Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1157

Global Trust: A Trust Model for Cloud Service Selection

Global Trust: A Trust Model for Cloud Service Selection

Fatima Zohra Filali, Belabbes Yagoubi

Статья научная

Cloud Computing refers to network-based service provided by a large number of computers, sharing computing and storage resources. Combined with on-demand provisioning mechanisms and relied on a pay-per-use business model. The Cloud Computing offers the possibilities to scale rapidly, to store data remotely and to share services in a dynamic environment. However, these benefits can be seen as weaknesses for assuring trust, and providing confidence to the users of service. In this case, some traditional mechanisms to guarantee reliable services are no longer suitable or dynamic enough, and new models need to be developed to fit this paradigm. This study describes the assessment of the trust in the context of Cloud Computing, proposes a new trust model adapted to Cloud environments, and shows some experiments in regards of the proposed solution.

Бесплатно

Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing

Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing

Prakash G L, Manish Prateek, Inder Singh

Статья научная

Cloud computing enables the users to outsource and access data economically from the distributed cloud server. Once the data leaves from data owner premises, there is no privacy guarantee from the untrusted parties in cloud storage system. Providing data privacy for the outsourced sensitive data is a challenging task in cloud computing. In this paper we have proposed a Trusted Third party Query Process(TTQP) method to provide data privacy for graph structured outsourced data. This method utilize the encrypted graph frequent features search index list to search the matched query graph features in graph data base. The proposed system has analyzed in terms of different size of data graphs, index storage, query feature size and query execution time. The performance analysis of our proposed system shows, this method is more secure than the existing privacy preserving encrypted Query Graph (PPQG).

Бесплатно

GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings

GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings

Nandish M., Jalesh Kumar, Mohan H.G., Manjunath Sargur Krishnamurthy

Статья научная

Binary code similarity detection (BCSD) is a method for identifying similarities between two or more slices of binary code (machine code or assembly code) without access to their original source code. BCSD is often used in many areas, such as vulnerability detection, plagiarism detection, malware analysis, copyright infringement and software patching. Numerous approaches have been developed in these areas via graph matching and deep learning algorithms. Existing solutions have low detection accuracy and lack cross-architecture analysis. This work introduces a cross-platform graph deep learning-based approach, i.e., GraphConvDeep, which uses graph convolution networks to compute the embedding. The proposed GraphConvDeep approach relies on the control flow graph (CFG) of individual binary functions. By evaluating the distance between two embeddings of functions, the similarity is detected. The experimental results show that GraphConvDeep is better than other cutting-edge methods at accurately detecting similarities, achieving an average accuracy of 95% across different platforms. The analysis shows that the proposed approach achieves better performance with an area under the curve (AUC) value of 96%, particularly in identifying real-world vulnerabilities.

Бесплатно

Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization

Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization

Rajit Ram Yadava, Ranvijay Ranvijay

Статья научная

Wireless sensor networks (WSNs), which provide sensing capabilities to Internet of Things (IoT) equipment with limited energy resources, are made up of specialized transducers. Since substitution or re-energizing of batteries in sensor hubs is extremely difficult, power utilization becomes one of the pivotalmattersin WSN. Clustering calculation assumes a significant part in power management for the energy-compelled network. Optimal cluster head selection suitably adjusts the load in the sensor network, thereby reduces the energy consumption and elongates the lifetime of assisted sensors. This article centers around to an appropriate load balancing and routing technique by the utilization recently developed of Elephant Herding Optimization (EHO) algorithm that alternates the cluster location amongst nodes with the highest energy. The Scheme considered various parameter residual energy, initial energy and an optimum number of cluster head for the next cluster heads selection. The proposed model increases the lifetime of the network by keeping more nodes active even after the 2700th round. The experiment results of the trials show that the proposed EHO-based CH selection strategy outperforms the cutting-edge CH selection models.

Бесплатно

HTTP Packet Inspection Policy for Improvising Internal Network Security

HTTP Packet Inspection Policy for Improvising Internal Network Security

Kuldeep Tomar, S.S. Tyagi

Статья научная

Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are lots of mechanisms available but still they are not good enough because of dynamic environment. Such kind of attacks can be countered by applying appropriate policies on network edge devices like Adaptive Security Appliance, firewalls, web servers, router etc. Also the packets which are transferred between networks, they should deeply inspect for malicious or any insecure contents. In this paper firstly we would study Network security issues and available mechanism to counter them our focus would be on inspecting the HTTP packets deeply by applying policies on ASA. Finally we would use Graphical Network Simulator (GNS3) to test such a policy.

Бесплатно

Handover Analysis for Yaw-Shifted High-Altitude Platforms

Handover Analysis for Yaw-Shifted High-Altitude Platforms

Yasser Albagory

Статья научная

High-Altitude Platforms (HAP) is an emerging technology for mobile broadband communications and is capable of providing many advantages compared to conventional terrestrial and satellite systems. On the other hand, positional instabilities of HAP affect the system performance greatly. In this paper, a main problem concerning the rotation motion or yaw-shiftof HAP is described, analyzed, and its impact on the handover of cellular systems is also investigated. The total handover due to both user mobility and platform rotational positional instability is discussed and determined. An expression for the number of calls subjected to handover is deduced where it will be a function of users' density and their distribution in the cell, platform angular shift due to rotation, cell geometry, and number of active calling users. The analysis of this number shows the serious effects of the yaw-shift instability on the system performance.

Бесплатно

Handover Comparisons of WiMAX and WiMAX Release 2

Handover Comparisons of WiMAX and WiMAX Release 2

Ali Sufyan, Yasir Salam, Sundas Amin

Статья научная

Internet has become major need of every person. It provides information in a single click, cost effective way of communication with the outside world, gigantic library, social networking, feeds and blogs, satellite TV and business. World has become a global village because of internet. WiMAX is one of the most promising and innovating technology which supports high speed data and multimedia applications like VoIP, Satellite TV and video conferencing. The demand for enlarged coverage and high speed internet made WiMAX services still inadequate to the users. WiMAX Release 2 or WiMAX 2 is 4G technology built on IEEE 802.16m specification that will provide high bandwidth for VoIP and peak download rate up to 300Mbps which is more than double the current WiMAX . This work enlightens features and comparison of WiMAX and WiMAX 2 with respect to different handover schemes, network architecture, bandwidth, spectral efficiency and sector size throughput. Result shows that the WiMAX 2 is similar to WiMAX but with increased bandwidth, 4.5% better spectral efficiency and 28/54 Mbps Sector/site throughput.

Бесплатно

Hardware Implementation of Elliptic Curve Cryptography over Binary Field

Hardware Implementation of Elliptic Curve Cryptography over Binary Field

Sandeep S.V, Hameem Shanavas.I, Nallusamy.V, Brindha.M

Статья научная

This paper presents high-performance Elliptic Curve Cryptography (ECC) architecture over binary field, based on the Montgomery scalar multiplication algorithm. The word-serial finite field arithmetic unit (AU) is proposed with the optimized operation scheduling and bit-parallel modular reduction. With a dedicated squarer, the 163-bit point scalar multiplication with coordinate conversion can be done in 20.9μs by the design of one AU, and can be further improved to 11.1μs by the one of three AUs, both using 0.13μm CMOS technology. The comparison with other ECC designs justifies the effectiveness of the proposed architecture in terms of performance and area-time efficiency.

Бесплатно

Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs

Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs

Himadri N. Saha, Rohit Singh, Debika Bhattacharyya

Статья научная

With the advent of real applications in fields like defense and domestic fields, MANET is becoming more popular. MANET does not require any infrastructure, moreover it can behave as mobile networks. These features have boosted up the popularity of MANET in the community. As more and more fields get dependent on MANET, the system needs to be more robust and less expensive. For example, in defense field security is the major issue, while in the domestic field maintaining the QoS is the major issue. To commercialize MANET the routing protocols need to be lightweight, secure and the hardware on which it is to be implemented should be low cost at the same time. We propose a lightweight, secure and efficient routing model for MANETs; which uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses new packets like report and recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To observe the results we implement this protocol in hardware, on the Arduino platform in ZigBee network. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load and low end to end delay, compared to existing secure routing protocols. Thereby, maintaining a constant tradeoff between the QoS and the security of the network.

Бесплатно

Hardware Realization of Fast Multi-Scalar Elliptic Curve Point Multiplication by Reducing the Hamming Weights Over GF(p)

Hardware Realization of Fast Multi-Scalar Elliptic Curve Point Multiplication by Reducing the Hamming Weights Over GF(p)

Nagaraja Shylashree, Venugopalachar Sridhar

Статья научная

We present a new hardware realization of fast elliptic curve Multi-Scalar Point Multiplication (MSPM) using the sum of products expansion of the scalars. In Elliptic curve point Multiplication latency depends on the number of one’s (Hamming Weight) in the binary representation of the scalar multiplier. By reducing the effective number of one’s in the multiplier, the multiplication speed is automatically increased. Therefore we describe a new method of effectively reducing the Hamming weight of the scalar multipliers thereby reduces the number of Point Adders when multi scalar multiplication is needed. The increase in speed achieved outweighs the hardware cost and complexity.

Бесплатно

Hashing Key Based Analysis of Polynomial Encryption Standard

Hashing Key Based Analysis of Polynomial Encryption Standard

Pic Sonia, Surender Kumar Grewal

Статья научная

In present scenario, where data is transmitted from transmitter end to receiver end, security and authenticity of the data are the major issues. Hence, the need of an efficient technique which can assure secure transmission of data comes into the picture. There are several techniques which have been developed for this purpose over the time. Cryptography is one such technique. In this paper a new model is presented that is based on the implementation of Hash techniques with the Polynomial Message Authenticating scheme to increase the security level of transmission. The comparative analysis of Secure Hash Algorithms i.e. SHA-1 and SHA-256, implemented using Polynomial Message Authenticating scheme, is presented on the basis of different parameters like processing gain, delivery ratio, energy consumed, duty cycle, Hashing length and degree of polynomial.

Бесплатно

Helper Feedback based Medium Access Control Protocol: A Reliable Co-operative MAC Scheme for MANET

Helper Feedback based Medium Access Control Protocol: A Reliable Co-operative MAC Scheme for MANET

Nidhi Newalkar, Piyush Kumar Shukla, Sanjay Silakari

Статья научная

A novel multirate media access control based co-operative scheme has been proposed. It has been observed that any co-operative scheme gives a better performance only if the helper nodes selected to, relay the transmission from source to destination are reliable enough. Murad Khalid et.al has already proposed a protocol [24] where more than one helper nodes are selected to improve the reliability, so that if one fails the other can be used as a backup. But in this paper focus is on selection of reliable helpers. If a helper node has a high data rate, has successfully relayed traffic in the past and also has some minimum amount of energy left , not only for relaying traffic for others but also to conduct its own transmissions, then it acts as a suitable candidate to be chosen as a helper node. Such a co-operatives scheme enhances the throughput, reliability and overall performance of the network.Simulation has been conducted to show that the proposed scheme performs better than the.

Бесплатно

Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey

Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey

Nasim Soltani, Behzad Soleimani, Behrang Barekatain

Статья научная

Cloud computing became so important due to virtualization and IT systems in this decade. It has introduced as a distributed and heterogeneous computing pattern to sharing resources. Task Scheduling is necessary to make high performance heterogeneous computing. The optimization of related parameters, and using heuristic and meta-heuristic algorithms can lead to a reduction of the search space complexity and execution time. So, several studies have tried using a variety of algorithms to solve this issue and improve relative efficiency in their environments. This paper considered examines existing heuristic task scheduling algorithms. First, the concepts of scheduling, the layer of cloud computing, especially scheduling concept in the SaaS and PaaS layer, the main limits for improving the quality of service, evaluation methods of algorithms and applied tools for evaluating these ideas and practical experimental used methods were discussed and compared. Finally, future works in this area were also concluded and a summary of this article is presented in the form of a mind map.

Бесплатно

High-Altitude Platforms Cellular System for Sparsely Populated Areas

High-Altitude Platforms Cellular System for Sparsely Populated Areas

Yasser Albagory, Fahad Al Raddady

Статья научная

In this paper, the cellular communications using high altitude platform (HAP) will be discussed including the coverage analysis and design. The cells are analyzed showing the main parameters affecting its shape, layout and area which are important in the cellular design stage. This HAP cellular system is very important to cross the gap of difficult extension of ground infrastructure especially for sparsely populated areas needing communications services. The system design is explained where the footprint of the HAP cell is demonstrated and the overall cellular layout is established. As a case study, the coverage of the HAP cellular system is proved to cover some areas in the Kingdom of Saudi Arabia (KSA) using several scenarios such as populated as well as long highways passing through desert areas. The HAP cells are generated using spot-beam antennas which are practically candidate. The simulation results show that a single HAP can provide hundreds of microcells for urban areas while covering very long highways that can extend to several hundreds of kilometers which is very useful in covering the long highways linking sparsely separated cities in KSA.

Бесплатно

High-Speed and Secure PRNG for Cryptographic Applications

High-Speed and Secure PRNG for Cryptographic Applications

Zhengbing Hu, Sergiy Gnatyuk, Tetiana Okhrimenko, Sakhybay Tynymbayev, Maksim Iavich

Статья научная

Due to the fundamentally different approach underlying quantum cryptography (QC), it has not only become competitive, but also has significant advantages over traditional cryptography methods. Such significant advantage as theoretical and informational stability is achieved through the use of unique quantum particles and the inviolability of quantum physics postulates, in addition it does not depend on the intruder computational capabilities. However, even with such impressive reliability results, QC methods have some disadvantages. For instance, such promising trend as quantum secure direct communication – eliminates the problem of key distribution, since it allows to transmit information by open channel without encrypting it. However, in these protocols, each bit is confidential and should not be compromised, therefore, the requirements for protocol stability are increasing and additional security methods are needed. For a whole class of methods to ensure qutrit QC protocols stability, reliable trit generation method is required. In this paper authors have developed and studied trit generation method and software tool TriGen v.2.0 PRNG. Developed PRNG is important for various practical cryptographic applications (for example, trit QC systems, IoT and Blockchain technologies). Future research can be related with developing fully functional version of testing technique and software tool.

Бесплатно

Homomorphic Cryptosystem

Homomorphic Cryptosystem

Alisha Rohilla, Mehak Khurana, Meena Kumari

Статья научная

In 2009 Craig Gentry proved that Fully Homomorphic Encryption can be applied and realized in principle. Homomorphism allowed us to perform arbitrary computations and calculations on encrypted data. With RSA being the first cryptosystem to hold homomorphic properties, there came other additive and multiplicative cryptosystems. However, fully Homomorphic encryption proved to be the ultimate cryptographic solution to ensure security of data on cloud. It enables processing and computing arbitrary functions over the encrypted data thereby reducing the probability of accessing the plain text.

Бесплатно

Honeypot System for Attacks on SSH Protocol

Honeypot System for Attacks on SSH Protocol

Solomon Z. Melese, P.S. Avadhani

Статья научная

Honeypots are effective network security systems built to study the tactics of attackers and their intents. In this paper, we deployed Kippo honeypot to analyze Secure Shell attacks. Both the dictionary attack and intrusion activities of attackers have been discussed. We collected usernames and passwords that are attempted by dictionary attack targeting Secure Shell service. We have traced the frequently attacking machines based on their IP addresses. We have also recorded the commands they executed after successful logins to the Secure Shell honeypot server. We logged vast amount of connection requests destined to number of ports originated from different locations of the world. From our honeypot system, we have collected attack data that enables us to learn common Secure Shell based attacks.

Бесплатно

Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT

Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT

Dilip Kumar, Manoj Kumar

Статья научная

The Internet of Things (IoT) technology has changed the contemporary digital world. Devices connected to the IoT have sensors embedded within them. All these devices are purposely connected to share data among them through the Internet. Data sharing among IoT devices needs some security protocols to maintain the privacy and confidentiality of information. IoT devices have less computing power to perform various operations of a cryptographic process. So, there is a need of cryptographic approach to reduce the computational complexity for resource-constrained devices and provide data security. However, storing data over the cloud server also reduces storage overhead, but data transmission via the cloud is not always secure. Data integrity and authentication can be compromised because the end user can only access the data with the help of a cloud server. To ensure the security and integrity of the data, various cryptographic techniques are used. Therefore, in this paper, we propose a secure and optimized hybrid cryptographic scheme for the secure sharing of data by combining Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC). To ensure authentication and data integrity, the proposed scheme primarily uses the Message Authentication Code (MAC). The encrypted messages are stored on a cloud server to reduce storage overhead. The experimental findings demonstrate that the proposed scheme is effective and produces superior results as compared to existing approaches.

Бесплатно

Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm

Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm

Deepak Sharma, Rajiv Saxena, Narendra Singh

Статья научная

Encryption along with compression is the process used to secure any multimedia content processing with minimum data storage and transmission. The transforms plays vital role for optimizing any encryption-compression systems. Earlier the original information in the existing security system based on the fractional Fourier transform (FRFT) is protected by only a certain order of FRFT. In this article, a novel method for encryption-compression scheme based on multiple parameters of discrete fractional Fourier transform (DFRFT) with random phase matrices is proposed. The multiple-parameter discrete fractional Fourier transform (MPDFRFT) possesses all the desired properties of discrete fractional Fourier transform. The MPDFRFT converts to the DFRFT when all of its order parameters are the same. We exploit the properties of multiple-parameter DFRFT and propose a novel encryption-compression scheme using the double random phase in the MPDFRFT domain for encryption and compression data. The proposed scheme with MPDFRFT significantly enhances the data security along with image quality of decompressed image compared to DFRFT and FRFT and it shows consistent performance with different images. The numerical simulations demonstrate the validity and efficiency of this scheme based on Peak signal to noise ratio (PSNR), Compression ratio (CR) and the robustness of the schemes against bruit force attack is examined.

Бесплатно

Hybrid Energy Regulated Constant Gain Kalman-Filter for Optimized Target Detection and Tracking in Wireless Sensor Networks

Hybrid Energy Regulated Constant Gain Kalman-Filter for Optimized Target Detection and Tracking in Wireless Sensor Networks

Urvashi Saraswat, Anita Yadav, Abhishek Bhatia

Статья научная

Wireless Sensor Networks (WSNs) are one of the most researched areas worldwide as the wide-scale networks possess low cost, are small in size, consume low power, and can be deployed in various environments. Among various applications of WSNs, target tracking is a highly demanding and broadly investigated application of wireless sensor networks. The parameter of accurate tracking is restricted because of the limited resources present in the wireless sensor networks, noise of the network, environmental factors, and faulty sensor nodes. Our work aims to enhance the accuracy of the tracking process as well as energy utilization by combing the mechanism of clustering with the prediction. Here, we present a hybrid energy-regulated constant gain Kalman filter-based target detection and tracking method, which is an algorithm to make the best use of energy and enhance precision in tracking. Our proposed algorithm is compared with the existing approaches where it is observed that the proposed technique possesses efficient energy utilization by decreasing the transference of unimportant data within the sensor network, achieving accurate results.

Бесплатно

Журнал