Baban Ahmed Mahmood
Kirkuk University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Secure message transmission scheme in wireless sensor networks Kameran Ali Ameen; Baban Ahmed Mahmood; Yalmaz Najm Aldeen Taher
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i3.2856

Abstract

Wireless sensor networks (WSNs) have been the subject of intensive research in the past few years and the backbone of most maximum present information technology. WSNs have been employed in various applications such as track monitoring battlegrounds in military fields and patients’ medical requirements in the civilian field. The wireless sensor networks are always randomly distributed in an open area (hostile), pervasive environment, and open media channel. Thus, WSNs are vulnerable to several species of attacks. Moreover, messages may be easily intercepted or altered because the transmission is not secure, hence effective key management scheme is strongly needed to reduce the risks. Cryptography methods are a crucial aspect of WSNs to reach security goals. In this paper, we propose an efficient and secure message transmission scheme that combines the Knapsack algorithm with the Diffie-Hellmann process to encrypt messages. The results and analysis show that the proposed scheme is efficient and it achieves most of the security goals providing high privacy and security. It is also resilient against some of the well-known attacks.
An end to end key establishment scheme for detecting black hole attacks in mobile ad hoc networks Baban Ahmed Mahmood; Aso Ahmed Majeed; Ahmed Chalak Shakir
Indonesian Journal of Electrical Engineering and Computer Science Vol 21, No 2: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v21.i2.pp1193-1200

Abstract

The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.