Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1157

Intelligent Routing using Ant Algorithms for Wireless Ad Hoc Networks

Intelligent Routing using Ant Algorithms for Wireless Ad Hoc Networks

S. Menaka, M.K. Jayanthi

Статья научная

Wireless network is one of the niche areas and has been a growing interest owing to their ability to control the physical environment even from remote locations. Intelligent routing, bandwidth allocation and power control techniques are the known critical factors for this network communication. It is customary to find a feasible path between the communication end point which is a challenging task in this type of network. The present study proposes an Ant Mobility Model (AMM), an on-demand, multi-path routing algorithm that exercises power control and coordinate the nodes to communicate with one another in wireless network. The main goal of this protocol is to reduce the overhead, congestion, and stagnation, while increasing the throughput of the network. It can be realized from the simulation results that AMM proves to be a promising solution for the mobility pattern in wireless networks like MANETs.

Бесплатно

Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants

Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants

SanjeevPuri

Статья научная

In current scenario, there are always impending threats from militants and terrorists within and out of a country. The sensor networks play a vital role in minimizing the loss of human lives in the event of usual calamity and artificial sabotage created by terrorists. The sensor networks can be successfully deployed in any difficult geographical terrains where manual round-the-clock surveillance is highly impossible. Energy aware routing is immensely helpful to sensor networks in the aspect of extending the life span of the WSNs. In this paper, an automatic suspected terror system based on wireless sensor networks is developed, which is designed for high-rise metro structure. In order to provide early extinguish of impending threats by putting any bomb, large numbers of detectors which periodically measure noise, smell, infringement, vibration, temperature concentration, unidentified stranger photo are deployed from major streets. Those scattered detectors report their monitoring information to the surveillance center via the self-organizing hierarchical intelligent wireless sensor networks (IWSN). Test results from it show that the automatic suspected terror system achieves the design requirements.

Бесплатно

Intelligent energy aware fidelity based on-demand secure routing protocol for MANET

Intelligent energy aware fidelity based on-demand secure routing protocol for MANET

Himadri N. Saha, Prachatos Mitra

Статья научная

Mobile Ad-Hoc Networks are very flexible networks, since they do not depend on any infrastructure or central authority. Due to this property, MANETs are highly ubiquitous in defense, commercial and public sectors. Despite the usage, MANET faces problems with security, packet drops, network overhead, end-to-end delay and battery power. To combat these shortcomings, we have proposed a new trust based on-demand routing protocol that can adapt to the specific energy conditions of nodes in a MANET. It uses the concept of fidelity which varies depending on packet drops. This fidelity is monitored through direct and indirect methods. The main aim of the protocol is to develop a model that considers both trust and battery power of the nodes, before selecting them as prospective nodes for secure transmission of data. With dynamic battery threshold calculations, the nodes make an intelligent choice of the next hop, and packet losses are effectively minimized. In addition to providing data origin authentication services, integrity checks, the proposed “Intelligent Energy Aware Fidelity Based On-Demand Secure Routing (IEFBOD)” protocol is able to mitigate intelligent, colluding malicious agents which drop packets or modify packets etc. that they are required to forward. New packets called report and recommendation have been used to effectively detect and eliminate these malicious nodes from a network. Our protocol has been compared to other existing secure routing protocols using simulation, and it displays improved performance metrics, namely high packet delivery fraction, low normalized routing load and low end-to-end delay.

Бесплатно

Inter integrated WSN for crude oil pipeline monitoring

Inter integrated WSN for crude oil pipeline monitoring

Bhavyarani M. P., U. B. Mahadeva Swamy, M. B. Shrynik Jain

Статья научная

An inter-integrated system for crude oil pipeline using Wireless Sensor Network is designed for an incessant monitoring and communication in the desert for a span of 1350 Km from pumping station to harbor stockpiling tanks with 135 distributed control system stations. The proposed wireless sensor network equipment is used to scan the sensor status installed in the pipeline and send the required information utilizing dedicated low bandwidth with Quality of Service level three secured Message Queuing Telemetry Transport. This system generates energy on its own by using the solar panel and stores it in battery banks. Low power controller with Wi-Fi developed by Texas Instruments has been utilized to design a working prototype.

Бесплатно

Interaction of High Speed TCPs with Recent AQMs through Experimental Evaluation

Interaction of High Speed TCPs with Recent AQMs through Experimental Evaluation

VandanaKushwaha, Ratneshwer

Статья научная

Congestion control approaches, source based approach and router based approach have their own limitations. In source based approach, it is difficult to get correct location of congestion and without proper admission control; we cannot effectively manage the congestion problem. Thus both the approaches have to work in coordination for effective congestion control. In this context, an interaction study plays an important role to verify how a TCP implemented at source end works with Active Queue Management at router end. In this paper, we analyzed the performance of different high speed TCP variants at the source end with some recent AQM approaches: CoDel and sfqCoDel. The main objective of this work is to obtain the interaction patterns of different high speed TCP variants like: HTCP, Compound, HSTCP, Scalable and Cubic with recently proposed AQMs: CoDel and sfqCoDel. Simulation results show that that if we want to achieve a better throughput, minimum delay and improved fairness simultaneously, Cubic-sfqCoDel may be a good choice of TCP-AQM combinations for high speed networks.

Бесплатно

Interconnect network on chip topology in multi-core processors: a comparative study

Interconnect network on chip topology in multi-core processors: a comparative study

Manju Khari, Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee

Статья научная

A variety of technologies in recent years have been developed in designing on-chip networks with the multicore system. In this endeavor, network interfaces mainly differ in the way a network physically connects to a multicore system along with the data path. Semantic substances of communication for a multicore system are transmitted as data packets. Thus, whenever a communication is made from a network, it is first segmented into sub-packets and then into fixed-length bits for flow control digits. To measure required space, energy & latency overheads for the implementation of various interconnection topologies we will be using multi2sim simulator tool that will act as research bed to experiment various tradeoffs between performance and power, and between performance and area requires analysis for further possible optimizations.

Бесплатно

Interference effect of ACL’s and SCO’s IEEE 802.15 transmission on IEEE 802.11 performance

Interference effect of ACL’s and SCO’s IEEE 802.15 transmission on IEEE 802.11 performance

Adhi Rizal, Susilawati

Статья научная

This study aims to investigate the effect of Bluetooth on WLAN 802.11 performance. In contrast to other studies, we distinguish bluetooth into two mechanisms, namely Asynchronous Connectionless (ACL) and Synchronous Connection-Oriented (SCO). Various scenarios (with range variation between the sender node and the access point (AP) and also the presence of ACL or SCO transmission as interference) was designed to conduct experiment. In general, experiment was conducted with two nodes that act as sender and receiver node that connected through internet. In addition, to determine the effect of bluetooth on WLAN performance we use several test parameters, which are received signal strength indication (RSSI), signal to noise ratio (SNR), upstream and downstream, jitter, and packet loss rate (PLR). The study revealed the both ACL and SCO did not significantly affect WLAN performance, because they can only reduce the performance based on certain parameters and scenarios. But when they were compared, SCO has worst effect on WLAN performance, particularly on upstream, jitter, and PLR.

Бесплатно

Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends

Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends

Jaideep Kaur, Kamaljit Kaur

Статья научная

World Wide Web (1990's) and Mobile Internet (the 2000's) had consequential corroborated the way how people communicate. However, with evolution in technology, the cataclysm of Internet has stepped into a new phase-Internet of Things. Internet of Things, a prominent paradigm in the field of IT having a nominal intervention of humans allowing diverse things to communicate with each other, anticipate, sight, and perceive surroundings. IoT exploits RFID tags, NFC, sensors, smart bands, and wired or wireless communication technologies to build smart surroundings, smart Homes, quick-witted intelligence in medical care, ease of Transport, and more. This paper introduces IoT with emphasis on its driver technologies and system architecture. In addition to application layer protocols, we focus on identifying various issues and application areas of IoT as well as future research trends in the field of IoT. We have also highlighted how big data is associated with Internet of Things.

Бесплатно

Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization

Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization

Pooja Chandel, Rakesh Kumar

Статья научная

The Internet is a communication network where two or more than two users communicate and exchange the data. Black hole attack is a security threat in which a malicious node drops some or all of the packets. The proposed framework implements a biometric authentication system into the communication network to verify the user and to save the user from any internal or external threat. The main objective is to integrate the biometric security with the communication network. The attack is supposed to be a Black hole which has been considered as a smart attack. Feature extraction of Fingerprint dataset will be done using minutiae extractor. This will extract ridge endings and ridge bifurcation from the thinned image. Genetic algorithm is usedto reduce the features to useful pool. If the user is authentic only then prevention mechanism against black hole is applied. Genetic Algorithm is used to find out black hole node based on the fitness function. Proposed model’s performance is evaluated using various metrics like delay, throughput, energy consumption and packet delivery ratio.

Бесплатно

Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network

Interoperability Framework for Vehicular Connectivity in Advanced Heterogeneous Vehicular Network

Saied M. Abd El-atty, Konstantinos Lizos

Статья научная

Advanced heterogeneous vehicular network (AHVN) is a promising architecture for providing vehicular services in the next generation of vehicular networks. AHVN is an integrated architecture between vehicular ad hoc networks and existing cellular wireless networks. In this work, we propose a Multihop vehicular connectivity model in V2V system, which depends on the physical characteristics of the roadways and false hop initiation connectivity. Then, we determine the failure probability of vehicular connectivity in V2V system. Based on interoperability utility, we employ the failure connectivity probability as a handover criterion to communicate with V2R networks. Subsequently, we propose an efficient medium access control (MAC) method based on collaborative codes for resource management in AHVN. As a result, we determine the failure access probability by employing a Markov chain model. The analysis of the proposed MAC in terms of transmission capacity, delay and access failure probability is driven. The numerical and simulation results demonstrate the effectiveness of the proposed framework.

Бесплатно

Intrusion Detection Based on Normal Traffic Specifications

Intrusion Detection Based on Normal Traffic Specifications

Zeinab Heidarian, Naser Movahedinia, Neda Moghim, Payam Mahdinia

Статья научная

As intrusion detection techniques based on malicious traffic signature are unable to detect unknown attacks, the methods derived from characterizing the behavior of the normal traffic are appropriate in case of detecting unseen intrusions. Based on such a technique, one class Support Vector Machine (SVM) is employed in this research to learn http regular traffic characteristics for anomaly detection. First, suitable features are extracted from the normal and abnormal http traffic; then the system is trained by the normal traffic samples. To detect anomaly, the actual traffic (including normal and abnormal packets) is compared to the deduced normal traffic. An anomaly alert is generated if any deviation from the regular traffic model is inferred. Examining the performance of the proposed algorithm using ISCX data set has delivered high accuracy of 89.25% and low false positive of 8.60% in detecting attacks on port 80. In this research, online step speed has reached to 77 times faster than CPU using GPU for feature extraction and OpenMp for parallel processing of packets.

Бесплатно

Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors

Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors

D. P. Gaikwad

Статья научная

Recently, the use of Internet is increased for digital communication to share a lot of sensitive information between computers and mobile devices. For secure communication, data or information must be protected from adversaries. There are many methods of safeties like encryption, firewalls and access control. Intrusion detection system is mainly used to detect internal attacks in organization. Machine leaning techniques are mostly used to implement intrusion detection system. Ensemble method of machine learning gives high accuracy in which moderately accurate classifiers are combined. Ensemble classifier also provides less false positive rates. In this paper, a novel ensemble classifier using rule combination method has proposed for intrusion detection system. Ensemble classifier is designed using three rule learners as base classifiers. The benefits and feasibility of the proposed ensemble classifier have demonstrated by means of KDD’98 datasets. The main novelty of the proposed approach is based on three rule learner combination using rule of combination method of ensemble and feature selector. These three base classifiers are separately trained and combined using average probabilities rule combination. Base classifier’s accuracies have compared with the proposed ensemble classifier. Best First search algorithm has used to select relevant features from training dataset. This algorithm also helped to reduce dimension of training and testing dataset which benefits in reduction of training time. Several comparative experiments are conducted for evaluating performances of classifiers in term of accuracy and false positive rates. Experimental results show that the proposed ensemble classifier provide significant improvement of accuracy compared to individual classifiers with less positive rates.

Бесплатно

Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks

Yasmine Medjadba, Somia Sahraoui

Статья научная

Wireless Sensor Networks (WSNs) are widely and successfully employed in various application domains. They are easily deployed to collect valuable information and monitor potential environmental phenomena. However, the special nature of WSNs as well as their severe constraints and resource limitations make them vulnerable to various types of threats. Replay attack, is one example. According to this attack, the adversary intercepts and replays several times the same (old) message leading either to missed alerts or to false alerts. Many solutions have been proposed to mitigate message replay attack. However, all these solutions are of cryptographic natures and consider only external attacks exercising a trivial scenario of replay attack. In fact, the attacker could be a lot smarter, and in this case, it replays only the data field in the message while keeping the remaining fields updated. This novel form of replay attack is much more dangerous and difficult to be detected. We call this attack variant by data replay attack. As sensor nodes may be easily captured and compromised, the worst scenario occurs if data replay attack is performed by an internal intruder. In this paper we propose an efficient intrusion detection framework to overcome data replay attack in WSNs. The proposed intrusion detection system is named DR-IDS (Data Replay Intrusion Detection System). The performance evaluations performed under NS2 simulator show that the proposed solution is sufficiently robust.

Бесплатно

Intrusion Detection with Multi-Connected Representation

Intrusion Detection with Multi-Connected Representation

Abdelkader Khobzaoui, Abderrahmane Yousfate

Статья научная

Recently, considerable attention has been given to data mining techniques to improve the performance of intrusion detection systems (IDS). This has led to the application of various classification and clustering techniques for the purpose of intrusion detection. Most of them assume that behaviors, both normal and intrusions, are represented implicitly by connected classes. We state that such assumption isn't evident and is a source of the low detection rate and false alarm. This paper proposes a suitable method able to reach high detection rate and overcomes the disadvantages of conventional approaches which consider that behaviors must be closed to connected representation only. The main strategy of the proposed method is to segment sufficiently each behavior representation by connected subsets called natural classes which are used, with a suitable metric, as tools to build the expected classifier. The results show that the proposed model has many qualities compared to conventional models; especially regarding those have used DARPA data set for testing the effectiveness of their methods. The proposed model provides decreased rates both for false negative rates and for false positives.

Бесплатно

Intrusion detection using machine learning and feature selection

Intrusion detection using machine learning and feature selection

Prachi, Heena Malhotra, Prabha Sharma

Статья научная

Intrusion Detection is one of the most common approaches used in detecting malicious activities in any network by analyzing its traffic. Machine Learning (ML) algorithms help to study the high dimensional network traffic and identify abnormal flow in traffic with high accuracy. It is crucial to integrate machine learning algorithms with dimensionality reduction to decrease the underlying complexity of processing of huge datasets and detect intrusions within real-time. This paper evaluates 10 most popular ML algorithms on NSL-KDD dataset. Thereafter, the ranking of these algorithms is done to identify best performing ML algorithm on the basis of their performance on several parameters such as specificity, sensitivity, accuracy etc. After analyzing the top 4 algorithms, it becomes evident that they consume a lot of time while model building. Therefore, feature selection is applied to detect intrusions in as little time as possible without compromising accuracy. Experimental results clearly demonstrate that which algorithm works best with/without feature selection/reduction technique in terms of achieving high accuracy while minimizing the time taken in building the model.

Бесплатно

Investigating and analyzing bitcoin blockchain protocol using wireshark

Investigating and analyzing bitcoin blockchain protocol using wireshark

Auqib Hamid Lone, Roohie Naaz Mir

Статья научная

A bitcoin node needs to download the full block contents of the entire blockchain, before actually being able to send and receive transactions on bitcoin broadcast network, except simple payment verification clients which require only block headers and bloom filters to sync with others peers available on the network. Transactions/Blocks pass through a complex process at sender and receiver than it apparently looks to be. During transmission transactions/blocks are broken down into smaller chunks of data so that they can be carried on the wire. These chunks are given appropriate headers, encapsulated and then passed through several layers to reach the destination. In this paper we captured Bitcoin packets using Wireshark and deeply investigated and analyzed them. We investigated how bitcoin transaction/block messages work and what values and parameters are considered during this whole process.

Бесплатно

Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

M. Anand Kumar, S.Karthikeyan

Статья научная

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

Бесплатно

Investigating the Feasibility of Elementary Cellular Automata based Scrambling for Image Encryption"

Investigating the Feasibility of Elementary Cellular Automata based Scrambling for Image Encryption"

M. Mohammed Ibrahim, R. Venkatesan, Kavikumar Jacob

Статья научная

This research investigates the performance of various one-dimensional cellular automata rules, namely Rule 30, Rule 150, Rule 184, Rule 105 and Rule 110, for image encryption. The proposed algorithm technique combines these CA rules to generate pseudo-random sequences for image scrambling. The effectiveness of the proposed method is evaluated using various performance metrics, including NPCR, correlation coefficient and information entropy. The results demonstrate which rule provides the best encryption performance, achieving high levels of security and resistance to statistical attacks. However, the computational complexity of the proposed method is relatively high, which may limit its practicality for real-time image encryption applications.

Бесплатно

Investigation of LEACH Protocol and its Successors in WSN

Investigation of LEACH Protocol and its Successors in WSN

Er. Kiranpreet kaur, Er. Ridhi Kapoor

Статья научная

Sensor nodes present in WSN plays its crucial role in sensing, processing and communicating data in brutal conditions. Power source like battery is required by these nodes for energy, which got sucked out in the processes like aggregation, compression and communication of sensed data. Extensive flaws seen now days are energy source constraints. After deploying nodes in nasty environment, worthwhile a battery is not rehabilitate. Therefore, proliferate usage of energy to enhance network lifetime is main issue. To clear up this trouble various clustering techniques are popularized. In clustering, sensor nodes group together to generate small clusters and CH is elected for aggregating data coming from cluster members. For large networks, hierarchical clustering model is applicable to assemble data at every cluster and transmit that processed data to the base station. This phase out repetitious data to be communicated which further curtail energy consumption. Various LEACH protocols are discussed in this review to enhance network lifetime.

Бесплатно

Investigations of Cellular Automata Linear Rules for Edge Detection

Investigations of Cellular Automata Linear Rules for Edge Detection

Fasel Qadir, Khan K. A.

Статья научная

Edge detection of images is one of the basic and most significant operations in image processing and is used for object background separation, 3-D interpretation of a 2-D image, and pre-processing in image understanding and recognition algorithms. In this paper we investigate cellular automata linear rules for edge detection and based on this investigation we have classified the rules into no edge detection rules, strong edge detection rules and weak edge detection rules. Finally, we show the comparative analysis of the proposed technique with already defined techniques for edge detection and the results show desirable performance.

Бесплатно

Журнал