24 research outputs found

    Trusted Node-Based Algorithm to Secure Home Agent NATed IPv4 Network from IPv6 Routing Header Attacks

    Get PDF
    Providing a secure mobile communication in mixed IPv4/IPv6 networks is a challenging task. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be exploited by attackers to bypass the security. This paper discusses an algorithm to secure home agent network from the routing header vulnerability, where the home agent network uses IPv4 Network Address Translation (NAT) router. The algorithm also takes into account multi-hops destination in the routing header. Verification was done through implementation of the algorithm at the Home Agent modul in a testbed network. The experimental results show that the proposed algorithm provides secure communication between Correspondent nodes and Mobile Nodes that moved into the NATed network without causing a significance filtering delay

    Sentiment analysis of Saudi e-commerce using naïve bayes algorithm and support vector machine

    Get PDF
    The Covid-19 pandemic which has spread across all countries, including Saudi Arabia, has caused the government to create limited curfew policies in the country that affected the economy. This policy has given rise to a new trend in society, namely the habit of shopping online. The trend of purchasing online via e-commerce increases. However, people's opinions and attitudes towards this trend vary. Therefore, this research was conducted with the aim of determining the subjectivity of public opinion or sentiment on the e-commerce activities using probability and statistical approaches, i.e.: the Naïve Bayes (NB) and Support Vector Machine (SVM) classifiers. Three experimental scenarios of dataset splitting for training and testing; 90%:10%; 80%:20%; and 70%:30%. The comparison of accuracy values was carried out using an automatic labeling method. Experimental results show that the 70%:30% split scenario provides the best result, with 89% of accuracy, 99.7% of Precision, 88% of Recall and 93.5% of F1-score for the SVM classifier

    An Incentive Mechanism for Cooperative Data Replication in MANETs - A Game Theoretical Approach

    Get PDF
    Wireless ad hoc networks have seen a great deal of attention in the past years, especially in cases where no infrastructure is available. The main goal in these networks is to provide good data accessibility for participants. Because of the wireless nodes’ continuous movement, network partitioning occurs very often. In order to subside the negative effects of this partitioning and improve data accessibility and reliability, data is replicated in nodes other than the original owner of data. This duplication costs in terms of nodes’ storage space and energy. Hence, autonomous nodes may behave selfishly in this cooperative process and do not replicate data. This kind of phenomenon is referred to as a strategic situation and is best modeled and analyzed using the game theory concept. In order to address this problem we propose a game theory data replication scheme by using the repeated game concept and prove that it is in the nodes’ best interest to cooperate fully in the replication process if our mechanism is used

    An Efficient Cluster-based Routing Protocol for Mobile Ad Hoc Networks

    Get PDF
    Clustering algorithm used in CBRP is a variation of simple lowest-ID clustering algorithm in which the node with a lowest ID among its neighbors is elected as the Cluster-head. Neglecting mobility and energy for selecting cluster-head is one of the weakness points of this protocol. In this paper the cluster formation algorithm is introduced, that uses the relative mobility metric, the residual energy and connectivity degree. After forming the cluster, whenever the cluster-head's energy is less than the aggregate energy of its member nodes, it remains as the cluster-head. Using NS-2 we evaluate rate of cluster-head changes, normalization routing overhead and packet delivery ratio. Comparisons denote that the proposed CBRP has better performances with respect to the original CBRP and Cross-CBRP

    An Incentive Mechanism for Cooperative Data Replication in MANETs - a Game Theoretical Approach

    Full text link
    Wireless ad hoc networks have seen a great deal of attention in the past years, especially in cases where no infrastructure is available. The main goal in these networks is to provide good data accessibility for participants. Because of the wireless nodes' continuous movement, network partitioning occurs very often. In order to subside the negative effects of this partitioning and improve data accessibility and reliability, data is replicated in nodes other than the original owner of data. This duplication costs in terms of nodes' storage space and energy. Hence, autonomous nodes may behave selfishly in this cooperative process and do not replicate data. This kind of phenomenon is referred to as a strategic situation and is best modeled and analyzed using the game theory concept. In order to address this problem we propose a game theory data replication scheme by using the repeated game concept and prove that it is in the nodes' best interest to cooperate fully in the replication process if our mechanism is used

    Protecting home agent client from IPv6 routing header vulnerability in mixed IP networks

    Get PDF
    Mixed IPv4/IPv6 networks will continue to use mobility support over tunneling mechanisms for a long period of time until the establishment of IPv6 end-to-end connectivity. Encapsulating IPv6 traffi c within IPv4 increases the level of hiding internal contents. Thus, mobility in mixed IPv4/IPv6 networks introduces new security vulnerabilities. One of the most critical vulnerabilities associated with the IPv6 protocol is the routing header that potentially may be used by attackers to bypass the network security devices. This paper proposes an algorithm (V6HAPA) for protecting home agent clients from the routing header vulnerability, considering that the home agents reside behind an IPv4 Network Address Translation (NAT) router. The experimental results show that the V6HAPA provides enough confidence to protect the home agent clients from attackers

    Proceedings from the 1st Albaha University–Uppsala University Collaborative Symposium on Quality in Computing Education

    No full text
    This is the proceedings from the first AlBaha University - Uppsala University Collaborative Symposium on Quality in Computing Education (ABU3QCE), held in AlBaha, Saudi Arabia, 24-25 February 2015. ABU3QCE 2015 is a local symposium dedicated to the exchange of research and practice focusing on enhancing quality in computing education. Contributions cover a broad spectrum of computing education challenges ranging from; computer science, computer engineering, computer information systems, computer information technology to software engineering education. ABU3QCE aims to publish research that combines teaching and learning experience with theoretically founded research within the field. The proceedings papers cover a wide range of topics such as cultural aspects of teaching and learning, technology enhanced teaching, and professional competencies and their role in the curriculum and in higher education. The symposium is a collaborative initiative of AlBaha University, Saudi Arabia, and Uppsala University, Sweden. It is our hope that this symposium will highlight current efforts, and also be the starting point for discussions, and inspire others to contribute to take the quality of computing education one step further

    Proceedings from the 1st Albaha University–Uppsala University Collaborative Symposium on Quality in Computing Education

    No full text
    This is the proceedings from the first AlBaha University - Uppsala University Collaborative Symposium on Quality in Computing Education (ABU3QCE), held in AlBaha, Saudi Arabia, 24-25 February 2015. ABU3QCE 2015 is a local symposium dedicated to the exchange of research and practice focusing on enhancing quality in computing education. Contributions cover a broad spectrum of computing education challenges ranging from; computer science, computer engineering, computer information systems, computer information technology to software engineering education. ABU3QCE aims to publish research that combines teaching and learning experience with theoretically founded research within the field. The proceedings papers cover a wide range of topics such as cultural aspects of teaching and learning, technology enhanced teaching, and professional competencies and their role in the curriculum and in higher education. The symposium is a collaborative initiative of AlBaha University, Saudi Arabia, and Uppsala University, Sweden. It is our hope that this symposium will highlight current efforts, and also be the starting point for discussions, and inspire others to contribute to take the quality of computing education one step further
    corecore