Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (71)

Search Parameters:
Keywords = media access control (MAC)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 861 KiB  
Article
A Collision Avoidance MAC Protocol with Power Control for Adaptive Clustering Underwater Sensor Networks
by Libin Xue, Hong Lei and Rongxin Zhu
J. Mar. Sci. Eng. 2025, 13(1), 76; https://doi.org/10.3390/jmse13010076 - 4 Jan 2025
Cited by 1 | Viewed by 961
Abstract
Underwater sensor networks (UWSNs) play a vital role in marine exploration and environmental monitoring. However, due to the characteristics of underwater acoustic channels such as high delay, low bandwidth, and energy limitation, the design of an underwater media access control (MAC) protocol has [...] Read more.
Underwater sensor networks (UWSNs) play a vital role in marine exploration and environmental monitoring. However, due to the characteristics of underwater acoustic channels such as high delay, low bandwidth, and energy limitation, the design of an underwater media access control (MAC) protocol has brought great challenges, and existing MAC protocol designs rarely consider the influence of channel interference factors in networking. Therefore, this paper proposes a collision avoidance MAC protocol for clustering underwater sensor networks. The protocol first classifies users by combining the channel characteristics of underwater nodes and the distance measurement between nodes. Then, based on the clustering network, according to the channel correlation distance measurement between nodes and the communication range of the cluster head (CH), the transmit power in clusters is controlled to reduce the lifetime of the network based on the cumulative reduction in node power consumption. Finally, the cluster structure in each cluster is used to schedule the transmission of member nodes in the cluster, and at the same time, the energy consumption of nodes is reduced while multi-node collision-free transmission is realized. The simulation results show that the throughput of the proposed adaptive power control clustering MAC protocol (APCC-MAC) is 26.5% and 19.5% higher than that of packet-level slot scheduling (PLSS) algorithm and Cluster-Based Spatial–Temporal Scheduling (CSS) algorithm, respectively, providing better communication performance and stability for clustered underwater acoustic networks. Full article
(This article belongs to the Special Issue Intelligent Approaches to Marine Engineering Research)
Show Figures

Figure 1

20 pages, 2647 KiB  
Article
Research on Distributed Secure Storage Framework of Industrial Internet of Things Data Based on Blockchain
by Hongliang Tian and Guangtao Huang
Electronics 2024, 13(23), 4812; https://doi.org/10.3390/electronics13234812 - 6 Dec 2024
Cited by 1 | Viewed by 1320
Abstract
The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based on blockchain for IIoT data. The authors first introduce the [...] Read more.
The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based on blockchain for IIoT data. The authors first introduce the two-layer framework, which includes the edge network layer and the blockchain storage layer. The nodes in the edge network layer are classified into administrator nodes and ordinary nodes. It provides a lower latency network environment compared to cloud computing to preprocess raw industrial data. The blockchain storage layer provides storage space to keep data secure and traceable. Secondly, the authors propose a differentiated storage solution. Based on the timestamps of industrial data and the specific media access control (MAC) address, the Universally Unique Identifier (UUID) of the raw data is generated and uploaded to the blockchain for secure storage. Encrypt the corresponding raw data using the elliptic curve cryptography algorithm, and then upload it to InterPlanetary File System (IPFS) to expand the storage capacity of the blockchain. Deploy a smart contract on the blockchain to compare UUIDs for consistency in an automated, lightweight method to determine data integrity. Finally, we analyze the advantages brought by the integration of blockchain and IIoT. Additionally, the authors design comparative tests on different storage methods. The results prove that the security of this paper’s scheme is improved, and the storage performance is extended. Noteworthy enhancements include heightened throughput of data uploaded to the blockchain and minimized delay overhead. Full article
Show Figures

Figure 1

24 pages, 4889 KiB  
Article
SSH-MAC: Service-Aware and Scheduling-Based Media Access Control Protocol in Underwater Acoustic Sensor Network
by Hongyu Zhao, Huifang Chen and Lei Xie
Remote Sens. 2024, 16(15), 2718; https://doi.org/10.3390/rs16152718 - 24 Jul 2024
Cited by 1 | Viewed by 1121
Abstract
In the framework of the space-air-ground-ocean integrated network, the underwater acoustic sensor network (UASN) plays a pivotal role. The design of media access control (MAC) protocols is essential for the UASN to ensure efficient and reliable data transmission. From the perspective of differentiated [...] Read more.
In the framework of the space-air-ground-ocean integrated network, the underwater acoustic sensor network (UASN) plays a pivotal role. The design of media access control (MAC) protocols is essential for the UASN to ensure efficient and reliable data transmission. From the perspective of differentiated services in the UASN, a service-aware and scheduling-based hybrid MAC protocol, named the SSH-MAC protocol, is proposed in this paper. In the SSH-MAC protocol, the centralized scheduling strategy is adopted by sensor nodes with environmental monitoring service, and the distributed scheduling strategy is adopted by sensor nodes with target detection service. Considering the time-varying data generation rate of sensor nodes, the sink node will switch the scheduling mode of sensor nodes based on the specific control packet and adjust the resource allocation ratio between centralized scheduling and distributed scheduling. Simulation results show that the performance of the SSH-MAC protocol, in terms of utilization, end-to-end delay, packet delivery ratio, energy consumption, and payload efficiency, is good. Full article
Show Figures

Graphical abstract

21 pages, 1684 KiB  
Article
A State-Interactive MAC Layer TDMA Protocol Based on Smart Antennas
by Donghui Li, Jin Nakazato and Manabu Tsukada
Electronics 2024, 13(11), 2037; https://doi.org/10.3390/electronics13112037 - 23 May 2024
Cited by 1 | Viewed by 1619
Abstract
Mobile ad hoc networks are self-organizing networks that do not rely on fixed infrastructure. Smart antennas employ advanced beamforming technology, enabling ultra-long-range directional transmission in wireless networks, which leads to lower power consumption and better utilization of spatial resources. The media access control [...] Read more.
Mobile ad hoc networks are self-organizing networks that do not rely on fixed infrastructure. Smart antennas employ advanced beamforming technology, enabling ultra-long-range directional transmission in wireless networks, which leads to lower power consumption and better utilization of spatial resources. The media access control (MAC) protocol design using smart antennas can lead to efficient usage of channel resources. However, during ultra-long-distance transmissions, there may be significant transport delays. In addition, when using the time division multiple access (TDMA) schemes, it can be difficult to manage conflicts arising from adjacent time slot advancement caused by latency compensation in ultra-long-range propagation. Directional transmission and reception can also cause interference between links that reuse the same time slot. This paper proposes a new distributed dynamic TDMA protocol called State Interaction-based Slot Allocation Protocol (SISAP) to address these issues. This protocol is based on slot states and includes TDMA frame structure, slot allocation process, interference self-avoidance strategy, and slot allocation algorithms. According to the simulation results, the MAC layer design scheme suggested in this paper can achieve ultra-long-distance transmission without conflicts. Additionally, it can reduce the interference between links while space multiplexing. Furthermore, the system exhibits remarkable performance in various network aspects, such as throughput and link delay. Full article
(This article belongs to the Special Issue Recent Advances in Wireless Ad Hoc and Sensor Networks)
Show Figures

Figure 1

18 pages, 4049 KiB  
Article
Research on Hybrid Relay Protocol Design and Cross-Layer Performance Based on NOMA
by Zhixiong Chen, Tianshu Cao, Pengjiao Wang and Junhao Feng
Appl. Sci. 2024, 14(7), 3044; https://doi.org/10.3390/app14073044 - 4 Apr 2024
Cited by 2 | Viewed by 1301
Abstract
Wireless and power line communication hybrid relay technology can realize complementary advantages and comprehensively improve the communication coverage and performance of power Internet of Things. In order to study the mechanism of the physical layer and Media Access Control (MAC) layer algorithm that [...] Read more.
Wireless and power line communication hybrid relay technology can realize complementary advantages and comprehensively improve the communication coverage and performance of power Internet of Things. In order to study the mechanism of the physical layer and Media Access Control (MAC) layer algorithm that affects the performance of hybrid relay systems, the cross-layer performance modeling, optimization, and simulation analysis are carried out for the non-orthogonal multiple access (NOMA) technology. Firstly, a two-hop NOMA media access control protocol is designed based on the CSMA algorithm. Considering the effects of non-ideal channel transmission at the physical layer and competitive access at the MAC layer on the system performance, a cross-layer performance analysis model of hybrid wireless and power line communication relay system under NOMA is established. Finally, a cross-layer optimization model based on multi-objective programming is established for the hybrid relay system. By analyzing the relationship between transmitting power and performance index, the joint optimization of transmitting power and power distribution factor between users is realized. Simulation results verify the validity and reliability of the proposed cross-layer model. The results show that the hybrid relay algorithm combined with NOMA and CSMA can effectively improve the performance of the system throughput, packet loss probability, and delay. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
Show Figures

Figure 1

3 pages, 458 KiB  
Abstract
An Autonomous Multi-Technological LoRa Sensor Network for Landslide Monitoring
by Mattia Ragnoli, Paolo Esposito, Gianluca Barile, Giuseppe Ferri and Vincenzo Stornelli
Proceedings 2024, 97(1), 11; https://doi.org/10.3390/proceedings2024097011 - 13 Mar 2024
Viewed by 1248
Abstract
Hazards like landslides have significant economic and societal repercussions; hence, the issue of remote structure health monitoring has grown in significance for geologic applications. Wireless sensor networks (WSNs) stand out among the new sensing architectures as a particularly well-suited solution, thanks to the [...] Read more.
Hazards like landslides have significant economic and societal repercussions; hence, the issue of remote structure health monitoring has grown in significance for geologic applications. Wireless sensor networks (WSNs) stand out among the new sensing architectures as a particularly well-suited solution, thanks to the versatility they offer. This research, necessary for safety reasons, predictive maintenance and emergency evacuation, presents a WSN-based landslide monitoring system with multi-technology sensor implementation. Its goal is to track the land movements on a hillside. The network is composed of long range (LoRa) sensor nodes connected using a LoRaWAN media access control (MAC) layer. The nodes are several and of different natures and help monitor land movements, hydric parameters and rockfall events, and they also offer a camera view of the landslide in case of an emergency. The system is built on an Internet of Things (IoT) framework, enabling online access to data and reports. The final work will include a system description of the hardware and functionality of all the devices, a description of the web section for remote monitoring, a power analysis and statistics from actual scenarios. Full article
(This article belongs to the Proceedings of XXXV EUROSENSORS Conference)
Show Figures

Figure 1

25 pages, 12662 KiB  
Article
A Self-Localization Algorithm for Mobile Targets in Indoor Wireless Sensor Networks Using Wake-Up Media Access Control Protocol
by Rihab Souissi, Salwa Sahnoun, Mohamed Khalil Baazaoui, Robert Fromm, Ahmed Fakhfakh and Faouzi Derbel
Sensors 2024, 24(3), 802; https://doi.org/10.3390/s24030802 - 25 Jan 2024
Cited by 9 | Viewed by 1937
Abstract
Indoor localization of a mobile target represents a prominent application within wireless sensor network (WSN), showcasing significant values and scientific interest. Interference, obstacles, and energy consumption are critical challenges for indoor applications and battery replacements. A proposed tracking system deals with several factors [...] Read more.
Indoor localization of a mobile target represents a prominent application within wireless sensor network (WSN), showcasing significant values and scientific interest. Interference, obstacles, and energy consumption are critical challenges for indoor applications and battery replacements. A proposed tracking system deals with several factors such as latency, energy consumption, and accuracy presenting an innovative solution for the mobile localization application. In this paper, a novel algorithm introduces a self-localization algorithm for mobile targets using the wake-up media access control (MAC) protocol. The developed tracking application is based on the trilateration technique with received signal strength indication (RSSI) measurements. Simulations are implemented in the objective modular network testbed in C++ (OMNeT++) discrete event simulator using the C++ programming language, and the RSSI values introduced are based on real indoor measurements. In addition, a determination approach for finding the optimal parameters of RSSI is assigned to implement for the simulation parameters. Simulation results show a significant reduction in power consumption and exceptional accuracy, with an average error of 1.91 m in 90% of cases. This method allows the optimization of overall energy consumption, which consumes only 2.69% during the localization of 100 different positions. Full article
Show Figures

Figure 1

25 pages, 7811 KiB  
Article
A Multichannel MAC Protocol without Coordination or Prior Information for Directional Flying Ad hoc Networks
by Shijie Liang, Haitao Zhao, Jiao Zhang, Haijun Wang, Jibo Wei and Junfang Wang
Drones 2023, 7(12), 691; https://doi.org/10.3390/drones7120691 - 29 Nov 2023
Cited by 6 | Viewed by 2360
Abstract
Achieving neighbor discovery for a directional flying ad hoc network (FANET) with multiple channels poses challenges for media access control (MAC) protocol design, as it requires simultaneous main lobe and channel rendezvous while dealing with the high UAV mobility. In order to achieve [...] Read more.
Achieving neighbor discovery for a directional flying ad hoc network (FANET) with multiple channels poses challenges for media access control (MAC) protocol design, as it requires simultaneous main lobe and channel rendezvous while dealing with the high UAV mobility. In order to achieve fast neighbor discovery for initial access without coordination or prior information, we first establish the theoretical supremum for the directional main lobe. Then, to achieve the supremum, we introduce the BR-DA and BR-DA-FANET algorithms to respectively establish the supremum on rendezvous between a pair of UAVs’ main lobes and rendezvous of main lobes for all UAVs in the FANET. To further accelerate the neighbor discovery process, we propose the neighbor discovery with location prediction protocol (ND-LP) and the avoiding communication interruption with location prediction (ACI-LP) protocol. ND-LP enables quick main lobe rendezvous and channel rendezvous, while ACI-LP enables beam tracking and channel rendezvous together with the avoidance of communication interruptions. The simulation results demonstrate that the proposed protocols outperform the state-of-the-art works in terms of neighbor discovery delay. Full article
(This article belongs to the Special Issue Wireless Networks and UAV)
Show Figures

Figure 1

22 pages, 2798 KiB  
Article
Toward Secure and Resilient Networks: A Zero-Trust Security Framework with Quantum Fingerprinting for Devices Accessing Network
by Bassfar Zaid, Ashar Sayeed, Priti Bala, Ali Alshehri, Abdulaziz Mohammed Alanazi and Swaleha Zubair
Mathematics 2023, 11(12), 2653; https://doi.org/10.3390/math11122653 - 10 Jun 2023
Cited by 6 | Viewed by 3890
Abstract
The importance of network security has increased with the emergence of networked systems in contemporary computing, making it an essential aspect of protecting digital assets and safeguarding against cyber threats. The current security mechanisms, which rely on cryptographic keys, may be susceptible to [...] Read more.
The importance of network security has increased with the emergence of networked systems in contemporary computing, making it an essential aspect of protecting digital assets and safeguarding against cyber threats. The current security mechanisms, which rely on cryptographic keys, may be susceptible to a number of attacks, such as media access control (MAC) spoofing, which might provide unauthorized users access to network resources. This study introduces a new approach, namely a zero-trust security framework with quantum fingerprinting for devices accessing a network, that utilizes quantum technology to protect networks from security threats and intruders. The proposed architecture relies on quantum fingerprinting to authenticate devices trying to access the network, and it is built on the zero-trust security concept. The framework is intended to offer a thorough, multi-layered approach to network security that may change in response to evolving security risks and specifications. By protecting against MAC spoofing and other types of device impersonation, the adoption of quantum fingerprinting adds another degree of protection. The proposed framework may be used to construct a reliable and scalable network security solution in different network environments. Full article
(This article belongs to the Special Issue Feature Papers in Complex Networks and Their Applications)
Show Figures

Figure 1

27 pages, 766 KiB  
Article
A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks
by Maochun Zheng, Wei Ge, Xiao Han and Jingwei Yin
J. Mar. Sci. Eng. 2023, 11(4), 802; https://doi.org/10.3390/jmse11040802 - 9 Apr 2023
Cited by 3 | Viewed by 1890
Abstract
The large propagation delay in underwater acoustic networks results in spatial and temporal uncertainty between communication links. This uncertainty, in turn, leads to problems with spatial unfairness and packet collision in media access control (MAC) solutions. To address these issues, this research paper [...] Read more.
The large propagation delay in underwater acoustic networks results in spatial and temporal uncertainty between communication links. This uncertainty, in turn, leads to problems with spatial unfairness and packet collision in media access control (MAC) solutions. To address these issues, this research paper proposes a spatially fair and low-conflict media access control (SFLC-MAC) protocol. Within the protocol, a contention window spatial fairness adjustment strategy is designed, including random and fair states. Nodes autonomously adjust their contention states based on the perceived network information. Nodes in the fair state increase their listening time to ensure that nodes in the random state can successfully access the channel, thereby overcoming the fairness issues in channel access. A method based on postponing data packet transmission is proposed to avoid collisions between data packets and neighbors’ control packets. By scrutinizing the spatio-temporal constraints pertinent to these conflicts, the exact duration of the delay required for this method is ascertained. Simulation results demonstrate that SFLC-MAC effectively improves network throughput, reduces end-to-end delay, decreases network energy consumption, and enhances channel access fairness among nodes. Full article
(This article belongs to the Special Issue Underwater Acoustic Communication and Network)
Show Figures

Figure 1

16 pages, 5983 KiB  
Article
A Versatile Resilience Packet Ring Protocol Model for Homogeneous Networks
by Tayyeba Minhas, Shawal Khan, Farrukh Arslan, Anum Ali, Aamir Hussain and Jehad Ali
Appl. Sci. 2023, 13(8), 4660; https://doi.org/10.3390/app13084660 - 7 Apr 2023
Cited by 1 | Viewed by 2130
Abstract
Optimizing routes and paths improves network performance. Due to the encapsulation and tunneling of the packets, mobile IP-based communication contributes to packet drops or significant delays between the sender and receiver. Packet loss during handoff reduces TCP throughput as well. One solution is [...] Read more.
Optimizing routes and paths improves network performance. Due to the encapsulation and tunneling of the packets, mobile IP-based communication contributes to packet drops or significant delays between the sender and receiver. Packet loss during handoff reduces TCP throughput as well. One solution is to use the IEEE 802.11 Medium Access Control (MAC) protocol and TCP or UDP models to increase routing protocol performance. In the linkage of homogeneous networks, it is challenging to determine route failure. In addition, the 802.11 MAC also uses a link connection. As a result, re-covering the entire route path takes a longer time. Thus, improving wired and wireless mobile node communication and handover is both challenging and critical. To overcome this challenge, we propose to use the Versatile Resilience Packet Ring protocol (VRPR)-based model. In this paper, we propose a novel VRPR-based network model that allows uninterrupted communication in both wired and wireless media. VRPR is used in the network layer to avoid buffer overflow and client mobility. Our new model also identifies the cause of the route failure, whether it is due to client mobility (handover), due to link breakage (channel degradation), or due to buffer overflow. We evaluate our network model based on three performance factors, namely, the delay, packet, and packet loss, and compared it between wired and wireless media. Our Enhanced-VRPR-based network model outperforms the current VRPR wired and wireless network models. We validate our model through OMNet++ simulations. Full article
Show Figures

Figure 1

22 pages, 740 KiB  
Article
A Biologically Inspired Self-Organizing Underwater Sensor Network
by Guannan Li, Yulong Zhang, Yao Zhang, Chao Chen, Zhuoyu Wu and Yang Wang
Appl. Sci. 2023, 13(7), 4330; https://doi.org/10.3390/app13074330 - 29 Mar 2023
Cited by 1 | Viewed by 1825
Abstract
Wireless underwater sensor networks have various applications—such as ocean exploration and deep-sea disaster monitoring—making them a hot topic in the research field. To cover a larger area and gather more-precise information, building large-scale underwater sensor networks has become a trend. In such networks, [...] Read more.
Wireless underwater sensor networks have various applications—such as ocean exploration and deep-sea disaster monitoring—making them a hot topic in the research field. To cover a larger area and gather more-precise information, building large-scale underwater sensor networks has become a trend. In such networks, acoustic signals are used to transmit messages in an underwater environment. Their features of low speed and narrow bandwidth make media access control (MAC) protocols unsuitable for radio communications. Furthermore, a network consists of a large number of randomly deployed nodes, making it impossible to pre-define an optimized routing table or assign a central controller to coordinate the message propagation process. Thus, optimized routing should emerge via interaction among individual nodes in the network. To address these challenges, in this paper we propose a communication coordinator under the time division multiple access (TDMA) framework. Each node in the network is equipped with such a coordinator so that messages in the network can be sent following the shortest path in a self-organized way. The coordinator consists of a slot distributor and a forwarding guide. With the slot distributor, nodes in the sensor network occupy proper communication slots and the network finally converges to the state without communication collision. This is achieved with a set of ecological niche- and pheromone-inspired laws, which encourage nodes to occupy slots that can decrease the waiting time for a node to send a message packet while weakening the enthusiasm for a node to occupy the slots that it fails to occupy several times. With the forwarding guide, a node can send the message packet to the best successor node so that the message packet can be sent to the base station along the shortest path. It has been proven that the laws in the forwarding guide are equivalent to the Dijkstra Algorithm. Simulation experiment results indicate that with our coordinator, the network can converge to the state without collision using fewer coordination messages. In addition, the time needed to send a message to the destination is shorter than that of the classical Aloha protocol. Full article
(This article belongs to the Special Issue Artificial Intelligence for Complex Systems: Theory and Applications)
Show Figures

Figure 1

24 pages, 2567 KiB  
Article
A Traffic-Aware Fair MAC Protocol for Layered Data Collection Oriented Underwater Acoustic Sensor Networks
by Sidan Yang, Xuan Liu and Yishan Su
Remote Sens. 2023, 15(6), 1501; https://doi.org/10.3390/rs15061501 - 8 Mar 2023
Cited by 8 | Viewed by 2868
Abstract
Underwater acoustic channels are characterized by long propagation delay, limited available bandwidth and high energy costs. These unique characteristics bring challenges to design media access control (MAC) protocol for underwater acoustic sensor networks (UASNs). Especially in data-collection-oriented UASNs, data generated at underwater nodes [...] Read more.
Underwater acoustic channels are characterized by long propagation delay, limited available bandwidth and high energy costs. These unique characteristics bring challenges to design media access control (MAC) protocol for underwater acoustic sensor networks (UASNs). Especially in data-collection-oriented UASNs, data generated at underwater nodes are transmitted hop-by-hop to the sink node. The traffic loads undertaken by nodes of different depths are different. However, most existing MAC protocols do not consider the traffic load imbalance in data-collection-oriented UASNs, resulting in unfairness in how the nodes transmit their own generated data. In this paper, we propose a novel traffic-aware fair MAC protocol for layered data-collection-oriented UASNs, called TF-MAC. TF-MAC accesses a medium by assigning time slots of different lengths to each layer via different traffic loads to achieve traffic fairness of nodes. To improve throughput and avoid collision in the network, an overlapping time slot division mechanism for different layers and multi-channel allocation scheme within each single layer is employed. Considering the time-varying traffic loads of the nodes, an adaptive packet length algorithm is proposed by taking advantage of the spatial-temporal uncertainty of underwater channels. A sea experiment was conducted to prove the spatial-temporal uncertainty of UASNs, which provides a feasibility basis for the proposed algorithm. Simulation results show that TF-MAC can greatly improve the network performance in terms of throughput, delay, energy consumption, and fairness in the layered data-collection-oriented UASNs. Full article
(This article belongs to the Special Issue Underwater Communication and Networking)
Show Figures

Figure 1

13 pages, 1732 KiB  
Article
Detection of Management-Frames-Based Denial-of-Service Attack in Wireless LAN Network Using Artificial Neural Network
by Abdallah Elhigazi Abdallah, Mosab Hamdan, Mohammed S. M. Gismalla, Ashraf Osman Ibrahim, Nouf Saleh Aljurayban, Wamda Nagmeldin and Mutaz H. H. Khairi
Sensors 2023, 23(5), 2663; https://doi.org/10.3390/s23052663 - 28 Feb 2023
Cited by 7 | Viewed by 2671
Abstract
Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service [...] Read more.
Wireless Local Area Networks (WLANs) have become an increasingly popular mode of communication and networking, with a wide range of applications in various fields. However, the increasing popularity of WLANs has also led to an increase in security threats, including denial of service (DoS) attacks. In this study, management-frames-based DoS attacks, in which the attacker floods the network with management frames, are particularly concerning as they can cause widespread disruptions in the network. Attacks known as denial of service (DoS) can target wireless LANs. None of the wireless security mechanisms in use today contemplate defence against them. At the MAC layer, there are multiple vulnerabilities that can be exploited to launch DoS attacks. This paper focuses on designing and developing an artificial neural network (NN) scheme for detecting management-frames-based DoS attacks. The proposed scheme aims to effectively detect fake de-authentication/disassociation frames and improve network performance by avoiding communication interruption caused by such attacks. The proposed NN scheme leverages machine learning techniques to analyse patterns and features in the management frames exchanged between wireless devices. By training the NN, the system can learn to accurately detect potential DoS attacks. This approach offers a more sophisticated and effective solution to the problem of DoS attacks in wireless LANs and has the potential to significantly enhance the security and reliability of these networks. According to the experimental results, the proposed technique exhibits higher effectiveness in detection compared to existing methods, as evidenced by a significantly increased true positive rate and a decreased false positive rate. Full article
Show Figures

Figure 1

12 pages, 2347 KiB  
Article
Analysis and Implementation of Human Mobility Behavior Using Similarity Analysis Based on Co-Occurrence Matrix
by Ambreen Memon, Jeff Kilby, Jose Breñosa, Julio César Martínez Espinosa and Imran Ashraf
Sensors 2022, 22(24), 9898; https://doi.org/10.3390/s22249898 - 15 Dec 2022
Cited by 5 | Viewed by 2538
Abstract
The fast expansion of ICT (information and communications technology) has provided rich sources of data for the analysis, modeling, and interpretation of human mobility patterns. Many researchers have already introduced behavior-aware protocols for a better understanding of architecture and realistic modeling of behavioral [...] Read more.
The fast expansion of ICT (information and communications technology) has provided rich sources of data for the analysis, modeling, and interpretation of human mobility patterns. Many researchers have already introduced behavior-aware protocols for a better understanding of architecture and realistic modeling of behavioral characteristics, similarities, and aggregation of mobile users. We are introducing the similarity analytical framework for the mobile encountering analysis to allow for more direct integration between the physical world and cyber-based systems. In this research, we propose a method for finding the similarity behavior of users’ mobility patterns based on location and time. This research was conducted to develop a technique for producing co-occurrence matrices of users based on their similar behaviors to determine their encounters. Our approach, named SAA (similarity analysis approach), makes use of the device info i.e., IP (internet protocol) and MAC (media access control) address, providing an in-depth analysis of similarity behaviors on a daily basis. We analyzed the similarity distributions of users on different days of the week for different locations based on their real movements. The results show similar characteristics of users with common mobility behaviors based on location and time to showcase the efficacy. The results show that the proposed SAA approach is 33% more accurate in terms of recognizing the user’s similarity as compared to the existing similarity approach. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

Back to TopTop