Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN

2018 ◽  
Vol 12 (2) ◽  
pp. 26-37
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and fast authentication protocol have been proposed to reduce the response time, computation overhead during encryption/decryption process of the routing messages. Further various simulations with erratic nodes have been conducted to endorse the enhancement of proposed solution against existing protocols. Moreover, performance comparison between existing and proposed schemes have been analyzed in detail showing that proposed approach has achieved better outcome against convinced consequences.

2018 ◽  
Vol 12 (1) ◽  
pp. 42-52 ◽  
Author(s):  
Geetanjali Rathee ◽  
Hemraj Saini

Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant delay may enhance the possibility of several security threats. A number of authentication protocols have been proposed in the literature but if existing practices are deliberated then to optimize one of the constraint other parameters are affected radically. In this manuscript, a Diffie-Hellman elliptic curve technique is used over WMN which reduces latency and computational overhead issues. Further to prove the integrity of proposed work, the performance is measured theoretically and analyzed experimentally over ns2 simulator.


Author(s):  
Faried Effendy ◽  
Taufik ◽  
Bramantyo Adhilaksono

: Substantial research has been conducted to compare web servers or to compare databases, but very limited research combines the two. Node.js and Golang (Go) are popular platforms for both web and mobile application back-ends, whereas MySQL and Go are among the best open source databases with different characters. Using MySQL and MongoDB as databases, this study aims to compare the performance of Go and Node.js as web applications back-end regarding response time, CPU utilization, and memory usage. To simulate the actual web server workload, the flow of data traffic on the server follows the Poisson distribution. The result shows that the combination of Go and MySQL is superior in CPU utilization and memory usage, while the Node.js and MySQL combination is superior in response time.


2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


2020 ◽  
Vol 12 (1) ◽  
Author(s):  
Nida Nurvira ◽  
Anggun Fitrian Isnawati ◽  
Achmad Rizal Danisya

Increasing user requirements for LTE networks, data traffic from eNodeB to core network is also increases, therefore, the recommended solution for meeting this high data traffic is to use a backhaul network design. Backhaul is the path or network used to connect eNodeB with the core network. In this research, backhaul technology used is wi-fi 802.11ac backhaul and microwave backhaul. In this study begins by collecting existing data, then perform capacity calculations to find out the number of eNodeB needed and to find out the capacity of the backhaul links to be designed, then determine the antenna height to achieve LOS conditions, then calculate the desired performance standards and calculate the backhaul network link budget on microwave and wi-fi technologies. Based on the calculation results in terms of capacity, the total user target is 90,167 users and has a throughput capacity per eNodeB of 61 Mbps. In the link-capacity calculation, the total link capacity is 427 Mbps. From the simulation results that using microwave technology, the average RSL value is -30.90 dBm, the value meets the -57 dBm threshold standard and the value of availability does not meet the standard of 99.999% because the average value obtained is 99.998095%. Whereas for wi-fi technology, the average RSL value is -39.24 dBm and meet the -72 dBm threshold standard, for the average availability value meets 99.999% standard, with a value of 100%. From the results of the two technologies, can be conclude that the wi-fi technology is more suitable for the use of backhaul network design in Ciputat Sub-district.


2021 ◽  
Vol 6 (9 (114)) ◽  
pp. 6-14
Author(s):  
Shaymaa Kadhim Mohsin ◽  
Maysoon A. Mohammed ◽  
Helaa Mohammed Yassien

Bluetooth uses 2.4 GHz in ISM (industrial, scientific, and medical) band, which it shares with other wireless operating system technologies like ZigBee and WLAN. The Bluetooth core design comprises a low-energy version of a low-rate wireless personal area network and supports point-to-point or point-to-multipoint connections. The aim of the study is to develop a Bluetooth mesh flooding and to estimate packet delivery ratio in wireless sensor networks to model asynchronous transmissions including a visual representation of a mesh network, node-related statistics, and a packet delivery ratio (PDR). This work provides a platform for Bluetooth networking by analyzing the flooding of the network layers and configuring the architecture of a multi-node Bluetooth mesh. Five simulation scenarios have been presented to evaluate the network flooding performance. These scenarios have been performed over an area of 200×200 meters including 81 randomly distributed nodes including different Relay/End node configurations and source-destination linking between nodes. The results indicate that the proposed approach can create a pathway between the source node and destination node within a mesh network of randomly distributed End and Relay nodes using MATLAB environment. The results include probability calculation of getting a linking between two nodes based on Monte Carlo method, which was 88.7428 %, while the Average-hop-count linking between these nodes was 8. Based on the conducted survey, this is the first study to examine and demonstrate Bluetooth mesh flooding and estimate packet delivery ratio in wireless sensor networks


2021 ◽  
Author(s):  
Khushal Singh ◽  
Nanhay Singh

Abstract Internet of Things (IoT) is the domain of interest for the researchers at the present with the exponential growth in technology. Security in IoT is a prime factor, which highlights the need for authentication to tackle various attackers and hackers. Authentication is the process that uniquely identifies the incoming user and this paper develops an authentication protocol based on the chebyshev polynomial, hashing function, session password, and Encryption. The proposed authentication protocol is named as, proposed Elliptic, chebyshev, Session password, and Hash function (ECSH)-based multilevel authentication. For authenticating the incoming user, there are two phases, registration and authentication. In the registration phase, the user is registered with the server and Authentication center (AC), and the authentication follows, which is an eight-step criterion. The authentication is duly based on the scale factor of the user and server, session password, and verification messages. The authentication at the eight levels assures the security against various types of attacks and renders secure communication in IoT with minimal communication overhead and packet-loss. The performance of the method is analyzed using black-hole and Denial-of-service (DOS) attacks with 50 and 100 nodes in the simulation environment. The proposed ECSH-based multilevel authentication acquired the maximal detection rate, PDR, and QOS of 15.2%, 35.7895%, and 26.4623%, respectively in the presence of 50 nodes and DOS attacks, whereas the minimal delay of 135.922 ms is acquired in the presence of 100 nodes and DOS attacks.


Author(s):  
Y-M Han ◽  
K-G Sung ◽  
J W Sohn ◽  
S-B Choi

This article presents a control performance comparison of electrorheological (ER) fluid-based valves between cylindrical and plate configurations. After identifying Bingham characteristics of chemical starch-based ER fluid, an analytical model of each valve is established. In order to reasonably compare valve performance, design constraint is imposed by the choosing the same electrode gap and length, and each ER valve is manufactured. Valve performances such as pressure drop and response time are then evaluated and compared through analytical model and experiment. In addition, a time-varying pressure tracking controllability of each ER valve is experimentally realized.


2022 ◽  
Vol 18 (2) ◽  
pp. 1-23
Author(s):  
Junyang Shi ◽  
Xingjian Chen ◽  
Mo Sha

IEEE 802.15.4-based wireless sensor-actuator networks have been widely adopted by process industries in recent years because of their significant role in improving industrial efficiency and reducing operating costs. Today, industrial wireless sensor-actuator networks are becoming tremendously larger and more complex than before. However, a large, complex mesh network is hard to manage and inelastic to change once the network is deployed. In addition, flooding-based time synchronization and information dissemination introduce significant communication overhead to the network. More importantly, the deliveries of urgent and critical information such as emergency alarms suffer long delays, because those messages must go through the hop-by-hop transport. A promising solution to overcome those limitations is to enable the direct messaging from a long-range radio to an IEEE 802.15.4 radio. Then messages can be delivered to all field devices in a single-hop fashion. This article presents our study on enabling the cross-technology communication from LoRa to ZigBee using the energy emission of the LoRa radio as the carrier to deliver information. Experimental results show that our cross-technology communication approach provides reliable communication from LoRa to ZigBee with the throughput of up to 576.80 bps and the bit error rate of up to 5.23% in the 2.4 GHz band.


Author(s):  
Sasikala Chinthakunta ◽  
Shoba Bindu Chigarapalle ◽  
Sudheer Kumar E.

Typically, the analysis of the industrial big data is done at the cloud. If the technology of IIoT is relying on cloud, data from the billions of internet-connected devices are voluminous and demand to be processed within the cloud DCs. Most of the IoT infrastructures—smart driving and car parking systems, smart vehicular traffic management systems, and smart grids—are observed to demand low-latency, real-time services from the service providers. Since cloud includes data storage, processing, and computation only within DCs, huge data traffic generated from the IoT devices probably experience a network bottleneck, high service latency, and poor quality of service (QoS). Hence, the placement of an intermediary node that can perform tasks efficiently and effectively is an unavoidable requirement of IIoT. Fog can be such an intermediary node because of its ability and location to perform tasks at the premise of an industry in a timely manner. This chapter discusses challenges, need, and framework of fog computing, security issues, and solutions of fog computing for IIoT.


Sign in / Sign up

Export Citation Format

Share Document