16 research outputs found

    Securing Data Dissemination in Vehicular ad hoc Networks

    Get PDF
    Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANET and MANET; it also surveys existing solutions for dissemination control. It highlights a particular area not adequately addressed until now: controlling information flow in VANETs. This thesis contributes a policy-based framework to control the dissemination of messages communicated between nodes in order to ensure that message remains confidential not only during transmission, but also after it has been communicated to another peer, and to keep the message contents private to an originator-defined subset of nodes in the VANET. This thesis presents a novel framework to control data dissemination in vehicle ad hoc networks in which policies are attached to messages as they are sent between peers. This is done by automatically attaching policies along with messages to specify how the information can be used by the receiver, so as to prevent disclosure of the messages other than consistent with the requirements of the originator. These requirements are represented as a set of policy rules that explicitly instructs recipients how the information contained in messages can be disseminated to other nodes in order to avoid unintended disclosure. This thesis describes the data dissemination policy language used in this work; and further describes the policy rules in order to be a suitable and understandable language for the framework to ensure the confidentiality requirement of the originator. This thesis also contributes a policy conflict resolution that allows the originator to be asked for up-to-date policies and preferences. The framework was evaluated using the Network Simulator (NS-2) to provide and check whether the privacy and confidentiality of the originators’ messages were met. A policy-based agent protocol and a new packet structure were implemented in this work to manage and enforce the policies attached to packets at every node in the VANET. Some case studies are presented in this thesis to show how data dissemination can be controlled based on the policy of the originator. The results of these case studies show the feasibility of our research to control the data dissemination between nodes in VANETs. NS-2 is also used to test the performance of the proposed policy-based agent protocol and demonstrate its effectiveness using various network performance metrics (average delay and overhead)

    Data Confidentiality in Mobile Ad hoc Networks

    Full text link
    Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis. These individual nodes act as routers to forward both their own data and also their neighbours' data by sending and receiving packets to and from other nodes in the network. The relatively easy configuration and the quick deployment make ad hoc networks suitable the emergency situations (such as human or natural disasters) and for military units in enemy territory. Securing data dissemination between these nodes in such networks, however, is a very challenging task. Exposing such information to anyone else other than the intended nodes could cause a privacy and confidentiality breach, particularly in military scenarios. In this paper we present a novel framework to enhance the privacy and data confidentiality in mobile ad hoc networks by attaching the originator policies to the messages as they are sent between nodes. We evaluate our framework using the Network Simulator (NS-2) to check whether the privacy and confidentiality of the originator are met. For this we implemented the Policy Enforcement Points (PEPs), as NS-2 agents that manage and enforce the policies attached to packets at every node in the MANET.Comment: 12 page

    Adopting E-Commerce to users’ needs

    Get PDF
    The objectives of this paper are to identify and analyse the extent to which the site is fulfilling all the user’s requirements and needs. The related works comprise the history of interactive design and the benefits of user-centered development, which is the methodology followed in this survey. Moreover, there is a brief comparison between Waterfall and User-centered methodology in terms of addressing the issues of time saving and addressing fulfilment of users’ needs. The data required to conduct this study was acquired using two research methods; the questionnaire and direct user observation, in order to address all the performance related attributes in the usability stage of the evaluation. An evaluation of the website, based on statements of usability goals and criteria, was undertaken in relation to the implementation and testing of the new design. JARIR bookstore website was chosen as a case study in this paper to investigate the usability and interactivity of the website design. The analysis section includes needs, users and tasks and data analysis, whereas the design phase covers the user interface and database design. At the end of this paper, some recommendations are presented regarding JARIR website that can be taken into account when developing the website in the future

    Mobile Grid System: Policy and Privacy

    No full text
    Mobile Grid Services have given the ability to move jobs, data and application software from nodes to nodes during jobs' execution in the grid environment. They have also solved some of the lack in finding suitable resources for the jobs. To facilitate the ability to support mobile resource sharing between multiple heterogeneous Virtual Organizations (VOs), an authorization policy management framework is needed to support authorization for heterogeneous authorization systems. Traditional authorization policy management frameworks act well in authorization policy for a single VO where the contributing hosts grant the permission to follow a global authorization system. However most of policy management tools do not provide a clear support for sharing mobile resources between multiple heterogeneous VOs. To solve this problem, we present in this book a dynamic and heterogeneous policy management framework that can give a clear policy definition about the ability to move jobs, data and application software from nodes to nodes during jobs' execution in the grid environment

    Dynamic Policy Management in Mobile Grid Environments

    No full text
    Mobile Grid Services have given the ability to move jobs, data and application software from nodes tonodes during jobs execution in the grid environment. These migrations depend on the grid’s users and thegrid’s nodes policies. The heterogeneity, diversity of policies and attributes leads to a need for policymanagement tools that can handle these problems. Also, before the users can submit their jobs or runtheir applications on a certain resource or system they may need to guarantee that this resource orsystem has not been compromised, which could result in their own application or data being stolen orasking for certain users to be allowed to access the service. To date, not enough attention has been paidto policies that deal with such concerns. Most existing grid systems have support only limited types ofpolicies (e.g. CPU resources). A few designs consider enforcing data policies in their architecture.Therefore, we propose a dynamic policy framework that addresses these issues (user-submitted policy,data policy and multiple Virtual Organizations (VOs). <br/

    Comparison Between Cloud and Grid Computing: Review Paper

    No full text
    Cloud computing is the most recent announced technology that has been launched on the network world.Clouds are considered as a new generation of Grid computing. Clouds consist of data centres which areowned by the same institute. The homogeneity within each data centre in the infrastructure is the mainfeature for the cloud computing compared to grid computing. This paper provides a definition for thecloud, it discusses many aspects of Cloud Computing, and describes architectures for the cloud (by lookingat Amazon’s application (GrepTheWeb)) and how its cost definition differs from that of Grid computing.This paper focuses on comparing Cloud Computing to previous generations such as Grid Computing, byreviewing some Security and Policy Issues in Cloud and Grid Computing. At the end, this paper describesthe similarities and differences between the Grid and Cloud approaches.<br/

    Review on the Security Related Issues in Context Aware System.”

    No full text
    ABSTRACT A context aware system is recognized as a &quot;system which uses any context information previous to, o

    Privacy in Cloud Systems

    No full text

    Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography

    No full text
    Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by a human operator or autonomously by onboard computer systems. UAVs have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, and situational awareness in challenging circumstances. They also offer a distinct advantage in various applications such as forest fire monitoring and surveillance. Surveillance systems are developed using advanced technologies in the modern era of communications and networks. As a result, UAVs require enhancements to control and manage systems efficiently. Network security is a critical concern with respect to UAVs due to the risk of surveillance information theft and physical misuse. Although several new tools have been introduced to secure networks, attackers can use more advanced methods to get into a UAV network and create problems that pose an organizational threat to the entire system. Security mechanisms also reduce the performance of systems because some restrictive measures prevent users from accessing specific resources, but a few techniques and tools have overcome the problem of performance reduction in various scenarios. There are many types of attacks, i.e., denial of service attacks (DOS), distributed denial of service attacks (DDOS), address resolution protocol (ARP) spoofing, sniffing, etc., that make it challenging to maintain a UAV network. This research paper proposes a lightweight challenge-response authentication that can overcome the previously mentioned problems. As security is provided by utilizing a minimum number of bits in memory, this technique offers the same security features while using fewer network resources, low computing resources, and low power consumption
    corecore