This website uses cookies to ensure you have the best experience. Learn more

Network Security Essay

1065 words - 5 pages

EXECUTIVE SUMMARY

Selective forwarding or dropping of packets is a serious threat to multi hop communication in a Wireless Sensor Network (WSN). There are various schemes to induce cooperation in a WSN to overcome this problem. In this paper, we have introduced a novel adversary model and have proposed an incentive based scheme to inspire cooperation among nodes in a Geometric Structure based WSN. The scheme has been formally analyzed. The efficacy of the scheme is also established through various simulation experiments.

INTRODUCTION

Nodes in mobile ad-hoc networks are arbitrarily deployed without relying on any fixed network infrastructure. In a multi-hop wireless network, many ...view middle of the document...

One way to support efficient communication between nodes is to develop wireless backbone architecture.
In all these papers, nodes are classified in two categories: TRUSTED those who forward packets and MALICIOUS, those who do not like to forward others’ packets. Moreover, malicious nodes, according to these papers are content by dropping packets to conserve their resources. In this paper, we have introduced two further dimensions to this misbehavior model. First, we introduced a ‘rational adversary’ category of nodes. ‘Rational adversary nodes’ do not mind dropping packets if they are not penalized for that. Second, we have incorporated an idea by which ‘malicious’ nodes inspire their neighboring nodes to drop packets.

In order to design backbone network Trusted nodes are elected to form the backbone. These nodes are called clusterheads and gateways. Clusterheads are nodes that are vested with the responsibility of routing messages for all the nodes within their cluster. Cluster heads may form a second tier network, i.e. making another level of hierarchy or they may just pass on the data to the base station. Gateway nodes are nodes at the fringe of a cluster and typically communicate with gateway nodes of other clusters. The wireless backbone can be used either to route packets, or to disseminate routing information, or both. Due to the mobility of nodes in an ad hoc network, the backbone must be continuously reconstructed in a timely fashion, as the nodes move away from their associated clusterheads.

For Leader election algorithm, I want to use generalized clustering heuristics like “Max-Min D-Cluster Formation” made cluster head formation with nodes at most D hops away from a cluster head. These were distributed leader election heuristic for an ad hoc network, guaranteeing that no node is more than D hops away from a leader, where D is a value selected for the heuristic. Thus, this heuristic extends the notion of cluster formation. Existing 1-hop clusters are an instance of the generic D-hop clusters. The proposed heuristic provides load balancing among clusterheads to insure a fair distribution of load among clusterheads. Additionally, the heuristic elects clusterheads in such a manner as to favor their re-election in future rounds,...

Other assignments on Network Security

It Infrastructure Essay

310 words - 2 pages that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.1. What are the differences between ZeNmap GUI (Nmap) and Nessus?ZeNmap is used to map a network and Nessus is used to Test a network for vulnerabilities.2. Which scanning application

Cool Essay

847 words - 4 pages location information for the devices. Provide a comprehensive list of devices including the quantity of each device needed. Justification Justify your determination that the selected network devices will meet the business needs. D. Network Security Devices Business Needs Assess the business needs. Proposed Network Security Devices Select network security devices to use to secure the network. Include setup and location information for

Lan Lan Lan Aland

583 words - 3 pages LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to

Is3230 Unit 2 Assignment 1

307 words - 2 pages Selecting Security Countermeasures IS3220 As a technology associate in the information system department at Corporation Tech I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the internet without proper security can be harmful in many ways. The first thing that should be added is a firewall. Firewalls can prevent unwanted traffic from infiltrating the network. This is

Global Finance

3346 words - 14 pages . Normally, network choices rely on the company budget, network coverage, and internal and external regulations. Effective network security requires constant upgrades and close monitoring to ensure possible loopholes are sealed in time. Executive Summery Global Finance, Inc. network is constructed by sets of routers and switches. The network switches and routers are designed with unique typologies including different sizes of meshes. The network

Selecting Security Countermeasures

374 words - 2 pages IS3220 Assignment 2: Selecting Security Countermeasures As a Technology Associate in the Information System Department at Corporation Tech, I have reviewed the new network design and identified possible security threats and appropriated countermeasures. Entering the Internet without proper security can be harmful in many ways. The first thing that should be added is firewalls. Firewalls can prevent unwanted traffic from infiltrating the

Wan Security

1341 words - 6 pages Executive Summary This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to

Protection From Those Who Would Harm Us

550 words - 3 pages , it has become essential to be cautious of the unseen threats that lurk in cyberspace. This essay is going to touch on the relevance of network security and the protection of families. One of the greatest missions placed upon all of God’s children is to protect one another. "But if any provide not for his own, and specially for those of his own house, he hath denied the faith, and is worse than an infidel" (1 Timothy 5:8). The greatest weapon

Integrative Network Design Project Part 3

827 words - 4 pages threats. Another option is the use of Secure Socket Layer (SSL) which encrypts data packets before it is moved over the network rendering it unreadable if it should be intercepted. Other options that are available to protect the network would be the use of one-way hashing algorithms or transport layer security. The methods used for securing the network are often time determined by the type of network involved. In this section we will look at the

Computer Security & Privacy - Tjx

620 words - 3 pages / card invalidated / expiring the spending power, Financial Institutions –re-issue the cards for those customers whose information was compromised, Store Associates –change their credentials for system access, Vendors, Merchandisers - Modify the information shared due to mutual network and Richel Owen, CSO- design long and short term strategy to address the security breach issue. Intruders utilized the data stolen to produce bogus credit/debit cards

Nt 2580 Testing And Monitoring

309 words - 2 pages . Passwords that meet security requirements but remain easily guessable are a hazard and could affect a network. The Solution: Implementing a change of password every so often. Implement the strategy that requires a combination of letters and numbers, and a minimum of a 30 day password renewal policy. Information on a laptop that is not encrypted would be a huge security issue. It would be likely that there would be some sort of damage in the event of “falling into the wrong hands.” The Solution: To prevent this from happening it is important to encrypt the drives and other sensitive information.

Similar Documents

Roles Involved In Network Security Essay

430 words - 2 pages distinguishing between different firewall policies and active services. • I would use Nessus Security Scanner with a tool providing a Scripting Language (NASL) to write a security test based on my findings on the weaknesses of my network. • Another technique is the use of Nmap for scanning the network and single hosts. I would try the stealth ability of Nmap to bypass firewalls scanning all different protocols UDP, TCP, or ICMP. Ultimately the

Network Security And Ethical Hacking Essay

5261 words - 22 pages Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to

Biggest Challenges Today Are To Control The Network Security

399 words - 2 pages  Biggest challenges today are to control the network security. Network security is having protection of networks and their services from unauthorized access, destruction, or disclosure. Malicious acts bring up the important topic of disaster recovery. Companies must have up to date copies of their important documents and software to prevent extended downtime. The saved information will let the company's employees continue to work while the IT

The Internet Essay

989 words - 4 pages Theresa Jn. Baptiste - St. Lucia Managing Information Technology Security isn’t simply a technology issue, it’s a business issue. Discuss In any given organization information technology generally refers to laptop and desktop computers, servers, routers, and switches that form a computer network, although information technology also includes fax machines, phone and voice mail systems, cellular phones, and other electronic systems. A