5 research outputs found

    Dinamička distribucija sigurnosnih ključeva i koalicijski protokol IP adresa za mobilne ad hoc mreže

    Get PDF
    In mobile adhoc networks (MANETs) a tree-based dynamic address auto-configuration protocol (T-DAAP) is one of the best protocols designed for address assignment as far as the network throughput and packet delays are concerned. Moreover, MANET security is an important factor for many applications given that any node can listen to the channel and overhear the packets being transmitted. In this paper, we merge the address assignment with the security key delivery into one protocol, such that a node in the MANET is configured with IP address and security key simultaneously. To the best of our knowledge, no single protocol provides concurrent assignment of IP addresses and security keys for MANET nodes. The proposed method, which is based on T-DAAP, shows significant enhancements in the required control packets needed for assigning network nodes IP addresses and security keys, MAC layer packets, total end-to-end delay, and channel throughput over those obtained when using separate protocols. Additionally, it provides not only efficient security keys to the nodes from the first moment they join the network, but also secure delivery of the address and security key to all participating nodes. It is noteworthy to mention that providing a complete security model for MANET to detect and countermeasure network security threats and attacks is beyond the scope of our proposed protocol.Kod mobilnih ad hoc mreža (MANET) dinamički protokol za autokonfiguraciju adresa baziran na stablu (T-DAAP) je jedan od najboljih protokola dizajniranih za dodjelu adresa iz perspektive propusnosti mreže i i kašnjenja paketa. štoviše, sigurnost MANET-a je važan faktor za mnoge aplikacije s obzirom da bilo koji čvor može osluškivati kanal i slučajno čuti pakete koji se šalju. U ovom radu, dodjela adresa i dostava sigurnosnih ključeva spojeni su u jedan protokol tako da je čvor u MANET-u konfiguriran simultano s IP adresom i sigurnosnim ključem. Prema saznanjima autora, niti jedan postojeći protokol ne pruža istovremeno dodjeljivanje IP adrese i sigurnosnog ključa za MANET čvorove. Predložena metoda, koja se bazira na T-DAAP-u, pokazuje značajna poboljšanja u odnosu na metode koje koriste odvojene porotokole, kod traženih kontrolnih paketa koji su potrebni za dodjeljivanje IP adresa i sigurnosnih ključeva čvorovima mreže, MAC paketa, ukupnog end-to-end kašnjenja i propusnosti kanala. Dodatno pruža ne samo efikasne sigurnosne ključeve čvorovima od trenutka kad se priključe mreži, nego i sigurno dostavljanje adrese i sigurnosnog ključa svim čvorovima koji sudjeluju u mreži. Važno je spomenuti da je pružanje cjelokupnog sigurnosnog modela za MANET koji detektira dodatno i protumjere prijetnjama i napadima na sigurnost mreže izvan dosega predloženog protokola

    The Role of Media and Islamic Criminal Legislation in Reducing Crime (From the perspective of students of the University of Jordan)

    Get PDF
    The study aimed to know the role of the media and its various styles, as well as the role of Islamic criminal legislation in reducing crime and identifying the obstacles that limit the effectiveness of the media in the prevention of crime. A random sample of 600 students was selected at different university levels at the University of Jordan, as well as personal background factors (independent variables): sex, place of residence, specialty, so that eleven different positions were identified, asking the respondents to determine their opinion on their respective trends. Keywords: Role, Media, Islamic Criminal Legislation, Crime DOI: 10.7176/JPCR/44-05 Publication date: September 30th 201

    Performance Analysis of Dual-Hop AF Cognitive Relay Networks with Best Selection and Interference Constraints

    No full text
    In this paper, a dual-hop underlay cognitive relay network (CRN) with a best-relay selection (BRS) scheme under spectrum-sharing constraints from the primary user (PU) is investigated. The system model in this work consists of one PU, one secondary user (SU) and a few SU relays. Both users exchange the information using a half-duplex mode through amplify-and-forward (AF) SU relays. Moreover, all channels are modelled using the Nakagami-m fading model. In this work, the outage probabilities (OPs) are derived for the proposed system model under several scenarios to investigate the network performance under interference power constraint Ip at the PU receiver. In addition, the impacts of the number of relays and the channel fading severity parameters are investigated as well. Furthermore, the system performance is investigated for several PU locations. The various numerical results are verified using a Monte Carlo simulation. Overall, the obtained results show that several factors such as the number of relays, channel fading severity parameters and PU location have a major impact on the outage performance of the SU. The simulation and analytical results are perfectly matched, confirming the accuracy of the analytical derivations
    corecore