10 research outputs found

    MSP-N: Multiple selection procedure with 'N' possible growth mechanisms.

    No full text
    Network modeling is a challenging task due to non-trivial evolution dynamics. We introduce multiple-selection-procedure with 'N' possible growth mechanisms (MSP-N). In MSP-N, an incoming node chooses a single option among N available options to link to pre-existing nodes. Some of the potential options, in case of social networks, can be standard preferential or random attachment and node aging or fitness. In this paper, we discuss a specific case, MSP-2, and shows its efficacy in reconstructing several non-trivial characteristic properties of social networks, including networks with power-law degree distribution, power-law with an exponential decay (exponential cut-off), and exponential degree distributions. We evaluate the proposed evolution mechanism over two real-world networks and observe that the generated networks highly resembles the degree distribution of the real-world networks. Besides, several other network properties such as high clustering and triangle count, low spectral radius, and community structure, of the generated networks are significantly closer to the real-world networks

    An EAP-based mutual authentication protocol for WLAN-connected IoT devices

    Get PDF
    Abstract Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol for WLAN-connected Internet of Things devices is presented. We conduct an informal and formal security analysis to ensure robustness against the attacks. Furthermore, the empirical performance analysis and comparison show that the proposed protocol outperforms its counterparts, reducing computational, communication, storage costs, and energy consumption by up to 99%, 80%, 91.8%, and 98%, respectively. Simulation results of the protocol using the NS3 and its overhead under unknown attacks demonstrate that the proposed protocol performs better in all scenarios. A prototype implementation of the protocol has also been tested to evaluate its feasibility in real-time applications

    Influence of strongly coupled plasma on the low-lying transitions of Be-like ions

    No full text
    The influence of plasma screening on the intercombination 2s21S0 → 2snp3P1o{\mathrm{P}}_{1}^{\mathrm{o}}(n = 2, 3) and resonance 2s2 1S0 → 2snp1P1o{\mathrm{P}}_{1}^{\mathrm{o}}(n = 2, 3) transitions of Be-like Si10+, Ca16+ and Fe22+ ions immersed in strongly coupled plasma environment is investigated. The multiconfiguration Dirac–Fock method and relativistic configuration interaction technique have been implemented within the general framework of the ion sphere theory. It has been found that the transition energies associated with Δn = 0 transitions are blue shifted, while the energies corresponding to Δn ≠ 0 transitions are red shifted. The variation of weighted oscillator strengths with free electron density has been studied. Thermodynamic pressure experienced by the ions in the ground state 2s2 1S0 inside the ion sphere is also reported. The results of this study should be of great help in the modeling and the interpretation of spectral properties in laboratory and astrophysical plasmas

    LEMAP:a lightweight EAP based mutual authentication protocol for IEEE 802.11 WLAN

    No full text
    Abstract The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) of an organization’s WLAN. Many of these protocols use the Extensible Authentication Protocol (EAP) framework. These protocols are either vulnerable to attacks such as violation of perfect forward secrecy, replay attack, synchronization attack, privileged insider attack, and identity theft or require high computational and communication costs. In this paper, a lightweight EAP-based authentication protocol for IEEE 802.11 WLAN is proposed that not only addresses the security issues in the existing WLAN authentication protocols but is also cost-effective. The security of the proposed protocol is verified using BAN logic and the Scyther tool. Our analysis shows that the proposed protocol is safe against all the above attacks and attacks defined in RFC-4017. A comparison of the computational and communication costs of the proposed protocol with other existing state-of-the-art protocols shows that the proposed protocol is lightweight than existing solutions
    corecore