Filter by type:

Sort by year:

An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks

Journal Paper
Shahram Jamali, Reza Fotohi, Morteza Analoei
Jamali, S., Fotohi, R., Analoui, M. (2018). An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks. TABRIZ JOURNAL OF ELECTRICAL ENGINEERING, 47(4), 1407-1419.
Abstract
Mobile ad hoc networks (MANETs) are structure-less networks in which the mobile nodes are communicate wirelessly with each other’s. This wireless channel makes the MANETs vulnerable against different types of attacks. Wormhole is one of these attacks, according to which, two active attackers create a virtual private communication tunnel; reduce message normal stream and pretend two non-neighbored nodes as neighbors. In this way, the path between these two nodes is pretended as the shortest possible route between the source and the destination. Thus, all data packets passing through this route can be eliminated by these attacker nodes. This paper inspires from human immune system to design a defense mechanism against wormhole attack, called WAAIS (Wormhole Attack Artificial Immune System). In this proposed mapping, all unsecure routes, are considered as antigen. These unsecure routes are recognized by some rules, which are considered as antibody. The simulation results show that WAAIS outperforms WormPlanar and AODV in terms of packet delivery rate, average end-to-end delay and drop packets rate.
Keywords
WAAISArtificial Immune SystemWormhole attackMobile Ad-Hoc Networks (MANETs)

An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks

Journal Paper
Shahram Behzad, Reza Fotohi, Jaber Hosseini Balov, Mohammad Javad Rabipour
Behzad, S., Fotohi, R., Balov, J. H., & Rabipour, M. J. (2018). An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks. JCP, 13(6), 705-720.

Abstract

MANETs (Mobile Ad-hoc Networks) is a temporal network, which is managed by autonomous nodes, which have the ability to communicate with each other without having fixed network infrastructure or any central base station. Due to some reasons such as dynamic changes of the network topology, trusting the nodes to each other, lack of fixed substructure for the analysis of nodes’ behaviors and loss of specific offensive lines, this type of networks is not supportive against malicious nodes’ attacks. One of these attacks is black hole attack. In this attack, the malicious nodes absorb data packets and destroy them. Thus, it is essential to present an algorithm against the black hole attacks. This paper proposed a new approach, which improvement the security of DSR routing protocol to encounter the black hole attacks. This schema tries to identify malicious nodes according to nodes’ behaviors in a MANETs and isolate them from routing. The proposed protocol, called AIS-DSR (Artificial Immune System DSR) employ AIS (Artificial Immune System) to defend against black hole attacks. AIS-DSR is evaluated through extensive simulations in the ns-2 environment. The results show that AIS-DSR outperforms other existing solutions in terms of throughput, end-to-end delay, packets loss ratio and packets drop ratio.

Index Terms—MANETs, DSR routing protocol, black hole attacks, AIS-DSR.

A Cluster Based Job Scheduling Algorithm for Grid Computing

Journal Paper
Reza Fotohi and Mehdi Effatparvar
Fotohi, R., & Effatparvar, M. (2013). A cluster based job scheduling algorithm for grid computing. International Journal of Information Technology and Computer Science (IJITCS), 5(12), 70-77.

Abstract

Grid computing enables sharing, selection and aggregation of computing resources for solving complex and large-scale scientific problems. The resources making up a grid need to be managed to provide a good quality of service. Grid scheduling is a vital component of a Computational Grid infrastructure.
This paper presents a dynamic cluster based job scheduling algorithm for efficient execution of user jobs. This paper also includes the comparative performance analysis of our proposed job scheduling algorithm along with other well-known job scheduling algorithms considering the parameters like average waiting time, average turnaround time, average response time and average total completion time.
The result has shown also exhibit that Our proposed scheduling algorithms (CHS ) has shown the best average waiting times, average turnaround times, average response times and average total completion times compared to other job scheduling approaches.

Index Terms: Grid Computing, Scheduling Algorithm, Cluster based Hybrid Scheduling, CHS

An Improvement over AODV Routing Protocol by Limiting Visited Hop Count

Journal Paper
Reza Fotohi, Shahram Jamali, Fateme Sarkohaki, Shahram Behzad
Fotohi, R., Jamali, S., Sarkohaki, F., & Behzad, S. (2013). An Improvement over AODV routing protocol by limiting visited hop count. International Journal of Information Technology and Computer Science (IJITCS), 5(9), 87-93.

Abstract

The AODV protocol is based on the minimum delay path as its route selection criteria, regardless of the paths load. This issue leads to unbalanced load dissemination in the network and the energy of the nodes on the shortest path deplete earlier than others. We proposed an improved AODV protocol with limited TTL (Time to Live) of RREP packet in which the route reply (RREP) packet of AODV is modified to limite TTL information of nodes. Experiments have been carried out using network simulator software (NS2). Simulation results show that our proposed routing protocol outperforms regular AODV in terms of packet delivery rate, good put, throughput, and jitter.

Index Terms: AODV, Routing Protocols, Multi-Hop

Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops

Journal Paper
Shahram Behzad, Reza Fotohi, Shahram Jamali
Behzad, S., Fotohi, R., & Jamali, S. (2013). Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. International Journal of Information Technology and Computer Science (IJITCS), 5(6), 2013.

Abstract

Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The purpose of this paper is to provide a better quality of the package delivery rate and the throughput, that is in need of powerful routing protocol standards, which can guarantee delivering of the packages to destinations, and the throughput on a network. For achieving this purpose, we use OLSR routing protocol that is a responsive protocol and is currently covered under the IETF standard (RFC 3626). At this paper, we improved the OLSR routing protocol by eliminating the unnecessary loops, and simulation results demonstrated a significant improvement in the criteria of package delivery rate and throughput.

Index Terms: Mobile Ad Hoc Networks, Routing, Routing Protocol, OLSR, Dynamic, Topology

Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols

Journal Paper
Reza Fotohi, Shahram Jamali, Fateme Sarkohaki
Fotohi, R., Jamali, S., & Sarkohaki, F. (2013). Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols. International Journal of Information Technology and Computer Science (IJITCS), 5, 21.

Abstract

Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The routing is particularly a challenging task in MANETs that selecting paths in a network along which to send network traffic. In this paper, the performance analysis is carried out on Ad-hoc On-demand Distance Vector (AODV), Limited Hop Count AODV (LHC-AODV), Optimized Link State Routing (OLSR), Unnecessary Loop OLSR (UL-OLSR) and Destination Sequenced Distance Vector (DSDV) protocols using NS2 simulator. The delay, throughput, and packet delivery ratio are the three common measures used for the comparison of the performance of above protocols.

Index Terms: MANETs, Routing protocols, AODV, LHC-AODV, OLSR, UL-OLSR, DSDV, Network simulator (NS2)

A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

Journal Paper
Reza Fotohi and Shahram Jamali
Fotohi, R., & Jamali, S. (2014). A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. International journal of Computer Science & Network Solutions, 2, 37-56.
Abstract
A mobile ad hoc network (MANET) contains a collection of wireless mobile nodes that forms a temporary network without having any fixed infrastructure or centralized administration. MANET is assailable to routing misbehaviour. We are worried of an especially severe security attack that affects the MANET routing protocols, it is called the wormhole attack. During the attack an attacker captures packets from one location in the network, and tunnels them to other attacker at a distant point, which replays them locally. In this paper, we examine briefly the behavior of various Denial-of-Service attacks at the network layer of MANET and provide comprehensive survey of on wormhole attack and introduce the existing defense approaches to these attacks.
Keywords: MANETs, Wormhole attack, AODV, DSR.

Defense Against the Attacks of the Black Hole, Gray Hole and Wormhole in MANETs Based on RTT and PFT

Journal Paper
Shahram Behzad, Reza Fotohi, Fathulah Dadgar
Behzad, S., Fotohi, R., & Dadgar, F. (2015). Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. International Journal of Computer Science and Network Solutions (IJCSNS), 3, 89-103.

Abstract
Mobile ad hoc networks are regarded as a group of networks consisted of wireless systems which developing together a network with self-arrangement capability. These networks have no constant communication infrastructure and use central nodes to communicate with other nodes. Despite lots of advantages, these networks face severe security challenges, since their channels are wireless and each node is connected to central node. One of these concerns is the incidence of black hole stacks damaging mobile ad hoc networks routing protocols. Through this process, the Attacker node announces itself as the nearest to destination node; then, network nodes choose it as the central node when transmitting their data packets. As a result, this node can delete its delivered packets rather transmitting. In this paper, for Defense against attacks at the network layer, such as black, gray, hole, wormhole, in Mobil ad hoc network of RTT, PFT test. Simulation results revealed that the proposed method, is compared with DSR and AODV protocol under attack in terms of packet delivery rate, throughput, end to end delay of packets loss and higher efficiency.

Keyword: MANETs (Mobile ad hoc networks), DSR (Dynamic Source Routing), Black hole attack, AODV (Ad hoc
On-Demand Distance Vector Routing),

A Hybrid Routing Method for Mobile ad-hoc Networks

Journal Paper
Reza Fotohi, Roodabe Heydari, Shahram Jamali
Fotohi, R., Heydari, R., & Jamali, S. (2016). A Hybrid routing method for mobile ad-hoc networks. Journal of Advances in Computer Research, 7(3), 93-103.
Abstract

Mobile-Ad-Hoc-Networks (MANETs) are self-configuring networks of mobile nodes, which communicate through wireless links. The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. The main issues in MANETs include the mobility of the network nodes, the scarcity of computational, bandwidth and energy resources. The routing is particularly a challenging task in MANETs that selecting paths in a network along which to send network traffic. Thus, Mobile Ad hoc Network (MANET) routing protocols should explicitly consider network changes and node changes in their operations. In this paper we present a novel routing algorithm for mobile ad hoc networks.It employs both reactive and proactiveschemes in its design. Simulation results show that our protocol can outperform AODV, AOMDV and DSDV protocols in terms of, packet delivery ratio, packet loss and throughput.

Keywords
MANETsRoutingMulti AgentMulti Objective

Securing of Unmanned Aerial Systems (UAS) Against Security Threats Using Human Immune System

Journal Paper
Reza Fotohi
Fotohi, R. (2019). Securing of Unmanned Aerial Systems (UAS) Against Security Threats Using Human Immune System. Reliability Engineering & System Safety, 106675.

Abstract

UASs form a large part of the fighting ability of the advanced military forces. In particular, these systems that carry confidential information are subject to security attacks. Accordingly, an Intrusion Detection System (IDS) has been proposed in the proposed design to protect against the security problems using the human immune system (HIS). The IDSs are used to detect and respond to attempts to compromise the target system. Since the UASs operate in the real world, the testing and validation of these systems with a variety of sensors is confronted with problems. This design is inspired by HIS. In the mapping, insecure signals are equivalent to an antigen that are detected by antibody- based training patterns and removed from the operation cycle. Among the main uses of the proposed design are the quick detection of intrusive signals and quarantining their activity. Moreover, SUAS-HIS method is evaluated here via extensive simulations carried out in NS-3 environment. The simulation results indicate that the UAS network performance metrics are improved in terms of false positive rate, false negative rate, detection rate, and packet delivery rate.

Keywords: Unmanned Aerial Systems, Security threats, IDS, HIS, Routing security, SUAS-HIS

DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

Journal Paper
Shahram Jamali and Reza Fotohi
Jamali, S., & Fotohi, R. (2017). DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. the Journal of Supercomputing, 73(12), 5173-5196.

Abstract

Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread on a geographically limited region, without requiring any preexisting infrastructure. Mostly, nodes are both self-governed and self-organized without requiring a central monitoring. Because of their distributed characteristic, MANETs are vulnerable to a particular routing misbehavior, called wormhole attack. In wormhole attack, one attacker node tunnels packet from its position to the other attacker nodes. Such wormhole attack results in a fake route with fewer hop count. If source node selects this fictitious route, attacker nodes have the options of delivering the packets or dropping them. For this reason, this paper proposes an improvement over AODV routing protocol to design a wormhole-immune routing protocol. The proposed protocol called defending against wormhole attack (DAWA) employs fuzzy logic system and artificial immune system to defend against wormhole attacks. DAWA is evaluated through extensive simulations in the NS-2 environment. The results show that DAWA outperforms other existing solutions in terms of false negative ratio, false positive ratio, detection ratio, packet delivery ratio, packets loss ratio and packets drop ratio.

Keywords: Mobile ad hoc networks Wormhole attacks Artificial immune system Fuzzy logic DAWA 

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

Journal Paper
Reza Fotohi, Somayyeh Firoozi Bari, Mehdi Yusefi
Fotohi, R., Firoozi Bari, S., Yusefi, M., (2020). Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. International Journal of Communication Systems.

Abstract

Wireless sensor networks (WSNs) have been vastly employed in the collection and transmission of data via wireless networks. This type of network is nowadays used in many applications for surveillance activities in various environments due to its low cost and easy communications. In these networks, the sensors use a limited power source which after its depletion, since it is non-renewable, network lifetime ends. Due to the weaknesses in sensor nodes, they are vulnerable to many threats. One notable attack threating WSN is Denial of Sleep (DoS). DoS attacks denotes the loss of energy in these sensors by keeping the nodes from going into sleep and energy-saving mode. In this paper, the Abnormal Sensor Detection Accuracy (ASDA-RSA) method is utilised to counteract DoS attacks to reducing the amount of energy consumed. The ASDA-RSA schema in this paper consists of two phases to enhancement security in the WSNs. In the first phase, a clustering approach based on energy and distance is used to select the proper cluster head and in the second phase, the RSA cryptography algorithm and interlock protocol are used here along with an authentication method, to prevent DoS attacks. Moreover, ASDA-RSA method is evaluated here via extensive simulations carried out in NS-2. The simulation results indicate that the WSN network performance metrics are improved in terms of average throughput, Packet Delivery Ratio (PDR), network lifetime, detection ratio, and average residual energy.

KEYWORDS: WSNs, Denial of Sleep Attack, Network lifetime, RSA cryptography, ASDA-RSA

Defending against Wormhole Attack in MANET Using an Artificial Immune System

Journal Paper
Shahram Jamali and Reza Fotohi
Jamali, S., & Fotohi, R. (2016). Defending against wormhole attack in MANET using an artificial immune system. New Review of Information Networking, 21(2), 79-100.

MANETs are mobile networks that are spontaneously deployed over a geographically limited area without requiring any pre-existing infrastructure. Typically, nodes are both autonomous and self-organized without requiring a central administration or a fixed network infrastructure. Due to their distributed nature, MANET is vulnerable to a specific routing misbehavior, called wormhole attack. In a wormhole attack, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer hop count. If the source node follows this fake route, malicious nodes have the option of delivering the packets or dropping them. This article aims at removing these attacks. For this purpose, it investigates the use of an Artificial Immune System (AIS) to defend against wormhole attack. The proposed approach learns rapidly how to detect and bypass the wormhole nodes without affecting the overall performance of the network. The proposed approach is evaluated in comparison with other existing solutions in terms of dropped packet count, packet loss ratio, throughput, packet delivery ratio, and end-to-end delay. A simulation result shows that the proposed approach offers better performance than other schemes defending against the wormhole attack.

A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network

Journal Paper
Reza Fotohi, Yaser Ebazadeh, Mohammad Seyyar Geshlag
Fotohi, R., Ebazadeh, Y., & Geshlag, M. S. (2016). A new approach for improvement security against DoS attacks in vehicular ad-hoc network. International Journal of Advanced Computer Science and Applications, 7(7), 10-16.

Abstract

Vehicular Ad-Hoc Networks (VANET) are a proper subset of mobile wireless networks, where nodes are revulsive, the vehicles are armed with special electronic devices on the motherboard OBU (On Board Unit) which enables them to trasmit and receive messages from other vehicles in the VANET. Furthermore the communication between the vehicles, the VANET interface is donated by the contact points with road infrastructure. VANET is a subgroup of MANETs. Unlike the MANETs nodes, VANET nodes are moving very fast. Impound a permanent route for the dissemination of emergency messages and alerts from a danger zone is a very challenging task. Therefore, routing plays a significant duty in VANETs. decreasing network overhead, avoiding network congestion, increasing traffic congestion and packet delivery ratio are the most important issues associated with routing in VANETs. In addition, VANET network is subject to various security attacks. In base VANET systems, an algorithm is used to dicover attacks at the time of confirmation in which overhead delay occurs. This paper proposes (P-Secure) approach which is used for the detection of DoS attacks before the confirmation time. This reduces the overhead delays for processing and increasing the security in VANETs. Simulation results show that the P-Secure approach, is more efficient than OBUmodelVaNET approach in terms of PDR, e2e_delay, throughput and drop packet rate.

An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System

Journal Paper
Fatemeh Sarkohaki, Reza Fotohi, Vahab Ashrafian
Sarkohaki, F., Fotohi, R., & Ashrafian, V. (2017). An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. International Journal of Advanced Computer Science and Applications (IJACSA), 8 (4).

Abstract:

Characteristics of the mobile ad-hoc networks such as nodes high mobility and limited energy are regarded as the routing challenges in these networks. OLSR protocol is one of the routing protocols in mobile ad hoc network that selects the shortest route between source and destination through Dijkstra’s algorithm. However, OLSR suffers from a major problem. It does not consider parameters such as nodes’ energy level and links length in its route processing. This paper employs the artificial immune system (AIS) to enhance efficiency of OLSR routing protocol. The proposed algorithm, called AIS-OLSR, considers hop count, remaining energy in the intermediate nodes, and distance among node, which is realized by negative selection and ClonalG algorithms of AIS. Widespread packet – level simulation in ns-2 environment, shows that AIS-OLSR outperforms OLSR and EA-OLSR in terms of packet delivery ratio, throughput, end-end delay and lifetime.