Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1148

Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks

Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks

Mimi M. Cherian, Satishkumar L. Varma

Статья научная

In recent years the domain of Internet of Things (IoT) has acquired great interest from the ICT community. Environmental observation and collecting information is one of the key reasons that IoT infrastructure facilitates the creation of many varieties of the latest business methods and applications. There are however still issues about security measures to be resolved to ensure adequate operation of devices. Distributed Denial of Service (DDoS) attacks are currently the most severe virtual threats that are causing serious damage to many IoT devices. With this in mind, numerous research projects were carried out to discover new methods and develop Novel techniques and solutions for DDOS attacks prevention. The use of new technology, such as software-defined networking (SDN) along with IoT devices has proven to be an innovative solution to mitigate DDoS attacks. In this article, we are using a novel data sharing system in IoT units that link IoT units with the SDN controller and encrypt information from IoT unit. We use conventional Redstone cryptographic algorithms to encrypt information from IoT devices in this framework. The Proposed Belief Based Secure Correlation methodology supports the prevention of DDOS attacks and other forms of data attacks. The system proposes new routes for transmission through the controller and communicates with approved switches for the safe transmission of data. To simulate our entire scenario, we proposed the algorithm Belief Based Secure Correlation (BBSC) implemented in SDN–IoT Testbed and verified IoT data is secure during transmission in the network.

Бесплатно

Mobile Governance based on WiMAX Connectivity for Rural Development in India

Mobile Governance based on WiMAX Connectivity for Rural Development in India

Kalpana Chaudhari, Upena D Dalal, Rakesh Jha

Статья научная

The research work aims to explore the nature, role and relevance of the wireless technologies such as WiMAX connectivity for rural area of Jalgoan district, India. It focuses on development of the WiMAX(Worldwide Interoperability for Microwave Access) network model using OPNET MODELER 14.5 and observe overall performance with fixed , mobile node with two base station .The model is Proposed to connect 50GKC (nodes), which are distributed all over coverage area of Jalgoan district using WiMAX connectivity. The 50 number of GKC are proposed to work in between 783Gram panchayats of Jalgoan district which is supposed to run with the support of Gram panchayat head . The scope of WiMAX is to provide last mile wireless broadband access for fixed and mobile users as an alternative to the wire line DSL and cable access. The physical and MAC layer of this technology refer to the IEE802.16e standard which supports five different data delivery service classes that can be used in order to satisfy QOS requirement of different applications such as VOIP, videoconference, FTP, web etc. The work is divided in three scenarios (network model), each scenario consist of different number of nodes with two BS and performance is observed with audio and video application such as VOIP and MPEG .All simulation results based on optimized network and area considered between two base station. The work provide the high speed wireless connectivity platform to build Electronic Governance project in Jalgoan district.

Бесплатно

Mobile Localization Based on Clustering

Mobile Localization Based on Clustering

Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM

Статья научная

This work presents a mobile location management technique based on the clustering. This technique can be implemented on next generation mobile networks by exploiting the data available on the users (age, function, address, workplace… etc), existing infrastructure (roads, location of base stations… etc) and the users' displacements history. The simulations are carried out using a realistic model of movements. The results show that our strategy requires a minimum number of location messages compared to the static and dynamic location management techniques.

Бесплатно

Mobile-Based Medical Emergency Ambulance Scheduling System

Mobile-Based Medical Emergency Ambulance Scheduling System

Bassey Isong, Nosipho Dladlu, Tsholofelo Magogodi

Статья научная

Effective and efficient public service delivery like healthcare services are very important in today's society, especially in the rural areas. People in rural areas are expected to have access to public facilities at all times. However, these services are not always available when they are needed. This paper discusses the problems faced by rural areas of Mafikeng in South Africa (SA) when public and basic healthcare facilities like medical ambulance transports are needed during emergency situation. The challenges ranges from poor communication, poor road network and unstructured address to non-arrival of ambulances leading loss of lives that are preventable. This paper designed and implemented a system prototype using mobile application technologies to offer cost-effective services to patients during emergencies. It is intended to reduce long queues in hospitals and long waiting periods for an ambulance via location-based services. By using this application, lives in the rural areas can be made easier and loss of lives prevented by providing timely response from the appropriate healthcare providers during emergencies.

Бесплатно

Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network

Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network

Soumyabrata Talapatra, Alak Roy

Статья научная

Clustering in Mobile Ad-hoc Networks (MANETs) has become a crucial research issue in modern days, because clustering can improve system performance of MANETs. As MANETs have limited battery power supply, cluster formation is costly in terms of power depletion of nodes in the cluster. This is due to the huge amount of messages transmission required during cluster formation and further data transfer. In this paper, an extensive literature survey of MANET clustering algorithm was done and lastly we proposed an algorithm for cluster head selection and cluster maintenance. The proposed algorithm uses self-organizing principle for binding a node with a cluster, which can reduce the explicit message passing in cluster maintenance. Thus, there is no need of extra message passing during further cluster maintenance. Unlike most usual methods, a cluster head in our proposed algorithm acts only as an identifying tag for cluster entity, further it performs as a typical node when it is acting as head. It does not perform any cluster maintenance function or hierarchical routing and hence is not a bottleneck to the functioning of the cluster.

Бесплатно

Mobility support and operation of information centric networking approach

Mobility support and operation of information centric networking approach

Muktar Hussaini, Shahrudin A. Nor, Amran Ahmad, Inusa Sani Maijama’a, Adamu Isah, Abdullahi Aminu

Статья научная

Recent development in mobile technology makes data traffic intensifies, due to the vast devices connectivity. Also, increases the needs for efficient and scalable distribution of data and services over the Internet. Therefore, the Information Centric Networking paradigm was proposed, with different approaches as a clean-slate redesign of current host-centric Internet architecture. It evolved to access data independent from its location, by replacing IP addresses with content named. This paper reviews the most popular Information Centric Networking approaches, review and summarizes some of its features, such as naming, routing, caching and mobility in tabular form. In addition, the modes of operations based on named resolution services and named based routing for the approaches with some network exemplary diagrams were presented. Also, mobility supports for consumer, and mobility challenges from current to feature Internet were discussed for future research.

Бесплатно

Modeling GSM Based Network Communication in Vehicular Network

Modeling GSM Based Network Communication in Vehicular Network

M. Milton Joe, B. Ramakrishnan, R. S. Shaji

Статья научная

Obviously fair communication establishment in every technology increases the efficiency. As we know well, vehicles are used in day to day life of every human being to move from one location to another location. If network communication is formed between vehicles, mobile phones and home based telephones, it will increase the safety of the passengers by communicating with one another. In this paper, we propose GSM based network communication in vehicles, which will develop reliable network communication between vehicles, mobile phones and home based telephones. The added advantage GSM based network communication among vehicles will lead to safety of travel by tracking the vehicle's location, since GSM based network communication is established in vehicles.

Бесплатно

Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

Modeling Prioritized Hard Handoff Management Scheme for Wireless Mobile Networks

BISWAJIT BHOWMIK, POOJA, PIYALI SARKAR, NUPUR THAKUR

Статья научная

The channel associated with the current connection serviced by a base station is changed while a call is in progress. Usually, continuous service is achieved by supporting handoff from one cell to another. It is often initiated either by crossing a cell boundary or by deterioration in quality of the signal in the current channel. The existing call is then changed to a new base station. For the traffics which are non stationary at and are away from the servicing base station, the chances of a call to be handed off are increasing. In this paper we propose a scheme MH_2S to modeling and implementing a traffic model with handoff behavior for wireless mobile networks . The simulation model MH_2S with priority is developed to investigate the performance behavior of hard handoff strategy. Novelty of the proposed model MH_2S results that it can improve call blocking rate of handoff calls. In addition to this, measurement of blocking probabilities for both originating calls and handoff calls is another impressive achievement of the model.

Бесплатно

Modeling and Accomplishment of Loading-and-Unloading Equipment Optimum Allocation System at Bulk Terminal

Modeling and Accomplishment of Loading-and-Unloading Equipment Optimum Allocation System at Bulk Terminal

Xueping Wang, Lei Wu, Mingwang Dong

Статья научная

The configuration of port’s loading-and-unloading equipment is an optimization problem, which endeavors to put limited handling equipment to each operating line to achieve the maximum overall production efficiency. We set up the T-stage decision-making model of loading-and-unloading line equipment configuration by using the method of Multi-stage Decision, and design the algorithm of the mathematical model. Research results in this paper lay the foundation for the development of loading-and-unloading equipment configuration system, and provide scientific basis for the decision of type selection and rational quantity of loading-and-unloading equipment.

Бесплатно

Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

Modeling and Analysis on a DTN Based Wireless Sensor Network Topology Control

Luqun Li

Статья научная

Wireless sensor networks (WSNs) have unlimited and extensive potential application in different areas. Due to WSNs’ work environments and nodes behavior, intermitted network connection may occur frequently, which lead packets delay and lose in the process of data transmission. Most related works on WSNs, seldom consider how to address the issue of intermitted network connection in WSNs. To the best of our knowledge, few papers did related work on how to utilize intermitted network connection to control the topology of WSNs and save the battery of nodes in WSNs. Although intermitted network connection in WSNs is not a good phenomenon, when it occurs, it indeed can keep some nodes in power saving mode. If we can intelligently control WSNs network topology and get intermitted network connection during the intervals of transmission, we will find another way to save the nodes energy to the maximum extent. Based on these ideas, we import the idea of Delay Tolerant Network (DTN) protocol to address the issue. In this paper, first we give the modeling and analysis on node behaviors in DTN WSNs, then we present the end to end performance analysis in DTN WSNs to get the parameters of optimistic hops, maximum hops and each node’s neighbor number, after that we give some basic rules on DTN parameters selection for DTN based WSNs topology control. Finally, we do a related simulation by our DTN based WSNs topology control approach and HER routing algorithm; simulation results show that our approach and algorithm gained better performance in WSN life span, nodes energy equilibrium consumption than DADC.

Бесплатно

Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets

Modeling and Verification of 802.16 MAC Protocol using Higher-Order Petri Nets

Ali Mohammed Meligy, Hani Mohammed Ibrahim, Amal Mohammed Aqlan

Статья научная

In this paper, we present a new Petri Net (PN) approach to model the IEEE 802.16 MAC Protocol called Higher-Order Stochastic Reward Net (HOSRN) and through the application of the proposed rule. HOSRN is used as a modeling formalism as it readily captures the quality of service requirements of the traffic classes. We apply HOSRN to verify the effectiveness of QoS of the protocol using Reachability graph.

Бесплатно

Modeling of the Сellular Сommunication System Coverage Area Taking into Account the External Details of the Terrain

Modeling of the Сellular Сommunication System Coverage Area Taking into Account the External Details of the Terrain

Yevhen Gabrousenko, Anatolii Taranenko, Felix Yanovsky, Serhii Zavhorodnii

Статья научная

This paper proposes a new approach to estimating the contour of the coverage zone for a cellular communications base station that takes into account meaningful reflecting objects located out of the considering zone. Based on this approach, the procedure for modeling and designing the cellular system coverage area. Unlike known methods, the developed procedure considers the influence of electromagnetic wave reflection from external details of the relief, in particular essential reflecting objects located outside the considered cell. The effect of the external objects on the formation of the coverage area resulting contour is considered analytically, numerically and experimentally. The proposed solution leads to more accurate designing of the coverage area for each cell. This creates the opportunity for further development of designing techniques to more effective engineering solutions at developing and applying cellular communication systems in real situations and at various scenarios.

Бесплатно

Modelling and Implementation of Network Coding for Video

Modelling and Implementation of Network Coding for Video

Can Eyupoglu, Ugur Yesilyurt

Статья научная

In this paper, we investigate Network Coding for Video (NCV) which we apply for video streaming over wireless networks. NCV provides a basis for network coding. We use NCV algorithm to increase throughput and video quality. When designing NCV algorithm, we take the deadline as well as the decodability of the video packet at the receiver. In network coding, different flows of video packets are packed into a single packet at intermediate nodes and forwarded to other nodes over wireless networks. There are many problems that occur during transmission on the wireless channel. Network coding plays an important role in dealing with these problems. We observe the benefits of network coding for throughput increase thanks to applying broadcast operations on wireless networks. The aim of this study is to implement NCV algorithm using C programming language which takes the output of the H.264 video codec generating the video packets. In our experiments, we investigated improvements in terms of video quality and throughput at different scenarios.

Бесплатно

Modification of RC4 Algorithm by using Two State Tables and Initial State Factorial

Modification of RC4 Algorithm by using Two State Tables and Initial State Factorial

Sura M. Searan, Ali M. Sagheer

Статья научная

RC4 algorithm is one of the most significant stream and symmetric cryptographic algorithms, it is simple and used in various commercial products, it has many weaknesses such as a bias in the key stream that some key bytes are biased toward some values. In this paper, a new algorithm is proposed by using initial state factorial to solve the correlation issue between public known outputs of the internal state by using an additional state table with the same length as that of the state to contain the factorial of initial state elements. The analysis of RC4 and developed RC4 algorithm is done based on their single bias and double byte bias and shows that many keystream output bytes of RC4 are produced key stream bytes that are biased to many linear combinations while developed RC4 key bytes have no single and double biases. The results show that the series that is generated by developed RC4 is more random than that generated by RC4 and the developed algorithm is faster than RC4 execution time and requires less time. Additionally, the developed algorithm is robust against many attacks such as distinguishing attack.

Бесплатно

Modified CNN Model for Network Intrusion Detection and Classification System Using Local Outlier Factor-based Recursive Feature Elimination

Modified CNN Model for Network Intrusion Detection and Classification System Using Local Outlier Factor-based Recursive Feature Elimination

Kondru Mounika, P. Venkateswara Rao, Anand Anbalagan

Статья научная

An intrusion detection system (IDS) is either a part of a software or hardware environment that monitors data and analyses it to identify any attacks made against a system or a network. Traditional IDS approaches make the system more complicated and less efficient, because the analytical properties process is difficult and time-consuming. This is because the procedure is complex. Therefore, this research work focuses on a network intrusion detection and classification (NIDCS) system using a modified convolutional neural network (MCNN) with recursive feature elimination (RFE). Initially, the dataset is balanced with the help of the local outlier factor (LOF), which finds anomalies and outliers by comparing the amount of deviation that a single data point has with the amount of deviation that its neighbors have. Then, a feature extraction selection approach named RFE is applied to eliminate the weakest features until the desired number of features is achieved. Finally, the optimal features are trained with the MCNN classifier, which classifies intrusions like probe, denial-of-service (DoS), remote-to-user (R2U), user-to-root (U2R), and identifies normal data. The proposed NIDCS system resulted in higher performance with 99.3% accuracy and a 3.02 false alarm rate (FAR) as equated to state-of-the-art NIDCS approaches such as deep neural networks (DNN), ResNet, and gravitational search algorithms (GSA).

Бесплатно

Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing

Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing

S. Udhaya Chandrika, T. Pramananda Perumal

Статья научная

Cloud computing technologies comprise various kinds of significant desirable constrains such as security, liability, government surveillance, telecommunications capacity, anonymity and privacy. The usage of cipher text technology is considered as a desired technique for performing the process of encryption in order to solve the issue of granting security to the data that are shared in the cloud. Similarly, the architecture of multi-tenant in the cloud computing system grants benefits to both the service providers and end-users which shares a common cloud platform to multiple tenants (i.e.) users and suitable resources are also computed by implementing proposed architecture. Therefore in this research work, the concept of cipher text multi-tenant are integrated for providing enhanced security to the data shared in the cloud environment. Hence a Modified Elliptic Curve Cryptography (MECC) based on Diffee Hellman algorithm is proposed in this research paper which provides enhanced security using alternate key generation. The encryption, decryption, upload and download time are calculated and it is concluded that the algorithm that is proposed in this research paper consumes less time for all these measures when comparing with other existing algorithms. Characteristics like less memory, high operational performance, small sized keys and rapid key generation process, and effective resource savings enable the modified ECC to obtain high efficiency. The encryption time of the proposed MECC system was 51ms with the key length 4096 bits, whereas existing method had 92ms as encryption time. Likewise With the key length of 4096 bits, the decryption time for the proposed model was 159ms. Accordingly the proposed system has reduced cipher text key size of 836KB when compared with the existing AES, Blow Fish, and Two Fish. Additionally, the key generation time (35 s) also seems to be considerably reduced when compared with the existing methods. These statements reveal that the proposed system outshine the state of art methods in terms of key generation time, encryption and decryption time and computational complexity.

Бесплатно

Modified Key Derivation Function for Enhanced Security of Speck in Resource-Constrained Internet of Things

Modified Key Derivation Function for Enhanced Security of Speck in Resource-Constrained Internet of Things

Roman Alex F. Lustro

Статья научная

Randomness is an imperative component in every cryptographic algorithm to guarantee secret keys are unpredictable and secured against all forms of attacks. Speck generated sequence is non-random, a clear sign that it falls beyond the acceptable success rate when tested in statistical analysis. Thus, this study resolves the non-randomness by integrating a novel key derivation function that uses elementary operators designed for lightweight application. This design aims not to compromise performance when implemented on software and hardware. As a result, the modified Speck successfully passed the NIST SP 800 - 22 and Dieharder v3.31.0 Statistical Test Analysis as no p-value is flagged as failed during testing. Hence, making modified Speck cryptographically secured. Nevertheless, a 1.06% decrease in the figure of merit of the modified Speck still makes it worthier in a resource-constrained Internet of Things application as contrasted to Speck because it is proven to be beyond cryptographically secured.

Бесплатно

Modified LEACH-DT Algorithm with Hierarchical Extension for Wireless Sensor Networks

Modified LEACH-DT Algorithm with Hierarchical Extension for Wireless Sensor Networks

Vrinda Gupta, Rajoo Pandey

Статья научная

The selection of cluster heads is of immense importance in the cluster based protocols which are widely used in wireless sensor networks. However, for the random selection of cluster heads when the distance of cluster heads is also taken into account such as in LEACH-DT algorithm, the lifetime of the network is improved. In this paper, a new algorithm for selection of cluster heads is proposed where the residual energy of the cluster heads is also considered along with the distance to the base station. The proposed approach ensures better energy balance of the network nodes. The performance of the proposed algorithm is measured at various stages of network lifetime and a significant improvement over LEACH-DT has been observed. Also, a two-level heterogeneous hierarchical architecture of the proposed algorithm is investigated which further enhances the performance of the proposed algorithm.

Бесплатно

Monitoring of military base station using flooding and ACO technique: an efficient approach

Monitoring of military base station using flooding and ACO technique: an efficient approach

Abdus Samad, Mohammed Shuaib, Mohd Rizwan Beg

Статья научная

Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.

Бесплатно

Multi Attribute Trust Aware Routing for Adversary Detection in Wireless Sensor Networks

Multi Attribute Trust Aware Routing for Adversary Detection in Wireless Sensor Networks

Akshatha Hari Bhat, Balachandra Achar H.V., Anil Mehta

Статья научная

Security attacks has become major obstacles in Wireless Sensor Networks (WSN) and Trust Aware Routing is second line of defense. With an aim to improve on the existing routing mechanisms, in this paper, we propose Interactive, Onlooker and Capability Trust Aware Routing (IOC-TAR), a multi-trust attribute framework for trust management in WSNs. IOC-TAR employs three trust features to establish a trustworthy relationship between sensor nodes for their cooperation. Interactive trust uses communication interactions, onlooker trust uses neighbor node’s opinions and capability trust uses stability and fault tolerance for trust assessment. For, each node, one composite trust factor is formulated and decides its trustworthiness. Extensive simulation experiments are conducted to evaluate the effectiveness and efficiency of proposed IOC-TAR in the identification of malicious nodes and the provision of attack resilience. The results declare that the IOC-TAR enhances the attack resilience by improving Malicious Detection rate and reducing False Positive Rate.

Бесплатно

Журнал