242 research outputs found

    SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication

    Get PDF
    Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication.

    Get PDF
    Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively static andenergy-rich devices, and Mesh Clients which are relativelydynamic and power constrained devices. In this paper we presenta new model for WMN end-to-end security which divideauthentication process into two phases: Mesh Access Point phasewhich based on asymmetric cryptography and Mesh Client phasewhich based on a server-side certificate such as EAP-TTLSand PEAP

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication

    Get PDF
    Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP

    An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC

    Get PDF
    currently the world is adopting Internet of Things (IoT) as the future technology and the interest IoT development is increasing. As it’s expected to be the leading technology by 2022 according to Gartner. WSN is the main technology component of the IoT since it rely on sensing and collecting data in a specific filed of interest. As the WSN main issue is the network life time due the limitation in sensors resource. Therefore, such lifetimeconstrained devices require enchantment on the existing routing protocols to prolong network life time as long as possible. In our paper we propose enhancement in the well know WSN routing protocol LEACH by proposing a new Energy aware algorithm in communication within cluster, hence reduce power consumption in communication process

    Evaluation of performance-based earthquake engineering in Yemen

    Get PDF
    Building codes follow a common concept in designing buildings to achieve an acceptable seismic performance. The objective underlying the concept is to ensure that the buildings should be able to resist minor earthquake without damage, resist moderate earthquake with some non-structural damage, and resist major earthquakes without collapse, but some structural as well as non-structural damage. This study aims to evaluate the performance-based seismic to come up with necessary recommendations for both future practices, essential review, and restoration of existing structures in Yemen. To do this real case studies incorporated, and nonlinear pushover analysis is carried out. The analysis results presented and then assessed to find out the conformity with the required performance. The structural sections assumed at the beginning of the design, then the design repeated many times to achieve the selected performance criteria (the plastic hinge properties and the maximum displacement)
    corecore