International Journal of Communications, Network and System Sciences
Vol.08 No.13(2015), Article ID:62435,11 pages
10.4236/ijcns.2015.813051

Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

Arif Sari, Mehmet Karay

Department of Management Information Systems, Girne American University, Kyrenia, Cyprus

Copyright © 2015 by authors and Scientific Research Publishing Inc.

This work is licensed under the Creative Commons Attribution International License (CC BY).

http://creativecommons.org/licenses/by/4.0/

Received 20 August 2015; accepted 10 September 2015; published 30 December 2015

ABSTRACT

There have been various security measures that deal with data security in wired or wireless network, where these measures help to make sure that data from one point to another is intact, by identifying, authenticating, authorizing the right users and also encrypting the data over the network. Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data that’s been exchanged or transferred, thereby causing threats to the data. Especially data on wireless networks are much exposed to threats since the network has been broadcasted unlike a wired network. Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system. Less or no focus was placed on the reactive approach or measures to data security which is capable of responding properly to mitigate an attacker and avoid harm and also to prevent future attacks. This research is going to expose the mechanisms and measures of data security in wireless networks from the reactive security approaches point of view and exposes the reactive approaches used to enhance data security.

Keywords:

Reactive Security, Data Security, Mobile-Wireless Network, Proactive Security, encryption, decryption, Cryptography

1. Introduction

Securing data have not been completely achieved over the years due to different network types and their characteristics, but to a more percentage, data have been secured over a secure network as well. The flexibility of wireless network always makes the access to the network open, because the SSID is always broadcasting. Data are transferred through the use of radio waves and thus making the data available through everywhere in space, enabling the corresponding users to receive the information anytime with the right device in this case a radio receiver. Due to this data protection becomes a pressing issue to deal with. Wired networks are traditionally protected or secured via firewalls, shields etc. while this cannot be done in the case of wireless data protection. Protecting data in wireless environment or networks need a different mechanism altogether, in order to give the users a secure feel in data transfer and have accuracy, reliability, availability, integrity, and confidentiality.

In a world of diverse communication between nodes, wired and wireless devices, and mobile-wireless devices. Data communication has reached a significant point in Information Technology that security of data gives the user an opportunity to share or exchange information securely using the right and appropriate tool. Today banks, government, defense systems all have changed the way data are been exchanged or transmitted, transactions have been compromised in different ways. The communication medium that is been used for data communication are vulnerable to different attacks. The protection of these systems is very important and prominent and this leads to more attacks and loss of important and confidential information when the right measure or system is not installed [1] [2] . Threats come from hackers, spies, corporate raiders, terrorists, professional criminals etc. Their objective is either financial or political gain [1] [2] . In trying to solve the security challenge of today’s threats, network professionals became aware of the Proactive and Reactive approach to tackling security vulnerabilities [1] [2] . The Proactive approach secures data by predicting the future of an attack and tends to mitigate that attack. While the reactive approach on the other hand learns from the past attack and use that knowledge to prevent future attacks from happening [1] [2] . The reactive approach to data security in mobile-wireless network is like an Anomaly Detection System, which learns from the previous attack and based on the knowledge gained, it mitigates future attack by crosschecking the behavior of the attack in its database. The reactive approach is a much easier method compared to the proactive method [1] -[3] .

This paper highlights the security advantage of the reactive security approach in data security in a mobile wireless network and discusses data security in wireless networks. Section two discusses the proactive approach to data security and common attacks known to data in wireless environment. Section three discusses reactive approach to data security and different security mechanisms to ensure data security in wireless network environment. Section four describes topics on cryptography algorithms for data security while section five draws a conclusion on the reactive approach security and concludes research on data security in wireless networks.

2. Data Security

In securing data in the Information Technology environment, more than one method or mechanism is usually applicable to provide availability, integrity and confidentiality. Data communication over public networks should be encrypted using a good encryption algorithm and also a two-authentication method that would only give access to the right user, biometric approach can also be utilized as an authentication method. In data security, these services need to be put in mind (Table 1).

The Wired Equivalent Privacy (WEP) design is met for securing wired LAN by encryption which uses the Rivest Cipher 4 (RC4) algorithm encrypting messages with a shared key and using a two-side data communication that is the sender and the receiver [3] [4] . Data in broadcast or transmission is also prone to threats and they can be manipulated and compromised before it gets to its intended destination. In this kind of environment, 1) Data confidentiality and Integrity must be strong, and there should also be protection for replay messages, this can be achieved by using a cryptographic tool that has the replay protection techniques available. 2) Mutual Authentication, which provides a medium for users communicating to authenticate their identity, and subsequently

Table 1. Handling data security issues.

a key combination is integrated and flexible authorization policies with secured access can be deployed to restrict users. 3) Availability which is also an important measure in data security, the network should be able to stop attackers form shutting down or manipulating the connectivity of the entire system on the network, if this is done appropriately it could prevent denial of service attack DoS or it can mitigate it. The WiFi Protected Access (WPA), also utilizes the RC4 for data encryption in a wireless network, but it also adopts a Temporal Key Integrity Protocol (TKIP) for its confidentiality. In detecting replay packets or messages in WPA, a sequence mechanism is used to increase the sequence number of each message or packet [4] [5] . The WPA improved authentication methods are Pre-Shared Key (PSK), which authenticates the connected users with a 128-bit encryption key and a distinct 64-bit Message Integrity Code (MIC) which is gotten from the PSK. Also, the IEEE 802.1X and the Extensible Authentication Protocol (EAP) which can be provide a stronger authentication [4] -[6] . The IEEE 802.11i provides an improved MAC layer security, provides authentication protocols, key management protocols, and data confidentiality protocols. Another technique is the use of a Closed System Authentication which hides the SSID broadcast [4] -[6] . This only gives access to users who know the SSID of the network to gain access to the network and join. Other methods to secure a WLAN outside the MAC layer such approach are:

・ Physical Layer approach, choosing a good antenna, K and positioning can cut the rate at which signal is lost or leaked, thereby improving security in the network [6] [7] .

・ RF firewall design which help to protect the WLAN [7] [8] . This requires the 802.11 to be modified in the physical layer.

・ IPsec, SSL and SSH are also different approach to securing network connection.

3. Mechanisms for Data Security

Protecting confidential data either in broadcast, transmission or at the intended destination, requires data encryption which is one of the most used mechanism for protecting or securing data in wireless networks.

3.1. Encryption

This is a process of securing data that is to be transferred between computers. The data needs to be scrambled in a way that it cannot be read without having the right code or key to decode the data [9] . If the message seem hard to break that means the security system is very secure. As shown in Figure 1, a common use of encryption and decryption techniques; in the figure, an unsecured message which is the (Plain Text) is encrypted using an encryption techniques that made the message unreadable (Cipher Text) without having the right decryption code or key. The message is sent over the network and the receiving end decrypts the message with the right key to view the content. In securing data, the encryption procedures are categorized into two which is Asymmetric and Symmetric encryption techniques. These techniques depends on the type of security key that is been deployed to encrypt or decrypt the data that was secured.

In general, an RBF network can be described as constructing global approximations to functions using combinations of basic functions centered around weight vectors. In fact, it has been shown that RBF networks are universal function approximators. Practically, however, the approximated function must be smooth and piecewise continuous. Consequently, although RBF networks can be used for discrimination and classification tasks, binary pattern classification functions that are not piecewise continuous (e.g., parity) pose problems for RBF networks Thus, RB The RBF network used in this work is given in Figure 1. It consists of an input layer, one hidden layer and an output layer.

3.1.1. Symmetric Encryption

This method of encryption give the sender and the receiver the right to set and agree on a shared key, that would be used in encrypting and decrypting the message or data that is to be sent. Afterwards they use the shared key they decided on to encrypt and decrypt their message, this is shown in Figure 2, where an assumption of Node A and Node B first agree on the system of encryption (cryptosystem) then they move forward to agree on the shared key for encryption then Node A encrypts the message with the key and send over the network, while Node B decrypts the message with the same key to read the actual information.

One of the drawbacks of the symmetric encryption is the means of sharing the secret key between the two nodes that are involved. The whole cryptosystem would fail if the secret key is known by a third party, then it is no longer secret [9] [10] .

Figure 1. Data encryption.

Figure 2. Symmetric encryption.

3.1.2. Asymmetric Encryption

In this type of encryption, two types of keys are used instead of one shared key compared to symmetric encryption method. That is for example a data is encrypt using KEY1 only KEY2 can decrypt and vice versa. This is because those are the two keys that was created for the encryption and decryption purpose. The public and private key can also be used, the Public Key Cryptography (PKC), the first key is made know to the public (which is the key for encrypting the data) while the private key is only know to the destination user (the one used for decrypting the data). Figure 3, depicts the process of the asymmetric encryption between node A and node B.

In Asymmetric encryption as illustrated in Figure 3 with an assumption of data exchange between Node A and node B;

1) Node A and Node B agree on a cryptosystem.

2) Node B sends its public key to Node A.

3) Node A encrypts the message using the agreed public key (Cipher) and Node B’s public key.

4) Node B decrypts the coded message using its private key and the agreed cipher from 1.

Asymmetric encryption techniques are slower than symmetric encryption techniques; this is because they asymmetric encryption techniques need more computational processing power to carry out its process [10] [11] . To fix this a hybrid system is usually advised, using the asymmetric encryption method to share the keys while the symmetric method to transfer data between Node A and Node B.

table 2 shows the final comparison between Symmetric and Asymmetric key. This comparison covers different classifications.

4. Major Classification of Data Chiper

BLOCK CIPHER: The data encryption and decryption method used is in a block form, whereby the sender divide the plain text into blocks of plain text and it is inputted into the cipher system which in turn generated blocks of cipher text that would be send over the network to the desired destination. The block cipher have different types that are used such as: ECB (Electronic Codebook Mode), CBC (Chain Block Chain Mode), and the OFB (Output Feedback Mode) [11] .

ECB: This form or block cipher, where the data blocks are encrypted and generated directly to form its corresponding ciphered blocks as shown in Figure 4.

Figure 3. Asymmetric encryption.

Figure 4. Block chiper: ECB mode.

Table 2. Comparison of symmetric and asymmetric algorithm.

CBC: This makes use of the previous cipher block in the current cipher block, forming an encryption-chain process.

OFB: This works more like a stream cipher that uses plain text, where the encryption key that is used on current steps or process depends on the encryption key that has been used before [9] -[11] .

STREAM CIPHER: The stream cipher consists of two components: a key stream generator and a mixing function. The stream cipher processes a data bit by bit.

The stream cipher is in two forms:

Synchronous Stream: this form of stream cipher, the cipher key stream generator is dependent on the base key used for encryption, this is shown in Figure 5; how the synchronous stream works, where the sender uses only the shared base key to encrypt the stream that is going out, while the receiver uses the same shared key to decrypt the key. The downside to this method is that if the key is known by a third party, the whole system is compromised.

Self-Synchronizing Stream Cipher: In this method, the key that is been used at a point or instant depends on the states of the cipher text bits. This method is slower than the synchronous stream method, but it is more secured. Figure 6 shows its process of encrypting and decrypting of data.

The speed and simplicity of the stream cipher makes it more preferred compare to the block cipher, but the block cipher is more secured, so the block cipher is recommended [11] [12] .

Figure 5. Stream chiper: simple mode (synchronous system).

Figure 6. Stream chiper: self-synchronizing stream chipper.

5. Hash Algorithms

Hash algorithms function by converting data of random length into a smaller fixed length, this is commonly known as a message digest [12] -[14] . These types of algorithms are considered one-way functions. The generated output varies, making them very efficient when it comes to detecting alterations that might have been made to a message. Hash algorithms are often generated by the DES algorithm to encrypt online banking transactions and other communications where messages can't afford to be corrupted. In Figure 7, the public key is available although it can be distributed alongside the message, although the private key is secret and it is never included in the message. A digital signature it created and is verified by the asymmetric public/private key pair for authentication purposed. Then the sender signs the message content and adds his private key to the message and sends the message with the digital signature that was created earlier to the corresponding receiver or recipient. The digital signature is verified by the receiver with the sender’s public key.

6. Proactive Approach for Data Security

The fact that security threats and risks are apparent in information technology, some threats might be successful while other might not be. The main view of the proactive security is that it reduces the impact of successful attack on the system and prevents loss of data or information while the system is still operational and secure. Proactive security approach in an organization for example, allows the organization to manage their security infrastructure and the values those infrastructure delivers [12] -[14] .

In proactive security, 1) The redemption efficiency is identified proactively and also maximized, that is the weakness of the system is exploited so as to provide a good proactive security agent for future attacks. 2) proactive security access the real impact of a potential risk by tracing the paths of critical and non-critical information systems. 3) proactive security also assign security resources intelligently in order to fully focus on critical risks while the system is still operational, this helps to minimize or reduce interruptions of business time.

As discussed earlier in the proactive security approach, it anticipates threats behavior, prevent threats or attacks from occurring in the future. The proactive security system is a continuous learning system.

Figure 7. Hash algorithms.

From Figure 8, the proactive system is responsible for risk assessment definition of policies, implementation of proactive measures, updating infrastructure, and vigilant monitoring.

1) Risk Assessment: The proactive system assesses internal and external risk, so as to quickly create a preventive measure if it occurs. This uses a lot of resources because it creates a possible scenario before it happens and also creates a reactive solution to it.

2) Policies Definition: It defines security policies of the network due to its continuous learning capabilities.

3) Implementation of Protective measure: The proactive security system implements the following measure.

・ Access Control: This requires both the authorization and authentication process.

・ Scanning: It scans the traffic on the network for potential risk scenario and also the stored data traffic is scanned and protected. This is because access would be granted to data stored remotely over the network. The scanning protective measures utilizes recognizable patterns to identify virus threats and attacks on the network.

・ Cryptography: This enables the secure communication between nodes in the network, secure electronic commerce for online transaction, and securing data. With this the transaction between the organization and customers would be secured [14] -[16] .

・ Network Perimeter Defenses: this creates a security measure around the full network.

4) Updating Infrastructure: This include the update of various software such as: Application software, monitoring tolls, virus definition, attack signature, and access control lists (ACL) [16] -[20] .

5) Vigilant Monitoring: This monitors the system for threats and attack signature. The proactive system is responsible for monitoring the perimeter defense mechanisms, network patterns, anomalies, advisories and user activities.

7. Reactive Approach for Data Security

The reactive approach distinguishes itself from the proactive approach by being responsible for securing data after an attack or during an attack. The proactive method of security cannot necessarily be deployed without the reactive method that handles the risk afterwards. In reactive security some measures are put in place like; disaster recovery plan, switching to alternate systems in other locations, re-installation of OS and application if a system is critically compromised [21] [22] .

These set of reactive response towards an attack can also be implemented further in the proactive method [23] -[27] .

The reactive security measures are different from that of the proactive security measures; this is because the reactive measures are deployed after or during an attack. From Figure 9, the reactive security measures system is responsible for; security incident, post-mortem analysis, recovery measure, taking steps to prevent same attack from happening again [28] -[30] .

Figure 8. Proactive approach architecture.

Figure 9. Reactive approach measures.

1) Security Incident: The incident may be an attack or a compromise such as a virus infection, or a stolen password. In such cases a quick reactive measure is taken to disinfect the file or system if it’s a virus attack and restrict access or cut off users from accessing the corresponding files or system in the stolen password scenario.

The scope of the security incident may change to network, host or user.

・ Network: If the network is faced with threats or an attack, the reactive security system will implement the following; filtering out the source address from the router, enlisting aid of upstream provider in filtering traffic, disabling the LAN temporarily and also other external network connection.

・ Host: If the host is attacked the reactive measures may include: rebooting to clear memory, reformat the static storage areas, and reload the OS and other application.

・ User: In the case of the user, the reactive security system measures may include: changing users password(s), reprimand, loss of account(s).

Reacting to dynamic environment resulted to reactive architecture, where reactive systems obtain their intelligence from the interactions they have with their environment. In the reactive architecture, there’s a specific module that is responsible for starting up a direct reaction in response to a specific situation that occur in the environment [31] [32] . There is more than one module in the system, if one of the modules fails due to any reason, other modules continue their task. This causes the fault tolerance system of the reactive system to be robust [31] [32] . Variety of researches conducted different types of researches in the literature to secure Wireless networks however due to the nature and vulnerable infrastructure of wireless networks, different mechanisms forced reactive data security approaches to become more popular [31] [33] .

8. Conclusions

This paper has carefully highlighted reactive security system and how they work. The reactive security system does not observe attacks like the proactive; it looks for the best way to secure the system. The deployment of the reactive security system or measures in either during or after an attack, it depends on the state of the attack. In this paper, we saw that in the reactive architecture the system has more than one module in its corresponding system, if one module goes bad, others will continue to function. This is like an anomaly detection system that detects threats and attacks by continuous learning. The reactive system is good in solving threats or tries to recovery and restricts attacks coming from network, host, or user region in the system.

In data security, it is best to use more than one security measure. In this paper, the proactive security mechanisms is designed to observe ad anticipate threats and or attacks, while the reactive is for recovering data and the state of system under attack or after the attack. Much research has not been done in this area of data security. Our future work would be conducting a comparative and performance evaluation study on the reactive security system over the proactive security system.

Cite this paper

ArifSari,MehmetKaray, (2015) Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks. International Journal of Communications, Network and System Sciences,08,567-577. doi: 10.4236/ijcns.2015.813051

References

  1. 1. Barth, A., Rubinstein, B.I.P., Sundararajan, M., Mitchell, J.C., Song, D. and Bartlett, P.L. (2010) A Learning-Based Approach to Reactive Security. Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC’10), 192-206.
    http://dx.doi.org/10.1007/978-3-642-14577-3_16

  2. 2. Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30.
    http://dx.doi.org/10.5296/ijld.v2i2.1371

  3. 3. (2003) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley.

  4. 4. Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273.
    http://dx.doi.org/10.4236/ijcns.2015.87026

  5. 5. IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology—Telecommunications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements—Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, April 2004.

  6. 6. Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.

  7. 7. (2005) Bulletproof Wireless Security: Gsm, Umts, 802.11, and Ad Hoc Security (Communications Engineering). Newnes.

  8. 8. Lynn, M. and Baird, R. (2002) Advanced 802.11 Attack. Black Hat Briefings.

  9. 9. Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94.
    http://dx.doi.org/10.5121/ijasuc.2012.3306

  10. 10. Bonde, J. (2011) Wireless Security, University of Minnesota UMM CSci Senior Seminar Conference Morris, MN.

  11. 11. Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.

  12. 12. Hardjono, T. and Dodeti, L.R. (2005) Security in Wireless LANS and MANS. Artech House Publishers, London, 243-250.

  13. 13. Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372.
    http://dx.doi.org/10.4236/ijcns.2014.79038

  14. 14. Schneier, B. (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C. Second Edition, John Wiley and Sons, New York.

  15. 15. Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, Society for Science and Education, 2, 1-6.

  16. 16. Marshall, T. (2001) Antennas Enhance WLAN Security. Byte Articles.
    http://www.trevormarshall.com/byte_articles/byte1.htm

  17. 17. Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18.
    http://dx.doi.org/10.14738/tmlai.25.430

  18. 18. Josyula, D. (2006) Reactive Architectures. Dissertation, Department of Computer Science, University of Maryland.
    http://www.cs.umd.edu/~darsana/papers/dissertation/node151.html

  19. 19. Chiornita, A., Gheorghe, L. and Rosner, D. (2010) A Practical Analysis of EAP Authentication Methods. 9th Roedunet International Conference (RoEduNet), 31-35.

  20. 20. Hausken, K. (2006) Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability. Information Systems Frontiers, 8, 338-349.
    http://dx.doi.org/10.1007/s10796-006-9011-6

  21. 21. Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154.
    http://dx.doi.org/10.4236/jis.2015.62015

  22. 22. Gordon, L.A. and Loeb, M.P. (2002) The Economics of Information Security Investment. ACM Transactions on Information and System Security, 5, 438-457.
    http://dx.doi.org/10.1145/581271.581274

  23. 23. Sari, A. and Caglar, E. (2015) Performance Simulation of Gossip Relay Protocol in Multi-Hop Wireless Networks. Social and Applied Sciences Journal, 7, 145-148.

  24. 24. Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioural Sciences, 89, 585-592.
    http://dx.doi.org/10.1016/j.sbspro.2013.08.899

  25. 25. August, T. and Tunca, T.I. (2006) Network Software Security and User Incentives. Management Science, 52, 1703-1720.
    http://dx.doi.org/10.1287/mnsc.1060.0568

  26. 26. Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. In: Proceedings of the 6th International Conference on Security of Information and Networks (SIN’13), ACM Press, New York, 454-456.
    http://doi.acm.org/10.1145/2523514.2523586
    http://dx.doi.org/10.1145/2523514.2523586

  27. 27. Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. Proceedings of the Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337.
    http://dx.doi.org/10.1109/cicsyn.2013.79

  28. 28. Fultz, N. and Grossklags, J. (2009) Blue versus Red: Towards a Model of Distributed Security Attacks. Proceedings of the 13th International Conference on Financial Cryptography and Data Security, Accra Beach, 23-26 February 2009, 167-183.
    http://dx.doi.org/10.1007/978-3-642-03549-4_10

  29. 29. Sari, A. (2015) Security Issues in Mobile Wireless Ad Hoc Networks: A Comparative Survey of Methods and Techniques to Provide Security in Wireless Ad Hoc Networks. New Threats and Countermeasures in Digital Crime and Cyber Terrorism, IGI Global, Hershey, 66-94.
    http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005

  30. 30. Flegel, U. (2012) Reactive Security. Information Technology, 54, 51-52.

  31. 31. Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
    http://dx.doi.org/10.4236/ijcns.2015.83003

  32. 32. Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42.
    http://dx.doi.org/10.4236/ijcns.2015.83004

  33. 33. Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. Proceedings of the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.
    http://doi.acm.org/10.1109/TAEECE.2013.6557339