39 research outputs found

    New Software Architecture for Mobility and Handoff Management in Mobile IPV6 Networks

    Get PDF
    This paper addresses the problem of overall network signaling and packet delivery cost in Mobile Internet Protocol (MIP) systems for serving mobility and service management related operations. In MIP, a Mobile Node (MN) interacts with its home agent, when it is connected to a foreign agent to manage the mobility and packet delivery in a bidirectional tunneling mode. This paper proposes new software mobility management service architecture with the goal to handle the heavy burden on the home network and to minimize the cost of network signaling and packet delivery. Under the proposed architecture, a MN creates a Mobile Remote Object (MRO) and transfers it to the router of the hosted network. The MRO registers itself with a naming service server. The MRO handles all services engaged by the MN without relying on centralized traffic

    Design a Cloud Security Model in VANET Communication: Implementation, Performance and Security Analysis

    Get PDF
    In the first paper of this work, the design and the architecture of our proposed model framework, VANET Security as a Service (VSaaS), was discussed. In this second paper, the performance metrics measurements will be investigated through the NS2, SUMO and Trans simulations, to evaluate the security overhead of the secure Vehicle Information Messages (VIMs), which are sent by the vehicles to the cloud as a coarse-grained information. Moreover, our proposed model framework (VSaaS) will be discussed against the security requirements in the VANET

    Design a Cloud Security Model in VANET Communication: Design and Architecture

    Get PDF
    During the last few years, Intelligent Transportation System (ITS) has been progressed at a rapid rate, which aimed to improve the transportation activities in the terms of the safety and efficiency. According to many issues with the traditional Vehicular Ad-Hoc Networks (VANET), some efforts are made to merge the VANET with the cloud technology. This work proposes the VANET based on the cloud (V2Cloud), and designs a security model framework that is hosted on the cloud to manage the security services, and provide a secure VANET communication between the different entities eg vehicles, authorities and etc. This security model framework is called VANET Security as a Service (VSaaS). Our works will presented in a set of two papers. In this first one, it presents VSaaS design and architecture in order to show that the VSaaS fulfills the VANET's security requirements, and protects the VANET against the different types of attacks. The second paper will present the progress towards the implementation and the security analysis of the proposed architecture, along with the results of the performance of the security overhead for the secure Vehicle Information Messages (VIMs), which are sent by vehicles to the cloud as a coarse-grained information

    2-hop Clustering to accomplish semi-static structure in

    Get PDF
    Most researches today trend to clustering in ad hoc networks for building hierarchies to solve management problems in flat architectures. Clustering aims to elect suitable nodes as representatives to lead the network, called Cluster Heads (CHs). Frequent topology changes occur due to nodes mobility and failure. Although re-clustering is invoked to maintain the clusters, many cases involve destroying the cluster when the CH moves to another region or fails and hence building new cluster/s is needed which negatively affects the stability of the network and its ability to provide services. In this research, I developed a 2-hop clustering solution to accomplish a semi-static structure. This is accomplished by reassigning the CHs according to the number of 1-hop neighbors. The node that has the highest number of 1-hop neighbors that are in the 1-hop range of the CH has the highest connectivity with the members and hence it is the best node to replace the CH when moves or fails. Simulation results show accomplishing semi-static structure and enhancing the performance of the ad hoc network. Keywords: Ad hoc networks, Cluster, Connectivity Numbe

    A location aided fast handoff protocol for the next generation wireless systems

    Get PDF
    An important and challenging issue in the nextgeneration wireless systems (NGWS) is to support seamless handoff while moving between different integrated networks. This paper presents a location aided fast handoff protocol which is an improvement over the pre-registration low latency handoff proposed by the IETF. Pre-Registration requires layer 2 information that might not be present in the access technology being used. By processing geographical data information acquired through GPS related to mobile node movement and the coverage area of each foreign agent intelligent handoff decisions can be made, allowing more control over the actual handoff latency and buffering requirements

    Adaptive Mobility Management Scheme for Mobile IP using Ad Hoc Networks.

    Get PDF
    Mobile IP has been developed to handle global mobility of mobile hosts. Mobile IP suffers from a number of drawbacks such as frequent location update, high signaling overhead, high handover latency, high packet loss rate, and requirement of infrastructure change. To treat these problems, we propose a new mobility management scheme by constructing dynamic service regions of Ad Hoc networks for roaming mobile host without location update to reduce signaling overhead and packets loss. Analytical analysis and simulation results are shown in this paper to demonstrate that the proposed scheme performs better performance than other schemes

    Cluster Based Geo-Routing Protocol

    Get PDF
    This paper addresses the problem of the overhead resulting from flooding the control packets in mobile ad hoc networks in searching for routes between the source and destination. We propose a location enhanced routing protocol for clustered MANETs based on the cluster based routing protocol (CBRP). Our protocol employs local position information obtained by smart antennas to discover routes and make routing decisions for the clustered MANETs. One of the CHs, named general manager (GM), is assigned the responsibility to maintain the local positions of the other nodes. The GM divides the space into four quarters and periodically sends HELLO messages that reach all the nodes. Then each node sends its location information to the GM when this information is changed. Also, the GM has the responsibility to route data from the source to the destination. Simulation results show enhancing the performance of clustered MANETs by decreasing the control packets overhead

    Secure Live Virtual Machine Migration by Proposed Security Center

    Get PDF
    In this paper, we propose a Security Center (SC) to provide a secure environment for Live Virtual Machine (VM) migration which is defined as the movement of a virtual machine from one physical host to another. In the cloud systems, the migration has appeared based on the need of transferring VMs among resources. At most, researchers have focused on the performance of migration process; whereas the security aspects in migration have not been fully explored. So, we show how our proposed mechanism analyzes and fulfills the major security requirements for secure live VM migration in cloud environments to become protected against different types of passive and active attacks

    The Two secured Factors of Authentication

    Get PDF
    One of the popular challenges that faces the Cloud Computing is the authentication problem. Authentication is a mechanism to establish proof of identities to get access of information in the system. There are several solutions to overcome this issue that it can be gathered in three authentication mechanisms which lead to a multifactorial authentication schema. The multi factor is proposed in this paper confirms the user's identity without sending it to the cloud server, which will gain our solution more security and fast response over other solutions that depend on sending the user identity to the server to be authenticated. The User's credentials have never exchanged with the server, it is only saved in the user's mind. We present an efficient authentication schema which based on two authentication factors, the first is the password-based authentication, which is processed in the user's machine, and the second is the biometric-based authentication which adds more secure factors to the authentication process. We use the Elgamal Elliptic Curve Cryptosystem and the symmetric encryption to overcome the security threads on the authentication process. Furthermore; we use the 3D face image as a second challenge response factor in our proposed algorithm. In addition, to save the bandwidth and computation, we use a mobile agent to pass the first factor of the authentication code to be executed in the client machine, and let the second factor to be executed in the cloud server

    Global, regional, and national burden of stroke and its risk factors, 1990–2019: a systematic analysis for the Global Burden of Disease Study 2019

    Get PDF
    Background Regularly updated data on stroke and its pathological types, including data on their incidence, prevalence, mortality, disability, risk factors, and epidemiological trends, are important for evidence-based stroke care planning and resource allocation. The Global Burden of Diseases, Injuries, and Risk Factors Study (GBD) aims to provide a standardised and comprehensive measurement of these metrics at global, regional, and national levels. Methods We applied GBD 2019 analytical tools to calculate stroke incidence, prevalence, mortality, disability-adjusted life-years (DALYs), and the population attributable fraction (PAF) of DALYs (with corresponding 95% uncertainty intervals [UIs]) associated with 19 risk factors, for 204 countries and territories from 1990 to 2019. These estimates were provided for ischaemic stroke, intracerebral haemorrhage, subarachnoid haemorrhage, and all strokes combined, and stratified by sex, age group, and World Bank country income level. Findings In 2019, there were 12·2 million (95% UI 11·0–13·6) incident cases of stroke, 101 million (93·2–111) prevalent cases of stroke, 143 million (133–153) DALYs due to stroke, and 6·55 million (6·00–7·02) deaths from stroke. Globally, stroke remained the second-leading cause of death (11·6% [10·8–12·2] of total deaths) and the third-leading cause of death and disability combined (5·7% [5·1–6·2] of total DALYs) in 2019. From 1990 to 2019, the absolute number of incident strokes increased by 70·0% (67·0–73·0), prevalent strokes increased by 85·0% (83·0–88·0), deaths from stroke increased by 43·0% (31·0–55·0), and DALYs due to stroke increased by 32·0% (22·0–42·0). During the same period, age-standardised rates of stroke incidence decreased by 17·0% (15·0–18·0), mortality decreased by 36·0% (31·0–42·0), prevalence decreased by 6·0% (5·0–7·0), and DALYs decreased by 36·0% (31·0–42·0). However, among people younger than 70 years, prevalence rates increased by 22·0% (21·0–24·0) and incidence rates increased by 15·0% (12·0–18·0). In 2019, the age-standardised stroke-related mortality rate was 3·6 (3·5–3·8) times higher in the World Bank low-income group than in the World Bank high-income group, and the age-standardised stroke-related DALY rate was 3·7 (3·5–3·9) times higher in the low-income group than the high-income group. Ischaemic stroke constituted 62·4% of all incident strokes in 2019 (7·63 million [6·57–8·96]), while intracerebral haemorrhage constituted 27·9% (3·41 million [2·97–3·91]) and subarachnoid haemorrhage constituted 9·7% (1·18 million [1·01–1·39]). In 2019, the five leading risk factors for stroke were high systolic blood pressure (contributing to 79·6 million [67·7–90·8] DALYs or 55·5% [48·2–62·0] of total stroke DALYs), high body-mass index (34·9 million [22·3–48·6] DALYs or 24·3% [15·7–33·2]), high fasting plasma glucose (28·9 million [19·8–41·5] DALYs or 20·2% [13·8–29·1]), ambient particulate matter pollution (28·7 million [23·4–33·4] DALYs or 20·1% [16·6–23·0]), and smoking (25·3 million [22·6–28·2] DALYs or 17·6% [16·4–19·0]). Interpretation The annual number of strokes and deaths due to stroke increased substantially from 1990 to 2019, despite substantial reductions in age-standardised rates, particularly among people older than 70 years. The highest age-standardised stroke-related mortality and DALY rates were in the World Bank low-income group. The fastest-growing risk factor for stroke between 1990 and 2019 was high body-mass index. Without urgent implementation of effective primary prevention strategies, the stroke burden will probably continue to grow across the world, particularly in low-income countries.publishedVersio
    corecore