scholarly journals Self-Adaptive Framework for Rectification and Detection of Black Hole and Wormhole Attacks in 6LoWPAN

2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
T. Kamaleshwar ◽  
R. Lakshminarayanan ◽  
Yuvaraja Teekaraman ◽  
Ramya Kuppusamy ◽  
Arun Radhakrishnan

Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datagram that enters the attacked region will end result in transmission failure with low flow network rate and excessive one-way delay. To come across and heal the attack, a self-adaptive framework is brought into the networks and the procedure of data transmission is enriched. In this work, the affected region is measured and rectified with the aid of using the proposed self-adaptive framework for Ad Hoc On-Demand Distance Vector (AODV) routing protocol network communication protocol. The overall performance of the network healing technique is investigated with the aid of using simulation and its miles diagnosed that the proposed framework suggests promising overall performance with the aid of using accomplishing excessive flow network rate and minimum delay.

2012 ◽  
Vol 580 ◽  
pp. 151-154
Author(s):  
Yong Cheng Xie ◽  
Fang Jun He ◽  
Guang Sheng Li ◽  
Ning Wei

The SAE J1939 is a typical CAN bus network communication protocol of integrated electronic system of armored vehicles, which adopts the PDU as a data transmission unit. The agreement can quickly parse out the meaning of the received data to according to data definition; The fault code is used to transfer fault diagnosis information while the SAE J1939 is employed, from which equipment faults can be easily obtained. In this paper, the protocol is described and applied to fault diagnosis application of the engine electronic control box in the armored vehicle. The results proved the protocol is reliable and effective.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402098885
Author(s):  
Kuan-Jui Huang ◽  
Kuo-Huie Chiang

Organizations suffer more than ever from the inability to securely manage the information system, despite their myriad efforts. By introducing a real cyberattack of a bank, this research analyzes the characteristics of modern cyberattacks and simulates the dynamic propagation that makes them difficult to manage. It develops a self-adaptive framework that through simulation, distinctly improves cyberdefense efficiency. The results illustrate the discrepancies of the previous studies and validate the use of a time-based self-adaptive model for cybersecurity management. The results further show the significance of human and organizational learning effects and a coordination mechanism in obtaining a highly dependable cyberdefense setting. This study also provides an illuminating analysis for humans to position themselves in the collaborations with increasingly intelligent agents in the future.


2013 ◽  
Vol 427-429 ◽  
pp. 1268-1271
Author(s):  
Xue Wen He ◽  
Ying Fei Sheng ◽  
Kuan Gang Fan ◽  
Le Ping Zheng ◽  
Qing Mei Cao

In view of the existing flaws of traditional manual observations, a new type of tailing reservoir safety monitoring and warning system based on ZigBee and LabVIEW was designed. The system chose SoC chip CC2530 as the RF transceiver and designed the low-power wireless sensor networks nodes to collect and process the data of tailing reservoir. It chose ZigBee 2007 as the network communication protocol, and uploaded the data to PC by RS232 serial port. The monitoring and warning interface of PC was completed with LabVIEW. The testing results show that the data transmission of the network is stable and the system is suitable for real-time monitoring and warning of the tungsten tailing reservoir.


2014 ◽  
Vol 565 ◽  
pp. 179-182 ◽  
Author(s):  
Yue Tao Ge ◽  
Xiao Ming Liu ◽  
Xiao Tong Yin

In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm (TEA) encryption and decryption algorithm is studied in this paper and the properties of TEA are analyzed. According to communication protocol of remoter, encryption and decryption program process are designed. Because of TEA encryption, remoter transmitter and receiver can communicate strongly in the public communication network.


Sign in / Sign up

Export Citation Format

Share Document