14 research outputs found
Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) form a new wireless networking paradigm with unique characteristics that give them appreciated interest in a vast range of applications. However, many challenges are facing MANETs including security, routing, transmission range, and dynamically changing topology with high node mobility. Security is considered as the main obstacle for the widespread adoption of MANET applications. Black hole attack is a type of DoS attack that can disrupt the services of the network layer. It has the worst malicious impact on network performance as the number of malicious nodes increases. Several mechanisms and protocols have been proposed to detect and mitigate its effects using different strategies. However, many of these solutions impose more overhead and increase the average end-to-end delay. This chapter proposes an enhanced and modified protocol called “Enhanced RID-AODV,” based on a preceding mechanism: RID-AODV. The proposed enhancement is based on creating dynamic blacklists for each node in the network. Each node, according to criteria, depends on the number of mismatches of hash values of received packets as compared with some threshold values, and the sudden change in the round-trip time (RTT) can decide to add or remove other nodes to or from its blacklist. The threshold is a function of mobility (variable threshold) to cancel the effect of normal link failure. Enhanced RID-AODV was implemented in ns-2 simulator and compared with three previous solutions for mitigating multiple black hole attacks in terms of performance metrics. The results show an increase in throughput and packet delivery ratio and a decrease in end-to-end delay and overhead ratio
Efficient Implementation of DILH hash Algorithm in 8-bit Microcontroller
Hash function is the foundation of digital signature and message authentication for the assurance of data integrity due to its
collision-free and one-way properties. To receive correct data that sent as a plaintext between a remote terminal units through
wired network or a wireless networks. Remote terminal unit is a device that responsible for retrieving occur data. In this paper, we
describe the addition of the function signature, with the purpose of data integrity for terminal units. We use a programmable unit
(Microcontroller) to implement DILH technique for one way hash algorithm. The Hill cipher requires the inverse of the matrix
to recover the plaintext from cipher text. In the remote terminal unit developments DILH based on Hill cipher for generating only
non invertible matrix to assure the accuracy of transmission data [1][12]. The result of this research implemented in an 8-bit
microcontroller with 100% accuracy , data input using keypad matrix 4x4, DILH hash output is displayed on the LCD graphics
20x4 and can only enter data input capital letters only
DCM+: Robust Congestion Control Protocol for Mobile Networks
This paper aims at presenting a new robust congestion control protocol for mobile networks. It also can be used for mixed networks and mobile adhoc networks (MANETs). The proposed protocol is called Dynamic Congestion Control Protocol for Mobile Networks (DCM+). It makes use of the bandwidth estimation algorithm used in Westwood+ algorithm. We evaluate DCM+ on the basis of known metrics like throughput, average delay, packet loss and Packet-Delivery-Ratio (PDR). New metrics like Normalized Advancing Index (NAI) and Complete-Transmission-Time (CTT) have been introduced for a comprehensive comparison with other congestion control variants like NewReno, Hybla, Ledbat and BIC. The simulations are done for a one-way single-hop-topology (sender->router->receiver). The findings in this paper clearly show excellent properties of our proposed technique like robustness and stability. It avoids congestions, increases performance, minimizes the end-to-end delay and reduces the transmission time. DCM+ combines the advantages of the protocols NewReno and Westwood+. The simulation results show high improvements, which make this approach extremely adequate for different types of networks
Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication.
Hybrid wireless mesh network (WMN) consists of twotypes of nodes: Mesh Routers which are relatively static andenergy-rich devices, and Mesh Clients which are relativelydynamic and power constrained devices. In this paper we presenta new model for WMN end-to-end security which divideauthentication process into two phases: Mesh Access Point phasewhich based on asymmetric cryptography and Mesh Client phasewhich based on a server-side certificate such as EAP-TTLSand PEAP
SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a new model for WMN end-to-end security which divides authentication process into two phases: Mesh Access Point which is based on asymmetric cryptography and Mesh Client which is based on a server-side certificate such as EAP-TTLS
Joint block and stream cipher based on a modified skew tent map
Image encryption is very different from that of texts due to the bulk data capacity and the
high redundancy of images. Thus, traditional methods are difficult to use for image encryption
as their pseudo-random sequences have small space. Chaotic cryptography use chaos
theory in specific systems working such as computing algorithms to accomplish dissimilar
cryptographic tasks in a cryptosystem with a fast throughput. For higher security, encryption
is the approach to guard information and prevent its leakage. In this paper, a hybrid encryption
scheme that combines both stream and block ciphering algorithms is proposed in order
to achieve the required level of security with the minimum encryption time. This scheme is
based on an improved mathematical model to cover the defects in the previous discredited
model proposed by Masuda. The proposed chaos-based cryptosystem uses the improved
Skew Tent Map (STM) RQ-FSTM as a substitution layer. This map is based on a lookup
table to overcome various problems, such as the fixed point, the key space restrictions, and
the limitation of mapping between plain text and cipher text. It uses the same map as a generator
to change the byte position to achieve the required confusion and diffusion effects.
This modification improves the security level of the original STM. The robustness of the
proposed cryptosystem is proven by the performance and the security analysis, as well as
the high encryption speed. Depending on the results of the security analysis the proposed
system has a better dynamic key space than previous ones using STM, a double encryption
quality and a better security analysis than others in the literature with speed convenience to
real-time applications
An Intelligent Routing Protocol Based on DYMO for MANET
in this paper, intelligent routing
protocols for mobile ad-hoc networks (MANET) will
be proposed .Depending on the concepts of fuzzy
and neural networks. The goal is to get good quality
service by finding the most convenient data transfer
paths, therefore a Fuzzy-based, Neural-Fuzzy based
and Energy aware are three approaches have been
proposed to enhance Dynamic Manet On-demand
(DYMO),All approaches were implemented in ns-2
simulator and compared with original protocol in
terms of performance metrics, which showed that
there was an improvement in route efficiency
Data Integrity Mechanism Using Hashing Verification
In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values[1]. DILH algorithm using linear combination of matrices to find non-invertible matrix, that takes advantage about of the compact representation of a set of numbers in a matrix, and fast calculations
Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication
Hybrid wireless mesh network (WMN) consists of two
types of nodes: Mesh Routers which are relatively static and
energy-rich devices, and Mesh Clients which are relatively
dynamic and power constrained devices. In this paper we present
a new model for WMN end-to-end security which divide
authentication process into two phases: Mesh Access Point phase
which based on asymmetric cryptography and Mesh Client phase
which based on a server-side certificate such as EAP-TTLS
and PEAP
An Energy-Efficient Clustering Routing Protocol for WSN based on MRHC
currently the world is adopting Internet of
Things (IoT) as the future technology and the interest IoT
development is increasing. As it’s expected to be the
leading technology by 2022 according to Gartner. WSN is
the main technology component of the IoT since it rely on
sensing and collecting data in a specific filed of interest. As
the WSN main issue is the network life time due the
limitation in sensors resource. Therefore, such lifetimeconstrained
devices require enchantment on the existing
routing protocols to prolong network life time as long as
possible. In our paper we propose enhancement in the well
know WSN routing protocol LEACH by proposing a new
Energy aware algorithm in communication within cluster,
hence reduce power consumption in communication
process