International Journal of Computer Networks and Communications Security

Volume 1, Issue 2, July 2013




DOS Attacks on TCP/IP Layers in WSN

Pages: 40-45 (6) | [Full Text] PDF (381 KB)
Isha, Arun Malik, Gaurav Raj
Department of Computer Engg, LPU Jalandhar, India

Abstract -
The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th.
Index Terms - Wireless sensor networks, Security, Denial of Service (DoS), Availability, OSI model

Design and Performance Analysis of Energy Aware Routing Protocol for Delay Sensitive Applications for Wireless Sensor Networks

Pages: 46-53 (8) | [Full Text] PDF (186 KB)
Dr. Ambedkar Institute of Technology, Department of ISE, Bangalore
Sapthagiri College of Engineering, Department of ECE, Bangalore

Abstract -
Wireless Sensor Networks (WSNs) are emerging network technology with innumerable applications. But security and energy constraints reduce its successful deployments. The nodes in network are greatly involved in transmissions and other processing operations for maintenance other than establishing or handling a call. Due to limited processing ability, storage capacity and most importantly the available battery power of the nodes, it is required to minimize the transmission power and the amount of data transmitted, for efficient operation. This paper presents a power aware routing protocol designed for wireless sensor networks. The proposed routing protocol is an extended and enhanced version of Dynamic Source Routing protocol. It adds energy awareness to the existing implementation of DSR protocol. Energy metric is considered during route selection process to choose an optimal path in terms of overall energy of the nodes along the path, and “low energy notification” method is used during route maintenance process to increase the lifetime of the bridge nodes to avoid network partitioning. The performance of DSR protocol and Energy Aware DSR (EADSR) protocol are compared through NS2 simulation under different scenarios. In all the cases, it is seen that EADSR protocol out-performs DSR protocol by energy saving in efficient manner.
Index Terms - Transmission, DSR, Energy aware, routing protocol, WSNs

Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANET

Pages: 54-60 (6) | [Full Text] PDF (260 KB)
Mehajabeen Fatima, Roopam Gupta, T K Bandhopadhyay
RGPV, Bhopal, India
BIST, Bhopal, India

Abstract -
Internet is based on TCP/IP but TCP/IP architecture is not sufficient to cope with the dynamics of MANET. Number of architectures are already available in literature but cross layer architecture is most popular one. To enhance performance of protocols a Cross Layer- Performance Enhancement Architecture (CL-PEA) is proposed. In this architecture one hardware layer is added and all layers can exchange their parameters. CL-PEA enhances the protocol performances by taking decisions on the basis of information available on layers.
Index Terms - TCP/IP, MANET, CL-PEA, Cross Layer, Protocol

Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology

Pages: 61-67 (7) | [Full Text] PDF (666 KB)
Mahda Noura, Sadra Mohammadalian, Leila Fathi, Mahnoosh Torabi
Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor

Abstract -
Cloud computing, the utility base computing, is going to become the mainstream of IT future. Governments and enterprises are realizing that by immigrating into the cloud they can significantly enhance their current infrastructure or application services with minimum cost and maximum elasticity. But securing cloud user digital assets and addressing privacy concerns of cloud costumers has become serious challenge. Providing security in cloud always has to consider performance. Employing high secure methods with massive complexity will increase overall service cost, to address this problem in this paper a two- tier security architecture is proposed. This architecture use multiple work mode for security components in guest level to decrease security process over-head and a security supervisory in hypervisor layer to make sure avoiding from false security alarms.
Index Terms - Component, Cloud, Security, Secure Sandbox, Cloud Security Architecture