Current Issue : April-June Volume : 2023 Issue Number : 2 Articles : 5 Articles
MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use peer-to-peer routing to provide network access instead of using a preexisting network infrastructure. Despite the network infrastructure’s simplicity, it faces issues such as changeable connection capacity, dynamic topology, node battery power exhaustion, and inadequate physical security. Broadcasting is a standard MANETapproach for sending messages from a source node to all other nodes in the network. Flooding is a frequent method for broadcasting route request (RREQ) packets, which is susceptible to broadcast storms. The high retransmission rate is caused by the standard flooding technique, which causes media congestion and packet collisions, which can drastically reduce throughput and network performance. In a mobile ad-hoc network, efficient broadcasting focuses on selecting a compact forward node set while assuring broadcast coverage. The goal is to find a limited number of forward nodes that will provide complete coverage. In this paper, we propose an optimized and energy-efficient routing protocol for MANET (mobile adhoc network) based on dynamic forwarding probability in general and AODV (ad hoc on-demand distance vector) in particular, in which the route request packets are randomly controlled to increase the network lifetime and reduce packet loss in the flooding algorithm. We tested and assessed the results of our proposed solution using various network performance factors after implementing and integrating it into NS-2. According to simulation findings, our proposed technique effectively reduced route request propagation messages (RREQ). The suggested technique is more efficient, has a longer network lifetime, and uniformly utilizes node residual energy, enhancing network throughput and minimizing routing overhead when compared to regular and modified AODV protocols....
Packet loss-resilient and security are two major challenges faced by real-time audio transmission over IP networks. Due to the capability of recovering the signal from a small set of samplings and the randomness in the acquisition process, compressive sensing (CS) has a vast prospect in dealing with these problems. In this paper, we propose a secure and packet loss-resistant realtime audio transmission framework (CS-SPT) based on the principle of CS. Inspired by the interleaving technique, an ultralow complexity scrambling matrix was adopted in the proposed CS-SPTto improve its packet loss-resilient capability by increasing the information redundancy. Moreover, the energy of ciphertext is homogenized using a diffusion operation. Experimental results show that compared with existing methods, the proposed CS-SPT not only improves the packet loss-resilient ability significantly but also can resist several major attacks, such as COAs and KPAs....
The present work deals with the problem of detecting Denial of Service attacks in an IoT environment. To achieve this goal, a dataset registered in an MQTT protocol network is used, applying dimension reduction techniques combined with classification algorithms. The final classifiers presents successful results....
Software Defined Networking (SDN) is the novel networking paradigm where decoupling of the control plane from the data plane has its inherent advantages. Controller Placement Problem (CPP) involves placing the optimal number of controllers at the appropriate locations while meeting prerequisites such as latency, load balancing, energy and computational time. To achieve scalability, deployment of multiple controllers on large-scale SDN is one of the key challenges. CPP can be addressed as a multiobjective combinatorial optimization problem whose solution is a trade-off between multiple optimization parameters. In this paper, a novel population-based meta-heuristic algorithm viz. Naked Mole-Rat (NMR) Algorithm has been proposed to optimize the location for controller placement based on Switch-Controller (SC), Controller-Controller (CC) latency while maintaining load balancing among the controllers. The ideas and mechanisms are illustrated using two publicly available standard topologies viz. Ernet and Savvis. The controller localization approach implemented with NMR algorithm has slightly a better result as compared with the Bat algorithm....
Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many industrial devices are connected to perform a task automatically in machine-to-machine communication, but they are not properly secured, allowing an adversary to compromise them against a variety of attacks due to communication system vulnerabilities. Recently, a secure lightweight authentication protocol (SLAP) was proposed by Panda et al. They asserted that every known attack that could happen in the IIoT is deterred by their suggested protocol. In this study, we prove that the SLAP protocol is vulnerable to desynchronization, impersonation, replay, and eavesdropping attacks. To prevent these attacks and enhance that protocol, we need to implement a secure authentication mechanism that ensures the security of communication. This paper proposed a secure M2M Communication in IIoT with a single-factor lightweight authentication protocol (SF-LAP). Singlefactor authentication is a simple and secure way to communicate. It uses less power and communication overhead while providing a secure mechanism for conversation. In the machine-to-machine (M2M) scenario, the proposed protocol uses an exclusive-OR operation and a hashing function to ensure secure communication between the sensor and the controller. The proposed mechanism uses a secure preshared key and timestamp technique to protect and safeguard this connection against desynchronization attacks and eavesdropping attacks. We used Burrows Abadi Needham (BAN) Gong, Needham, and Yahalom (GNY) logic, and the automated validation of Internet security protocols applications (AVISPA) tool for formal verification and perform a security analysis as an informal verification to make sure the suggested protocol is secure. Analysis that shows the SF-LAP consumes the least computing and communication overhead and is more secure because it prevents desynchronization and eavesdropping attacks to all of the known attacks that are modification attacks, tracing attacks, impersonation, man-in-the-middle, and replay attacks....
Loading....