Ejiro E Igbesoko’s research while affiliated with University of Greenwich and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks
  • Conference Paper

May 2012

·

43 Reads

·

12 Citations

Okoli Adaobi

·

Ejiro Igbesoko

·

Security in Wireless Self-organised Networks (WSoN) could be looked at from various view points with respect to different communication layers through which their functionalities are attained. Multihop communication between mobile devices may require specially designed routing algorithms for self-organised networks; those routing protocols can become primary targets for attacks. In this article we run a simulation study of an attack causing an 86% decrease in packet delivery ratio and an increase in packet drops by the same proportion for a selected scenario. We simulated a wireless sensor network with the presence of phenomenon, to investigate and extended it to generate denial of service attacks. We have used the phenomenon contribution to generate a realistic traffic pattern for accurate evaluation of protocols, and compared it to the traditional method of using only Constant Bit Rate (CBR) traffic, usually employed by most researchers. We then adapted an Intrusion Detection System (IDS) into our simulated sensor network, and achieved detection rate of greater than 90% with a very low false positive rate of less than 1%. Each node was configured to independently monitor, detect and report intrusions, providing us with more accurate results and avoiding the additional delays and existence of a central point of failure that a centralised IDS would introduce. We also investigated the impact of a Black-hole attack on MANETS and we observed that under the on-demand routing protocol, the closer a malicious node is to the source of traffic, the greater the extent of damage inflicted on the networks. This study on security attacks and intrusion detection systems has led us to illustrate some of the particular security issues in WSoN.


Performance Analysis of MANET Routing Protocols over Different Mobility Models
  • Article
  • Full-text available

173 Reads

·

31 Citations

This work is a simulation based comparison of three Mobile Ad Hoc Networks (MANETs) routing protocols – Destination Sequenced Distance Vector (DSDV), Ad hoc on demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The comparison is based on their performance in some existing mobility models used in the simulation of MANETs. The mobility models used in this work are Random Waypoint, Manhattan Grid, Gauss-Markov, Reference Point Group and Heterogeneous Mobility Models. With detailed simulations of the protocols across these models, comparisons are made based on results obtained using known metrics for evaluating the protocols. Also, the protocols are compared under varied categories of disaster area scenarios modelled by a Heterogeneous mobility model. Across the models with respect to considered metrics for comparison, DSR outperformed others followed by AODV and then DSDV.

Download

Citations (2)


... Meanwhile, the proposed solution offered a remarkably less packet drop rate as compared to the work of Ahmed et al. (2014). Adaobi et al. (2012) stated that packet delivery ratio may results in an increase in packet drops when experiencing denial of service attacks in which a traffic pattern can be observed and compared to other realistic one. The same was addressed by Bensaid et al. (2016) who highlighted the association between packet drop rate and time for processing nodes in a network. ...

Reference:

Performance Evaluation of Blackhole Attack on AODV in VANET
Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks
  • Citing Conference Paper
  • May 2012

... Other studies [9,15,16] have considered performance comparison of reactive and proactive routing protocols under different mobility models. Kafhali et al, [17] analyzed effects of traffic models on energy consumption under MANET routing protocols. ...

Performance Analysis of MANET Routing Protocols over Different Mobility Models