scholarly journals A Study on the Concept of Using Efficient Lightweight Hash Chain to Improve Authentication in VMF Military Standard

2020 ◽  
Vol 10 (24) ◽  
pp. 8999
Author(s):  
Dohoon Kim ◽  
Sang Seo ◽  
Heesang Kim ◽  
Won Gi Lim ◽  
Youn Kyu Lee

Authentication algorithms in the form of cryptographic schemes, such as the Secure Hash Algorithm 1 (SHA-1) and the digital signature algorithm (DSA), specified in the current variable message format (VMF) military standard have numerous reliability-related limitations when applied to tactical data link (TDL) and multi-TDL networks (MTN). This is because TDL and MTN require maximum tactical security, communication integrity, and low network overhead based on many protocol header bits for rapid communication with limited network resources. The application of such authentication algorithms to TDL and MTN in a rapidly changing battlefield environment without reinforcement measures will lead to functional weaknesses and vulnerabilities when high-level digital-covert activities and deception tactics are implemented. Consequently, the existing VMF authentication scheme must be improved to secure transmission integrity, lower network transaction, and receive authentication tactical information in VMF-based combat network radio (CNR) networks. Therefore, in this study, a tactical wireless ad hoc network topology, similar to that of the existing CNRs, is considered, and a lightweight multi-factor hash chain-based authentication scheme that includes a time-based one-time password (T-OTP) for network overhead reduction and terminal authentication is proposed, coupled with exception handling. The proposed method enhances the confidentiality of tactical message exchanges and reduces unnecessary network transactions and transmission bits for authentication flows between real-time military terminals owned by squads, while ensuring robustness in limited battlefields. Based on these approaches, in the future, we intend to increase the authentication reliability between wireless terminals in the Korean variable message format (KVMF)-based CNR networks based on the Korean Army Corps network scenarios.

2005 ◽  
Vol 4 (2) ◽  
pp. 518-521
Author(s):  
Monika Garg ◽  
Karanvir Kaur ◽  
Simerpreet Kaur

Mobile Ad hoc NETwork (MANET) is one of the important and unique applications. MANET does not require a fixednetwork infrastructure, every single node works as both a transmitter and a receiver. Nodes communicate directly witheach other when they are both within the same communication range else they can propagate message to neighbor nodesto pass the message. A new intrusion detection system named Enhanced Adaptive Acknowledgement (EAACK) speciallydesigned for MANETs. By the adoption of MRA scheme, EAACK is capable of detecting malicious nodes despite theexistence of false misbehavior report. The results will demonstrate positive performances against Watchdog, TWOACKand AACK in the cases of receiver collision, limited transmission power and false misbehavior report. EAACKdemonstrates higher malicious behavior detection rates in certain circumstances while does not greatly affect the networkperformances. EAACK is designed based on the Digital signature Algorithm (DSA) and RSA. Those techniques havedrawback due to network overhead. We need techniques for security like encryptions, hybrid encryption or sign encryptionto protect our message.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1342
Author(s):  
Borja Nogales ◽  
Miguel Silva ◽  
Ivan Vidal ◽  
Miguel Luís ◽  
Francisco Valera ◽  
...  

5G communications have become an enabler for the creation of new and more complex networking scenarios, bringing together different vertical ecosystems. Such behavior has been fostered by the network function virtualization (NFV) concept, where the orchestration and virtualization capabilities allow the possibility of dynamically supplying network resources according to its needs. Nevertheless, the integration and performance of heterogeneous network environments, each one supported by a different provider, and with specific characteristics and requirements, in a single NFV framework is not straightforward. In this work we propose an NFV-based framework capable of supporting the flexible, cost-effective deployment of vertical services, through the integration of two distinguished mobile environments and their networks: small sized unmanned aerial vehicles (SUAVs), supporting a flying ad hoc network (FANET) and vehicles, promoting a vehicular ad hoc network (VANET). In this context, a use case involving the public safety vertical will be used as an illustrative example to showcase the potential of this framework. This work also includes the technical implementation details of the framework proposed, allowing to analyse and discuss the delays on the network services deployment process. The results show that the deployment times can be significantly reduced through a distributed VNF configuration function based on the publish–subscribe model.


2021 ◽  
Vol 15 (2) ◽  
pp. 1-25
Author(s):  
Amal Alhosban ◽  
Zaki Malik ◽  
Khayyam Hashmi ◽  
Brahim Medjahed ◽  
Hassan Al-Ababneh

Service-Oriented Architectures (SOA) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown, how to deliver reliable Web services compositions is a significant and challenging problem. Services involved in an SOA often do not operate under a single processing environment and need to communicate using different protocols over a network. Under such conditions, designing a fault management system that is both efficient and extensible is a challenging task. In this article, we propose SFSS, a self-healing framework for SOA fault management. SFSS is predicting, identifying, and solving faults in SOAs. In SFSS, we identified a set of high-level exception handling strategies based on the QoS performances of different component services and the preferences articled by the service consumers. Multiple recovery plans are generated and evaluated according to the performance of the selected component services, and then we execute the best recovery plan. We assess the overall user dependence (i.e., the service is independent of other services) using the generated plan and the available invocation information of the component services. Due to the experiment results, the given technique enhances the service selection quality by choosing the services that have the highest score and betters the overall system performance. The experiment results indicate the applicability of SFSS and show improved performance in comparison to similar approaches.


2014 ◽  
Vol 4 (2) ◽  
pp. 35-45
Author(s):  
Margarita Jaitner

The increased adoption of social media has presented security and law enforcement authorities with significant new challenges. For example, the Swedish Security Service (SÄPO) asserts that a large proportion of radicalization takes place in open fora online. Still, approaches to contain social media-driven challenges to security, particularly in democratic societies, remain little explored. Nonetheless, this type of knowledge may become relevant in European countries in the near future: Amongst other factors, the challenging economic situation has resulted in increased public discontent leading to emergence or manifestation of groups that seek to challenge the existing policies by almost any means. Use of social media multiplies the number of vectors that need law enforcement attention. First, a high level of social media adaption allows groups to reach and attract a wider audience. Unlike previously, many groups today consist of a large but very loosely connected network. This lack of cohesion can present a challenge for authorities, to identify emerging key actors and assess threat levels. Second, a high level of mobile web penetration has allowed groups to ad-hoc organize, amend plans and redirect physical activities. Third, the tool social media is as not exclusive to potential perpetrators of unlawful action, but is as well available to law enforcement authorities. Yet, efficient utilization of social media requires a deep understanding of its nature and a well-crafted, comprehensive approach. Acknowledging the broad functionality of social media, as well as its current status in the society, this article describes a model process for security authorities and law enforcement work with social media in general and security services work in particular. The process is cyclic and largely modular. It provides a set of goals and tasks for each stage of a potential event, rather than fixed activities. This allows authorities to adapt the process to individual legal frameworks and organization setups. The approach behind the process is holistic where social media is regarded as both source and destination of information. Ultimately, the process aims at efficiently and effectively mitigating the risk of virtual and physical violence.


2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


2012 ◽  
Vol 433-440 ◽  
pp. 3944-3948
Author(s):  
Prasenjit Choudhury ◽  
Anita Pal ◽  
Anjali Gupchup ◽  
Krati Budholiya ◽  
Alokparna Banerjee

Ad-hoc networks are attractive, since they can provide a high level of connectivity without the need of a fixed infrastructure. Nodes that are not within the same transmission range communicate through multi-hops, where intermediate nodes act as relays. Mutual cooperation of all the participating nodes is necessary for proper operation of MANET. However, nodes in MANET being battery-constrained, they tend to behave selfishly while forwarding packets. In this paper, we have investigated the security of MANET AODV routing protocol by identifying the impact of selfish nodes on it. It was observed that due to the presence of selfish nodes, packet loss in the network increases and the performance of MANET degrades significantly. Finally a game theoretic approach is used to mitigate the selfishness attack. All the nodes in MANET should cooperate among themselves to thwart the selfish behavior of attacker nodes.


Sign in / Sign up

Export Citation Format

Share Document