assisted IoT Environment
Internet of Things (IoT) is an emerging technology and its applications are flattering amidst many users, as it makes everything easier. As a consequence of its massive growth, security and privacy are becoming crucial issues where the IoT devices are perpetually vulnerable to cyber-attacks. To overcome this issue, intrusion detection and mitigation is accomplished which enhances the security in IoT networks. In this paper, we proposed Blockchain entrenched Bi-level intrusion detection and graph based mitigation framework named as HybridChain-IDS. The proposed work embrace four sequential processes includes time-based authentication, user scheduling and access control, bi-level intrusion detection and attack graph generation. Initially, we perform time-based authentication to authenticate the legitimate users using NIK-512 hashing algorithm, password and registered time are stored in Hybridchain which is an assimilation of blockchain and Trusted Execution Environment (TEE) which enhances data privacy and security. After that, we perform user scheduling using Cheetah Optimization Algorithm (COA) which reduces the complexity and then the access control is provided to authorized users by smart contract by considering their trust and permission level. Then, we accomplish bi-level intrusion detection using ResCapsNet which extracts sufficient features and classified effectively. Finally, risk of the attack is evaluated, and then the attacks graphs are generated by employing Enhanced k-nearest neighbor (KNN) algorithm to identify the attack path. Furthermore, the countermeasures are taken based on the attack risk level and the attack graph is stored in Hybridchain for eventual attack prediction. The implementation of this proposed work is directed by network simulator of NS-3.26 and the performance of the proposed HybridChain-IDS is enumerated based on various performance metrics