Design and implementation of new security architecture for wireless network

Document Type : Original Article

Authors

1 College of Computing and Information Technology, AASTMT, Cairo, Egypt.

2 Communications Department, Canadian International College (CIC), Cairo, Egypt.

3 College of Computers and Information systems, Helwan University, Cairo, Egypt.

10.1088/1757-899X/610/1/012065

Abstract

Tactical Networks rely on modern communication technologies to connect soldiers and commanders engaged in the battlefield and enable enhanced information flow and data gathering, allowing for decision making based on real-time data analysis. Tactical network is a wireless communication network where wireless tactical network security is a milestone because a soldier does not know from where and when the attacks come.In this paper, a dangerous attack over the deployed tactical network is proposed through group of drones which are sent to the tactical network headquarter. The drone’s mission is to identify every device MAC, IP, Name and Location to intercept data or destroy the devices. Also, in this paper, a proposed solution is given for this proposed attack through changing MAC, IP, Name and Location for every device in the headquarter periodically according to the attack time and the devices importance. The MAC, IP, Name and Location must be changed before the drones return to enemy territories.A software program is developed to change MAC, IP, and Name periodically from centered server with no conflicts. The performance analysis for the proposed solution have been taken into consideration the metrics of packets drops, time delay, communication overhead and storage overhead during the changing time. A software tool verifies the changing of IP, MAC and Name for every device. This solution ensures that before the drones return to enemy territories all devices fixed parameters of MAC, IP, and Name are changed.

Keywords