International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Security model evaluation of 3 g wireless network1 paper presentationRotract CLUB of BSAU
This document provides an overview of security in 3G wireless networks. It discusses the security features of 2G networks like GSM and how they have known vulnerabilities. It then examines the two main 3G standards - UMTS and CDMA2000, pointing out their security improvements over 2G as well as some remaining issues. The document evaluates the 3G security model based on availability, confidentiality and integrity.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
MANET(Mobile Adhoc Network) is an emerging technology and have great strength to be applied in battlefields and commercial applications such as traffic surveillance, MANET is infrastructure less without any centralized controller. Each node contains routing capability. Each device in a MANET is independent and can move in any direction. One of the major challenges wireless mobile ad-hoc networks face today is security, because no central controller exists. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a link layer ad hoc network. There are many security attacks in MANET and DDoS (Distributed denial of service) is one of them. Our main objective is seeing the effect of DDoS in routing, Packet Drop Rate, End to End Delay, no. of Collisions due to attack on network. And with these parameters and many more also we build secure IDS to detect this kind of attack and block it. In this thesis main objective is to study and implement the security against the DDOS attack. DDoS (Distributed Denial of Service) attacks in the networks are required to be prevented, as early as possible before reaching the victim node. DDos attack causes depletion of the network resources such as network bandwidth, disk space, CPU time, data structures, and network connections. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnets. DDos attack become more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, Unicast routing Multicast routing , Frequency of updates or network overhead , scalability , mobile agent based routing ,power aware routing etc. Thus it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. The following quantitative metrics Packet Delivery Ratio (PDR), Number of Collisions are to be used to evaluate the performance of DDoS attacks and their prevention techniques under different combinations in the fixed mobile ad hoc network. In our simulation, the effect of DDoS attacks under different number of attackers is studied.
A Security Architecture for Automated Social Engineering (ASE) Attacks over F...CSCJournals
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
Cloud computing is becoming prominent trend which offers the number of significant advantages. One of the ground laying
advantage of the cloud computing is the pay-as-per-use, where according to the use of the services, the customer has to pay. At present,
user’s storage availability improves the data generation. There is requiring farming out such large amount of data. There is indefinite
large number of Cloud Service Providers (CSP). The Cloud Service Providers is increasing trend for many number of organizations and
as well as for the customers that decreases the burden of the maintenance and local data storage. In cloud computing transferring data to
the third party administrator control will give rise to security concerns. Within the cloud, compromisation of data may occur due to
attacks by the unauthorized users and nodes. So, in order to protect the data in cloud the higher security measures are required and also
to provide security for the optimization of the data retrieval time. The proposed system will approach the issues of security and
performance. Initially in the DROPS methodology, the division of the files into fragments is done and replication of those fragmented
data over the cloud node is performed. Single fragment of particular file can be stored on each of the nodes which ensure that no
meaningful information is shown to an attacker on a successful attack. The separation of the nodes is done by T-Coloring in order to
prohibit an attacker to guess the fragment’s location. The complete data security is ensured by DROPS methodology
Security model evaluation of 3 g wireless network1 paper presentationRotract CLUB of BSAU
This document provides an overview of security in 3G wireless networks. It discusses the security features of 2G networks like GSM and how they have known vulnerabilities. It then examines the two main 3G standards - UMTS and CDMA2000, pointing out their security improvements over 2G as well as some remaining issues. The document evaluates the 3G security model based on availability, confidentiality and integrity.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
Comparative Study of Optic Fibre and Wireless Technologies in Internet Connec...Editor IJCATR
Most of the activities going on in the world today demand information and data sharing in one form or the other.
Consequently, the Internet and its connectivity has gradually become a household concern. The connection to the Internet requires
physical transfer of signal (data/information) from one point to another. This can either be through physical medium (wire) or through
the air (wireless). This paper a comparative study of Fiber Optics and Wireless Technologies in Internet connectivity seeks to identify
which of the two technologies is better for signal transmission in terms of bandwidth utilization, performance, reliability, cost
effectiveness, resilience, and security. The study adopted the use of secondary sources for the sourcing of materials. A lot of journal
articles, research publications, testbooks, white papers and many more were critically studies and comparatively analysed. It was clear
that both media have hitches and challenges. The study showed that although initial cost of acquisition is an inhibitive factor for fibre
optic connection, unlimited bandwidth delivery and high Quality of Service (QoS) placed Fiber optics above wireless connectivity in
their overall performance.
Mobile ad hoc networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no centralized authority. Each node participating in the network acts both as host and a router. So each node can participate to transfer data packet to destination node but suppose one node in network is removed at time it is very difficult to maintain the information about all node. The main advantage and disadvantage of MANETs provides large number of degree of freedom and self-organizing capability of that make it completely different from other network. Due to the nature of MANETs, to design and development of secure routing is challenging task for researcher in an open and distributed communication environments. In MANET, the more security is required in comparison to wired network. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them.
Keywords: MANETs, Security, Cryptography.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
This document summarizes a research paper on implementing heterogeneous interface mobile nodes in the NS2 network simulator. The paper discusses adding multiple WiFi and WiMAX interfaces to a mobile node individually, and then a heterogeneous interface combining both WiFi and WiMAX. It reviews related work on 4G networks and multiple interfaces. Implementation details are provided on creating homogeneous WiFi and WiMAX interfaces in NS2, including trace file and network animator outputs. Challenges are noted in implementing a heterogeneous interface on a single node due to NS2 limitations. An alternative approach of using separate nodes for each interface is proposed to simulate a mobile node with multiple heterogeneous interfaces.
This document analyzes routing protocols in wireless mesh networks (WMNs) using certain parameters like delay, throughput, and network load. It discusses security challenges in WMNs and proposes a security model. It also describes WMN protocols and simulation parameters. The paper then simulates three routing protocols (AODV, DSR, OLSR) in OPNET Modeler and displays the results in graphs to analyze protocol performance based on the parameters.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
This document summarizes a research paper on Mobile Ad Hoc Networks (MANETs). It discusses MANETs as self-configuring wireless networks without a fixed infrastructure. Key points:
1) MANETs allow nodes to move freely and dynamically change connections. They are useful for applications like military operations and disaster response where infrastructure is not present.
2) Performance issues with MANETs include limited bandwidth, dynamic topology changes, lack of resources at nodes, and security vulnerabilities. Routing protocols must account for these challenges.
3) Global positioning systems (GPS) can utilize MANETs, with nodes sharing location data over wireless links. Accuracy improves with more satellite connections or ground station assistance.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document discusses security issues in computer networks and proposes contemporary solutions. It covers topics like cryptography, secure data access, intrusion detection, and secure routing.
2) The literature review discusses previous research on wireless sensor network security including common attacks, requirements, and defenses. It also examines security issues that arise from the unique characteristics of wireless networks.
3) The document proposes that more research is still needed on topics like quantifying security costs and benefits, data integrity, survivability, and security for data-centric wireless sensor networks. A holistic security model is needed that integrates solutions at each network layer.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
A survey on security threats and detection2013Amina RIYAHI
This document provides an overview of security threats facing cognitive radio networks (CRNs). It discusses how CRNs aim to address spectrum scarcity by opportunistically using licensed spectrum bands when they are not in use. However, CRNs introduce new security vulnerabilities beyond those of traditional wireless networks. Specifically, adversaries can exploit the cognitive and reconfigurable aspects of CRNs to launch attacks like emulating primary users or falsifying spectrum sensing data. The document surveys current research on detecting such attacks and securing CRNs.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
Este documento apresenta uma discussão sobre tecnologias da informação e comunicação (TIC) e seu uso na educação. Resume os principais pontos sobre como as TIC podem ser usadas como ferramentas didático-pedagógicas, incluindo como recursos de informação, comunicação e aprendizagem colaborativa. Também discute a Web 2.0 e sites populares que podem apoiar projetos educacionais.
O documento discute os chats online e mensagens instantâneas, definindo-os como locais para conversas públicas ou privadas entre usuários. Também destaca os potenciais perigos desses ambientes, especialmente para crianças e jovens, como pedofilia ou roubo de identidade. Por fim, fornece dicas de segurança para usuários desses serviços.
Uma carta de amor de um filho para o seu pai, o "Totó", falando sobre memórias da infância e agradecendo o pai por tudo que fez, como cantar na rede, fazer comidas preferidas e estar sempre presente, apesar das inseguranças da vida. A carta expressa o amor, admiração e saudade do filho pelo pai.
This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKSIJNSA Journal
Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network
operators will support ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP
frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.
This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with
wireless communications and networking capability that communicate with each other without the aid of
any centralized administrator also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it’s an autonomous system in
which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at
the same time, and we discuss in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time , there is no direction or limit the movement and
so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these
actions communicate with each other path, An ideal choice way the agreement should not only be able to
find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any
time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the
History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and
then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this
paper, the more representative of routing protocols, analysis of individual characteristics and advantages
and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad
Hoc Networks
This document summarizes a research paper on implementing heterogeneous interface mobile nodes in the NS2 network simulator. The paper discusses adding multiple WiFi and WiMAX interfaces to a mobile node individually, and then a heterogeneous interface combining both WiFi and WiMAX. It reviews related work on 4G networks and multiple interfaces. Implementation details are provided on creating homogeneous WiFi and WiMAX interfaces in NS2, including trace file and network animator outputs. Challenges are noted in implementing a heterogeneous interface on a single node due to NS2 limitations. An alternative approach of using separate nodes for each interface is proposed to simulate a mobile node with multiple heterogeneous interfaces.
This document analyzes routing protocols in wireless mesh networks (WMNs) using certain parameters like delay, throughput, and network load. It discusses security challenges in WMNs and proposes a security model. It also describes WMN protocols and simulation parameters. The paper then simulates three routing protocols (AODV, DSR, OLSR) in OPNET Modeler and displays the results in graphs to analyze protocol performance based on the parameters.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
In this paper, we utilize the Several interference revelation techniques proposed for mobile ad hoc
networks rely on each node passively monitoring the data forwarding by its next hop. This paper presents
quantitative evaluations of false positives and their impact on monitoring based interference revelation for ad
hoc networks. Experimental results show that, even for a simple three-node configuration, an actual ad-hoc
network suffers from high false positives; these results are validated by Markov and probabilistic models.
However, this false positive problem cannot be observed by simulating the same network using popular ad hoc
network simulators, such as ns-2, OPNET or Glomosim. To remedy this, a probabilistic noise generator model
is implemented in the Glomosim simulator. With this revised noise model, the simulated network exhibits the
aggregate false positive behavior similar to that of the experimental tested. Simulations of larger (50-node) ad
hoc networks indicate that monitoring-based interference revelation has very high false positives. These false
positives can reduce the network performance or increase the overhead. In a simple monitoring-based system
where no secondary and more accurate methods are used, the false positives impact the network performance in
two ways: reduced throughput in normal networks without attackers and inability to mitigate the effect of
attacks in networks with attackers.
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
This document summarizes a research paper on Mobile Ad Hoc Networks (MANETs). It discusses MANETs as self-configuring wireless networks without a fixed infrastructure. Key points:
1) MANETs allow nodes to move freely and dynamically change connections. They are useful for applications like military operations and disaster response where infrastructure is not present.
2) Performance issues with MANETs include limited bandwidth, dynamic topology changes, lack of resources at nodes, and security vulnerabilities. Routing protocols must account for these challenges.
3) Global positioning systems (GPS) can utilize MANETs, with nodes sharing location data over wireless links. Accuracy improves with more satellite connections or ground station assistance.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
1) The document discusses security issues in computer networks and proposes contemporary solutions. It covers topics like cryptography, secure data access, intrusion detection, and secure routing.
2) The literature review discusses previous research on wireless sensor network security including common attacks, requirements, and defenses. It also examines security issues that arise from the unique characteristics of wireless networks.
3) The document proposes that more research is still needed on topics like quantifying security costs and benefits, data integrity, survivability, and security for data-centric wireless sensor networks. A holistic security model is needed that integrates solutions at each network layer.
The Abstracted Network for Industrial InternetMeshDynamics
Widespread adoption of TCI/IP protocols over the last two decades appears on the surface to have created a lingua franca for computer networking. And with the emergence of IPv6 removing the addressing restrictions of earlier versions, it would appear that now every device in the world may easily be connected with a common protocol.
But three emerging factors are requiring a fresh look at this worldview. The first is the coming wave of sensors, actuators, and devices making up the Internet of Things (IOT). Although not yet widely recognized, it is beginning to be understood that a majority of these devices will be too small, too cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead, much simpler protocols will predominate (see below), which must somehow be incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise networks, increasing movingly to the cloud for computing and communication resources. An important requirement of these Enterprises is the capacity to manage, control, and tune their networks using a variety of Software Defined Networking (SDN) technologies and protocols. These depend on computing resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will be struggling with the need to bring vast numbers of simple IOT devices into their networks. Though many of these devices will lack computing and protocol smarts, the requirement will still remain to manage everything via SDN. Along with this, many legacy Machine-to-Machine (M2M) networks (such as those on the factory floor) present the same challenges as the IOT: simple and/or proprietary protocols operating in operational silos today that Enterprises desire to manage and tune with SDN techniques.
A survey on security threats and detection2013Amina RIYAHI
This document provides an overview of security threats facing cognitive radio networks (CRNs). It discusses how CRNs aim to address spectrum scarcity by opportunistically using licensed spectrum bands when they are not in use. However, CRNs introduce new security vulnerabilities beyond those of traditional wireless networks. Specifically, adversaries can exploit the cognitive and reconfigurable aspects of CRNs to launch attacks like emulating primary users or falsifying spectrum sensing data. The document surveys current research on detecting such attacks and securing CRNs.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
The underlying fabric for communication among intelligent
agents will in many cases be provided by telecommunication
networks. But telecommunication networks have been seen as
a natural domain for the investigation and application of
intelligent agents’ technology as it emerged from the area of
Distributed Artificial Intelligence (DAI). Telecommunication
network administrations are vast organizations dedicated to
operating and managing networks with broad functional
segmentations: telephone network outside plant, switching and
transmission plants, public network, all supporting different
layers of specialized customer or service networks. These
networks are organized into multiple physical and logical
layers built with large quantities of repeated network elements
and sub network structures. All these elements need to be
configured, monitored, and controlled. In the future, this will
preferably be done by automated operation support systems
and without substantial human intervention.
This document summarizes security attacks on routing protocols in mobile ad hoc wireless networks. It discusses characteristics of ad hoc networks, including dynamic network topology and fluctuating link capacity. It describes problems with routing protocols, such as energy consumption and rapid node movement. It also outlines various security attacks like passive eavesdropping and active attacks that modify or inject false packets. Finally, it examines security solutions for ad hoc networks, including the Security Aware Ad Hoc Routing protocol, Authenticated Routing for Ad Hoc Networks protocol, and Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks protocol.
Este documento apresenta uma discussão sobre tecnologias da informação e comunicação (TIC) e seu uso na educação. Resume os principais pontos sobre como as TIC podem ser usadas como ferramentas didático-pedagógicas, incluindo como recursos de informação, comunicação e aprendizagem colaborativa. Também discute a Web 2.0 e sites populares que podem apoiar projetos educacionais.
O documento discute os chats online e mensagens instantâneas, definindo-os como locais para conversas públicas ou privadas entre usuários. Também destaca os potenciais perigos desses ambientes, especialmente para crianças e jovens, como pedofilia ou roubo de identidade. Por fim, fornece dicas de segurança para usuários desses serviços.
Uma carta de amor de um filho para o seu pai, o "Totó", falando sobre memórias da infância e agradecendo o pai por tudo que fez, como cantar na rede, fazer comidas preferidas e estar sempre presente, apesar das inseguranças da vida. A carta expressa o amor, admiração e saudade do filho pelo pai.
Uma amizade entre melhores amigas que começou e permanecerá para sempre, apesar das dificuldades, com música e fotos celebrando seus laços de amor e apoio mútuo.
El documento resume las protestas estudiantiles que ocurrieron en Venezuela en 2014. Comenzaron como protestas pacíficas en San Cristóbal por descontento con la escasez de insumos y malos servicios públicos. Luego se expandieron a otras universidades del país. El gobierno respondió con represión, lo que llevó a la aparición de grupos de respuesta política tanto moderados como radicales en apoyo a los estudiantes. La sociedad civil y partidos políticos de oposición también apoyaron las protestas, aunque con enfoques diferentes. El
La Unión Europea ha propuesto un nuevo paquete de sanciones contra Rusia que incluye un embargo al petróleo ruso. El embargo se aplicaría gradualmente durante seis meses para el petróleo crudo y ocho meses para los productos refinados. El objetivo es aumentar la presión sobre Rusia para que ponga fin a su invasión de Ucrania.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
This document discusses security challenges for 5G mobile wireless networks. It begins by reviewing the new capabilities and requirements of 5G networks, including higher bandwidth, lower latency, more connected devices, and new use cases. This introduces new security risks from attacks and requires security services like authentication, availability, confidentiality and privacy. The document then examines security issues from technologies enabling 5G like heterogeneous networks, device-to-device communication, and software-defined networks. It proposes a new flexible 5G security architecture and analyzes identity management and authentication approaches within it. The challenges of securing 5G networks into the future are also summarized.
This paper reviews 5G network technologies and security challenges. 5G will provide nearly unlimited wireless access and high data rates. It will face reliability, security, efficiency and energy challenges. 5G networks will use a variety of technologies like small cells and mobile edge computing. Security services like authentication, confidentiality, availability and integrity will be important for 5G. Ongoing standardization is addressing issues like spectrum allocation and receiver design challenges at high frequencies.
Security Models in Cellular Wireless NetworksWilliam Chipman
- Wireless networks and cellular networks are increasingly used for sensitive data transfer, raising security concerns.
- There are four main approaches to cellular network security: authentication, authorization, encryption, and physical security. Newer approaches include sandboxing on smartphones.
- As cellular and wireless networks continue integrating, new security risks emerge that require comprehensive security models across both network types.
Advanced Security Management in Metro Ethernet NetworksIJNSA Journal
With the rapid increase in bandwidth and the introduction of advanced IP services including voice, high-speed internet access, and video/IPTV, consumers are more vulnerable to malicious users than ever. In recent years, roviding safe and sound networks and services have been the zenith priority for service providers and network carriers alike. Users are hesitant to subscribe to new services unless service providers guarantee secure connections. More importantly, government agencies of many countries have introduced legislations requiring service providers to keep track and records of owners of IP and MAC addresses at all time. In this paper, we first present an overview of Metro Ethernet (or Ethernet-To-The-Home/Business (ETTx)) and compare with various IP broadband access technologies including DSL, wireless and cable. We then outline major security concerns for Metro Ethernet networks including network and subscriber/end user security. Next we introduce state-of-the-art algorithms to prevent attackers from stealing any IP or MAC addresses. Our proposal is to use network management in conjunction with hardware features for security management to provide a secure and spoofing-free ETTx network. The key idea behind our proposal is to utilize network management to enforce strict (port, MAC, IP) binding in the access network to provide subscriber security. The paper then proposes an adaptive policy-based security controller to quickly identify suspected malicious users, temporarily isolate them without disconnecting them from the network or validating their contracts, and then carry the required analysis. The proposed controller identifies malicious users without compromising between accurate but lengthy traffic analysis and premature decision. It also provides the ability to make granular corrective actions that are adaptive to any defined network condition.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
This document provides a literature review on topological planning of heterogeneous mobile networks in dense areas. It discusses the need for heterogeneous networks using a mix of macro, pico, femtocell and relay base stations. The network architecture is presented, including different types of base stations and their characteristics. Challenges of network planning in dense areas are also addressed, such as mitigating interference between indoor base stations and outdoor macrocells. Pathloss models and different interference scenarios are reviewed to understand their impact on network capacity and coverage optimization.
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
This white paper discusses the need for mobile network operators to scale their network security as data traffic increases with the rollout of 4G LTE networks. It notes that LTE will drive even higher traffic volumes and new security threats. The current security architectures of most operators have been built in an ad hoc way with various hardware platforms, risking bottlenecks and ineffectiveness. The paper argues for a multi-layer security approach utilizing virtualization to dynamically scale security capabilities and adapt to changing threats. Virtualizing network security functions allows them to be deployed quickly where needed and reduce hardware costs and interoperability issues.
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecurityIRJET Journal
This document discusses security issues and solutions related to 5G cellular networks. It begins by providing background on 5G network capabilities and technologies such as network slicing, device-to-device communications, and software-defined networks. It then examines various security threats to 5G networks, such as vulnerabilities at the physical and MAC layers, risks associated with network slicing and edge computing, and security implications of D2D communication. The document emphasizes that 5G networks require new security approaches due to their unique characteristics like low latency. It stresses the importance of stakeholders working together to strengthen 5G network security through innovative methods and constant adaptation to emerging threats.
Low complexity physical layer security approach for 5G internet of thingsIJECEIAES
Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform contenders which are being proposed in 5G especially in mMTC and ultra-reliable low latency communication (URLLC), it can also add an additional layer of security at physical layer to enhanced mobile broadband (eMBB).
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
56_5G Wireless Communication Network Architecture and Its Key Enabling Techno...EdisonAndresZapataOc
The document summarizes a proposed 5G wireless communication network architecture with an indoor/outdoor segregated design using cloud-based radio access networks (C-RAN). It aims to address challenges of 4G like higher data rates and network capacity by leveraging emerging technologies like massive MIMO, device-to-device communication, visible light communication, ultra-dense networks, and millimeter wave technology, which would be managed by software defined networking/network function virtualization through the C-RAN. The new 5G architecture separates indoor and outdoor networks to avoid penetration losses associated with current designs and allow indoor users to connect to dedicated indoor access points for improved quality of experience.
An overview of contemporary security problems in wireless mesh networksiosrjce
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an
alternative, hosts rely on each other to keep the network connected. Wireless Internet service
providers are choosing WMNs to offer Internet connectivity, as it allows a fast, simple and
inexpensive network use. One major challenge in design of these networks is their vulnerability to
security attacks. In this paper, principal contemporary security issues for wireless mesh networks
have been investigated. Identification of the threats a Wireless mesh network faces and the security
goals to be realized are described. The new challenges and opportunities posed by this new
networking environment are dealt with and explored approaches to secure its communication.
This document provides an overview of contemporary security problems in wireless mesh networks. It discusses security vulnerabilities at different layers of the communication protocol stack for wireless mesh networks, including the physical, link, and network layers. At the physical layer, jamming attacks are a risk. The link layer is vulnerable to passive eavesdropping, spoofing, congestion attacks, and replay attacks. The network layer faces risks from routing attacks like black hole and gray hole attacks, as well as Sybil attacks. Overall, the document analyzes different types of attacks that threaten the security of wireless mesh networks.
Network Security Roadmap have some perception of provided securityslametarrokhim1
The document discusses security considerations for 5G networks. It notes that 5G networks integrate new technologies like SDN, virtualization and service-based architecture that introduce new threat models beyond those of previous generations. Effective 5G security will require measures across multiple layers, including mutual authentication, cloud-based threat analysis, quarantining infected devices, and multi-layered encryption of SDN data planes. The document also proposes studying vulnerabilities emerging from the integration of 5G components and systems, as well as formulating new stream ciphers, security protocols, and analyzing security challenges across application, edge and cloud layers.
Navigating the Unseen Risks: Exploring 5G VulnerabilitiesSecurityGen1
As the world transitions into the era of 5G technology, it brings with it transformative advancements in communication and connectivity. However, this rapid evolution also ushers in a new realm of concerns – 5g vulnerabilities. While 5G promises lightning-fast speeds, ultra-low latency, and the ability to connect a multitude of devices, it also introduces a broader attack surface for cybercriminals. The complex architecture of 5G, including its reliance on virtualization, software-defined networking, and a multitude of interconnected components, presents challenges in ensuring robust security.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
1. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
942 | P a g e
Study and Analysis of Security Issues in Next Generation Mobile
Network
Shwetha H.K1
, Prof. D. Jayaramaiah2
1
PG Student, The Oxford College of Engineering, India
2
Professor, HOD- Information Science & Engg, The Oxford College of Engineering, India
Abstract
NGMN is a standard term describing the
next level of evolution in wireless communication.
Security is one of the important issue in next
generation mobile network. The core infrastructure
of NGMN network is packet based, all IP and
heterogeneous where Long Term Evolution (LTE),
WiMax & Wireless local area networks (WLAN)
are examples of viable access technologies. By
deploy femtocell it increasing demand for data rates
, LTE is the mobile network technology for the next
generation mobile communications as defined by
the 3rd
generation partnership project (3GPP). LTE
has features such as increased data rates, lower
latencies & better spectral efficiency. Goal here is
to raise awareness about security issues in LTE &
femtocell. In this paper we approach significant
threats to security of femtocell enabled cellular
networks (LTE). Approach Distributed Denial of
Service (DDoS) defence scenario dynamics among
service provider and mobile operator that is
effective against malicious attacker. By
considering parameters such as Internet traffic and
femtocell subscriber shares, We propose novel
approach could help service provider and mobile
operators making strategic decisions.
Index Terms—Wireless Security, Cellular Mobile
Networks, LTE, Femtocells
I. Introduction
In wireless communication networks
cellular mobile networks are the most widely used
and heavily deployed in the world. In the advent of
digital technologies such as GSM the use of mobile
devices has changed. Based on the subscriber’s
location users are able to browse the Internet and get
the services such as ebanking, navigation, social
networking and recommendations using modern
smartphone. Femtocells, are low-power and low-
range base stations for cellular networks installed by
users at their own premises, are believed to meet the
surge in data rates that these multimedia and
interactive services require. They offload the
macrocell network and provide backhaul connections
to the cellular operators’ networks through the users’
residential broadband accesses [15].
Long Term Evolution (LTE) is the mobile
network technology for the next generation mobile
communications, as defined by the 3rd Generation
Partnership Project (3GPP). The features such as
increased data-rates, lower latencies and better
spectral efficiency, and the IP core network
architecture, known as Evolved Packet Core (EPC).
The essential component of the Evolved Packet
System (EPS, which includes the radio access, the
core network and the handset) is give a importance
for supporting the high-speed connections and a
smooth handovers among LTE and other
technologies such as GSM and WCDMA. LTE is
expected to make extensive use of user-installed
femtocells, very low-power and low-range base
stations (femtocells), in order to achieve its goals of
spectral efficiency and high-speed for a greater
number of users.
Security in these networks is achieved by
several levels. They concerns about the messages
that are communicated over-the-air, the traffic routed
by a mobile operator on its own internal network and
the inter operator traffic. The main assumption
underlying the security of the mobile networks cited
so far is a high trust that each operator has in its own
infrastructure and in other operators with whom it
has a roaming contract. The main reasons behind
such positive attitude are the following: (i) direct
ownership and control of the network equipment, (ii)
dedicated connections and protocols among network
components and (iii) the highly hierarchical decision
making process for providing network resources to
mobile devices. Clearly, in case of a substantial
change in the network architecture, such as evolving
to a flat all-ip network, the trust relationships would
need to be revisited.
The combination of LTE, all-ip network
architecture and femtocells is stimulating the new
security threats. A malicious user easily tamper with
the femtocell, as it resides directly at the user’s
premises, or to disrupt the legitimate
communications both at the femtocell and at the core
network level, due to the openness of the IP
networks. Moreover, as LTE is an evolution of the
existing 2G-3G standards and is backward-
compatible with them, it also inherits different
vulnerabilities at the protocol level. Specifically, the
privacy of the user’s permanent identity and his/her
geographic location is at risk both at the air interface
(use of identifiers) and at the application layer
(location based services).
2. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
943 | P a g e
In this report, we analyze security threat related to
the all-ip and femtocell LTE network architectures.
We analyze a scenario involving distributed denial of
service (DDoS) attacks on the femtocell core
network components, , and we present a novel game
theoretic model to represent scenario between a
mobile operator and different service provider.
II. RELATED WORK
On the security front, DDoS attacks are a
well known phenomena for large companies hosting
a multitude of web servers sparse around the globe,
such as eBay, Amazon or Yahoo [6]. In order to deal
with such attacks in a systematic way, Mirkovic [18]
proposes a general classification of attacks and
defense mechanisms, such that system developers
and researchers can better observe and react to the
inherently different attacks by exploiting their
common traits. If the detection of ongoing DDoS
attacks is best performed at the victim site, the
suppression mechanisms are most effective near the
source, as it is possible to filter the malicious traffic
from the genuine connections and avoid the former
to even reach and saturate the final link with the
target. This idea has been investigated in several
studies ([17], [5], [19], [16]) suggesting that a
distributed solution is better suited against large-
scale DDoS attacks than one localized only at the
final link with the target. The requirement is that
different ISPs are able and willing to cooperate in
order to provide protection, and the authors agree
that a failure to reach an agreement could jeopardize
the effectiveness of their solutions. Only in more
than one ISP is strictly required to implement the
solution, otherwise even a single ISP would be able
to ensure a partial level of protection.
One work that specifically aims at
femtocells and mobile operators is [15], where
femtocell gateways are the targets of DDoS attacks
perpetrated with the intent to extort money from
mobile operators. The authors manage to obtain real
prices for such attacks but fail to illustrate any
countermeasures that make use of the specific
features of femtocell networks, such as the need for
femtocells to be located in geographic regions where
the mobile operator has the right to use the spectrum.
Our DDoS defense scheme presents a model that
leverages on incentives that cooperation among ISPs
could bring both to them and to mobile operators.
III. LTE NETWORK
ARCHITECTURES
In this section, we describe the network
architecture of LTE (radio access and core network)
that are related to the security issues discussed in this
report. Figure 1 shows a basic network architecture
for LTE[7], with a clear separation between the core
network (CN) components and the radio access
network (RAN). More information about the
architecture and security of LTE RAN/CN can be
found in following paper [13], [14], [21].
3.1 Radio Access Network
The RAN is responsible for all the radio
interface related features of the network, and it is the
point of entry to the mobile network for any
compatible wireless device. In addition to
encapsulating or decapsulating data, it performs
radio channel and power management controls,
handover procedures and over-the-air
encryption/integrity for data and signalling traffic to
and from the wireless devices (User Equipment, UE).
Due to the broadcast nature of the wireless medium,
the air interface is the most vulnerable to
eavesdropping and traffic injection, and thus several
measures have been taken in order to mitigate those
risks. Eventhough it might be non trivial to break the
algorithm and obtain the secret key, the user privacy
is still at risk due to protocol flaws enabling a
malicious user with a femtocell to track the where
abouts of a subscriber.
In LTE and UMTS, all user and signaling
traffic is encrypted and integrity protected against
misuse by malicious entities on the air interface. The
use of a shared secret key between the Universal
Subscriber Identity Module (USIM) in the mobile
device and the home network ensures that only
authorized users and legitimate network operators
can communicate and exchange information. There
are, however, major differences in the way
encryption and trust is managed in LTE and UMTS.
The UMTS the air interface encryption is
terminated at the RNC, while in LTE it is terminated
in the eNodeB (similar to GSM). UMTS uses
encryption/integrity key pairs that are independent of
the network that is currently serving the UE.
Moreover, these keys must not be changed during a
handover, if the UE is still served by the same
SGSN. In LTE, on the contrary, the keys are not
transfered as such from the home network to the
eNodeBs but they are derived from layer to layer,
depending on the particular serving network and the
specific eNodeB that is used by the mobile device.
As a consequence, LTE has already been developed
with limited trust in network components and
external partners from the beginning.
3.2. Femtocells
As defined by the Femto Forum [15]
femtocells are low-power wireless access points that
operate in licensed spectrum to connect standard
mobile devices to a mobile operators network using
residential DSL or cable broadband connections. The
main differences with respect to traditional base
stations, such as (e)NodeBs, are the following.
Femtocells are installed by users at their own
premises, without the involvement of authorized
operator’s technicians,
3. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
944 | P a g e
_ user-friendly and low-cost devices, connected to
the operator’s network through a public (insecure)
connection, provided by a potentially different
service provider.
Figure 1. Basic architecture of LTE network
From a mobile device’s point of view, being
connected to a (e)NodeB or a femtocell is both are
same, because the protocols and security standards
used at the air interface are exactly the same. From a
malicious user’s point of view, it makes a substantial
difference because for a malicious user it is much
easier to tamper with a small and low-cost (£160
[15]) femtocell than it could be with a bigger device
located on a rooftop. Moreover, as the traffic
between the femtocell and core network goes
through the Internet, so the attacker can easily attack
through femtocell.
3.3 Core Network
The core network components of LTE,
shown in Figure 1 (middle), are responsible for the
storage of subscriber information, billing, mobility
management, authentication /authorization and
routing of user data to hits destination. Without this
infrastructure, the calls and data services cannot be
successfully established. Usually, the core network is
protected from external access by firewalls located at
its edges, and LTE have security measures in place
to the malicious attacks on core components. Inside
the core network, encryption is not specified for
UMTS and not mandatory for LTE, although the IP
interfaces in LTE can be protected by using IPSec
secure connections among the RAN and CN
components. As LTE supports interconnections with
non-3GPP networks such as WiMax and WiFi, IPSec
tunnels are used inside the core network to protect
the confidentiality of information. Integrity, on the
contrary, is not protected for performance reasons.
IV. SECURITY CHALLENGES
Figure 1 shows the threat model for a
femtocell-enabled mobile network. The three
vulnerable elements are indicated by arrows: (i) the
air interface between the mobile device (User
Equipment) and the femtocell (Home(e)NodeB), (ii)
the femtocell itself and (iii) the public link between
the femtocell and the security gateway (SecGW).
Our intent is to focus on certain attacks on the
aforementioned elements, which are achievable
without breaking the cryptosystems or the protocols.
A more exhaustive list of all possible attacks and
countermeasures can be found in.
4.1 Attacks on the Femtocell
A mobile device, being connected to a
regular base station, i.e., (e)NodeB, or a femtocell is
both are same, because the protocols and security
standards used at the air interface. From a malicious
user’s point of view, it makes a substantial difference
because it is much easier for a malicious user to
tamper with a small and inexpensive (£120 [15])
femtocell than it could be with a large and
complicated device located on a rooftop. The
physical size, material quality, lower cost
components and the IP interface of the femtocell
make it more suited for reverse engineering and
tampering than a traditional, more expensive and
business-grade (e)NodeB base station.
As the over-the-air user data encryption is
terminated at the femtocell, hardware tampering with
the device could expose the private information of
the unsuspecting user. Moreover, attacks such as
device impersonation, Internet protocol attacks on
the network services, false location reporting or
simply unauthorized reconfiguration of the onboard
radio equipment could hinder the network operator
from controlling interference and power management
features. This could have severe consequences on the
quality of service. To this end, femtocells should be
equipped with trusted execution environments that
render malicious manipulation of the onboard
software and the on-the-wire sniffing very hard to
achieve.
we develop a game-theoretic model to
represent a possible security scenario for the
femtocells and their core network components, the
femtocell gateways. ISPs and mobile operators make
decisions on the security demand/offer for the
femtocell infrastructure by considering distributed
denial of service (DDoS) attacks on femtocell
gateways.
External network
Core network
Radio Access
Network(RAN
)
4. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
945 | P a g e
V. FEMTOCELL DDOS DEFENSE
One important security issue of current and
next generation cellular networks will be related to
the use of femtocells in order to provide better signal
quality, service availability and data-rates to the
subscribers. If, on one hand, this seems to be a very
palatable solution for mobile operators as it avoids
investments on the backbone connection, on the
other hand the exposure to the public Internet has
severe drawbacks. One of them is the public IP
address that each femtocell gateway would be
assigned, and to which tenths of thousands
femtocells would connect to. DoS attacks are usually
carried out against a service running on a specific IP
address in order to deny access to legitimate users
and cause damage to the service owner. A distributed
DoS (DDoS) attack has the same goal but it is
usually much more difficult to prevent, as it exploits
a great number of zombie computers to generate
apparently legitimate connections to the given IP
address. It is clear that if the gateways were to suffer
intense DDoS attacks, customers would not be able
to connect to them anymore and would not get the
service they are paying for. Ultimately, they could
also change their mobile operator.
In this section, we develop a game theoretic
model for the defense against DDoS attacks. The
idea is based on the fact that femtocells are low
power base station so attacker easily attack through
the femtocell. In DDoS attack, attacker send many
number of packets to the operate. As a consequence,
The packet send from the attacker will not send to
the SGW, ISP itself block all the packets which is
received from the attacker. This way, the mobile
operator can continue to serve legitimate users while
avoiding to provide resources to malicious attackers.
We assume that an Service provider could
either provide protection by cooperating with other
service provider, on its own or not protect at all. If an
service provider cooperates with others in order to
provide protection, then it can lower its costs by
sharing them with the other parties. In this case, it
also gets only a share of the benefits (provided by the
mobile operator) to compensate for the extra costs of
setting up the protection mechanisms. If a service
provider protects the mobile operator on its own, it
gets all the benefits but has a greater cost as well,
depending on its current Internet traffic share. If an
service provider does not provide protection, it does
not get any benefits but, at the same time, it does not
bear any additional cost.
In game theoretic model We model the
DDoS defense. The leader (mobile operator) chooses
its strategy first and then the followers (ISPs),
knowing the strategy of the leader, select their own
strategies in order to maximize their payoffs. Once
the leader has chosen its strategy, the followers play
the game in a simultaneous fashion, i.e. all ISP select
their strategies at the same time. Figure 2 illustrates
the graph for the time to detect the attack and load on
SGW.
Figure 2a. Time to detect attack, x-axis is rate of
packet in kilo bits and y-axis time in milisecond.
Figure 2b, Load on SGW, x-axis is time in second
and y-axis is load on SGW. In this graph it shows the
result of normal flow of data and the result of after
lunch attack. Once the attack is lunch it drop out the
load on SGW and constant for the next flow.
VI. CONCLUSION
The control over security in the next
generation of mobile networks, such as LTE, is held
by the core network. LTE and femtocells are
combined together with an all-IP core architecture,
they provide better service levels and data-rates than
current 2G and 3G networks. In order to attach more
users and to increase security, the research people
(3GPP) has put more intelligence in the next
generation base stations, enabling them to decide
autonomously the radio channel characteristics
(handover, power, channel assignment) for each user.
In this paper, we have approach some
significant threats to security in femtocell-enabled
5. Shwetha H.K, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.942-946
946 | P a g e
mobile networks. we suggested a novel approach
towards the protection of the mobile network against
internet-based DDoS attacks successful stimulating.
REFERENCES
[1] 3GPP LTE. Visited on 25.11.2009.
[Online]. Available:
http://www.3gpp.org/LTE
[2] Y. De Mulder, G. Danezis, L. Batina, and
B. Preneel, “Identification via location-
profiling in GSM networks,” in Proceedings
of the 7th AC workshop on Privacy in the
electronic society. ACM New York, NY,
USA, 2008, pp. 23–32.
[3] G. Koien and V. Oleshchuk, “Location
Privacy for Cellular Systems; Analysis and
Solution,” Lecture Notes in Computer
Science, vol. 3856, p. 40, 2006.
[4] L. Garber, “Denial-of-service attacks rip the
Internet,” Computer, vol. 33, no. 4, pp. 12–
17, 2000.
[5] J. Mirkovic, “A taxonomy of DDoS attack
and DDoS defense mechanisms,” ACM
SIGCOMM Computer Communication
Review, vol. 34, no. 2, pp. 39–53, 2004
[6] Lee Garber, “Denial-of-Service Attacks Rip
the Internet”.
[7] Long Term Evolution (LTE) overview.
[8] LTE Simulator Documentation.
[9] Next Generation Mobile Network Beyond
HSPA & EVDO, by the NGMN Alliance.
[10] Securing Next Generation Mobile
Networks.
[11] Spectrum Requirements for the Next
Generation of Mobile Networks.
[12] Anand R. Prasad, “3GPP SAE/LTE
Security”.
[13] 3GPP TS 23.401 v8.7.0. “ General Packet
Radio Service (GPRS) enhancements for
Evolved Universal Terrestrial Radio
Acceess Network access”.
[14] 3GPP TS 33.401 v8.5.0, “3GPP System
Architecture Evolution (SAE) Security
Architecture”.
[15] Femto Forum.
http://www.femtoforum.org/femto/aboutfe
mtocells.php..
[16] T. Peng, C. Leckie, and K.
Ramamohanarao, “Survey of network-based
defense mechanisms countering the DoS
and DDoS problems,” ACM Computing
Surveys (CSUR), vol. 39, no. 1, p. 3, 2007.
[17] S. Chen and Q. Song, “Perimeter-based
defense against high bandwidth DDoS
attacks,” IEEE Transactions on Parallel and
Distributed Systems, vol. 16, no. 6, pp.
526–537, 2005.
[18] J. Mirkovic, M. Robinson, P. Reiher, and G.
Oikonomou, “Distributed Defense Against
DDOS Attacks,” University of Delaware
CIS Department Technical Report CIS-TR-
2005, vol. 2, 2005.
[19] C. Papadopoulos, R. Lindell, J. Mehringer,
A. Hussain, and R. Govindan, “Cossack:
Coordinated suppression of simultaneous
attacks,” in Proceedings of DISCEX III.
Citeseer, 2003, pp. 2–13.
[20] GSM Association Market Data Summary
Q2 2009. Visited on 24.11.2009. [Online].
Available:
http://www.gsmworld.com/newsroom/mark
et-data/ market data summary.html.
[21] 3GPP TS 33.401 v8.5.0, “3GPP System
Architecture Evolution (SAE): Security
architecture,” . [Online]. Available:
http://www.3gpp.org/ftp/Specs/Archive/33
series/33.401/33401-850.zip
[22] 3GPP TS 23.002 v4.8.0, “Network
architecture,” . [Online]. Available:
http://www.3gpp.org/ftp/Specs/archive/23
series/23.002/23002-480.zip