Risk of attack coefficient effect on availability of adhoc networks

Abstract: Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In […]

Publications

Discovering Triangles in Portraits for Supporting Photographic Creation, S He, Z Zhou, F Farhat, JZ Wang, IEEE Transactions on Multimedia, Aug 2017. Intelligent Portrait Composition Assistance — Integrating Deep-learned Models and Photography Idea Retrieval, F Farhat, MM Kamani, S Mishra, JZ Wang, July 2017. Skeleton Matching with Applications in Severe Weather Detection, MM Kamani, F […]

EECS PSU

Farshid Farhat @ EECS PSU PhD Candidate School of Electrical Engineering and Computer Science The Pennsylvania State University Address: 310 IST Building, University Park, PA, 16802. Email: fuf111 AT psu DOT edu Web: Farshid Farhat ‘s Site@PSU About Me I am a member of Intelligent Information Systems (IIS) research lab at Penn State. I am working with Prof. […]

Game-theoretic approach to mitigate packet dropping in wireless ad-hoc networks

Abstract: Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try […]

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup (PIAKAP)

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup Farshid Farhat, Somayeh Salimi, Ahmad Salahi Abstract Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS […]

Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes

Abstract Locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs is proposed in this paper. LMAR can find an ad-hoc path without selfish nodes and wormholes using a random search algorithm in polynomial-time. Also when the primary path fails, it discovers an alternative safe path if network […]

Extended Authentication and Key Agreement Protocol of UMTS

Abstract Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a […]