222 research outputs found

    FSM-F: finite state machine based framework for denial of service and intrusion detection in manet

    Get PDF
    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-theart techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks

    TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network

    Get PDF
    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical environments

    Towards green computing in wireless sensor networks: controlled mobility-aided balanced tree approach

    Get PDF
    Virtualization technology has revolutionized the mobile network and widely used in 5G innovation. It is a way of computing that allows dynamic leasing of server capabilities in the form of services like SaaS, PaaS, and IaaS. The proliferation of these services among the users led to the establishment of large-scale cloud data centers that consume an enormous amount of electrical energy and results into high metered bill cost and carbon footprint. In this paper, we propose three heuristic models namely Median Migration Time (MeMT), Smallest Void Detection (SVD) and Maximum Fill (MF) that can reduce energy consumption with minimal variation in SLAs negotiated. Specifically, we derive the cost of running cloud data center, cost optimization problem and resource utilization optimization problem. Power consumption model is developed for cloud computing environment focusing on liner relationship between power consumption and resource utilization. A virtual machine migration technique is considered focusing on synchronization oriented shorter stop-and-copy phase. The complete operational steps as algorithms are developed for energy aware heuristic models including MeMT, SVD and MF. To evaluate proposed heuristic models, we conduct experimentations using PlanetLab server data often ten days and synthetic workload data collected randomly from the similar number of VMs employed in PlanetLab Servers. Through evaluation process, we deduce that proposed approaches can significantly reduce the energy consumption, total VM migration, and host shutdown while maintaining the high system performance

    F3TM: flooding factor based trust management framework for secure data transmission in MANETs

    Get PDF
    Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks

    Towards green computing for Internet of Things: energy oriented path and message scheduling approach

    Get PDF
    Recently, energy efficiency in sensor enabled wire-less network domain has witnessed significant attention from both academia and industries. It is an enabling technological advancement towards green computing in Internet of Things (IoT) eventually supporting sensor generated big data processing for smart cities. Related literature on energy efficiency in sensor enabled wireless network environments focuses on one aspects either energy oriented path selection or energy oriented message scheduling. The definition of path also varies in literature without considering links towards energy efficiency. In this context, this paper proposes an energy oriented path selection and message scheduling framework for sensor enabled wireless network environments. The technical novelty focuses on effective cooperation between path selection and message scheduling considering links on path, location of message sender, and number of processor in sensor towards energy efficiency. Specifically, a path selection strategy is developed based on shortest path and less number of links on path (SPLL). The location of message sender, and number of processor in specific sensor are utilized for developing a longer hops (LH) message scheduling approach. A system model is presented based on M/M/1 queuing analysis to showcase the effective cooperation of SPLL and LH towards energy efficiency. Simulation oriented comparative performance evaluation attest the energy efficiency of the proposed framework as compared to the state-of-the-art techniques considering number of energy oriented metrics

    Towards Anycasting-driven Reservation System for Electric Vehicle Battery Switch Service

    Get PDF
    Electro-Mobility has become an increasingly important research problem in urban city. Due to the limited electricity of battery, Electric Vehicle (EV) drivers may experience discomfort for long charging waiting time. Different from plug-in charging technology, we investigate the battery switch technology to improve EV drivers’ comfort (e.g., reduce the service waiting time from tens of minutes to a few minutes), by benefiting from switchable (fully-recharged) batteries cycled at Charging Stations (CSs). Since demand hotspot may still happen at CSs (e.g., running out of switchable batteries), incoming EVs may wait additional time to get their battery switched, and thus the EV driver’s comfort is degraded. Firstly, we propose a centralized reservation enabling service, considering EVs’ reservations (including arrival time, expected charging time of their batteries to be depleted) to optimally coordinate their battery switch plans. Secondly, a decentralized system is further proposed, by facilitating the Vehicle-to-Vehicle (V2V) anycasting to deliver EV’s reservations. This helps to address some of the privacy issues that can be materialized in centralized system and reduce communication cost (e.g., through cellular network for reservation making). Results under the Helsinki city scenario show a trade-off between comparable performance (e.g., service waiting time, number of switched batteries) and cellular network cost for EVs’ reservations delivery
    corecore