A Torpor-based Enhanced Security Model for CSMA/CA Protocol in Wireless Networks

Author:

Akinwale Abiodun,Efiong John E.,Olajubu Emmanuel A.,Aderounmu Ganiyu A.

Abstract

Mobile wireless networks enable the connection of devices to a network with minimal or no infrastructure. This comes with the advantages of ease and cost-effectiveness, thus largely popularizing the network. Notwithstanding these merits, the open physical media, infrastructural-less attributes, and pervasive deployment of wireless networks make the channel of communication (media access) vulnerable to attacks such as traffic analysis, monitoring, and jamming. This study designed a virtual local area network (VLAN) model to circumvent virtual jamming attacks and other intrusions at the Media Access Control (MAC) layer of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. A Torpor VLAN (TVLAN) Data Frame Encapsulation and the algorithm for T-VLAN security in CSMA/CA were formulated and presented. A simulation experiment was conducted on the model using OMNeT++ software. The performance metrics used to evaluate the model were packet delivery ratio, network throughput, end-to-end channel delay, and channel load. The simulation results show that the TVLAN defence mechanism did not increase the channel load arbitrarily during TVLAN defence. similarly, the system throughput was shown to be 82% during TVLAN defence. Nevertheless, the network delay of the system during TVLAN defence was significantly high but the channel load was 297 when the TVLAN security mechanism was launched. These results demonstrate the model’s ability to provide a survivability mechanism for critical systems when under attack and add a security layer to the CSMA/CA protocol in wireless networks. Such a remarkable performance is required of a CSMA/CA infrastructure for improving the cybersecurity posture of a wireless network.

Publisher

International Association for Educators and Researchers (IAER)

Reference24 articles.

1. Deepak Arya, Pramod Mehra, Parag Jain and Abhay Bhatia, "A Study on MANET: Along with Recent Trends, Applications, Types, Protocols, Goals, Challenges", in Proceedings of the 2023 1st International Conference on Intelligent Computing and Research Trends (ICRT), 3-4 February 2023, Roorkee, India, Electronic ISBN: 979-8-3503-3677-1, Print on Demand (PoD) ISBN: 979-8-3503-3678-8, pp. 1-5, Published by IEEE, DOI: 10.1109/ICRT57042.2023.10146716, Available: https://ieeexplore.ieee.org/document/10146716.

2. Si Liu, Peter Csaba Ölveczky and José Meseguer, “Modeling and analyzing mobile ad hoc networks in Real-Time Maude”, Journal of Logical and Algebraic Methods in Programming, ISSN 2352-2208, January 2016, Vol. 85, No. 1, Part 1, pp 34-66, Published by Elsevier, DOI: 10.1016/j.jlamp.2015.05.002, Available: https://www.sciencedirect.com/science/article/pii/S2352220815000498.

3. Luigi Fratta, Mario Gerla and Keun-Woo Lim, “Emerging trends and applications in ad hoc networks”, Annales des Telecommunications/Annals of Telecommunications, ISSN: 2079-9292, October 2018, Vol. 73, No. 9–10, pp. 547–548, Published by Springer-Verlag, DOI: 10.1007/s12243-018-0662-3, Available: https://link.springer.com/article/10.1007/s12243-018-0662-3.

4. Sunil Kumar and Kamlesh Dutta, “Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges”, Security and Communication Networks, 5 May 2016, Vol. 9, No. 14, pp. 2484–2556, Published by John Wiley & Sons Ltd., DOI: 10.1002/sec.1484, Available: https://onlinelibrary.wiley.com/doi/epdf/10.1002/sec.1484.

5. Norman Islam and Zubair A. Shaikh, “A study of research trends and issues in wireless ad hoc networks”, in Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications, Hershey, USA: IGI Global, 2015, ISBN-13: 9781466687516, ISBN-10: 1466687517, EISBN-13: 978146668752, Vol. 4, No. 4, Ch. 81, pp. 1819–1859, DOI: 10.4018/978-1-4666-8751-6.ch081, Available: https://www.igi-global.com/chapter/a-study-of-research-trends-and-issues-in-wireless-ad-hoc-networks/138359.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3