Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108 - 31 October 2023

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm

    Adnan Hasan Bdair Aighuraibawi1,2, Selvakumar Manickam1,*, Rosni Abdullah3, Zaid Abdi Alkareem Alyasseri4,5, Ayman Khallel6, Dilovan Asaad Zebari9, Hussam Mohammed Jasim7, Mazin Mohammed Abed8, Zainb Hussein Arif7

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 553-574, 2023, DOI:10.32604/csse.2023.037948 - 26 May 2023

    Abstract Internet Protocol version 6 (IPv6) is the latest version of IP that goal to host 3.4 × 1038 unique IP addresses of devices in the network. IPv6 has introduced new features like Neighbour Discovery Protocol (NDP) and Address Auto-configuration Scheme. IPv6 needed several protocols like the Address Auto-configuration Scheme and Internet Control Message Protocol (ICMPv6). IPv6 is vulnerable to numerous attacks like Denial of Service (DoS) and Distributed Denial of Service (DDoS) which is one of the most dangerous attacks executed through ICMPv6 messages that impose security and financial implications. Therefore, an Intrusion Detection System (IDS)… More >

  • Open Access

    ARTICLE

    Enhancing Bandwidth Utilization of IP Telephony Over IPv6 Networks

    Hani Al-Mimi1,*, Yousef Alrabanah2, Mosleh M. Abualhaj3, Sumaya N. Al-khatib3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1039-1049, 2023, DOI:10.32604/csse.2023.024338 - 15 June 2022

    Abstract The demand for the telecommunication services, such as IP telephony, has increased dramatically during the COVID-19 pandemic lockdown. IP telephony should be enhanced to provide the expected quality. One of the issues that should be investigated in IP telephony is bandwidth utilization. IP telephony produces very small speech samples attached to a large packet header. The header of the IP telephony consumes a considerable share of the bandwidth allotted to the IP telephony. This wastes the network's bandwidth and influences the IP telephony quality. This paper proposes a mechanism (called Smallerize) that reduces the bandwidth More >

  • Open Access

    ARTICLE

    A Decision-Based Hybrid Proxy Mobile IPv6 Scheme for Better Resources Utilization

    Habib Ullah Khan1,*, Anwar Hussain2, Shah Nazir2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5151-5167, 2022, DOI:10.32604/cmc.2022.030837 - 28 July 2022

    Abstract Seamless mobility is always one of the major requirements of modern-day communication. In a heterogeneous and massive IoT environment, efficient network-based mobility protocol such as proxy mobile IPv6 (PMIPv6), is potentially a good candidate for efficient mobility as well as resource utilization efficiency. Several extensions are devised for performance in the research domain. However, a multi-criterion decision-based resource-efficient PMIPv6 extension is required to achieve efficiency when network resources are overloaded. In this research, a multi-criterion decision-based PMIPv6 scheme is devised that provides better performance when the Local Mobility Anchor (LMA) or Mobile Access Gateway (MAG) More >

  • Open Access

    ARTICLE

    QoS in FANET Business and Swarm Data

    Jesús Hamilton Ortiz1, Carlos Andrés Tavera Romero2,*, Bazil Taha Ahmed3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796 - 24 February 2022

    Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with… More >

  • Open Access

    ARTICLE

    5G Smart Mobility Management Based Fuzzy Logic Controller Unit

    Chafaa Hamrouni1,*, Slim Chaoui2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4941-4953, 2022, DOI:10.32604/cmc.2022.023732 - 14 January 2022

    Abstract In the paper, we propose a fuzzy logic controller system to be implemented for smart mobility management in the 5G wireless communication network. Mobility management is considered as a main issue for all-IP mobile networks future generation. As a network-based mobility management protocol, Internet Engineering Task Force developed the Proxy Mobile IPv6 (PMIPv6) in order to support the mobility of IP devices, and many other results were presented to reduce latency handover and the amount of PMIPv6 signaling, but it is not enough for the application needs in real-time. The present paper describes an approach More >

  • Open Access

    ARTICLE

    Saving the Bandwidth of IPv6 Networks Using the Fields of the Packet Header

    Mosleh M. Abualhaj*, Abdelrahman H. Hussein, Qasem M. Kharma, Qusai Y. Shambour, Sumaya N. Al-Khatib

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1971-1980, 2022, DOI:10.32604/iasc.2022.021458 - 09 October 2021

    Abstract IPv6 protocol is the future of IP networks due to its large IP address capacity. One of the key consequences of this large capacity is that the IP protocol header has enlarged from 20-byte in IPv4 to 40-byte in IPv6. This will consume a considerable share of the bandwidth (BW) for VoIP applications, which produce small packets in tens of bytes only. To handle this issue, we have introduced an efficient technique to use the superfluous fields in the VoIP packet header, including the IPv6 header, to hold the voice data of the packet. This… More >

  • Open Access

    ARTICLE

    Cluster-Based Group Mobility Support for Smart IoT

    Kanwal Imran1,*, Nasreen Anjum3, Saeed Mahfooz1, Muhammad Zubair2, Zhahoui Yang3, Abdul Haseeb Malik1, Qazi Ejaz Ali1, Madeeha Aman1

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2329-2347, 2021, DOI:10.32604/cmc.2021.017177 - 13 April 2021

    Abstract IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) connects the highly constrained sensor nodes with the internet using the IPv6 protocol. 6LoWPAN has improved the scalability of the Internet of Things (IoTs) infrastructure and allows mobile nodes to send packets over the IEEE 802.15.4 wireless network. Several mobility managements schemes have been suggested for handling the registration and handover procedures in 6LoWPAN. However, these schemes have performance constraints, such as increased transmission cost, signalling overhead, registration, and handover latency. To address these issues, we propose a novel cluster-based group mobility scheme (CGM6) for 6LoWPAN.… More >

  • Open Access

    ARTICLE

    IPv6 Cryptographically Generated Address: Analysis, Optimization and Protection

    Amjed Sid Ahmed1,*, Rosilah Hassan2, Faizan Qamar3, Mazhar Malik1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 247-265, 2021, DOI:10.32604/cmc.2021.014233 - 22 March 2021

    Abstract In networking, one major difficulty that nodes suffer from is the need for their addresses to be generated and verified without relying on a third party or public authorized servers. To resolve this issue, the use of self-certifying addresses have become a highly popular and standardized method, of which Cryptographically Generated Addresses (CGA) is a prime example. CGA was primarily designed to deter the theft of IPv6 addresses by binding the generated address to a public key to prove address ownership. Even though the CGA technique is highly effective, this method is still subject to… More >

  • Open Access

    ARTICLE

    An Alias Resolution Method Based on Delay Sequence Analysis

    Yang Tao1, Gang Hu1, Bingnan Hou1, Zhiping Cai1, *, Jing Xia1, Cheang Chak Fong2

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1433-1443, 2020, DOI:10.32604/cmc.2020.09850 - 30 April 2020

    Abstract Alias resolution, mapping IP addresses to routers, is a critical step in obtaining a network topology. The latest work on alias resolution is based on special fields in the packet, such as IP ID, port number, etc. However, for security reasons, most network devices block packets for setting options, and some related fields exist only in IPv4, so these methods cannot be used for alias resolution of IPv6. In order to solve the above problems, we propose an alias analysis method based on delay sequence analysis. In this article, we present a new model to… More >

Displaying 1-10 on page 1 of 10. Per Page