Volume 10, Issue 4, July 2019

Improve the Quality of Service Factors in Distributed Ad-Hoc Networks
Pages: 1-7 (7) | [Full Text] PDF (346K)
Bashar Abbas, Mohammed Hijazieh
Department of Computer and Control Engineering, University of Tishreen, Latakia, Syria

Abstract -
The networks of MANET (Mobile Ad-hoc Networks) are among the most important fields that attract researchers today because of the need for such networks in many scientific and applied fields such as companies, hospitals and universities because they do not require any infrastructure such as routers or access points, where each node in the network plays the role of the router which leads to low installation and operating costs in addition to easy network creation in areas that are difficult to access. In this research, the MANET network was simulated by subjecting the packet generation process to an exponential probability distribution with the change of the value of the (α) parameter in order to obtain the best performance when the number of nodes changed taking into account the parameters of Throughput, load and delay. An improvement has also been added to the work of the basic protocol is to choose paths that meet the requirement of a particular bandwidth, which significantly reduces the delay factor and thus add an improvement on the QoS factors.
 Index Terms - QoS, MANET, Proactive, Reactive, AODV, DSDV and ZRP
Routing Algorithms/Protocols in Mobile Ad-hoc Networks (MADN) and Comparison of AODV and E-AODV Protocols: A Survey
Pages: 8-13 (6) | [Full Text] PDF (237K)
Sobia Talib
University of Engineering and Technology, Lahore Campus Pakistan, Computer Science & Engineering Department

Abstract -
Mobile ad-hoc networks are considered to be highly vibrant networks without pre-existing substantial infrastructure. The nodes of these networks operate as routers that maintain routes to other network nodes, thus enabling nodes to move and coordinate with neighboring nodes. The algorithms/protocols used in MADN mobile networks should be capable of managing an outsized numbers of nodes while having very limited number of resources. This paper involves the study of research work proposed in different year by researchers and find out which routing protocols gives best result in terms Performance measurements such as performance, latency, packet loss, jitter, bit rate, and end-to-end delay. This paper also presents AODV and Enhanced-AODV comparison and analysis and shows how the E-AODV performs better from the AODV and how it has changed.
 Index Terms - AODV, MADN, Protocols, Comparison, Resources and Performance
Security Challenges of Industrial Communication Protocols: Threats, Vulnerabilities and Solutions
Pages: 14-21 (8) | [Full Text] PDF (383K)
Khalid Imtiaz, M. Junaid Arshad
CS&E Deptt., U.E.T., Lahore

Abstract -
Industrial communication protocol (ICP) is used in order to exchange the data among the Industrial management system and field side instruments. By the intensity integration of industrialization, informatization and the speedy advancement of the internet, the ICCPs (Industrial Control Communication Protocols) dangers becomes progressively more outstanding. The industrial and domestic communication protocols show huge similarity between them. The hierarchy at the upper level of both domestic and industrial networks is same this is the reason that researchers are still looking for the development of the best Industrial Communication Protocols (ICPs) by proposing or suggesting the new techniques or architecture for the domestic communication protocols. In this research work, we present the security challenges and present standard’s issues control industrial communication frameworks, just like Modbus RTU/ASCII, Foundation fieldbus, CAN OPEN, Open Platform Communications etc. At that point the security suggestions are raised up against these kinds of problems. The wellbeing of entire controlled communication system may be enhanced just by enhancing security of the correspondence conventions. The main focus of our research is to discuss the security challenges, threats and vulnerabilities of industrial communication protocols and then provide their possible solutions, as it is required for conventional industrial communication protocols towards the improved modern high-speed Industrial control system (ICS).
 Index Terms - Industrial Control System, Industrial System Automation, Industrial Communication Protocols, Vulnerabilities, Threats, Security Challenges, IDPS and Modbus Protocol
Role of Deep Packet Inspection in Industry 4.0 Protocols: A Survey
Pages: 22-29 (8) | [Full Text] PDF (686K)
Shahzaib Zahid, Ghazanfar Abbas
Computer Science & Engineering Department University of Engineering & Technology Lahore, Pakistan
Al-Khawarizmi Institute of Computer Science University of Engineering & Technology Lahore, Pakistan

Abstract -
This paper is an overview and understanding of Deep Packet Inspection and how different systems use DPI for security purposes. We’ll show what is industry 4.0 and how DPI is evolving in some of the protocols of industry 4.0 i.e. Modbus, MQTT, and CoAP as these are the lightweight protocols. For this purpose, the understanding of these protocols is necessary hence, we’ll show the survey of different papers and web resources for better understanding. Moreover, the paper shows that how DPI is evolved in firewalls and IDS and how can we use it in these protocols. So, in light of the examination of different recent studies, a better understanding is shown for the use of DPI in industry 4.0. Signature matching and protocol anomaly detection are the main techniques in DPI which are initially implemented in firewalls and IDS. The paper shows how to use these techniques in industry 4.0 protocols.
 Index Terms - IoT, IIoT, Modbus, PDU, ADU, MBAP, HMI, PLC, PAC, TID, IDS, TCP, UDP, UID, SCADA, M2M, MQTT, CoAP, SMS, URI, DTLS and ML