International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1148

Статья научная
A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination in order to have load balancing to satisfy Quality of Service (QoS) requirements. In this paper, the performance comparison and evaluation of the widely used multipath routing protocols such as AOMDV, OLSR and ZRP are carried out in terms of five scenario patterns such as RWM, RPGM, MGM, GMM, and PM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion. These multipath routing protocols have been selected for simulation due to their edges over other protocols in various aspects.
Бесплатно

Performance Comparison of Single and Multiple Watermarking Techniques
Статья научная
The present work compares single and multiple watermarking by using discrete wavelet transform and different embedding methods. The different embedding methods are additive, multiplicative and hybrid watermarking with importance on its robustness versus the imperceptibility of the watermark. The objective quality metrics are demonstrated that, the additive embedding method achieves superior performance against watermark attacks on multiple watermarking technique.
Бесплатно

Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Статья научная
Network firewalls act as the first line of defense against unwanted and malicious traffic and also represent critical point of failure during DDoS attack. Predicting the overall firewall performance is crucial to network security administrators and designers in assessing the strength and effectiveness of network firewalls against DDoS attacks. In this paper, authors have made a humble attempt to study and compare DDoS performance of various types of firewalls in operation as on today. Analysis and detailed comparison is performed on open source packet filter (PF) firewall, Checkpoint SPLAT and Cisco ASA in a testing environment with laboratory generated DDoS traffic. It is attempted to identify various firewall DDoS performance parameters which can be considered during DDoS attack. Further, experiments are carried out to study effect of varying TCP Opening Timers on performance of stateful inspection firewall during Sync Flood attack. Also, in order to improve performance, intelligence is applied in PF firewall rulebase to mitigate DDoS.
Бесплатно

Статья научная
VANET deployment in real world has become a living reality by the successful allotment of 5.9GHz to Dedicated Short Range Communication (DSRC) by WLAN technologies. Dynamically changing topology and establishment of reliable path between nodes with minimum bandwidth consumption and lesser routing overheads are the main aims of ad- hoc network routing. To exploit effective and reliable communication among vehicles routing is a major factor which needs to be investigated. This paper intends to evaluate the performance of AODV and GOD routing protocols in city scenario under different application types and different fading environment using IEEE 802.11b MAC standard. Simulations are performed using NCTUns 6.0 (National Chung Tung University Network Simulator) and found that AODV performance is better in fading channel even if we increase rician factor. Also the performance of GOD is better in ideal fading (AWGN) channel, although the performance of routing protocols vary from one scenario to other and application traffic.
Бесплатно

Performance Evaluation of AODV under Blackhole Attack
Статья научная
Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being carried out in the field of security by discovering attacks, evaluating the damage caused to the network and developing solutions to combat such attacks. This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously. The analysis guides us to the various performance parameters such as throughput, packet delivery fraction, normalized routing load and number of dropped packets evaluated over different scenarios.
Бесплатно

Статья научная
Recently, security of digital images has attracted significant attention. This paper evaluates the performance of authentication-encryption and confidentiality block cipher modes of operation, on digital image. Authentication-encryption scheme, such as Offset Code Book (OCB) mode, offers both privacy and authenticity; that is to say, this scheme provides data authenticity without increasing the cost of encryption. The performance of this mode is compared with other confidentiality modes of operation, such as the fast counter (CTR) mode that just encrypts the image without verification. Various statistical methods, such as correlation coefficient, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI) are utilized to analyze the efficiency of different modes. Results show that the model based on OCB scheme, by both AES and Serpent algorithms, exhibits good performance on a digital image compared to the models based on other modes. OCB-AES based scheme, associated with its own authentication, has considerable speed in comparison with other confidentiality modes.
Бесплатно

Статья научная
Most of the protocols for enhancing the lifetime of wireless sensor networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, we study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important homogeneous protocols. We incorporate heterogeneity to these protocols, which consists of 2-level, 3-level and multi-level heterogeneity. We simulate and compare the performance of the ALBPS and ADEEPS protocols in homogeneous and heterogeneous environment. The simulation results indicate that heterogeneous protocols prolong the network lifetime as compared to the homogeneous protocols. Furthermore, as the level of heterogeneity increases, the lifetime of the network also increases.
Бесплатно

Статья научная
Face biometric system is one of the successful applications of image processing. Person recognition using face is the challenging task since it involves identifying the 3D object from 2D object. The feature extraction plays a very important role in face recognition. Extraction of features both in spatial as well as frequency domain has more advantages than the features obtained from single domain alone. The proposed work achieves spatial domain feature extraction using Asymmetric Region Local Binary Pattern (ARLBP) and frequency domain feature extraction using Fast Discrete Curvelet Transform (FDCT). The obtained features are fused by concatenation and compared with trained set of features using different distance metrics and Support Vector Machine (SVM) classifier. The experiment is conducted for different face databases. It is shown that the proposed work yields 95.48% accuracy for FERET, 92.18% for L-space k, 76.55% for JAFFE and 81.44% for NIR database using SVM classifier. The results show that the proposed system provides better recognition rate for SVM classifier when compare to the other distance matrices. Further, the work is also compared with existing work for performance evaluation.
Бесплатно

Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Статья научная
The exhaustion of IPv4 addresses has forced the deployment of the new version of the Internet Protocol (IPv6). However, the migration to the new protocol is done gradually and with the due care for many reasons that include: cost, inclusion of support for IPv6 in existing applications, training of technical staff, lack of web content available over IPv6 from important providers, and obsolete devices not anymore supported by manufacturers. For those reasons, many transition mechanisms have been proposed, each one to fill distinct requirements, with different operational theory and availability according to the network environment. A performance evaluation of these mechanisms can help network administrators and researchers in their selection of the best transition technology for their environment. In this paper, we present a performance comparison of some transition mechanisms such as ISATAP, 6to4, and NAT64 in real testbeds with Debian, Windows 7, Windows 8, and Windows 10. For NAT64, two different tools were tested: TAYGA and Jool. We measure the OWD and the throughput for UDP and TCP for every mechanism, for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that all the modern operating systems for PCs already have good support for IPv6, and a very similar network performance. Also, we can infer from our work that in controlled environments, native IPv4 has the best performance, closely followed by native IPv6. The difference is essentially due to the length of the IP header (20 bytes in IPv4 and 40 bytes in IPv6). The tunneling solutions chosen for this research (ISATAP and 6to4) have a similar performance, which is the lowest of the studied technologies, because of the additional IPv4 header in the tunnel.
Бесплатно

Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks
Статья научная
Many techniques have been proposed to detect and prevent spam over Internet telephony. Human spam calls can be detected more accurately with these techniques. However, robocalls, a type of voice spammer whose calling patterns are similar to those of legitimate users, cannot be detected as effectively. This paper proposes a model for robocall detection using a machine learning approach. Voice data recordings were collected and the relevant features for study were selected. The selected features were then used to formulate six (6) detection models. The formulated models were simulated and evaluated using some performance metrics to ascertain the model with the best performance. The C4.5 decision tree algorithm gave the best evaluation result with an accuracy of 99.15%, a sensitivity of 0.991%, a false alarm rate of 0.009%, and a precision of 0.992%. As a result, it was concluded that this approach can be used to detect and filter both machine-initiated and human-initiated spam calls.
Бесплатно

Performance Evaluation of Power Aware VM Consolidation using Live Migration
Статья научная
Power Efficiency is the efficient use of power and is a crucial come forth in cloud computing environment. Green Computing is nothing but is a cloud computing with efficient use of power and green refers to make the environment friendly to the user by saving heat and power. Data centre power efficiency in cloud environment will be reduced when virtualization is used as contrary to physical resource deployment to book adequate to grant all application requests. Nevertheless, in any case of the resource provisioning approximation, occasion remains in the way in which they are made attainable and workload is scheduled. The objective of this research work is therefore to pack workload into servers, selected as a function of their cost to operate, to achieve (or as close to) the utmost endorsed employment in a cost-efficient manner, avoiding occurrences where devices are under-utilized and management cost is acquired inefficiently. This work has enhanced the existing work by introducing the dynamic wake up calls either to shut down the active servers or restart the passive server. The wakeup calls has been initiated dynamically. The overall objective is to decrease the response time of users which will be increased during wakeup time in existing research work.
Бесплатно

Performance Evaluation of Routing Protocols in Vehicular Networks
Статья научная
Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study of routing protocols in various network environment (Urban, Highway) based on metrics such as throughput, packet delivery ratio and average end-to-end delay. For the implementation purpose we have used network simulator-2 (NS-2) and VanetMobisim.
Бесплатно

Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Статья научная
With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation for link adaptive encryption scheme are compared with the fixed block length encryption technique operating in Cipher Block Chaining (CBC) mode of operation. Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in CBC mode is a better solution for security and throughput tradeoff.
Бесплатно

Статья научная
The IEEE 802.15.4 standard is considered as the most notorious MAC layer for wireless sensor networks (WSNs) in both centralized and distributed context. For instance, in multi hop environment, the beaconless IEEE 802.15.4 is used. Several works evaluated the performance of the beaconless IEEE 802.15.4 in terms of average delay, average energy consumption, throughput etc. But, none of the existing studies derived accurate energy consumption bounds of this MAC layer. In this paper, our contribution is twofold. We first propose a comprehensive energy consumption analysis of the unslotted CSMA/CA algorithm. The results are validated through simulation. Then, we exploit our analysis to propose a cross layer routing scheme that enhances the native PEGASIS protocol. Our scheme called Average Energy Enhanced PEGASIS (AE2-PEGASIS) considers the average energy consumption at the MAC layer when constructing the routes to the sink.
Бесплатно

Performance Improvement of Cache Management In Cluster Based MANET
Статья научная
Caching is one of the most effective techniques used to improve the data access performance in wireless networks. Accessing data from a remote server imposes high latency and power consumption through forwarding nodes that guide the requests to the server and send data back to the clients. In addition, accessing data may be unreliable or even impossible due to erroneous wireless links and frequently disconnections. Due to the nature of MANET and its high frequent topology changes, and also small cache size and constrained power supply in mobile nodes, the management of the cache would be a challenge. To maintain the MANET’s stability and scalability, clustering is considered as an effective approach. In this paper an efficient cache management method is proposed for the Cluster Based Mobile Ad-hoc NETwork (C-B-MANET). The performance of the method is evaluated in terms of packet delivery ratio, latency and overhead metrics.
Бесплатно

Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link
Статья научная
The purpose of paper is to compute reliability of Digital Tele-Protection System employing Digital Microwave Radio Link. In this paper, the whole Tele-Protection system is divided into six subsystems. The first subsystem is digital relaying equipment. Second subsystem is the tale-protection signaling equipment where the timing to sample line power currents is synchronized. Both relaying and Tele-Protection signaling equipments, are now assemble three-phase current data, sampled at 600 Hz for 50 Hz EHV systems and some control data into a 90 bit frame format at a transmission rate of 54 Kb/s. A frame consists of a frame synchronization field and some information fields including a cycle’s redundancy check field. The third subsystem, Tele-Protection signed multiplexing equipment generates a super frame by multiplexing the seven, 54 Kb/s Tele-Protection signals into a 1.544 Mb/s stage using multi-point sampling technique to minimize the delay time variation and send them to the subsystem four, which is radio equipment, from here the data is transmitted with the help of the channel (subsystem 5) to the repeater station (subsystem 6). The subsystem six is used to remove the noise and to improve the power of the data. In this paper, we have taken standby digital relaying equipment and that can be online through an imperfect switching device. Also parallel redundant Tele-Protection signaling equipment is taken to improve system’s overall performance.
Бесплатно

Performance Study of Spread Spectrum Systems with Hard Limiters
Статья научная
Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied. It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter. Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range. Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.
Бесплатно

Статья научная
In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. The agent will collect information from client systems through data collecting agents. It will then categorize and associate data in the form of report, and send the same to server. Intrusion detection system (IDS) will support runtime addition of new ability to agents. We have illustrated the design of ABIDS and show the performance of ABIDS with various classification techniques that could produce good results. The motive of the work is to examine the best performance of ABIDS among various classification techniques for huge data. Moreover sophisticated NSL KDD dataset are used during experiments for more sensible assessment than the novel KDD 99 dataset.
Бесплатно

Статья научная
One of the most complex environment for the data transmission is the underwater channel. It suffers frequency selective deep fading with serious multi path time delay. The channel also has limited bandwidth. In this paper, the effect of Least Code Weight – Minimum Hamming Distance (LCW-MHD) polynomial code is studied using Viterbi Decoding Algorithm for the shallow Underwater Acoustic Communication (UAC) channel. Two different channels with the range of 100 and 1000 meters are considered for simulation purpose and the channel is designed using Ray Tracing algorithm. For data and image transmission in the channel, three different code rate of 1/2, 1/3 and 1/4 are considered and corresponding Bit Error Rate (BER) are evaluated. Result showed that the BER is least for the LCG-MHD polynomial code.
Бесплатно

Performance comparison of steganography techniques
Статья научная
Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v 8.1.0.604.
Бесплатно