Free Essay

Network Security

In:

Submitted By parthapratim89
Words 1065
Pages 5
EXECUTIVE SUMMARY

Selective forwarding or dropping of packets is a serious threat to multi hop communication in a Wireless Sensor Network (WSN). There are various schemes to induce cooperation in a WSN to overcome this problem. In this paper, we have introduced a novel adversary model and have proposed an incentive based scheme to inspire cooperation among nodes in a Geometric Structure based WSN. The scheme has been formally analyzed. The efficacy of the scheme is also established through various simulation experiments.

INTRODUCTION

Nodes in mobile ad-hoc networks are arbitrarily deployed without relying on any fixed network infrastructure. In a multi-hop wireless network, many pairs of nodes cannot communicate directly and must forward data to each other via one or more intermediate forwarding nodes.
Multi-hop communication is not an issue where nodes faithfully forward packets according to a global algorithm. Selfish nodes may like to send their own packets but may not be ready to relay packets for others since relaying packets for others consumes bandwidth and energy. This, in turn, decreases both individual and system throughput and might even lead to loss of connectivity in a network.
Hence, cooperation among the nodes needs to be enforced. The basic aim of any such mechanism is to force nodes to forward packets sent to it by other nodes. There are many proposed solutions which use game theoretic and graph theoretic notions to examine whether cooperation can exist in multi-hop communication while many solutions are proposed based on providing incentives. Incentives can be positive or negative. That is, a node can be made to cooperate within a network either by providing some incentive or by taking punitive actions against a node when its rate of packet forwarding falls below a particular value.

WORK DESCRIPTION

Ad hoc networks (also referred to as packet radio networks) consist of nodes that move freely and communicate with other nodes via wireless links. One way to support efficient communication between nodes is to develop wireless backbone architecture.
In all these papers, nodes are classified in two categories: TRUSTED those who forward packets and MALICIOUS, those who do not like to forward others’ packets. Moreover, malicious nodes, according to these papers are content by dropping packets to conserve their resources. In this paper, we have introduced two further dimensions to this misbehavior model. First, we introduced a ‘rational adversary’ category of nodes. ‘Rational adversary nodes’ do not mind dropping packets if they are not penalized for that. Second, we have incorporated an idea by which ‘malicious’ nodes inspire their neighboring nodes to drop packets.

In order to design backbone network Trusted nodes are elected to form the backbone. These nodes are called clusterheads and gateways. Clusterheads are nodes that are vested with the responsibility of routing messages for all the nodes within their cluster. Cluster heads may form a second tier network, i.e. making another level of hierarchy or they may just pass on the data to the base station. Gateway nodes are nodes at the fringe of a cluster and typically communicate with gateway nodes of other clusters. The wireless backbone can be used either to route packets, or to disseminate routing information, or both. Due to the mobility of nodes in an ad hoc network, the backbone must be continuously reconstructed in a timely fashion, as the nodes move away from their associated clusterheads.

For Leader election algorithm, I want to use generalized clustering heuristics like “Max-Min D-Cluster Formation” made cluster head formation with nodes at most D hops away from a cluster head. These were distributed leader election heuristic for an ad hoc network, guaranteeing that no node is more than D hops away from a leader, where D is a value selected for the heuristic. Thus, this heuristic extends the notion of cluster formation. Existing 1-hop clusters are an instance of the generic D-hop clusters. The proposed heuristic provides load balancing among clusterheads to insure a fair distribution of load among clusterheads. Additionally, the heuristic elects clusterheads in such a manner as to favor their re-election in future rounds, thereby reducing transition overheads when old clusterheads give way to new clusterheads. However, it is also fair as a large number of nodes equally share the responsibility for acting as clusterheads. Furthermore, this heuristic has time complexity of O (d) rounds which compares favorably to O (n) for earlier heuristics for large mobile networks. This reduction in time complexity is obtained by increasing the concurrency in communication.

BASIC IDEA

The heuristic runs for 2d rounds of information exchange. Each node maintains three arrays, WINNER, MAX-MIN-PAN and SENDER, each of size 2d node ids: one id per round of information exchange.

Every node transmits a MYID signal to all nodes in all direction. The MYID signal contains the Node Id of a node. This signal will get transmitted to all the nodes that are in the vicinity of the transmission range of that node. As the nodes complete sending MYID signal it will start receiving the MYID signal from the other nodes. As this is a distributed system, all nodes will be behave as a transmitter first for sending their own MYID signal, and next behave as a receiver to receive the MYID signal from the other nodes. For a time interval the nodes will wait to hear the MYID signal sent by others and once the interval is over, assimilate the node ids from which it has received the MYID signals. The node id list, from which it has received the MYID signal, becomes its neighbour node list. This way the number of neighbours for a node can be determined. Next every node computes a weighted value called PAN for itself.
PAN value can be calculated as follows.

PAN= [(Weight A) X (Power)] + [(Weight B) X Neighbours];

Power = residual battery energy
Neighbours = number of neighbours within the transmission distance of a node.
Weight A = 1% – 99%
Weight B = 99% - 1%

FLOW CHART

Propagate MYID and get the number of Neighbour

Calculate the PAN value for the individual node

Now simulate rounds of flooding algorithm FLOODMAX

If the power of the entire network falls below a threshold, we go for re-clustering.

One of the cluster is below threshold, we select successor

The Linking of Clusters

The determination of the Cluster Head

Now simulate rounds of flooding algorithm FLOODMIN

Similar Documents

Free Essay

Network Security

...Introduction: Network security is a complicated subject, historically only tackled by well-trained and experienced experts. Initial period of computing, when secured mainframes acted as central hosts and data repositories were accessed only by dumb terminal with limited rights, network security was all but irrefutable. As networks have become geographically more distributed and heterogeneous, however, the risk of their misuse has also increased. As more and more people become “wired”, a large number of people need to understand the basics of security in a networked world. Moreover, Network security is one of the most important part of the computer technology now a days. So now people are more aware about this kind of threat than ever before. They are learning about how to compute the security of a network and fix the common issues in order to have a secure network and trusted internet connection. These are few of the things that you should know very well before you deal with network system because it is save you a big pain later if you don’t know how to use. Some of the things that you can implement are the security principles, mange the security network, how to detect the intrusion in the system, windows and web security and also the most important; police security of network. The best way to prevent intrusion on a network is to read all the policies that show up several times on the system. You are downloading a best item, it doesn’t mean it is security risk free unless you...

Words: 272 - Pages: 2

Premium Essay

Network Security

...Nasario Birrueta IT 200: Milestone Three Network Security Network security is one of the most important aspects of implementing a fully functional working network, downtime caused by poor network security can cause major economic loses. The two matters that need to be addressed is the User and Physical equipment. Network security begins with the user. As such would implement a Network Use policy that the employee must sign and adhere to. The company network is to be used for work purposes only. All activity will be monitored and subjected to review by upper management. All users will use strong passwords that are at least 8 characters with upper case and at least one number and not to be shared not even to their immediate supervisors unless OK by IT and or upper management such as a VP or higher. All passwords will be monitored and subject to a monthly review and a password change. Users who do not need internet access will not have access to the internet, a warehouse employee would not need internet access to complete his job duties. But a purchasing employee would need to research for supply vendors that employee would need internet access. In a scenario where a warehouse employee needs internet access a password could be utilized that opens the internet for such these are often called Proxy server or a service that could be used is OpenDNS. At the network level all Personal computers will have the latest and greatest anti-virus software along with all...

Words: 569 - Pages: 3

Premium Essay

Network Security

...Network Security Clint Tipps September 21, 2014 ISSC340/ APUS Prof. Bryan Jensen Abstract This paper will cover several aspects of network security. Numerous different aspects of wired and wireless network security, including protocols applied to secure a network, penetration testing, digital forensics, and network hardening will be covered. There are numerous methods for providing security to a network, and even more to gain access to one. The challenge is to be one step ahead of anyone who may wish to penetrate the network. For this reason, many owners of large networks perform penetration testing in order to identify potential holes in their network. If malicious activity is detected, using digital forensics can help identify where the attack came from. This would, in turn, lead to a network engineer to harden the network against the identified threat. Network Security Over the last decade, computer systems have increased in speed and capacity while decreasing in price. Computers that where once used in corporate environments are now less powerful than a typical household computer. While this sea change occurred, network communications have grown and improved, to allow computers to communicate easily from remote locations, adding vast opportunities for illegal activities. Data can maliciously be changed or destroyed, systems can be made to malfunction and long distance charges can be avoided. One of the biggest challenges today is to control the security of the...

Words: 3488 - Pages: 14

Free Essay

Network Security

...Network Security Network Security The field of network security is a very dynamic, and highly technical field dealing with all aspects of scanning, hacking and securing systems against intrusions. There are many positions related to this, however the most common would be that of a Network Security Engineer, a Security Research Analyst, a Penetration tester, and an Incident Investigator. All four of these jobs have salaries starting in the forty to fifty thousand annually range, and can grow well past the one-hundred thousand mark, depending on skill and experience. A Network Security Engineer is responsible for end-user support for general security related issues, as well as enforcement of the local security policy. They are also typically responsible for performing ongoing security scans to ensure that the System Administrators are keeping their systems up-to-date and secure. A Security Research Analyst is someone who performs research in the field of network security to devise new weaknesses and vulnerabilities, as well as new methods of intercepting and preventing system compromises. They will also typically develop applications to employ the data they have gathered. Another position, the Penetration Tester, is someone who scans networks and/or hosts for vulnerabilities, and then reports on these vulnerabilities to show how they could break into a computer system or network. This information helps the Network Security Engineers to keep their systems secured. The last position...

Words: 305 - Pages: 2

Free Essay

Network Security

...Case Study: Network Security Computer networks of every company have the potential to be exposed to dangers that have the potential to do great harm. Individuals could gain access to Windows and Unix/Linux servers to exploit the company’s vulnerabilities. Computer networks are not only vulnerable to outsiders, but employees also have the opportunity to compromise the system. An unprotected network would open the door for malicious activity that could damage the company’s system, compromise company and customer information, and cost a great amount of precious time and money. A breach in the network could have a negative impact on finances, privacy, and information. Securing the Windows and Unix/Linux servers within a company from shortcomings and vulnerabilities to potential threats by both outsiders and insiders is an absolute necessity. This is achieved by using technical measures and enforcing security policies. One reason it is important to secure the servers is potential of the insider threat. With 1,500 employees, the chance of an attack from the inside is elevated. The threat could come in the form of a disgruntled employee, by someone looking for gain, or by someone who unknowingly compromises the system. Conklin and White (2010) stated the following: One of the hardest threats that security professionals will have to address is that of the insider. Since employees already have access to the organization and its assets, additional mechanisms need to be in place to detect...

Words: 647 - Pages: 3

Premium Essay

Network Security

...this exploitation, companies subject themselves to lawsuits from their own customers. These companies often are ignorant of the simple fact that they have been exploited until customers report the issues to these companies and corporations. Many times, more than thirty days goes by before someone alerts the company of a possible security breech. Cost of an electronic exploit can be greater than a million dollars per incident as reported by the FBI. This information is found in the FBI’s (Federal Bureau of Investigation) report of cyber threats in the United States. In order to help counterbalance this, smaller to midsized companies could spend less than $5,000 to harden their systems and operating systems to put a statefull firewall in place. As stated in this paper, these companies often lack the resources, materials and funds to do so. With the FBI report showing reported incidents, there are thousands of incidents that go unreported. Often these incidents are yet to be discovered. With this number of small to mid-size corporations ignoring or slowly implementing security measures, more and more electronic computer crimes are beginning to take place throughout the U.S. With extortion now moving into the digital age, many corporations do not report intrusions to law enforcement in order to avoid negative publicity. Reports of an intrusion could directly have a negative effect on the company’s sales and position in a global competitive market. Approximately 35% of...

Words: 2166 - Pages: 9

Premium Essay

Network Security

...FLORIDA INSTITUTE OF TECHNOLOGY Proactive vs. Reactive Network Security Making Your Network Unassailable A SHORT PAPER ASSIGNMENT THREE SUBMITTED TO: IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR CYB 5275: ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA FEBRUARY 1ST 2013 Information Systems security has never been more critical around the world than it is today. Demand for new improved services has become intense causing enterprises to reinvent their infrastructures by erasing traditional network boundaries. The cyber security threat lurking outside those boundaries is causing security analyst to rethink their views on network security. As the BYOD (bring your own devices) and cloud computing trend becomes more commonplace, security by exclusion by attempting to maintain hard perimeters is no longer a viable option. As the number of network devices continues to increase, the number of vulnerabilities also increases as well. As more and more organizations continue to be overwhelmed by cyber attacks it will become evident that the current strategy of responding to attacks no longer works. To be affective analyst will have to change their strategy from a reactive to a proactive state. References Baker, SA and Dunlap, CJ Jr, (1 May 2012) ‘What is the Role of Lawyers in Cyberwarfare?’ http://www.abajournal.com/m...

Words: 394 - Pages: 2

Premium Essay

Network Security

...FLORIDA INSTITUTE OF TECHNOLOGY CYBER SECURITY WITHOUT CYBER WAR U.S. Military vs. International Law Perspective A SHORT PAPER ASSIGNMENT TWO SUBMITTED TO: IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR CYB 5275: ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that favor...

Words: 1872 - Pages: 8

Premium Essay

Network Security

...Importance of Security The Internet has undoubtedly become the largest public data network, enabling and facilitating both personal and business communications worldwide. The volume of traffic moving over the Internet, as well as corporate networks, is expanding exponentially every day. More and more communication is taking place via e-mail; mobile workers, telecommuters, and branch offices are using the Internet to remotely connect to their corporate networks; and commercial transactions completed over the Internet, via the World Wide Web, now account for large portions of corporate revenue. While the Internet has transformed and greatly improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats from which corporations must protect themselves. Although network attacks are presumably more serious when they are inflicted upon businesses that store sensitive data, such as personal medical or financial records, the consequences of attacks on any entity range from mildly inconvenient to completely debilitating—important data can be lost, privacy can be violated, and several hours, or even days, of network downtime can ensue. Despite the costly risks of potential security breaches, the Internet can be one of the safest means by which to conduct business. For example, giving credit card information to a telemarketer over the phone or a waiter in a restaurant can be more risky than submitting the...

Words: 3895 - Pages: 16

Premium Essay

Network Security

...[pic] [pic] |School of Science and Technology | |Department of Information Technology | |ISSC361: IT Security: Information Assurance | |3 Credit Hours | |8 Week Course | |Prerequisite(s) :None | |Table of Contents | |Instructor Information |Evaluation Procedures | |Course Description |Grading Scale | |Course Scope |Course Outline | |Course Objectives |Policies | |Course Delivery Method |Academic Services | |Resources |E-Book Links | |Instructor Information ...

Words: 4918 - Pages: 20

Premium Essay

Network Security

...Phase 2 Discussion Board CSS200-14002B-02 Principles of Network Security Chris Balla May 28, 2014 For the scenario provided in our discussion board for this week, I have decided to go with a choke point firewall strategy. This type of firewall seems to be less expensive than the other types of systems. It forces all of the network traffic through a single pathway. It also controls authentication as well as user activity. No data can pass through the choke point without being checked. This type of firewall can provide a single point of contact between our network and the internet; thereby giving the company more control over the data which can be permitted in and out of the internal network. Multiple choke points may also have to be used as well. The drawback to this type of firewall is that the choke point has to be very difficult in order for a hacker to bypass. Routers as well as switches can also be used to monitor the pathway. This type would evaluate and authenticate the network data, which is what the organization wants. I also considered the least privilege type of firewall as well. This would cause more administrative work but would ensure that users would only have the access needed in order to perform their job duties. The best way to accomplish this would be to group all of the users based on their access level or job descriptions. Doing this would also cut down on the amount of administrators needed to control the system. Administrator...

Words: 416 - Pages: 2

Premium Essay

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you complete...

Words: 15367 - Pages: 62

Premium Essay

Network Security

...1) Construct networks using different types of network devices HUB Hub is one of the basic icons of networking devices which works at physical layer and hence connect networking devices physically together. Hubs are fundamentally used in networks that use twisted pair cabling to connect devices. They are designed to transmit the packets to the other appended devices without altering any of the transmitted packets received. They act as pathways to direct electrical signals to travel along. They transmit the information regardless of the fact if data packet is destined for the device connected or not.   Switches Switches are the linkage points of an Ethernet network. Just as in hub, devices in switches are connected to them through twisted pair cabling. But the difference shows up in the manner both the devices; hub and a switch treat the data they receive. Hub works by sending the data to all the ports on the device whereas a switch transfers it only to that port which is connected to the destination device.  A switch does so by having an in-built learning of the MAC address of the devices connected to it. Since the transmission of data signals are well defined in a switch hence the network performance is consequently enhanced. Switches operate in full-duplex mode where devices can send and receive data from the switch at the simultaneously unlike in half-duplex mode. The transmission speed in switches is double than in Ethernet hub transferring a 20Mbps connection into...

Words: 1799 - Pages: 8

Premium Essay

Network Security

...Cellular Debate Name Course Date Tutor Network Security Issues on Cellular Network One major advantage of Cellular network security is the ability of communication to be done “Wirelessly” (Xiao et al, 2007). This means that the signals do not follow a specific assigned signal path which may be destroyed by vandals or even by nature, as in case of copper conductors or other physical media such as fiber optic. In addition, data security is enhanced by used of packed switched data in which data is send in form of packets and at no particular order only to be reconstructed at the receiver which makes intercepting such messages cumbersome. In addition, user authentication allows only specific users registered to a specific cellular service provider to use their resources thus allow proper billing to be charged according to the usage of the network(Xiao et al, 2007). A security issue that arises from the use of the cellular networks is subscriber authentication. These systems consist of a large number of subscribers who need to be identified and verified before they can enjoy the services offered by the provider. If authentication is not properly done, then the network is vulnerable to misuse by subscribers not entitled to use the network leading to the service provider incurring losses. Confidentiality is another security issue that can be noted in cellular network (Ciampa, 2009). This is because the ‘air’ channel can be intercepted by malicious people and...

Words: 785 - Pages: 4

Free Essay

Network Security

...Client/server Networks Professor: Karen Lederer Trevor Kale 4/16/2011 We shall discuess the difference between Peer-to-Peer networks and the Client/Server networks. First we need to describe how each one operates in order to view the differences between both. First we will describe a Peer-to-Peer network. In the Peer-to-Peer network every computer can communicate directly with every other computer.(2009, Dean, Pg.3) Because of this setup no one computer has more authority then another one on the network. Each person on the network can set their access and restrictions for other users to their computer. These configurations are simple to configure and due to the simplisity they do not require a great technical expertise. They also tend to be cheaper due to lack of need of equipment to establish this network. Some disadvantages consist of not being flexible, that is as they grow they become more difficult to handle. Security on these networks is very lacking due to ease of access of unauthorized access. They are also not very practical due to the lack of centralized resources requires a user to have their terminal on in order to access their resources. That is the basics of a Peer-to-Peer network setup, next we move on to the Client/Server model. In a Client/Server network a centralized computer known as a server facilitates communication between other computers on the network known as clients. For a computer to function as a server they must be running an Network Operating...

Words: 478 - Pages: 2