ميعاد حسام مهدي

ABSTRACT

Many banks use wired and wireless communication networks to provide bank services for their customers. As hardly any banking system is devoid of communication networks at the present time. Almost, these networks consisted of many devices including computers, laptops, etc. Since wireless networks are exposed to many attacks, the banks will fail to use wireless networks without security. Therefore, providing confidentiality and integrity for the data of the banks is considered a very necessary process.The QOD routing protocol assumes reliable participants; that is, all nodes are trusted. This means that the routing protocol did not take into account the attacks that could get into the network. However, hybrid wireless networks consisted of wireless links. Moreover, messages are sent throughout the network in a clear text which makes it susceptible to many attacks including message distortion, message reply, passive eavesdropping, active impersonation, etc. These attacks come from inside or outside the network This thesis provides security for hybrid wireless networks with two mechanisms. The first mechanism use encryption algorithms to protect the data from external attacks and prevent unauthorized access to the data. In this mechanism, two algorithms have been used including Advanced Encryption Standard (AES) algorithm and Rivest Shamir Adleman (RSA) algorithm. Since symmetric algorithms are faster than asymmetric algorithms, thus the AES algorithm is used to encrypt the exchanged data. However, the RSA algorithm is used to exchange the secret key or symmetric key of the AES among the nodes of the hybrid wireless network. The second mechanism was using the keyed Hash Message Authentication Code (HMAC) to provide integrity and authenticity for one of the routing protocols of hybrid wireless networks, which is the Quality of Service Oriented Distributed (QOD) routing protocol. NS2.35 is used as a network simulator to simulate our proposed work and compare the results with the QoS-Oriented Distributed (QOD) routing protocol in terms of throughput, overhead, delay, and packet delivery ratio (PDR). The results of the comparison between the two protocols as a consequence of using different simulation models (network, mobility, and traffic), showed that the security mechanisms often hinder the performance of the network. Therefore, there is a tradeoff between network performance and security.

Top