133 research outputs found

    Protecting agents against malicious host attacks

    Get PDF
    The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of noise code. The second approach consists of a mechanism that is able to protect the integrity of the agent using state information, recorded during the agent execution process in a remote host environment, to detect a manipulation attack by a malicious host. Both approaches are implemented using a master-slave agent architecture that operates on a distributed migration pattern. Two sets of experimental test were conducted. The first set of experiments measures the migration and migration+computation overheads of the itinerary and distributed migration patterns. The second set of experiments is used to measure the security overhead of the proposed approaches. The protection of the agent is assessed by analysis of its effectiveness under known attacks. Finally, an agent-based application, known as Secure Flight Finder Agent-based System (SecureFAS) is developed, in order to prove the function of the proposed approaches

    A FUZZY LOGIC CLASSIFICATION OF INCOMING PACKET FOR VOIP

    Get PDF
    The Voice over Internet Protocol (VoIP) technology is cheaper and does not need new infrastructure because it has availables in the global computer (IP) network. Unfortunately, transition from PSTN to VoIP networks have emerged new problems in voice quality. Furthermore, the transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ) algorithm is a popular technique used in the VoIP network to reduce delays. But, the method can result in repetition. This recursive leads to the next queue starved. To solving problems, there are three phases namely queuing, classifying and scheduling. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text). To justify the research of the improved PQ algorithm be compared against the algorithm existing

    A review of cluster-based congestion control protocols in wireless mesh networks

    Get PDF
    Packet loss in Wireless Mesh Networks (WMNs) is due to congestion and probably due to high bit error rate caused by interference, link and node failures. Presently, congestion control and routing protocols in WMNs are not seen to have tamed this recurrent problem of congestion being experience most times in the wireless network. Routing techniques may lead to a co ngestive scenario and the congestion control should detect and probably avoid such situations. The way in which the congestion is handled may results in longer delay and more packet loss and a very significant overhead may also be incurred. Hence, this study takes a closer look at existing solutions with the application of clustering techniques to solve routing and congestion control problems because it offers scalability and reduced overheads. The study further exposes the weakness and added advantages of some of these cluster based solutions which can assist researchers to come up with broader approach to tackle the inherent problems of congestions and load balancing in an ad hoc network like WMNs. The paper conclude with a planned future research to device an appropriate level of tradeoff between computational overheads of cluster-based routing and high network throughput, low latency and delay while solving congestion problems

    Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks

    Get PDF
    Proxy Mobile IPv6 (PMIPv6) was proposed by the Internet Engineering Task Force (IETF) as a new network-based mobility protocol which does not require the involvement of MN’s in any form of mobility management. MN can handover relatively faster in PMIPv6 than in host-based mobility protocols (e.g. Mobile IPv6 (MIPv6)) because it actively uses link-layer attachment information which reduces the movement detection time, and eliminates duplicate address detection procedures. However, the current PMIPv6 cannot provide continuous mobility support for MN when roaming between different PMIPv6 domains; we introduce a novel inter-domain PMIPv6 scheme to support seamless handover for vehicle in motion to support continuous and seamless connection while roaming in the new PMIPv6 domain. In this paper we analytically evaluate our proposed scheme to support inter-domain mobility for vehicle roaming between two PMIPv6 domains by using Media Independent Handover (MIH) and Fully Qualified Domain Name (FQDN) to support the handover in addition to a continuous connection

    Grid Based Cluster Head Selection Mechanism for Wireless sensor network

    Get PDF
    Wireless sensor network (WSN) consists of hundred to thousands sensor nodes to gathered the information from physical environment. Different clustering based algorithms have been proposed to improve network lifetime and energy efficiency. Practically it is not feasible to recharge the battery of sensor nodes when they are sensing the data. In such situation energy is crucial resource and it should be improved for life span of WSN. Cluster head (CH) has an important role in hierarchical energy efficient routing protocols because it receives data from nodes and sends towards base station (BS) or sink node. This paper presents a grid based cluster head selection (GBCHS) mechanism by dividing the network field into MXN uniform size partitions that aims to minimize the energy dissipation of sensor nodes and enhancing network lifetime. Simulation experiments have been performed in network simulator (NS2) that show our proposed GBCHS approach outperformed than standard clustering hierarchy LEACH protocol

    Countering Node Misbehavior Attacks using Trust Based Secure Routing Protocol

    Get PDF
    Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of attacks but they cannot safeguard against node misbehavior attacks and come at significant cost. To address this problem, we propose a Trust Based Secure Routing Protocol (TBSRP) which adopts on-demand routing principle and relies on distributed trust model for the detection and isolation of misbehaving nodes. The TBSRP aims to establish shortest path that contain all trusted nodes, identify packet forwarding misbehavior caused by malicious and faulty nodes and reroute the traffic to other reliable paths. The performance of TBSRP is evaluated in terms of packet delivery ratio, average end-to-end delay, normalized routing load and average throughput. Simulations results show that TBSRP can achieve both high delivery ratio and throughput in presence of various numbers of misbehaving and faulty nodes

    Straggler mitigation in hadoop mapreduce framework: a review

    Get PDF
    Processing huge and complex data to obtain useful information is challenging, even though several big data processing frameworks have been proposed and further enhanced. One of the prominent big data processing frameworks is MapReduce. The main concept of MapReduce framework relies on distributed and parallel processing. However, MapReduce framework is facing serious performance degradations due to the slow execution of certain tasks type called stragglers. Failing to handle stragglers causes delay and affects the overall job execution time. Meanwhile, several straggler reduction techniques have been proposed to improve the MapReduce performance. This study provides a comprehensive and qualitative review of the different existing straggler mitigation solutions. In addition, a taxonomy of the available straggler mitigation solutions is presented. Critical research issues and future research directions are identified and discussed to guide researchers and scholars

    Review of Path Selection Algorithms with Link Quality and Critical Switch Aware for Heterogeneous Traffic in SDN

    Get PDF
    Software Defined Networking (SDN) introduced network management flexibility that eludes traditional network architecture. Nevertheless, the pervasive demand for various cloud computing services with different levels of Quality of Service requirements in our contemporary world made network service provisioning challenging. One of these challenges is path selection (PS) for routing heterogeneous traffic with end-to-end quality of service support specific to each traffic class. The challenge had gotten the research community\u27s attention to the extent that many PSAs were proposed. However, a gap still exists that calls for further study. This paper reviews the existing PSA and the Baseline Shortest Path Algorithms (BSPA) upon which many relevant PSA(s) are built to help identify these gaps. The paper categorizes the PSAs into four, based on their path selection criteria, (1) PSAs that use static or dynamic link quality to guide PSD, (2) PSAs that consider the criticality of switch in terms of an update operation, FlowTable limitation or port capacity to guide PSD, (3) PSAs that consider flow variabilities to guide PSD and (4) The PSAs that use ML optimization in their PSD. We then reviewed and compared the techniques\u27 design in each category against the identified SDN PSA design objectives, solution approach, BSPA, and validation approaches. Finally, the paper recommends directions for further research

    An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks

    Full text link
    In heterogeneous vehicular networks, the most challenging issue is obtaining an efficient vertical handover during the vehicle roaming process. Efficient network selection process can achieve satisfactory Quality of Service for ongoing applications. In this paper, we propose an Intelligent Network Selection (INS) scheme based on maximization scoring function to efficiently rank available wireless network candidates. Three input parameters were utilized to develop a maximization scoring function that collected data from each network candidate during the selection process. These parameters are: Faded Signal-to-Noise Ratio, Residual Channel Capacity, and Connection Life Time. The results show that the proposed INS scheme is more efficient at decreasing handover delays, End-to-End delays for VoIP and Video applications, packet loss ratios as well as increasing the efficiency of network selection processes in comparison with the state of the arts.Sadiq, AS.; Abu Bakar, K.; Ghafoor, KZ.; Lloret, J.; Khokhar, R. (2013). An Intelligent Vertical Handover Scheme for Audio and Video Streaming in Heterogeneous Vehicular Networks. Mobile Networks and Applications. 18(6):879-895. doi:10.1007/s11036-013-0465-8S879895186Chen YS, Cheng CH, Hsu CS, Chiu GM (2009) Network mobility protocol for vehicular ad hoc networks. In: Wireless communications and networking conference, IEEE, pp 1–6Ghafoor KZ, Abu Bakar K, Lee K, AL-Hashimi H (2010) A novel delay-and reliability-aware inter-vehicle routing protocol. Netw Protoc Algorithm 2(2):66–88Ghafoor KZ, Abu Bakar K, Lloret J, Khokhar RH, Lee KC (2013) Intelligent beaconless geographical forwarding for urban vehicular environments. Wirel netw 19(3):345–362Prakash A, Tripathi S, Verma R, Tyagi N, Tripathi R, Naik K (2011) Vehicle assisted cross-layer handover scheme in nemo-based vanets (vanemo). Int J Internet Protoc Technol 6(1):83–95Lee C-W, Chen MC, Sun YS (2013) Protocol and architecture supports for network mobility with qos-handover for high-velocity vehicles. Wirel Netw 19(5):811–830Pereira P, Casaca A, Rodrigues JJPC, Soares VNGJ, Triay Joan, Cervelló-Pastor C (2011) From delay-tolerant networks to vehicular delay-tolerant networks. IEEE Commun Surv Tutor 1(4):1166–1182Lloret J, Canovas A, Catalá A, Garcia M (2013) Group-based protocol and mobility model for vanets to offer internet access. J Netw Comput Appl 36(3):10271038Ghafoor KZ, Lloret J, Abu Bakar K, Sadiq AS, Mussa SAB (2013) Beaconing approaches in vehicular ad hoc networks: A survey. Wirel Pers Commun 1–28. doi: 10.1007/s11277-013-1222-9Wang L, Kuo G (2011) Mathematical modeling for network selection in heterogeneous wireless networks?a tutorial. IEEE Commun Surv Tutor 15(1):271–292Nguyen-Vuong QT, Ghamri-Doudane Y, Agoulmine N (2008) On utility models for access network selection in wireless heterogeneous networks. In: Network operations and management symposium. Salvador, Bahia, pp 144–151Canovas A, Bri D, Sendra S, Lloret J (2012) Vertical WLAN handover algorithm and protocol to improve the IPTV QoS of the end user. ON, Ottawa, pp 1901–1905Varma VK, Ramesh S, Wong KD, Barton M, Hayward G, Friedhoffer JA (2003) Mobility management in integrated UMTS/WLAN networks. In: International conference on communications. IEEE, USA, pp 1048–1053Mohanty S (2006) A new architecture for 3G and WLAN integration and inter-system handover management. Wirel Netw 12(6):733–745Rivera-Lara EJ, Herrerías-Hernández R, Pérez-Díaz JA, García-Hernández CF (2008) Analysis of the relationship between QoS and snr for an 802.11 g wlan. In: International conference on communication theory, reliability, and quality of service. IEEE, Bucharest, pp 103–107Rappaport TS (2002) Wireless communications principles and practice, 2nd edn. Prentice Hall PTR, Upper Saddle RiverCarpenter T (2007) CWNA certified wireless network administrator official study guide (Exam PW0-100). McGraw-Hill Osborne Media, New YorkEberspacher J, Eberspächer J, Bettstetter C, Vögel HJ, Hartmann C, Vgel HJ, et al (2009) GSM-architecture, protocols and services. Wiley, New YorkWLAN-MAC (2007) Wireless lan medium access control (MAC) and physical layer specifications. IEEE Comput Soc, pp 1–1183. http://standards.ieee.org/getieee802/802.11.html ,Kappler C (2009) UMTS networks and beyond. Wiley, New YorkEgoh K, De S (2006) A multi-criteria receiver-side relay election approach in wireless ad hoc networks. In: Military communications conference. IEEE, Washington, DC, pp 1–7Bucciol P, Ridolfo F, De Martin JC (2008) Multicast voice transmission over vehicular ad hoc networks: issues and challenges. In: Seventh international conference on networking. IEEE, Cancun, pp 746–751Thonet G, Allard-Jacquin P, Colle P (2008) Zigbee–wifi coexistence, Schneider electric white paperRibadeneira AF (2007) An analysis of the mos under conditions of delay, jitter and packet loss and an analysis of the impact of introducing piggybacking and Reed Solomon fec for VoIP. Computer science theses, pp 44Karapantazis S, Pavlidou FN (2009) Voip: A comprehensive survey on a promising technology. Comput Netw 53(12):2050–2090Ortiz C, Frigon JF, Sanso B, Girard A (2008) Effective bandwidth evaluation for voip applications in ieee 802.11 networks. In: Wireless communications and mobile computing conference. IEEE, Crete Island, pp 926–931International Telecommunication Union (1996) Telecommunication Standardization Sector. Methods for subjective determination of transmission quality, international telecommunication unionLi D, Pan J (2008) Evaluating MPEG-4/AVC video streaming over ieee 802.11 wireless distribution system. In: Wireless communications and networking conference. WCNC 2008 IEEE, IEEE, pp 2147–2152Yan X, Mani N, Cekercioglu YA (2008) A traveling distance prediction based method to minimize unnecessary handovers from cellular networks to WLANS. Commun Lett IEEE 12(1):14–16Lo SC, Lee G, Chen WT, Liu JC (2004) Architecture for mobility and QoS support in all-ip wireless networks. IEEE J Sel Areas Commun 22(4):691–705Pries R, Staehle D, Tran-Gia P, Gutbrod T (2008) A seamless vertical handover approach. In: Cerd?-Alabern L (ed) Wireless systems and mobility in next generation internet, vol 5122. Springer, Berlin Heidelberg, pp 167–184Munasinghe KS, Jamalipour A (2010) An analytical evaluation of mobility management in integrated WLAN-UMTS networks. Comput Electr Eng 36(4):735–75

    Improved Energy Aware Cluster based Data Routing Scheme for WSN

    Get PDF
    Wireless sensor network (WSN) consists of several tiny devices that are dispersed randomly for gathering network field. Clustering mechanism divides the WSN into different sub-regions called clusters. Individual cluster is consisting of cluster head (CH) and member nodes. The main research challenges behind clustering mechanism are to optimize network overheads with efficient data delivery. Sensor nodes are operated by batteries and practically it is not feasible to replace them during sensing the environment so energy should be effectively utilized among sensors for improving overall network performance. This research paper presents an improved energy aware cluster based data routing (i-ECBR) scheme, by dividing the network regions into uniform sized square partitions and localized CH election mechanism. In addition, consistent end-to-end data routing is performed for improving data dissemination. Simulation results illustrate that our proposed scheme outperforms than existing work in terms of different performance metrics
    • …
    corecore