Mojtaba Jamshidi - Academia.edu (original) (raw)

Papers by Mojtaba Jamshidi

Research paper thumbnail of ADBR: Accelerated Depth-Based Routing for Underwater Sensor Networks

JITCE (Journal of Information Technology and Computer Engineering)

It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networ... more It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networks (UWSNs) in terms of packet delivery ratio, end-to-end delay of packet delivery from the source to the destination, and energy consumption. The reasons of that are UWSNs have unique characteristics (e.g. using acoustic channels instead of radio channels for communications), and they have dynamic topology due to the movement of the sensor by the water flow. Depth-Based Routing (DBR) considers one of the well-known algorithms in this context. DBR is a very simple algorithm; however, it is inefficient in terms of packet delivery rate, end-to-end delay, and energy consumption. This study we developed DBR by adding an accelerated routine to it to improve its efficiency, the proposed algorithm; called Accelerated Depth-Based Routing (ADBR). In ADBR, a simple probabilistic mechanism is used to accelerate packet forwarding and provide more multi-path to the destination. In ADBR, each node imme...

Research paper thumbnail of A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes

Ad Hoc & Sensor Wireless Networks, 2019

Research paper thumbnail of A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks

Selective forwarding attack is a dangerous attack in wireless sensor networks, in which a malicio... more Selective forwarding attack is a dangerous attack in wireless sensor networks, in which a malicious node attempts to drop some incoming packets. This means that it refuses to forward them to destination. Selective forwarding attack has a highly destructive impact on multihop routing protocols in wireless sensor networks and decreases the packets delivery ratio to sinks. This paper proposes a secure routing protocol against selective forwarding attack in wireless sensor networks. The main idea of the proposed algorithm is to establish a cell structure within the network so that W≥1 node plays the monitoring role in each cell that monitors activities of the remaining nodes in the cell. By overhearing traffic within the cell, the observer nodes find out whether the nodes are maliciously drop packets. If the observer nodes recognize that a node is malicious and does not forward the incoming packet to the destination, they will alter the path of the packets. The proposed algorithm was im...

Research paper thumbnail of Using One-hop and Two-hop Neighbouring Information to Defend Against Sybil Attacks in Stationary Wireless Sensor Network

Considering the application of wireless sensor networks (WSNs) in critical areas like war fields,... more Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this attack, a malicious node broadcasts several IDs simultaneously. Thus, the malicious node of the adversary attracts high traffic to itself and disrupts routing protocols and affects other operations of the network like data aggregation, voting, and resource allocation, negatively. In this paper, an efficient algorithm based on one-hop and two-hop neighborhood information is proposed to detect Sybil nodes in the stationary WSNs. The proposed algorithm is executed locally with the collaboration of neighboring nodes. The main purpose of the proposed algorithm is to increase the accuracy of detecting Sybil nodes under various conditions including the condition in which a malicious node broadcasts a few numbers of Sybil IDs which is the short...

Research paper thumbnail of A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes

1Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq 2Depar... more 1Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq 2Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran E-mail: miladranjbari@gmail.com 3Faculty of Computer Engineering, K. N. Toosi University of Technology, Tehran, Iran E-mail: esnaashari@kntu.ac.ir 4Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq E-mail: aso.darwesh@uhd.edu.iq 5Computer Engineering and Information Technology Department, Amirkabir University of Technology, Tehran, Iran E-mail: mmeybodi@aut.ac.ir

Research paper thumbnail of DSLA: Defending against Selective Forwarding Attack in Wireless Sensor Networks using Learning Automaton

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of The Use of Data Mining Techniques in Predicting the Noise Emitted By the Trailing Edge of Aerodynamic Objects

JOIV : International Journal on Informatics Visualization

Aerodynamic is a branch of fluid dynamics that evaluates the behavior of airflow and its interact... more Aerodynamic is a branch of fluid dynamics that evaluates the behavior of airflow and its interaction with moving objects. The most important application of aerodynamic is in aerospace engineering, designing and construction of flying objects. Reduction of noise emitted by aerodynamic objects is one of the most important challenges in this area and many efforts have been to reduce its negative effects. The prediction of noise emitted from these aerodynamic objects is a low-cost and fast approach that can partially replace the "fabrication and testing" phase. One of the most common and successful tools in prediction procedures is data mining technology. In this paper, the performance of different data mining algorithms such as Random Forest, J48, RBF Network, SVM, MLP, Logistic, and Bagging is evaluated in predicting the amount of noise emitted from aerodynamic objects. The experiments are conducted on a dataset collected by NASA, which is called "Airfoil Self-Noise&quo...

Research paper thumbnail of Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks

International Journal of Wireless Information Networks

Research paper thumbnail of Advanced Extremely Efficient Detection of Replica Nodes in Mobile Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

Today, wireless sensor networks (WSNs) are widely used in many applications including the environ... more Today, wireless sensor networks (WSNs) are widely used in many applications including the environment, military, and explorations. One of the most dangerous attacks against these networks is node replication. In this attack, the adversary captures a legal node of the network, generates several copies of the node (called, replica nodes) and injects them in the network. Various algorithms have been proposed to handle replica nodes in stationary and mobile WSNs. One of the most well-known algorithms to handle this attack in mobile WSNs is eXtremely Efficient Detection (XED). The main idea of XED is to generate and exchange random numbers among neighboring nodes. The XED has some drawbacks including high communication and memory overheads and low speed in the detection of replica nodes. In this paper, an algorithm is presented to improve XED. The proposed algorithm is called Advanced XED (AXED) in which each node observes a few numbers of nodes and whenever two nodes meet, a new random ...

Research paper thumbnail of Breast Cancer Prediction Using a Hybrid Data Mining Model

JOIV : International Journal on Informatics Visualization

Today, with the emergence of data mining technology and access to useful data, valuable informati... more Today, with the emergence of data mining technology and access to useful data, valuable information in different areas can be explored. Data mining uses machine learning algorithms to extract useful relationships and knowledge from a large amount of data and offers an automatic tool for various predictions and classifications. One of the most common applications of data mining in medicine and health-care is to predict different types of breast cancer which has attracted the attention of many scientists. In this paper, a hybrid model employing three algorithms of Naive Bayes Network, RBF Network, and K-means clustering is presented to predict breast cancer type. In the proposed model, the voting approach is used to combine the results obtained from the above three algorithms. Dataset used in this study is called Breast Cancer Wisconsin taken from data sources of UCI. The proposed model is implemented in MATLAB and its efficiency in predicting breast cancer type is evaluated on Breast...

Research paper thumbnail of A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks

UHD Journal of Science and Technology

In this paper, a simple and novel routing algorithm is presented to improve the packet delivery i... more In this paper, a simple and novel routing algorithm is presented to improve the packet delivery in harsh conditions such as selective forwarding and blackhole attacks to the wireless sensor networks. The proposed algorithm is based on restricted multi-path broadcast based on a virtual cylinder from the source node to the sink node. In this algorithm, when a packet is broadcast by a source node, a virtual cylinder with radius w is created from the source node to a sink node. All the nodes located in this virtual cylinder are allowed to forwardthe packet to the sink. Thus, data is forwarded to sink via multiple paths, but in a restricted manner so that the nodes do not consume a high amount of energy. If there are some compromised nodes in this virtual cylinder, the packets may be forwarded to the sink via other nodes of the virtual cylinder. The proposed algorithm is simulated and evaluated in terms of packet delivery rate and energy consumption. The experiment results show that the ...

Research paper thumbnail of Employing Data Mining Techniques for Predicting Opioid Withdrawal in Applicants of Health Centers

UHD Journal of Science and Technology

Addiction to narcotics is one of the greatest health challenges in today’s world which has bec... more Addiction to narcotics is one of the greatest health challenges in today’s world which has become a serious threat for social, economic, and cultural structures and has ruined a part of an active force of the society and it is one of the main factors of growth of diseases such as HIV and hepatitis. Today, addiction is known as a disease and welfare organization, and many of the dependent centers try to help the addicts treat this disease. In this study, using data mining algorithms and based on data collected from opioid withdrawal applicants referring to welfare organization, a prediction model is proposed to predict the success of opioid withdrawal applicants. In this study, the statistical population is comprised opioid withdrawal applicants in a welfare organization. This statistical population includes 26 features of 793 instances including men and women. The proposed model is a combination of meta-learning algorithms (decorate and bagging) and J48 decision tree implemented ...

Research paper thumbnail of A Multi-Criteria Ranking Algorithm Based on the VIKOR Method for Meta-Search Engines

JOIV : International Journal on Informatics Visualization

Ranking of web pages is one of the most important parts of search engines and is, in fact, a proc... more Ranking of web pages is one of the most important parts of search engines and is, in fact, a process that through it the quality of a page is estimated by the search engine. In this study, a ranking algorithm based on VIKOR multi-criteria decision-making method for Meta-Search Engines (MSEs) was proposed. In this research, the considered MSE first will receive the suggested pages associated with the search term from eight search engines including, Teoma, Google, Yahoo!, AlltheWeb, AltaVista, Wisenut, ODP, MSN. The results, at most 10 first pages are selected from each search engine and creates the initial dataset contains 80 web pages. The proposed parser is then executed on these pages and the eight criteria including the rank of web page in the related search engine, access time, number of repetitions of search terms, positions of search term at the webpage, numbers of media at the webpage, the number of imports in the webpage, the number of incoming links, and the number of outgo...

Research paper thumbnail of Detecting Sybil Nodes in Stationary Wireless Sensor Networks UsingLearning Automaton and Client Puzzles

Research paper thumbnail of A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands... more Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment. WSNs have a variety of applications in military, industrial and other fields and they are fit to study environments that presence of human being is costly or dangerous. Sensor nodes have memory, energy and processing limitations. According to sensors' limitations and also increasing use of these networks in military fields, establishing a secure WSN is very important and challenging. Applying Key Predistribution Schemes (KPSs) is one of the effective and useful mechanisms to provide security in WSN. In this paper, a hybrid KPS is proposed that support three various keys, primary pairwise, polynomial, and ordinary. The proposed scheme has been implemented using J-SIM simulator and its performance has been evaluated in terms of maximum supportable network sizes and resiliency against node capture attack, by p...

Research paper thumbnail of A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In th... more One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated an...

Research paper thumbnail of Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes

JOIV : International Journal on Informatics Visualization

Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which... more Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, including voting and data aggregation. The mobility of nodes in mobile wireless sensor networks makes it problematic to employ proposed Sybil node detection algorithms in static wireless sensor networks, including node positioning, RSSI-based, and neighbour cooperative algorithms. This paper proposes a dynamic, light-weight, and efficient algorithm to detect Sybil nodes in mobile wireless sensor networks. In the proposed algorithm, observer nodes exploit neighbouring information during different time periods to detect Sybil nodes. The proposed algorithm is implemented by J-SIM simulator and its performance is compared with other existing algorithm by conducting a set of experiments. Simulation results indicate that the proposed algorithm ...

Research paper thumbnail of A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It

Wireless Personal Communications

Research paper thumbnail of ADBR: Accelerated Depth-Based Routing for Underwater Sensor Networks

JITCE (Journal of Information Technology and Computer Engineering)

It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networ... more It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networks (UWSNs) in terms of packet delivery ratio, end-to-end delay of packet delivery from the source to the destination, and energy consumption. The reasons of that are UWSNs have unique characteristics (e.g. using acoustic channels instead of radio channels for communications), and they have dynamic topology due to the movement of the sensor by the water flow. Depth-Based Routing (DBR) considers one of the well-known algorithms in this context. DBR is a very simple algorithm; however, it is inefficient in terms of packet delivery rate, end-to-end delay, and energy consumption. This study we developed DBR by adding an accelerated routine to it to improve its efficiency, the proposed algorithm; called Accelerated Depth-Based Routing (ADBR). In ADBR, a simple probabilistic mechanism is used to accelerate packet forwarding and provide more multi-path to the destination. In ADBR, each node imme...

Research paper thumbnail of A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes

Ad Hoc & Sensor Wireless Networks, 2019

Research paper thumbnail of A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks

Selective forwarding attack is a dangerous attack in wireless sensor networks, in which a malicio... more Selective forwarding attack is a dangerous attack in wireless sensor networks, in which a malicious node attempts to drop some incoming packets. This means that it refuses to forward them to destination. Selective forwarding attack has a highly destructive impact on multihop routing protocols in wireless sensor networks and decreases the packets delivery ratio to sinks. This paper proposes a secure routing protocol against selective forwarding attack in wireless sensor networks. The main idea of the proposed algorithm is to establish a cell structure within the network so that W≥1 node plays the monitoring role in each cell that monitors activities of the remaining nodes in the cell. By overhearing traffic within the cell, the observer nodes find out whether the nodes are maliciously drop packets. If the observer nodes recognize that a node is malicious and does not forward the incoming packet to the destination, they will alter the path of the packets. The proposed algorithm was im...

Research paper thumbnail of Using One-hop and Two-hop Neighbouring Information to Defend Against Sybil Attacks in Stationary Wireless Sensor Network

Considering the application of wireless sensor networks (WSNs) in critical areas like war fields,... more Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this attack, a malicious node broadcasts several IDs simultaneously. Thus, the malicious node of the adversary attracts high traffic to itself and disrupts routing protocols and affects other operations of the network like data aggregation, voting, and resource allocation, negatively. In this paper, an efficient algorithm based on one-hop and two-hop neighborhood information is proposed to detect Sybil nodes in the stationary WSNs. The proposed algorithm is executed locally with the collaboration of neighboring nodes. The main purpose of the proposed algorithm is to increase the accuracy of detecting Sybil nodes under various conditions including the condition in which a malicious node broadcasts a few numbers of Sybil IDs which is the short...

Research paper thumbnail of A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes

1Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq 2Depar... more 1Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq 2Department of Computer Engineering, Arak Branch, Islamic Azad University, Arak, Iran E-mail: miladranjbari@gmail.com 3Faculty of Computer Engineering, K. N. Toosi University of Technology, Tehran, Iran E-mail: esnaashari@kntu.ac.ir 4Department of Information Technology, University of Human Development, Sulaymaniyah, Iraq E-mail: aso.darwesh@uhd.edu.iq 5Computer Engineering and Information Technology Department, Amirkabir University of Technology, Tehran, Iran E-mail: mmeybodi@aut.ac.ir

Research paper thumbnail of DSLA: Defending against Selective Forwarding Attack in Wireless Sensor Networks using Learning Automaton

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of The Use of Data Mining Techniques in Predicting the Noise Emitted By the Trailing Edge of Aerodynamic Objects

JOIV : International Journal on Informatics Visualization

Aerodynamic is a branch of fluid dynamics that evaluates the behavior of airflow and its interact... more Aerodynamic is a branch of fluid dynamics that evaluates the behavior of airflow and its interaction with moving objects. The most important application of aerodynamic is in aerospace engineering, designing and construction of flying objects. Reduction of noise emitted by aerodynamic objects is one of the most important challenges in this area and many efforts have been to reduce its negative effects. The prediction of noise emitted from these aerodynamic objects is a low-cost and fast approach that can partially replace the "fabrication and testing" phase. One of the most common and successful tools in prediction procedures is data mining technology. In this paper, the performance of different data mining algorithms such as Random Forest, J48, RBF Network, SVM, MLP, Logistic, and Bagging is evaluated in predicting the amount of noise emitted from aerodynamic objects. The experiments are conducted on a dataset collected by NASA, which is called "Airfoil Self-Noise&quo...

Research paper thumbnail of Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks

International Journal of Wireless Information Networks

Research paper thumbnail of Advanced Extremely Efficient Detection of Replica Nodes in Mobile Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

Today, wireless sensor networks (WSNs) are widely used in many applications including the environ... more Today, wireless sensor networks (WSNs) are widely used in many applications including the environment, military, and explorations. One of the most dangerous attacks against these networks is node replication. In this attack, the adversary captures a legal node of the network, generates several copies of the node (called, replica nodes) and injects them in the network. Various algorithms have been proposed to handle replica nodes in stationary and mobile WSNs. One of the most well-known algorithms to handle this attack in mobile WSNs is eXtremely Efficient Detection (XED). The main idea of XED is to generate and exchange random numbers among neighboring nodes. The XED has some drawbacks including high communication and memory overheads and low speed in the detection of replica nodes. In this paper, an algorithm is presented to improve XED. The proposed algorithm is called Advanced XED (AXED) in which each node observes a few numbers of nodes and whenever two nodes meet, a new random ...

Research paper thumbnail of Breast Cancer Prediction Using a Hybrid Data Mining Model

JOIV : International Journal on Informatics Visualization

Today, with the emergence of data mining technology and access to useful data, valuable informati... more Today, with the emergence of data mining technology and access to useful data, valuable information in different areas can be explored. Data mining uses machine learning algorithms to extract useful relationships and knowledge from a large amount of data and offers an automatic tool for various predictions and classifications. One of the most common applications of data mining in medicine and health-care is to predict different types of breast cancer which has attracted the attention of many scientists. In this paper, a hybrid model employing three algorithms of Naive Bayes Network, RBF Network, and K-means clustering is presented to predict breast cancer type. In the proposed model, the voting approach is used to combine the results obtained from the above three algorithms. Dataset used in this study is called Breast Cancer Wisconsin taken from data sources of UCI. The proposed model is implemented in MATLAB and its efficiency in predicting breast cancer type is evaluated on Breast...

Research paper thumbnail of A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks

UHD Journal of Science and Technology

In this paper, a simple and novel routing algorithm is presented to improve the packet delivery i... more In this paper, a simple and novel routing algorithm is presented to improve the packet delivery in harsh conditions such as selective forwarding and blackhole attacks to the wireless sensor networks. The proposed algorithm is based on restricted multi-path broadcast based on a virtual cylinder from the source node to the sink node. In this algorithm, when a packet is broadcast by a source node, a virtual cylinder with radius w is created from the source node to a sink node. All the nodes located in this virtual cylinder are allowed to forwardthe packet to the sink. Thus, data is forwarded to sink via multiple paths, but in a restricted manner so that the nodes do not consume a high amount of energy. If there are some compromised nodes in this virtual cylinder, the packets may be forwarded to the sink via other nodes of the virtual cylinder. The proposed algorithm is simulated and evaluated in terms of packet delivery rate and energy consumption. The experiment results show that the ...

Research paper thumbnail of Employing Data Mining Techniques for Predicting Opioid Withdrawal in Applicants of Health Centers

UHD Journal of Science and Technology

Addiction to narcotics is one of the greatest health challenges in today’s world which has bec... more Addiction to narcotics is one of the greatest health challenges in today’s world which has become a serious threat for social, economic, and cultural structures and has ruined a part of an active force of the society and it is one of the main factors of growth of diseases such as HIV and hepatitis. Today, addiction is known as a disease and welfare organization, and many of the dependent centers try to help the addicts treat this disease. In this study, using data mining algorithms and based on data collected from opioid withdrawal applicants referring to welfare organization, a prediction model is proposed to predict the success of opioid withdrawal applicants. In this study, the statistical population is comprised opioid withdrawal applicants in a welfare organization. This statistical population includes 26 features of 793 instances including men and women. The proposed model is a combination of meta-learning algorithms (decorate and bagging) and J48 decision tree implemented ...

Research paper thumbnail of A Multi-Criteria Ranking Algorithm Based on the VIKOR Method for Meta-Search Engines

JOIV : International Journal on Informatics Visualization

Ranking of web pages is one of the most important parts of search engines and is, in fact, a proc... more Ranking of web pages is one of the most important parts of search engines and is, in fact, a process that through it the quality of a page is estimated by the search engine. In this study, a ranking algorithm based on VIKOR multi-criteria decision-making method for Meta-Search Engines (MSEs) was proposed. In this research, the considered MSE first will receive the suggested pages associated with the search term from eight search engines including, Teoma, Google, Yahoo!, AlltheWeb, AltaVista, Wisenut, ODP, MSN. The results, at most 10 first pages are selected from each search engine and creates the initial dataset contains 80 web pages. The proposed parser is then executed on these pages and the eight criteria including the rank of web page in the related search engine, access time, number of repetitions of search terms, positions of search term at the webpage, numbers of media at the webpage, the number of imports in the webpage, the number of incoming links, and the number of outgo...

Research paper thumbnail of Detecting Sybil Nodes in Stationary Wireless Sensor Networks UsingLearning Automaton and Client Puzzles

Research paper thumbnail of A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands... more Wireless Sensor Network (WSN) is a type of ad hoc networks which consist of hundreds to thousands of sensor nodes. These sensor nodes collaborate to surveillance environment. WSNs have a variety of applications in military, industrial and other fields and they are fit to study environments that presence of human being is costly or dangerous. Sensor nodes have memory, energy and processing limitations. According to sensors' limitations and also increasing use of these networks in military fields, establishing a secure WSN is very important and challenging. Applying Key Predistribution Schemes (KPSs) is one of the effective and useful mechanisms to provide security in WSN. In this paper, a hybrid KPS is proposed that support three various keys, primary pairwise, polynomial, and ordinary. The proposed scheme has been implemented using J-SIM simulator and its performance has been evaluated in terms of maximum supportable network sizes and resiliency against node capture attack, by p...

Research paper thumbnail of A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks

IEIE Transactions on Smart Processing & Computing

Research paper thumbnail of A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks

JOIV : International Journal on Informatics Visualization

One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In th... more One of the known dangerous attacks against wireless sensor networks (WSNs) is node replica. In this attack, adversary captures one or more normal nodes of the network, generates copies of them (replicas) and deploy them in the network. These copied nodes are controlled by the adversary which can establish a shared key with other nodes of the network easily and exchange information. In this paper, a novel algorithm is proposed to defend against this attack in static sensor networks. The proposed algorithm employs a multi-tree architecture to assign ID to the nodes dynamically and prevent attachment of the injected replica nodes to the network by the adversary. The efficiency of the proposed algorithm is evaluated in terms of memory, communication, and computation overheads and the results are compared with other existing algorithms. Comparison results indicate the superiority of the proposed algorithm in terms of mentioned measures. In addition, the proposed algorithm is simulated an...

Research paper thumbnail of Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes

JOIV : International Journal on Informatics Visualization

Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which... more Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, including voting and data aggregation. The mobility of nodes in mobile wireless sensor networks makes it problematic to employ proposed Sybil node detection algorithms in static wireless sensor networks, including node positioning, RSSI-based, and neighbour cooperative algorithms. This paper proposes a dynamic, light-weight, and efficient algorithm to detect Sybil nodes in mobile wireless sensor networks. In the proposed algorithm, observer nodes exploit neighbouring information during different time periods to detect Sybil nodes. The proposed algorithm is implemented by J-SIM simulator and its performance is compared with other existing algorithm by conducting a set of experiments. Simulation results indicate that the proposed algorithm ...

Research paper thumbnail of A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It

Wireless Personal Communications