14 research outputs found

    Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc networks (MANETs) form a new wireless networking paradigm with unique characteristics that give them appreciated interest in a vast range of applications. However, many challenges are facing MANETs including security, routing, transmission range, and dynamically changing topology with high node mobility. Security is considered as the main obstacle for the widespread adoption of MANET applications. Black hole attack is a type of DoS attack that can disrupt the services of the network layer. It has the worst malicious impact on network performance as the number of malicious nodes increases. Several mechanisms and protocols have been proposed to detect and mitigate its effects using different strategies. However, many of these solutions impose more overhead and increase the average end-to-end delay. This chapter proposes an enhanced and modified protocol called “Enhanced RID-AODV,” based on a preceding mechanism: RID-AODV. The proposed enhancement is based on creating dynamic blacklists for each node in the network. Each node, according to criteria, depends on the number of mismatches of hash values of received packets as compared with some threshold values, and the sudden change in the round-trip time (RTT) can decide to add or remove other nodes to or from its blacklist. The threshold is a function of mobility (variable threshold) to cancel the effect of normal link failure. Enhanced RID-AODV was implemented in ns-2 simulator and compared with three previous solutions for mitigating multiple black hole attacks in terms of performance metrics. The results show an increase in throughput and packet delivery ratio and a decrease in end-to-end delay and overhead ratio

    Efficient Implementation of DILH hash Algorithm in 8-bit Microcontroller

    Get PDF
    Hash function is the foundation of digital signature and message authentication for the assurance of data integrity due to its collision-free and one-way properties. To receive correct data that sent as a plaintext between a remote terminal units through wired network or a wireless networks. Remote terminal unit is a device that responsible for retrieving occur data. In this paper, we describe the addition of the function signature, with the purpose of data integrity for terminal units. We use a programmable unit (Microcontroller) to implement DILH technique for one way hash algorithm. The Hill cipher requires the inverse of the matrix to recover the plaintext from cipher text. In the remote terminal unit developments DILH based on Hill cipher for generating only non invertible matrix to assure the accuracy of transmission data [1][12]. The result of this research implemented in an 8-bit microcontroller with 100% accuracy , data input using keypad matrix 4x4, DILH hash output is displayed on the LCD graphics 20x4 and can only enter data input capital letters only

    DCM+: Robust Congestion Control Protocol for Mobile Networks

    Get PDF
    This paper aims at presenting a new robust congestion control protocol for mobile networks. It also can be used for mixed networks and mobile adhoc networks (MANETs). The proposed protocol is called Dynamic Congestion Control Protocol for Mobile Networks (DCM+). It makes use of the bandwidth estimation algorithm used in Westwood+ algorithm. We evaluate DCM+ on the basis of known metrics like throughput, average delay, packet loss and Packet-Delivery-Ratio (PDR). New metrics like Normalized Advancing Index (NAI) and Complete-Transmission-Time (CTT) have been introduced for a comprehensive comparison with other congestion control variants like NewReno, Hybla, Ledbat and BIC. The simulations are done for a one-way single-hop-topology (sender->router->receiver). The findings in this paper clearly show excellent properties of our proposed technique like robustness and stability. It avoids congestions, increases performance, minimizes the end-to-end delay and reduces the transmission time. DCM+ combines the advantages of the protocols NewReno and Westwood+. The simulation results show high improvements, which make this approach extremely adequate for different types of networks

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication.

    Get PDF
    Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively static andenergy-rich devices, and Mesh Clients which are relativelydynamic and power constrained devices. In this paper we presenta new model for WMN end-to-end security which divideauthentication process into two phases: Mesh Access Point phasewhich based on asymmetric cryptography and Mesh Client phasewhich based on a server-side certificate such as EAP-TTLSand PEAP

    SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication

    Get PDF
    Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS

    Joint block and stream cipher based on a modified skew tent map

    Get PDF
    Image encryption is very different from that of texts due to the bulk data capacity and the high redundancy of images. Thus, traditional methods are difficult to use for image encryption as their pseudo-random sequences have small space. Chaotic cryptography use chaos theory in specific systems working such as computing algorithms to accomplish dissimilar cryptographic tasks in a cryptosystem with a fast throughput. For higher security, encryption is the approach to guard information and prevent its leakage. In this paper, a hybrid encryption scheme that combines both stream and block ciphering algorithms is proposed in order to achieve the required level of security with the minimum encryption time. This scheme is based on an improved mathematical model to cover the defects in the previous discredited model proposed by Masuda. The proposed chaos-based cryptosystem uses the improved Skew Tent Map (STM) RQ-FSTM as a substitution layer. This map is based on a lookup table to overcome various problems, such as the fixed point, the key space restrictions, and the limitation of mapping between plain text and cipher text. It uses the same map as a generator to change the byte position to achieve the required confusion and diffusion effects. This modification improves the security level of the original STM. The robustness of the proposed cryptosystem is proven by the performance and the security analysis, as well as the high encryption speed. Depending on the results of the security analysis the proposed system has a better dynamic key space than previous ones using STM, a double encryption quality and a better security analysis than others in the literature with speed convenience to real-time applications

    An Intelligent Routing Protocol Based on DYMO for MANET

    Get PDF
    in this paper, intelligent routing protocols for mobile ad-hoc networks (MANET) will be proposed .Depending on the concepts of fuzzy and neural networks. The goal is to get good quality service by finding the most convenient data transfer paths, therefore a Fuzzy-based, Neural-Fuzzy based and Energy aware are three approaches have been proposed to enhance Dynamic Manet On-demand (DYMO),All approaches were implemented in ns-2 simulator and compared with original protocol in terms of performance metrics, which showed that there was an improvement in route efficiency

    Data Integrity Mechanism Using Hashing Verification

    Get PDF
    In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values[1]. DILH algorithm using linear combination of matrices to find non-invertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix, and fast calculations

    Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication

    Get PDF
    Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this paper we present a new model for WMN end-to-end security which divide authentication process into two phases: Mesh Access Point phase which based on asymmetric cryptography and Mesh Client phase which based on a server-side certificate such as EAP-TTLS and PEAP

    An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC

    Get PDF
    currently the world is adopting Internet of Things (IoT) as the future technology and the interest IoT development is increasing. As it’s expected to be the leading technology by 2022 according to Gartner. WSN is the main technology component of the IoT since it rely on sensing and collecting data in a specific filed of interest. As the WSN main issue is the network life time due the limitation in sensors resource. Therefore, such lifetimeconstrained devices require enchantment on the existing routing protocols to prolong network life time as long as possible. In our paper we propose enhancement in the well know WSN routing protocol LEACH by proposing a new Energy aware algorithm in communication within cluster, hence reduce power consumption in communication process
    corecore