Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satria Mandala is active.

Publication


Featured researches published by Satria Mandala.


Journal of Network and Computer Applications | 2016

Towards next-generation routing protocols for pocket switched networks

Tekenate E. Amah; Maznah Kamat; Waldir Moreira; Kamalrulnizam Abu Bakar; Satria Mandala; Marcos Aurélio Batista

A pocket switched network (PSN) is dynamically formed by people who carry portable handheld devices. Interest in PSNs is driven by the increasing number of handheld devices, the several wireless interfaces they possess, as well as their ability to store, carry and forward data. The lack of fixed network topology distinguishes PSNs from traditional networks, and unlike other types of mobile networks, nodes in PSNs closely follow human movement patterns. As a result, PSNs are faced with new challenges especially in the aspect of routing. Although various routing protocols have been proposed, most of them focus on optimizing the performance of networking primitives for traditional networks such as unicast, broadcast and multicast. However, these primitives themselves appear to be insufficient due to new application opportunities presented by PSNs. This paper adopts a user scenario based approach to determine the current state of PSN routing protocols. Specifically, four modes of data transfer are established from six generalized PSN user scenarios. Due to the wide range of existing routing proposals, a new taxonomy is proposed to facilitate analysis of their compatibility with the established modes of data transfer. The analysis provides new insights into application based routing approaches for realizing next-generation PSN routing protocols. A detailed characterization of PSN user scenarios and respective data transfer modes.An exhaustive analysis of existing PSN routing solutions.A novel classification for PSN routing complementing gaps of existing taxonomies.A scenario-driven set of design guidelines for next-generation PSN routing solutions.An instructive list of future directions towards real-world PSN implementations.


international symposium on security in computing and communication | 2014

Quantifying the severity of blackhole attack in wireless mobile Adhoc networks

Satria Mandala; Kommineni Jenni; Asri Ngadi; Maznah Kamat; Yahaya Coulibaly

Blackhole attack is one of the severe attacks in MANET routing protocols. Generation of this attack is simple, which does not require specific tools or sophisticated attack techniques. However, this attack seriously corrupts the routing tables of nodes in the network. Even worse, the attack could increase the chances of losing confidential data and deny network services. Many researchers have proposed a variety of solutions to prevent this Conventional Blackhole Attack (CBA). Unfortunately, none of them has measured the severity of this attack. Filling gaps in measuring the severity of this attack, this research proposes a new security metrics, namely Corruption Routing Table (CRT), Compromising Relay Node (CRN) and Compromising Originator Node (CON). In addition, this research also introduces a new blackhole attack, namely Hybrid Black Hole Attack (HBHA) with two variants — Independent and Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In addition, Cooperative HBHA is the most efficient attack than Independent HBHA and CBA.


international conference on instrumentation communications information technology and biomedical engineering | 2013

A review of blackhole attack in mobile adhoc network

Satria Mandala; Abdul Hanan Abdullah; Abdul Samad Ismail; Habibollah Haron; Asri Ngadi; Yahaya Coulibaly

Mobile ad hoc network (MANET) is used in a wide range of application from civilian usage to military battlefield communications. Using multi-hop communication model, a source node can directly communicate with the destination node without infrastructure. Unfortunately, this feature causes the network vulnerable to various attacks. Security preventions implemented in the traditional wired network are unsuitable for MANET. This paper studies several types of attacks, and then discusses one of the most severe attack in the network, blackhole attack. Furthermore, recent efforts for preventing the blackhole attack are comprehensively discussed. Study of literature indicates that the prevention of the blackhole attack can be categorized into three groups, i.e., Protection based on Cryptography, Protocol Modification, and Intrusion Detection and Counter Measure.


2nd International Conference on Wireless and Mobile networks, WiMo 2010 | 2010

A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol

Satria Mandala; Md. Asri Ngadi; Abdul Hanan Abdullah; Abdul Samad Ismail

Wireless mobile Ad-Hoc networks (MANETs) are networks of mobile nodes with no fixed infrastructures. Their peer-to-peer communication architectures over shared wireless medium with no clear line of defense pose a number of challenges to security design. Some previous works have used a form of digital signature for protection. However, there are still limitations in the implementation. This paper proposes a variant of the Merkle Signature Scheme (MSS) to protect an Ad-Hoc On-demand Distance Vector (AODV) protocol, a common routing protocol for MANETs. The new protocol is named Extra Secure AODV or ESAODV in short. ESAODV provides hop-count protection, digital signature and protocol enforcement. Through these features several security benefits on the routing packets have been established, namely fast authentication, integrity, and non-repudiation. Several experiments have been conducted using different digital signatures of the MSS variant signatures. The result shows that ESAODV is effective for combating routing attacks, and works properly although the malicious are 20% of the nodes total number in MANETs. In terms of features, ESAODV are also far superior than secure AODV (SAODV) and Authenticated Routing for Ad hoc Networks (ARAN).


International Journal of Fuzzy Systems | 2017

BRAIN-F: Beacon Rate Adaption Based on Fuzzy Logic in Vehicular Ad Hoc Network

Seyed Ahmad Soleymani; Abdul Hanan Abdullah; Mohammad Hossein Anisi; Ayman Altameem; Wan Haslina Hasan; Shidrokh Goudarzi; Satria Mandala; Zaidi Razak; Noorzaily Mohamed Noor

Beacon rate adaption is a way to cope with congestion of the wireless link and it consequently decreases the beacon drop rate and the inaccuracy of information of each vehicle in the network. In a vehicular environment, the beacon rate adjustment is strongly dependent on the traffic condition. Due to this, we firstly propose a new model to detect traffic density based on the vehicle’s own status and the surrounding vehicle’s status. We also develop a model based on fuzzy logic namely the BRAIN-F, to adjust the frequency of beaconing. This model depends on three parameters including traffic density, vehicle status and location status. Channel congestion and information accuracy are considered the main criteria to evaluate the performance of BRAIN-F under both LOS and NLOS. Simulation results demonstrate that the BRAIN-F not only reduces the congestion of the wireless link but it also increases the information accuracy.


advances in computing and communications | 2014

Pre-processing image database for efficient Content Based Image Retrieval.

Kommineni Jenni; Satria Mandala

Content Based Image Retrieval (CBIR) has been a challenging area of research for more than a decade. In this area of research, selection of features to represent an image in the database is still an unresolved issue. Unfortunately, the existing solutions regarding the problem are only focusing on the relevance feedback techniques to improve the count of similar images related to a query from the raw image database. These approaches are inefficient and inaccurate to query the image. We propose a new efficient technique to solve these problems by exploiting a new strategy called preprocessing image database using k-means clustering and genetic algorithm. This technique utilizes several features of the image, such as color, edge density, boolean edge density and histogram information as the input of retrieval. Furthermore, several performance metrics, such as confusion matrix, precision graph and F-measures, have also been used in measuring the accuracy of the proposed technique. The experiment results show that the clustering purity in more than half of the clusters has been above 90 percent purity.


2015 IEEE International Broadband and Photonics Conference (IBP) | 2015

Secure burst control packet scheme for Optical Burst Switching networks

Yahaya Coulibaly; Athman Ahmed Ibrahim Al-Kilany; George N. Rouskas; Satria Mandala; Mohammad Abdur Razzaque

Optical networks are the most adequate platform for the transport of ever increasing bandwidth-hungry applications and services (BwGAS). Additionally, these networks cope with the continuous growth of the number of Internet users. Optical Burst Switching (OBS) paradigm is expected to be the backbone infrastructure of near-future all-optical Internet. In OBS, data and control packet known as burst header packet (BHP) are sent out of band (i.e., control packets and data bursts are carried by different channels) and it is sent ahead of the data burst to reserve necessary network resources for the corresponding burst. After the elapse of a predetermined time known as offset time, the data burst is sent with the hope that, the control packet was able to make necessary reservations. Sending the BHP ahead of the burst exposes the burst to different security challenges, particularly data burst redirection and denial of service attacks. If the BHP is compromised the corresponding burst will definitely be compromised. Less efforts have been dedicated to investigate control packet security issues in OBS. In this paper, we propose and evaluate a solution to address Data Burst Redirection (DBR) Attack in OBS networks. The solution is designed based on Rivest-Shamir-Adleman (RSA) public-key encryption algorithm. We evaluated the algorithm via computer simulation. Evaluation metrics are burst loss ratio and throughput. The obtained results demonstrate that, the proposed algorithm has succeeded in protecting the network against DBR attacks reducing the number of compromised BHP. In the future, the authors will work on denial of service issues considering reliability aspects.


ieee international conference on photonics | 2013

Study on the performance of slotted and non-slotted Optical Burst Switched networks

Yahaya Coulibaly; Satria Mandala; Abubakar Muhammad Umaru; Nuno M. Garcia

Current progress in optical communication is driven by the continuous growth of the number of Internet users and the explosion of bandwidth greedy applications. Three main optical switching paradigms are being investigated to cope with this evolution: Optical Circuit Switching (OCS), Optical Packet Switching (OPS) and Optical Burst Switching (OBS). Among these paradigms, OBS is seen as the most appropriate solution. However, OBS still suffers from high burst loss as a result of contention at the buffer-less core node. There exist two categories of OBS, slotted and non-slotted. In this paper, the performance of these two categories is evaluated. The evaluation is done through simulation and it consists of comparing Hierarchical Time Sliced OBS (HiTSOBS) a slotted OBS to the conventional non-slotted OBS. Simulation results show that, HiTSOBS architecture outperforms conventional OBS in terms of Burst Loss Ratio (BLR) and throughput. The high performance of HiTSOBS is attributed to the flexibility of its hierarchy and support of QoS.


International Journal of Advanced Computer Science and Applications | 2012

A Study On OFDM In Mobile Ad Hoc Network

Malik N. Ahmed; Abdul Hanan Abdullah; Satria Mandala

Orthogonal Frequency Division Multiplexing (OFDM) is the physical layer in emerging wireless local area networks that are also being targeted for ad hoc networking. OFDM can be also exploited in ad hoc networks to improve the energy performance of mobile devices. It is important in wireless networks because it can be used adaptively in a dynamically changing channel. This study gives a detailed view about OFDM and how it is useful to increase the bandwidth. This paper also gives an idea about how OFDM can be a promising technology for high capacity wireless communication.


International Journal of Embedded Systems | 2015

Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks

Satria Mandala; Asri Ngadi; Johan Mohamad Sharif; M. Soperi Mohd Zahid; Farhan Mohamed

Blackhole attack is a common attack in mobile ad hoc network (MANET). Generation of this attack is simple, which does not require special tools or sophisticated attack techniques. Various solutions to prevent this attack have been proposed. However, none of them has measured the severity of this attack. In fact, the assessment of severity is essential to develop effective and efficient prevention against the attack. The purpose of this study is to investigate the severity of blackhole attack. In this investigation, new security metrics, namely corruption routing table (CRT), compromising relay node (CRN) and compromising originator node (CON), have been proposed and used for the severity evaluation. In addition, a new blackhole attack, namely hybrid blackhole attack (HBHA) with two variants - independent and cooperative HBHAs are also introduced for the purpose of comparative study. Simulations using Java in time simulator/scalable wireless ad hoc network simulator (JiST/SWANS) show that the proposed metrics are effective in assessing the severity of the blackhole attacks. Among these three blackhole attacks, independent HBHA is the most severe attack. Meanwhile, the cooperative HBHA is the most efficient attack.

Collaboration


Dive into the Satria Mandala's collaboration.

Top Co-Authors

Avatar

Abdul Hanan Abdullah

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Md. Asri Ngadi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Yahaya Coulibaly

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Samad Ismail

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kommineni Jenni

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Seyed Ahmad Soleymani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shidrokh Goudarzi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Asri Ngadi

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Deni Yulianti

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Dewi Nasien

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge