Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs

Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs

Kaebeh Yaeghoobi S.B., M.K. Soni, S.S. Tyagi

Статья научная

Wireless Sensor Networks are emerging technologies that are diverse on energy consumption from different aspects. In the task mode, energy consumption of sensor nodes is categorized in, data packet transmitting, data processing and idle mode. Fundamentally, higher power is required and utilized at the time of data trans-receive as comparing to idle mode. However, power consumption of sensor in idle mode is necessarily important. To conserve energy, the network must provide quality of service sleep schedule, and use a mechanism to turn off the radio receiver periodically in coordinating method. Moreover, through dynamically round task management of sensors, significant energy saving can be achieved. Based on tasks and sleep schedules, nodes can form their clusters. It is necessary for real-time wireless applications to cogitate data transmit at the actual and response time based on the queries or tasks. This paper proposes Dynamic Immediate Data Report (DIDR) for real-time communication to schedule sleep mode of sensors in the network. Furthermore, to minimize the network energy consumption, Dynamic Schedule Data Report (DSDR) method is proposed. This method shows its efficiency by reducing the active time of nodes in the network. The performance analysis of the proposed works, illustrate effectively more energy efficiency as compared to existing methods.

Бесплатно

ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use

ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use

Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi

Статья научная

Not very long ago, organizations used to identify their customers by means of one-factor authentication mechanisms. In today's world, however, these mechanisms cannot overcome the new security threats at least when it comes to high risk situations. Hence, identity providers have introduced varieties of two-factor authentication mechanisms. It may be argued that users may experience difficulties at time of authentication in systems that use two-factor authentication mechanisms for example because they may be forced to carry extra devices to be authenticated more accurately. This is however the tradeoff between ease-of-use and having a secure system that may be decided by the users and not the security providers. In this paper we present a new two-factor authentication mechanism that secures systems and at the same time is easier to use. We have used mnemonic features and the cache concept to achieve ease-of-use and security, respectively. Also, we have tested our method with almost 6500 users in real world using The Mechanical Turk Developer Sandbox.

Бесплатно

Effect of Black Hole Attack on MANET Routing Protocols

Effect of Black Hole Attack on MANET Routing Protocols

Jaspal Kumar, M. Kulkarni, Daya Gupta

Статья научная

Due to the massive existing vulnerabilities in mobile ad-hoc networks, they may be insecure against attacks by the malicious nodes. In this paper we have analyzed the effects of Black hole attack on mobile ad hoc routing protocols. Mainly two protocols AODV and Improved AODV have been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed after adding Black-hole nodes in the network. Finally the results have been computed and compared to stumble on which protocol is least affected by these attacks.

Бесплатно

Effect of Line-of-sight Channels on DC-biased Optical Filter Bank Multicarrier Visible Light Communication with Multiple LED Arrays

Effect of Line-of-sight Channels on DC-biased Optical Filter Bank Multicarrier Visible Light Communication with Multiple LED Arrays

Mohammed Ali Asban, Rahmat Talib, Mohammad Faiz Abdullah, Mohammed S.M. Gismalla

Статья научная

This paper investigates the impact of propagation delay and channel loss due to the use of multiple LED arrays in visible light communication (VLC) systems based on filter bank multicarrier (FBMC) modulation. FBMC offers greater spectral efficiency, and asynchronous transmission and is a promising alternative scheme to orthogonal frequency division modulation (OFDM). The proposed FBMC model is based on 4-quadrature amplitude modulation (QAM) and 16-QAM formats and uses 100 symbols and 600 input bits per symbol. In this paper, the VLC-FBMC system is designed based on the line-of-sight (LOS) model under the additive white Gaussian noise (AWGN) channel. Comparison analyses between different bit rates in terms of bit error rate (BER), best sampling point, and signal-to-noise ratio (SNR) requirement have been carried out to show the delay and loss effect on communication quality and system performance. The results demonstrate that the proposed FBMC model achieves a bit rate of up to 29.296 Mbit/s with a low BER of 10-3 and less SNR penalty in high QAM formats, demonstrating its potential as a viable alternative to OFDM for future VLC systems.

Бесплатно

Effect of Maintenance on Computer Network Reliability

Effect of Maintenance on Computer Network Reliability

Rima Oudjedi Damerdji, Myriam Noureddine

Статья научная

At the time of the new information technologies, computer networks are inescapable in any large organization, where they are organized so as to form powerful internal means of communication. In a context of dependability, the reliability parameter proves to be fundamental to evaluate the performances of such systems. In this paper, we study the reliability evaluation of a real computer network, through three reliability models. The computer network considered (set of PCs and server interconnected) is localized in a company established in the west of Algeria and dedicated to the production of ammonia and fertilizers. The result permits to compare between the three models to determine the most appropriate reliability model to the studied network, and thus, contribute to improving the quality of the network. In order to anticipate system failures as well as improve the reliability and availability of the latter, we must put in place a policy of adequate and effective maintenance based on a new model of the most common competing risks in maintenance, Alert-Delay model. At the end, dependability measures such as MTBF and reliability are calculated to assess the effectiveness of maintenance strategies and thus, validate the alert delay model.

Бесплатно

Effect of Short-Term Synaptic Plasticity on Correlated firing in Feedback Networks

Effect of Short-Term Synaptic Plasticity on Correlated firing in Feedback Networks

Jinli Xie, Zhijie Wang, Haibo Shi

Статья научная

The firing activity of a neuronal population is correlated, which has been linked to information coding and exchanging. Short-term synaptic plasticity allows synapses to increase (facilitate) or decrease (depress) over a wide range of time scales. It is critical to understand the characteristics and mechanisms of the correlated firing and the role of short-term synaptic plasticity in regulating firing activity. The short-term synaptic depression and facilitation are examined at the synapses in the inhibitory feedback loop of feedback neural networks. Numerical simulations reveal that the modulation of the correlated firing by dynamics of depression and facilitation is due to their effects on the synaptic strength. By varying synaptic time constants, the enhancement in either firing rate or intensity of oscillations can improve the correlated firing. Our study thus provides a general computational analysis of the sequential interaction of short-term plasticity with neuronal firing.

Бесплатно

Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks

S.Sheeja, Ramachandra.V.Pujeri

Статья научная

Mobile nodes are organized randomly without any access point in Mobile Ad hoc Networks (MANETs). Due to the mobility of nodes, the network congestion occurs. So many congestion control mechanisms were proposed to avoid the congestion avoidance or reducing the congestion status. In this research work, we proposed to develop the Effective Congestion Avoidance Scheme (ECAS), which consists of congestion monitoring, effective routing establishment and congestionless based routing. The overall congestion status is measured in congestion monitoring. In routing establishment, we propose the contention metric in the particular channel in terms of, queue length of packet, overall congestion standard, packet loss rate and packet dropping ratio to monitor the congestion status. Based on the congestion standard, the congestionless based routing is established to reduce the packet loss, high overhead, long delay in the network. By extensive simulation, the proposed scheme achieves better throughput, packet delivery ratio, low end-to-end delay and overhead than the existing schemes.

Бесплатно

Effective Hybrid Intrusion Detection System: A Layered Approach

Effective Hybrid Intrusion Detection System: A Layered Approach

Abebe Tesfahun, D. Lalitha Bhaskari

Статья научная

Although there are different techniques proposed for intrusion detection in the literature, most of them consider standalone misuse or anomaly intrusion detection systems. However, by taking the advantages of both systems a better hybrid intrusion detection system can be developed. In this paper, we present an effective hybrid layered intrusion detection system for detecting both previously known and zero-day attacks. In particular, a two layer system that combines misuse and anomaly intrusion detection systems is proposed. The first layer consists of misuse detector which can detect and block known attacks and the second layer comprises of anomaly detector which can efficiently detect and block previously unknown attacks. The misuse detector is modeled based on random forests classifier and the anomaly detector is built using bagging technique with ensemble of one-class support vector machine classifiers. Data pre-processing is done using automatic feature selection and data normalization. Experimental results show that the proposed intrusion detection system outperforms other well-known intrusion detection systems in detecting both previously known and zero-day attacks.

Бесплатно

Effective use method of cloudlet resources by mobile users

Effective use method of cloudlet resources by mobile users

Rashid G. Alakbarov, Oqtay R. Alakbarov

Статья научная

The paper explores the architecture of mobile cloud technologies. The advantages and the problems emerging during the use of this technology are analyzed. The study analyzes the establishment of network infrastructure based on cloudlets at the second level of mobile computation clouds with hierarchic structure. At the same time, the issues of computation and meeting the demand for memory resources of mobile devices are investigated by employing this technology. The paper presents the solution of the linking problem of cloudlets located in the proximity of base stations of wireless metropolitan area networks (WMAN). The study also determines the number of communication channels among cloudlets for the purpose of effective utilization of cloudlet resources. The issue of uploading necessary program extensions to a corresponding cloudlet by using the possible number specifying the importance of cloudlets was investigated and a method was proposed.

Бесплатно

Efficient Clustering Technique for Cooperative Wireless Sensor Network

Efficient Clustering Technique for Cooperative Wireless Sensor Network

Kaushlendra Kumar Pandey, Neetesh Purohit, Ajay Agarwal

Статья научная

The nodes of a wireless sensor network (WSN) collect the data of interest from the deployment area and cooperatively send it to sink in multiple hops. Recently, virtual multiple input multiple output (V-MIMO) technique has been introduced in which the node cooperation is extended to form a virtual antenna array and communication is accomplished using space time block coding. The present work extends the scope of V-MIMO by proposing a new clustering technique. It creates the temporary cluster heads and their respective cooperative nodes, collects information from them and then the final clustering is accordingly done. The simulation result shows significant improvement in the energy efficiency of the WSN.

Бесплатно

Efficient Dynamic Resource Allocation in OFDMA Systems by Firefly Pack Algorithm

Efficient Dynamic Resource Allocation in OFDMA Systems by Firefly Pack Algorithm

Haider M. AlSabbagh, Mohammed Khalid Ibrahim

Статья научная

The resource allocation of Orthogonal Frequency Division Multiple Access (OFDMA) is one of the core issues in the next generation mobile systems. The improvement in the performance and quality of service (QoS) of communication systems is relying upon the efficient utilization of the available communication resources. The resource allocation of the OFDMA systems is mainly depends on both power and subcarrier allocations of each user for different operation scenarios and channel conditions. This paper proposes and applies Firefly Pack Algorithm (FPA) to find the optimal or near optimal power and subcarrier allocations for OFDMA systems. It takes into consideration the power and subcarrier allocations constrains, channel and noise distributions, distance between users equipments and base station, user priority weight to approximate the most of the variables, constrains, and parameters that encounter in the OFDMA systems. Four important cases for the number of subcarriers and users are addressed, simulated, and analyzed with employing the FPA algorithm under specific operation scenarios to meet the standard specifications. The results demonstrate that FPA is an effective algorithm in finding the optimal or near optimal for both subcarrier and power allocation.

Бесплатно

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

Hassen Mestiri, Fatma Kahri, Belgacem Bouallegue, Mohsen Machhout

Статья научная

The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, we proposed a new design for the SHA-256 and SHA-512 functions. Moreover, the proposed design has been implemented on Xilinx Virtex-5 FPGA. Its area, frequency and throughput have been compared and it is shown that the proposed design achieves good performance in term of area, frequency and throughput.

Бесплатно

Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks

Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks

Abdoulaye Diop, Yue Qi, Qin Wang

Статья научная

Research in Wireless Sensor Networks (WSNs) has made a significant progress recently, especially the area of key management, which plays a central role for protecting group communication in sensor networks. In sensor networks, the data are crucial and have to keep secrecy in data communication. To achieve data confidentiality, adversary should not have access to the group communication. Therefore due to the limited memory resources and energy constraints of sensor nodes, reducing the communication and storage overhead, and improving the resilience against the node capture attack become a must. In this paper we propose An Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks (EGKMST). The proposed scheme considers a hierarchical cluster structure of sensor network and adopts the pair-wise key management and group key management based on threshold key cryptography to generate and to distribute the keys efficiently within a cluster and updates periodically keys. By this way EGKMST provides continuous transmission security and avoids dangerous attacks from malicious nodes and mitigate the node compromise attack in WSNs communication. The security and performance analysis illustrate that EGKMST scheme achieves the requirement of group communication and provides efficient security with low communication cost, low memory overhead and energy saving compared with some existing key management schemes.

Бесплатно

Efficient Hand off using Fuzzy and Simulated Annealing

Efficient Hand off using Fuzzy and Simulated Annealing

Vikas.M.N, Keshava.K.N, Prabhas.R.K, Hameem Shanavas.I

Статья научная

This paper presents an efficient method for the hand off mechanism in cellular networks using optimization algorithms. The proposed approach integrates a fuzzy logic approach with simulated annealing algorithm to automate the tuning process. The fuzzy controller carries out inference operation at high-speed, whereas the tuning procedure works at a much lower rate. For the implementation described in this paper, a two-input-one-output fuzzy controller is considered. Both the inputs and the output have 8- bit resolution, and up to seven membership functions for each input or output can be defined over the universe of discourse. The fuzzy controller has two levels of pipeline which allows overlapping of the arithmetic as well as inference operations. The SA tuning mechanism adjusts the triangular or singleton membership functions to minimize a cost function. The complete self-tuned fuzzy inference engine is implemented in a Xilinx SPARTAN3 XC3S200 series FPGA device. This paper describes various aspects of the implementation of the self-tuned hand off system.

Бесплатно

Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption

Efficient Image Steganogrphic Algorithms Utilizing Transforms: Wavelet and Contourlet with Blowfish Encryption

Saddaf Rubab, Younus Javed

Статья научная

Steganography is a means to hide the existence of information exchange. Using this technique the sender embeds the secret information in some other media. This is done by replacing useless data in ordinary computer files with some other secret information. The secret information could be simple text, encoded text or images. The media used as the embedding plane could be an image, audio, video or text files. Using steganography ensures that no one apart from the sender and the receiver knows about the existence of the message. In this paper, a steganography method based on transforms used i.e. Wavelet and Contourlet. Devised algorithm was used against each transform. Blowfish Encryption method is also embedded to double the security impact. The major advantage of applying transforms is that the image quality is not degraded even if the number of embedded characters is increased. The proposed system operates well in most of the test cases. The average payload capacity is also considerably high.

Бесплатно

Efficient Load Balancing in WSN Using Quasi –oppositional Based Jaya Optimization with Cluster Head Selection

Efficient Load Balancing in WSN Using Quasi –oppositional Based Jaya Optimization with Cluster Head Selection

M.S. Muthukkumar, S. Diwakaran

Статья научная

Researchers have been paying close attention to the wireless sensor (WSN) networks area because of its variety of applications, including industrial management, human detection, and health care management. In Wireless Sensor (WSN) Network, consumption of efficient energy is a challenging problem. Many clustering techniques were used for balancing the load of WSN network. In clustering, the cluster head (CH) is selected as a relay node with greater power which is compared with the nodes of non-CH. In the existing system, it uses LBC-COFL algorithm to reduce the energy consumption problem. To overcome this problem, the proposed system uses Quasi oppositional based Jaya load balancing strategy with cluster head (QOJ-LCH) selection protocol to boost the lifespan of network and energy consumption. The QOJ-LCH method improves the relay nodes life and shares the load on relay nodes equitably across the network to enhance the lifespan. It also reduces the load-balancing problems in Wireless Sensor networks. It uses two routing methods single-hop and multiple-hop. The proposed QOJ-LCH with cluster head selection method enhances the network’s lifespan, total amount of power utilization and the active sensor devices present in the Single-hop routing ,it worked with 1600 rounds in network and 300 sensor nodes, for Multiple-hop routing, it worked with 1800 rounds in network and 350 sensor nodes. It achieves better performance, scalability and reliability.

Бесплатно

Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage

Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage

Xi Chen, Yong Li

Статья научная

Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated by the challenging problem “Private Searching over Encrypted Data”, we propose a new cryptographic primitive, Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files stored in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. Extensive analysis shows that our scheme is efficient and semantically secure under the BDH assumption.

Бесплатно

Efficient Resource Management for Multicast Ad Hoc Networks: Survey

Efficient Resource Management for Multicast Ad Hoc Networks: Survey

Amit Chopra, Rajneesh Kumar

Статья научная

Group communication over multicast ad hoc network suffers from insufficient utilization of limited resources, i.e. shared channel, battery, data processing capabilities and storage space etc. Multicast routing protocol should be able to manage all these resources because their consumption depends upon different factors, i.e. Unicast/Multicast network operations, dynamic topology due to mobility, control overhead due to scalability, packet loss and retransmission due to collision and congestion etc. All these factors may cause unnecessary network load, delay and unfair resource utilization. However, multicast ad hoc routing protocols are more efficient than Unicast routing protocols, but they also suffer from performance degradation factors discussed above. Researchers have developed various layer wise solutions for resource optimization. In this paper, we will explore the different schemes for fair utilization of network resources.

Бесплатно

Efficient Scalar Multiplication over Elliptic Curve

Efficient Scalar Multiplication over Elliptic Curve

Deepika Kamboj, D.K.Gupta, Amit Kumar

Статья научная

Elliptic Curve Scalar multiplication is the method of adding a point on the curve to itself every time[1]. In recent years, research in Scalar Multiplication over Elliptic curves (EC) over a finite fields attracted many researchers, working in field of cryptography, to find out how elliptic curves cryptography (ECC) can be implemented and how to reduce its complexity [4]. The efficient techniques used in Elliptic curve cryptography are Elliptic curve scalar multiplication using point-halving algorithm [2], then double-base (DB) chain algorithm, and after that step multi-base representation (SMBR), but these techniques have their drawbacks. So, it become imperative to find out a new approach which can be efficiently used for implementation of ECC and further reducing its complexity. The paper proposes a new algorithm Treble algorithm for affine coordinates. We continued doing work using the binary concept or double and add operation with the help of treble approach to make it more efficient which relates to the use of all input values in producing any type of output, including how much time and energy are required The results show that our contribution can significantly enhance EC scalar multiplication.

Бесплатно

Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks

Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks

Mohamed Koubàa, Naama Amdouni, Taoufik Aguili

Статья научная

In this paper we investigate traffic-engineering issues in Wavelength Division Multiplexing (WDM) all-optical networks. In such networks, the wavelength continuity constraint along with the wavelength clash constraint, lead to poor network performances when dealing with the lightpath provisioning problem. The impact of these constraints is especially severe when traffic demands are unpredictable and characterized by random arrivals and departures. In order to alleviate the impact of these constraints, we propose to employ intentional/active rerouting. Active lightpath rerouting is to intentionally reroute already established lightpaths, during their life period, so as to achieve a better blocking performance. We here assume that due to the large geographic area an optical WDM network can cover, upgrading such a network to support the huge demand for network bandwidth can be costly. Thereby, it is extremely important for network operators to apply traffic-engineering strategies to cost-effectively optimize network throughput. Two new routing and wavelength assignment (RWA) algorithms applying intentional rerouting are proposed. Both algorithms dynamically reroute some already established lightpaths from longer paths to vacant shorter ones so as to reduce the network resources consumption and hence improve the network throughput. The first algorithm, namely, Timer-Based Active Lightpath Rerouting (TB-ALR) initiates the rerouting procedure every time a timer expires. The second algorithm, namely, Sequential Routing with Active Lightpath Rerouting (SeqRwALR) initiates the rerouting procedure when a connection leaves and its lightpaths are released. To the best of our knowledge, our global approach has not already been investigated in the literature. Simulation results show that the proposed active rerouting algorithms yield much lower connection rejection ratios than rerouting algorithms previously presented in the literature while rerouting a small number of already established lightpaths. By rerouting a small number of existing lightpaths, we hope that the disruption period incurred due to rerouting is minimized.

Бесплатно

Журнал