9 research outputs found

    Using Network Processor to Establish Security Agent for AODV Routing Protocol

    Get PDF
    Network Processor (NP) is optimized to perform special network functionalities. It has highly parallel processing architecture to achieve high performance. Ad hoc network is an exciting research aspect due to the characters of self-organization、 dynamically changing topology and temporary network life. However, all the characters make the security problem more serious. Denial-of-Service (DoS) attack is the main puzzle in the security of Ad hoc network. A novel NP-based security scheme is proposed to combat the attack in AODV routing protocol. Security agent is established by a hardware thread in NP. Agent can update itself at some interval by the trustworthiness of the neighbor nodes. Agent can trace the RREQ and RREP messages stream to aggregate the key information to link list and analyze them by intrusion detection algorithm. NS2 simulator is expanded to validate the security scheme. Simulation results show that NP-based security scheme is highly effective to detect and block DoS attack

    Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Get PDF
    Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography) based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system). Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system

    DT-AODV: An On-Demand Routing Protocol based DTN in VANET

    No full text
    Vehicular Ad Hoc Networks (VANET) as a fundamental part of the future intelligent, which constitutes by communication between cars, cars and roadside node use a unified wireless communication network, it can transmit auxiliary driving or real-time information to avoid accidents, and can provide the operating convenience and security with people’s travel, so VANET routing protocols is crucial, especially the packet delivery ratio in protocol. Firstly, the traditional routing protocols in MANET is researched and the actual real movement of vehicles on the road is built for network simulation, all aspects of the performance of the AODV, DSDV and DSR routing protocols is analyzed in VANET environment, the result showed that the three classic routing protocols are not suitable for VANET with the characteristic of low packet transmission rate, high normalized routing load and large delay in the average end to end. Then, according to delay tolerant network (DTN) network topology can change dynamically over time to determine the appropriate case transmission path, and it can more effectively sends the packet to the destination, so the stored - carry - forwards mechanism as a design basis, the on-demand routing protocol DT-AODV based DTN is proposed, taking into account the variability of VANET when connected, a directed graph model is built in VANET modeled, and finally the detailed protocol is descripted. Experimental comparison shows that, DT-AODV is more suitable for VANET than other classical routing protocol in MANET

    Wireless Ad hoc Network Security Multi-path Routing Protocol Survivability Modeling Research

    No full text
    Network survivability is the key ability of ad hoc network under all kinds of attacks, which is a foundation to the design and evaluation of wireless ad hoc network routing protocol. The definitions of network survivability are analyzed and compared. We propose a novel survivability model based on Finite State Machine (FSM) and District Time Markov Chain (DTMC) model. DTMC steady-state probabilities are theoretically deduced and computed. Performance Evaluation Process Algebra (PEPA) is used to decribe the state transition model, PEPA Eclipse Plug-in software is used to compute the steady-state probabilities. We find that the steady-state probabilities computed by PEPA software match well with the formula derivation. Experiment results show that G steady-state probability decreases with the increasing transition probability of attack state. Finally, we validate the proposed model by PEPA simulations and numerical analysis

    Probabilistic Analysis of Steady-State Temperature and Maximum Frequency of Multicore Processors considering Workload Variation

    No full text
    A probabilistic method is presented to analyze the temperature and the maximum frequency for multicore processors based on consideration of workload variation, in this paper. Firstly, at the microarchitecture level, dynamic powers are modeled as the linear function of IPCs (instructions per cycle), and leakage powers are approximated as the linear function of temperature. Secondly, the microarchitecture-level hotspot temperatures of both active cores and inactive cores are derived as the linear functions of IPCs. The normal probabilistic distribution of hotspot temperatures is derived based on the assumption that IPCs of all cores follow the same normal distribution. Thirdly and lastly, the probabilistic distribution of the set of discrete frequencies is determined. It can be seen from the experimental results that hotspot temperatures of multicore processors are not deterministic and have significant variations, and the number of active cores and running frequency simultaneously determine the probabilistic distribution of hotspot temperatures. The number of active cores not only results in different probabilistic distribution of frequencies, but also leads to different probabilities for triggering DFS (dynamic frequency scaling)
    corecore