Hossein Jadidoleslamy | University of Zabol (original) (raw)
Papers by Hossein Jadidoleslamy
Zenodo (CERN European Organization for Nuclear Research), Jun 1, 2021
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
Zenodo (CERN European Organization for Nuclear Research), Oct 13, 2020
People authentication based on fingerprint is one of the most important people authentication tec... more People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching algorithm in this area; of course, this algorithm also has been presented based on comparing fingerprint features (especially minutiae points).
International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Mar 30, 2011
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
MetaSearch is utilizing multiple other search systems to perform simultaneous search. A MetaSearc... more MetaSearch is utilizing multiple other search systems to perform simultaneous search. A MetaSearch Engine (MSE) is a search system that enables MetaSearch. To perform a MetaSearch, user query is sent to multiple search engines; once the search results returned, they are received by the MSE, then merged into a single ranked list and the ranked list is presented to the user. When a query is submitted to a MSE, decisions are made with respect to the underlying search engines to be used, what modifications will be made to the query and how to score the results. These decisions are typically made by considering only the user’s keyword query, neglecting the larger information need. The cornerstone of their technology is their rank aggregation method. In other words, Result merging is a key component in a MSE. The effectiveness of a MSE is closely related to the result merging algorithm it employs. In this paper, we want to investigate a variety of result merging methods based on a wide ra...
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges . T... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges . They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of transport and applicat ion layers attacks and most of traditional networks security t echniques are unusable on WSNs [1, 2]; due to wireless and sh ared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requ irement for these networks; but we have to design a proper secu rity mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security o f WSNs, divide it (the WSNs security) into four categories and will consider them, including an overview of WSNs, secur ity in WSNs, t...
Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential... more Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their limited resources, independent and autonomous operation and dynamic topology. Also, maximum of energy consumption into these networks is occurred when data transmission. In recent decade, researchers have been trying to improving the efficiency of these networks; such as improving the existent protocols and presenting new protocols, increasing the battery capacity, chip designing and radio equipment. In attention to the many applications and constraints of WSNs, designing appropriate protocols for signaling, Medium Access Control (MAC) and data routing have particular importance. In sensor nodes, the radio equipment are most energy consumption part; thus, energy management and appropriate usage of radio in WSNs is necessary. Data link layer operations such as MAC control using of the radio equipment. The...
Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential... more Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their hard organization and management, limited resources, dynamic topology and scalability. One significant technique against to these problems is clustering. Clustering leads to more scalability, energy efficiency, prolonged network lifetime and easy management of large-scale WSNs. As a result, this paper is focused on WSNs' clustering and it be represented a new centralized clustering algorithm for homogenous and large-scale WSNs. The proposed clustering algorithm is based on calculating distances between sensor nodes, Distance Average (DA) between each node and other nodes, finding distance average range, dividing it into K sub-range and selecting associated nodes of each sub-range. The proposed algorithm using of the WSN's sensor nodes deployment location coordinates. Also, all of these calculatio...
International Journal of Peer to Peer Networks, 2011
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of physical attacks [1] and most of traditional networks security techniques are unusable on WSNs[2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' physical attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal, final result and effects of the physical attacks on WSNs are introduced. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks; this would enable it security managers to manage the physical attacks of WSNs more effectively.
Wireless Sensor Networks (WSNs) are vulnerable to different kinds of attacks and most of traditio... more Wireless Sensor Networks (WSNs) are vulnerable to different kinds of attacks and most of traditional networks security techniques are unusable on WSNs; due to untrusted transmissions, deployment in open and hostile environments, unattended nature and limited resources. So, security is a vital and complex requirement for these networks. This paper focuses on security of WSNs and its main purpose is discussing on WSNs' attacks in different layers, including of physical layer attacks, link layer attacks, routing layer attacks, transport layer attacks and application layer attacks. It classifies and compares different attacks based on their nature and goals; i.e. this paper is expressing purpose and capabilities of attackers and it is presenting goals and result of different attacks on WSNs.
... INTRODUCTION TO METASEARCH ENGINES AND RESULT MERGING STRATEGIES: ASURVEY Hossein Jadidolesla... more ... INTRODUCTION TO METASEARCH ENGINES AND RESULT MERGING STRATEGIES: ASURVEY Hossein Jadidoleslamy Deptt. ... 1, Issue 5, pp. 30-40 [3] Fagin R., Kumar R., Mahdian M., Sivakumar D. and Vee E.; Comparing and aggregating rankings with ties; In PODS; 2004. ...
Nowadays internet has a key role in interaction between peoples and their businesses (such as ban... more Nowadays internet has a key role in interaction between peoples and their businesses (such as banking). One of domain which uses this new communication channel for more and better interacts with its customers is online-banking (OB) industry. Using of OB is increasing rapidly. the significant growth in presenting and using of OB services such as responding to customers' requests on every time and every place and additive integration, leads to fast growth in fraud events and security problems. One of solutions against to security problems into this domain is using secure protocols. Also, it is possible to add new security layers like intrusion detection to the OB security infrastructure. The main purpose of this paper is recommending to using of IDS in OB industry. This paper presents a hierarchical Intrusion Detection Architecture (IDA: it is a hierarchical architecture, including two levels i.e. deploying HIDSs on users computers, OBIDS on the central server of banking services ...
International Journal on Bioinformatics & Biosciences, Dec 31, 2012
People authentication based on fingerprint is one of the most important people authentication tec... more People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching algorithm in this area; of course, this algorithm also has been presented based on comparing fingerprint features (especially minutiae points).
International Journal of Mobile Network Communications & Telematics, Feb 28, 2013
Wireless sensor networks (WSNs) are new generation of computer networks which have many potential... more Wireless sensor networks (WSNs) are new generation of computer networks which have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to energy criterion and most of traditional networks architectures (i.e. Flat) are unusable on WSNs; due to count of existent sensor nodes, large-scale networks and their constraints. Also, WSNs have dynamic topology. One of most important method against to these problems is clustering. Clustering leads to more scalability, energy efficiency and prolong network lifetime in large-scale WSNs. As a result, this paper is focused on clustering in WSNs. It is including of: an overview of WSNs and clustering in WSNs, consist of its functionality, advantages, weaknesses, applications and various classifications. This work enables us to verify the purpose and capabilities of the WSNs and clustering techniques; also, the goal and effects of clustering techniques on WSNs are introduced. This would enable WSNs designers and managers to design and manage WSNs, more significant.
Networks protection against different types of attacks is one of most important posed issue into ... more Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose; but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea; then it analyzed and evaluated the acquired results from the questionnaires.
International Journal of Network Security & Its Applications
Networks protection against different types of attacks is one of most important posed issue into ... more Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.
Security and Communication Networks
Wireless Personal Communications
International Journal of Internet Protocol Technology, 2016
One of most important existent issues in information security application domain is Intrusion Det... more One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.
Zenodo (CERN European Organization for Nuclear Research), Jun 1, 2021
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
Zenodo (CERN European Organization for Nuclear Research), Oct 13, 2020
People authentication based on fingerprint is one of the most important people authentication tec... more People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching algorithm in this area; of course, this algorithm also has been presented based on comparing fingerprint features (especially minutiae points).
International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Mar 30, 2011
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
MetaSearch is utilizing multiple other search systems to perform simultaneous search. A MetaSearc... more MetaSearch is utilizing multiple other search systems to perform simultaneous search. A MetaSearch Engine (MSE) is a search system that enables MetaSearch. To perform a MetaSearch, user query is sent to multiple search engines; once the search results returned, they are received by the MSE, then merged into a single ranked list and the ranked list is presented to the user. When a query is submitted to a MSE, decisions are made with respect to the underlying search engines to be used, what modifications will be made to the query and how to score the results. These decisions are typically made by considering only the user’s keyword query, neglecting the larger information need. The cornerstone of their technology is their rank aggregation method. In other words, Result merging is a key component in a MSE. The effectiveness of a MSE is closely related to the result merging algorithm it employs. In this paper, we want to investigate a variety of result merging methods based on a wide ra...
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges . T... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges . They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of transport and applicat ion layers attacks and most of traditional networks security t echniques are unusable on WSNs [1, 2]; due to wireless and sh ared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requ irement for these networks; but we have to design a proper secu rity mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security o f WSNs, divide it (the WSNs security) into four categories and will consider them, including an overview of WSNs, secur ity in WSNs, t...
Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential... more Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their limited resources, independent and autonomous operation and dynamic topology. Also, maximum of energy consumption into these networks is occurred when data transmission. In recent decade, researchers have been trying to improving the efficiency of these networks; such as improving the existent protocols and presenting new protocols, increasing the battery capacity, chip designing and radio equipment. In attention to the many applications and constraints of WSNs, designing appropriate protocols for signaling, Medium Access Control (MAC) and data routing have particular importance. In sensor nodes, the radio equipment are most energy consumption part; thus, energy management and appropriate usage of radio in WSNs is necessary. Data link layer operations such as MAC control using of the radio equipment. The...
Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential... more Wireless sensor networks (WSNs) are new generation of wireless networks which have many potential applications and unique challenges. Some of their most important problems are their hard organization and management, limited resources, dynamic topology and scalability. One significant technique against to these problems is clustering. Clustering leads to more scalability, energy efficiency, prolonged network lifetime and easy management of large-scale WSNs. As a result, this paper is focused on WSNs' clustering and it be represented a new centralized clustering algorithm for homogenous and large-scale WSNs. The proposed clustering algorithm is based on calculating distances between sensor nodes, Distance Average (DA) between each node and other nodes, finding distance average range, dividing it into K sub-range and selecting associated nodes of each sub-range. The proposed algorithm using of the WSN's sensor nodes deployment location coordinates. Also, all of these calculatio...
International Journal of Peer to Peer Networks, 2011
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. Th... more Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of physical attacks [1] and most of traditional networks security techniques are unusable on WSNs[2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' physical attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal, final result and effects of the physical attacks on WSNs are introduced. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks; this would enable it security managers to manage the physical attacks of WSNs more effectively.
Wireless Sensor Networks (WSNs) are vulnerable to different kinds of attacks and most of traditio... more Wireless Sensor Networks (WSNs) are vulnerable to different kinds of attacks and most of traditional networks security techniques are unusable on WSNs; due to untrusted transmissions, deployment in open and hostile environments, unattended nature and limited resources. So, security is a vital and complex requirement for these networks. This paper focuses on security of WSNs and its main purpose is discussing on WSNs' attacks in different layers, including of physical layer attacks, link layer attacks, routing layer attacks, transport layer attacks and application layer attacks. It classifies and compares different attacks based on their nature and goals; i.e. this paper is expressing purpose and capabilities of attackers and it is presenting goals and result of different attacks on WSNs.
... INTRODUCTION TO METASEARCH ENGINES AND RESULT MERGING STRATEGIES: ASURVEY Hossein Jadidolesla... more ... INTRODUCTION TO METASEARCH ENGINES AND RESULT MERGING STRATEGIES: ASURVEY Hossein Jadidoleslamy Deptt. ... 1, Issue 5, pp. 30-40 [3] Fagin R., Kumar R., Mahdian M., Sivakumar D. and Vee E.; Comparing and aggregating rankings with ties; In PODS; 2004. ...
Nowadays internet has a key role in interaction between peoples and their businesses (such as ban... more Nowadays internet has a key role in interaction between peoples and their businesses (such as banking). One of domain which uses this new communication channel for more and better interacts with its customers is online-banking (OB) industry. Using of OB is increasing rapidly. the significant growth in presenting and using of OB services such as responding to customers' requests on every time and every place and additive integration, leads to fast growth in fraud events and security problems. One of solutions against to security problems into this domain is using secure protocols. Also, it is possible to add new security layers like intrusion detection to the OB security infrastructure. The main purpose of this paper is recommending to using of IDS in OB industry. This paper presents a hierarchical Intrusion Detection Architecture (IDA: it is a hierarchical architecture, including two levels i.e. deploying HIDSs on users computers, OBIDS on the central server of banking services ...
International Journal on Bioinformatics & Biosciences, Dec 31, 2012
People authentication based on fingerprint is one of the most important people authentication tec... more People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching algorithm in this area; of course, this algorithm also has been presented based on comparing fingerprint features (especially minutiae points).
International Journal of Mobile Network Communications & Telematics, Feb 28, 2013
Wireless sensor networks (WSNs) are new generation of computer networks which have many potential... more Wireless sensor networks (WSNs) are new generation of computer networks which have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to energy criterion and most of traditional networks architectures (i.e. Flat) are unusable on WSNs; due to count of existent sensor nodes, large-scale networks and their constraints. Also, WSNs have dynamic topology. One of most important method against to these problems is clustering. Clustering leads to more scalability, energy efficiency and prolong network lifetime in large-scale WSNs. As a result, this paper is focused on clustering in WSNs. It is including of: an overview of WSNs and clustering in WSNs, consist of its functionality, advantages, weaknesses, applications and various classifications. This work enables us to verify the purpose and capabilities of the WSNs and clustering techniques; also, the goal and effects of clustering techniques on WSNs are introduced. This would enable WSNs designers and managers to design and manage WSNs, more significant.
Networks protection against different types of attacks is one of most important posed issue into ... more Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but no one of them has a comprehensive view to this problem and they are usually designed in single-purpose; but, the proposed design in this paper has been a comprehensive view to this issue by presenting a complete Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e. it is designed and applicable, in one, two or three levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Sensor-based Intrusion Detection System (SIDS) on sensor nodes, Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical, distributed and clustering structure along with clusters' overlapping. Finally, this paper has been designed a questionnaire to verify the proposed idea; then it analyzed and evaluated the acquired results from the questionnaires.
International Journal of Network Security & Its Applications
Networks protection against different types of attacks is one of most important posed issue into ... more Networks protection against different types of attacks is one of most important posed issue into the network and information security application domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed architectures and guide lines to protect Wireless Sensor Networks (WSNs) against different types of intrusions; but any one of them do not has a comprehensive view to this problem and they are usually designed and implemented in single-purpose; but, the proposed design in this paper tries to has been a comprehensive view to this issue by presenting a complete and comprehensive Intrusion Detection Architecture (IDA). The main contribution of this architecture is its hierarchical structure; i.e., it is designed and applicable, in one or two levels, consistent to the application domain and its required security level. Focus of this paper is on the clustering WSNs, designing and deploying Cluster-based Intrusion Detection System (CIDS) on cluster-heads and Wireless Sensor Network wide level Intrusion Detection System (WSNIDS) on the central server. Suppositions of the WSN and Intrusion Detection Architecture (IDA) are: static and heterogeneous network, hierarchical and clustering structure, clusters' overlapping and using hierarchical routing protocol such as LEACH, but along with minor changes. Finally, the proposed idea has been verified by designing a questionnaire, representing it to some (about 50 people) experts and then, analyzing and evaluating its acquired results.
Security and Communication Networks
Wireless Personal Communications
International Journal of Internet Protocol Technology, 2016
One of most important existent issues in information security application domain is Intrusion Det... more One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding to occurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and tracking prevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.