Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain... more
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been... more
Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protocols with their pros cons we have studied.
Recent trends show that there are swift developments and fast convergence of wireless and mobile communication networks with internet services to provide the quality of ubiquitous access to network users. Most of the wireless networks and... more
Recent trends show that there are swift developments and fast convergence of wireless and mobile communication networks with internet services to provide the quality of ubiquitous access to network users. Most of the wireless networks and mobile cellular networks are moving to be all IP based. These networks are connected through the private IP core networks using the TCP/IP protocol or through the Internet. As such, there is room to improve the mobility support through the Internet and support ubiquitous network access by providing seamless handover. This is especially true with the invention of portable mobile and laptop devices that can be connected almost everywhere at any time. However, the recent explosion on the usage of mobile and laptop devices has also generated several issues in terms of performance and quality of service. Nowadays, mobile users demand high quality performance, best quality of services and seamless connections that support real-time application such as audio and video streaming. The goal of this paper is to study the impact and evaluate the mobility management protocols under micro mobility domain on link layer and network layer handover performance. Therefore, this paper proposes an integration solution of network-based mobility management framework, based on Proxy Mobile IPv6, to alleviate handover latency, packet loss and increase throughput and the performance of video transmission when mobile host moves to new network during handover on high speed mobility. Simulations are conducted to analyze the relationship between the network performances with the moving speed of mobile host over mobility protocols. Based on simulation results, we presented and analyzed the results of mobility protocols under intra-domain traffics in micro mobility domain.
Envisioning a future where mobile terminals equipped with one or more network devices are able to roam across wireless or wired networks, in a diverse macro and micro wireless cells environment, requires the development of enhanced... more
Envisioning a future where mobile terminals equipped with one or more network devices are able to roam across wireless or wired networks, in a diverse macro and micro wireless cells environment, requires the development of enhanced methods to control IP-based mobility. These methods should consider traditional terminal mobility (mainly due to user movement) as well as mobility across heterogeneous networks in the presence of semi-static users. For this to become reality, a cross layer interaction is required starting from a potentially large diversity of layer two access technologies up to the common IP layer, allowing the exchange of messages between terminals and network components. Furthermore, traditional host mobility driven concepts need to evolve, and include more stringent mobile operator requirements in context of fully driven network controlled mobility. This paper presents and evaluates a novel framework design, based on the IEEE 802.21 future standard, encompassing network driven as well as host driven mobility. This paper evaluates signalling aspects, algorithm design and performance issues.
Resilience, load balancing and ubiquitous support can be improved by multihoming configurations that explore the plurality of wireless technologies available nowadays. Nevertheless, efficient multihoming configurations require support... more
Resilience, load balancing and ubiquitous support can be improved by multihoming configurations that explore the plurality of wireless technologies available nowadays. Nevertheless, efficient multihoming configurations require support from all layers, as for instance in, network protocols which must incorporate mechanisms to support multiple addresses. Multiple Care of Addresses Registration (MCoA) is a protocol that extends Mobile IPv6 to enable the registration of multiple addresses. This paper presents mCoA++, our publicly available simulation model for OMNeT++ which implements the Multiple Care of Addresses Registration protocol recently standardized by IETF. Filling a gap in the MCoA specification, mCoA++ incorporates cross-layer mechanisms that tailor address selection according to application requirements. We evaluate our mCoA++ implementation and compare simulation code performance with xMIPv6. We find that mCoA++ adds multiple care of address support in OMNeT++ without introducing any significant overhead.
Mobile and multi-access devices have become commonplace today. In this context, nodes have multiple interfaces that can form the foundation for the always best connected paradigm. Mobile IPv6, the staple mobility management technology for... more
Mobile and multi-access devices have become commonplace today. In this context, nodes have multiple interfaces that can form the foundation for the always best connected paradigm. Mobile IPv6, the staple mobility management technology for the Internet, enables nodes to roam between different networks while minimising session disruption due to handovers. However, in standard MIPv6, a mobile node can register only a single IP address as its Care-of-Address (CoA), therefore the multiplicity of network interfaces may be managed suboptimally while simultaneous multi-access is not possible. Recently, MIPv6 has been extended with a much-anticipated feature, namely Multiple Care-of Address (MCoA) registration. MCoA allows a MIPv6 node to register all active addresses configured on the respective interfaces and then use them at will, possibly in an alternating fashion as well as simultaneously. MCoA is anticipated to improve the performance of multimedia applications, yet this is still to be quantified. This paper provides a first answer to this question. In particular, we employ simulation to evaluate the benefits for multimedia applications, such as VoIP and video, from the use of MCoA. We compare the MCoA results with those obtained when MIPv6 with single address registration is used based on objective multimedia evaluation metrics, such as PESQ. In addition we examine the tradeoffs between application benefits and signaling costs for the network.