Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1148

Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks

Ibrahim S. I. Abuhaiba, Huda B. Hubboub

Статья научная

In this paper, we introduce a new attack, Reinforcement Swap Attack, against Directed Diffusion based WSNs, which exploits the vulnerabilities of Directed Diffusion specifications. Its main idea is the disruption of configuration information, such as routing information to misuse route establishment along the network. Our approach is to swap Directed Diffusion reinforcement rule which means that the good route is excluded and the bad route is included. Moreover, our attack is activated and deactivated periodically to prolong its lifetime and hence brings down the target network. For the proposed attack, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

Бесплатно

Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method

Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method

Ranjan Kumar Dash, Deepak Kumar Panda

Статья научная

The work carried out in this paper first generates all edge-disjoint minimal paths between every pair of nodes of the interconnection network. Then the merging of the edge disjoint minimal paths from each source nodes to the rest of nodes occurs only if such merging of minimal paths does not result into cycle. Thus, the merging operation ensures connectivity of all nodes of interconnection network without any cycle which is equivalent to the generation of spanning trees. In this manner, a number of spanning tree rooted on each source node are generated and ranked according to their generation. The network reliability is then evaluated from these spanning trees by applying sum of disjoint product techniques on these trees. A mathematical model followed by an algorithm is proposed in this paper. The proposed method is well illustrated by taking a suitable example network. The simulated results obtained from the proposed method are validated against existing method. The validation results show a tolerable level discrepancy in estimating the network reliability of some benchmark networks while using a very less number of spanning trees in leu of all possible spanning tress. The network reliability of some important interconnection networks viz. Hypercube, crossed cube, folded hypercube, mesh and torus are evaluated and analyzed. The network reliability of fully connected network with size varying from 3 to 10 are evaluated and analysed.

Бесплатно

Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks

Reliable Data Delivery Using Fuzzy Reinforcement Learning in Wireless Sensor Networks

Sateesh Gudla, Kuda Nageswara Rao

Статья научная

Wireless sensor networks (WSNs) has been envisioned as a potential paradigm in sensing technologies. Achieving energy efficiency in a wireless sensor network is challenging since sensor nodes have confined energy. Due to the multi-hop communication, sensor nodes spend much energy re-transmitting dropped packets. Packet loss may be minimized by finding efficient routing paths. In this research, a routing using fuzzy logic and reinforcement learning procedure is designed for WSNs to determine energy-efficient paths; to achieve reliable data delivery. Using the node’s characteristics, the reward is determined via fuzzy logic. For this paper, we employ reinforcement learning to improve the rewards, computed by considering the quality of the link, available free buffer of node, and residual energy. Further, simulation efforts have been made to illustrate the proposed mechanism’s efficacy in energy consumption, delivery delay of the packets, number of transmissions and lifespan.

Бесплатно

Reliable and Power Efficient Routing Protocol for MANETs

Reliable and Power Efficient Routing Protocol for MANETs

V.Sowmya Devi, Nagaratna P Hegde

Статья научная

In this paper, we focused on of the most proliferated network that is Mobile Adhoc Network (MANET). Due to the dynamic nature and limited power of nodes, the routes will fail frequently which intern cause high power dissipation. This paper proposed a reliable and power efficient routing with the nodes having high power level. As well as, this approach also concentrated on the reduction of power consumption during route failures by adapting an on-demand local route recovery mechanism through a set of helping nodes and they are called as Support Nodes (SN). The cooperation of support nodes will reduce the power consumption and significantly increases the reliability. The performance of proposed approach was evaluated through average energy consumption, packet delivery ratio and end-to-end delay over varying node speed and varying packet size. The power optimization and reliability achieved by the proposed approach gives an ideal solution to the future communication in MANETs for a long time.

Бесплатно

Research of Emergency Vehicles Information System Based on SOA

Research of Emergency Vehicles Information System Based on SOA

Guangliang Li, Minghai Yao

Статья научная

Using Service-Oriented Architecture (SOA) to build an information system is a hot topic at present. The primary goal of this paper is to investigate how to build a SOA-based information system in a special industry-the field of emergency vehicles in environment protection industry. The paper provides a presentation of current compositions of the emergency vehicles information system and then gives out the system structure. The paper proceeds with the business process flow and working principle of an emergency vehicle information system. A service-oriented architecture framework for emergency vehicles information system is proposed.

Бесплатно

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Vikram Jeet Singh, Vikram Kumar, Kishori Lal Bansal

Статья научная

The technological developments in the fields of multimedia clinical applications and communication networks require a specific analysis to increase the efficiency of network based healthcare services. In this work, we computed the optimum transmission parameter (data packet size) for applications needed to guarantee the perceived quality of service in the proposed ubiquitous healthcare network. This has been carried out through NS2 based simulation of a state wide area network infrastructure implemented in Himachal Pradesh, a state with diverse geographical terrain situated in the Western Himalayan region of India. The various types of healthcare applications and services have been classified into different classes according to their perceived QOS requirements as per the guidelines in ITU report on network performance objectives. The infrastructure specific optimum values of data packet size for these QoS classes have been computed. Network based healthcare applications and services running on both TCP and UDP type of traffic have been presented in this paper.

Бесплатно

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

SHI Lei, WANG Qiang, Wu lijun

Статья научная

This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the desired track, it must return immediately, and while doing so, the obstacle avoidance behavior and the effectiveness of such a path are not guaranteed. So, motion control is a difficult task, especially in real time and high speed control. To achieve good control performance and requirements for timeliness, accuracy to identify and approach the ball, the paper designs a sugeno fuzzy control system, which could make robot complete the whole football performance, including finding, approaching and shooting ball. At the end of the paper, to validate the proposed fuzzy algorithm, the experiment on METALFIGHTER-2 humanoid robot has been run, which showed that the fuzzy controller is effectiveness and robustness.

Бесплатно

Research on Trusted Industrial Control Ethernet Network

Research on Trusted Industrial Control Ethernet Network

ZHOU Sen-xin, HAN Jiang-hong, TANG Hao

Статья научная

Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks emerged in recent years in order to provide solutions for the increasing requirements on networked services. We propose a trust evaluation model for industrial control Ethernet network. Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of trusted industrial control Ethernet networks.

Бесплатно

Research on the method of multi-channel video acquisition and display based on FPGA

Research on the method of multi-channel video acquisition and display based on FPGA

Jingbo Xia, Xiaohuan Zhao, Weiwu Guo

Статья научная

With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by using the field-selected algorithm. The four-channel video can be outputted to LCD with the technique of ping-pang cache. The LCD display sequences are generated by the finite state machine using Verilog HDL. The system is simple, flexible and with high-quality, and it has a broad application prospect.

Бесплатно

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Manjusha Pandey, Shekhar Verma

Статья научная

Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.

Бесплатно

Resource Provisioning for Routing with Priorities

Resource Provisioning for Routing with Priorities

Subarno Banerjee, Supriya Roy, P. K. Guha Thakurta

Статья научная

In this paper, a novel load balancing technique is proposed to handle biased call request patterns efficiently. The knowledge of call request patterns is used from trace-based analysis; call patterns are affected by various factors such as geographical context, user mobility, network usage patterns and temporal bias. A call routing system is modelled as a network of queues and a provisioning algorithm is developed. The proposed model employs a combination of predictive and reactive provisioning methods. The idea of Capacity Distribution is introduced- a heuristic for heterogeneous capacity allocation among adjacent cell pairs. The proposed model retains simplicity while being able to effectively learn from the variations in call patterns. The performance of the model is evaluated using extensive simulation techniques.

Бесплатно

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko

Статья научная

Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.

Бесплатно

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Ritu Agrawal, Manisha Sharma

Статья научная

Medical Magnetic Resonance Images (MRI) is characterized by a composition of small differences in signal intensities between different tissues types. Thus ambiguities and uncertainties are introduced in image formation. In this paper, review of the current approaches in the tissue segmentation of MR Brain Images has been presented. The segmentation algorithms has been divided into four categories which is able to deal with different intensity non-uniformity as adaptive spatial Fuzzy C - means, Markov Random Field, Fuzzy connectedness method and atlas based re-fuzzy connectedness. The performance of these segmentation methods have been compared in terms of validation metric as dice similarity coefficient, overlap ratio and Jaccard coefficient. The comparison of all validation metric at different levels of intensity non-uniformity shows that adaptive Fuzzy C - means clustering segmentation method give better result in segmentation of brain tissue.

Бесплатно

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Rabail S. Satti, Fakeeha Jafari

Статья научная

Digital Forensics can be defined as a field of study involving the usage of technical and proved procedures for collecting, preserving, validating, analyzing, interpreting and presenting the Evidences extracted from the digital sources for presenting those in the court of law. Different process models have been proposed by the researchers for cyber crimes' investigation process, each having its own suitability to environments where they are applicable and other pros and cons. The paper includes the tailoring of existing process models to the particular domain of higher education institutes. With the growing access of computing resources and internet to the students, employees and overall citizens, it is the need of time that organizations should establish and maintain their cyber forensics analysis policy along with whole process to be followed in case of any cyber crime scene reporting.

Бесплатно

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Osama S. Fragallah, Mohamed G. El-Abyad

Статья научная

In simple wavelength-division multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and wavelength assignment problem involves finding a route (routing) and assigning a wavelength to each request. This paper has presented the WDM technology is being extensively deployed on point to point links within transport networks in the EGYPT. However, WDM promises advantages for switching and routing as well as for transmission. Optical cross connects are currently being developed which can switch an entire wavelength from an input fiber to an output fiber so that large bandwidth circuits can be routed through the network according to wavelength. High speed, fixed bandwidth, end to end connections called lightpaths can then be established between different nodes. Our suggested Trans-Egypt Network (TEGYNET) which uses optical cross connects to route lightpaths through the network are referred to as wavelength routing networks. The average setup time, average link utilization, traffic load, blocking probability, and achievable link utilization in the presence of both single path and multi math routing are the major interesting parameters in the design of TEGYNET topology.

Бесплатно

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Оleksandr Korystin, Svyrydiuk Nataliia, Olena Mitina

Статья научная

The paper focuses on the study of cyber security in Ukraine and creation of a predictive model for reducing the risk of identified cyber threats. Forecasting is performed using a linear regression model, taking into account the optimal dependence of specific threats in the field of cyber security of Ukraine on variables characterizing capabilities / vulnerabilities of cyber security. An unique empirical base was used for the analysis, which was formed on the basis of an expert survey of the cyber security system’s subjects in Ukraine. In order to increase the representativeness of the research, based on the selection of reliable expert population, data cleaning is provided. Methodological research is based on a risk-oriented approach, which provided a risk assessment of the spread of cyber threats and, on this basis, the determination of capabilities / vulnerabilities of the cyber security system in Ukraine. The value of the research is formed not only by assessing the risks of the spread of cyber threats, but by a more in-depth analysis of the dependence of the cyber threats’ level on the vulnerability of the cyber security system based on the search for optimal and statistically significant relationships. The experiment was conducted on the basis of determining the optimal model for forecasting the risk of the spread of one of the most significant threats in Ukraine – data confidentiality breach (54.67%), depending on the variables that characterize the capabilities / vulnerabilities of the cyber security system in Ukraine. The experiment showed that the optimal model emphasizes the predictors characterizing the vulnerability of the organizational cyber security system – "Departmental level of cybersecurity monitoring" and capabilities: "The level of use of risk management approaches at the operational level" and "The level of methodological support for cybersecurity of the critical infrastructure system".

Бесплатно

Risk Management Strategies for the Use of Cloud Computing

Risk Management Strategies for the Use of Cloud Computing

Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao

Статья научная

Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic network process were employed to identify and evaluate risks of cloud computing. This research finds all solutions for "contract or agreements", "cross-cloud compatibility" and "social engineering" can only reduce the risks of recurrence (risk frequency) but not eliminate recurrences. In other words, risk is inevitable, but risks with severe consequences may be heavy burdens. Purchasing insurance, if possible, is also strongly recommended.

Бесплатно

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid

Статья научная

With the integration of cloud computing approaches in the healthcare systems, medical images are now processed and stored remotely on third-party servers. For such digital medical image data, privacy, protection, and security must be maintained by using image encryption methods. The aim of this paper is to design and apply a robust medical encryption framework to enhance the protection of medical image transformation and the patient information confidentiality. The proposed Framework encrypt the digital medical images using DNA computation and hyperchaotic RKF-45 random sequence approach. For which, the DNA computation is enhanced by applying hyperchaoticRKF-45 random key to the different Framework phases. The simulation results on different medical images were measured with various security analyses to prove the proposed framework randomness and coherent. Simulation results showed the ability of the hyperchaotic DNA encryption framework to withstand multiple electronic attacks with high performance compared to its counterparts of encryption algorithms. Finally, simulation and comparative studies have shown that, the proposed cryptography framework reported UACI and NPCR values 33.327 and 99.603 respectively, which are near to the theoretical optimal value.

Бесплатно

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

K. Pandey, R. Arya

Статья научная

In the domain of communication technologies, the Device-to-Device (D2D) communication becomes a predominant technology for the implementation of 5G communication system and Internet of Things (IoT) applications. In D2D communication Network, resource allocation and power management are the key areas of interest with ensuring the Quality of Services (QoS). Firstly, we propose the power control problem which is a non-convex problem. By using the log transformation approach, the non-convex problem converts into the convex optimization problem. Robust distributed power control method is further utilized for the power optimization at both ends (base station and D2D user) for underlay Inband D2D communication, where the cellular user and D2D user both use the cellular spectrum. After the power control, resource allocation is done to maximize the energy efficiency by 66.67% for the D2D system. Our proposed work provides new insight to power control techniques in D2D communication. Numerical analysis of the proposed algorithm reflects the impact of robust distributed power control for maintaining the quality of services and enhancing the energy efficiency of the system.

Бесплатно

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Audrey Nangue, Elie Fute Tagne, Emmanuel Tonye

Статья научная

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.

Бесплатно

Журнал