International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1188
Energy Conservation for Ad Hoc On-Demand Distance Vector Multipath Routing Protocol
Статья научная
Routing in ad hoc mobile networks is a problem which has not yet been satisfactorily solved. Traditional routing techniques are not well adapted to new networks. Indeed, their lack of reactivity with respect to the traffic and network changes means traditional routing techniques cannot easily be used except at the price of over-dimensioning of the network resources (network bandwidth, node memory utilization, node CPU load, etc.). In recent years the research community has been interested in the improvement of ad hoc routing, and among the solutions suggested multipath routing has been considered. Multiple paths are exploited in order to ensure reliability and a quick reaction to changes in topology with a low overhead generated by the control messages. In this article we present an extension of the well-known routing protocol AODVM (Ad hoc On-demand Distance Vector Multipath). We propose to improve the multipath routing strategy with a path classification to allow the paths with the best energy level to be chosen.
Бесплатно
Статья научная
The reduction of energy consumption in elastic optical networks is of major interest to the research community. As a result, several methods for solving this problem in combination with existing classical problems have been proposed. Elastic optical networks are subject to disturbance phenomena that degrade their quality and performance. To optimize resources, operators must recalculate new routes and plan the displacement of established connections towards these new routes to cope with these phenomena, it’s the reconfiguration. The problem addressed in this article is to reconfigure a set of unicast protected connections without interruption to a new routing calculated during the process. Knowing that the use of backup paths solves the interruption problem, but has an impact on the overall energy consumption, the goal is to find a good compromise between the two sub-problems when switching from old routes to new ones. To the best of our knowledge, there is no work on reconfiguration that uses energy-aware backup paths. In this work, we proposed an energy-aware EERA_EON rerouting algorithm using the backup paths. Simulations have shown the performance of this approach in terms of energy consumption compared to the work of our predecessors. Subsequently, we proposed a classical BRA_EON rerouting algorithm in elastic optical networks. Simulation results show that we perform BRA_EON in terms of the number of steps.
Бесплатно
Energy Efficient Clustering Protocol for Sensor Network
Статья научная
Energy efficiency is a very crucial issue for battery operated Wireless Sensor Networks (WSNs). Routing plays a major in energy dissipation and it is shown in the literature that Cluster based approach is the most energy effective in any network in comparison to direct or multi hop based approach. Therefore, optimized Clustering became a key point to achieve energy efficiency in Wireless Sensor networks. In this paper, we have designed and implemented a novel protocol in MATLAB in which Cluster Heads are chosen on the basis of energy threshold, minimum average distance from surrounding nodes and farthest distance among Cluster Heads to provide optimal coverage. This paper also compare results of randomly selected CHs and farthest CHs and results demonstrates that farthest chosen CHs provide much better results than randomly selected CHs. To further evaluate performance of our protocol, results of our protocol are compared with LEACH and proposed protocol dominates LEACH in terms of minimizing transmission distance, energy dissipation and hence increasing network lifetime. Apart from this, proposed protocol is based on Poisson distribution because simulation results clearly states that Poisson distribution is very well suited for WSN in comparison to Uniform and Random distribution.
Бесплатно
Energy Efficient Resource Allocation in 5G RAN Slicing with Grey Wolf Optimization
Статья научная
The massive connections and the real time control applications have different requirement on delay, energy, rate and reliability of the system. In order to meet the diversified 5G requirements, network slicing technique guarantees on the wide scale applications. In this paper, we have proposed a dynamic resource allocation system with two time scale. The one time scale is used for the resource allocation in the system and the other is used for optimized use of latency and power. Lyapunov drift function is used for the balance between the power consumption and the user satisfaction. Further, Grey Wolf Optimization (GWO) is used for the resource allocation strategy so as to gain the reliability of the system with heterogeneous requirements. The proposed methodology shows the improvement of 27% in user satisfaction and 17.5% in power consumption. The proposed framework can be utilized for the rate as well as latency sensitive applications in 5G.
Бесплатно
Статья научная
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion using Spider Monkey (SM) Optimization. The E- AODM protocol assesses the energy management solution based on parameters such as delay, energy consumption, routing overhead, and node energy. By choosing the best path through the network, the proposed protocol's effectiveness is increased. The proposed protocol reduces routing overload, delay, and congestion. The simulated results show that increasing the number of packets transmitted in the network using the proposed GAODM and E-AODM routing protocols over the existing protocols on NS 2 reduces node energy and, as a result, overload and delay.
Бесплатно
Energy Scavenging Technology and Components in WSN
Статья научная
With the evolution of modern technology wireless sensor nodes are finding a lot of applications in day to day life starting from smart home system to military surveillance. The primary building block of a wireless sensor network is a spatially distributed set of autonomous sensor nodes or motes. In order to design a wireless sensor network it is necessary to understand the structure and working of a sensor node. The sensor nodes can be considered as tiny battery powered computers that consists of a computing subsystem, communication subsystem, sensor subsystem, power subsystem. In this paper we review the features of these subsystems so that it is easy for the application developer to quickly understand and select the type of component for building customized sensor node platform. In this paper we have studied the features of different microprocessors and transceivers properties used in sensor nodes. We also study the classifications of sensors based on applications, the relevant sensor parameters, and different storage devices with their properties. This paper can be a ready reference to beginners interested in this field. One more major problem of wireless sensor network application that should be addressed is the limited lifetime of sensor nodes due to energy constraints. We also review how energy harvesting can increase the lifetime of a wireless sensor network and the possible methods that can be implemented for energy harvesting.
Бесплатно
Energy consumption in mobile phones
Статья научная
As the mobile devices are widely used in this world. With the increasing number of users, the numbers of customized applications are also introduced for these users according to their own requirements but on the other hand, there is a dire need of a system which must be energy conserved, estimated and maintained. A survey of energy consumption in mobile phones is presented in this paper with the factors at which the consumption of the energy depends on i.e. Energy consumed by OS, by hardware, by applications, by the user to interact with the applications, by wireless, by the sensor network. The energy management models and frameworks are also discussed in this paper.
Бесплатно
Energy-Efficient Traffic Management Scheme for Wireless Sensor Network
Статья научная
Densely distributed nodes and high data flow rates close to sinks can cause serious problems for WSNs, especially concerning energy consumption and network complexity. As node and channel traffic management is essential for energy efficiency, not much research has been done on how to solve these problems. This paper presented a novel method that uses a Water Wave Game Theory algorithm to identify and characterize traffic areas that use less energy. Based on different network parameters, the algorithm calculates a fitness function that estimates player stability. Mobile sinks and nearby nodes are notified when the fitness level is low, anticipating energy-efficient traffic patterns and implicitly establishing an alarm threshold. Establish the LAFLC algorithm to tackle complex energy-efficient traffic scenarios. This algorithm optimizes system decisions about mobile data collectors, routing, and node mobility by dynamically learning and adapting to the characteristics of energy-efficient traffic. As a result, it eliminates the need for data rerouting and the replacement of multiple traffic nodes when mobile data collectors are in motion. The proposed approach demonstrates a superior Packet Delivery Ratio (PDR) of 99.95%, throughput of 3500bps, energy consumption of 0.39J, reliability of 98.8% and energy efficiency of 99.9% compared to existing techniques.
Бесплатно
Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles
Статья научная
Vehicular Ad hoc Network involves the movement of vehicles and the communication between them for their security. VANETs have many application areas. One of main applications of VANETs is to improve the driving safety. In various safety related applications, vehicular nodes constantly communicate with roadside equipments. Road Side Units (RSUs) can sense the real time information about road conditions, animals straying and road blocks and passes all this hazardous related information to the vehicles approaching in its range. These alert messages enable the driver to take timely decisions in preventing from accidents or delays in information delivery. In this paper, Enhanced Direction based Hazard Routing Protocol and Ad Hoc On-demand Distance Vector protocols are used to avoid prevent vehicles from collision and to increase the coverage range of VANETs. These issues are resolved by bypass routing and a synchronized clock maintained with the RSUs respectively. To solve the issues and make the system more reliable we propose the roadside wireless sensor nodes along with vehicular nodes in the network. The RSUs are fixed at some distances and communicate with wireless sensors attached at vehicular nodes.
Бесплатно
Статья научная
Mobile Ad hoc NETworks (MANETs) are the new generation of networks that offer unrestricted mobility without any underlying infrastructure. It relies on the cooperation of all the participating nodes. Due to their open nature and lack of infrastructure, security for MANETS has become an intricate problem than the security in other networks. The conventional security mechanisms of protecting a wired network are not sufficient for these networks. Hence a second level of defense to detect and respond to the security problem called an Intrusion detection system is required. Generally the malicious nodes demonstrate a different behavioral pattern of all the other normal nodes. So an Intrusion Detection System based on anomaly based intrusion detection that works by checking the behavior of the nodes was proposed. Here, in this paper to determine the behavior of the nodes as malicious or legitimate a Data Transmission Quality (DTQ) function is used. The DTQ function is defined in such a way that it will be close to a constant or keep changing smoothly for genuine nodes and will keep on diminishing for malicious nodes.. The final decision of confirming nodes as malicious is determined by a group consensus method. The evaluation results show that the proposed method increases the detection rate as well as decreases the false positive rate.
Бесплатно
Enhanced Role Based Access Control Mechanism for Electronic Examination System
Статья научная
Over the years, e-learning and e-examination has become standard in many institutions of higher learning. It has been observed that examination questions and results can be easily intercepted by invalid users, thus the security of resources shared among valid users is not guaranteed. In order to solve these problems as it relates to access control, a Role based Examination System (RBES) was designed, developed and evaluated. RBES attempted to solve the security issue by the combination of two authentication techniques: text-based authentication and graphical password authentication. The Text-based authentication utilizes two text-based parameters namely the username and password. The graphical password authentication makes use of a finite set of controls (RBES chooses radio buttons) which are identified by numbers. These numbers constitute the password used for graphical authentication. To improve on resource sharing among users in the examination system, RBES proposes role management (role creation, role update, role removal) and user management (user creation, user update and user removal). The developed system made use of asp.net, C#, IIS server, WAMP server, Mysql and other tools for its development. RBES was tested by some legitimate and illegitimate users and the performance of the system was found to be satisfactory, hence RBES shows an efficient and reliable scheme that can be deployed in any examination or e-learning system. Finally the potential threats to the system were modeled and the use of weak passwords was found to be the most likely threat the system could be vulnerable to.
Бесплатно
Enhanced Voting based Secure Localization for Wireless Sensor Networks
Статья научная
Development of location estimation algorithms with improvement in location precision with lower cost, less energy consumption and less hardware support has become more important for many applications in Wireless Sensor Networks (WSNs). This paper addresses the problem of secure location determination, known as secure localization in WSNs using voting based technique which gives a search region in presence of anchor nodes. From the obtained search region trilateration is applied to know the position of sensor nodes. To avoid the involvement of sensor nodes in further location estimation process, bilateration is applied. Experimental analysis shows that the maximum number of nodes can be localized and accurate location of a node can be determined efficiently with low estimation error. To avoid the attacks and involvement of malicious nodes in the localization process, we implement an improved authentication and security algorithm. Using few location reference points in the localization process reduces the communication cost. The proposed scheme also provides very good localization accuracy.
Бесплатно
Enhanced Wireless Sensor Network Lifetime using Modified SFLA with Improved Fitness Function
Статья научная
In the pursuit of enhancing Wireless Sensor Networks (WSNs), this study introduces a novel amalgamation of the Enhanced Shuffled Frog Leaping Algorithm (ESFLA) with a multi-solution evolution paradigm. By intricately examining diverse algorithmic facets, including partitioning strategies, fitness functions, and convergence mechanisms, the research endeavors to elevate the efficiency, robustness, and longevity of WSNs. Rigorous experimentation across 15 input datasets, meticulously categorized based on network density, unveils profound insights into the algorithm's performance. Significantly, the proposed ESFLA-MSU achieves exceptional outcomes, eclipsing traditional methods. A pioneering fitness function optimally redistributes workloads, culminating in extended network lifespans, a striking reduction in energy consumption by up to 28.5%, and remarkable load balancing improvements of up to 35.7%. Comparative analyses of partitioning strategies underscore ESFLA's adaptability, while multi-solution evolution integration accelerates convergence, with an expedited rate of up to 46.3%.
Бесплатно
Статья научная
The advance of Big Data and Internet growth has driven the need for more abundant storage to hold and share data. People are sending more messages to one another and paying attention to the aspects of privacy and security as opposed to previous decades. One of the types of files that are widely shared and instantaneous available over the web are images. They can become available as soon as a shot is taken and keep this closely related to the owner; it is not easy. It has been proposed here to use Steganography to embed information of the author, image description, license of usage and any other secrete information related to it. Thinking of this, an analysis of the best file types, considering capacity, detectability, and distortion was necessary to determine the best solution to tackle current algorithm weaknesses. The performance of BMP, GIF, and JPEG initialises the process of addressing current weaknesses of Steganographic algorithms. The main weaknesses are capacity, detectability and distortion to secure copyright images. Distributed Steganography technique also plays a crucial part in this experiment. It enhances all the file formats analysed. It provided better capacity and less detectability and distortion, especially with BMP. BMP has found to be the better image file format. The unique combination of Distributed Steganography and the use of the best file format approach to address the weaknesses of previous algorithms, especially increasing the capacity. It will undoubtedly be beneficial for the day to day user of social media image creators and artists looking to protect their work with copyright.
Бесплатно
Статья научная
The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. Biometric Passports have been introduced in many countries to improve the security in Inspection Systems and enhance procedures and systems that prevent identity and passport fraud. The deployment of biometric technologies, countries need to test and evaluate its systems since the International Civil Aviation Organization (ICAO) provides the guidelines, but the implementation is up to each issuing country. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
Бесплатно
Enhancing Adversarial Examples for Evading Malware Detection Systems: A Memetic Algorithm Approach
Статья научная
Malware detection using Machine Learning techniques has gained popularity due to their high accuracy. However, ML models are susceptible to Adversarial Examples, specifically crafted samples intended to deceive the detectors. This paper presents a novel method for generating evasive AEs by augmenting existing malware with a new section at the end of the PE file, populated with binary data using memetic algorithms. Our method hybridizes global search and local search techniques to achieve optimized results. The Malconv Model, a well-known state-of-the-art deep learning model designed explicitly for detecting malicious PE files, was used to assess the evasion rates. Out of 100 tested samples, 98 successfully evaded the MalConv model. Additionally, we investigated the simultaneous evasion of multiple detectors, observing evasion rates of 35% and 44% against KNN and Decision Tree machine learning detectors, respectively. Furthermore, evasion rates of 26% and 10% were achieved against Kaspersky and ESET commercial detectors. In order to prove the efficiency of our memetic algorithm in generating evasive adversarial examples, we compared it to the most used evolutionary-based attack: the genetic algorithm. Our method demonstrated significantly superior performance while utilizing fewer generations and a smaller population size.
Бесплатно
Статья научная
Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.
Бесплатно
Enhancing Hash Function Selection Techniques Based on Message Contents
Статья научная
In Hash based Security systems two major factors that are mostly relied upon are Strong Hash function and the selection procedure of the hash function from a given pool. This paper aims at exploiting maximum available resources a message possesses, intrinsically, that can accommodate greater number of hash functions references. It provides a simple, low cost- easy to implement technique that will be able to make systems available with random hash functions’ selection ability. With the given technique the security level will be enhanced along with greater availability of hash functions. The truly variable nature of contents of messages can be exploited in order to secure messages beyond measure. In case of a single communication stint, if one hash function is compromised the next hash function for next block will be selected truly randomly and cannot be predicted. A summary of already in use techniques is also discussed in order to prove the proposition distinct and practicable. In proposed technique it is proven that it has ability to accommodate greater number of hash functions. Further, the hash function selection methodology has been provisioned with a technique to be message-dependent; the security cannot be compromised owing to truly randomness of the selection procedure.
Бесплатно
Enhancing QoS Through Dynamic and Fare AP Selection in a Wireless LAN
Статья научная
The IEEE 802.11 WLAN is primarily used for web browsing which belongs to the category of non-real time application. But the demand of real time applications like VOIP and video conferencing has become very much common to such WLAN. With IEEE 802.11e Mac protocol it is possible to improve the QoS for both real and non-real time traffic by service differentiation. To ensure efficient utilization of the radio resources and enhanced QoS the load imbalance should be resolved among APs from different BSSs. In large scale WLAN inter AP communication mechanism can be employed along side the current admission controller under EDCA. Beside service differentiation inter AP differentiation based QoS management can lead to efficient utilization of radio resources by moving STAs from heavily laded to a less loaded AP and ensure better QoS for all types of traffics. In this paper we propose a dynamic and fair AP selection mechanism to improve the QoS in a WLAN. The simulations have been carried out with NSv2.34.
Бесплатно
Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS
Статья научная
The transmission through different interfaces of the different wireless network is a challenging issue. This paper presents an enhanced dynamic link aggregation scheme (EDLAS), an enhanced technique for the transmission of data through different interfaces present in different wireless networks. The proposed technique uses the existing sequential and parallel DLAS technique by using the fuzzy. The fuzzy system decides whether to transfer data by using sequential or the parallel DLAS depending upon the number of the chunks, user mobility, the number of users, chunk size. The work is implemented using the MATLAB. The simulation results generated using the MATLAB shows the effectiveness of the technique with increased throughput with same residual battery power.
Бесплатно