International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1130

Статья научная
The IEEE 802.15.4 standard is considered as the most notorious MAC layer for wireless sensor networks (WSNs) in both centralized and distributed context. For instance, in multi hop environment, the beaconless IEEE 802.15.4 is used. Several works evaluated the performance of the beaconless IEEE 802.15.4 in terms of average delay, average energy consumption, throughput etc. But, none of the existing studies derived accurate energy consumption bounds of this MAC layer. In this paper, our contribution is twofold. We first propose a comprehensive energy consumption analysis of the unslotted CSMA/CA algorithm. The results are validated through simulation. Then, we exploit our analysis to propose a cross layer routing scheme that enhances the native PEGASIS protocol. Our scheme called Average Energy Enhanced PEGASIS (AE2-PEGASIS) considers the average energy consumption at the MAC layer when constructing the routes to the sink.
Бесплатно

Performance Improvement of Cache Management In Cluster Based MANET
Статья научная
Caching is one of the most effective techniques used to improve the data access performance in wireless networks. Accessing data from a remote server imposes high latency and power consumption through forwarding nodes that guide the requests to the server and send data back to the clients. In addition, accessing data may be unreliable or even impossible due to erroneous wireless links and frequently disconnections. Due to the nature of MANET and its high frequent topology changes, and also small cache size and constrained power supply in mobile nodes, the management of the cache would be a challenge. To maintain the MANET’s stability and scalability, clustering is considered as an effective approach. In this paper an efficient cache management method is proposed for the Cluster Based Mobile Ad-hoc NETwork (C-B-MANET). The performance of the method is evaluated in terms of packet delivery ratio, latency and overhead metrics.
Бесплатно

Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link
Статья научная
The purpose of paper is to compute reliability of Digital Tele-Protection System employing Digital Microwave Radio Link. In this paper, the whole Tele-Protection system is divided into six subsystems. The first subsystem is digital relaying equipment. Second subsystem is the tale-protection signaling equipment where the timing to sample line power currents is synchronized. Both relaying and Tele-Protection signaling equipments, are now assemble three-phase current data, sampled at 600 Hz for 50 Hz EHV systems and some control data into a 90 bit frame format at a transmission rate of 54 Kb/s. A frame consists of a frame synchronization field and some information fields including a cycle’s redundancy check field. The third subsystem, Tele-Protection signed multiplexing equipment generates a super frame by multiplexing the seven, 54 Kb/s Tele-Protection signals into a 1.544 Mb/s stage using multi-point sampling technique to minimize the delay time variation and send them to the subsystem four, which is radio equipment, from here the data is transmitted with the help of the channel (subsystem 5) to the repeater station (subsystem 6). The subsystem six is used to remove the noise and to improve the power of the data. In this paper, we have taken standby digital relaying equipment and that can be online through an imperfect switching device. Also parallel redundant Tele-Protection signaling equipment is taken to improve system’s overall performance.
Бесплатно

Performance Study of Spread Spectrum Systems with Hard Limiters
Статья научная
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied. It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter. Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range. Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
Бесплатно

Статья научная
In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. The agent will collect information from client systems through data collecting agents. It will then categorize and associate data in the form of report, and send the same to server. Intrusion detection system (IDS) will support runtime addition of new ability to agents. We have illustrated the design of ABIDS and show the performance of ABIDS with various classification techniques that could produce good results. The motive of the work is to examine the best performance of ABIDS among various classification techniques for huge data. Moreover sophisticated NSL KDD dataset are used during experiments for more sensible assessment than the novel KDD 99 dataset.
Бесплатно

Статья научная
One of the most complex environment for the data transmission is the underwater channel. It suffers frequency selective deep fading with serious multi path time delay. The channel also has limited bandwidth. In this paper, the effect of Least Code Weight – Minimum Hamming Distance (LCW-MHD) polynomial code is studied using Viterbi Decoding Algorithm for the shallow Underwater Acoustic Communication (UAC) channel. Two different channels with the range of 100 and 1000 meters are considered for simulation purpose and the channel is designed using Ray Tracing algorithm. For data and image transmission in the channel, three different code rate of 1/2, 1/3 and 1/4 are considered and corresponding Bit Error Rate (BER) are evaluated. Result showed that the BER is least for the LCG-MHD polynomial code.
Бесплатно

Performance comparison of steganography techniques
Статья научная
Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v 8.1.0.604.
Бесплатно

Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Статья научная
Today, Due to mobility wireless network have a heavy demand especially for wireless Ad-Hoc network. In Ad-Hoc network a group of wireless mobile nodes cooperate with each other by routing of packets. So it is necessary to design a wireless network which gives the best performance by suitable protocol selection and path routing. The selection of protocol should be suitable in terms of data integrity as well as data delivery. Hence performance evaluation of protocol is a major issue before selection of a routing protocol. In this paper our aim is to analyse the performance matrices including end to end delay, jitter, packet loss and packet delivery fraction of multi hop network by simulation. Performance evaluation of wireless ad hoc network routing protocols specially Ad-hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector (DSDV) have been completed using NS-3 Simulator. After simulation we have found that OLSR routing protocol gives the best result comparison to AODV and DSDV in large and dense network.
Бесплатно

Performance evaluation of MAC protocols with multi-sink for mobile UWSNs
Статья научная
Currently, Underwater Wireless Sensor Network (UWSN) is one of modern science and have attached many researchers especially how interesting with Wireless Sensor Network (WSN). A mobile node in UWSN is one of the powerful mechanisms, it can be used for many aquatic applications such as Surveillance for wildlife, Pollution control, Military applications, etc. UWSN is different from the terrestrial network in terms of using acoustic waves as a communication medium. Due limitation of bandwidth, high latency, and long propagation delay of acoustic waves, many proper MAC protocols that work efficiently in Static UWSN are not suitable for the mobile network. In this article two MAC protocols appropriate for mobile underwater network Broadcast as Direct access and geo-routing aware MAC protocol (GOAL) as Handshaking are evaluated, in both static and mobile nodes with respect to throughput, energy consumption, and delay. Then the effect of using Multi-Sink on the performance is shown, the evaluation is done based on AquaSim simulator, Aqua3D Animator, and AWK programming language have been used to extract the results. As a result, the performance has been improved by using multi-Sink with two types of MAC address, and for all the metrics.
Бесплатно

Статья научная
Satellite networking is different from wired or wireless networks. The behavior and the performance of TCP/IP in normal wireless network as well as in wired network are different from one another. The TCP/IP protocol was not designed to perform well over high-latency or noisy channels so its performance over satellite networks are totally different. Each satellite networks/constellations have different properties. The deployment height, motion, direction, link capacity – all differ from one satellite constellations to another. So, certainly the behavior of TCP/IP will considerably differ from one satellite constellations than another. The Performance of three different TCP Congestion algorithms, Vegas, Reno and Bic are taken for evaluation on the simulated satellite network Iridium and the performance of the three algorithms under the satellites constellation is measured using suitable metrics. It is observed that, irrespective of the high end to end delay, the behavior of TCP/IP under Satellite network is somewhat resembling a high latency wired network. TCP under satellite network is not like that of a mobile ADHOC network. The observation resulted that the overall performance of Vegas was good in Iridium constellations. These reasons should be explored for designing a better congestion control algorithm exclusively for Satellite Networks.
Бесплатно

Pre-Processing of University Webserver Log Files for Intrusion Detection
Статья научная
Web Server log files can reveal lots of interesting patterns when analyzed. The results obtained can be used in various applications, one of which is detecting intrusions on the web. For good quality of data and usable results, there is the need for data preprocessing. In this research, different stages of data preprocessing were carried out on web server log files obtained over a period of five months. The stages are Data Conversion, Session Identification, Data Cleaning and Data Discretization. Data Discretization was carried out in two phases to take care of data with continuous attributes. Some comparisons were carried out on the discretized data. The paper shows that with each preprocessing step, the data becomes clearer and more usable. At the final stage, the data presented offers a wide range of opportunities for further research. Therefore, preprocessing web server log files provides a standard processing platform for adequate research using web server logs. This method is also useful in monitoring and studying web usage pattern in a particular domain. Though the research covers webserver log obtained from a University domain, and thus, reveals the pattern of web access within a university environment, it can also be applied in e-commerce and any other terrain.
Бесплатно

Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks
Статья научная
This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects' spread in networks. This Pre-quarantine concept addresses and implements the "assume guilty till proven innocent" slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/pre-quarantining improves the recovery rate in relative terms.
Бесплатно

Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Статья научная
Quality of Service (QoS) in Ad hoc networks (MANETs) and more precisely in routing is the subject of several studies with the aim of providing better solutions for new applications requiring high throughput and very low delay. The objective of this work is to enhance the AODV (Ad hoc On Demand Distance Vector) routing strategy in maintenance phase, to improve QoS. It aims to add a mechanism able to predict link failure in use based on signal strength which is able to determine if the quality of link will be improved (i.e. stable) or more bad (i.e. probability of failure) in order to allow us not only to make the link management more robust but to anticipate on link breaking and improve QoS. When signal quality is declining due to neighbor node remoteness, a discovery of a part of road rescue with two hops will be established and it will be used when disconnection happens. Simulations under Network Simulator (Ns2) were conducted to measure traffic control, packets delivery and lost ratio in original protocol and modified version which are presented in this paper.
Бесплатно

Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
Статья научная
Activities in network traffic can be broadly classified into two categories: normal and malicious. Malicious activities are harmful and their detection is necessary for security reasons. The intrusion detection process monitors network traffic to identify malicious activities in the system. Any algorithm that divides objects into two categories, such as good or bad, is a binary class predictor or binary classifier. In this paper, we utilized the Nearest Neighbor Distance Variance (NNDV) classifier for the prediction of intrusion. NNDV is a binary class predictor and uses the concept of variance on the distance between objects. We used KDD CUP 99 dataset to evaluate the NNDV and compared the predictive accuracy of NNDV with that of the KNN or K Nearest Neighbor classifier. KNN is an efficient general purpose classifier, but we only considered its binary aspect. The results are quite satisfactory to show that NNDV is comparable to KNN. Many times, the performance of NNDV is better than KNN. We experimented with normalized and unnormalized data for NNDV and found that the accuracy results are generally better for normalized data. We also compared the accuracy results of different cross validation techniques such as 2 fold, 5 fold, 10 fold, and leave one out on the NNDV for the KDD CUP 99 dataset. Cross validation results can be helpful in determining the parameters of the algorithm.
Бесплатно

Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip
Статья научная
With the emergence of deep sub-micron technology, the reliability issues in on-chip interconnect has enormously increased. This includes single event upsets, like soft errors, and hard faults which are rapidly becoming important factors to be considered. Aggressive technology scaling renders these architectures vulnerable to system performance, intermittent failure, capacitive crosstalk, and power dissipation problem. To improve the performance of the area and power consumption along with bandwidth, throughput and latency, a Buffer Potency Power Gating Technique is carried out to predict the Intermittent Failure by Presage Debacle Model in Network on Chip. In the Presage Debacle Model, the links present in the application-specific topology are provided with real application traffic to assist in prediction of the intermittent failure. By predicting the failure, the output of the model provides the power dissipated over the connection of the application link. Then the crosstalk noise in the topology is reduced by the Adaption of Simulated Annealing (SA) based Particle Swarm Optimization (PSO) congruence algorithm. The optimization congruence algorithm assigns each task in the application software to each node in the topology to determine the network's optimal output. It continuously changes the task park position in the topology system and reduces the crosstalk of the NoC. Consecutively, the area and power consumption are minimized by Buffer Potency Power Gating Technique. Buffer efficiency is increased and the power-gating is a practical way to mitigate NoC power control schemes properly and effectively without any loss in performance. Thus the prediction of intermittent failure is obtained by utilizing NoC to improve the performance of area and power consumption.
Бесплатно

Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Статья научная
Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.
Бесплатно

Priority Metric based Ad Hoc Routing for Underwater Sensor Network
Статья научная
Underwater sensor network has been burgeoned as an interesting research area which has to face a couple of challenges to provide scalable and efficient routing services because of its unique characteristics. In many aspects, it differs from the ground based terrestrial sensor network, Firstly, In UWSNs, acoustic signal is used instead of radio-frequency that attenuates much in underwater environment in comparison with radio-frequency channels. Acoustic channels attribute much lower bandwidth and the propagation speed of acoustic signals in water is several of magnitudes longer. Secondly, nodes of underwater sensor networks move with water current which results dynamic topology. Thirdly, underwater sensor networks consume more power than terrestrial networks due to the underwater channel characteristics and it has high error probability because of acoustic underwater channels' sensibility in noise, multi-path and Doppler spread. Some routing protocols have been proposed to deal with these challenges. But most of these protocols espouse the greedy technique to forward packets to the neighboring node which consumes a lot of energy when network is dense. In this thesis, we propose a Priority Metric Based Ad hoc Routing Protocol for UWSNs. The leading advantages of the protocol are that it consumes less energy in dense network as only one neighboring node needs to capture the packet and process it and it guarantees less number of packet loss in high mobile node environment. Extensive simulation is executed to attest the competence of the proposed routing protocol. The result and analysis bear the indication of the proposed routing protocol's surpassing the existing routing protocol in terms of total energy consumption and average end to end delay.
Бесплатно

Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Статья научная
The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k-anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.
Бесплатно

Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain
Статья научная
Due to the increase of cybercrime and security risks in computer networks as well as violations of user privacy, it is essential to upgrade the existing protection models and provide practical solutions to meet these challenges. An example of these risks is the presence of a third party between users and various services, which leads to the collection and control of large amounts of users' personal information and the possibility of their databases being misused or hacked. Blockchain technology and encrypted currencies have so far shown that a decentralized network of peer-to-peer users, along with a general ledger, can do reliable computing. So, in this article, we are going to introduce a protocol that converts the blockchain network to an automated access control manager without the presence of a third party. To this end, we designed a mutual authentication protocol to create a secure channel between the user and the service and then demonstrate its accuracy and completeness using the Gong-Nidham-Yahalom belief logic [1]. The results of our evaluations show that our proposed protocol is secure enough to be used on the blockchain network and attackers are unable to penetrate, track, impersonate, inject, misrepresent or distort information using the common attacks.
Бесплатно

Privacy and security concerns in electronic commerce websites in Ghana: a survey study
Статья научная
This paper examines the privacy and security issues on electronic commerce websites in Ghana. Ghana is reported to have an Internet users’ rate of 27.8% and a mobile Internet subscription of 14% in 2017. The study assessed e-commerce websites for privacy policies that are meant to guide and inform website users on the collection of customer data, data use, protection and other related privacy issues on personal data. The study also analyzed e-commerce websites for encryption security tools that protect customer data and test e-commerce websites for the presence of security vulnerabilities that could threaten the sites and their users. The study used a combination of three methods; web content analysis, information security audit and testing of the websites using penetration testing tools for data collection and analysis. Nmap was used to test and identify possible vulnerabilities on the e-commerce websites that could be used by malicious users to steal customer data for fraudulent intent. The research revealed the presence or otherwise of privacy policies on e-commerce websites. The security weaknesses in these e-commerce websites have been highlighted as findings in the study. The findings of the study will inform policy direction on electronic data collection, protection and use in the e-commerce industry in Ghana is on areas that bother on privacy and security of the customer could be given attention. The findings will also inform industry players in the e-commerce sector on the need to strengthen security on their websites.
Бесплатно