全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

The Study of Secure Congestion Control for TCP in Ad Hoc Networks

DOI: 10.4236/jis.2018.91003, PP. 25-32

Keywords: Congestion Control, Average Queue Length, Security, Session Keys

Full-Text   Cite this paper   Add to My Lib

Abstract:

Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic congestion control method of the selection of a secure path. By estimating the average queue length at the nodes, the congestion level at present is detected. If the occurrence of the possible congestion is predicted, the network will select a new path where all nodes have been certified as trusted nodes, generating session keys in the TCP three-way handshake to prevent the denial of service attacks. Simulation results show that the new algorithm is superior to TCP Reno algorithm in terms of security, packets loss rate, throughput, and end-to-end delay.

References

[1]  Gutub, A.A. (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh, Saudi Arabia, May 2015, 1528-1537.
[2]  Alharthi, N. and Gutub, A. (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research, 2, 9-18.
https://doi.org/10.20448/808.2.1.9.18
[3]  Al-Otaibi, N.A. and Gutub, A.A. (2014) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers. Lecture Notes on Information Theory, 2, 151-157.
https://doi.org/10.12720/lnit.2.2.151-157
[4]  Aljuaid, N. and Gutub, A. (2014) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), Dubai UAE, 25-26 December 2014, 250-256.
[5]  Dife, W. and Hellman, M.E. (2006) New Directons in Cryptography. In IEEE Transacton on Informaton Theory, IT-22, Nov. 2006, 644-654.
[6]  Marti, S., Giuli, T.J. and Lai, K. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In ACM Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, USA, 06-11 August 2000, 255-265.
https://doi.org/10.1145/345910.345955
[7]  Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. (2009) Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. Multimedia Systems, 15, 273-282.
https://doi.org/10.1007/s00530-009-0166-0
[8]  Shakshuki, E.M., Kang, N. and Sheltami, T.R. (2013) EAACK a Secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics, 60, 1089-1098.
https://doi.org/10.1109/TIE.2012.2196010
[9]  Soleimani, M.T. and Kahvand, M. (2014) Defending Packet Dropping Attacks Based on Dynamic Trust Model in Wireless Ad Hoc Networks. In IEEE 17th Mediterranean Electrotechnical Conference (MELECON), Beirut, Lebanon, 13-16 April 2014, 362-366.
https://doi.org/10.1109/MELCON.2014.6820561
[10]  Xu, W.Q., Wang, Y.M., Yu, C.H., et al. (2000) Cross-Layer Optimal Congestion Control Scheme in Mobile Ad Hoc Networks. Journal of Software, 21, 1667-1678.
[11]  Ghosh, U. and Data, R. (2012) A Novel Signature Scheme to Secure Distributed Dynamic Address Configuration Protocol in Mobile Ad Hoc Networks. In IEEE WCNC, 2700-5, Apr. 2012.
[12]  Ramakrishnan, K.K., Floyd, S., Black, D. and Ramakrishnan, G.K. (2001) The Addition of Explicit Congeston Notificaton (ECN) to ip. RFC Editor, USA, 3186. 2001.
[13]  DARPA (2014) The Network Simulator-NS2.
http://www.isi.edu/nsnam/ns/index.html

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133