Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

Multimedia Traffic Transmission using MAODV and M-MAODV Routing Protocols over Mobile Ad-hoc Networks

Multimedia Traffic Transmission using MAODV and M-MAODV Routing Protocols over Mobile Ad-hoc Networks

Lavanya. Poluboyina, Mallikarjuna Prasad. A., Sivakumar Reddy. V., S. V. Maruthi Rao

Статья научная

Many applications of mobile ad-hoc networks like conferencing, handling emergency situations, military operations require the multicast routing. Moreover, in such applications there is a demand for multimedia traffic such as audio/video calls or audio/video conferencing. For mobile ad-hoc environments, it is accepted that the on-demand reactive routing protocol AODV has become default. Moreover, to get the benefits of using a single protocol for both unicast and multicast routing, in this work, the multicast routing protocol MAODV (multicast extension of AODV) has been considered and its performance is observed for CBR, VoIP and video data traffics. Since to accommodate multimedia traffic, a routing protocol demands for stringent QoS requirements in terms of delay, jitter and packet losses; the performance of the protocol is measured in terms of QoS performance metrics such as average delay, average jitter and packet delivery ratio. Further, a modified version of MAODV (called M-MAODV) is taken and its performance is also evaluated for multimedia traffic. A fair comparison of MAODV and M-MAODV protocols is achieved through the use of same network conditions for the evaluation. From the results, the improved values of delay, jitter and packet delivery ratio have been observed for M-MAODV irrespective of node speeds and for all data traffic types.

Бесплатно

Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length

Multipath Data Transmission with minimization of Congestion Using Ant Colony Optimization for MTSP and Total Queue Length

Dhriti Sundar Maity, Subhrananda Goswami

Статья научная

This paper represents The Ant Colony Optimization for MTSP and Swarm Inspired Multipath Data Transmission with Congestion Control in MANET using Total Queue Length based on the behavioral nature in the biological ants. We consider the problem of congestion control for multicast traffic in wireless networks. MANET is multi hop wireless network in which the network components such as PC, mobile phones are mobile in nature. The components can communicate with each other without going through its server. One kind of agent (salesman) is engaged in routing. One is Routing agent (salesman), who collects the information about network congestion as well as link failure and same is message agent (salesman) that uses this information to get his destination nodes. Though a number of routing protocols exists, which aim to provide effecting routing but few provide a plausible solution to overall network congestion. We attempt to explore the property of the pheromone deposition by the real ant for MTSP. The proposed algorithm using path pheromone scents constantly updates the goodness of choosing a particular path and measuring the congestion in the network using total queue length and Hop-distance.

Бесплатно

Multiple Information Hiding using Cubical Approach on Random Grids

Multiple Information Hiding using Cubical Approach on Random Grids

Sandeep Gurung, Kritartha Paul Choudhury, Arindam Parmar, Kshitij Panghaal

Статья научная

The exponential growth of data and our dependence on it has increased security concerns over the protection of data. Various methodologies have been suggested to meet the security services namely; confidentiality, authentication and authorization. The (k:n) secret sharing scheme was recommended to isolate the dependence on a single entity for the safety of data. Random Grids Visual Secret Sharing (RGVSS), a category of a Visual Cryptography Secret Sharing scheme aims at encrypting a secret image into several shares using a simple algorithm. The encrypted information can be revealed by stacking the shares which can be recognized by the Human Visual System (HVS). The proposed VSS scheme exploits the geometrical configuration of the cube without distorting any of the secret information embedded on the shares. The rest of the secrets are decrypted by stacking the cubes and changing the orientation of one of the cube over the fixed one. Each side of the cube encrypts up to four secrets, the first secret can be decrypted by stacking the two cubical shares and rotating the stacked face of the cube at 90 degrees, 180 degrees and 270 degrees, reveals the other three shares respectively The proposed scheme increases the capacity of secret communication avoiding the pixel expansion problem which in turn reduces the overhead of storage and communication significantly without compromising on security and authenticity of the secret information.

Бесплатно

Multiple core fibers versus multiple fibers enabled space division multiplexing based elastic optical networks: A performance comparison

Multiple core fibers versus multiple fibers enabled space division multiplexing based elastic optical networks: A performance comparison

Sridhar Iyer

Статья научная

Space Division Multiplexing (SDM) based Elastic Optical Networks (EONs) (SDM-b-EONs) have been envisioned as a solution to both, the required upgradation of the single-mode fiber’s network capacity which is constrained by the non-linear Shannon’s limit and the capacity provisioning which will be necessitated by future diverse Internet traffic. The current SDM-b-EON designs are based on the use of Multiple Fibers (MF) technology; however, recently the Multiple Core Fiber (MCF) technology has gained momentum after laboratory experiments conducted on the MCF models established much lower inter-core crosstalk values. In the current work, we focus on the design of a MCF enabled SDM-b-EON for which, we formulate an Integer Linear Programming (ILP) model and then propose a heuristic algorithm to obtain the solutions for large sized networks in reasonable execution times. We then proceed to the performance comparison of the MCF and the MF enabled SDM-b-EON under the consideration of realistic parameters and network topologies which are characterized by different node(s) numbers and link distances. The obtained results demonstrate that the performance of the MCF enabled SDM-b-EON is very close to that of a MF enabled SDM-b-EON which implies that the network operators can benefit by utilizing the existing components for the MCFs rather than incurring any extra expense to provision the same traffic amount.

Бесплатно

Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate

Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate

Balaji V Durgawad, Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar

Статья научная

Public–key digital certificates are being used in public key infrastructure to provide authentication of the user's public key. Public key digital certificates like X.509 are used to bind a public key to its user. This kind of certificates cannot be used for user authentication. Such use may lead to forgery of user's identity. Lein et al proposed a authentication scheme based on Generalized Digital Certificates (GDC). A GDC consists of user's public information like digital birth certificate, digital identity, etc. and the digital signature of trusted third party generated from that public information. The GDC based scheme provides user authentication and allows for session key establishment. The scheme is secure against forgery of user's identity but it does not provide mutual authentication. The scheme proposed in this paper not only provides mutual authentication and session key but also it preserves the security strength of Lein et al's GDC based scheme.

Бесплатно

Named Data Networking: Investigate of New Infrastructure for Future of Internet

Named Data Networking: Investigate of New Infrastructure for Future of Internet

Hadis Rezaei, Asad Vakili

Статья научная

The Internet main goals are largely achieved, majority of using Internet, are data retrieval and access to services. Whereas host-to-host architecture is designed for applications. According to this problem that existing Internet is like a tree of physical equipment which is established to outflow in packets from each leaf to another leaf, despite having effective communication it has problems in scalability. Also the content-centric network can recognize large amount of information that is produced for first time and used after saving it. The change is using of host-to-host-centric to completely new architecture, that its design represents our understanding of strengths and limitations of architecture of the existing Internet. In NDN applications based data and Content-centric networks, packets are retrieved according to their names instead of their source and destination addresses. This performance is for scalability, security and ease access to data. This paper discussed methods of Internet architecture based data including TDRID, DONA, Netinf, CCN, and NDN.

Бесплатно

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Harminder Singh Bindra, A L Sangal

Статья научная

Recent wireless networks observe number of deployments in various conditions where they come across different intensities of link disconnection. On the basis of extent of the operating circumstances these networks are termed as Intermittently Connected Networks (ICNs). The prevailing TCP/IP protocol cannot be operational in ICNs thus providing number of new stimulating problems that are appealing the focus of the researchers. The multi-copy routing schemes achieve higher delivery probability as compared to the single copy routing scheme. This improvement is achieved at the cost of higher resource utilization i.e. multi-copy routing protocols requires more buffer space, more bandwidth, incur more overheads and consume other vital network resources. Contribution of this work is the deletion of useless replicas of the messages which are already delivered to the intended destination. We evaluate our proposed method by simulation, on four major DTNs routing algorithms: Epidemic, Spray and Wait, ProPHET and MaxProp.

Бесплатно

Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools

Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools

N.Kannaiya Raja, K.Arulanandam, R.Somasundaram

Статья научная

This Paper discusses the digital forensic tool that uses a field Programmable Gate Array [FPGA] based software for deep packet inspection in network Router for a Bit Torrent Handshake message. Extracts the "Information Hashing" of the file being shared, compares the hash against a list of known contraband files for forensic analysis and it matches the message to a log file. Forensic analysis gives several optimization techniques for reducing the CPU time required for reducing the CPU time required to process packets are investigated along with their ability to improve packet capture performance. Experiments demonstrate that the system is able to successfully capture and process Bit Torrent Handshake message with a probability of at least 99.0% under a network traffic load of 89.6 Mbps on a 100 Mbps network.

Бесплатно

Network Traffic Prediction with Reduced Power Consumption towards Green Cellular Networks

Network Traffic Prediction with Reduced Power Consumption towards Green Cellular Networks

Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni

Статья научная

The increased number of cellular network subscribers is giving rise to the network densification in next generation networks further increasing the greenhouse gas emission and the operational cost of network. Such issues have ignited a keen interest in the deployment of energy-efficient communication technologies rather than modifying the infrastructure of cellular networks. In cellular network largest portion of the power is consumed at the Base stations (BSs). Hence application of energy saving techniques at the BS will help reduce the power consumption of the cellular network further enhancing the energy efficiency (EE) of the network. As a result, BS sleep/wake-up techniques may significantly enhance cellular networks' energy efficiency. In the proposed work traffic and interference aware BS sleeping technique is proposed with an aim of reducing the power consumption of network while offering the desired Quality of Service (QoS) to the users. To implement the BS sleep modes in an efficient manner the prediction of network traffic load is carried out for future time slots. The Long Short term Memory model is used for prediction of network traffic load. Simulation results show that the proposed system provides significant reduction in power consumption as compared with the existing techniques while assuring the QoS requirements. With the proposed system the power saving is enhanced by approximately 2% when compared with the existing techniques. His proposed system will help in establishing green communication networks with reduced energy and power consumption.

Бесплатно

Network architectures, challenges, security attacks, research domains and research methodologies in VANET: a survey

Network architectures, challenges, security attacks, research domains and research methodologies in VANET: a survey

Amit Kumar Goyal, Gaurav Agarwal, Arun Kumar Tripathi

Статья научная

The density of traffic is increasing on the daily basis in the world. As a result, congestion, accidents and pollution are also increasing. Vehicular Ad-hoc Network (VANET), a sub class of Mobile Ad-Hoc Network (MANET), is introduced as solutions to manage congestion and accidents on roads. VANET is gaining attention among researchers due to its wide-range applications in the field of Intelligent Transportation System (ITS). The paper focus on communication architectures along with its components and access technologies, challenges and security attacks in VANET. Furthermore, it deals with broad categorization various research domains, research methodologies and research models in VANET. At last, paper explores various application area of VANET.

Бесплатно

Network intrusion detection system based PSO-SVM for cloud computing

Network intrusion detection system based PSO-SVM for cloud computing

Mahmoud M. Sakr, Medhat A. Tawfeeq, Ashraf B. El-Sisi

Статья научная

Cloud computing provides and delivers a pool of on-demand and configurable resources and services that are delivered across the usage of the internet. Providing privacy and security to protect cloud assets and resources still a very challenging issue, since the distributed architecture of the cloud makes it vulnerable to the intruders. To mitigate this issue, intrusion detection systems (IDSs) play an important role in detecting the attacks in the cloud environment. In this paper, an anomaly-based network intrusion detection system (NIDS) is proposed which can monitor and analyze the network traffics flow that targets a cloud environment. The network administrator should be notified about the nature of these traffics to drop and block any intrusive network connections. Support vector machine (SVM) is employed as the classifier of the network connections. The binary-based Particle Swarm Optimization (BPSO) is adopted for selecting the most relevant network features, while the standard-based Particle Swarm Optimization (SPSO) is adopted for tuning the SVM control parameters. The benchmark NSL-KDD dataset is used as the network data source to build and evaluate the proposed system. Acceptable evaluation results state that the proposed system is characterized by detecting the intrusive network connections with high detection accuracy and low false alarm rates (FARs).

Бесплатно

Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks

Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks

Siddesh G.K., Anu H., Chaithanya S., Sathish Shet K.

Статья научная

Mobile Ad-Hoc Networks (MANETs for short) are gaining the importance in the field of wireless communication. The promising feature of MANET is that it can be deployed immediately in demanding situations as they do not require the infrastructure or any centralized structures as compared to traditional wired and wireless networks.An intelligent system has been designed to select an optimum route for various contexts.An efficient protocol is designed to overcome the limits of route finding and link formation in MANET’s. This can be done by making use of the application of soft-computing techniques such as artificial neural networks, fuzzy logic and genetic algorithms. Traditional techniques are based on statistical techniques such as regression models and probabilistic methods.It can be seen from the simulation outcomes that the route finding time using the HYPER-NF-NET simulator which use soft computingtechniques is 20% to the routing finding time using NS-2 simulator. It is also seen from the simulation results that the HYPER-NF-NET protocol performance is better compared to AODV, DSR and OLSR routing protocols for different node population and various degree of congestion. The simulation results showcase a superiority of HYPER-NF-NET simulator over NS-2 and associated HFNET protocol over other existing protocols.

Бесплатно

New Design of Tiny-Block Hybridization in AES

New Design of Tiny-Block Hybridization in AES

Ritu Goyal, Mehak Khurana

Статья научная

The cryptographic algorithm designed to enhance security in real life which storage track and increase speed. This is kind of Feistel cipher which real use for the processes from assorted (mixed/orthogonal) algebraic collections. AES is combined with segmentation and validation algorithm to improve the performance of the security. Also, Key expansion is done to make the AES more secure. The processes are pipelined to increase the speed of AES. Our strategies that are hybrid method which work as change the original files (data) into encoded/encrypted type using AES and Tiny Encryption Process. The hybrid Procedure is considered for easiness and improved performance. The encryption pattern, data is encoded using tiny-AES-128 encryption process and authentication SHA that alterations it into an indecipherable cipher text. In process of encryption that encodes the information which consider a random text through the idea of cryptography and then data/text for the user. Our proposed approach get minimize computational time and memory utilization which simulated in MATLAB 2014Ra.

Бесплатно

New Region Growing based on Thresholding Technique Applied to MRI Data

New Region Growing based on Thresholding Technique Applied to MRI Data

A. Afifi, S. Ghoniemy, E.A. Zanaty, S. F. El-Zoghdy

Статья научная

This paper proposes an optimal region growing threshold for the segmentation of magnetic resonance images (MRIs). The proposed algorithm combines local search procedure with thresholding region growing to achieve better generic seeds and optimal thresholds for region growing method. A procedure is used to detect the best possible seeds from a set of data distributed all over the image as a high accumulator of the histogram. The output seeds are fed to the local search algorithm to extract the best seeds around initial seeds. Optimal thresholds are used to overcome the limitations of region growing algorithm and to select the pixels sequentially in a random walk starting at the seed point. The proposed algorithm works automatically without any predefined parameters. The proposed algorithm is applied to the challenging application "gray matter/white matter" segmentation datasets. The experimental results compared with other segmentation techniques show that the proposed algorithm produces more accurate and stable results.

Бесплатно

New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher

Omar A. Dawood, Abdul Monem S. Rahma, Abdul Mohssen J. Abdul Hossen

Статья научная

In this paper, we have proposed a new iterated symmetric cipher, which is designed with Substitution and Permutation Network (SPN) structure and depends on strong mathematical built. It uses a compact algorithm for encryption and decryption processes, which consists of four main stages that roughly similar in its work to the Advance Encryption Standard (AES) stages. Starting by the SubByte operation, ReversibleShiftrows operation, ReversibleMixcolumns operation, and Round key addition. The proposed operations in this cipher have implemented in a straightforward manner relatively in both Encryption/Decryption by an elegant way. These four stages designed to reduce the hardware requirements and to produces high efficiency, which keeps the encryption and decryption process at the same speed in the hardware devices and eliminates the difference of execution times as well as creates a balance in forward and backward operations. The proposed cipher interested with modern design by adopted new algebraic operations and clear mathematical notations to ensure a high level of security. The proposed cipher did not build suddenly or arbitrarily but it acts as a sequence of developments and represents as a long process of design for long time, since several proposed ciphers have been published recently by us that paved the way to its new design, so the designed cipher inherited a good properties from a proven famous algorithms' features to produce high resistance against all known attacks and to submit a high performance on many platforms and in a wide range of hardware and software applications.

Бесплатно

Nonlinear Blind Source Separation Using Kernel Multi-set Canonical Correlation Analysis

Nonlinear Blind Source Separation Using Kernel Multi-set Canonical Correlation Analysis

Hua-Gang Yu, Gao-Ming Huang, Jun Gao

Статья научная

To solve the problem of nonlinear blind source separation (BSS), a novel algorithm based on kernel multi-set canonical correlation analysis (MCCA) is presented. Combining complementary research fields of kernel feature spaces and BSS using MCCA, the proposed approach yields a highly efficient and elegant algorithm for nonlinear BSS with invertible nonlinearity. The algorithm works as follows: First, the input data is mapped to a high-dimensional feature space and perform dimension reduction to extract the effective reduced feature space, translate the nonlinear problem in the input space to a linear problem in reduced feature space. In the second step, the MCCA algorithm was used to obtain the original signals.

Бесплатно

Novel Certification Method for Quantum Random Number Generators

Novel Certification Method for Quantum Random Number Generators

Maksim Iavich, Tamari Kuchukhidze, Sergiy Gnatyuk, Andriy Fesenko

Статья научная

Random numbers have many uses, but finding true randomness is incredibly difficult. Therefore, quantum mechanics is used, using the essentially unpredictable behavior of a photon, to generate truly random numbers that form the basis of many modern cryptographic protocols. It is essential to trust cryptographic random number generators to generate only true random numbers. This is why certification methods are needed which will check both the performance of our device and the quality of the random bits generated. Self-testing as well as device independent quantum random number generation methods are analyzed in the paper. The advantages and disadvantages of both methods are identified. The model of a novel semi self-testing certification method for quantum random number generators is offered in the paper. This method combines different types of certification approaches and is rather secure and efficient. The method is very important for computer science, because it combines the best features from self-testing and device independent methods. It can be used, when the random numbers’ entropy depends on the device and when it does not. In the related researches, these approaches are offered to be used separately, depending on the random number generator. The offered novel certification technology can be properly used, when the device is compromised or spoiled. The technology can successfully detect unintended irregularities, operational problems, abnormalities and problems in the randomization process. The offered mythology assists to eliminate problems related to physical devices. The offered system has the higher certification randomness security and is faster than self-testing approaches. The method is rather efficient because it implements the different certification approaches in the parallel threads. The offered techniques make the offered research must more efficient than the other existing approaches. The corresponding programming simulation is implemented by means of the simulation techniques.

Бесплатно

Novel Cloud Architecture to Decrease Problems Related to Big Data

Novel Cloud Architecture to Decrease Problems Related to Big Data

Entesar Althagafy, M. Rizwan Jameel Qureshi

Статья научная

IT companies are facing many difficulties and challenges when dealing with big data. These difficulties have surfaced due to the ever-expanding amount of data generated via personal computer, mobile devices, and social network sites. The significant increase in big data has created challenges for IT companies that need to extract necessary information and knowledge. Cloud computing, with its virtualized resources usage and dynamic scalability, is broadly used in organizations to address challenges related to big data and has an important influence on business in organizations. Furthermore, big data is changing the way organizations do business. This paper proposes novel cloud architecture to decrease problems related to big data. The proposed architecture is a combination of many big data infrastructures in the creation of a service. This architecture minimizes problems related to big data by improving performance and quality of service.

Бесплатно

Novel secured biometric system procuring miniaturized prorogation

Novel secured biometric system procuring miniaturized prorogation

Sherin Zafar, Ayesha Hena Afzal, M. Afshar Alam

Статья научная

Different organizations in today’s scenario are fully dependent on information technology for their survival, suffer from various security challenges like unauthorized access, physical damages etc. To avoid various security breaches and concerns, robust mechanism for user access need to be adopted that not only secure of valuable data but can also be utilized for developing various other security applications. “Biometric” secured technology is gaining attention for over traditional security mechanism like password, smart card etc. because information related to biometric are difficult to steal as compared to other mechanisms. In this research analysis “strong biometric approach” is proposed to overcome security apprehensions of various organizations& society through iris recognition system. Iris recognition system is a mechanism to identify a person through analyzing his or her iris pattern. This recognition system includes iris image acquisition, segmentation, normalization, encoding, matching and finally validation of iris templates. The iris recognition system developed and simulated in this research study has taken IIT database iris images as inputs and utilized hamming distance as the matching parameter. The simulated results depict an efficient and novel secured approach that will overcome various unauthorized accesses across the internet. The most novel approach of this iris based recognition system as compared to other traditional systems is that, if selected images are matched with trained iris images present in database then the resultant hamming distance as most of the iris recognition systems directly accept or reject images and causes huge congestion and execution prorogations.

Бесплатно

Object Authentication Using RFID Technology: A Multi-tag Approach

Object Authentication Using RFID Technology: A Multi-tag Approach

Subhasish Dhal, Indranil Sen Gupta

Статья научная

Authentication is an important requirement in various applications to restrict the non-legitimate access to certain resources. Radio Frequency Identification (RFID) technology helps to perform the authentication task. The detection probability of an object during the authentication process can be increased using multiple number of RFID tags in the object. However, many security risks such as eavesdropping, location privacy etc. are involved in this technology. This paper proposes a secure and lightweight authentication scheme assuming the objects are attached with multiple number of RFID tags. Proper analysis has been carried out to evaluate the security of the proposed scheme, including comparison with a few existing schemes in terms of computation, communication and storage requirements.

Бесплатно

Журнал