A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bansal, Divya
- Beacon Spoofing Attack:Impact and Security in Wireless Mesh Networks
Authors
1 PEC University of Technology, Chandigarh, IN
2 Computer Science Department , PEC University of Technology, Chandigarh, IN
Source
Wireless Communication, Vol 3, No 9 (2011), Pagination: 648-654Abstract
Wireless Mesh Networks have become an inevitable choice for gaining network access as it offers ubiquitous connectivity and improved performance due to the flexibility, scalability, features that it provides. Along with all these functionalities come the threats and vulnerabilities especially due to the fact that in case of wireless mesh networks the mesh points and mesh access points are deployed at different locations and are connected through a wireless medium to the portal. This radio communication between the mesh entities may even be heard by the attacker. The attacker may spoofs and masquerades the unencrypted management frames, thus facilitating the launch of Denial of service attacks. Moreover different mesh points communicate with each other via the forwarding action that too is based on radio communication. So the mesh devices are also vulnerable to physical tamper besides all other kinds of attacks. There is imperative need for the techniques that may thwart all kinds of security attacks. In this paper we have analyzed the impact of the beacon spoofing attack and flooding attack over the Wireless Mesh Networks test bed and proposed a security algorithm to detect this attack.Keywords
Beacon Spoofing, Denial of Service, Detection Algorithm, Flooding Attack, Spoofing, Wireless Mesh Networks.- Prevention of DoS Attacks in 802.11s Wireless Mesh Networks
Authors
1 Computer Science & Engineering, Punjab Engineering College, Chandigarh, IN
Source
Wireless Communication, Vol 1, No 3 (2009), Pagination: 157-163Abstract
Unlike wired networks, wireless networks do not have well-defined physical boundaries, which makes them prone to several security threats. As various wireless networks evolve into the next generation to provide better services, a key technology in the form of wireless mesh networks (WMNs) has emerged recently. Wireless Mesh Networks hold the promise of facilitating large-scale community networks in complex environments. There are number of issues in deploying WMNs, amongst others, security is a very serious issue. In these and other vital or security-sensitive deployments, keeping the network available for its intended use is essential. Without proper security mechanisms, networks will be confined to limited, controlled environments, negating much of the promise they hold. One of the major loop-holes in the security of WMNs is that management frames are not authenticated, and hence can be easily spoofed to cause DoS or Denial of Service attacks. We analyze the existing schemes and the proposed 802.11w draft to authenticate Disassociation and Deauthentication management frames. In this paper an amendment to the draft of 802.11w is proposed that can be used to prevent DoS attacks over 802.11i security standard. Further specific DoS attacks that that cannot be solved by the proposed draft are also analyzed in this paper.
Keywords
Wireless Mesh Networks, Denial of Service, 802.11w, 802.11i, NAV, Disassociation, Deauthentication.- Simulation Analysis of Secure OLSR Routing Protocol
Authors
1 Department of Computer Science and Engineering, PEC, University of Technology, IN
Source
Networking and Communication Engineering, Vol 3, No 8 (2011), Pagination: 532-537Abstract
In this paper we are presenting the simulation analysis of the secure OLSR (Optimized Link State Routing Protocol) in mobile ad-hoc network. The security scheme provides the security in two parts in which the hash chain or the encryption algorithm is used. For protecting the TC message we are using the HASH chain and for the hello message encryption algorithm is used. The approach provides the better security than the existing OLSR. And the simulation results show that the approach is more secure and efficient than the real OLSR in case of attacker node. And the SOLSR provides the more security in the case of malicious activities in the network. The security scheme provides the, node to node authentication as well as sender to receiver authentication. The security scheme is so easy, so easily can be implemented on the other proactive routing protocols also.Keywords
OLSR Protocol, HASH Chain, SHA Algorithm, Encryption Algorithm, AES.- Protective Effect of Ferulic Acid on Erythrocytes against Experimental Oxidative Stress Models
Authors
1 Shri Ram Institute of Technology-Pharmacy, Jabalpur, M.P, IN
Source
Toxicology International (Formerly Indian Journal of Toxicology), Vol 23, No 1 (2016), Pagination: 49-53Abstract
Various pathological conditions in thebodyare observed as a result of cellular damage. Damage to erythrocytes makes them less capable of carrying oxygen. Some therapeutic agents are known to cause lysis of erythrocytes. In the present study, ferulic acid was used to assess protective effects on erythrocytes against various hemolytic insults. Experimental models viz. hemoglobin- induced linoleic acid peroxidation, H2O2 induced hemolysis and CuOOH-induced hemolysis were used to study theprotective effect of ferulic acid. Ferulic acid demonstrated concentration-dependent inhibition in the experimental models. In all the three cases, maximum inhibition of hemolysis was observed at 250 μg/ml of ferulic acid. The study establishes ferulic acid as apotential antihemolytic agent.Keywords
Erythrocytes, Oxidative Stress, Antioxidant, Ferulic Acid.References
- Halliwell B, Gutteridg JMC. Oxygen free radicals and iron in relation to biology and medicine: some problems and concepts. Arch. Biochem. Biophys. 1986;246(2):501–514.
- D’ Aguino M, Gaetani S, Spadoni MA. Effect of factors of favism on the protein and lipid components of rat erythrocyte membrane. Biochim. Biophys Acta. 1983;731:161–167.
- Goldberg B, Stern A. The role of the superoxide anion as a toxic species in the erythrocyte. Arch. Biochem. Biophys. 1977;178:218–225.
- Shinar E, Rachmilewitz EA. Oxidative denaturation of red blood cells in thalassemia. Semin Hematol. 1990;27(1):7082.
- Jacob H, Winterhalter K. Unstable hemoglobins: the role of heme loss in Heinz body formation. Proc Natl Acad Sci U S A. 1970;65(3):697-701.
- Jacob HS, Winterhalter KH. The role of hemoglobin heme loss in Heinz body formation: studies with a partially heme-deficient hemoglobin and with genetically unstable hemoglobins. J Clin Invest. 1970;49(11):2008-16.
- Ohno H, Nomura M, Watanabe K. A possible mechanism of heinz body hemolytic anemia induced by DQ-2511, a new gastroprokinetic drug, in dogs. Fundam Appl Toxicol. 1996; (2):269-77.
- Ohno H, Tojo H, Kakihata K, Nomura M, Takayama S. Heinz body hemolytic anemia induced by DQ-2511, a new anti-ulcer drug, in dogs. Fundam Appl Toxicol. 1993;20(2):141-6.
- Ohno WH. Methylene blue-induced Heinz body hemolytic anemia. Arch Pediatr Adolesc Med. 1994;148(3):306-10.
- Fort FL, Pratt MC, Carter GW, Lewkowski JP, Heyman IA, Cusick PK, Kesterson JW. Heinz bodies, methemoglobinemia, and hemolytic anemia induced in rats by 3-ami no-1-[m-(trifluoromethyl)phenyl]-2-pyrazoline. Fundam Appl Toxicol. 1984;4:216-20.
- Christopher MM, Perman V, Eaton JW. Contribution of propylene glycol-induced Heinz body formation to anemia in cats. J Am Vet Med Assoc. 1989 15;194(8):1045-56.
- Ponte CD, Lewis MJ, Rogers JS 2nd. Heinz-body hemolytic anemia associated with phenazopyridine and sulfonamide. Annals Pharmacother. 1989;23(2):140-2.
- Yoo D, Lessin LS. Drug-associated “bite cell” hemolytic anemia. Am J Med. 1992;92(3):243-8.
- John CM, Sandrasaigaran P, Tong CK, Adam A, Ramasamy R. Immunomodulatory activity of polyphenols derived from Cassia auriculata flowers in aged rats. Cell Immunol. 2011; 271(2):474-9.
- Narayan C, Kumar A. Antineoplastic and immunomodulatory effect of polyphenolic components of Achyranthes aspera (PCA) extract on urethane induced lung cancer in vivo. Mol Biol Rep. 2014; 41(1):179-91.
- Mitjans M, del Campo J, Abajo C, Martínez V, Selga A, Lozano C, Torres JL, Vinardell MP. Immunomodulatory activity of a new family of antioxidants obtained from grape polyphenols. J Agric Food Chem. 2004; 52(24):7297-9.
- Graf E. Antioxidant potential of ferulic acid. Free Radic Biol Med. 1992; 13:435-48.
- Srinivasan M, Rukkumani R, Ram Sudheer A, Menon VP. Ferulic acid, a natural protector against carbon tetrachloride induced toxicity. Fundam. Clin. Pharmacol. 2005; 19:491-96.
- Kanaski J, Aksenova M, Stoyanova A, Butter field DA. Ferulic acid antioxidant protection against hydroxyl and peroxyl radical oxidation in synaptosomal and neuronal cell culture systems in vitro: structure activity studies. J. Nutr. Biochem. 2002; 13:273-281.
- Prasad NR, Srinivasan M, Pugalendi KV, Menon VP.Protective effect of ferulic acid on γ-radiation induced micronuclei, dicentric aberration and lipid peroxidation in human lymphocytes. Mutat Res. 2006; 603:129-34.
- Sudheer AR, Kalpana C, Srinivasan M, Menon VP. Ferulic acid modulates lipid profiles and prooxidant/antioxidant status in circulation during nicotine-induced toxicity: A dose dependent study. Toxicol. Mech. Methods. 2005; 15:375-81.
- Rukkumani R, Aruna K, Varma PS, Menon VP. Ferulic acid, a natural phenolic antioxidant modulates altered lipid profiles during alcohol and thermally oxidized sunflower oil induced toxicity. J. Nutra Func Med Foods. 2004; 4:119– 132.
- Stich HF, Ohshima H, Pignatelli B, Michelon J,Bartisch H. Inhibitory effect of betel nut extracts on endogenous nitrosation in humans. J. Natl Cancer Inst. 1983; 70:1047-50.
- Khanduja KL, Avti PK, Kumar S, Mittal N, Sohi KK, Pathak CM. Anti-apopototic activity of caffeic acid, ellagic acid and ferulic acid in normal human peripheral blood mononuclear cells: A Bcl-2 independent mechanism. Biochim Biophys Acta. 2006; 1760:283-289.
- Graf E. Antioxidant potential of ferulic acid. Free Radic Biol Med. 2000; 28:1249-56.
- Ebrahimzadeh MA, Pourmorad F, Hafezi S. Antioxidant activities of Iranian corn silk. Turk J Biol. 2008; 32; 43-49.
- Halliwell B, Cross CE. Oxygen-derived species: their relation to human disease and environmental stress. Environ Health Perspect. 1994 Dec;102 Suppl 10:5-12.
- Marchioli R, Schweiger C, Levantesi G, Tavazzi L et al. Antioxidant vitamins and prevention of cardiovascular disease: epidemiological and clinical trial data. Lipids 2001; 36: 53–63.
- Gyamfi MA, Yonamine M, Aniya Y. Free- radical scavenging action of medicinal herbs from Ghana Thonningia sanguinea on experimentally- induced liver injuries. General Pharmacol 1999; 32: 661- 667.
- John CM, Sandrasaigaran P, Tong CK, Adam A, Ramasamy R. Immunomodulatory activity of polyphenols derived from Cassia auriculata flowers in aged rats. Cell Immunol. 2011; 271(2):474-9.
- Mitjans M, del Campo J, Abajo C, Martínez V, Selga A, Lozano C, Torres JL, Vinardell MP. Immunomodulatory activity of a new family of antioxidants obtained from grape polyphenols. J Agric Food Chem. 2004; 52(24):7297-9.
- Narayan C, Kumar A. Antineoplastic and immunomodulatory effect of polyphenolic components of Achyranthes aspera (PCA) extract on urethane induced lung cancer in vivo. Mol Biol Rep. 2014; 41(1):179-91.
- Mathew S, Abraham TE. Ferulic acid: an antioxidant found naturally in plant cell walls and feruloyl esterases involved in its release and their applications. Crit Rev Biotechnol. 2004; 24(2-3):59-83.
- Threshold Based Authorization Model for Authentication of a Node in Wireless Mesh Networks
Authors
1 Department of Computer Science & Engineering, PEC University of Technology, Chandigarh, IN
Source
International Journal of Advanced Networking and Applications, Vol 1, No 6 (2010), Pagination: 387-392Abstract
As various wireless networks evolve into the next generation to provide better services, a key technology, wireless mesh networks (WMNs), has emerged recently. There are number of issues in the deployment of WMNs. Amongst others security is quite a serious issue. Authenticating the users and devices in the network is a key point of network security. IEEE 802.11s mesh networks do not have any well defined or specified security architecture which can cater to large number of diversified applications. As the major characteristic of WMNs is multihop therefore using the 802.11i as the security standard is inadequate to provide security in Wireless Mesh Networks primarily because 802.11i was designed with the central security mechanism. In this paper a new approach using threshold authorization model with Clustered Certificate Authority is proposed which caters to the best of both the centralized and distributed architecture.Keywords
Wireless Mesh Networks, Threshold Authorization, Secret Key Sharing.- Protective Effect of Curculigo orchioides Extract on Cyclophosphamide‑Induced Neurotoxicity in Murine Model
Authors
1 Drug Discovery Laboratory, Shri Ram Institute of Technology-Pharmacy, Jabalpur, IN
2 Pharmaceutics Research Laboratory, Shri Ram Institute of Technology-Pharmacy, Jabalpur, IN
3 Pinnacle Biomedical Research Institute, Bhopal, MP, IN