13 research outputs found

    Modeling and performance evaluation of secure architectures in intelligent environments and wireless networks

    No full text
    One of the main challenges in network management of large scale networks is the introduction of new applications. This introduction may be performed with the use of new intelligent technologies applied on existing infrastructure, e.g. Intelligent Networks or with the use of totally new infrastructure, e.g. Wireless Mobile Ad Hoc Networks. Such large scale networks present increased requirements as regards their maintenance, infrastructure facilities, security and reliability. In order to meet such requirements new security mechanisms should be applied. These security mechanisms should be adjusted to the specific characteristics of the underline network. The relevant impact to the network’s performance, should be taken into consideration. The performance could be evaluated with various techniques according to the nature of the underline network. Throughout this thesis it presents a secure IN architecture using application level and CORBAbased security mechanisms. Furthermore, through simulations it measures the efficiency burden imposed by the employment of the security mechanisms in the case of Interactive Multimedia Retrieval. More over, it identifies several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. It proposes an on demand multipath routing protocol, the Secure Multipath Routing protocol (SecMR), and it analyzes its security properties. Finally, through simulations, it evaluates the performance of the SecMR protocol in comparison with existing secure multipath routing protocols

    Detecting Packet Dropping Attacks Using Emergent Self-Organizing Maps in Mobile Ad Hoc Networks

    No full text
    The evolution of wireless network technologies andthe recent advances in mobile computing hardware have madepossible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient regarding security, we need a second line of defense, Intrusion Detection. The focus of this paper is on anomaly detection techniques in order to exploit their main advantage of being able to detect unknown attacks. First, we briefly describe intrusion detection systems and then we suggest a distributed schema applicable to mobile ad hoc networks. This anomaly detection mechanism is based on a neural network and is evaluated for packet dropping attacks using features selected from the MAC layer. The performance of the proposed architecture is evaluated under different traffic conditions and mobility patterns
    corecore