Abstract-Today's wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an important security mechanism, but little effort has been directed towards efficient and effective architectures for Intrusion Detection System in the context of MANETs. We investigate existing Intrusion Detection Architecture design Issues, challenges and proposed a novel architecture based on a conceptual model for an IDS agent that lead to a secure collaboration environment integrating mobile ad hoc network and the wired backbone. In wireless/mobile ad hoc network, the limited power, weak computation capabilities of mobile nodes, and restricted bandwidth of the open media impede the establishment of a secure collaborative environment.
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One main challenge in design of these networks is their vulnerability to security attacks. Here we study the threats an ad hoc network faces and the security goals to be achieved. We identify the new challenges and opportunities posed by this new networking environment and explore new approaches to secure its communication. In particular, we take advantage of the inherent redundancy in ad hoc networks -multiple routes between nodes -to defend routing against denial of service attacks. We use replication and new cryptographic schemes, such as HSHA Key cryptography, to build a highly secure and highly available key management service, which forms the core of our security framework. It helps the network to let the intruder cannot access the packet without the proper authentication. Unauthorized user cannot access the packet. There are various consequences of this algorithm.
With the evolution of wireless broadband technology and increasing demand of multi-sim User Equipment (UE), new challenges of resource sharing arise where conventional methods of creating small gaps in resource usage pattern of one SIM do not suffice. The advent of Voice over LTE (VoLTE) services accompanied by the immense mobile broadband demand of the users, require continuous resource availability on both the SIMs even in a single RF subsystem. Dual SIM Dual Active (DSDA) architecture that can meet the above requirements is not popular due to higher associated cost. In this paper, we consider the fundamental problem of resource sharing across SIMs in multi-sim architecture especially Single Receive Dual SIM Dual Standby (SR-DSDS) and Dual Receive Dual SIM Dual Standby (DR-DSDS). We formulate resource sharing as an optimization problem to maximize the ratio of resource allocation fairly for each contending SIM considering several important factors like current buffer occupancy, average time criticality of the buffer content and channel quality of respective SIM. We solve the formulated optimization problem using Karush Kuhn Tucker (KKT) conditions to derive the closed-form expressions for optimal resource allocation. We also compute the number of transitions possible with the derived optimal fair allocation in a practical multi-sim architecture. Additionally, we present the analytical results to depict the efficacy of the algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.