Loading...
Search for: wired-networks
0.008 seconds

    An effective approach for determining IDS agent nodes in manet

    , Article Proceedings of the 3rd International Conference on Internet Technologies and Applications, ITA 09, 8 September 2009 through 11 September 2009, Wrexham, Wales ; 2009 , Pages 458-465 ; 9780946881659 (ISBN) Kuchaki Rafsanjani, M ; Khavasi, A. A ; Movaghar, A ; Sharif University of Technology
    Abstract
    Mobile Ad hoc NETworks (MANET) due to different characteristics from wired networks are more vulnerable to security attacks. Construction of Intrusion Detection Systems (IDS) for MANETs is complicated by the fact that they are lack of fixed infrastructure and lack of central management for authentication and distribution of cryptographic keys. On the other hand, the network lifetime is an important issue in MANETs because of the energy power of mobile nodes is limited. In this paper is presented a proposed Method that in the first step, authorized nodes are detected by non-interactive zero knowledge technique and in the second step, nodes with the highest battery power from among authorized... 

    Overlay routing Architectures for Massively Multiuser Virtual Environments

    , Ph.D. Dissertation Sharif University of Technology Hariri, Behnoosh (Author) ; Alavi, Mohammad Hossein (Supervisor) ; Pakravan, Mohammad Reza (Supervisor)
    Abstract
    Multi-participant virtual environments are network applications that simulate the experience of real-time interaction among multiple usersdistributed all over the internet In order to share the common sense of time and place, multiple entities interacting in the shared virtual environment should become aware of the modification to the shared environment, or the result of on the other objects interactions shortly after such events occur. This is achieved through the distribution of update messages. As the number of users and entities increases, there is a considerable increase in the amount of update messages exchanged among the users and entities. This is considered as one of the most... 

    Using geometrical routing for overlay networking in MMOGs

    , Article Multimedia Tools and Applications ; Volume 45, Issue 1-3 , 2009 , Pages 61-81 ; 13807501 (ISSN) Hariri, B ; Pakravan, M. R ; Shirmohammadi, S ; Alavi, M. H ; Sharif University of Technology
    2009
    Abstract
    At a first glance, transmitting update information to a geographic region in the virtual space seems to be an attractive primitive in Massively Multiplayer Online Gaming (MMOG) applications where players are constantly moving and need to send updates to their neighbors who are in the same region of the virtual space. The system would become more scalable if entities did not need to keep track of each other or send messages directly to one another. Rather, an entity could just send a message to a specific region in the virtual space (its area of effect), as opposed to sending packets to specific IP addresses, significantly reducing tracking and routing overhead. Fundamentally speaking, update... 

    Identifying monitoring nodes in MANET by detecting unauthorized and malicious nodes

    , Article International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26 August 2008 through 29 August 2008 ; Volume 3 , 2008 ; 9781424423286 (ISBN) Kuchaki Rafsanjani, M ; Movaghar, A ; Sharif University of Technology
    2008
    Abstract
    Mobile ad hoc networks have different characteristics from wired networks. There are new challenges related to security issues that need to be addressed. In this paper, first, critical nodes and authentication in mobile ad hoc networks are discussed. Then, a monitoring nodes selection method with high battery power in these networks is presented. We propose a three-phase detection scheme. In the first phase, unauthorized nodes and in the second phase, malicious nodes are detected. Finally in the third phase, nodes with the largest battery power as monitoring nodes are considered. In the first and the second phases, detection scheme uses non-interactive zero knowledge technique in order to... 

    A comparison of various routing protocols in Mobile Ad-hoc Networks (MANETs) with the use of Fluid flow simulation method

    , Article 4th International Conference on Wireless and Mobile Communications, ICWMC 2008, Athens, 27 July 2008 through 1 August 2008 ; 2008 , Pages 260-267 ; 9780769532745 (ISBN) Salehan, A ; Robatmili, M ; Abrishami, M ; Movaghar, A ; IARIA ; Sharif University of Technology
    2008
    Abstract
    One of the most important challenges in mobile Ad-hoc networks is simulation. The simulation of these networks based on the accessible simulation techniques, which are based on packet, is a demanding and time-consuming task. Moreover, with the complexity of the network and the increase in the numbers of the nodes, it is likely to take a long time. This is because these simulators, one by one, regard the acts of all moving packets in one part of the network, and process these acts as a series of events. Since the number of the events is high in this method, the simulation takes time. Nowadays, in wired networks, several methods have been suggested to lessen the time of simulation; one example...