Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abeka, Silvance O.
- Secure Handover Protocol for High Speed 5G Networks
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Kisii University, KE
2 Department of Computer Science & Software Engineering, JOOUST, KE
1 Department of Computer Science, Kisii University, KE
2 Department of Computer Science & Software Engineering, JOOUST, KE
Source
International Journal of Advanced Networking and Applications, Vol 11, No 6 (2020), Pagination: 4429-4442Abstract
The motivations behind 5G networks include seamless handovers, higher data rates, lower latencies of about one millisecond, and enhanced coverage compared to 4G networks. To achieve these goals, network densification has been implemented to cope with increasing capacity demands. Networks with ultra-densification have large numbers of heterogeneous small cell deployments such as femto-cells, relays and microcells which complicate mobility management, resulting in unnecessary, frequent, and ping-pong handovers as UEs move within the network. To address these challenges, state of the art approaches using fuzzy logic, adaptive neuro-networks or their combination have been proposed. However, these approaches majorly address the QoS issues, ignoring the security aspect of handovers. In this paper, a handover protocol that incorporates both security and QoS in the handover process is proposed. The simulation results showed that this protocol reduced handover latency, packet losses, number of executed handovers and ping pong rate by 56.1%, 38.8 %, 74.6% and 24.1% respectively. In addition, the developed protocol yielded a 27.1% increase in the handover success rate, and a 27.3% reduction in handover failure rate. This protocol was also shown to be robust against de-synchronization and session hijacking attacks.Keywords
5G, Handover Success Rate, Handover Failure Rate, Latency, Packet Loss, Ping Pong, Security.References
- Hu, S., Yu, B., Qian, C., Xiao, Y., Xiong, Q., Sun, C., and Gao, Y.: Non-orthogonal interleave-grid multiple access scheme for industrial internet of things in 5G network. IEEE Transactions on Industrial Informatics. Vol. 14, no. 12, pp. 5436–5446 (2018).
- Bilen, T., Berk C., and Kaushik R. C.: Handover Management in Software-Defined Ultra-Dense 5G Networks. IEEE Network. Vol. 17, pp. 49-55(2017).
- Yazdinejad, A., Parizi, R. M., Dehghantanha, A., & Choo, K. K. R.: Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Transactions on Network Science and Engineering. (2019).
- Amit, K., &Hari O.: Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks. Digital Communications and Networks. Pp. 1-13 (2019).
- Basaras, P., Belikaidis, I., Maglaras, L., and Katsaros, D.: Blocking epidemic propagation in vehicular networks. In: Wireless On-demand Network Systems and Services (WONS), 12th Annual Conference on, IEEE, pp. 1–8 (2016).
- Panwar, N., Sharma, S., and Singh, A.: A survey on 5G: The next generation of mobile communication. Phys. Commun., Vol. 18, pp. 64–84 (2016).
- Babiker, A., H. Ahmmed, H., & Ali, S.: Comparative Study 1st, 2nd, 3rd, 4th, Generations from Handoff Aspects. International Journal of Science and Research. Vol. 5, Issue 6, pp. 934-941 (2016).
- Copet, P., Marchetto, G., Sisto, R., & Costa, L.: Formal Verification of LTE-UMTS Handover Procedures. IEEE. pp.1-8 (2015).
- Cheng X., Xiaohong H., Maode M., and Hong B.: An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks. Wireless Communications and Mobile Computing. Volume 2018, pp. 1-16 (2018).
- Taha, M., Jimenez, J.M., Canovas, A., and Lloret, J.: Intelligent Algorithm for Enhancing MPEG-DASH QoE in Embms. Network Protocols and Algorithms, vol. 9, no. 3-4, p. 94(2018).
- Yang, H., Raza, S. M., Kim, M., Le, D. T., Van Vo, V., & Choo, H.: Next Point-of-Attachment Selection Based on Long Short Term Memory Model in Wireless Networks. In: 14th International Conference on Ubiquitous Information Management and Communication (IMCOM). pp. 1-4(2020).
- Phemina, M., and Sendhilnathan, S.: Fuzzy Based Mobility Management in 4G Wireless Networks. Braz. arch. biol. technol. Vol.59, No.2 (2017).
- Coqueiro, T., C., José, J., Tássio, C., and Renato, F.: A Fuzzy Logic System for Vertical Handover and Maximizing Battery Lifetime in Heterogeneous Wireless Multimedia Networks. Wireless Communications and Mobile Computing, Volume 2019, pp. 1-14 (2019).
- Rashad, T., and Sudhir A.: Fuzzy-Neural based Cost Effective Handover Prediction Technique for 5G-IoT networks. International Journal of Innovative Technology and Exploring Engineering. Vol.9 Issue 2S3, pp.191-197 (2019).
- Mahira, A. G., & Subhedar, M. S.: Fuzzy Logic Based Multi-input Criterion for Handover Decision in Wireless Heterogeneous Networks. In: International Conference on Smart Trends for Information Technology and Computer Communications, Springer, Singapore. Pp. 640-646 (2016).
- Wafa, B., Adnane, L., and Vicent, P.: Applying ANFIS Model in Decision-making of Vertical Handover between Macrocell and Femtocell Integrated Network. Journal of Telecommunication, Electronic and Computer Engineering. Vol. 11 No. 1, pp. 57-62 (2019).
- Azzali, F., O. Ghazali, O., and Omar, M. H.: Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks. International Research and Innovation Summit (IRIS2017). Vol. 226, pp.1-12 (2017).
- Shanmugam, K.: A novel candidate network selection based handover management with fuzzy logic in heterogeneous wireless networks. In: 4th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, pp. 1-6 (2017).
- Zineb, A., Ayadi, M., and Tabbane, S.: QoE-based vertical handover decision management for cognitive networks using ANN. In: Proceedings of the 2017 Sixth International Conference on Communications and Networking (ComNet), pp. 1–7 (2017).
- Eman, Z., Amr, A., Abdelkerim, T., Abdelhalim, Z.: A novel vertical handover algorithm based on Adaptive Neuro-Fuzzy Inference System (ANFIS). International Journal of Engineering & Technology. 7 (1), 74-78 (2018).
- Pragati, K., and Haridas, S.L.: Reducing Ping-Pong Effect in Heterogeneous Wireless Networks Using Machine Learning. Intelligent Communication, Control and Devices. Pp. 697-705 (2019).
- Silva, K.C., Becvar, Z., Cardoso, E., and Frances, C.R.: Self-tuning handover decision based on fuzzy logic in mobile networks with dense small cells. In Proc. IEEE WCNC, pp. 1–6 (2018).
- Naeem, B., Ngah, R., & Hashim, S. Z. M.: Reduction in ping-pong effect in heterogeneous networks using fuzzy logic. Soft Computing. 23(1), 269-283 (2019).
- Tsai, K. L., Liu, H. Y., & Liu, Y. W.: Using fuzzy logic to reduce ping-pong handover effects in LTE networks. Soft Computing. 20(5), 1683-1694 (2016).
- Kwong, C.F., Chuah, T.C., Tan, S., and Akbari-Moghanjoughi, A.: An adaptive fuzzy handover triggering approach for long-term evolution network. Expert Syst. Vol. 33, no. 1, pp. 30–45 (2016).
- Jamal F.A, & Firudin K.M.: Direction prediction assisted handover using the multilayer perception neural network to reduce the handover time delays in LTE networks. In: 9th International Conference on Theory and Application of Soft Computing, Computing with Words and Perception, Procedia Computer Science. Vol. 120, pp. 719–727 (2017).
- Ejaz, Q., Faria, S., Saeeda, K., Saeed, A.: An Optimized Handover Management System in 3G/4G-Wlan Using Genetic Algorithm. International Journal on Information Technologies & Security. No. 3, pp. 19-30 (2017).
- Rahul, Bajrang B., and Rajiv K.: Performance Analysis of Empirical Radio Propagation Models in Wireless Cellular Networks. World scientific news, an international scientific journal. Pp. 40-46 (2019).
- Sulyman, A., Nassar, T., Samini, M., G.R.M., Rappaport, T., Alsanie, A.: Radio Propagation Path Loss Models for 5G Cellular Networks in the 28 GHz and 38 GHz Millimeter-Wave Bands. IEEE Commun. Mag. 52, 78-86 (2014).
- Nassar, A.T., Sulyman, A.I., Alsanie, A.: Achievable RF Coverage and System Capacity using Millimeter Wave Cellular Technologies in 5G Networks. In: IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE), Canada, pp. 1-6 (2014).
- Dinesh, T., Ram, B.S., Prakash, and Buddha, R.S.: Study of Power Density Transmitted From Cellular Base Station Towers of Nepal Telecom In: Biratnagar Sub-Metropolitan City. Int J Appl Sci Biotechnol. Vol 4(3): 338-345 (2016).
- A Survey of Data Exfiltration Prevention Techniques
Abstract Views :184 |
PDF Views:0
Authors
Affiliations
1 Tom Mboya University College, Homa Bay, KE
2 School of Informatics and Innovative Systems (SIIS), Jaramogi Oginga Odinga University of Science and Technology, Bondo, KE
1 Tom Mboya University College, Homa Bay, KE
2 School of Informatics and Innovative Systems (SIIS), Jaramogi Oginga Odinga University of Science and Technology, Bondo, KE
Source
International Journal of Advanced Networking and Applications, Vol 12, No 3 (2020), Pagination: 4585-4591Abstract
Data exfiltration is a serious cybercrime facing many organizations worldwide. Over the past few years, notable organizations such as the Google, Yahoo, the Pentagon, Iran nuclear facility and the United States military contractors and banks have fallen victims of data exfiltration. The current techniques for averting these threats revolve around firewalls, intrusion detection systems, intrusion prevention techniques, firewalls, anti-virus an anti-malware. However, despite heavy deployment of these devices, attackers still continue to wreck havoc on organizations and individuals, stealing their sensitive data. The aim of this paper was therefore to explore how the current techniques for data loss prevention fail. The results of this analysis revealed that these techniques either use whitelists, blacklists, signature-based scanning, behavioral analysis of programs which are not sufficient to counter attacks based on zero day vulnerabilities. Based on these shortcomings, a novel data exfiltration prevention algorithm is proposed towards the end of this paper. This algorithm is suggested to employ real-time traffic entropy coupled with heuristically computed functional correlations to detect data exfiltrations. The premises of this algorithm and its operations are discussed at the last section of this paper.Keywords
Algorithm, anti-virus, anti-malware, Data exfiltration, IDS, IPS.References
- . Murtaza A., & Naveed G. (2016). Critical Analysis on Advanced Persistent Threats. International Journal of Computer Applications. Volume 14, Issue No.13 (pp. 4650).
- . Neeshu S., Shitanshu J. (2016). A Study and Review on Advanced Persistent Threats. International Journal of Innovative Research in Computer and Communication Engineering. Vol. 4, Issue 11. (pp. 19925-19932).
- . Hanu P., & Dharani J. (2015). Advanced Persistent Threat Detection System. International Journal of Science and Research. Volume 4, Issue 4. (pp. 1990- 1993).
- . Barbara H. (2013), Advanced Persistent Threats: Detection, Protection and Prevention. SOPHOS. (pp. 110).
- . Sara M., Arunesh S., Milind T.,and Pratyusa M.(2016).Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks. Springer International Publishing.
- . Randy D. (2015). Data Loss Prevention. The SANS Institute. (pp. 1-30).
- . Nadiammai G., and Hemalatha M. (2013).Effective approach toward Intrusion Detection System using data mining techniques. Egyptian Informatics Journal. Vol. 13.(pp. 37-50).
- . Nikolaos V. (2015). Detecting Advanced Persistent Threats through Deception Techniques. Phd Thesis, Information Security and Critical Infrastructure Protection (INFOSEC) Laboratory. Department of Informatics. (pp.1-174).
- . Frank K. (2015). Detection of APT Malware through External and Internal Network Traffic Correlation.Masters Thesis, University of Twente. (pp. 1-82).
- .Kateryna C. (2017). Machine Learning Methods For Malware Detection And Classification. University of Applied Sciences. (pp.1-93).
- .Ruchika M. (2013). Schemes for Surviving Advanced Persistent Threats. PhD Thesis, Department of Computer Science and Engineering, University at Buffalo, State University of New York. (pp. 1-158).
- .Gustav L. (2016). Bypassing modern sandbox Technologies. Masters Thesis, Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University. (pp. 1-94)
- .Puneet S. (2013). A Multilayer Framework To Catch Data Exfiltration. Masters Thesis, Department of Computer Science and Electrical Engineering. (pp. 1-18).