The Internet of things (IoT) is being used in a variety of industries, including agriculture, the... more The Internet of things (IoT) is being used in a variety of industries, including agriculture, the military, smart cities and smart grids, and personalized health care. It is also being used to control critical infrastructure. Nevertheless, because the IoT lacks security procedures and lack the processing power to execute computationally costly antimalware apps, they are susceptible to malware attacks. In addition, the conventional method by which malware-detection mechanisms identify a threat is through known malware fingerprints stored in their database. However, with the ever-evolving and drastic increase in malware threats in the IoT, it is not enough to have traditional antimalware software in place, which solely defends against known threats. Consequently, in this paper, a lightweight deep learning model for an SDN-enabled IoT framework that leverages the underlying IoT resource-constrained devices by provisioning computing resources to deploy instant protection against botnet ...
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolut... more The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. However, these networks are still vulnerable to botnet attacks such as distributed denial of service, network probing, backdoors, information stealing, and phishing attacks. These attacks can disrupt and sometimes cause irreversible damage to several sectors of the economy. As a result, several machine learning-based solutions have been proposed to improve the real-time detection of botnet attacks in SDN-enabled IoT networks. The aim of this review is to investigate research studies that applied machine learning techniques for deterring botnet attacks in SDN-enabled IoT networks. Initially the first major botnet attacks in SDN-IoT networks have been thoroughly discussed. Secondly a commonly used machine learning techniques for detecting an...
MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use pee... more MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use peer-to-peer routing to provide network access instead of using a preexisting network infrastructure. Despite the network infrastructureās simplicity, it faces issues such as changeable connection capacity, dynamic topology, node battery power exhaustion, and inadequate physical security. Broadcasting is a standard MANET approach for sending messages from a source node to all other nodes in the network. Flooding is a frequent method for broadcasting route request (RREQ) packets, which is susceptible to broadcast storms. The high retransmission rate is caused by the standard flooding technique, which causes media congestion and packet collisions, which can drastically reduce throughput and network performance. In a mobile ad-hoc network, efficient broadcasting focuses on selecting a compact forward node set while assuring broadcast coverage. The goal is to find a limited number of forward no...
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012
ABSTRACT Mobile Ad Hoc Networks (MANETs) are a collection of mobile nodes that are dynamically an... more ABSTRACT Mobile Ad Hoc Networks (MANETs) are a collection of mobile nodes that are dynamically and randomly move and self organize within a given topology. In MANET, Transmission Control Protocol (TCP) is unable to distinguish packet losses due to congestion or route/link failures due to mobility of nodes. Hence the way how routing protocols respond to route failures and route recovery mechanism has an effect on the performance of TCP variants. In this paper, the effect of routing protocols; Ad hoc On Demand Distance Vector (AODV), Destination Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), and Temporally Ordered Routing Algorithm (TORA), on the performance of TCP variants; TCP Newreno, TCP Reno, TCP with Selective Acknowledgment (Sack), and TCP Tahoe, under different mobility pattern and node density were studied. Simulation results showed that, for all variants of TCP, AODV achieved the highest throughput. From TCP variants, TCP Newreno performed better than the other variants over the stated routing protocols. It is also confirmed that the performance of TCP variants are highly dependent on the underlying routing protocols in MANET.
2011 IEEE 13th International Conference on Communication Technology, 2011
ABSTRACT Mobile ad hoc networks (MANETs) have provided new challenges, which are the result of th... more ABSTRACT Mobile ad hoc networks (MANETs) have provided new challenges, which are the result of the unique characteristics of the wireless medium, the dynamic nature of the network topology and the route failure due to frequent link breakages, which affects the end-to-end transmission of data. TCP performs poorly in this environment. In this paper, we propose a new approach to improve TCP's performance by detecting and responding to out-of-order (OOO) packet delivery and packet loss events, which are the results of using multi-path route to transport packets. The proposed approach is called TCP Detection of Out of Order and Response with Time Stamp (TCP-DOOR-TS). The algorithm has improved the performance of TCP. The simulation result has shown that, TCP-DOOR-TS algorithm has a higher throughput and goodput than TCP-SACK. For two different simulation scenarios, a throughput of 13% and 7.45% and a goodput of 12.5% and 7.45% improvements respectively have been achieved.
Mobile ad hoc networking is a concept in computer communications, which means that if users want ... more Mobile ad hoc networking is a concept in computer communications, which means that if users want to communicate with each other, they can form a temporary network with out any pre-existing communication infrastructure. Each node participating in the networks acts as host and router in order to transmit, receive and forward packets. In mobile ad hoc networks [MANETs], the wireless mobile nodes may dynamically enter the network as well as leave the network. Due to the dynamic nature of MANET, nodes are typically distinguished by their high degree of mobility and route failure due to frequent link breakages, which affects the end-to-end transmission of data. In order to increase the reliability of data transmission and to reduce delay due to route recomputation, some routing protocols, such as Temporally Ordered Routing Algorithm (TORA), maintain multiple routes between a senderreceiver pair, and use multi-path route to transmit packets. In such a case, packets coming from different pa...
The Internet of things (IoT) is being used in a variety of industries, including agriculture, the... more The Internet of things (IoT) is being used in a variety of industries, including agriculture, the military, smart cities and smart grids, and personalized health care. It is also being used to control critical infrastructure. Nevertheless, because the IoT lacks security procedures and lack the processing power to execute computationally costly antimalware apps, they are susceptible to malware attacks. In addition, the conventional method by which malware-detection mechanisms identify a threat is through known malware fingerprints stored in their database. However, with the ever-evolving and drastic increase in malware threats in the IoT, it is not enough to have traditional antimalware software in place, which solely defends against known threats. Consequently, in this paper, a lightweight deep learning model for an SDN-enabled IoT framework that leverages the underlying IoT resource-constrained devices by provisioning computing resources to deploy instant protection against botnet ...
The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolut... more The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. However, these networks are still vulnerable to botnet attacks such as distributed denial of service, network probing, backdoors, information stealing, and phishing attacks. These attacks can disrupt and sometimes cause irreversible damage to several sectors of the economy. As a result, several machine learning-based solutions have been proposed to improve the real-time detection of botnet attacks in SDN-enabled IoT networks. The aim of this review is to investigate research studies that applied machine learning techniques for deterring botnet attacks in SDN-enabled IoT networks. Initially the first major botnet attacks in SDN-IoT networks have been thoroughly discussed. Secondly a commonly used machine learning techniques for detecting an...
MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use pee... more MANET (mobile ad-hoc network) is a wireless ad-hoc network made up of mobile devices that use peer-to-peer routing to provide network access instead of using a preexisting network infrastructure. Despite the network infrastructureās simplicity, it faces issues such as changeable connection capacity, dynamic topology, node battery power exhaustion, and inadequate physical security. Broadcasting is a standard MANET approach for sending messages from a source node to all other nodes in the network. Flooding is a frequent method for broadcasting route request (RREQ) packets, which is susceptible to broadcast storms. The high retransmission rate is caused by the standard flooding technique, which causes media congestion and packet collisions, which can drastically reduce throughput and network performance. In a mobile ad-hoc network, efficient broadcasting focuses on selecting a compact forward node set while assuring broadcast coverage. The goal is to find a limited number of forward no...
Proceedings of the International Conference on Management of Emergent Digital EcoSystems, 2012
ABSTRACT Mobile Ad Hoc Networks (MANETs) are a collection of mobile nodes that are dynamically an... more ABSTRACT Mobile Ad Hoc Networks (MANETs) are a collection of mobile nodes that are dynamically and randomly move and self organize within a given topology. In MANET, Transmission Control Protocol (TCP) is unable to distinguish packet losses due to congestion or route/link failures due to mobility of nodes. Hence the way how routing protocols respond to route failures and route recovery mechanism has an effect on the performance of TCP variants. In this paper, the effect of routing protocols; Ad hoc On Demand Distance Vector (AODV), Destination Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), and Temporally Ordered Routing Algorithm (TORA), on the performance of TCP variants; TCP Newreno, TCP Reno, TCP with Selective Acknowledgment (Sack), and TCP Tahoe, under different mobility pattern and node density were studied. Simulation results showed that, for all variants of TCP, AODV achieved the highest throughput. From TCP variants, TCP Newreno performed better than the other variants over the stated routing protocols. It is also confirmed that the performance of TCP variants are highly dependent on the underlying routing protocols in MANET.
2011 IEEE 13th International Conference on Communication Technology, 2011
ABSTRACT Mobile ad hoc networks (MANETs) have provided new challenges, which are the result of th... more ABSTRACT Mobile ad hoc networks (MANETs) have provided new challenges, which are the result of the unique characteristics of the wireless medium, the dynamic nature of the network topology and the route failure due to frequent link breakages, which affects the end-to-end transmission of data. TCP performs poorly in this environment. In this paper, we propose a new approach to improve TCP's performance by detecting and responding to out-of-order (OOO) packet delivery and packet loss events, which are the results of using multi-path route to transport packets. The proposed approach is called TCP Detection of Out of Order and Response with Time Stamp (TCP-DOOR-TS). The algorithm has improved the performance of TCP. The simulation result has shown that, TCP-DOOR-TS algorithm has a higher throughput and goodput than TCP-SACK. For two different simulation scenarios, a throughput of 13% and 7.45% and a goodput of 12.5% and 7.45% improvements respectively have been achieved.
Mobile ad hoc networking is a concept in computer communications, which means that if users want ... more Mobile ad hoc networking is a concept in computer communications, which means that if users want to communicate with each other, they can form a temporary network with out any pre-existing communication infrastructure. Each node participating in the networks acts as host and router in order to transmit, receive and forward packets. In mobile ad hoc networks [MANETs], the wireless mobile nodes may dynamically enter the network as well as leave the network. Due to the dynamic nature of MANET, nodes are typically distinguished by their high degree of mobility and route failure due to frequent link breakages, which affects the end-to-end transmission of data. In order to increase the reliability of data transmission and to reduce delay due to route recomputation, some routing protocols, such as Temporally Ordered Routing Algorithm (TORA), maintain multiple routes between a senderreceiver pair, and use multi-path route to transmit packets. In such a case, packets coming from different pa...
Uploads
Papers by Henock Mulugeta