Journal articles on the topic 'FLOODING CONTROL PROTOCOL'

To see the other types of publications on this topic, follow the link: FLOODING CONTROL PROTOCOL.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'FLOODING CONTROL PROTOCOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (September 16, 2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads, end-to-end delay, and average per-hop one-way delay in comparison to the BLE mesh (flooding) protocol and AODV protocol for all three scenarios (linear topology with ten nodes, multipath topology with six and ten nodes). In addition, the proposed protocol exhibited practically constant route requests and route reply setup times. Furthermore, the proposed protocol demonstrated a better Packet Delivery Ratio (PDR) for O-AODV (84%) in comparison to AODV (71%), but lower than the PDR of the mesh (flooding) protocol with 93%.
APA, Harvard, Vancouver, ISO, and other styles
2

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Full text
Abstract:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results, NC-Flooding protocol reduces the number of broadcasts of wireless sensor networks, increases the throughput of the network and increases the bandwidth utilization. We conclude that NC-Flooding protocol reduces data forwarding cost and node energy consumption and extends nodes’ life cycle, thus increasing network utilization.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (December 20, 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Full text
Abstract:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper, an effective data aggregation approach is designed. We have designed a priority-based data aggregation control protocol, which considers token bucket, Lempel–Ziv–Welch (LZW) compression and a hybrid of ant colony optimization and particle swarm optimization-based soft computing approach. Extensive experiments reveal that the presented protocol provides better network lifetime in contrast to the existing energy efficient protocols.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Full text
Abstract:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between nodes in a hop by hop. To mitigate the effect of the inherent void problem, the authors consider residual energy, link quality, and distance from destination node to choose a reliable path to forward packet to destination. The authors observe that RRP protocol has better performance in terms of the packet delivery ratio than the DFR protocol due to the void avoidance technique.
APA, Harvard, Vancouver, ISO, and other styles
6

Prabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (December 15, 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Full text
Abstract:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
APA, Harvard, Vancouver, ISO, and other styles
7

Shams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Full text
Abstract:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. Besides, the control overhead is further reduced by restricting the domain of control packet flooding (by restricting the domain of control packet flooding). The performance evaluation shows that the proposed scheme increases the packet delivery rate by up to 40%, while reducing average end-to-end delay and consumed power by about 35% and 45%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prove that AMBR is a sound and robust protocol in terms of flooding, routing overhead and hence, enhances reliability
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Full text
Abstract:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of each LLDP frame to determine whether a topology discovery via man-in-the-middle attack exists. This study also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using topology discovery via injection attack to generate fake links and topology discovery via flooding attack to cause network routing or switching abnormalities.
APA, Harvard, Vancouver, ISO, and other styles
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (June 16, 2022): 6150. http://dx.doi.org/10.3390/app12126150.

Full text
Abstract:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DDoS) attacks. Therefore, this paper proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing an ensemble feature selection technique that utilizes chi-square and information gain ratio methods to select significant features for attack detection with high accuracy. In addition, a long short-term memory (LSTM) is employed to train the detection model on the selected features. The proposed approach was evaluated using a synthetic dataset for false-positive rate (FPR), detection accuracy, F-measure, recall, and precision, achieving 0.55%, 98.41%, 98.39%, 97.3%, and 99.4%, respectively. Additionally, the results reveal that the proposed approach outperforms the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
11

Tung, Yung-Hao, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, and Chia-Mu Yu. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8 (August 1, 2020): 1239. http://dx.doi.org/10.3390/electronics9081239.

Full text
Abstract:
Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.
APA, Harvard, Vancouver, ISO, and other styles
12

Tun, Thazin. "A Forensics Analysis of ICMP Flooded DDoS Attack using WireShark." Transactions on Networks and Communications 8, no. 3 (June 30, 2020): 08–15. http://dx.doi.org/10.14738/tnc.83.8250.

Full text
Abstract:
The usage of Denial of Service (DoS) and Distributed Denial of Service (DDoS) packets by the assailant may change and dependent on various sorts of administrations and protocols. A flooding DDoS attack depends on an immense volume of assault traffic which is named as a Flooding based DDoS packet. Flooding-based DDoS packet endeavors to block the injured individual's system transfer speed with genuine-looking however undesirable IP information. Because of which Legitimate IP packets can’t arrive at the unfortunate casualty in view of the absence of data transfer capacity asset. Internet Control Message Protocol (ICMP) Flood started by sending countless ICMP packets to a remote host. Thus, the deceived framework's assets will be devoured by taking care of the assaulting packets, which in the long run makes the framework be inaccessible by different customers. In this paper, we distinguish of ICMP Flood DDoS packet by utilizing WireShark.
APA, Harvard, Vancouver, ISO, and other styles
13

Pai H., Aditya, Khalid K. Almuzaini, Liaqat Ali, Ashir Javeed, Bhasker Pant, Piyush Kumar Pareek, and Reynah Akwafo. "Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness." Wireless Communications and Mobile Computing 2022 (April 4, 2022): 1–12. http://dx.doi.org/10.1155/2022/5256133.

Full text
Abstract:
During data transmission, a decentralised Mobile Ad Hoc Network (MANET) might result in high Energy Consumption (EC) and a short Network Lifetime (NLife). To address these difficulties, an on-demand Power and Load-Aware multipath node-disjoint source routing is presented based on the Enhanced Opportunistic Routing (PLAEOR) protocol. This unique protocol aims at using power, load, and latency to manage routing costs depending on control packet flooding from the destination node. However, the exchange of control packets from the target to all nodes may impact network efficiency. As a result, the PLAEOR is designed with a Multichannel Cooperative Neighbor Discovery (MCND) protocol to locate the nearby cooperative nodes for each node in the routing path during control packet transmission. Furthermore, when the packet rate of CBR is 20 packets/sec, the simulated results show that the PLAEOR-MCND achieves 120 sec of NLife and 20 J of EC than the state-of-the-art protocols.
APA, Harvard, Vancouver, ISO, and other styles
14

Onyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin, and Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks." Sustainability 14, no. 19 (September 22, 2022): 11950. http://dx.doi.org/10.3390/su141911950.

Full text
Abstract:
Owing to the latest advancements in networking devices and functionalities, there is a need to build future intelligent networks that provide intellectualization, activation, and customization. Software-defined networks (SDN) are one of the latest and most trusted technologies that provide a method of network management that provides network virtualization. Although traditional networks still have a strong presence in the industry, software-defined networks have begun to replace them at faster rates. When network technologies emerge at a steady rate, SDN will be implemented at higher rates in the upcoming years in all fields. Although SDN technology removes the complexity of tying control and data plane together over traditional networks, certain aspects such as security, controllability, and economy of network resources are vulnerable. Among these aspects, security is one of the main concerns that are to be viewed seriously as far as the applications of SDN are concerned. This paper presents the most recent security issues SDN environment followed by preventive mechanisms. This study focuses on Internet control message protocol (ICMP) attacks in SDN networks. This study proposes a security policy protocol (SPP) to detect attacks that target devices such as switches and the SDN controller in the SDN networks. The mechanism is based on ICMP attacks, which are the main source of flooding attacks in the SDN networks. The proposed model focuses on two aspects: security policy process verification and client authentication verification. Experimental results shows that the proposed model can effectively defend against flooding attacks in SDN network environments.
APA, Harvard, Vancouver, ISO, and other styles
15

Nam, Youngju, Hyunseok Choi, Yongje Shin, Soochang Park, and Euisin Lee. "Expected Area-Based Real-Time Routing Protocol for Supporting Mobile Sinks in Wireless Sensor Networks." Electronics 11, no. 20 (October 17, 2022): 3350. http://dx.doi.org/10.3390/electronics11203350.

Full text
Abstract:
To deliver real-time data within a desired time deadline, a spatiotemporal approach has been proposed in wireless sensor networks. In the approach, real-time data can be delivered with a delivery speed calculated by both the distance from a source to a static sink and the desired time deadline. In the case of a mobile sink, because the distance from a source to the sink would be dynamically changed due to its movement, real-time data cannot be delivered due to the inability to calculate a delivery speed. Thus, we propose a novel real-time routing protocol, called EAR2 (expected area-based real-time routing) for mobile sinks. Instead of the immediate distance, EAR2 considers the static distance to the expected area of a mobile sink’s location using its movement speed. To satisfy the desired time deadline, EAR2 guarantees that the total summation of the unicasting time to the expected area and the flooding time within the expected area can be smaller than the deadline. To do this, EAR2 calculates a data delivery speed by using the static distance and the unicasting time and exploits the flooding time observed from various network environments. Because EAR2 has a high flooding time and data loss problems due to a single flooding point, we propose a protocol called EAR2M with multiple flooding points, which reduces the flooding time and enhances the reliability of data transmission. We also propose two extensions of EAR2M, called EAR2M_R and EAR2M_E for efficient data transmission from a source to multiple flooding points. They aim to reduce the transmission delay and the energy consumption for efficient data transmission among multiple flooding points, respectively. Simulation results show that EAR2 improves the deadline miss ratio and the energy consumption, with averages improvements of 47.17% and 29.99% over the existing schemes, respectively. Furthermore, EAR2M with four flooding points enhances the deadline miss ratio and the energy consumption by an average of 12.69% and 131.86% over EAR2.
APA, Harvard, Vancouver, ISO, and other styles
16

Singh, Jaspreet, Gurpreet Singh, Deepali Gupta, Ghulam Muhammad, and Ali Nauman. "OCI-OLSR: An Optimized Control Interval-Optimized Link State Routing-Based Efficient Routing Mechanism for Ad-Hoc Networks." Processes 11, no. 5 (May 8, 2023): 1419. http://dx.doi.org/10.3390/pr11051419.

Full text
Abstract:
MANET (Mobile Ad hoc Networks) functionality is determined by routing protocols’ ability to adjust to atypical changes in information and communication technologies, topological systems, and connection status. Due to interference, node migration, the growth of several pathways, security, and propagation loss, MANET network configurations are dynamic. The proactive routing protocol enhances the message flow utilized in the neighborhood discovery process by using the multipoint relays (MPR) approach. In order to increase the protocol’s effectiveness and efficiency while maintaining the OLSR protocol’s reliability, the research presented in this paper proposed an improved OCI-OLSR (Optimized Control Interval-Optimized Link State Routing) that focuses on better control interval management, an advanced MPR selection process, reducing neighbor hold time as well as decreasing flooding. The suggested proposed protocol was examined using the NS3 simulator, and it was compared to the standard OLSR version and AODV(Ad-hoc On-Demand Routing) routing protocol. According to the analysis’s findings, the suggested system has a lot of promise in terms of a variety of performance metrics under diverse conditions. Overall, the article makes the case that the OCI-OLSR protocol may enhance the performance of the regular OLSR protocol in wireless ad hoc networks by addressing a number of the protocol’s flaws.
APA, Harvard, Vancouver, ISO, and other styles
17

Jing, Chun Guo, and Jun Wei Wang. "Simulation of Street Light Pole Controller Routing with OMNeT++." Applied Mechanics and Materials 401-403 (September 2013): 1976–80. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1976.

Full text
Abstract:
In street lighting system, the light pole controllers were used to monitoring and control each street light. The controller nodes were installed at each lighting pole and make up a network with RTUs. In this paper, a randomly forwarding routing strategy was proposed based on the controller network features. The controller nodes were divided many clusters according to the substation power scope. In one cluster, the controller nodes topology is mainly star structure. When a controller node received a packet, it randomly delays a period of time and decides forwarding packet instead of immediately forwarding. The decision is based on the packet propagation direction and other nodes whether sending or not. The randomly forwarding routing protocol were simulated in OMNeT++ environment and compared with the flooding protocol. The results show that the delay of proposed protocol is lower than that of flooding. The proposed protocol also has some special features such as simple, not need to maintain net topology and complex path discovery algorithms.
APA, Harvard, Vancouver, ISO, and other styles
18

Baba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.

Full text
Abstract:
Mobile Ad-Hoc Networks are infrastructure-less wireless communication technology that interconnects mobile devices such as phones, laptops, and smart devices including providing flexibility, seamless communication and mobility to all devices forming the network. MANET suffers security lapses due to the absence of central control infrastructure to monitor and control the devices that joins the network. These security lapses in MANET discourage it and makes it vulnerable to attacks such as denial of service attacks. Amongst various attacks prevalent on MANET environment, packet flooding is a common attack and causes a devastating effect on MANET nodes which if left undetected may lead to consequent crashing of the entire network. There is need to secure data and be kept confidential. In this paper, the separation of trusted nodes from malicious nodes and to protect the data packet from attackers is to be taken as research goal. Therefore, a highly secured Hybrid Trust-based Anonymous Authenticated Routing Protocol (HTBAARP) to mitigate flooding attacks is to be developed to avoid unauthorized access and to detect malicious nodes. This will be achieved by integrating a Modified Authenticated Anonymous Routing Protocol (MAASR) to a Trusted Management Scheme (TMS). Simulation will be done using NS-2 in conjunction with MATLAB R2020a to evaluate performance. The proposed solution is expected to improve throughput, packet delivery ratio and, reduces routing delay and routing overhead in the network. Keywords: Anonymous, Flooding, Hybrid protocol, MANET, Malicious nodes, Routing
APA, Harvard, Vancouver, ISO, and other styles
19

Prabhavat, Sumet, Worrawat Narongkhachavana, Thananop Thongthavorn, and Chanakan Phankaew. "Low Overhead Localized Routing in Mobile Ad Hoc Networks." Wireless Communications and Mobile Computing 2019 (September 22, 2019): 1–15. http://dx.doi.org/10.1155/2019/9652481.

Full text
Abstract:
Mobile Opportunistic Networks (OppNets) are infrastructure-less networks consisting of wireless mobile nodes and have been a focus of research for years. OppNets can be scaled up to support rapid growth of wireless devices and technologies, especially smartphones and tablets. Mobile Ad Hoc Networks (MANETs), one of OppNets technologies, have a high potential to be used for facilitating an extension for the Internet and a backup communication platform in disaster situation. However, a connection disruption due to node mobility and unreliable wireless links is possible to trigger a flooding operation of route repair process. This results in transmission delay and packet loss. The flooding of routing packets is an expensive operation cost in MANETs which affects network reliability and wastes limited resources such as network bandwidth and node energy. These are obstacles to practical implementation of MANETs in real-world environment. In this paper, we propose Low Overhead Localized Flooding (LOLF), an efficient overhead reduction routing extension based on Query Localization (QL) routing protocol. The purpose of this work is to control the propagation of routing packets in the route discovery and route repair mechanisms while incurring only a small increase in the size of control information in the packet. Simulation results from extensive experiments show that our proposed method can reduce overall routing overhead, energy consumption, and end-to-end delay without sacrificing the packet delivery ratio compared to existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Weizhen, Min Zhu, Bo Yang, Yanbo Wu, and Xinguo Li. "Design of a Self-Organizing Routing Protocol for Underwater Wireless Sensor Networks Based on Location and Energy Information." Journal of Marine Science and Engineering 11, no. 8 (August 19, 2023): 1620. http://dx.doi.org/10.3390/jmse11081620.

Full text
Abstract:
Underwater wireless sensor networks (UWSNs) are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, variable topology, limited battery, low processing power and so on. These new features pose many challenges to the design of self-organizing routing protocol for UWSNs. This paper focuses on the application of Ad Hoc On-demand Distance Vector (AODV) routing protocol in UWSNs. In order to solve the problems of packet collision and excessive energy consumption associated with the flooding-based routing discovery method and the periodic hello packet routing maintenance mechanism of AODV, a routing discovery and maintenance method based on location and energy information is proposed, and it is referred to as the route-focusing AODV (RFAODV) routing protocol. In the RFAODV protocol, the routing discovery process is focused on a few nodes through forwarding area control and dynamic delay adjustment. In addition, feedback from a media access control layer and residual energy control are used for routing maintenance. We implement the RFAODV and evaluate its performance according to the sea trial data as parameters in the NS-2. The simulation results show that compared with the other protocols, RFAODV improves the routing discovery success ratio by at least 18%, increases the packet transmission ratio by at least 4%, reduces the protocol overhead by at least 15% and reduces the energy consumption by at least 5% under various simulation scenarios. RFAODV is suitable for large-scale, high-load and dynamic networks underwater wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
21

Shin, Byoungheon, and Dongman Lee. "An Efficient Local Repair-Based Multi-Constrained Routing for Congestion Control in Wireless Mesh Networks." Wireless Communications and Mobile Computing 2018 (November 14, 2018): 1–17. http://dx.doi.org/10.1155/2018/2893494.

Full text
Abstract:
Multi-constrained routing is a key driver to support quality-of-service (QoS) for real-time multimedia applications in wireless mesh networks (WMNs). Due to the difficulty of applying strict admission control into a public WMN, it is inevitable to accommodate multiple application flows with different QoS requirements exceeding the capacity of a certain link shared by multiple flows. However, existing multi-constrained routing protocols under such an environment find the QoS degradation based on end-to-end path quality probing and trigger flooding-based route discovery from a scratch for resolving the QoS degradation, which incurs a longer recovery time and much routing overhead. In this paper, we propose a novel multi-constrained routing protocol for WMNs that finds problematic links that may affect QoS degradation to end-to-end paths and replaces them with a detour path using a local repair principle. We model congestion threshold estimation for finding problematic links and design algorithms for quickly finding detour paths and selecting an optimal path by minimizing the negative effect on existing flows nearby the detour path. Simulation results show that the proposed routing protocol achieves up to 19.6% more goodput of live video streaming applications with up to 33% reduced routing overhead compared with an existing work.
APA, Harvard, Vancouver, ISO, and other styles
22

Hsu, Fu-Hau, Chia-Hao Lee, Chun-Yi Wang, Rui-Yi Hung, and YungYu Zhuang. "DDoS Flood and Destination Service Changing Sensor." Sensors 21, no. 6 (March 11, 2021): 1980. http://dx.doi.org/10.3390/s21061980.

Full text
Abstract:
In this paper, we aim to detect distributed denial of service (DDoS) attacks, and receive a notification of destination service, changing immediately, without the additional efforts of other modules. We designed a kernel-based mechanism to build a new Transmission Control Protocol/Internet Protocol (TCP/IP) connection smartly by the host while the users or clients not knowing the location of the next host. Moreover, we built a lightweight flooding attack detection mechanism in the user mode of an operating system. Given that reinstalling a modified operating system on each client is not realistic, we managed to replace the entry of the system call table with a customized sys_connect. An effective defense depends on fine detection and defensive procedures. In according with our experiments, this novel mechanism can detect flooding DDoS successfully, including SYN flood and ICMP flood. Furthermore, through cooperating with a specific low cost network architecture, the mechanism can help to defend DDoS attacks effectively.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Hao Fan, and Ping Li. "An Approach on Optimization of ZigBee Network Routing Algorithm." Applied Mechanics and Materials 347-350 (August 2013): 1987–91. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1987.

Full text
Abstract:
ZigBee routing protocol study and optimization for the problem of the effects of flooding AODVjr algorithm RREQ packet.By introducing new coordinate parameters and other methods to control the RREQ packet forwarding. Network robustness problem and prolong the life of the network, by changing the algorithm in the case of low energy strategy.And simulation comparison to verify the effectiveness of the optimization algorithm.
APA, Harvard, Vancouver, ISO, and other styles
24

Akinsolu, Mobayode O., Abimbola O. Sangodoyin, and Uyoata E. Uyoata. "Behavioral Study of Software-Defined Network Parameters Using Exploratory Data Analysis and Regression-Based Sensitivity Analysis." Mathematics 10, no. 14 (July 21, 2022): 2536. http://dx.doi.org/10.3390/math10142536.

Full text
Abstract:
To provide a low-cost methodical way for inference-driven insight into the assessment of SDN operations, a behavioral study of key network parameters that predicate the proper functioning and performance of software-defined networks (SDNs) is presented to characterize their alterations or variations, given various emulated SDN scenarios. It is standard practice to use simulation environments to investigate the performance characteristics of SDNs, quantitatively and qualitatively; hence, the use of emulated scenarios to typify the investigated SDN in this paper. The key parameters studied analytically are the jitter, response time and throughput of the SDN. These network parameters provide the most vital metrics in SDN operations according to literature, and they have been behaviorally studied in the following popular SDN states: normal operating condition without any incidents on the SDN, hypertext transfer protocol (HTTP) flooding, transmission control protocol (TCP) flooding, and user datagram protocol (UDP) flooding, when the SDN is subjected to a distributed denial-of-service (DDoS) attack. The behavioral study is implemented primarily via univariate and multivariate exploratory data analysis (EDA) to characterize and visualize the variations of the SDN parameters for each of the emulated scenarios, and linear regression-based analysis to draw inferences on the sensitivity of the SDN parameters to the emulated scenarios. Experimental results indicate that the SDN performance metrics (i.e., jitter, latency and throughput) vary as the SDN scenario changes given a DDoS attack on the SDN, and they are all sensitive to the respective attack scenarios with some level of interactions between them.
APA, Harvard, Vancouver, ISO, and other styles
25

Kim, Daehee, Sejun Song, and Baek-Young Choi. "Energy-Efficient Adaptive Geosource Multicast Routing for Wireless Sensor Networks." Journal of Sensors 2013 (2013): 1–14. http://dx.doi.org/10.1155/2013/142078.

Full text
Abstract:
We propose an energy-efficient adaptive geosource multicast routing (EAGER) for WSNs. It addresses the energy and scalability issues of previous location based stateless multicast protocols in WSNs. EAGER is a novel stateless multicast protocol that optimizes location-based and source-based multicast approaches in various ways. First, it uses the receiver's geographic location information to save the cost of building a multicast tree. The information can be obtained during the receiver's membership establishment stage without flooding. Second, it reduces packet overhead, and in turn, energy usage by encoding with a small sized node ID instead of potentially large bytes of location information and by dynamically using branch geographic information for common source routing path segments. Third, it decreases computation overhead at each forwarding node by determining the multicast routing paths at a multicast node (or rendezvous point (RP)). Our extensive simulation results validate that EAGER outperforms existing stateless multicast protocols in computation time, packet overhead, and energy consumption while maintaining the advantages of stateless protocols.
APA, Harvard, Vancouver, ISO, and other styles
26

Mueller, Andrew, Anthony Thomas, Jeffrey Brown, Abram Young, Kim Smith, Roxanne Connelly, and Stephanie L. Richards. "Geographic information system protocol for mapping areas targeted for mosquito control in North Carolina." PLOS ONE 18, no. 3 (March 24, 2023): e0278253. http://dx.doi.org/10.1371/journal.pone.0278253.

Full text
Abstract:
Geographic information systems (GIS) can be used to map mosquito larval and adult habitats and human populations at risk for mosquito exposure and possible arbovirus transmission. Along with traditional methods of surveillance-based targeted mosquito control, GIS can help simplify and target efforts during routine surveillance and post-disaster (e.g., hurricane-related flooding) to protect emergency workers and public health. A practical method for prioritizing areas for emergency mosquito control has been developed and is described here. North Carolina (NC) One Map was used to identify state-level data layers of interest based on human population distribution and mosquito habitat in Brunswick, Columbus, Onslow, and Robeson Counties in eastern NC. Relevant data layers were included to create mosquito control treatment areas for targeted control and an 18-step protocol for map development is discussed. This protocol is expected to help state, territorial, tribal, and/or local public health officials and associated mosquito control programs efficiently create treatment area maps to improve strategic planning in advance of a disaster. This protocol may be applied to any NC county and beyond, thereby increasing local disaster preparedness.
APA, Harvard, Vancouver, ISO, and other styles
27

Yamazaki, Satoshi, Yu Abiko, and Hideki Mizuno. "A Simple and Energy-Efficient Flooding Scheme for Wireless Routing." Wireless Communications and Mobile Computing 2020 (August 20, 2020): 1–9. http://dx.doi.org/10.1155/2020/8832602.

Full text
Abstract:
In many wireless networks, such as ad hoc, sensor, and delay-tolerant networks, the destination node is determined from the source node by the flooding process. Flooding efficiency is important for nodes, because they are driven by limited batteries. In this paper, we propose a simple flooding scheme to transmit a route request (RREQ) message based on the remaining power of its own node without using control packets and complex calculations. We applied the proposed scheme to ad hoc on-demand distance vector (AODV) routing protocol as an example and carried out computer simulations (ns3). The results showed that the proposed scheme was superior to conventional schemes in static and mobile scenarios. First, we showed the limit of node density that causes the decrease of throughput in the proposed scheme and that the proposed scheme was superior in terms of energy efficiency (bits/J), including throughput and energy consumption. Next, as the number of flooding times is made uniform in the proposed scheme, all nodes will have almost the same battery replacement time. As a result, when the nodes are static, the lifetime in the proposed scheme is longer than that in the conventional scheme.
APA, Harvard, Vancouver, ISO, and other styles
28

Kim, Jaebeom, Byung-Seok Park, and Yong-up Park. "Flooding Message Mitigation of Wireless Content Centric Networking for Last-Mile Smart-Grid." Applied Sciences 9, no. 19 (September 23, 2019): 3978. http://dx.doi.org/10.3390/app9193978.

Full text
Abstract:
In view of Smart-Grid architecture, wireless Last-Mile Network (LMN) devices as smart meters and intelligent home control machines are normally installed in harsh and lossy communication environment. In order to improve communication reliability of LMN, we proposed Wireless Topology Aware Content Centric Networking (TOP-CCN) protocol. TOP-CCN reduces channel access overhead of traditional Content Centric Networking and supports efficient multicast message transmission by using Multiple Point Relay (MPR), and Publisher MPR (PMPR). In addition, TOP-CCN LMN provides simple multi-hop forwarding scheme that can reduce the traditional routing control message overhead in multi-hop wireless LMN environment. The simulation result shows TOP-CCN can improve the service provisioning time and reliability compared to traditional IP based network model in LMN.
APA, Harvard, Vancouver, ISO, and other styles
29

Park, Sang-Hyun, Seungryong Cho, and Jung-Ryun Lee. "Energy-Efficient Probabilistic Routing Algorithm for Internet of Things." Journal of Applied Mathematics 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/213106.

Full text
Abstract:
In the future network with Internet of Things (IoT), each of the things communicates with the others and acquires information by itself. In distributed networks for IoT, the energy efficiency of the nodes is a key factor in the network performance. In this paper, we propose energy-efficient probabilistic routing (EEPR) algorithm, which controls the transmission of the routing request packets stochastically in order to increase the network lifetime and decrease the packet loss under the flooding algorithm. The proposed EEPR algorithm adopts energy-efficient probabilistic control by simultaneously using the residual energy of each node and ETX metric in the context of the typical AODV protocol. In the simulations, we verify that the proposed algorithm has longer network lifetime and consumes the residual energy of each node more evenly when compared with the typical AODV protocol.
APA, Harvard, Vancouver, ISO, and other styles
30

Khan, Fawad Ali, Rafidah Md Noor, Miss Laiha Mat Kiah, Ismail Ahmedy, Mohd Yamani, Tey Kok Soon, and Muneer Ahmad. "Performance Evaluation and Validation of QCM (Query Control Mechanism) for QoS-Enabled Layered-Based Clustering for Reactive Flooding in the Internet of Things." Sensors 20, no. 1 (January 3, 2020): 283. http://dx.doi.org/10.3390/s20010283.

Full text
Abstract:
Internet of Things (IoT) facilitates a wide range of applications through sensor-based connected devices that require bandwidth and other network resources. Enhancement of efficient utilization of a heterogeneous IoT network is an open optimization problem that is mostly suffered by network flooding. Redundant, unwanted, and flooded queries are major causes of inefficient utilization of resources. Several query control mechanisms in the literature claimed to cater to the issues related to bandwidth, cost, and Quality of Service (QoS). This research article presented a statistical performance evaluation of different query control mechanisms that addressed minimization of energy consumption, energy cost and network flooding. Specifically, it evaluated the performance measure of Query Control Mechanism (QCM) for QoS-enabled layered-based clustering for reactive flooding in the Internet of Things. By statistical means, this study inferred the significant achievement of the QCM algorithm that outperformed the prevailing algorithms, i.e., Divide-and-Conquer (DnC), Service Level Agreements (SLA), and Hybrid Energy-aware Clustering Protocol for IoT (Hy-IoT) for identification and elimination of redundant flooding queries. The inferential analysis for performance evaluation of algorithms was measured in terms of three scenarios, i.e., energy consumption, delays and throughput with different intervals of traffic, malicious mote and malicious mote with realistic condition. It is evident from the results that the QCM algorithm outperforms the existing algorithms and the statistical probability value “P” < 0.05 indicates the performance of QCM is significant at the 95% confidence interval. Hence, it could be inferred from findings that the performance of the QCM algorithm was substantial as compared to that of other algorithms.
APA, Harvard, Vancouver, ISO, and other styles
31

Alasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.

Full text
Abstract:
A web service is defined as the method of communication between the web applications and the clients. Web services are very flexible and scalable as they are independent of both the hardware and software infrastructure. The lack of security protection offered by web services creates a gap which attackers can make use of. Web services are offered on the HyperText Transfer Protocol (HTTP) with Simple Object Access Protocol (SOAP) as the underlying infrastructure. Web services rely heavily on the Extended Mark-up Language (XML). Hence, web services are most vulnerable to attacks which use XML as the attack parameter. Recently, a new type of XML-based Denial-of-Service (XDoS) attacks has surfaced, which targets the web services. The purpose of these attacks is to consume the system resources by sending SOAP requests that contain malicious XML content. Unfortunately, these malicious requests go undetected underneath the network or transportation layers of the Transfer Control Protocol/Internet Protocol (TCP/IP), as they appear to be legitimate packets.In this paper, a middleware tool is proposed to provide real time detection and prevention of XDoS and HTTP flooding attacks in web service. This tool focuses on the attacks on the two layers of the Open System Interconnection (OSI) model, which are to detect and prevent XDoS attacks on the application layer and prevent flooding attacks at the Network layer.The rule-based approach is used to classify requests either as normal or malicious,in order to detect the XDoS attacks. The experimental results from the middleware tool have demonstrated that the rule-based technique has efficiently detected and prevented theattacks of XDoS and HTTP flooding attacks such as the oversized payload, coercive parsing and XML external entities close to real-time such as 0.006s over the web services. The middleware tool provides close to 100% service availability to normal request, hence protecting the web service against the attacks of XDoS and distributed XDoS (DXDoS).\
APA, Harvard, Vancouver, ISO, and other styles
32

Rani, Shalli, Deepika Koundal, Kavita, Muhammad Fazal Ijaz, Mohamed Elhoseny, and Mohammed I. Alghamdi. "An Optimized Framework for WSN Routing in the Context of Industry 4.0." Sensors 21, no. 19 (September 28, 2021): 6474. http://dx.doi.org/10.3390/s21196474.

Full text
Abstract:
The advancements in Industry 4.0 have opened up new ways for the structural deployment of Smart Grids (SGs) to face the endlessly rising challenges of the 21st century. SGs for Industry 4.0 can be better managed by optimized routing techniques. In Mobile Ad hoc Networks (MANETs), the topology is not fixed and can be encountered by interference, mobility of nodes, propagation of multi-paths, and path loss. To extenuate these concerns for SGs, in this paper, we have presented a new version of the standard Optimized Link State Routing (OLSR) protocol for SGs to improve the management of control intervals that enhance the efficiency of the standard OLSR protocol without affecting its reliability. The adapted fault tolerant approach makes the proposed protocol more reliable for industrial applications. The process of grouping of nodes supports managing the total network cost by reducing severe flooding and evaluating an optimized head of clusters. The head of the unit is nominated according to the first defined expectation factor. With a sequence of rigorous performance evaluations under simulation parameters, the simulation results show that the proposed version of OLSR has proliferated Quality of Service (QoS) metrics when it is compared against the state-of-the-art-based conventional protocols, namely, standard OLSR, DSDV, AOMDV and hybrid routing technique.
APA, Harvard, Vancouver, ISO, and other styles
33

Khalid, Khuram, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh, and Leonard Barolli. "A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks." Journal of High Speed Networks 27, no. 1 (March 29, 2021): 1–12. http://dx.doi.org/10.3233/jhs-210648.

Full text
Abstract:
Unlike communication networks which are traditionally assumed to be connected, Opportunistic networks (OppNets) are a type of wireless ad hoc networks with no guarantee of end-to-end path for data routing, which is due to node mobility, volatile links, and frequent disconnections. As such, data transmission among the nodes relies on their cooperation and this is realized in a store-and-carry fashion. To this end, several opportunistic routing techniques have been proposed in the literature, some of which using geocasting, a technique that consists of scheduling the message to a specific region toward its destination. This paper proposes a Fuzzy-based Check-and-Spray Geocast (FCSG) routing protocol for OppNets, in which a Check-and-Spray mechanism is used to control the message flooding within the destination cast and a fuzzy controller is used for selecting the suitable relay nodes to carry the message toward the destination, with the aim to improve the delivery ratio. Using simulations, the proposed FCSG protocol is shown to outperform the F-GSAF, GeoEpidemic and EECSG routing protocols in terms of overhead ratio, average latency, and delivery ratio, under varying number of nodes, buffer size, and Time-to-Live.
APA, Harvard, Vancouver, ISO, and other styles
34

Javaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/105245.

Full text
Abstract:
To keep information recent between two nodes, two types of link sensing feed-back mechanisms are used: link layer (LL) and network layer (NL). In this paper, we model and evaluate these link sensing mechanisms in three widely used reactive routing protocols: ad hoc on-demand distance vector (AODV), dynamic source routing (DSR), and dynamic MANET on-demand (DYMO). Total cost paid by a routing protocol is the sum of cost paid in the form of energy consumed (in terms of packet reception/transmission) and time spent (in terms of processing route information). Routing operations are divided into two phases: route discovery (RD) and route maintenance (RM). These protocols majorly focus on broadcast cost optimization performed by expanding ring search (ERS) algorithm to control blind flooding. Hence, our model relates link sensing mechanisms in RD and RM for the selected routing protocols to compute consumed energy and processing time. The proposed framework is evaluated via NS-2, where the selected protocols are tested with different nodes' mobilities and densities.
APA, Harvard, Vancouver, ISO, and other styles
35

Javaid, N., Z. A. Khan, U. Qasim, M. Jamil, M. Ishfaq, and T. A. Alghamdi. "Modeling Routing Overhead of Reactive Protocols at Link Layer and Network Layer in Wireless Multihop Networks." Mathematical Problems in Engineering 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/105245.

Full text
Abstract:
To keep information recent between two nodes, two types of link sensing feed-back mechanisms are used: link layer (LL) and network layer (NL). In this paper, we model and evaluate these link sensing mechanisms in three widely used reactive routing protocols: ad hoc on-demand distance vector (AODV), dynamic source routing (DSR), and dynamic MANET on-demand (DYMO). Total cost paid by a routing protocol is the sum of cost paid in the form of energy consumed (in terms of packet reception/transmission) and time spent (in terms of processing route information). Routing operations are divided into two phases: route discovery (RD) and route maintenance (RM). These protocols majorly focus on broadcast cost optimization performed by expanding ring search (ERS) algorithm to control blind flooding. Hence, our model relates link sensing mechanisms in RD and RM for the selected routing protocols to compute consumed energy and processing time. The proposed framework is evaluated via NS-2, where the selected protocols are tested with different nodes' mobilities and densities.
APA, Harvard, Vancouver, ISO, and other styles
36

Rouissat, Mehdi, Mohammed Belkheir, and Hichem Sid Ahmed Belkhira. "A potential flooding version number attack against RPL based IOT networks." Journal of Electrical Engineering 73, no. 4 (August 1, 2022): 267–75. http://dx.doi.org/10.2478/jee-2022-0035.

Full text
Abstract:
Abstract Routing protocol for low power and lossy networks (RPL) has been proposed for power, memory, and processing constrained devices. Owing to their constrained, RPL-based networks are exposed to a wide range of security attacks that mainly include control message tampering. In this paper we propose and study a modified version number attack, based on flooding the network by falsified incremented version numbers. The obtained results show that the modified attack led to an immense increase in the overhead, 1426%, compared with the attack-free case, and an increase of 182 % in the total energy consumption. When it comes to PDR a degradation to 4.7% has been recorded, affecting the reliability of the network. On the other hand, the latency also showed an increase from 0.24 s in the attack-free case to 0.89 s, which is mainly due to the high congestion created by the attack.
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (August 22, 2023): 3543. http://dx.doi.org/10.3390/electronics12173543.

Full text
Abstract:
The CAN (Controller Area Network) protocol is widely adopted for in-vehicle networks due to its cost efficiency and reliable transmission. However, despite its popularity, the protocol lacks built-in security mechanisms, making it vulnerable to attacks such as flooding, fuzzing, and DoS. These attacks can exploit vulnerabilities and disrupt the expected behavior of the in-vehicle network. One of the main reasons for these security concerns is that the protocol relies on broadcast frames for communication between ECUs (Electronic Control Units) within the network. To tackle this issue, we present an intrusion detection system that leverages multiple LSTM-Autoencoders. The proposed system utilizes diverse features, including transmission interval and payload value changes, to capture various characteristics of normal network behavior. The system effectively detects anomalies by analyzing different types of features separately using the LSTM-Autoencoder model. In our evaluation, we conducted experiments using real vehicle network traffic, and the results demonstrated the system’s high precision with a 99% detection rate in identifying anomalies.
APA, Harvard, Vancouver, ISO, and other styles
38

Latah, Majd, and Levent Toker. "A novel intelligent approach for detecting DoS flooding attacks in software-defined networks." International Journal of Advances in Intelligent Informatics 4, no. 1 (March 31, 2018): 11. http://dx.doi.org/10.26555/ijain.v4i1.138.

Full text
Abstract:
Software-Defined Networking (SDN) is an emerging networking paradigm that provides an advanced programming capability and moves the control functionality to a centralized controller. This paper proposes a two-stage novel intelligent approach that takes advantage of the SDN approach to detect Denial of Service (DoS) flooding attacks based on calculation of packet rate as the first step and followed by Support Vector Machine (SVM) classification as the second step. Flow concept is an essential idea in OpenFlow protocol, which represents a common interface between an SDN switch and an SDN controller. Therefore, our system calculates the packet rate of each flow based on flow statistics obtained by SDN controller. Once the packet rate exceeds a predefined threshold, the system will activate the packet inspection unit, which, in turn, will use the (SVM) algorithm to classify the previously collected packets. The experimental results showed that our system was able to detect DoS flooding attacks with 96.25% accuracy and 0.26% false alarm rate.
APA, Harvard, Vancouver, ISO, and other styles
39

Samal, Chandra Kanta. "Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks." International journal of Computer Networks & Communications 15, no. 2 (March 30, 2023): 22–38. http://dx.doi.org/10.5121/ijcnc.2023.15202.

Full text
Abstract:
When packets are sending in multi-hop mobile unintended networks numerous problems occur like flooding, rebroadcast, broadcast latency, power conservation and collision. If multiple transmission of packets simultaneously in MANETs that using the slot assignments approach, when additional channels are transmitting at the same time as the first slot allocations, interference may occur at the nodes. Because of the multi-hops data transfer, the network performance is hampered by the constrained bandwidth and therefore the self-initiated topological alterations. Therefore, a broadcast algorithm is important within the mobile ad hoc network for collision control and reliable communication. This paper proposes two new broadcasting protocols: modify SRBS and DSB algorithms. The planned algorithms outperform context of efficiency, reliability, traffic overload and reachability in highly mobile networks is an enhanced performance within the different environments. Evaluation of simulation results with other well-known exiting protocols as DFCN and PEGSP algorithms shows that the proposed protocol performance is best within the wireless network and channel bandwidths are well utilized within the network.
APA, Harvard, Vancouver, ISO, and other styles
40

Logie, Carmen H., Danielle Toccalino, Anna Cooper Reed, Kalonde Malama, Peter A. Newman, Sheri Weiser, Orlando Harris, Isha Berry, and Adebola Adedimeji. "Exploring linkages between climate change and sexual health: a scoping review protocol." BMJ Open 11, no. 10 (October 2021): e054720. http://dx.doi.org/10.1136/bmjopen-2021-054720.

Full text
Abstract:
IntroductionThe effects of climate change and associated extreme weather events (EWEs) present substantial threats to well-being. EWEs hold the potential to harm sexual health through pathways including elevated exposure to HIV and other sexually transmitted infections (STIs), disrupted healthcare access, and increased sexual and gender-based violence (SGBV). The WHO defines four components of sexual health: comprehensive sexuality education; HIV and STI prevention and care; SGBV prevention and care; and psychosexual counselling. Yet, knowledge gaps remain regarding climate change and its associations with these sexual health domains. This scoping review will therefore explore the linkages between climate change and sexual health.Methods and analysisFive electronic databases (MEDLINE, EMBASE, PsycINFO, Web of Science, CINAHL) will be searched using text words and subject headings (eg, Medical Subject Headings (MeSH), Emtree) related to sexual health and climate change from the inception of each database to May 2021. Grey literature and unpublished reports will be searched using a comprehensive search strategy, including from the WHO, World Bank eLibrary, and the Centers for Disease Control and Prevention. The scoping review will consider studies that explore: (a) climate change and EWEs including droughts, heat waves, wildfires, dust storms, hurricanes, flooding rains, coastal flooding and storm surges; alongside (b) sexual health, including: comprehensive sexual health education, sexual health counselling, and HIV/STI acquisition, prevention and/or care, and/or SGBV, including intimate partner violence, sexual assault and rape. Searches will not be limited by language, publication year or geographical location. We will consider quantitative, qualitative, mixed-methods and review articles for inclusion. We will conduct thematic analysis of findings. Data will be presented in narrative and tabular forms.Ethics and disseminationThere are no formal ethics requirements as we are not collecting primary data. Results will be published in a peer-reviewed journal and shared at international conferences.
APA, Harvard, Vancouver, ISO, and other styles
41

Jamil, Harun, Abid Ali, and Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking." Journal of Information Security and Cybercrimes Research 5, no. 1 (June 30, 2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.

Full text
Abstract:
Software Defined Networking (SDN) shows network operations to be performed for efficient network operations. Due to the increase in network devices, the percentage of attacks is also increased, and it is challenging to provide defense against such attacks. In SDN, the control plan is separated from the data plane. The control plan is implemented using some central devices called SDN controllers. In SDN Address Resolution Protocol (ARP), spoofing and Distributed Denial of Services (DDoS) attacks are carried out on an enormous scale. These are commonly launched attacks in SDN. Due to these attacks, the network performance is down, and network services are dead. This paper proposed a new auto detection methodology to detect ARP and DDoS attacks and mitigate SDN networks from these attacks. Additionally, we implemented two algorithms: one for flow rules and the second for attack detection. An individual server was installed to check the malicious traffic installation. We present the new forward flooding rules to detect and mitigate attacks. The experiments are performed using LINUX-based network implementation. Our proposal successfully improves network security and enhances network efficiency.
APA, Harvard, Vancouver, ISO, and other styles
42

Kumar Pallai, Gyanendra, Meenakshi Sankaran, and Amiya Kumar Rath. "Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET." International journal of Computer Networks & Communications 13, no. 2 (March 31, 2021): 15–36. http://dx.doi.org/10.5121/ijcnc.2021.13202.

Full text
Abstract:
The Broadcast storm problem causes severe interference, intense collision and channel contention, which greatly degrades the QoS performance metrics of the routing protocols. So, we suggest a neighbourhood coverage knowledge probabilistic broadcasting model (NCKPB) integrating with AODV protocol with knowledge on 2-hop neighbourhood coverage; a connectivity function to control a node’s forwarding probability of retransmission to alleviate significant overhead redundancy. Our objective is to minimize the broadcast RREQ overhead while ensuring fair retransmission bandwidth. We considered two more important measures called Saved Rebroadcast and Reachability. The outcomes of NCKPB, Fixed probability (FP) and Flooding (FL) routing schemes are examined under three major operating conditions, such as node density, mobility and traffic load. The NS-2 results demonstrate the efficacy of the proposed NCKPB model by illustrating its performance superiority over all key metrics such as redundancy overhead, end to end latency, throughput, reachability, saved rebroadcast and collision contrast to FP and FL.
APA, Harvard, Vancouver, ISO, and other styles
43

Zafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (July 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.

Full text
Abstract:
The rudimentary notion of using MANET is that the exchange of information in between the portable nodes count on the swift arrangement of a momentary network. Also, each node in a MANET can travel spontaneously in any direction and can change its links to the other nodes repeatedly. In hybrid protocols, initially, the routing is established with the help of some proactively prospected routes and later on serves the request with the help of reactive flooding. In MANET, the security and the routing are the two most crucial and challenging aspects that open up a vast area for improvement. Security includes a set of considerations that are adequately funded. Designing a competent routing protocol for wireless ad-hoc network along with the fulfilment of security aspects is a challenging task. MANET demands for a new set of networking strategies to be adopted in order to provide competent and secure overhead free end-to-end communication. In MANET, hybrid routing protocols are considered to be the most effective types of protocols as they take the advantage of both proactive and reactive routing protocols. After performing an intense literature survey, it could be concluded that there is a specific requirement of a protocol hybrid in nature that could include the two most specific factors for MANET (i.e., routing and security). The existing hybrid routing protocols suffers from the problems like optimisation control, images detection, and image quantization. To solve the above-mentioned issues of hybrid routing protocols, various optimization algorithms have been proposed that are natural genetics-inspired. The various techniques that can be used to enhance the security are cryptography, bio-metric, trust-based approach, Hash function algorithm, etc.
APA, Harvard, Vancouver, ISO, and other styles
44

Bdair Alghuraibawi, Adnan Hasan, Rosni Abdullah, Selvakumar Manickam, and Zaid Abdi Alkareem Alyasseri. "Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5216. http://dx.doi.org/10.11591/ijece.v11i6.pp5216-5228.

Full text
Abstract:
Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
45

Sohail, Hamza, Mahmood ul Hassan, M. A. Elmagzoub, Adel Rajab, Khairan Rajab, Adeel Ahmed, Asadullah Shaikh, Abid Ali, and Harun Jamil. "BBSF: Blockchain-Based Secure Weather Forecasting Information through Routing Protocol in Vanet." Sensors 23, no. 11 (June 1, 2023): 5259. http://dx.doi.org/10.3390/s23115259.

Full text
Abstract:
A vehicular ad hoc network (VANET) is a technique that uses vehicles with the ability to sense data from the environment and use it for their safety measures. Flooding is a commonly used term used for sending network packets. VANET may cause redundancy, delay, collision, and the incorrect receipt of the messages to their destination. Weather information is one of the most important types of information used for network control and provides an enhanced version of the network simulation environments. The network traffic delay and packet losses are the main problems identified inside the network. In this research, we propose a routing protocol which can transmit the weather forecasting information on demand based on source vehicle to destination vehicles, with the minimum number of hop counts, and provide significant control over network performance parameters. We propose a BBSF-based routing approach. The proposed technique effectively enhances the routing information and provides the secure and reliable service delivery of the network performance. The results taken from the network are based on hop count, network latency, network overhead, and packet delivery ratio. The results effectively show that the proposed technique is reliable in reducing the network latency, and that the hop count is minimized when transferring the weather information.
APA, Harvard, Vancouver, ISO, and other styles
46

Yoo, Dae-Seung, Van Khoe Ta, Byung-Tae Jang, and Hoon Oh. "An Energy-Efficien Slotted Sense Multiple Access Broadcast Protocol for Reliable Command Delivery in Dynamic Wireless Sensor Networks." Sensors 19, no. 5 (March 11, 2019): 1236. http://dx.doi.org/10.3390/s19051236.

Full text
Abstract:
In industrial monitoring and control applications, a server often has to send a command to a node or group of nodes in wireless sensor networks. Flooding achieves high reliability of message delivery by allowing nodes to take the redundancy of receiving the identical message multiple times. However, nodes consume much energy due to this redundancy and the long duty cycle. A reliable slotted broadcast protocol (RSBP) tackles this problem by allocating a distinct broadcast slot (BS) to every node using a tree topology. Not only does it remove collision, but it also minimizes energy consumption such that every node remains active only during its parent’s broadcast slot and its own broadcast slot to receive and rebroadcast a message, respectively. However, it suffers from low reliability in harsh environments due to the compete removal of redundancy and low responsiveness to the changes in network topology due to the global scheduling of slots. Our approach allocates one distinct broadcast sharable slot (BSS) to each tree level, thus making a BSS schedule topology-independent. Then, nodes at the same level compete to rebroadcast a message to nodes at one level higher within the BSS, thus allowing the redundancy. In addition, it uses a slot-scheduled transmission within BSS that can further improve reliability by reducing message collisions and also enables the precise management of energy. According to simulations and experiments, the proposed approach can achieve high reliability comparable to flooding and low-energy consumption comparable to RSBP.
APA, Harvard, Vancouver, ISO, and other styles
47

Sati, Salem, Ahmed Sohoud, and Tareg Abulifa. "Energy Efficient Routing Protocol for Mobile Social Sensing Networks." Scalable Computing: Practice and Experience 20, no. 4 (December 4, 2019): 641–51. http://dx.doi.org/10.12694/scpe.v20i4.1579.

Full text
Abstract:
Mobile Social Sensing Network (MSSN) is a subclass of Wireless Sensor Networks (WSN). This MSSN is consists of mobile sensing transducers carried by people. Sensing information gathered by mobile sensors will transmit to the data sink. This data sink may it is fixed or mobile. But in optimal cases, it should have efficient energy and position compared with other mobile sensors. On the other hand, mobile sensors may have a social tie because they carried by people. Traditional MANET routing protocols such as AODV and DSR are inapplicable or perform poorly for mobile social data sensing. Especially for distributed mobile social sensing. Insufficient performance due to the nature of the mobile sensors which suffering from a limited energy source. In recent days, there are many routing protocols proposed by researchers. These protocols improve the total delivered messagesin mobile social sensing networks, but most of them do not take into account the link bandwidth and node storage limitation, thus routing may lead to more energy consumption among mobile sensing nodes. In this paper, we design an Energy-Efficient Routing Protocol (EERP) for mobile social sensing networks. We consider the node energy as a balance function between the delay of collected data and transmission of sensor nodes to the data sink. Furthermore, we also develop an enhanced version of the suggested EERP which named EERP+S, EERP+S combines the energy percentage and social metric of node degree. EERP and its updated version EERP+S are dynamically adjusting the control function based on data delay and transmission in addition to node activity. Simulation results demonstrate the efficiency of EERP and EERP+S compared with the flooding behavior of an Epidemic. Epidemic and its social version Ep-Soc are compared with suggested protocols in distributed mobile social sensing paradigms.
APA, Harvard, Vancouver, ISO, and other styles
48

Daru, April Firman, Kristoko Dwi Hartomo, and Hindriyanto Dwi Purnomo. "IPv6 flood attack detection based on epsilon greedy optimized Q learning in single board computer." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (October 1, 2023): 5782. http://dx.doi.org/10.11591/ijece.v13i5.pp5782-5791.

Full text
Abstract:
<span lang="EN-US">Internet of things is a technology that allows communication between devices within a network. Since this technology depends on a network to communicate, the vulnerability of the exposed devices increased significantly. Furthermore, the use of internet protocol version 6 (IPv6) as the successor to internet protocol version 4 (IPv4) as a communication protocol constituted a significant problem for the network. Hence, this protocol was exploitable for flooding attacks in the IPv6 network. As a countermeasure against the flood, this study designed an IPv6 flood attack detection by using epsilon greedy optimized Q learning algorithm. According to the evaluation, the agent with epsilon 0.1 could reach 98% of accuracy and 11,550 rewards compared to the other agents. When compared to control models, the agent is also the most accurate compared to other algorithms followed by neural network (NN), K-nearest neighbors (KNN), decision tree (DT), naive Bayes (NB), and support vector machine (SVM). Besides that, the agent used more than 99% of a single central processing unit (CPU). Hence, the agent will not hinder internet of things (IoT) devices with multiple processors. Thus, we concluded that the proposed agent has high accuracy and feasibility in a single board computer (SBC).</span>
APA, Harvard, Vancouver, ISO, and other styles
49

Alzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (November 21, 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.

Full text
Abstract:
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial component of industrial, residential, and telecommunication applications, among others. This innovative idea promotes communication between physical components, such as sensors and actuators, to improve process flexibility and efficiency. Smart gadgets in IoT contexts interact using various message protocols. Message queuing telemetry transfer (MQTT) is a protocol that is used extensively in the IoT context to deliver sensor or event data. The aim of the proposed system is to create an intrusion detection system based on an artificial intelligence algorithm, which is becoming essential in the defense of the IoT networks against cybersecurity threats. This study proposes using a k-nearest neighbors (KNN) algorithm, linear discriminant analysis (LDA), a convolutional neural network (CNN), and a convolutional long short-term memory neural network (CNN-LSTM) to identify MQTT protocol IoT intrusions. A cybersecurity system based on artificial intelligence algorithms was examined and evaluated using a standard dataset retrieved from the Kaggle repository. The dataset was injected by five attacks, namely brute-force, flooding, malformed packet, SlowITe, and normal packets. The deep learning algorithm achieved high performance compared with the developing security system using machine learning algorithms. The performance accuracy of the KNN method was 80.82%, while the accuracy of the LDA algorithm was 76.60%. The CNN-LSTM model attained a high level of precision (98.94%) and is thus very effective at detecting intrusions in IoT settings.
APA, Harvard, Vancouver, ISO, and other styles
50

Jočys, Linas Juozas. "ICMPV6 RA FLOODING VULNERABILITY RESEARCH / ICMPV6 PROTOKOLO RA ŽINUČIŲ ATSISAKYMO APTARNAUTI ATAKOS TYRIMAS." Mokslas – Lietuvos ateitis 8, no. 3 (June 29, 2016): 273–77. http://dx.doi.org/10.3846/mla.2016.930.

Full text
Abstract:
ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1) and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability. ICMPv6 yra naujausios versijos interneto kontrolės žinučių protokolas, kurio pagrindinis tikslas pranešti apie paketų apdorojimo klaidas IPv6 tinklo mazgams. Analizuojant ICMPv6 protokolą nustatyta, jog šis protokolas yra technologiškai pažeidžiamas. Vienas iš pažeidžiamumų yra ICMPv6 maršrutizatoriaus skelbimo žinučių (RA) atsisakymo aptarnauti pažeidžiamumas, kuris leidžia sulėtinti arba visiškai sutrikdyti operacinių sistemų darbą kompiuteriuose, esančiuose vietiniame tinkle. Straipsnyje aprašomas Windows (XP, 7, 8.1) ir Linux Ubuntu tipų operacinių sistemų atsparumo ICMPv6 protokolo RA žinučių atsisakymo aptarnauti atakai tyrimas. Tyrimo metu nustatytas pasirinktų operacinių sistemų atsparumas RA žinučių atsisakymo aptarnauti atakai, esant skirtingiems techninės įrangos resursams. Straipsnyje taip pat pateiktos prevencinės priemonės ICMPv6 RA žinučių atsisakymo aptarnauti pažeidžiamumui šalinti arba minimizuoti.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography