基于 Torpor 的无线网络 CSMA/CA 协议增强安全模型

A. Akinwale, John E. Efiong, E. A. Olajubu, G. A. Aderounmu
{"title":"基于 Torpor 的无线网络 CSMA/CA 协议增强安全模型","authors":"A. Akinwale, John E. Efiong, E. A. Olajubu, G. A. Aderounmu","doi":"10.33166/aetic.2024.02.004","DOIUrl":null,"url":null,"abstract":"Mobile wireless networks enable the connection of devices to a network with minimal or no infrastructure. This comes with the advantages of ease and cost-effectiveness, thus largely popularizing the network. Notwithstanding these merits, the open physical media, infrastructural-less attributes, and pervasive deployment of wireless networks make the channel of communication (media access) vulnerable to attacks such as traffic analysis, monitoring, and jamming. This study designed a virtual local area network (VLAN) model to circumvent virtual jamming attacks and other intrusions at the Media Access Control (MAC) layer of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. A Torpor VLAN (TVLAN) Data Frame Encapsulation and the algorithm for T-VLAN security in CSMA/CA were formulated and presented. A simulation experiment was conducted on the model using OMNeT++ software. The performance metrics used to evaluate the model were packet delivery ratio, network throughput, end-to-end channel delay, and channel load. The simulation results show that the TVLAN defence mechanism did not increase the channel load arbitrarily during TVLAN defence. similarly, the system throughput was shown to be 82% during TVLAN defence. Nevertheless, the network delay of the system during TVLAN defence was significantly high but the channel load was 297 when the TVLAN security mechanism was launched. These results demonstrate the model’s ability to provide a survivability mechanism for critical systems when under attack and add a security layer to the CSMA/CA protocol in wireless networks. Such a remarkable performance is required of a CSMA/CA infrastructure for improving the cybersecurity posture of a wireless network.","PeriodicalId":36440,"journal":{"name":"Annals of Emerging Technologies in Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Torpor-based Enhanced Security Model for CSMA/CA Protocol in Wireless Networks\",\"authors\":\"A. Akinwale, John E. Efiong, E. A. Olajubu, G. A. Aderounmu\",\"doi\":\"10.33166/aetic.2024.02.004\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile wireless networks enable the connection of devices to a network with minimal or no infrastructure. This comes with the advantages of ease and cost-effectiveness, thus largely popularizing the network. Notwithstanding these merits, the open physical media, infrastructural-less attributes, and pervasive deployment of wireless networks make the channel of communication (media access) vulnerable to attacks such as traffic analysis, monitoring, and jamming. This study designed a virtual local area network (VLAN) model to circumvent virtual jamming attacks and other intrusions at the Media Access Control (MAC) layer of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. A Torpor VLAN (TVLAN) Data Frame Encapsulation and the algorithm for T-VLAN security in CSMA/CA were formulated and presented. A simulation experiment was conducted on the model using OMNeT++ software. The performance metrics used to evaluate the model were packet delivery ratio, network throughput, end-to-end channel delay, and channel load. The simulation results show that the TVLAN defence mechanism did not increase the channel load arbitrarily during TVLAN defence. similarly, the system throughput was shown to be 82% during TVLAN defence. Nevertheless, the network delay of the system during TVLAN defence was significantly high but the channel load was 297 when the TVLAN security mechanism was launched. These results demonstrate the model’s ability to provide a survivability mechanism for critical systems when under attack and add a security layer to the CSMA/CA protocol in wireless networks. Such a remarkable performance is required of a CSMA/CA infrastructure for improving the cybersecurity posture of a wireless network.\",\"PeriodicalId\":36440,\"journal\":{\"name\":\"Annals of Emerging Technologies in Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Annals of Emerging Technologies in Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33166/aetic.2024.02.004\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of Emerging Technologies in Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33166/aetic.2024.02.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

摘要

移动无线网络只需最少的基础设施或无需基础设施就能将设备连接到网络。这种网络具有简便和成本效益高的优点,因此在很大程度上得到了普及。尽管有这些优点,但无线网络开放的物理介质、无基础设施的属性和普遍的部署方式,使得通信通道(媒体接入)容易受到攻击,如流量分析、监控和干扰。本研究设计了一个虚拟局域网(VLAN)模型,以规避载波侦测多路访问与碰撞避免(CSMA/CA)协议的媒体访问控制(MAC)层的虚拟干扰攻击和其他入侵。制定并介绍了一种 Torpor VLAN(TVLAN)数据帧封装和 CSMA/CA 中的 T-VLAN 安全算法。使用 OMNeT++ 软件对模型进行了仿真实验。评估模型的性能指标包括数据包传送率、网络吞吐量、端到端信道延迟和信道负载。仿真结果表明,在 TVLAN 防御期间,TVLAN 防御机制没有任意增加信道负载。同样,在 TVLAN 防御期间,系统吞吐量显示为 82%。不过,在 TVLAN 防御期间,系统的网络延迟明显较高,但在 TVLAN 安全机制启动时,信道负载为 297。这些结果表明,该模型有能力为受到攻击的关键系统提供生存机制,并为无线网络中的 CSMA/CA 协议添加一个安全层。CSMA/CA 基础架构需要具备如此卓越的性能,才能改善无线网络的网络安全态势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Torpor-based Enhanced Security Model for CSMA/CA Protocol in Wireless Networks
Mobile wireless networks enable the connection of devices to a network with minimal or no infrastructure. This comes with the advantages of ease and cost-effectiveness, thus largely popularizing the network. Notwithstanding these merits, the open physical media, infrastructural-less attributes, and pervasive deployment of wireless networks make the channel of communication (media access) vulnerable to attacks such as traffic analysis, monitoring, and jamming. This study designed a virtual local area network (VLAN) model to circumvent virtual jamming attacks and other intrusions at the Media Access Control (MAC) layer of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. A Torpor VLAN (TVLAN) Data Frame Encapsulation and the algorithm for T-VLAN security in CSMA/CA were formulated and presented. A simulation experiment was conducted on the model using OMNeT++ software. The performance metrics used to evaluate the model were packet delivery ratio, network throughput, end-to-end channel delay, and channel load. The simulation results show that the TVLAN defence mechanism did not increase the channel load arbitrarily during TVLAN defence. similarly, the system throughput was shown to be 82% during TVLAN defence. Nevertheless, the network delay of the system during TVLAN defence was significantly high but the channel load was 297 when the TVLAN security mechanism was launched. These results demonstrate the model’s ability to provide a survivability mechanism for critical systems when under attack and add a security layer to the CSMA/CA protocol in wireless networks. Such a remarkable performance is required of a CSMA/CA infrastructure for improving the cybersecurity posture of a wireless network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Annals of Emerging Technologies in Computing
Annals of Emerging Technologies in Computing Computer Science-Computer Science (all)
CiteScore
3.50
自引率
0.00%
发文量
26
期刊最新文献
The Proposal of Countermeasures for DeepFake Voices on Social Media Considering Waveform and Text Embedding Lightweight Model for Occlusion Removal from Face Images A Torpor-based Enhanced Security Model for CSMA/CA Protocol in Wireless Networks Enhancing Robot Navigation Efficiency Using Cellular Automata with Active Cells Wildfire Prediction in the United States Using Time Series Forecasting Models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1