To see the other types of publications on this topic, follow the link: Three-Way Handshake Protocol.

Journal articles on the topic 'Three-Way Handshake Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 24 journal articles for your research on the topic 'Three-Way Handshake Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sy, Erik, Tobias Mueller, Christian Burkert, Hannes Federrath, and Mathias Fischer. "Enhanced Performance and Privacy for TLS over TCP Fast Open." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 271–87. http://dx.doi.org/10.2478/popets-2020-0027.

Full text
Abstract:
AbstractSmall TCP flows make up the majority of web flows. For them, the TCP three-way handshake induces significant delay overhead. The TCP Fast Open (TFO) protocol can significantly decrease this delay via zero round-trip time (0-RTT) handshakes for all TCP handshakes that follow a full initial handshake to the same host. However, this comes at the cost of privacy limitations and also has some performance limitations. In this paper, we investigate the TFP deployment on popular websites and browsers. We found that a client revisiting a web site for the first time fails to use an abbreviated TFO handshake in 40% of all cases due to web server load-balancing using multiple IP addresses. Our analysis further reveals significant privacy problems of the protocol design and implementation. Network-based attackers and online trackers can exploit TFO to track the online activities of users. As a countermeasure, we introduce a novel protocol called TCP Fast Open Privacy (FOP). TCP FOP prevents tracking by network attackers and impedes third-party tracking, while still allowing 0-RTT handshakes as in TFO. As a proof-of-concept, we have implemented the proposed protocol for the Linux kernel and a TLS library. Our measurements indicate that TCP FOP outperforms TLS over TFO when websites are served from multiple IP addresses.
APA, Harvard, Vancouver, ISO, and other styles
2

Guo, Yang Yong, and Jun Hu. "Research on Connection Ending Protocol on Single-Layer User-Data Switching Platform Architecture." Advanced Materials Research 1044-1045 (October 2014): 1287–92. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1287.

Full text
Abstract:
This dissertation discusses dedicated Connection Ending Protocol (CEP) in the application layer of Single-layer User-data Switching Platform Architecture (SUPA). This paper analyzes data unit format of CEP, discussed the protocol data unit of CEP(CEP-PDU), the working process of CEP and exception handling. This paper focuses on the removal of negotiations on the basis of three-way handshake to achieve the removal and treatment of abnormal connections.
APA, Harvard, Vancouver, ISO, and other styles
3

Ding, Hongwei, Mingliang Li, and Jun Zhang. "A CSMA Mechanism with Variable Collision Control and Priority Provision in Multichannel Mobile Ad Hoc Networks." Mobile Information Systems 2021 (July 31, 2021): 1–16. http://dx.doi.org/10.1155/2021/4482815.

Full text
Abstract:
Toward making the conventional carrier sense multiple access (CSMA) protocol transmit and control mobile ad hoc network systems, as well as reducing energy consumption, an adaptive multichannel multipriority two-dimensional probability detection and 1-stick joint control strategy carrier sense multiple access with variable collision duration and three-way handshake mechanisms (iCSMA for short) is proposed. Based on the conventional two-slot model of the CSMA protocol, iCSMA introduces a concept of collision duration (b), which divides the system’s timeslot into the duration of successful packet transmission (1 + a), the duration of collision (b + a), and the duration of the idle state (a) of the system. By employing iCSMA, the loss of the system could be reduced with a fine-tuned collision duration (b), which leads to improved performance compared to the conventional 1P-persistent CSMA protocol. Furthermore, a three-way handshake mechanism is introduced for monitoring the entire network system at a minimal cost of throughput. Toward a higher channel utilization rate, a multichannel and multipriority function is employed in the implementation of multiservice communication for the system. Besides, with an adaptive mechanism, the transmission probabilities p 1 and p 2 are reasonably set so that the system will not produce a complete collision under the condition of high load, and the throughput can also be stabilized. Based on the battery model, the lifetime of the system nodes (T) is extended. Both theoretical analysis and experimental results confirm the accuracy of the theoretical derivation.
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Ming Ji, Zhi Yu Jiang, and Hui Ding. "The Attack Principle and Defense Strategy of SYN Flood under Windows." Applied Mechanics and Materials 651-653 (September 2014): 1962–66. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1962.

Full text
Abstract:
SYN Flood is a typical distributed denial of service attack technology. SYN Flood, which is one of the most popular attack method of DDos, destroys the network by the Loophole occurred when three-way handshake of TCP protocol happens. It describes the principle of SYN Flood attack in the paper, explores defense strategy and implementation method under Windows. These defensive measures can resist the SYN Flood attack rather well, It has good practicability and reference value.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhao, Yifan, Hongwei Ding, Yingying Guo, et al. "ANALYSIS OF MULTI-CHANNEL TWO-DIMENSIONAL PROBABILITY CSMA AD HOC NETWORK PROTOCOL BASED THREE-WAY HANDSHAKE MECHANISM." International Journal on Smart Sensing and Intelligent Systems 10, no. 1 (2017): 88–107. http://dx.doi.org/10.21307/ijssis-2017-204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Zhen, and Lin Huang. "VCHR: Virtual Cluster-Based Hybrid Routing Protocol." Key Engineering Materials 467-469 (February 2011): 2117–22. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.2117.

Full text
Abstract:
There are a couple of inherent shortcomings which are hard to be overcome in single topology network; thus we propose a novel routing protocol—VCHR, i.e., Virtual Cluster-based Hybrid Routing, which employs hybrid topology, bears the stamp of flat and hierarchical routing protocol. At stage of hierarchical routing, VCHR draws on the idea of the virtual cluster; base station controls clustering process based on network coverage control criteria in centralized model, and ensuring the reliability of virtual clusters by making use of the three-way handshake mechanism. Flat routing employs shortest path routing protocol to get the optimized routing path to base station. In context of low algorithm complexity, the protocol could realize full network coverage control, effectively balance energy load among sensor nodes and quickly respond to network dynamic changes.
APA, Harvard, Vancouver, ISO, and other styles
7

Nirmla, Sharma, K. Gupta S., and Ben Said Olfa. "Design the Connection Creation Bluetooth Techniques using Packet Switching." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2851–56. https://doi.org/10.35940/ijeat.C6005.029320.

Full text
Abstract:
An existent result from the exchange is working. However, we are sharing unique practices to fast our creativity; it develops controlling partners by the people it abuts to, with our unhindered and the creation about us. Three-Way Handshake strategy has used in this paper to the connection creation method. TCP and affiliation creation strategies have recycled related to formal progress outline connection creation. Now every course utilizing parcel exchanging systems and 4-areas are generally required that is Finish (FIN) and Acknowledgment (ACK). Opening the reason for existing techniques is about used handset toward training. It is indicating an association to make in this paper. FIN exchanging has been powerful not only in refining the accounts of information correspondences, but also it might be in alluring consistency or reasonable versatility. Bluetooth rules are utilizing affiliation development for this paper. When we share original practices and rapid our originality, we construct controlling associates by the individuals we’re adjoining to, with our unrestricted and the creation about us, and through ourselves. Ordinary procedure is creating and linking among TCP client with server includes 3- phases consumer refers SYN communication; server refers communication that associations ACK used for consumer’s SYN and encloses server’s SYN; then consumer directs ACK for server’s SYN. It is named TCP Three Way Handshake. It is joining formation connectionless communication to comparative features. Difference among connectionless combine connection oriented broadcast could proceeds residence at numerous coatings of Open System Interconnection Orientation Model. TCP has connection oriented carrying protocol. UDP has connectionless protocol
APA, Harvard, Vancouver, ISO, and other styles
8

Urmonov, Odilbek, and HyungWon Kim. "Highly Reliable MAC Protocol Based on Associative Acknowledgement for Vehicular Network." Electronics 10, no. 4 (2021): 382. http://dx.doi.org/10.3390/electronics10040382.

Full text
Abstract:
IEEE 1609/802.11p standard obligates each vehicle to broadcast a periodic basic safety message (BSM). The BSM message comprises a positional and kinematic information of a transmitting vehicle. It also contains emergency information that is to be delivered to all the target receivers. In broadcast communication, however, existing carrier sense multiple access (CSMA) medium access control (MAC) protocol cannot guarantee a high reliability as it suffers from two chronic problems, namely, access collision and hidden terminal interference. To resolve these problems of CSMA MAC, we propose a novel enhancement algorithm called a neighbor association-based MAC (NA-MAC) protocol. NA-MAC utilizes a time division multiple access (TDMA) to distribute channel resource into short time-intervals called slots. Each slot is further divided into three parts to conduct channel sensing, slot acquisition, and data transmission. To avoid a duplicate slot allocation among multiple vehicles, NA-MAC introduces a three-way handshake process during slot acquisition. Our simulation results revealed that NA-MAC improved packet reception ratio (PRR) by 19% and successful transmission by 30% over the reference protocols. In addition, NA-MAC reduced the packet collisions by a factor of 4. Using the real on-board units (OBUs), we conducted an experiment where our protocol outperformed in terms of PRR and average transmission interval by 82% and 49%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Nuiaa, Riyadh Rahef, Selvakumar Manickam, and Ali Hakem Alsaeedi. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327. http://dx.doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Riyadh, Rahef Nuiaa, Manickam Selvakumar, and Hakem Alsaeedi Ali. "Distributed reflection denial of service attack: A critical review." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (2021): 5327–41. https://doi.org/10.11591/ijece.v11i6.pp5327-5341.

Full text
Abstract:
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

Ramkumar, B. N., and T. Subbulakshmi. "Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method." ITM Web of Conferences 37 (2021): 01016. http://dx.doi.org/10.1051/itmconf/20213701016.

Full text
Abstract:
Transmission Control Protocol Synchronized (SYN) flooding contributes to a major part of the Denial of service attacks (Dos) because of the easy to exploit nature of the TCP three way handshake mechanism. Attackers use this weakness to overflow the TCP queue of the server and make its re-sources consumed resulting it to be unavailable for the requests of legitimate users. So we are in need of a quick and precise defence mechanism to detect the TCP-SYN Flood attack. The main objective of the paper is to propose a detection and prevention mechanism of the TCP-SYN flood attack using adaptive thresholding. Adaptive threshold algorithm (ATA) is used to calculate dynamic threshold .Thus this algorithm helps to overcome the limitations of static thresholding like high false positive ratio and also alert users after violation of the threshold calculated by adaptive thresholding algorithm. The result of the suggested mechanism is very effective in the detection and prevention of the TCP SYN flood attack using adaptive thresholding algorithm.
APA, Harvard, Vancouver, ISO, and other styles
12

Peacemark, Kipkorir, Ephantus Mwangi, and Jotham Wasike. "A Machine Learning-Based Packet Sniffer for Detection and Classification of the Denial-Of-Service Attack Packets at the Network Layer." International Journal of Research and Innovation in Applied Science X, no. V (2025): 568–82. https://doi.org/10.51584/ijrias.2025.100500051.

Full text
Abstract:
Cyber threats attacks have continued to evolve in complexity and sophistication, posing significant risks to an organization’s network infrastructure and sensitive data's availability, confidentiality, and integrity. Therefore, there is a great need to create a defense mechanism to counteract this problem. This study therefore was focused on modeling a packet sniffer utilizing machine learning techniques to identify denial of service (DOS) attack packets at the network layer of the OSI model. The overall purpose of the study was to capture and interpret packets transmitted over a local area network to detect and capture the DOS threats within the Open Systems Interconnection Model (OSI) network layer. This layer is prone to several attacks for instance, denial-of-service, routing protocol attacks, Port scanning and enumeration, and fragmentation-based attacks. This study, delved into detecting and capturing the denial of service threats at the third layer of the OSI model in a local area network. Some examples of DOS attacks are UDP flood which sends a significant quantity UDP (User Datagram Protocol) packets to the targeted systems and thereby exhausting network resources, ICMP flood which transmits a significant quantity of Internet Control Message Protocol (ICMP) packets to overwhelm network devices, SYN flood which takes advantage of the TCP three-way hand-shake procedure by sending a lot of SYN requests without carrying out the necessary handshake, using server resources and blocking valid connections.
APA, Harvard, Vancouver, ISO, and other styles
13

Vedula, Vasudha, Palden Lama, Rajendra V. Boppana, and Luis A. Trejo. "On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers." Electronics 10, no. 17 (2021): 2105. http://dx.doi.org/10.3390/electronics10172105.

Full text
Abstract:
Distributed denial of service (DDoS) attacks aim to deplete the network bandwidth and computing resources of targeted victims. Low-rate DDoS attacks exploit protocol features such as the transmission control protocol (TCP) three-way handshake mechanism for connection establishment and the TCP congestion-control induced backoffs to attack at a much lower rate and still effectively bring down the targeted network and computer systems. Most of the statistical and machine/deep learning-based detection methods proposed in the literature require keeping track of packets by flows and have high processing overheads for feature extraction. This paper presents a novel two-stage model that uses Long Short-Term Memory (LSTM) and Random Forest (RF) to detect the presence of attack flows in a group of flows. This model has a very low data processing overhead; it uses only two features and does not require keeping track of packets by flows, making it suitable for continuous monitoring of network traffic and on-the-fly detection. The paper also presents an LSTM Autoencoder to detect individual attack flows with high detection accuracy using only two features. Additionally, the paper presents an analysis of a support vector machine (SVM) model that detects attack flows in slices of network traffic collected for short durations. The low-rate attack dataset used in this study is made available to the research community through GitHub.
APA, Harvard, Vancouver, ISO, and other styles
14

Yuan, Yunjie, Gongye Ren, Xingyu Cai, and Xuguang Li. "An Adaptive 3D Neighbor Discovery and Tracking Algorithm in Battlefield Flying Ad Hoc Networks with Directional Antennas." Sensors 24, no. 17 (2024): 5655. http://dx.doi.org/10.3390/s24175655.

Full text
Abstract:
Neighbor discovery and tracking with directional antennas in flying ad hoc networks (FANETs) is a challenging issue because of dispersed node distribution and irregular maneuvers in three-dimensional (3D) space. In this paper, we propose an adaptive 3D neighbor discovery and tracking algorithm in battlefield FANETs with directional antennas. With time synchronization, a flying node transmits/receives the neighbor discovery packets sequentially in each beam around it to execute a two-way handshake for neighbor discovery. The transmitting or receiving status of each discovery slot depends on the binary code corresponding to the identification of the node. Discovered neighbor nodes exchange their 3D positions in tracking slots periodically for node tracking, and the maximum tracking period is determined by node velocity, beamwidth, and the minimum distance between nodes. By configuring the relevant parameters, the proposed algorithm can also apply to two-dimensional planar ad hoc networks. The simulation results suggest that the proposed algorithm can achieve shorter neighbor discovery time and longer link survival time in comparison with the random scanning algorithm in scenarios with narrow beamwidth and wide moving area. When the frame length increases, the protocol overhead decreases but the average neighbor discovery time increases. The suitable frame length should be determined based on the network range, node count, beamwidth, and node mobility characteristics.
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Kashif Mehboob, Aabira Fahim, Darakhshan M. Saleem, and Marvi Jokhio. "Empirical Investigation on Blockchain Interoperability." VFAST Transactions on Software Engineering 11, no. 1 (2023): 25–36. http://dx.doi.org/10.21015/vtse.v10i4.1315.

Full text
Abstract:
With the emerging employment of blockchains in different fields a need for blockchain intercommunication has arisen but there is no set standard yet for blockchain development, adoption and implementation due to which its interoperability has become a challenge. Interoperability refers to the mechanism of exchange and utilization of information between two software or computer systems etc. In blockchain, interoperability is the process of data creation, transfer and storage between two blockchains or blockchain applications. Blockchain interoperability is complex as every blockchain may have a different implementation platform and protocol for consensus mechanism. Bringing together two different blockchains and enabling communication between them without modifying their underlying implementation structure is a challenge today. There has been ongoing research in this domain to achieve interoperability in blockchains effectively. Its importance is evident from the fact that blockchain interoperability is vital for promoting scalability which is another research challenge presently. Apart from this, blockchain interoperability also promotes data privacy, application flexibility and portability and provides new opportunities in business. In this paper we have discussed in detail the three approaches and the solutions they provide for implementing blockchain interoperability. An empirical based analysis has been used to strengthen our methodology, which takes into consideration the selection of known & established blockchain network with state-of-the-art tools and technology. In order to have seamless communication across different chains, light clients (representing the respective chain) have been enabled to store each other’s information such as protocol version etc. In this way, the handshake between both the chain has resulted in a successful IBC (Inter Blockchain Communication) inside the Cosmos environment. It is concluded that although blockchain interoperability is being implemented today, this implementation is highly restricted to specific organizations or software tools. Moreover interoperability between two different blockchains is still an ongoing challenge. This study will assist the future work in the domain of blockchain interoperability as it makes the understanding and implementation of blockchain interoperability easier.
APA, Harvard, Vancouver, ISO, and other styles
16

Kumar, Prof Pradeep. "Creating One Time Password Programming for the Security of Data for Remote Location Treatment in Body Area Network." International Journal on Recent and Innovation Trends in Computing and Communication 9, no. 10 (2021): 01–02. http://dx.doi.org/10.17762/ijritcc.v9i10.5497.

Full text
Abstract:
Wireless body area network can manage patient through doctors through app on smart phones and security to data can be given by one-time password (OTP generation) like banking system. 6G protocols can make one time password more effective as all financial technology are dependent on one time password. Because transfer is mutual and one time password is best secure handshake between servers and containers are best security tempo for client server programmers. It depends on size of transfer means in the form of money in the transaction that size of container security code used for three way handshakes like third party or on the emergency for group client server model. Control logic is conditional enforcement of profitable rules to follow that is word access in computer science and that in the form of Intel processors till now but these Intel processors are in production in as general for as possible means one kind of Intel processor for whole world as processor generation paradigm. Can finance technological companies is eligible for creating more secure hardware for their trillions of transactions, I think word trillion is taken from word truth. Smartphone can handle data from sensor on body sensor through wireless with in distance limit and as data get uploaded it can reach to doctor by protecting it through OTP. In this as banking system can depend on OTP in the same way wireless health system may depend on this system.
APA, Harvard, Vancouver, ISO, and other styles
17

Miasse, Herman Olivier, Timothee Kombe, Olivier Videme Bossou, and Pierre Ele. "Accuracy Low-Cost “Handshake” Two-Way Ranging Protocol Applied to Road Traffic Communications." Transport and Telecommunication Journal 25, no. 3 (2024): 311–20. http://dx.doi.org/10.2478/ttj-2024-0023.

Full text
Abstract:
Abstract The densification of the vehicle fleet leads to numerous challenges in road safety management. Wireless Sensor Networks (WSN) helps to manage vehicle-vehicle-infrastructure interactivity, in particular to predict dangers and avoid accidents, detect and penalize traffic violations. This requires a massive deployment of communicating nodes embedded in vehicles and in road infrastructure. The reliability of the systems built on these nodes lies in the accuracy of the ranging. In order to improve the factors that impact accuracy, various ranging protocols have been developed, but their implementations most often involve the use of expensive and specialized transceivers, which incorporate a dedicated IEEE 802.15.4a ranging layer. Our approach implements the basic and advanced functions integrated into low-cost transceivers and microcontrollers. As result, in two or three links according to the case, our protocol performs simultaneously the ranging and the data exchange, against a specific ranging session with a minimum of three exchanges for the other protocols. Moreover, each node knows the ranging data and has its clock frequency adapted to the controlled process. So, we meet the challenges of large-scale low-cost node deployment, while ensuring high reliability and performance of ranging.
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Jie, Xin Hong Wang, Guo Xia Zhang, and Fu Qiang Liu. "Simulation of a Single-Radio Multi-Channel Vehicular Node Structure for VANET in NS-2." Applied Mechanics and Materials 195-196 (August 2012): 732–37. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.732.

Full text
Abstract:
We propose a universal single-radio multi-channel vehicle node structure (VNS) in NS-2 for VANET simulation. VNS can support different single-radio multi-channel MAC protocols, while in this paper we implement a split-phase mode MAC as channel coordination mechanism, with a three-way handshake as channel negotiation mechanism. Simulation results in sparse, dense and moving scenarios indicate that VNS is a preferable solution for simulation of VANET.
APA, Harvard, Vancouver, ISO, and other styles
19

Tauqeer, Muhammad, Moneeb Gohar, Seok Koh, and Hani Alquhayz. "Use of QUIC for Mobile-Oriented Future Internet (Q-MOFI)." Electronics 13, no. 2 (2024): 431. http://dx.doi.org/10.3390/electronics13020431.

Full text
Abstract:
With the proliferation of mobile devices and various mobile services, ensuring smooth mobility for users has become a major challenge. The future internet is expected to be more mobile-friendly, with advancing technologies that will transform internet management in the coming decades. These technological advancements will help address mobility issues and provide a better internet experience for mobile devices and users. The transport layer plays a crucial role in the internet protocol suite by enabling communication between applications running on different servers. However, the widely used protocols, TCP and UDP, have several limitations, such as unreliability and slow performance due to three-way handshakes. To tackle these issues, Google introduced quick UDP internet connections (QUIC). QUIC aims to enhance latency, delay, and data transmission reliability. Q-MOFI, a future internet architecture focused on mobile devices and based on QUIC, strives to achieve these goals. Moreover, it enhances throughput by implementing multiplexing. Q-MOFI outperforms traditional UDP-based MOFI in terms of throughput gains, minimizing packet loss, and reducing binding operation latency, even when the number of hosts increases. The efficiency of this model has been validated through experimental testing.
APA, Harvard, Vancouver, ISO, and other styles
20

AHMAD, ALOMARI RAFAT ALSHORMAN. "PROVING THE CORRECTNESS CONDITIONS OF THE THREE-WAY HANDSHAKE PROTOCOL USING COMPUTATIONAL TREE LOGIC." Journal of Theoretical and Applied Information Technology 99, no. 15 (2021). https://doi.org/10.5281/zenodo.5353200.

Full text
Abstract:
The three-way handshake protocol is widely used especially as a part of complex communication and security systems. It is used to establish a connection between a client and a server under specific rules and constraints. In this research, we used the NuSMV model checker along with Computational Tree Logic (CTL) to verify the correctness of the three-way handshake protocol over specific correctness conditions and properties. The results showed that the proposed protocol satisfied all correctness conditions except , , and . Furthermore, the proposed automated verification approach aims to verify the correctness of a finite number of clients each of them iterated infinitely often.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhao, Yifan, Hongwei Ding, Yingying Guo, et al. "ANALYSIS OF MULTI-CHANNEL TWO-DIMENSIONAL PROBABILITY CSMA AD HOC NETWORK PROTOCOL BASED THREE-WAY HANDSHAKE MECHANISM." International Journal on Smart Sensing and Intelligent Systems 10, no. 1 (2017). https://doi.org/10.21307/ijssis-2017-204.

Full text
Abstract:
In wireless Ad Hoc networks, large number and flexible mobility of terminals lead to the rarity of wireless channel resources. Also the hidden and exposed terminal problem exists in the Ad Hoc network which is the major factors restricting its development and applying. Considering these factors, this paper proposes a new CSMA protocol: multi-channel two-dimensional probability CSMA for wireless Ad Hoc network protocol based on three-way handshake mechanism, and analyzes the system throughput, delay of information packet, energy consumption and other properties under the control of the proposed protocol. By using the cycle analysis method, computer simulation results not only verify the theoretical analysis, but also show that the protocol has the optimum performance. The proposed protocol can not only reduce the collision probability of information packets to some extent, improving the channel utilization, reducing the waste of channel resources, but also achieve the balancing of load in a variety of wireless Ad Hoc network services, meeting the needs by different priorities with different QoS, and ensuring the systematic efficiency and fairness.
APA, Harvard, Vancouver, ISO, and other styles
22

Pahlevi, Rizka Reza, Parman Sukarno, and Bayu Erfianto. "Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare." Jurnal Rekayasa Elektrika 17, no. 2 (2021). http://dx.doi.org/10.17529/jre.v17i2.20428.

Full text
Abstract:
Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
APA, Harvard, Vancouver, ISO, and other styles
23

"Design the Connection Creation Bluetooth Techniques using Packet Switching." International Journal of Engineering and Advanced Technology 9, no. 3 (2020): 2851–56. http://dx.doi.org/10.35940/ijeat.c6005.029320.

Full text
Abstract:
An existent result from the exchange is working. However, we are sharing unique practices to fast our creativity; it develops controlling partners by the people it abuts to, with our unhindered and the creation about us. Three-Way Handshake strategy has used in this paper to the connection creation method. TCP and affiliation creation strategies have recycled related to formal progress outline connection creation. Now every course utilizing parcel exchanging systems and 4-areas are generally required that is Finish (FIN) and Acknowledgment (ACK). Opening the reason for existing techniques is about used handset toward training. It is indicating an association to make in this paper. FIN exchanging has been powerful not only in refining the accounts of information correspondences, but also it might be in alluring consistency or reasonable versatility. Bluetooth rules are utilizing affiliation development for this paper. When we share original practices and rapid our originality, we construct controlling associates by the individuals we’re adjoining to, with our unrestricted and the creation about us, and through ourselves. Ordinary procedure is creating and linking among TCP client with server includes 3- phases consumer refers SYN communication; server refers communication that associations ACK used for consumer’s SYN and encloses server’s SYN; then consumer directs ACK for server’s SYN. It is named TCP Three Way Handshake. It is joining formation connectionless communication to comparative features. Difference among connectionless combine connection oriented broadcast could proceeds residence at numerous coatings of Open System Interconnection Orientation Model. TCP has connection oriented carrying protocol. UDP has connectionless protocol
APA, Harvard, Vancouver, ISO, and other styles
24

Tuyên, Đặng Văn, and Trương Thu Hương. "SSG - A Solution to Prevent Saturation Attack on the Data Plane and Control Plane in SDN/Openflow Network." Research and Development on Information and Communication Technology 2019, no. 1 (2019). http://dx.doi.org/10.32913/mic-ict-research.v2019.n1.833.

Full text
Abstract:
The SDN/Openflow architecture opens new opportunities for effective solutions to address network security problems; however, it also brings new security challenges compared to the traditional network. One of those is the mechanism of reactive installation for new flow entries that can make the data plane and control plane easily become a target for resource saturation attacks with spoofing technique such as SYN flood. There are a number of solutions to this problem such as Connection Migration (CM) mechanism in Avant-Guard solution. However, most of them increase load to the commodity switches and/or split benign TCP connections, which can cause increase of packet latency and disable some features of the TCP protocol. This paper presents a solution called SDN-based SYN Flood Guard (SSG), which takes advantages of Openflow’s ability to match TCP Flags fields and the RST Cookie technique to authenticate three-way handshake processes of TCP connections in a separated device from SDN/Openflow switches. The experiment results reveal that SSG solves the aforementioned problems and improves the SYN Flood.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography