In this paper we present an end-to-end mobile communication testbed that utilizes various open source projects. The testbed consists of Global System for Mobiles (GSM), General Packet Radio Service (GPRS) and System Architecture Evolution/Long Term Evolution(SAE/LTE) elements implemented on a virtual platform. Our goal is to utilize the testbed to perform security analysis. We used virtualization to get flexibility and scalability in implementation. So as to prove the usability of the testbed, we reported some of the test results in this paper. These tests are mainly related to security. The test results prove that the testbed functions properly.
This paper provides an overview of the activities of Internet of Things (IoT) work group in Global ICT Standardisation Forum for India (GISFI). Objective of this IoT WG is to identify potential standardization areas that can help proliferating the IoT technology and its applications that are relevant to India for the benefit of the society and businesses. The strategy chosen within this WG is to develop application independent generic IoT Framework with welldefined ReferenceArchitecture to achieve interoperability between the various devices/application developed in multi-vendor scenario to achieve cost advantage and pass this advantage to the user group for its mass scale deployment and applicability. The requirements of the same are gathered through the study of various use cases.
Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).
The traditional use of darknets is to passively monitor malicious traffic in a network. In this paper, we describe an experimental setup that leverages this property of the darknet in a network monitoring setup coupled with several honeypot servers. The honeypots are configured as a decoy to lure cyber attacks on the network. The cyber-security test-bed thus designed enables us to monitor an end-to-end mobile communication network test-bed [1] and detect attacks on the network in real-time. After successful trial runs, the results and alert incidents show that the cyber-security setup is efficient in detecting malicious activity in the network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.