scholarly journals Performance Analysis of a Selective Encryption Algorithm for Securing Text data Over Mobile Ad hoc Networks

In recent era security is very much desired for the messages transmitted through the network. The study shows that, even though many approaches have been proposed towards security till date, still the security loopholes also emerging, so constant advancement is crucial for data security. Since all nodes in the network work together as a team to transmit the data, the network may prone to active or passive attacks such as Eavesdropping, Jamming, traffic analysis, Denial of Service, monitoring etc. The research paper introduces a new selective encryption method termed as Selective Significant Data Encryption (SSDE). The SSDE presents adequate protection to the data encryption process by picking up only the significant content from the complete message by referring Natural Language Processing (NLP). As a result, the encryption time overhead will get reduced, and overall performance will improve. Symmetric key algorithms are generally proficient and quick cryptosystem compared to other techniques, so Blowfish system is used for encryption/decryption process. The proposed research work is compared with many conventional methods and found that this approach is more superior to other traditional means.

2021 ◽  
Vol 54 (2) ◽  
pp. 1-37
Author(s):  
Dhivya Chandrasekaran ◽  
Vijay Mago

Estimating the semantic similarity between text data is one of the challenging and open research problems in the field of Natural Language Processing (NLP). The versatility of natural language makes it difficult to define rule-based methods for determining semantic similarity measures. To address this issue, various semantic similarity methods have been proposed over the years. This survey article traces the evolution of such methods beginning from traditional NLP techniques such as kernel-based methods to the most recent research work on transformer-based models, categorizing them based on their underlying principles as knowledge-based, corpus-based, deep neural network–based methods, and hybrid methods. Discussing the strengths and weaknesses of each method, this survey provides a comprehensive view of existing systems in place for new researchers to experiment and develop innovative ideas to address the issue of semantic similarity.


2015 ◽  
Vol 4 (2) ◽  
pp. 390 ◽  
Author(s):  
Alaa Zain ◽  
Heba El-khobby ◽  
Hatem M. Abd Elkader ◽  
Mostafa Abdelnaby

A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


Author(s):  
Ghassen Ben Brahim ◽  
Nazeeruddin Mohammad ◽  
Wassim El-Hajj ◽  
Gerard Parr ◽  
Bryan Scotney

AbstractA critical requirement in Mobile Ad Hoc Networks (MANETs) is its ability to automatically discover existing services as well as their locations. Several solutions have been proposed in various communication domains which could be classified into two categories: (1) directory based, and (2) directory-less. The former is efficient but suffers from the amount of control messages being exchanged to maintain all directories in an agile environment. However, the latter approach attempts to reduce the amount of control messages to update directories, by simply sending broadcast messages to discover services; which is also a non-desirable approach in MANETs. This research work builds on top of our prior work (Nazeeruddin et al. in IFIP/IEEE international conference on management of multimedia networks and services, Springer, Berlin, 2006)) where we introduced a new efficient protocol for service discovery in MANETs (MSLD); a lightweight, robust, scalable, and flexible protocol which supports node heterogeneity and dynamically adapts to network changes while not flooding the network with extra protocol messages—a major challenge in today’s network environments, such as Internet of Things (IoT). Extensive simulations study was conducted on MSLD to: (1) initially evaluate its performance in terms of latency, service availability, and overhead messages, then (2) compare its performance to Dir-Based, Dir-less, and PDP protocols under various network conditions. For most performance metrics, simulation results show that MSLD outperforms Dir-Based, Dir-less, and PDP by either matching or achieving high service availability, low service discovery latency, and considerably less communication overhead.


2021 ◽  
Vol 9 (1) ◽  
pp. 191-197
Author(s):  
Omar Faruque, Tadiwa Elisha Nyamasvisva, Abdullahi Mujaheed Saleh, Hasliza Binti Hashim

Wireless technology has brought a very advanced change in the field of the internet. It has given rise to many new applications. In recent years, a lot of work has been done in the field of Mobile Ad hoc Networks (MANET) which makes it so popular in the area of research work. MANET is an infrastructure-less, dynamic network that consists of a collection of wireless mobile nodes, and the communication between these nodes has been carried out without any centralized authority. There are several network performance metrics, Packet Loss and End-to-End Delay which can be taken into account, for getting a general idea about the performance of the Geographical Routing Protocol in Mobile Ad-Hoc Networks. The proposed research will evaluate the parameters which affect the communication in the Geographical Routing Protocol in Mobile Ad-Hoc Networks.


Author(s):  
S. Srinivasan ◽  
S. P. Alampalayam

Mobile ad hoc networks (MANET) present the opportunity to connect transient nodes to the internet without having central control. This very design supports new nodes to join and leave the network based on their proximity to the MANET. Concurrently, it creates many security challenges for authenticating nodes that are not present in a traditional wired network. Much of the existing work on MANET security has focused on routing and mobility. In this paper, the authors present an algorithm that considers the neighboring nodes’ status to determine if a particular node is malicious or not. The authors used NS2 simulation tool to test the algorithm and present the results in the paper. The major benefits of this research work are in military applications.


Author(s):  
Prabhakar Rontala Subramaniam

An attempt in implementing on-demand, QoS supported Vehicular Ad hoc Network (VANET) routing algorithms has taken new dimensions. Delivering information in time to achieve reliability across vehicles (nodes) is still being a challenge among the VANET research groups. An effort to develop a QoS adaptive routing schemes using soft computing techniques is made in this research work. SADVA – An adaptive fuzzy based QoS service oriented approach for VANET is presented in this paper. The performance of SADVA is compared with AODV (Perkins, Royer, & Das, 2003), GV-GRID (Li, & Yu, 2007), DSR (Johnson, Maltz, & Hu, 2004), FSR (Gerla, 2002), DYMO (Chakeres, & Perkins, 2006), REDEM (Prabhakar, Sivanandham, & Arunkumar, 2011b), and QARS (Prabhakar et al, 2011a). SADVA employs fuzzy logic system to determine the vehicle's speed over an effective time period for different types of service in use between multiple VANET nodes to engage or cooperate in communication. This chapter focuses on designing and developing QoS aware routing protocol for multi-hop VANET. Metrics such as number of packets received per second, percentage of packet loss and time for route establishment are used to analyse the network situation. Simulation test runs are carried out using Two Ray Ground propagation model where vehicular traffic is generated according to a Poisson process.


Sign in / Sign up

Export Citation Format

Share Document