International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1130

Method of Parallel Information Object Search in Unified Information Spaces
Статья научная
The article describes the concept of a unified information space and an algorithm of its formation using a special information and computer system. The process of incoming object search in a unified information space is considered, which makes it possible to uniquely identify it by corresponding features. One of the main tasks of a unified information space is that each information object in it is uniquely identified. For this, the identification method was used, which is based on a step-by-step analysis of object characteristics. The method of parallel information object search in unified information spaces is proposed, when information object search will be conducted independently in all unified information spaces in parallel. Experimental studies of the method of parallel information object search in unified information spaces were conducted, on the basis of which the analysis of efficiency and incoming objects search time in unified information spaces was carried out. There was experimentally approved that the more parameters that describe the information object, the less the time of object identification depends on the length of the interval. Also, there was experimentally approved that the efficiency of the searching of the incoming objects in unified information spaces tends to a directly proportional relationship with a decrease in the length of the interval and an increase in the number of parameters, and vice versa.
Бесплатно

Method of Performing Operations on the Elements of GF(2m) Using a Sparse Table
Статья научная
For the implementation of error-correcting codes, cryptographic algorithms, and the construction of homomorphic methods for privacy-preserving, there is a need for methods of performing operations on elements GF(2m) that have low computational complexity. This paper analyzes the existing methods of performing operations on the elements GF(2m) and proposes a new method based on the use of a sparse table of elements of this field. The object of research is the processes of operations in information security systems. The subject of research is methods and algorithms for performing operations on elements GF(2m). The purpose of this research is to develop and improve methods and algorithms for performing operations on elements GF(2m) to reduce their computational complexity. Empirical methods and methods of mathematical and software modeling are used in the research. Existing and proposed algorithms are implemented using the C# programming language in the Visual Studio 2015 development environment. Experimental research of existing and developed algorithms was carried out according to the proposed method, which allows to level the influence of additional parameters on the results of the research. The conducted research on methods for performing operations on the elements GF(2m) shows the expediency of using a sparse table of field elements. This approach makes it possible to reduce the amount of RAM required for the software and hardware implementation of the developed method compared to the classical tabular method, which requires storage of a full table of correspondence of the polynomial and index representation of the field elements. In addition, the proposed method gives an increase in speed of more than 4 times for the operations of calculating the multiplicative inverse element and exponentiation. As a result, the proposed method allows to reduce the computational complexity of error-correcting codes, cryptographic algorithms, and the homomorphic methods for privacy-preserving.
Бесплатно

Статья научная
The paper describes the organization of the unified information space which is based on the uniform principles and the general rules that ensure the informational interaction of objects. In practice, in case when the communication with an information object of the unified information space is lost, the necessary information about this object should be collected by the analysis of previous interactions of the information object with the other information objects. The goal of this paper article is to develop a mechanism that will allow restore the missing parameters of information objects in case of communication loss with this object. There was performed the experimental researches with the proposed mechanisms. The experiments have shown that there is an unequivocal relationship between the quality of restoration of an information object and the topology of links within an unified information space.
Бесплатно

Methodology for Benchmarking IPsec Gateways
Статья научная
The paper analyses forwarding performance of IPsec gateway over the rage of offered loads. It focuses on the forwarding rate and packet loss particularly at the gateway's performance peak and at the state of gateway's overload. It explains possible performance degradation when the gateway is overloaded by excessive offered load. The paper further evaluates different approaches for obtaining forwarding performance parameters – a widely used throughput described in RFC 1242, maximum forwarding rate with zero packet loss and us proposed equilibrium throughput. According to our observations equilibrium throughput might be the most universal parameter for benchmarking security gateways as the others may be dependent on the duration of test trials. Employing equilibrium throughput would also greatly shorten the time required for benchmarking. Lastly, the paper presents methodology and a hybrid step/binary search algorithm for obtaining value of equilibrium throughput.
Бесплатно

Статья научная
For the first time was researched the dynamic models of the data defensive system (DMDDS) in social networks (SN) from the volumes of development of social networks (VSNE) were investigated and the reliability of the data defensive system (RDDS), which indicates the academic achievements of this work. Created DMDDS in CN from the conditions of RDDS. In the DMDDS, currently known opportunities, actions and technologies are involved, for which the modality of uncertainty is confirmed as a state of a defined condition on a time grid, and this relationship interprets the transformation of the previous state over time. SN is a set of actors and their types of communications. Actors can be people themselves, their subgroups, associations, settlements, territories, continents. The form of interaction includes not only the transmission and reception of information, but also communication, exchange of opportunities and types of activities, including controversial points and views. From the point of view of mathematics, a prototype of the DMDDS was developed on the basis of nonlinear differential equations (NDE) and its transcendental review was carried out. Transcendental review of dynamic models of DMSDD in SN proved that parameters of VSNE significantly influence data defensives (DD) at possible value values - up to one hundred percent. The phase types (PT) of DD have been checked, which prove RDDS in the working volume of values even at the maximum values of negative excitations. For the first time the research of the developed NDE systems was conducted and the quantitative values between the VSNE parameters and the DD values, as well as the RDDS, were shown, which indicates the theoretical and practical value of the scientific work and its significance for the further development of scientific research in the field of SN. The proposed model will contribute to increasing the quality and reliability of DD in SN around the world.
Бесплатно

Microcontroller Based Home Security and Load Controlling Using Gsm Technology
Статья научная
"Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detection and lock system etc. Furthermore it has advanced security compared to other houses and can send a message to the user for action that occur inside his/her house while he/she is away from home. It can also allow a person to control appliances from a remote location by mobile phone using GSM technology.
Бесплатно

Minimization of Power Consumption in Mobile Adhoc Networks
Статья научная
An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited battery source. Also, due to node mobility, link failures in such networks are very frequent and render certain standard protocols inefficient resulting in wastage of power and loss in throughput. The power consumption is an important issue with the goal to maintain the network lives for long by consuming less power. The power consumption can be achieved by modifying algorithms such as cryptographic algorithms,Routing algorithms, Multicast Algorithms, Energy Efficient Algorithms and Power Consumption Techniques in High Performance Computing, Compression and decompression algorithms, minimizing link failure algorithms, and by power control algorithms. In this work, we have proposed a new algorithm for minimization of power consumption in Ad hoc networks. The performance of the proposed model is analyzed and it is observed that, information could be sent with security consuminglesscomputational power, thereby increasing the battery life.
Бесплатно

Mining Data Streams using Option Trees
Статья научная
In today's applications, evolving data streams are stored as very large databases; the databases which grow without limit at a rate of several million records per day. Data streams are ubiquitous and have become an important research topic in the last two decades. Mining these continuous data streams brings unique opportunities, but also new challenges. For their predictive nonparametric analysis, Hoeffding-based trees are often a method of choice, which offers a possibility of any-time predictions. Although one of their main problems is the delay in learning progress due to the presence of equally discriminative attributes. Options are a natural way to deal with this problem. In this paper, Option trees which build upon regular trees is presented by adding splitting options in the internal nodes to improve accuracy, stability and reduce ambiguity. Results based on accuracy and processing speed of algorithm under various memory limits is presented. The accuracy of Hoeffding Option tree with Hoeffding trees under circumstantial conditions is compared.
Бесплатно

Статья научная
IoT provides big contribution to healthcare for elderly care at home. There are many attacks in IoT healthcare network which may destroy the entire network. A propose a framework may be produced an efficient treatment for elderly care at home with low power consumption. A framework contains three phases names; medical data collection layer, routing and network layer and medical application layer. It intends to increase security performance through prediction and detection attacks in real time. Cooja simulator is used for generating real-time IoT routing datasets including normal and malicious motes based on different types of power. The generated IoT routing dataset using data augmentation (SMOTE) to increase the size of dataset. The preprocessing of the generating dataset using three methods of feature selection which are weight by rule, Chi-Squared and weight by tree importance using random forest reduce noise and over-fitting. A proposed model uses convolution neural network (CNN) to detect and predict IoT routing attacks to identify suspicious network traffic. A number of studies have been carried out in this area, but the issue of the extent of the impact of attacks on energy consumption is an interesting topic. Attacks can affect the network completely, in particular on the power consumption of smart devices. Therefore; the main target of this research is detecting and predicting different types of IoT routing attacks which have impact on power consumption and destroy the entire network. This work analyzes the impact of IoT routing attacks on different power consumption using CNN to achieve low power consumption by detecting different types of routing attacks. The experimental results show CNN can detect different types of attacks that have a bad impact on power consumption. It achieves high accuracy, precision, recall, correlation and low rate in error and logistic loss and this leads to decrease power consumption.
Бесплатно

Статья научная
In recent years the domain of Internet of Things (IoT) has acquired great interest from the ICT community. Environmental observation and collecting information is one of the key reasons that IoT infrastructure facilitates the creation of many varieties of the latest business methods and applications. There are however still issues about security measures to be resolved to ensure adequate operation of devices. Distributed Denial of Service (DDoS) attacks are currently the most severe virtual threats that are causing serious damage to many IoT devices. With this in mind, numerous research projects were carried out to discover new methods and develop Novel techniques and solutions for DDOS attacks prevention. The use of new technology, such as software-defined networking (SDN) along with IoT devices has proven to be an innovative solution to mitigate DDoS attacks. In this article, we are using a novel data sharing system in IoT units that link IoT units with the SDN controller and encrypt information from IoT unit. We use conventional Redstone cryptographic algorithms to encrypt information from IoT devices in this framework. The Proposed Belief Based Secure Correlation methodology supports the prevention of DDOS attacks and other forms of data attacks. The system proposes new routes for transmission through the controller and communicates with approved switches for the safe transmission of data. To simulate our entire scenario, we proposed the algorithm Belief Based Secure Correlation (BBSC) implemented in SDN–IoT Testbed and verified IoT data is secure during transmission in the network.
Бесплатно

Mobile Governance based on WiMAX Connectivity for Rural Development in India
Статья научная
The research work aims to explore the nature, role and relevance of the wireless technologies such as WiMAX connectivity for rural area of Jalgoan district, India. It focuses on development of the WiMAX(Worldwide Interoperability for Microwave Access) network model using OPNET MODELER 14.5 and observe overall performance with fixed , mobile node with two base station .The model is Proposed to connect 50GKC (nodes), which are distributed all over coverage area of Jalgoan district using WiMAX connectivity. The 50 number of GKC are proposed to work in between 783Gram panchayats of Jalgoan district which is supposed to run with the support of Gram panchayat head . The scope of WiMAX is to provide last mile wireless broadband access for fixed and mobile users as an alternative to the wire line DSL and cable access. The physical and MAC layer of this technology refer to the IEE802.16e standard which supports five different data delivery service classes that can be used in order to satisfy QOS requirement of different applications such as VOIP, videoconference, FTP, web etc. The work is divided in three scenarios (network model), each scenario consist of different number of nodes with two BS and performance is observed with audio and video application such as VOIP and MPEG .All simulation results based on optimized network and area considered between two base station. The work provide the high speed wireless connectivity platform to build Electronic Governance project in Jalgoan district.
Бесплатно

Mobile Localization Based on Clustering
Статья научная
This work presents a mobile location management technique based on the clustering. This technique can be implemented on next generation mobile networks by exploiting the data available on the users (age, function, address, workplace… etc), existing infrastructure (roads, location of base stations… etc) and the users' displacements history. The simulations are carried out using a realistic model of movements. The results show that our strategy requires a minimum number of location messages compared to the static and dynamic location management techniques.
Бесплатно

Mobile-Based Medical Emergency Ambulance Scheduling System
Статья научная
Effective and efficient public service delivery like healthcare services are very important in today's society, especially in the rural areas. People in rural areas are expected to have access to public facilities at all times. However, these services are not always available when they are needed. This paper discusses the problems faced by rural areas of Mafikeng in South Africa (SA) when public and basic healthcare facilities like medical ambulance transports are needed during emergency situation. The challenges ranges from poor communication, poor road network and unstructured address to non-arrival of ambulances leading loss of lives that are preventable. This paper designed and implemented a system prototype using mobile application technologies to offer cost-effective services to patients during emergencies. It is intended to reduce long queues in hospitals and long waiting periods for an ambulance via location-based services. By using this application, lives in the rural areas can be made easier and loss of lives prevented by providing timely response from the appropriate healthcare providers during emergencies.
Бесплатно

Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Статья научная
Clustering in Mobile Ad-hoc Networks (MANETs) has become a crucial research issue in modern days, because clustering can improve system performance of MANETs. As MANETs have limited battery power supply, cluster formation is costly in terms of power depletion of nodes in the cluster. This is due to the huge amount of messages transmission required during cluster formation and further data transfer. In this paper, an extensive literature survey of MANET clustering algorithm was done and lastly we proposed an algorithm for cluster head selection and cluster maintenance. The proposed algorithm uses self-organizing principle for binding a node with a cluster, which can reduce the explicit message passing in cluster maintenance. Thus, there is no need of extra message passing during further cluster maintenance. Unlike most usual methods, a cluster head in our proposed algorithm acts only as an identifying tag for cluster entity, further it performs as a typical node when it is acting as head. It does not perform any cluster maintenance function or hierarchical routing and hence is not a bottleneck to the functioning of the cluster.
Бесплатно

Mobility support and operation of information centric networking approach
Статья научная
Recent development in mobile technology makes data traffic intensifies, due to the vast devices connectivity. Also, increases the needs for efficient and scalable distribution of data and services over the Internet. Therefore, the Information Centric Networking paradigm was proposed, with different approaches as a clean-slate redesign of current host-centric Internet architecture. It evolved to access data independent from its location, by replacing IP addresses with content named. This paper reviews the most popular Information Centric Networking approaches, review and summarizes some of its features, such as naming, routing, caching and mobility in tabular form. In addition, the modes of operations based on named resolution services and named based routing for the approaches with some network exemplary diagrams were presented. Also, mobility supports for consumer, and mobility challenges from current to feature Internet were discussed for future research.
Бесплатно

Modeling GSM Based Network Communication in Vehicular Network
Статья научная
Obviously fair communication establishment in every technology increases the efficiency. As we know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will increase the safety of the passengers by communicating with one another. In this paper, we propose GSM based network communication in vehicles, which will develop reliable network communication between vehicles, mobile phones and home based telephones. The added advantage GSM based network communication among vehicles will lead to safety of travel by tracking the vehicle's location, since GSM based network communication is established in vehicles.
Бесплатно

Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks
Статья научная
The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the signal in the current channel. The existing call is then changed to a new base station. For the traffics which are non stationary at and are away from the servicing base station, the chances of a call to be handed off are increasing. In this paper we propose a scheme MH_2S to modeling and implementing a traffic model with handoff behavior for wireless mobile networks . The simulation model MH_2S with priority is developed to investigate the performance behavior of hard handoff strategy. Novelty of the proposed model MH_2S results that it can improve call blocking rate of handoff calls. In addition to this, measurement of blocking probabilities for both originating calls and handoff calls is another impressive achievement of the model.
Бесплатно

Статья научная
The configuration of port’s loading-and-unloading equipment is an optimization problem, which endeavors to put limited handling equipment to each operating line to achieve the maximum overall production efficiency. We set up the T-stage decision-making model of loading-and-unloading line equipment configuration by using the method of Multi-stage Decision, and design the algorithm of the mathematical model. Research results in this paper lay the foundation for the development of loading-and-unloading equipment configuration system, and provide scientific basis for the decision of type selection and rational quantity of loading-and-unloading equipment.
Бесплатно

Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control
Статья научная
Wireless sensor networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs’ work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the issue of intermitted network connection in WSNs. To the best of our knowledge, few papers did related work on how to utilize intermitted network connection to control the topology of WSNs and save the battery of nodes in WSNs. Although intermitted network connection in WSNs is not a good phenomenon, when it occurs, it indeed can keep some nodes in power saving mode. If we can intelligently control WSNs network topology and get intermitted network connection during the intervals of transmission, we will find another way to save the nodes energy to the maximum extent. Based on these ideas, we import the idea of Delay Tolerant Network (DTN) protocol to address the issue. In this paper, first we give the modeling and analysis on node behaviors in DTN WSNs, then we present the end to end performance analysis in DTN WSNs to get the parameters of optimistic hops, maximum hops and each node’s neighbor number, after that we give some basic rules on DTN parameters selection for DTN based WSNs topology control. Finally, we do a related simulation by our DTN based WSNs topology control approach and HER routing algorithm; simulation results show that our approach and algorithm gained better performance in WSN life span, nodes energy equilibrium consumption than DADC.
Бесплатно

Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets
Статья научная
In this paper, we present a new Petri Net (PN) approach to model the IEEE 802.16 MAC Protocol called Higher-Order Stochastic Reward Net (HOSRN) and through the application of the proposed rule. HOSRN is used as a modeling formalism as it readily captures the quality of service requirements of the traffic classes. We apply HOSRN to verify the effectiveness of QoS of the protocol using Reachability graph.
Бесплатно