
Design and implementation of new security architecture for wireless network
Author(s) -
Mohammed M. Mahaba,
Mohammed H. Megahed,
Atef Z. Ghalwash,
Mohammed Abu Rezka
Publication year - 2019
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/610/1/012065
Subject(s) - drone , computer network , computer security , adversary , computer science , overhead (engineering) , network packet , wireless network , wireless , telecommunications , operating system , genetics , biology
Tactical Networks rely on modern communication technologies to connect soldiers and commanders engaged in the battlefield and enable enhanced information flow and data gathering, allowing for decision making based on real-time data analysis. Tactical network is a wireless communication network where wireless tactical network security is a milestone because a soldier does not know from where and when the attacks come.In this paper, a dangerous attack over the deployed tactical network is proposed through group of drones which are sent to the tactical network headquarter. The drone’s mission is to identify every device MAC, IP, Name and Location to intercept data or destroy the devices. Also, in this paper, a proposed solution is given for this proposed attack through changing MAC, IP, Name and Location for every device in the headquarter periodically according to the attack time and the devices importance. The MAC, IP, Name and Location must be changed before the drones return to enemy territories.A software program is developed to change MAC, IP, and Name periodically from centered server with no conflicts. The performance analysis for the proposed solution have been taken into consideration the metrics of packets drops, time delay, communication overhead and storage overhead during the changing time. A software tool verifies the changing of IP, MAC and Name for every device. This solution ensures that before the drones return to enemy territories all devices fixed parameters of MAC, IP, and Name are changed.