• Home
  • abolfazl Torghi haghighat
  • OpenAccess
    • List of Articles abolfazl Torghi haghighat

      • Open Access Article

        1 - A Rssi Based Localization Algorithm for WSN Using a Mobile Anchor Node
        Fereydoon Abdi Abolfazl Toroghi Haghighat
        Wireless sensor networks attracting a great deal of research interest. Accurate localization of sensor nodes is a strong requirement in a wide area of applications. In recent years, several techniques have been proposed for localization in wireless sensor networks. In t More
        Wireless sensor networks attracting a great deal of research interest. Accurate localization of sensor nodes is a strong requirement in a wide area of applications. In recent years, several techniques have been proposed for localization in wireless sensor networks. In this paper we present a localization scheme with using only one mobile anchor station and received signal strength indicator technique, which reduces average localization errors and execution time. Satisfactory simulation results and also comparison of localization errors and execution time between our scheme and similar previous schemes depicts the efficiency of proposed method against previous schemes. Manuscript profile
      • Open Access Article

        2 - A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
        By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and More
        By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attacks. For example in black hole attack, an attacker catches packets and throw them away, instead of forwarding them to their destinations. By using wireless intrusion detection systems, wireless networks can be protected. In this study, we introduce a new intrusion detection system to encounter black hole attack. This system is based on a combination of anomaly based intrusion detection (ABID) and specification based intrusion detection (SBID), we also use a new intrusion response. The analysis of simulation results (with NS-2) show that our method is success by using three measures: throughput, packet loss rate and packet delivery rate in comparing with ABID and SBID. Manuscript profile
      • Open Access Article

        3 - A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
        Maryam Fathi Ahmadsaraei Abolfazl Toroghi Haghighat
        In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networ More
        In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand distance vector routing protocol with NS-2 simulation. Then we review all kinds of intrusion detection systems (IDS) in large and small mobile ad hoc networks. We simulate these networks when they are under single black hole attack and with the existence of IDS byNS-2 simulator software. Finally, we compared the results according to throughput, packet loss ratio and packet delivery rate with each other. Manuscript profile