222 research outputs found
Recommended from our members
Towards green computing oriented security: a lightweight postquantum signature for IoE
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations
FSM-F: finite state machine based framework for denial of service and intrusion detection in manet
Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-theart techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks
TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network
Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments
Towards green computing in wireless sensor networks: controlled mobility-aided balanced tree approach
Virtualization technology has revolutionized the mobile network and widely used in 5G innovation. It is a way of computing that allows dynamic leasing of server capabilities in the form of services like SaaS, PaaS, and IaaS. The proliferation of these services among the users led to the establishment of large-scale cloud data centers that consume an enormous amount of electrical energy and results into high metered bill cost and carbon footprint. In this paper, we propose three heuristic models namely Median Migration Time (MeMT), Smallest Void Detection (SVD) and Maximum Fill (MF) that can reduce energy consumption with minimal variation in SLAs negotiated. Specifically, we derive the cost of running cloud data center, cost optimization problem and resource utilization optimization problem. Power consumption model is developed for cloud computing environment focusing on liner relationship between power consumption and resource utilization. A virtual machine migration technique is considered focusing on synchronization oriented shorter stop-and-copy phase. The complete operational steps as algorithms are developed for energy aware heuristic models including MeMT, SVD and MF. To evaluate proposed heuristic models, we conduct experimentations using PlanetLab server data often ten days and synthetic workload data collected randomly from the similar number of VMs employed in PlanetLab Servers. Through evaluation process, we deduce that proposed approaches can significantly reduce the energy consumption, total VM migration, and host shutdown while maintaining the high system performance
Recommended from our members
Inter Vehicle Distance based connectivity aware routing in vehicular adhoc networks
Connectivity in vehicular traffic environment has witnessed significant attention due to the direct impact on the performance of most of the traffic safety applications of intelligent transport system. Various parameters such as density, speed, direction, link quality and inter vehicle distance (IVD) have been utilized for measuring connectivity. IVD has greater impact on connectivity and controls the impact of other parameters. Usage of real time IVD for measuring connectivity has not received sufficient attention in VANETs. This paper proposes IVD based connectivity aware routing (Ivd-CAR) for enhancing connectivity aware data dissemination. IVD calculation is robust and can effectively handle instantaneous GPS failure. Two localization techniques; namely, cooperative localization and Geometry based Localization are developed. Standard deviation of real time IVDs of a forwarding path is derived. Distribution of IVDs of a forwarding path is employed for estimating connectivity. Segment vehicle based next hop vehicle selection is utilized for incorporating network load, link quality and direction into consideration while selecting forwarding path. Simulations are carried out in ns2 to evaluate the performance of Ivd-CAR in realistic traffic environment. Comparative analysis of simulation results attests the superiority of Ivd-CAR to the state-of-the-art techniques: CSR and A-CAR
F3TM: flooding factor based trust management framework for secure data transmission in MANETs
Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks
Towards green computing for Internet of Things: energy oriented path and message scheduling approach
Recently, energy efficiency in sensor enabled wire-less network domain has witnessed significant attention from both academia and industries. It is an enabling technological advancement towards green computing in Internet of Things (IoT) eventually supporting sensor generated big data processing for smart cities. Related literature on energy efficiency in sensor enabled wireless network environments focuses on one aspects either energy oriented path selection or energy oriented message scheduling. The definition of path also varies in literature without considering links towards energy efficiency. In this context, this paper proposes an energy oriented path selection and message scheduling framework for sensor enabled wireless network environments. The technical novelty focuses on effective cooperation between path selection and message scheduling considering links on path, location of message sender, and number of processor in sensor towards energy efficiency. Specifically, a path selection strategy is developed based on shortest path and less number of links on path (SPLL). The location of message sender, and number of processor in specific sensor are utilized for developing a longer hops (LH) message scheduling approach. A system model is presented based on M/M/1 queuing analysis to showcase the effective cooperation of SPLL and LH towards energy efficiency. Simulation oriented comparative performance evaluation attest the energy efficiency of the proposed framework as compared to the state-of-the-art techniques considering number of energy oriented metrics
Recommended from our members
Toward Energy-Oriented Optimization for Green Communication in Sensor Enabled IoT Environments
[EN] One of the major bottlenecks toward realizing IoT systems is the energy constraint of sensors. Prolonging network lifetime is a fundamental issue for implementing IoT systems. The energy optimization problem, being NP-hard in nature for scalable networks, has been addressed in the literature using traditional metaheuristic techniques. Quantum inspired metaheuristics have shown better performance than their traditional counterparts in solving such optimization problems in different domains. Toward this end, this article proposes a quantum inspired green communication framework for Energy Balancing in sensor enabled IoT systems (Q-EBIoT). First, an energy optimization model for sensor enabled IoT environments is presented, where energy consumption is derived as cost of the energy-oriented paths. Second, a quantum computing oriented solution is developed for the optimization problem focusing on energy centric solution representation, measurement, and rotation angle. The proposed solution is implemented to evaluate the comparative performance with the state-of-the-art techniques. The evaluation demonstrates the benefit of the proposed framework in terms of various energy-related metrics for sensor enabled IoT environments.Kumar, S.; Kaiwartya, O.; Rathee, M.; Kumar, N.; Lloret, J. (2020). Toward Energy-Oriented Optimization for Green Communication in Sensor Enabled IoT Environments. IEEE Systems Journal. 14(4):4663-4673. https://doi.org/10.1109/JSYST.2020.29758234663467314
Towards Anycasting-driven Reservation System for Electric Vehicle Battery Switch Service
Electro-Mobility has become an increasingly important research problem in urban city. Due to the limited electricity of battery, Electric Vehicle (EV) drivers may experience discomfort for long charging waiting time. Different from plug-in charging technology, we investigate the battery switch technology to improve EV drivers’ comfort (e.g., reduce the service waiting time from tens of minutes to a few minutes), by benefiting from switchable (fully-recharged) batteries cycled at Charging Stations (CSs). Since demand hotspot may still happen at CSs (e.g., running out of switchable batteries), incoming EVs may wait additional time to get their battery switched, and thus the EV driver’s comfort is degraded. Firstly, we propose a centralized reservation enabling service, considering EVs’ reservations (including arrival time, expected charging time of their batteries to be depleted) to optimally coordinate their battery switch plans. Secondly, a decentralized system is further proposed, by facilitating the Vehicle-to-Vehicle (V2V) anycasting to deliver EV’s reservations. This helps to address some of the privacy issues that can be materialized in centralized system and reduce communication cost (e.g., through cellular network for reservation making). Results under the Helsinki city scenario show a trade-off between comparable performance (e.g., service waiting time, number of switched batteries) and cellular network cost for EVs’ reservations delivery
- …