Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1130

Energy Efficient Resource Allocation in 5G RAN Slicing with Grey Wolf Optimization

Energy Efficient Resource Allocation in 5G RAN Slicing with Grey Wolf Optimization

Dhanashree Kulkarni, Mithra Venkatesan, Anju V. Kulkarni

Статья научная

The massive connections and the real time control applications have different requirement on delay, energy, rate and reliability of the system. In order to meet the diversified 5G requirements, network slicing technique guarantees on the wide scale applications. In this paper, we have proposed a dynamic resource allocation system with two time scale. The one time scale is used for the resource allocation in the system and the other is used for optimized use of latency and power. Lyapunov drift function is used for the balance between the power consumption and the user satisfaction. Further, Grey Wolf Optimization (GWO) is used for the resource allocation strategy so as to gain the reliability of the system with heterogeneous requirements. The proposed methodology shows the improvement of 27% in user satisfaction and 17.5% in power consumption. The proposed framework can be utilized for the rate as well as latency sensitive applications in 5G.

Бесплатно

Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network

Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network

Ramesh Vatambeti, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, K. Venkateswara Rao

Статья научная

Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion using Spider Monkey (SM) Optimization. The E- AODM protocol assesses the energy management solution based on parameters such as delay, energy consumption, routing overhead, and node energy. By choosing the best path through the network, the proposed protocol's effectiveness is increased. The proposed protocol reduces routing overload, delay, and congestion. The simulated results show that increasing the number of packets transmitted in the network using the proposed GAODM and E-AODM routing protocols over the existing protocols on NS 2 reduces node energy and, as a result, overload and delay.

Бесплатно

Energy Scavenging Technology and Components in WSN

Energy Scavenging Technology and Components in WSN

Sutapa Sarkar, Hameem Shanavas .I, Bhavani V

Статья научная

With the evolution of modern technology wireless sensor nodes are finding a lot of applications in day to day life starting from smart home system to military surveillance. The primary building block of a wireless sensor network is a spatially distributed set of autonomous sensor nodes or motes. In order to design a wireless sensor network it is necessary to understand the structure and working of a sensor node. The sensor nodes can be considered as tiny battery powered computers that consists of a computing subsystem, communication subsystem, sensor subsystem, power subsystem. In this paper we review the features of these subsystems so that it is easy for the application developer to quickly understand and select the type of component for building customized sensor node platform. In this paper we have studied the features of different microprocessors and transceivers properties used in sensor nodes. We also study the classifications of sensors based on applications, the relevant sensor parameters, and different storage devices with their properties. This paper can be a ready reference to beginners interested in this field. One more major problem of wireless sensor network application that should be addressed is the limited lifetime of sensor nodes due to energy constraints. We also review how energy harvesting can increase the lifetime of a wireless sensor network and the possible methods that can be implemented for energy harvesting.

Бесплатно

Energy consumption in mobile phones

Energy consumption in mobile phones

Ambrin Javed, Muhammad Alyas Shahid, Muhammad Sharif, Mussarat Yasmin

Статья научная

As the mobile devices are widely used in this world. With the increasing number of users, the numbers of customized applications are also introduced for these users according to their own requirements but on the other hand, there is a dire need of a system which must be energy conserved, estimated and maintained. A survey of energy consumption in mobile phones is presented in this paper with the factors at which the consumption of the energy depends on i.e. Energy consumed by OS, by hardware, by applications, by the user to interact with the applications, by wireless, by the sensor network. The energy management models and frameworks are also discussed in this paper.

Бесплатно

Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles

Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles

Needhi Lathar, Shashi Bhushan, Manish Mahajan

Статья научная

Vehicular Ad hoc Network involves the movement of vehicles and the communication between them for their security. VANETs have many application areas. One of main applications of VANETs is to improve the driving safety. In various safety related applications, vehicular nodes constantly communicate with roadside equipments. Road Side Units (RSUs) can sense the real time information about road conditions, animals straying and road blocks and passes all this hazardous related information to the vehicles approaching in its range. These alert messages enable the driver to take timely decisions in preventing from accidents or delays in information delivery. In this paper, Enhanced Direction based Hazard Routing Protocol and Ad Hoc On-demand Distance Vector protocols are used to avoid prevent vehicles from collision and to increase the coverage range of VANETs. These issues are resolved by bypass routing and a synchronized clock maintained with the RSUs respectively. To solve the issues and make the system more reliable we propose the roadside wireless sensor nodes along with vehicular nodes in the network. The RSUs are fixed at some distances and communicate with wireless sensors attached at vehicular nodes.

Бесплатно

Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes

Enhanced Intrusion Detection System for Malicious Node Detection in Mobile Ad hoc Networks using Data Transmission Quality of Nodes

S. Mamatha, A. Damodaram

Статья научная

Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to their open nature and lack of infrastructure, security for MANETS has become an intricate problem than the security in other networks. The conventional security mechanisms of protecting a wired network are not sufficient for these networks. Hence a second level of defense to detect and respond to the security problem called an Intrusion detection system is required. Generally the malicious nodes demonstrate a different behavioral pattern of all the other normal nodes. So an Intrusion Detection System based on anomaly based intrusion detection that works by checking the behavior of the nodes was proposed. Here, in this paper to determine the behavior of the nodes as malicious or legitimate a Data Transmission Quality (DTQ) function is used. The DTQ function is defined in such a way that it will be close to a constant or keep changing smoothly for genuine nodes and will keep on diminishing for malicious nodes.. The final decision of confirming nodes as malicious is determined by a group consensus method. The evaluation results show that the proposed method increases the detection rate as well as decreases the false positive rate.

Бесплатно

Enhanced Role Based Access Control Mechanism for Electronic Examination System

Enhanced Role Based Access Control Mechanism for Electronic Examination System

Adebukola Onashoga, Adebayo Abayomi-Alli, Timileyin Ogunseye

Статья научная

Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES) was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons) which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal) and user management (user creation, user update and user removal). The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.

Бесплатно

Enhanced Voting based Secure Localization for Wireless Sensor Networks

Enhanced Voting based Secure Localization for Wireless Sensor Networks

M. B. Nirmala, A. S. Manjunatha

Статья научная

Development of location estimation algorithms with improvement in location precision with lower cost, less energy consumption and less hardware support has become more important for many applications in Wireless Sensor Networks (WSNs). This paper addresses the problem of secure location determination, known as secure localization in WSNs using voting based technique which gives a search region in presence of anchor nodes. From the obtained search region trilateration is applied to know the position of sensor nodes. To avoid the involvement of sensor nodes in further location estimation process, bilateration is applied. Experimental analysis shows that the maximum number of nodes can be localized and accurate location of a node can be determined efficiently with low estimation error. To avoid the attacks and involvement of malicious nodes in the localization process, we implement an improved authentication and security algorithm. Using few location reference points in the localization process reduces the communication cost. The proposed scheme also provides very good localization accuracy.

Бесплатно

Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography

Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography

Istteffanny I. Araujo, Hassan Kazemian

Статья научная

The advance of Big Data and Internet growth has driven the need for more abundant storage to hold and share data. People are sending more messages to one another and paying attention to the aspects of privacy and security as opposed to previous decades. One of the types of files that are widely shared and instantaneous available over the web are images. They can become available as soon as a shot is taken and keep this closely related to the owner; it is not easy. It has been proposed here to use Steganography to embed information of the author, image description, license of usage and any other secrete information related to it. Thinking of this, an analysis of the best file types, considering capacity, detectability, and distortion was necessary to determine the best solution to tackle current algorithm weaknesses. The performance of BMP, GIF, and JPEG initialises the process of addressing current weaknesses of Steganographic algorithms. The main weaknesses are capacity, detectability and distortion to secure copyright images. Distributed Steganography technique also plays a crucial part in this experiment. It enhances all the file formats analysed. It provided better capacity and less detectability and distortion, especially with BMP. BMP has found to be the better image file format. The unique combination of Distributed Steganography and the use of the best file format approach to address the weaknesses of previous algorithms, especially increasing the capacity. It will undoubtedly be beneficial for the day to day user of social media image creators and artists looking to protect their work with copyright.

Бесплатно

Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition

V.K. NARENDIRA KUMAR, B. SRINIVASAN

Статья научная

The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The deployment of biometric technologies, countries need to test and evaluate its systems since the International Civil Aviation Organization (ICAO) provides the guidelines, but the implementation is up to each issuing country. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

Бесплатно

Enhancing Adversarial Examples for Evading Malware Detection Systems: A Memetic Algorithm Approach

Enhancing Adversarial Examples for Evading Malware Detection Systems: A Memetic Algorithm Approach

Khadoudja Ghanem, Ziad Kherbache, Omar Ourdighi

Статья научная

Malware detection using Machine Learning techniques has gained popularity due to their high accuracy. However, ML models are susceptible to Adversarial Examples, specifically crafted samples intended to deceive the detectors. This paper presents a novel method for generating evasive AEs by augmenting existing malware with a new section at the end of the PE file, populated with binary data using memetic algorithms. Our method hybridizes global search and local search techniques to achieve optimized results. The Malconv Model, a well-known state-of-the-art deep learning model designed explicitly for detecting malicious PE files, was used to assess the evasion rates. Out of 100 tested samples, 98 successfully evaded the MalConv model. Additionally, we investigated the simultaneous evasion of multiple detectors, observing evasion rates of 35% and 44% against KNN and Decision Tree machine learning detectors, respectively. Furthermore, evasion rates of 26% and 10% were achieved against Kaspersky and ESET commercial detectors. In order to prove the efficiency of our memetic algorithm in generating evasive adversarial examples, we compared it to the most used evolutionary-based attack: the genetic algorithm. Our method demonstrated significantly superior performance while utilizing fewer generations and a smaller population size.

Бесплатно

Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

Apurva R. Naik, Lalit B. Damahe

Статья научная

Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.

Бесплатно

Enhancing Hash Function Selection Techniques Based on Message Contents

Enhancing Hash Function Selection Techniques Based on Message Contents

Ali Saeed, Muhammad Khalil Shahid

Статья научная

In Hash based Security systems two major factors that are mostly relied upon are Strong Hash function and the selection procedure of the hash function from a given pool. This paper aims at exploiting maximum available resources a message possesses, intrinsically, that can accommodate greater number of hash functions references. It provides a simple, low cost- easy to implement technique that will be able to make systems available with random hash functions’ selection ability. With the given technique the security level will be enhanced along with greater availability of hash functions. The truly variable nature of contents of messages can be exploited in order to secure messages beyond measure. In case of a single communication stint, if one hash function is compromised the next hash function for next block will be selected truly randomly and cannot be predicted. A summary of already in use techniques is also discussed in order to prove the proposition distinct and practicable. In proposed technique it is proven that it has ability to accommodate greater number of hash functions. Further, the hash function selection methodology has been provisioned with a technique to be message-dependent; the security cannot be compromised owing to truly randomness of the selection procedure.

Бесплатно

Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN

Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN

Fakhar Uddin Ahmed, Shikhar Kumar Sarma

Статья научная

The IEEE 802.11 WLAN is primarily used for web browsing which belongs to the category of non-real time application. But the demand of real time applications like VOIP and video conferencing has become very much common to such WLAN. With IEEE 802.11e Mac protocol it is possible to improve the QoS for both real and non-real time traffic by service differentiation. To ensure efficient utilization of the radio resources and enhanced QoS the load imbalance should be resolved among APs from different BSSs. In large scale WLAN inter AP communication mechanism can be employed along side the current admission controller under EDCA. Beside service differentiation inter AP differentiation based QoS management can lead to efficient utilization of radio resources by moving STAs from heavily laded to a less loaded AP and ensure better QoS for all types of traffics. In this paper we propose a dynamic and fair AP selection mechanism to improve the QoS in a WLAN. The simulations have been carried out with NSv2.34.

Бесплатно

Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS

Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS

Divya, Suman

Статья научная

The transmission through different interfaces of the different wireless network is a challenging issue. This paper presents an enhanced dynamic link aggregation scheme (EDLAS), an enhanced technique for the transmission of data through different interfaces present in different wireless networks. The proposed technique uses the existing sequential and parallel DLAS technique by using the fuzzy. The fuzzy system decides whether to transfer data by using sequential or the parallel DLAS depending upon the number of the chunks, user mobility, the number of users, chunk size. The work is implemented using the MATLAB. The simulation results generated using the MATLAB shows the effectiveness of the technique with increased throughput with same residual battery power.

Бесплатно

Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data

Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data

Saeid A. Keshtgar, Bahman B. Arasteh

Статья научная

Nowadays, software systems play remarkable roles in human life and software has become an indispensable aspect of modern society. Hence, regarding the high significance of software, establishing and maintaining software reliability is considered to be an essential issue so that error occurrence, failure and disaster can be prevented. Thus, the magnitude of errors in a program should be detected and identified and software reliability should be measured and investigated so as to prevent the spread of error. In line with this purpose, different methods have been proposed in the literature on software reliability; however, the majority of the proposed methods are inefficient and undesirable due to their high overhead, vulnerability, excessive redundancy and high data replication. The method introduced in this paper identifies vulnerable data of the program and uses class diagram and the proposed formula. Also, by applying minimum redundancy and duplication on 70% of the critical data of the program, the proposed method protects the program data. The evaluation of the operation of the propose method on program indicated that it can improve reliability, reduce efficiency overhead, redundancy and complexity.

Бесплатно

Enhancing Web Security through Machine Learning-based Detection of Phishing Websites

Enhancing Web Security through Machine Learning-based Detection of Phishing Websites

Najla Odeh, Derar Eleyan, Amna Eleyan

Статья научная

The rise of cyberattacks has led to an increase in the creation of fake websites by attackers, who use these sites for advertising products, transmit malware, or steal valuable login credentials. Phishing, the act of soliciting sensitive information from users by masquerading as a trustworthy entity, is a common technique used by attackers to achieve their goals. Spoofed websites and email spoofing are often used in phishing attacks, with spoofed emails redirecting users to phishing websites in order to trick them into revealing their personal information. Traditional solutions for detecting phishing websites rely on signature-based approaches that are not effective in detecting newly created spoofed websites. To address this challenge, researchers have been exploring machine-learning methods for detecting phishing websites. In this paper, we suggest a new approach that combines the use of blacklists and machine learning techniques such that a variety of powerful features, including domain-based features, abnormal features, and abnormal features based on URLs, HTML, and JavaScript, to rank web pages and improve classification accuracy. Our experimental results show that using the proposed approach, the random forest classifier offers the best accuracy of 93%, with FPR and FNR as 0.12 and 0.02, with a Precision of 90%, Recall of 97% an F1 Score of 93%, and MCC of 0.85.

Бесплатно

Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

Enhancing the Capacity of Stratospheric Cellular Networks Using Adaptive Array Techniques

Sultan Aljahdali

Статья научная

In this paper, the capacity of stratospheric cellular communications is improved by optimizing the amplitude feeding of the concentric rings array (CRA). The weighting profile of this array is chosen to be a cosine function raised to some power to control the beam pattern used in the cellular coverage. The power of this function is optimized to reduce the resulted sidelobe levels which increase the carrier-to-interference ratio (CIR) within the cells. It is found that increasing the power of the cosine function will reduce the sidelobe levels especially at lower number of elements in the innermost ring with a minor increase in beamwidth. For an innermost ring of 3 elements in a 10 rings CRA, a sidelobe level of 45 dB can be obtained below the mainlobe level. The simulation results show that a CIR of up to 38dB can be achieved and a minimum of 28dB at the cell borders is guaranteed with a 0.95 coverage ratio.

Бесплатно

Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure

Ritu Garg, Awadhesh Kumar Singh

Статья научная

The problem of scheduling dependent tasks (DAG) is an important version of scheduling, to efficiently exploit the computational capabilities of grid systems. The problem of scheduling tasks of a graph onto a set of different machines is an NP Complete problem. As a result, a number of heuristic and meta-heuristic approaches are used over the years due to their ability of providing high quality solutions with reasonable computation time. Discrete Particle Swarm Optimization is one such meta-heuristic used for solving the discrete problem of grid scheduling, but this method converge to sub optimal solutions due to premature convergence. To deal with premature convergence, in this paper we proposed the design and implementation of hierarchical discrete particle swarm optimization (H-DPSO) for dependent task scheduling in grid environment. In H-DPSO particles are arranged in dynamic hierarchy where good particles lying above in hierarchy are having larger influence on the swarm. We consider the bi-objective version of problem to minimize makespan and total cost simultaneously as the optimization criteria. The H-DPSO based scheduler was evaluated under different application task graphs. Simulation analysis manifests that H-DPSO based scheduling is highly viable and effective approach for grid computing.

Бесплатно

Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS

Enhancing the QoS of IoT networks with lightweight security protocol using Contiki OS

Haytham Qushtom, Khalid Rabaya’h

Статья научная

The Internet of Things (IoT) is advancing to prevail the application of the Internet, with the vision to connect everything around us. The deployment of IoT is advancing at a very fast pace, and relying on modified versions of the TCP/IP protocol suits. This rapid growth of the field is leaving a number of critical issues unresolved. Among the most critical issues are the quality of service and security of the delivered data. This research is set to tackle these issues through proposing a data delivery scheme that improves the quality of service (QoS) of classified data. The proposed solution relies on differentiating the priority of the delivered data, and to give preferences to secured and user-defined high priority traffic. The proposed solution denoted as Secured Traffic Priority Differentiation (STPD), is made to support any application, and is implemented at the Medium Access Control (MAC) sub layer. The proposed solution was tested in a virtual environment that simulates real scenarios using the Contiki operating system, using the Cooja simulator. The simulation results demonstrated a significant improvement of the proposed solution over the Carrier Sense Multiple Access Collision Avoidance, (CSMA/CA), by at 20%. The proposed solution worked to improve the channel utilization, data reliability, decreased latency of high priority traffic, and low priority traffic as well.

Бесплатно

Журнал