Loading...
Search for: internet-protocols
0.008 seconds
Total 74 records

    Security Improvement of Key Management Protocols in Hierarchical Wireless Sensor Network

    , M.Sc. Thesis Sharif University of Technology Mokhtari Ardakani, Ehsan (Author) ; Salmasizadeh, Mahmood (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract

    Wireless sensor networks (WSNs) use many tiny sensors to monitor phenomena such as temperature, humidity, brightness and traffic, and then transmit this information to a base station using wireless channels. WSNs find applications in military, ecological, urban and health related areas. Hierarchical wireless sensor networks are kind of sensor networks that use communication entities with different capabilities in terms of energy, processing power, bandwidth, communication range and etc. In this thesis, an introduction to WSNs and their applications, characteristics and designing factors is expressed. It continues on studying the infrastructures and the role of cryptography in enhancing... 

    A Comparison between Virtual Private LAN Service (VPLS)and P2MP IP-only LAN Service (IPLS)

    , M.Sc. Thesis Sharif University of Technology Yousefi, Dariush (Author) ; Ajorloo, Hossein (Supervisor)
    Abstract
    Today Ethernet is the predominant technology for implementing Local Area Networks. Its privileges encourage service providers to extend Ethernet from Local Area Networks to Metropolitan Area Networks or even Wide Area Networks. Ethernet benefits such as low operational costs, well interoperability, plug-n-paly characteristic and rapid provisioning on demand make Ethernet ideal for Metropolitan Area Networks.But Ethernet by itself has some weakness like flat structure that makes it unfit for use in Metropolitan Area Networks. A suitable solution for taking advantages of Ethernet benefits in service provider network is using Ethernet in access network and applying multi-point to multi-point... 

    Developing a Test Platform for IP Multimedia Service in Mobile Core Networks

    , M.Sc. Thesis Sharif University of Technology Hatami, Amir Mohammad (Author) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    The value of data transmission has surprisingly increased in the past years. Years ago, transmission of a few by telegraph systems satisfied human needs. But the amount of data transmitted increases exponentially and that is where engineers face real challenges. In the first generation of mobile networks, the voice was transmitted using Analog technology but in the second generation it switched to digital systems. In third and fourth generation systems data rate and quality of service was increased. A big change from the third to fourth generation networks was being an all IP network, meaning everything including voice and data were transmitted in packet switched networks. This creates... 

    Evaluating the Impact of Noise and QoS Parameters on Satisfaction (QoE) of VoIP Users

    , M.Sc. Thesis Sharif University of Technology Fathi, Parshang (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Today, users can easily access network and Internet services from anywhere, anytime, using mobile computing devices, such as laptops, tablets, smartphones, and so forth This trend has diversified users and their need for network protocol-based services, including VoIP. VoIP is an Internet protocol for voice transmission and reception, which has become one of the biggest challenges in today's world of communications and telecommunications. Analyzing and evaluating the quality of network service (QoS) in VoIP traffic is an essential part of the process of ensuring and improving the quality of multimedia networks. Therefore, monitoring and measuring "users’ satisfaction" toward voice... 

    Using Multiple-Radio for Solving Communication Problem in Internet of Things

    , M.Sc. Thesis Sharif University of Technology ZandKarimi, Nima (Author) ; Hemmatyar, Ali Mohammad Afshin (Supervisor)
    Abstract
    One of the main application domains of Internet of Things is the smart home. There are lots of kinds object in any home and all of them need to be connected to each other for sharing information. The central management system of smart home uses this information for controlling and organizing the home. The first condition of smart home is that the home should know every detail about itself. So the network infrastructure of home is very important and every single object in home must be connected to the central management system of home. But because of variety in objects there are so many connection ways which any object uses them for connecting to the network. So the central management system... 

    Packet Loss Replacement in VOIP Using Linear Prediction Method

    , M.Sc. Thesis Sharif University of Technology Miralavi, Reza (Author) ; Ghorshi, Mohammad Ali (Supervisor) ; Mortazavi, Mohammad (Supervisor)
    Abstract
    In real-time packet-based communication systems one major problem is misrouted or delayed packets which result in degraded perceived voice quality. If some speech packets are not available on time, the packet is known as lost packet. The easiest task of a network terminal receiver is to replace silence for the duration of lost speech segments. In a high quality communication system in order to avoid quality reduction due to packet loss a suitable method and/or algorithm is needed to replace the missing segments of speech.There are several methods which have been proposed to reduce the effect of packet loss such as Waveform Substitution, High Order Autoregressive, Linear Prediction (LP),... 

    State-Space Model for Speech Enhancement in VoIP

    , M.Sc. Thesis Sharif University of Technology Rahimi, Alaa (Author) ; Ghorshi, Mohammad Ali (Supervisor)
    Abstract
    Speech enhancement in noisy environments improves the quality and intelligibility of speech and reduces communication fatigue. High performance speech enhancement models are based on Bayesian estimation models, requiring estimations of the parameters of the functions that describe the likelihood and the prior distributions of the signal and noise processes. Two Bayesian speech enhancement models which are used in this thesis are Bayesian-Kalman filter and Bayesian MAP estimation.In real time applications including VoIP, in addition to additive noise, packet loss or packet delays might also occur. In real time communications the receiver terminal replaces silence for the duration of lost... 

    Detecting Voice in Encrypted Traffic

    , M.Sc. Thesis Sharif University of Technology Sharafi, Mohammad Hossein (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Today, smartphones became a universal technology, and mobile networks speed and bandwidth have increased. Additionally, some of the messengers support voice call services that are easy to use and economical. Many of the VoIP servers provide encrypted VoIP service. On the other side, ISPs need to recognize the VoIP flows to enforce their policies. In some case, ISPs should block illegal VoIP calls or fix a specific charge for them. Also, for providing a better quality of service, it’s necessary to decrease the delay of VoIP packets. Most related works have concentrated on the methods of detecting VoIP traffic that just worked on a specific application. Some other works detect VoIP by using IP... 

    Physical Layer Authentication in the Internet of Things based on Deep Learning

    , M.Sc. Thesis Sharif University of Technology Abdollahi, Majid (Author) ; Behroozi, Hamid (Supervisor)
    Abstract
    IoT security is an important step in the rapid development of its applications and ser-vices. Many security protocols have been defined to maintain security at higher communication layers, such as the transport layer and the application layer, but with the advent of quantum computers due to high-speed parallel computing, the previous methods are no longer secure and we have to establish security at lower layers such as the physical layer. The efficiency of IoT devices depends on the reliability of their message transmission. Cyber-attacks such as data injection, eavesdropping and man-in-the-middle can lead to security challenges. In this study, we propose a new deep learning based component... 

    VoIP users’ Quality of Experience (QoE)Evaluation

    , Ph.D. Dissertation Sharif University of Technology Hesam Mohseni, Abdorreza (Author) ; Jahangir, Amir Hossein (Supervisor)
    Abstract
    Quality of Experience (QoE) indicates the overall quality of one service such as Voice over IP (VoIP) from users' point of view by considering several systems, human, and contextual factors. QoE measurement and prediction are more challenging than Quality of Service (QoS) which is only related to network parameters. There exist various objective and subjective methods for QoE prediction. This research investigates various features affecting QoE by proposing a comprehensive subjective evaluation by employing a large number of users. We show that many unconsidered factors including speaker specifications and signal properties, such as signal-to-noise ratio (SNR), can affect QoE so that the SNR... 

    A compensated PID active queue management controller using an improved queue dynamic model

    , Article International Journal of Communication Systems ; Vol. 27, issue. 12 , 2014 , pp. 4543-4563 Kahe, G ; Jahangir, A. H ; Ebrahimi, B ; Sharif University of Technology
    Abstract
    Beside the major objective of providing congestion control, achieving predictable queuing delay, maximizing link utilization, and robustness are the main objectives of an active queue management (AQM) controller. This paper proposes an improved queue dynamic model while incorporating the packet drop probability as well. By applying the improved model, a new compensated PID AQM controller is developed for Transmission Control Protocol/Internet Protocol (TCP/IP) networks. The non-minimum phase characteristic caused by Padé approximation of the network delay restricts the direct application of control methods because of the unstable internal dynamics. In this paper, a parameter-varying dynamic... 

    Web driven alert verification

    , Article 2014 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014 ; Sep , 2014 , p. 180-185 Najafi, A ; Sepahi, A ; Jalili, R ; Sharif University of Technology
    Abstract
    A web attack is an attack against a web server through the HTTP Protocol. By analyzing known web attacks, we find out that each one has its own behavior. Vestiges of their behavior could be detected in non-body parts of the HTTP Protocol. Such information can be used to verify web alerts generated by Web Application Firewalls (WAFs) and Web Intrusion Detection Systems (Web IDSs). In this paper, we propose a method to verify web alerts generated by mentioned sensors. The goal of the alert verification component is to eliminate or tag alerts that do not represent successful attacks. Our approach is based on analyzing HTTP Transaction metadata, including Request method, Request Headers, Status... 

    Verification of OSPF vulnerabilities by colored petri net

    , Article SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks ; November , 2013 , Pages 102-109 ; 9781450324984 (ISBN) Niari, S. T ; Jahangir, A. H ; Sharif University of Technology
    2013
    Abstract
    Routers and routing protocols are critical parts of a network infrastructure. OSPF is one of the most important routing protocols, and therefore its vulnerabilities can be very destructive. This makes its security analysis critical. There are many reported and potential vulnerabilities in OSPF protocol. Considering the complexity and the ambiguity of its description in RFC 2328, it is very valuable to design a formal model of the protocol and analyze the vulnerabilities of its critical parts. In this paper, some challenging parts of OSPF protocol along with attack scenarios are modeled by means of Colored Petri Net in CPN Tools environment. Then, the reported vulnerabilities are analyzed by... 

    An efficient group key management protocol using code for key calculation: CKC

    , Article Telecommunication Systems ; Volume 51, Issue 2-3 , 2012 , Pages 115-123 ; 10184864 (ISSN) Hajyvahabzadeh, M ; Eidkhani, E ; Mortazavi, S. A ; Nemaney Pour, A ; Sharif University of Technology
    2012
    Abstract
    This paper presents a new group key management protocol, CKC (Code for Key Calculation) for secure IP multicast. In this protocol which is based on logical key hierarchy, only the group key needs to be sent to new member at join. Then, using the group key current members and the new member calculate the necessary keys by node codes and one-way hash function. A node code is a random number assigned to each node to help users calculate necessary keys. Again, at leave server just sends the new group key to the remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results... 

    PPM - A hybrid push-pull mesh-based peer-to-peer live video streaming protocol

    , Article 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings 30 July 2012 through 2 August 2012 ; 2012 ; 9781467315449 (ISBN) Ghanbari, A ; Rabiee, H. R ; Khansari, M ; Salehi, M ; Sharif University of Technology
    IEEE  2012
    Abstract
    Using Peer-to-Peer (P2P) overlay networks have become a progressively popular approach for streaming live media over the Internet due to their deployment simplicity and scalability. In this paper, we propose a new hybrid push-pull live P2P video streaming protocol called PPM that combines the benefits of pull and push mechanisms for video delivery. Our main goal is to minimize the network end-to-end delay compared to the pure mesh networks. The PPM consists of two phases; Pull-based and Push-based. In the first phase, a new peer joins to the network based on a pull-based mechanism. In the second phase, a parent node based on the peers' overlay hop count in the mesh topology is selected.... 

    Improving security issues in MANET AODV routing protocol

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 1 September 2015 through 2 September 2015 ; Volume 155 , November , 2015 , Pages 237-250 ; 18678211 (ISSN) ; 9783319250663 (ISBN) Gharehkoolchian, M ; Hemmatyar, A. M. A ; Izadi, M ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    Mobile Ad-hoc Networks (MANETs) are forming dynamically by joining or leaving the nodes into/from the network without any fix infrastructure. It is also possible that each mobile node act as a host or router. This kind of wireless network is prone to various security threats or attacks due to its unique characteristics like dynamic topology, open medium, lack of central monitoring, etc. So security is a vital scope in MANET to protect communication between mobile nodes. Ad-hoc On-demand Distance Vector (AODV) is one of the on-demand reactive routing protocols in MANET that initially was improved without considering security protection. Significant attempts have been done to secure AODV... 

    Making HeNB more secure with improved secure access protocol and analyzing it

    , Article Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 16 September 2015 through 18 September 2015 ; Volume 158 , 2015 , Pages 107-120 ; 18678211 (ISSN) ; 9783319269245 (ISBN) Ghasemi Najm, F ; Payandeh, A ; Habibi, H ; Sharif University of Technology
    Springer Verlag  2015
    Abstract
    The 3rd Generation Partnership Project (3GPP) defined a new architecture, called Home eNode B (HeNB). HeNB is able to provide new services with higher data rate in a low cost. Security is a critical aspect of HeNB. In order to have HeNB secure access to core network, 3GPP defines an authentication protocol based on IKEv2. A number of security vulnerabilities such as HeNB masquerading have not been addressed and solved by 3GPP technical specification yet. In this paper an improved HeNB authentication protocol is introduced which does not allow an attacker to connect unauthorized network users using a mask. Finally, we evaluate our protocol performance and verify it by Automated Validation of... 

    Cross layering design of IPv6 fast handover in mobile WiMAX

    , Article ICT 2010: 2010 17th International Conference on Telecommunications, 4 April 2010 through 7 April 2010, Doha ; April , 2010 , Pages 304-308 ; 9781424452477 (ISBN) Farahbakhsh, R ; Sorooshi, M ; Sharif University of Technology
    2010
    Abstract
    Over the past few years, rapid advances in wireless broadband networks have been driving the evolution of communication and network technologies towards new mobile services for users. Handover management is still one of the most challenging issues to be solved for seamless mobility in wireless networks. To support mobility on terminal stations mobile WiMAX has been standardized. Moreover to provide seamless communications for such network Fast Mobile IPv6 (FMIPv6) has been proposed by IETF. But for seamless handover, collaboration of layer 2 and layer 3 is required. Thus, there is a requirement for cross-layering design to support proper behavior of the MIPv6 nodes in WiMAX networks. In this... 

    A new group key management protocol using code for key calculation: CKC

    , Article 2010 International Conference on Information Science and Applications, ICISA 2010, 21 April 2010 through 23 April 2010 ; April , 2010 ; 9781424459438 (ISBN) Hajyvahabzadeh, M ; Eidkhani, E ; Mortazavi, S. A ; Nemaney Pour, A ; Sharif University of Technology
    2010
    Abstract
    This paper presents a new group key management protocol, CKC (Code for Key Calculation). This protocol is based on logical key hierarchy. When a new member joins the group, server sends only the group key for that member. Then, current members and the new member calculate the necessary keys using node codes and one-way hash function. Node code is a code which is assigned to each node of the key tree. Again at leave, server just sends the new group key to remaining members. By this key, members calculate necessary keys using node codes and one-way hash function. The security of the keys is based on one-wayness of hash function. The results show that CKC reduces computational and communication... 

    A robust and efficient SIP authentication scheme

    , Article Scientia Iranica ; Volume 17, Issue 1 D , June , 2010 , Pages 25-38 ; 10263098 (ISSN) Mohammadi Nodooshan, A ; Darmani, Y ; Jalili, R ; Nourani, M ; Sayad Haghighi, M ; Sharif University of Technology
    2010
    Abstract
    The Session Initiation Protocol (SIP), which is becoming the de facto standard for the next-generation VoIP networks, is currently receiving much attention in many aspects. One aspect that was not deeply addressed in the original SIP is its authentication procedure. Apart from its security, an SIP authentication procedure should be efficient. This paper proposes a robust and efficient three-party SIP authentication protocol. In this protocol, the. end users are. authenticated with the proxy server in their domain using the. registrar server. Compared to previous works, our proposed protocol is more efficient and secure. To support our protocol with a formal security proof, its model is...