Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Tropical Journal Of Natural Product Research
Cytotoxic Potential of Neem (Azadirachta indica A. Juss) Oil
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Acta Facultatis Medicae Naissensis
A correlation between body mass index and refractive errors
...Show More Authors

Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 16 2021
Journal Name
Journal Of Advance Research In Chemical Sciences
Study of Schiff Bases Complexes of Trimethoprim: A Review
...Show More Authors

Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
A Survey Study and Comparison of Drones Communication Systems
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
International Journal Of Science And Research (ijsr)
Supra-Approximation Spaces Using Mixed Degree System in Graph Theory
...Show More Authors

This paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.

Publication Date
Thu Dec 09 2010
Journal Name
Journal Of Engineering
CORRELATIONS BETWEEN PHYSICAL AND MECHANICAL PROPERTIES OF AL-AMMARAH SOIL IN MESSAN GOVERNORATE
...Show More Authors

This paper describes the geotechnical properties of Al-Ammarah soil of Ammarah city in Messan Governorate-southern parts of Iraq. Data and other information taken from numbers of geotechnical reports that performed under the supervision of Consulting Engineering Bureau of Baghdad University. This research is devoted to study the correlation between different physical properties such as (LL, PI, LI, n,t, e) with different mechanical properties such as (qu, cc, cs, SPT). The correlation is verified using simple regression analysis. From the regression results it was found that there is direct correlation between different parameters. By using the correlation-with some information- preliminary investigation stages and studies of any s

... Show More
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Free Convective Heat Transfer with Different Sections Lengths Placed at the Exit of a Vertical Circular Tube subjected to a Constant Heat Flux
...Show More Authors

A free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of

... Show More
View Publication Preview PDF