International Journal of Computer Networks and Communications Security

Volume 2, Issue 10, October 2014




SecTORA: Empowerment of TORA Protocol to Deal with the Elimination of Data Packets by Intruder Nodes

Pages: 339-347 (9) | [Full Text] PDF (334 KB)
Farzad Moradi
Saghez Branch, Islamic Azad University, Saghez, Iran

Abstract -
One of the attacks that the intruder nodes carry out by penetrating the network is eliminating the data packets, which results in impairing the network efficiency. The method introduced in this paper aims at detecting this attacks and decreasing their effects. The new method is peculiar to those networks which enjoy TCP protocol in their transmission layer. In the present paper one of the famous routing protocols in ad hoc networks, TORA protocol, was studied and the proposed method was implemented on it. A new protocol, called SecTORA, was introduced by changing basic TORA algorithm, which offered two new characteristics: (1) It discovered the routes with intruder nodes by benefiting from the retransmitting characteristic of TCP protocol and the sequence number field in the TCP packet header, (2) It lessened the harmful effects of intruder nodes on omitting the data packets by sending data packets through main and backup paths interchangeably. The simulations carried out showed that the SecTORA protocol was 17.4 percent more efficient than TORA in the networks intruded by attackers; but, this efficiency was 1.47 percent less for the networks which had not been intruded.
Index Terms - Ad hoc Networks, Routing Protocols, TORA

A Mat-Lab based Filter for curtailing Interferences in Ad-Hoc Network

Pages: 348-354 (7) | [Full Text] PDF (594 KB)
Department of Electrical & Electronics Engineering, East West University, Dhaka.

Abstract -
A wireless ad-hoc network is a new archetype in wireless communication which doesn’t require any fixed infrastructure such as base stations or mobile switching center. Reducing interference is one of the main challenges in wireless ad hoc networks. The main aim of this thesis is to study various issues pertaining to wireless ad-hoc network and find ways to diminish the interference effect in this network. Starting with basic knowledge of ad-hoc networks, its applicability, security issues, and this thesis digs into details of existing research works in minimization of interference effect in ad-hoc network. Next the thesis work focuses on new ways to diminish the interference effect in ad-hoc network. A new solution is recommended to achieve our main goal which is both cost effective and simple. It is observed that the proposed minimization technique is an effective one.
Index Terms - Enfumble average, Ad-hoc, Base station, Interference, Minimization

Application of wireless sensor network to make transportation fleet information systems smart

Pages: 355-360 (6) | [Full Text] PDF (667 KB)
Mechanical engineering in Bu-Ali Sina University , Hamadan, Iran
Faculty of electrical and computer engineering, University of Tabriz, Tabriz, Iran

Abstract -
Traffic signs are tools to control and regulate movement, on streets and crossings. These signs individually play their own essential role in reducing accidents and securing traffic. Unfortunately, thieves steal these signs on suitable occasions to sell them as scrape in black market. Wireless sensor systems are of desirable features including independence, being capable of expanding in remote and inconsistent places. They may be assigned such operations as supervising traffic signs. This essay aims at study of some hierarchical routing protocols or static cluster, introducing a new protocol through which we focus on clustering special nodes having no-battery in contrast to ordinary nodes. The result is to obtain network more stability and optimal energy consumption. The new protocol was tested on real characteristics of more than 600 traffic signs in the city of Hamedan, run in MTALAB software. The findings are examined here.
Index Terms - Wireless Sensor Networks, Routing Protocols, Static Clustering, Optimal Energy Consumption, Life Cycle of the Network, MATLAB

Design and Evaluation of a new Banking Interface System Based on Wireless Networks in Referral Customers to the Bank to Increase Customer Satisfaction

Pages: 361-365 (5) | [Full Text] PDF (315 KB)
Reza Mohamaddoust
Department of IT Engineering, Payame Noor University (PNU), IRAN

Abstract -
Electronic banking reduced customers referring to the bank in person, but still some banking process needs the customer presence. This matter is wasting customers time and it can cause overhead costs for banks. Therefore, this study is introducing a banking system interfaces based on wireless networks which will be reduce customers in-person visits. These systems reduce the waiting time of customers in the personal referrals and increase employees productivity. It uses the structures of the wireless communication system based on wireless sensor networks or local wireless networks .In its simplest form, this system is implemented as mobile phone software. The results of the assessment show that this system also reduces customer waiting time. Reduce the overhead costs of banks Significantly reduce the amount of manual data entry by employees, accelerate service delivery and maximize coordination among employees more accurate prediction of customer waiting time and the reduction of human errors. The results of comparing these kinds of systems show that the proposed system is reducing common weaknesses that are used in current methods in the customers personal referrals to the bank.
Index Terms - Wireless Sensor Networks, Systems Interface Banking, E-Banking

A Cross Layer Autonomic Enabled Architecture for VANETs

Pages: 366-373 (8) | [Full Text] PDF (410 KB)
Electrical and Computer Engineering Faculty, Shahid Beheshti University, Tehran, IRAN

Abstract -
Similar to other ad hoc networks, VANETs need to change and adapt to their surrounding environment. Having various internal and external facilities to change network structure and parameters, VANETS are a good target for self-adaptive and self-managing systems. In order to achieve an autonomic system, selfmanagement should be implemented in the system architecture. To address the autonomic management issues there is a need for a holistic architecture that works without considering predefined constraints and problem conditions. In this paper we present an autonomic enabled architecture using new component which enables cross layer connections. In this architecture we have customized elements of MAPE-K loop, namely Touchpoint and Knowledge, to enhance its applicability in vehicular ad hoc networks. By customizations in the concept of Touchpoint, our presented architecture supports the extraction of data from the cross layer connections between non-neighbors layers, In addition to the layers and their parameters. Furthermore we have classified the knowledge elements of MAPE-K loop in VANETs and described the role and usage of these elements. The applicability of this architecture is verified through simulation of two scenarios by in-team developed simulator. Simulation results show the applicability of the proposed architecture for VANETs in different situations.
Index Terms - Autonomic Computing, VANET, Cross Layard Architecture, MAPE-K loop, Touchpoint, Intelligent Bus