121 research outputs found

    FSM-F: finite state machine based framework for denial of service and intrusion detection in manet

    Get PDF
    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-theart techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks

    F3TM: flooding factor based trust management framework for secure data transmission in MANETs

    Get PDF
    Due to the absence of infrastructure support, secure data dissemination is a challenging task in scalable mobile ad hoc networks (MANETs) environment. In most of the traditional routing techniques for MANETs, either security has not been taken into account or only one aspect of security concern has been addressed without optimizing the routing performance. This paper proposes Flooding Factor based Framework for Trust Management (F3TM) in MANETs. True flooding approach is utilized to identify attacker nodes based on the calculation of trust value. Route Discovery Algorithm is developed to discover an efficient and secure path for data forwarding using Experimental Grey Wolf algorithm for validating network nodes. Enhanced Multi-Swarm Optimization is used to optimize the identified delivery path. Simulations are carried out in ns2 to assess and compare the performance of F3TM with the state-of-the-art frameworks: CORMAN and PRIME considering the metrics including delay, packet delivery ration, overhead and throughput. The performance assessment attests the reliable security of F3TM compared to the state-of-the-art frameworks

    Towards green computing for Internet of Things: energy oriented path and message scheduling approach

    Get PDF
    Recently, energy efficiency in sensor enabled wire-less network domain has witnessed significant attention from both academia and industries. It is an enabling technological advancement towards green computing in Internet of Things (IoT) eventually supporting sensor generated big data processing for smart cities. Related literature on energy efficiency in sensor enabled wireless network environments focuses on one aspects either energy oriented path selection or energy oriented message scheduling. The definition of path also varies in literature without considering links towards energy efficiency. In this context, this paper proposes an energy oriented path selection and message scheduling framework for sensor enabled wireless network environments. The technical novelty focuses on effective cooperation between path selection and message scheduling considering links on path, location of message sender, and number of processor in sensor towards energy efficiency. Specifically, a path selection strategy is developed based on shortest path and less number of links on path (SPLL). The location of message sender, and number of processor in specific sensor are utilized for developing a longer hops (LH) message scheduling approach. A system model is presented based on M/M/1 queuing analysis to showcase the effective cooperation of SPLL and LH towards energy efficiency. Simulation oriented comparative performance evaluation attest the energy efficiency of the proposed framework as compared to the state-of-the-art techniques considering number of energy oriented metrics

    Mobile edge computing for big-data-enabled electric vehicle charging

    Get PDF
    As one of the key drivers of smart grid, EVs are environment-friendly to alleviate CO2 pollution. Big data analytics could enable the move from Internet of EVs, to optimized EV charging in smart transportation. In this article, we propose a MECbased system, in line with a big data-driven planning strategy, for CS charging. The GC as cloud server further facilitates analytics of big data, from CSs (service providers) and on-the-move EVs (mobile clients), to predict the charging availability of CSs. Mobility-aware MEC servers interact with opportunistically encountered EVs to disseminate CSs' predicted charging availability, collect EVs' driving big data, and implement decentralized computing on data mining and aggregation. The case study shows the benefits of the MEC-based system in terms of communication efficiency (with repeated monitoring of a traffic jam) concerning the long-term popularity of EVs

    A COVID-19-Based Modified Epidemiological Model and Technological Approaches to Help Vulnerable Individuals Emerge from the Lockdown in the UK

    Get PDF
    COVID-19 has shown a relatively low case fatality rate in young healthy individuals, with the majority of this group being asymptomatic or having mild symptoms. However, the severity of the disease among the elderly as well as in individuals with underlying health conditions has caused significant mortality rates worldwide. Understanding this variance amongst different sectors of society and modelling this will enable the different levels of risk to be determined to enable strategies to be applied to different groups. Long-established compartmental epidemiological models like SIR and SEIR do not account for the variability encountered in the severity of the SARS-CoV-2 disease across different population groups. The objective of this study is to investigate how a reduction in the exposure of vulnerable individuals to COVID-19 can minimise the number of deaths caused by the disease, using the UK as a case study. To overcome the limitation of long-established compartmental epidemiological models, it is proposed that a modified model, namely SEIR-v, through which the population is separated into two groups regarding their vulnerability to SARS-CoV-2 is applied. This enables the analysis of the spread of the epidemic when different contention measures are applied to different groups in society regarding their vulnerability to the disease. A Monte Carlo simulation (100,000 runs) along the proposed SEIR-v model is used to study the number of deaths which could be avoided as a function of the decrease in the exposure of vulnerable individuals to the disease. The results indicate a large number of deaths could be avoided by a slight realistic decrease in the exposure of vulnerable groups to the disease. The mean values across the simulations indicate 3681 and 7460 lives could be saved when such exposure is reduced by 10% and 20% respectively. From the encouraging results of the modelling a number of mechanisms are proposed to limit the exposure of vulnerable individuals to the disease. One option could be the provision of a wristband to vulnerable people and those without a smartphone and contact-tracing app, filling the gap created by systems relying on smartphone apps only. By combining very dense contact tracing data from smartphone apps and wristband signals with information about infection status and symptoms, vulnerable people can be protected and kept safer
    corecore