Wormhole attacks are considered as a severe security threat in multi-hop wireless ad hoc networks. In this paper, we propose an Energy-Efficient Scheme Immune to Wormhole attacks (our so-called E2SIW). This protocol u...
详细信息
Wormhole attacks are considered as a severe security threat in multi-hop wireless ad hoc networks. In this paper, we propose an Energy-Efficient Scheme Immune to Wormhole attacks (our so-called E2SIW). This protocol uses the location information of nodes to detect the presence of a wormhole, and in case a wormhole exists in the path, it finds alternate routes involving the nodes of the selected path so as to obtain a secure route to the destination. The protocol is capable of detecting wormhole attacks employing either hidden or participating malicious nodes. Simulations are conducted, showing that E2SIW can detect wormholes with a high detection rate, less overhead, and can consume less energy in less time, compared to the De Worm wormhole detection protocol, chosen as benchmark.
Two new configurations for voltage mode universal filters (VMUFs) using only two current differencing buffered amplifiers (CDBAs) are proposed. Both of the new configurations can realize all the five standard types of...
Two new configurations for voltage mode universal filters (VMUFs) using only two current differencing buffered amplifiers (CDBAs) are proposed. Both of the new configurations can realize all the five standard types of the filters, namely, low pass (LP), high pass (HP), band pass (BP), band stop (BS), and all pass (AP), from the same topology. In contrast to previously known CDBA-based VMUFs, the new configurations do not need an additional active device for voltage inversion to realize all pass functions. The proposed configurations offer the tunability of the natural angular frequency ( ω o ), quality factor ( Q ), or the bandwidth (BW) through separate virtually grounded resistors. Moreover, both circuits have resistive input impedance (which can be made high) and a low output impedance to facilitate easy cascading without additional buffers. PSPICE simulation results, based upon commercially available AD844 ICs to implement the CDBA, are included which confirm the practical workability of the new VMUF configurations.
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with seri...
详细信息
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with serious security concerns, in particular from a wireless transmission medium perspective where such networks may be subject to data tampering and dropping attacks. This paper enhances a recently proposed AODV-based protocol named Highly Secured Approach against Attacks on MANETs (HSAM) that deals with this issue in at least two ways: (a) by performing for the first time a simulation study of the HSAM protocol; (b) by introducing a more efficient approach to securing the routes in the route selection phase of the HSAM scheme. Simulation results are provided, showing that the proposed enhanced HSAM scheme (so-called E-HSAM) outperforms HSAM in terms of packet delivery ratio, throughput rate, and number of broken links; chosen as performance metrics, when malicious nodes are present in the network.
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinu...
Operational transresistance amplifier (OTRA) has attracted considerable attention in the recent literature in several applications such as impedance simulation, universal biquad filter realization, realization of sinusoidal oscillators and multivibrators. However, to the best knowledge of the authors, any OTRA-based generalized impedance simulator circuits have not been reported so far. The purpose of this paper is to present such a circuit.
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, mak...
详细信息
ISBN:
(纸本)9781467349420
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, making the network vulnerable to malicious attacks such as wormhole attacks. This paper investigates a recently proposed Advanced Encryption Standard (AES)-based routing algorithm (so-called AODV-Wormhole Attack Detection Reaction - here referred to as AODV-WADR-AES) for securing AODV-based eMANETs against wormhole attacks. The proposal consists of substituting the AES part of the scheme by the Triple Data Encryption Standard (TDES), yielding the AODV-WADR-TDES routing algorithm, with the goal to study the performance of the algorithm where mobile devices that are incompatible with AES are part of eMANET nodes. In doing so, markers in the form of hash codes are included in the data packets to help consolidating the data integrity. Simulation results are presented to validate the proposed AODV-WADR-TDEA scheme. It is also shown that the AODV-WADR-AES scheme outperforms the AODV-WADR-TDES scheme in terms of end-to-end delay, packet delivery ratio, and number of packets traversing through the wormhole link.
An evocative solution for the brachistochrone problem is presented by Euler-Lagrange equation. The solution of brachistochrone problem by variational approach i.e. Euler-Lagrange equation leads to the curve of a cyclo...
详细信息
Edge detection is a field which has intrigued programmers since early 1970s. Since then, a good number of edge detection techniques have come up but the technique used by Canny [1] is very widely used. However, it has...
详细信息
This paper introduces a novel perspective by classifying the secure deletion methods into four categories based on their methodology. For each of the proposed deletion category its associated algorithm is explained an...
详细信息
Information retrieval and extraction essentially rely on estimating the relevance of words present in a large corpus of documents or text. One of the approaches to measuring relevance is analyzing the importance of wo...
详细信息
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must ...
详细信息
ISBN:
(纸本)9781424478835
Reconfigurable Field Programmable Gate Arrays (rFPGAs) are employed extensively in spacecraft electronic systems to implement low-power adaptable systems that provide high density functionality. A challenge that must be tackled during system design is their high susceptibility to radiation induced Single Event Upsets (SEUs). A burst of energized particles may cause extensive damage to circuits. Even if their presence is transient, SEU faults may cause a permanent failure when they afflict the configuration memory - SRAM. There are two ways in which timely detection of faults and timely action to circumvent them can be undertaken - (i) Online error detecting/correcting circuits that demand a high premium in terms of FPGA area for extending error-security and Fault Tolerance, thus increasing cost and redundancy, and (ii) Built-in Self-Test (BIST) that allows efficient and very high-coverage fault detection but the fault testing is performed off-line. In general, Reliability and Availability (R&A) is a crucial quality parameter. In this paper, we present a state model that schedules Self-tests judiciously to optimize availability while ensuring a high degree of reliability. The aim of system design is to determine an optimal value of the mean time to self testing λT so that faults are detected on time and are reconfigured to boost system availability.
暂无评论