This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
Attacks and Risks in Wireless Network Securityijtsrd
Â
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
Attacks and Risks in Wireless Network Securityijtsrd
Â
Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18625.pdf
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
An overview of security and privacy challenges that must be faced and solved when creating new Things for the Internet of Things. We discussed why are Things inherently insecure together with examples of attack vectors and learned some risk mitigation strategies. We realized why should users be wary of Things violating their privacy and gained awareness of upcoming EU privacy legislation that affects providers of IoT-based solutions. Talk given at Pixels Camp 2017, Lisbon.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
Â
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, AntiâMalware Software and scanners, Secure Socket Layer, intrusionâdetection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
Â
Work-in-Progress!
IoT Cyber+Physical+Social Security
An encyclopedic compendium of tools, techniques, and practices to defend systems that sit at the intersection of the cyber and physical domains; chiefly building automation systems and the Internet of Things.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Â
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In todayâs Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
Â
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Research on existing bulidings strengthened with bamboo. Presented at the International Training Workshop on Sustainable Industrialization and Commercialization of NTFPs.
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
Â
This paper is on the exploration of Internet Network security. With the advent of the internet, security became a major concern for computer users, organizations and the Military. The internet structure itself allow for many security threats to occur. Knowing the attack methods, the architecture of the internet when modified can reduce the possible attacks that can be sent across the network. The internet can be secured by the means of VPN, IPSec, AntiâMalware Software and scanners, Secure Socket Layer, intrusionâdetection, security management, firewalls and cryptography mechanisms. The essence of this research is to forecast the future of internet network security.
The growth of IoT is occurring at an incredible rate, justly raising alarms about IoT security and IoT privacy issues as we become increasingly reliant on these intelligent, interconnected devices in our lives and businesses. How are we to protect billions of devices from attacks and intrusions that could compromise our personal privacy, public safety, or business viability? Building an IoT solution involves securing sensors, devices, networks, cloud platforms, web applications, and mobile applications for diverse industries. This presentation examines the landscape of emerging security challenges posed by connected devices and offers a catalog of security deployment patterns that have been successfully used by some of the worlds most well known OEMs to deploy connected product fleets.
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
Â
Work-in-Progress!
IoT Cyber+Physical+Social Security
An encyclopedic compendium of tools, techniques, and practices to defend systems that sit at the intersection of the cyber and physical domains; chiefly building automation systems and the Internet of Things.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Â
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
The Internet of Things (IoT) is thriving network of smart objects where one physical object can exchange information with another physical object. In todayâs Internet of Things (IoT) the interest is the concealment and security of data in a network. The obtrusion into Internet of Things (IoT) exposes the extent with which the internet of things is vulnerable to attacks and how such attack can be detected to prevent extreme damage. It emphasises on threats, vulnerability, attacks and possible methods of detecting intruders to stop the system from further destruction, this paper proposes a way out of the impending security situation of Internet of things using IPV6 Low -power wireless personal Area Network.
Its is project based on one of the most interesting and wide topic of Computer Science, named Cyber Security
CONTENT :
1. What is Cyber Security
2. Why Cyber Security is Important
3. Brief History
4. Security Timeline
5. Architecture
6. Cyber Attack Methods
7. Technology for Cyber Secuirty
8. Development in Cyber Security
9. Future Trend in Cyber Security
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
Â
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
-IoT Security is a Safety/Privacy Issue
-Consider the devices you bring into your home and to work
Video Links:
-Hue: https://www.youtube.com/watch?v=7TOsFqqJgj4
-Slow Cooker: https://www.walmart.com/ip/BLACK-DECKER-WiFi-Enabled-6-Quart-Slow-Cooker/128745799
-Smart Toilet: https://www.youtube.com/watch?v=HyZ7S4fE5v4
Research on existing bulidings strengthened with bamboo. Presented at the International Training Workshop on Sustainable Industrialization and Commercialization of NTFPs.
Off Page SEO Tips and Strategies in 2015
Off page SEO is another key factor of search engine ranking. Find here top 10 off page SEO tips and latest off page strategies in 2015. Off-page SEO is the process of optimizing your website pages and posts outside your website.
Connect me
FB: https://www.facebook.com/eng.shimanto
Skype: shimantoarif
https://www.fiverr.com/shimantoarif/digital-marketing-expert-and-strategist
mail: shimantoeee@gmailcom
mobile: +8801716552935
The Virtual Health Sciences Library of the Balearic Islands: A regional proje...Bibliosalut
Â
Virtual Health Sciences Library of the Balearic Islands (Bibliosalut) is a regional project carried out in collaboration with the Regional Ministry of Health and Consumer Protection and the Health Service of the Balearic Islands (Ib-salut), through the Balearic Islands Biomedical Documentation Service. The Virtual Library Mission is to facilitate the most important scientific information to the public health professionals of the Balearic Islands, by using the new information and communication technologies, in order to contribute to the improvement of medical care quality, teaching, research and health management
BWL Optrimax Plum Delite Ang Pinaka Trending na opportunity ngayon! kung saan kikita ka gamit lang ang internet!!!
For More Info Please Contact: Kevin Ochoa
FB Acct: https://www.facebook.com/vince.ochoa.7
+639094577148
+639266660976
⨠Lose Weight Without Diet and Exercise
⨠Cleanse your Colon
⨠Detoxification
⨠Very Safe, Proven and Effective
⨠FDA/HALAL Certified
⨠Unlike other weight loss product this is only a fruit
⨠See result in just 10days
Want to Order or to know more about
Optrimax Plum Delite?
Add/Message Me on Facebook:
https://www.facebook.com/vince.ochoa.7
Or Contact me @:
Kevin Ochoa
+639094577148
+639266660976
Like Us:
https://www.facebook.com/optrimaxph
"Be Healthy, Sexy and Wealthy with Optrimax Plum Delite!"
From october 2009 - through march 2010 I worked on a project to identify and document potential areas of cooperation within research, development and especially innovation between Denmark and Brazil. This presentation highlights the focus areas identified, synergies found compared to some Brazilian top universities in the south-east and south part of Brazil. The presentation exist only in Danish, but many terms used are English.
PodrÄcznik pokazuje i objaĹnia, jak zarzÄ dzaÄ treĹciami multimedialnymi i jak odpowiednio dostosowywaÄ tradycyjne techniki zarzÄ dzania wiedzÄ w kontekĹcie multimedialnym.
Prezentace z konference E-Business Forum 2014Filip Drimalka
Â
ZajĂmavĂŠ inovace a startupy z oblasti e-commerce, kterĂŠ mohou inspirovat i ÄeskĂŠ online podnikatele, spolu s tipy na growth hacking - aneb rĹŻst vaĹĄeho online projektu.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
Â
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Wireless Security â From A to Z â Types, Threats, To How to Secure.pdfSeanHussey8
Â
The introduction of Wi-Fi has created a plethora of chances for thieves.
Wireless security is the deterrence of unauthorized users from accessing and stealing data from your wireless network. To be more specific, wireless security protects a Wi-Fi network from unwanted access.
Only a minor flaw in your home Wi-Fi network can provide criminal access to nearly all devices that use that Wi-Fi. Access might cause issues with bank accounts, credit card information, kid safety, and a variety of other concerns.
Within this article are pertinent recommendations to assist you in protecting your home Wi-Fi network from illegal access.
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
Â
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISIJNSA Journal
Â
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdropping becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
A Literature Survey on Security Management Policies used in Wireless Domainijtsrd
Â
Wireless is a term used to describe telecommunications in which electromagnetic waves rather than some form of wire carry the signal over part or the entire communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing these are also sometimes classified as wireless. Wireless network security is the process of designing, implementing and ensuring security on a wireless computer network. Nowadays wireless networks are the most popular way of communication. For example, internet services in companies, cafes, e markets and in homes. This paper will highlight the drawbacks and their proposed system to give continuous growth of new technologies in wireless domain, both for application and basic research. Papers should emphasize original results relating to the theory and or applications of wireless communications and networking. K. Senthil Kumar | P. Supraja | V. Sridharshini ""A Literature Survey on Security Management Policies used in Wireless Domain"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22854.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/22854/a-literature-survey-on-security-management-policies-used-in-wireless-domain/k-senthil-kumar
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
Â
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
1
Table of Contents
Wireless Network Security3
Introduction3
Overview of Wireless Technologies4
Standards of Wireless Specification:6
Security Features6
Wireless Threats7
Wireless Networks Attacks8
Conclusion9
References10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologies
The wireless technologies make the gadgets to have communication without any connection physically, implying that they do not need peripheral or network cabling. The wireless range from the complicated environments, for instance mobile networks that includes 3G mobile phones and local area networks, to less complicated gadgets such as microphones without wire, earphones and other gadgets which will not save or process data and usually used for small range procedures like infrared or communications via Bluetooth (BT) (Egners, Herrmann & Meyer,2015).
Typical IP network wireless devices or infrastructure
Access points or base stations
¡ Station wireless
¡ Router wireless
Retransmission devices (Sun, Yan, Zhang & Rong, 2015).
¡ Repeater wireless
¡ Network bridge wireless
End points
¡ Cards or adapters wireless
¡ Laptops
¡ PDAs
¡ Mobile telephones
Infrared devices, such as cordless computer keyboards, remote controls and mice all needs a direct line of sight between the receiver and transmitter to complete the link. Even though the infrared communication replaced by BT technology in most of the gadgets, some legacy standard gadgets still use IR for short range communication (Illiano, & Lupu, 2015).
Network classification of wireless networks
Wireless networks act as date transmitter mechanism between other wireless communications and the traditional wired networks. Wireless network can be structured in different ways but they are frequently categorized into 4 main categories based on their coverage range.
¡ Wireless wide area network (WWAN)
Which invol ...
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxdonnajames55
Â
Composition Assistance - Topic Gun Control
Assignment 2: Your Research Paper's Annotated Bibliography
Revisit the topic that you listed in your research proposal from Module 1, and do some research. If you have some trouble, you may need to narrow it a bit to find appropriate academic source material. Your selected topic will be the topic for your final paper in this class.
For this assignment, you need to complete an annotated bibliography of the sources you are finding for your research paper. As you continue to work on your project, add to your list, so that when you are ready for your final draft you can remove the unused citations and all annotations. After these things are removed, and your page is re-titled âReferences,â it will be ready to submit as part of the final paper. Here are the things you should look for in a good annotated bibliography:
¡ You use at least three university-level resources that are authoritative, correct, unbiased, current, and coherent.
¡ Your title is âReferences,â not âBibliography.â Your authors are listed in alphabetical order, and there is a short explanation after every citation.
¡ Your citations are APA formatted (with hanging indent) and each needed block of annotation text is in the appropriate order.
¡ The work is formatted in 12 point, Times New Roman font, with one inch margins all around.
¡ You offer a description of the sourceâs usefulness: statistics, clever quote, graph, table, fact, or other relevant information. If a source is not useful, you note that it is not going to be used in your paper.
5
Table of Contents
Wireless Network Security 3
Introduction 3
Overview of Wireless Technologies 4
Standards of Wireless Specification: 6
Security Features 6
Wireless Threats 7
Wireless Networks Attacks 8
Conclusion 9
References 10
Wireless Network SecurityIntroduction
The wireless technology has been under threat in terms of security because of hacking aspect, the wireless technology has been under threat as the same as the wired network, but on the other hand they are vulnerable to additional risk( Silva, Santos & Nogueira,2015). The wireless network usually transmits data via the radio frequencies that enhance the possibility of tapping the information by threaten invaders if it is not properly protected. The threaten invaders have founded a way to get the access to the wireless system to steal or destroy the original information, the attackers launch strikes which are related to network bandwidth and prevent the authorized users to use their desired services, and they also keep an eye on the conversations that are taking place. For instance, the hackers or threaten invaders successfully get into wireless systems to have access to important information. The project mainly focuses on the IEEE802.11 and IEEE802.16 which are group of standards for wireless local area networks (WLANs) and metropolitan area networks (WMANs) respectively.Overview of Wireless Technologi.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
Â
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Â
Are you looking to streamline your workflows and boost your projectsâ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, youâre in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part âEssentials of Automationâ series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Hereâs what youâll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
Weâll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Donât miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Â
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Â
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
⢠The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
⢠Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
⢠Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
⢠Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Â
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Â
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overviewâ
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Â
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Â
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Â
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
Â
DOI : 10.5121/ijnsa.2013.5307 67Â
Â
IMPLEMENTATION OF A SECURITY
PROTOCOL FOR BLUETOOTH AND WI-FI
U. Pavan Kumar
Dept. of Telecommunication Systems Engineering, AITTM, Amity University, Noida,
India.
Pavan21cool@gmail.com
ABSTRACT
This paper is mainly based on providing security to the wireless networks through which devices like
Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The
protocols that are required to provide security to wireless networks can be implemented by creating a
wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the
security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be
designed especially for security purpose. This is done by following many tutorials to get a minimum basic
knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of
the data that is being exchanged. Data should be ensured as and then there will be a perfect
implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to
NS2 and implementation of that protocol by providing a wireless scenario.
KEYWORDS
Wireless Networks, NS2[1]
, Security Protocol, Bluetooth, Wi-Fi, Caesar Cipher[2]
,
Encryption/Decryption[2]
, Hash Function [2].
1. INTRODUCTION
Bluetooth technology is the open standard for wireless connections with the backers mostly from
the industries of mobile phones and computers. Bluetooth, however, is a radio-frequency (RF)
technology utilizing the unlicensed 2.4GHz Industrial-Scientific-Medical (ISM) band.
The applications which were targeted include PC and peripheral networking, hidden computing,
and data synchronization such as for address books and calendars. Other applications might be
comprised of home networking and home appliances of the future such as smart appliances,
heating systems, and entertainment devices. Ericsson was the initial developer. Later, Bluetooth
Special Interest Group (SIG) formalized it as an industrial standard. SIG, now, expanded to a
group of 1800 members though it was initially formed by Ericsson, Intel, Toshiba, Nokia and
IBM.
The important consideration for any network is its security. If a network gets an unauthorized
access then it can lead to cases like disclosure of sensitive information, modification of data,
denial of service, illicit use of resources etc. Such unauthorized access grants the access to
2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
68Â
Â
information which can reveal the usernames and passwords which can be later misused for further
attacks.
Not just wired LANs but WLANs are also subjected to all the security issues. In addition to these,
WLANs also have many more vulnerabilities that are associated with wireless connectivity and
prone to attacks. The nature of the wireless communicating medium makes it practically
impossible to confine the radio signals to an area that is controlled. These radiated signals are
subject to and effected by clandestine interception and exploitation.
If we take the case of a wired LAN, the attacker must physically connect some wires to the
network to gain access to the resources and such protection is not available for a WLAN. This is
because of remote access of any wireless networks. This implies that anyone using compatible
wireless equipment can potentially access the LAN.
To mitigate or to control these security concerns, encryption/decryption is used in an attempt to
make the signal unusable by unauthorized parties if any interception takes place. Any user wishes
to have a easy to use policy for a system and this became the primary concern for most
commercial products. Due to this, all the current 802.11 WLAN devices are bound by this
concern. This led to a default option of turning off the security features temporarily and this
creates a way for the attacker.
2. NEED FOR WIRELESS SECURITY
Wireless security has the top priority in prevention of unauthorized access or damage to
computers mainly using wireless networks. The most common systems of wireless security
currently working are WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access).
WEP is one among the least secure forms of security.
FBI has cracked a network which was secured using WEP in a span of 3 minutes. WEP is a very
old IEEE 802.11 standard available from 1999 which was outdated in 2003 by the entry of
WPA.WPA has overcome the drawbacks of WEP and has become an alternative to it quickly.
WPA2 is the present standard and is supportable only through upgraded firmware. Encryption is
the special feature of WPA2.
Many laptops have wireless cards pre-installed in them. Wireless networking is prone or
vulnerable to some security issues. Hackers have found wireless networks relatively easy to break
into, and even use wireless technology to hack into the wired networks also. Due to this, it has
become necessary for the enterprises to build a system that protects the network from
unauthorized access and such a system is WIPS (Wireless Intrusion Prevention System) or WIDS
(Wireless Intrusion Detection System).
The risks to users of the wireless devices have increased as the services have become much
popular. There were relatively few dangers when the introduction of wireless technology took
place. During the early stages of wireless, hackers have no way to get adapted to the technology
as the work place is mostly a wired environment. But currently, the ignorance and carelessness of
the users and the corporate brought many risks in security.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
69Â
Â
Hacking methods have become much more sophisticated and innovative with wireless. These
days hacking is an interesting concept for many as Linux and windows have brought some easy
while using methods in their systems without any charge.
2.1. Background
Anyone within the range of a geographical network of an open and unencrypted wireless network
can sniff or capture and record the traffic through which one can gain unauthorized access to
internal network resources as well as to the internet, and then can use the information and
resources to perform disruptive or illegal acts. These unauthorized accesses are the current main
issues for home networks and as well as for enterprises.
If router security is not active or if the owner simply deactivates it for his convenience, it creates a
free hotspot. Since most of the 21st-century laptops have built in wireless networking, a third part
adapter installation is not at all required. There is a default option through which we can enable
the built-in wireless networking without giving any indication to the owner. This makes
broadcasting, much easier, which connects all the nearby computers.
Internet Connection Sharing is a tool that makes an easy way to the users to setup a WLAN. This
feature is available in all the latest operating systems. If the user does not know about the setup
then it will become a way for the attacker to steal all the information through the base station
which makes the WLAN. It may even be without the knowledge of the intruders if their computer
automatically selects a nearby unsecured wireless network to be used as an access point.
All the user related features are made easy by the vendors and this brought the threat situation in
to the wireless environment.
2.2. The Threat Situation
Wireless security is one of the aspects of computer security. Rogue access points are the primary
cause for making the organizations prone to the attacks.
Vulnerabilities are common for any wireless network. For suppose, if a person working in an
organization has entered in to the network through an unsecured port then he has given the start to
crash the entire network. This also gives a key hole to drag all the sensitive and confidential
information present in the network.
Vulnerabilities can be eradicated through the counter measures which are effective. One of them
is to deactivate the unused ports within the network and later for using that port we can get some
authorization. Such countermeasures must be effectively implemented and any ignorance
damages the entire counter measure.
So, by undergoing the threats of wireless technology, we can understand the critical condition of
needing security to wireless networks. This need was in many minds which led to build security
features and new protocols for wireless networks like Bluetooth, Wi-Fi, etc.
4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
70Â
Â
The protocol in this paper is also about the security that a protocol can give to a wireless device if
used as an application or as a feature if added to the protocol architecture.
3. IMPLEMENTATION
3.1. Introduction to NS2
Every person interested in networking has to study the behavior of the network. The network
might be wired or wireless. This is the main job of a network simulator. The simulation carried
out here is a method which creates a hypothetical network environment and makes it functional to
study the network behavior. NS2 is among such simulation tools but it is not just another
simulator like others. It is used all around the world and is available at no cost. Although in initial
stages it make us feel like a hard bone but a little hard work, interest and guidance can make
anyone, a master of NS2 in a little span.
3.2. Installation of NS2
Linux/Unix based systems are the primary operating systems in which NS2 can be installed. It is
also available on Windows based systems which is used with the help of Cygwin. Installation on
Linux/Unix is almost same and no extra tool is required to run NS2, but for a Windows based
system, Cygwin software is needed in addition to a huge number of files. So if anyone has both
options to work on a Linux based or a Windows based system, it is advisable to go for Linux
based system.
NS2 comes with a set of protocols which are large in number and are used in different kind of
networks as well as different scenarios in real life. The current version used is version 2.3.5 which
comes with a total of 72 various protocols. Installation errors are frequent with many users and
are often solved by many developers from time to time. As and when the software is developed, it
gets validated for making it use for many interested ones who wanted to work with NS2.
3.3. NS2's Strength
NS2 lets researchers to simulate wired as well as wireless networks. Simulation can be done
through static as well as dynamic nodes in this simulator. It also lets users to monitor behavior of
a network. It gives the user an environment to create a new protocol and use it to the existing
codes. NS2 supports TCL and Object Oriented TCL for the simulation purpose. If implementation
is required then C++ code can be used along with TCL/OTCL.
3.4. Problem with NS2
Network Simulator-2 is an open source and very popular network simulation tool that provides
support for IP protocols suite and many standard routing protocols for wired and wireless
networks. Implementation of security on NS-2 is a necessary task in network simulation. NS2 has
no way to support security features unless some protocols are added. So, a new protocol is
designed in this project to give security features to NS2.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
71Â
Â
Here, a new protocol must be added and it should be provided with some functions related to
security functions like providing encryption and decryption. Such a work is mentioned in the
following sections of this paper.
4. ADDITION OF A NEW PROTOCOL TO NS2
4.1. Approach to NS2
NS-2 is one of the open source systems, which is created, executed and developed using C++ and
Tool Control Language (TCL). Any researcher hungry to add new features and components to
NS2 can easily add them.
The current latest version of the software is 2.35. A huge number of protocols are added in this
version. MAC layer protocols and application protocols are the special features of this version.
Routing protocols are also separately available as there are the cases of wired and wireless
networks. Any new protocol can also be added by any one and can adopt it into NS2.
Our current problem is security and so we focus on adding some security features in the form of
protocols to the software. In this project, we are adding a protocol to the Internet Protocol layer.
Data integrity, encryption and decryption are implemented on the packet by this protocol. We
consider our data as plain text.
The cryptography algorithm is CESAR cipher. The programming language is C++.
Environment development requirements:
- Personal Computer Windows XP professional and later.
- Cygwin UNIX Simulation
- NS-2 version 2.35
- C/C++ editor.
4.2. Algorithm To Add A Protocol to NS2:
For any procedure to be implemented, we need a set of steps. These steps define the algorithm for
the procedure. Similarly, for the protocol to be added we require a systematic set of steps. This
algorithm is the best way to add a protocol to NS2. All the steps must be performed in an orderly
manner and not doing so will bring errors in the procedure. The following are the steps followed
in protocol addition to NS2.
a) Create a new header file SP.h for the protocol.
b) Create SP.cc file which contains the required code to execute the protocol.
c) Add the protocol ID to the packet.h file of NS2.
d) Edit enum packet_t() and p_info() files of packet.h.
e) Add the default value of the protocol to ns-default.tcl file.
f) Add an entry for the new protocol packets in the file ns-packet.tcl.
g) Add the file SP.o to the list of object files for NS in makefile.in file.
h) Recompile NS2 software
6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
72Â
Â
5. LOGICAL DESIGN OF ENCRYPTION/DECRYPTION SYSTEM
Figure 1: Logical design of the encryption/decryption system
6. PROGRAM CODE
SP.h:
#ifndef ns_SP_h
#define ns_SP_h
#include "agent.h"
#include "tclcl.h"
#include "packet.h"
#include "address.h"
#include "ip.h"
struct hdr_SP {
char ret;
double send_time;
double rcv_time;
int seq;
char data[128];
7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
73Â
Â
unsigned int hashvalue;
// Header access methods
static int offset_;
inline static int& offset() { return offset_; }
inline static hdr_SP* access(const Packet* p) {
return (hdr_SP*) p->access(offset_);
}
};
class SPAgent : public Agent {
public:
SPAgent();
int seq;
int oneway;
virtual int command(int argc, const char*const* argv);
virtual void recv(Packet*, Handler*);
void encryption(char* out);
void decryption(char* out);
unsigned int hashing (char value[], unsigned int len);
};
#endif // ns_SP_h
SP.cc:
#include "SP.h"
#include "string.h"
int hdr_SP::offset_;
static class SPHeaderClass : public PacketHeaderClass {
public:
SPHeaderClass() :
8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
74Â
Â
PacketHeaderClass("PacketHeader/SP",sizeof(hdr_SP)) {
bind_offset(&hdr_SP::offset_);
}
} class_SPhdr;
static class SPClass : public TclClass {
public:
SPClass() : TclClass("Agent/SP") {}
TclObject* create(int, const char*const*) {
return (new SPAgent());
}
} class_SP;
SPAgent::SPAgent() : Agent(PT_SP), seq(0),
oneway(0)
{
bind("packetSize_", &size_);
}int SPAgent::command(int argc, const char*const* argv)
{
if (argc ==3)
{
if (strcmp(argv[1], "send") == 0)
{
Packet* pkt = allocpkt();
hdr_SP* hdr = hdr_SP::access(pkt);
hdr->ret = 0;
hdr->seq = seq++;
hdr->send_time = Scheduler::instance().clock();
strcpy(hdr->data, argv[2]);
9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
75Â
Â
hdr->hashvalue = hashing(hdr->data,(unsigned int)strlen(hdr->data));
printf("Sent message %s with hashing %dn",hdr->data,hdr->hashvalue);
// ---------- encrypt the data ---------------
encryption(hdr->data);
// Send the packet
send(pkt, 0);
return (TCL_OK);
}else if (strcmp(argv[1], "start-WL-brdcast") == 0)
{
Packet* pkt = allocpkt();
hdr_ip* iph = HDR_IP(pkt);
hdr_SP* ph = hdr_SP::access(pkt);
strcpy(ph->data, "test");
iph->daddr() = IP_BROADCAST;
iph->dport() = iph->sport();
ph->ret = 0;
send(pkt, (Handler*) 0);
return (TCL_OK);
} else if (strcmp(argv[1], "oneway") == 0) {
oneway=1;
return (TCL_OK);
}
}
return (Agent::command(argc, argv));
}
10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
76Â
Â
// -- CESAR encryption function ----------
void SPAgent::encryption(char out[])
{
int key =3;
int i=0;
for (i=0;i<strlen(out);i++)
{
out[i]=(out[i]+key)%128;
}
}
void SPAgent::decryption(char out[]){
int key =3;
int i=0;
for (i=0;i<strlen(out);i++){
out[i]=(out[i]-key)%128;
}
}
unsigned int SPAgent::hashing(char value[], unsigned int len){
char *word = value;
unsigned int ret = 0;
unsigned int i;
for(i=0; i < len; i++){
int mod = i % 32;
ret ^=(unsigned int) (word[i]) << mod;
ret ^=(unsigned int) (word[i]) >> (32 - mod);
}
return ret;
11. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
77Â
Â
}
void SPAgent::recv(Packet* pkt, Handler*){
hdr_ip* hdrip = hdr_ip::access(pkt);
hdr_SP* hdr = hdr_SP::access(pkt);
if ((u_int32_t)hdrip->daddr() == IP_BROADCAST){
if (hdr->ret == 0){
printf("Recv BRDCAST SP REQ : at %d.%d from %d.%dn", here_.addr_, here_.port_, hdrip-
>saddr(), hdrip->sport());
Packet::free(pkt);
Packet* pktret = allocpkt();
hdr_SP* hdrret = hdr_SP::access(pktret);
hdr_cmn* ch = HDR_CMN(pktret);
hdr_ip* ipret = hdr_ip::access(pktret);
hdrret->ret = 1;
ipret->daddr() = IP_BROADCAST;
ipret->dport() = ipret->sport();
send(pktret, 0);
}else
{
printf("Recv BRDCAST SP REPLY : at %d.%d from %d.%dn", here_.addr_,
here_.port_, hdrip->saddr(), hdrip->sport());
Packet::free(pkt);
}
return;
}
if (hdr->ret == 0){
double stime = hdr->send_time;
12. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
78Â
Â
char original_data[128];
char encrypted_data[128];
strcpy(encrypted_data,hdr->data);
strcpy(original_data,hdr->data);
int rcv_seq = hdr->seq;
char out[105];
unsigned int newhash;
char authenticate_result[50];
decryption(original_data);
newhash=hashing(original_data,strlen(original_data));
if(newhash==hdr->hashvalue){
printf("data intergity ensuredn");
strcpy(authenticate_result,"Message_Accepted");
}else
{
printf("data modified %dn",newhash);
strcpy(authenticate_result,"MESSAGE_ERRROR-Integrity violation");
}
sprintf(out, "%s recv %d %3.1f %s %s %d", name(), hdrip->src_.addr_ >>
Address::instance().NodeShift_[1],(Scheduler::instance().clock()-hdr-
>send_time)*1000,encrypted_data,
original_data,hdr->hashvalue);
Tcl& tcl = Tcl::instance();
tcl.eval(out);
// Discard the packet
Packet::free(pkt);
// Create a new packet
13. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
79Â
Â
Packet* pktret = allocpkt();
// Access the header for the new packet:
hdr_SP* hdrret = hdr_SP::access(pktret);
hdrret->ret = 1;
hdrret->send_time = stime;
hdrret->rcv_time = Scheduler::instance().clock();
hdrret->seq = rcv_seq;
strcpy(hdrret->data, authenticate_result);
send(pktret, 0);
}
else
{
char out[105];
sprintf(out, "%s recv %d %3.1f %s _ %d", name(), hdrip->src_.addr_ >>
Address::instance().NodeShift_[1],
(Scheduler::instance().clock()-hdr->send_time) * 1000, hdr->data, hdr->hashvalue);
Tcl& tcl = Tcl::instance();
tcl.eval(out);
// Discard the packet
Packet::free(pkt);
}
}
The tcl file can be created as per our own imagination of the wireless scenario using NS2. But the
coding must be done including the SP protocol agent in it.
Tcl file is very important because it is the only way to bring our idea of network environment to
reality. To study a network, we first need to create a scenario that defines the network and this is
fulfilled through the tcl script.
14. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
80Â
Â
7. DEMONSTRATION & RESULTS
For the demonstration to be carried out, we need a scenario consisting of four wireless nodes.
Node 0, 1 will send message to node 2 and 3 respectively and from node 2 and 3 back to node 0
and 1.An acknowledgement will be assumed by each sender node from the receiver node. This
scenario is created using the TCL language. We use a script file to arbitrarily send the message.
The following figures are the proofs to the demonstration. The first figure shows the message
transfer from node 0 to node 2. The second figure shows the message transfer from node 1 to
node 3. The third figure consists of the generated output. It shows the message transmitted and
hash value being used in the transfer. Data integrity is also assured in the third figure.
Figure 2: Message being sent from node 0 to node 2
15. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
81Â
Â
Figure 3: Message transfer from node 1 to node 3
Figure 4: Data Encrypted, Decrypted and Ensured
16. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
82Â
Â
8. CONCLUSIONS
Security in wireless networks can be assured if security protocols are being constructed and
implemented on the network. NS2 is providing an environment to check such protocols and there
are other software too for such protocol checks. SP protocol provides the security by encrypting
the message and prevents the attackers from being attacked. The default key used for CEASAR
cipher here is 3 and it can be increased to provide some complexity for the hackers. Not just
CEASER cipher, the algorithms can be many to provide encryption like DES, 3DES, EAS,
Blowfish etc.
Bluetooth devices can be secured using this protocol, This is because itâs the data thatâs being
encrypted here but not the pairing key(which is already provided by Bluetooth). Bluetooth
implementation can also be checked by replacing the nodes here with the devices. Though there
are many protocols or algorithms are made, they might get hacked and the data can be captured.
So, maintaining and altering the codes and increasing the complexity in the encryption provide
better security.
Finally, providing security is not just based on the protocols being used but the user must also be
cautious from getting attacked. This is because as there are many ways to protect your network
same as there are ways to break the security. This is possible only if the user gives some lead to
the hacker by getting attracted to his tricks. So, security protocols are safe, strong and secure until
and unless the algorithms being used in them are cracked.
ACKNOWLEDGEMENTS
It is my utmost duty and desire to express acknowledgement to the various torch bearers, who
have rendered valuable guidance during the preparation of my paper.
Firstly, I would like to thank Prof. R. K. Kapur, Dy. Director & Head, AITTM, AUUP for his
inspiring support to our academic efforts.
It is a great pleasure for me to acknowledge my profound sense of gratitude to my guide Mrs.
Neha Arora, Assistant Professor, AITTM for her valuable and inspiring guidance, comments,
suggestions and encouragement throughout this paper.
I am grateful to my beloved Lt. Gen. P D Bhargava, Group Dy. Vice Chancellor, AUUP &
Advisor, AITTM for providing me a platform in the form of this great institution to showcase my
talent.
Finally, I sincerely thank all those who have helped me in the endeavor of completing this paper.
I should also like to thank entire fellow colleagues who really helped me directly or indirectly,
whenever needed.
And my deepest thanks to my parents who, have constantly encouraged fulfilling a part of my
goal completely and successfully.
17. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.3, May 2013
83Â
Â
REFERENCES
[1] http://sce.uhcl.edu/transa/Sourcecode/NS-2_Security_Node_Document.doc
[2] http://www.isi.edu/nsnam/ns/tutorial/index.html
[3] http://wn.com/Edimax_ADSL_Modem_Router__Setup_WPA_Wireless_Security
[4] http://wn.com/Edimax_Broadband_router__Setup_WPA_Wireless_Security
[5] http://en.wikipedia.org/wiki/Wireless_security
[6] Behrouz A. Forouzan & Debdeep Mukhopadhyay (2008) âCryptography and Network Securityâ,
Second Edition, Tata McGraw Hill Education Private Limited.
Authors
Iâm Udaragudi Pavan Kumar, born on 28th
of April,1991.Iâm currently persuing M.Tech
in Telecommunication Systems Eng. Of batch 2012-2014. Iâm interested in networking
which made me to do this paper.