Syed Umar
Gandhiji Institute of Science and Technology (GIST), Jaggayyapet

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security Azeem Mohammed Abdul; Syed Umar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp181-186

Abstract

The emergence of wireless sensor networks as one of the technology trends in the coming years, and some special tests of safety. The event will be thousands of tiny sensors that cheap devices, memory, radio and make, in most cases, no access to the production and energy. Some great challenges of sensor networks are different; we focus on security in the form of wireless sensor networks. To some network wireless sensor network in order to optimize use of the sensor, so that the network can be as long as possible. But the management of the important mission of the sensor network, denial of service (DoS) attacks against the destruction of the efficient use of network resources and the vital functions of the network. DoS attacks can be one of the greatest threats to security threats be considered. In fact, there are many different layers of the OSI-DOS.
Data Integrity and Security [DIS] Based Protocol for Cognitive Radio Ad Hoc Networks Azeem Mohammed Abdul; Syed Umar
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp187-195

Abstract

In the CRN (cognitive Radio Networks) the main issues to be addressed are spectrum scarcity and inadequate usage of spectrum. The CRN can analyse the unused spectrum, so that CRN users can easily occupy the unused spectrum without blocking the existing Primary Users. In a CRN, routing is a complex issue because of channel diversity. The existing system mainly focuses on the performance analysis of Ad hoc On-Demand Distance Vector (AODV) and the Weight Cumulative Expected transmission time (WCETT). The performance of these protocols are measured and compared in various ways such as the throughput of single radio station multi-channels, equal number of radio stations and channels, multi-radio stations multi-channels. The limitation with these protocols is, whenever a route fails, there is issue to get connected with the other nodes, the other being data integrity, which maintains the no loss of data [LOD]. In our proposed DIS – CRAHN system we overcome these limitations by adding data security and integrity. Security is provided using the RSA algorithm while Integrity is ensured using the SHA algorithm. With the data security we can maintain the shortest path from source to destination and if any route failure occurs then immediate route establishment can be done and data encryption and decryption also be implemented using the random key generation. Results show an improved performance in delay with reasonable throughput, making the protocol an ideal choice for CRNs.