Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1166

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Research on Application of Perceived QoS Guarantee through Infrastructure Specific Traffic Parameter Optimization

Vikram Jeet Singh, Vikram Kumar, Kishori Lal Bansal

Статья научная

The technological developments in the fields of multimedia clinical applications and communication networks require a specific analysis to increase the efficiency of network based healthcare services. In this work, we computed the optimum transmission parameter (data packet size) for applications needed to guarantee the perceived quality of service in the proposed ubiquitous healthcare network. This has been carried out through NS2 based simulation of a state wide area network infrastructure implemented in Himachal Pradesh, a state with diverse geographical terrain situated in the Western Himalayan region of India. The various types of healthcare applications and services have been classified into different classes according to their perceived QOS requirements as per the guidelines in ITU report on network performance objectives. The infrastructure specific optimum values of data packet size for these QoS classes have been computed. Network based healthcare applications and services running on both TCP and UDP type of traffic have been presented in this paper.

Бесплатно

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

Research on Humanoid Robot Soccer System Based on Fuzzy Logic

SHI Lei, WANG Qiang, Wu lijun

Статья научная

This paper presents the use of a fuzzy logic controller combined with Machine Vision to improve the accuracy to identify the ball and speed of approaching the ball in Robot Soccer. The conventional robot control consists of methods for path generation and path following. When a robot moves away the desired track, it must return immediately, and while doing so, the obstacle avoidance behavior and the effectiveness of such a path are not guaranteed. So, motion control is a difficult task, especially in real time and high speed control. To achieve good control performance and requirements for timeliness, accuracy to identify and approach the ball, the paper designs a sugeno fuzzy control system, which could make robot complete the whole football performance, including finding, approaching and shooting ball. At the end of the paper, to validate the proposed fuzzy algorithm, the experiment on METALFIGHTER-2 humanoid robot has been run, which showed that the fuzzy controller is effectiveness and robustness.

Бесплатно

Research on Trusted Industrial Control Ethernet Network

Research on Trusted Industrial Control Ethernet Network

ZHOU Sen-xin, HAN Jiang-hong, TANG Hao

Статья научная

Industrial control Ethernet networks are more important in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges. New types of networks emerged in recent years in order to provide solutions for the increasing requirements on networked services. We propose a trust evaluation model for industrial control Ethernet network. Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of trusted industrial control Ethernet networks.

Бесплатно

Research on the method of multi-channel video acquisition and display based on FPGA

Research on the method of multi-channel video acquisition and display based on FPGA

Jingbo Xia, Xiaohuan Zhao, Weiwu Guo

Статья научная

With the problems of high speed and asynchronism in a multi-channel video, a video monitor system based on FPGA and SRAM is designed and implemented. The system adopts the method of time-division multiplexing to realize the function of four-channel video parallel acquisition. The synchronization between four-channel video is achieved by using the field-selected algorithm. The four-channel video can be outputted to LCD with the technique of ping-pang cache. The LCD display sequences are generated by the finite state machine using Verilog HDL. The system is simple, flexible and with high-quality, and it has a broad application prospect.

Бесплатно

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Manjusha Pandey, Shekhar Verma

Статья научная

Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.

Бесплатно

Resource Provisioning for Routing with Priorities

Resource Provisioning for Routing with Priorities

Subarno Banerjee, Supriya Roy, P. K. Guha Thakurta

Статья научная

In this paper, a novel load balancing technique is proposed to handle biased call request patterns efficiently. The knowledge of call request patterns is used from trace-based analysis; call patterns are affected by various factors such as geographical context, user mobility, network usage patterns and temporal bias. A call routing system is modelled as a network of queues and a provisioning algorithm is developed. The proposed model employs a combination of predictive and reactive provisioning methods. The idea of Capacity Distribution is introduced- a heuristic for heterogeneous capacity allocation among adjacent cell pairs. The proposed model retains simplicity while being able to effectively learn from the variations in call patterns. The performance of the model is evaluated using extensive simulation techniques.

Бесплатно

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko

Статья научная

Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.

Бесплатно

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Ritu Agrawal, Manisha Sharma

Статья научная

Medical Magnetic Resonance Images (MRI) is characterized by a composition of small differences in signal intensities between different tissues types. Thus ambiguities and uncertainties are introduced in image formation. In this paper, review of the current approaches in the tissue segmentation of MR Brain Images has been presented. The segmentation algorithms has been divided into four categories which is able to deal with different intensity non-uniformity as adaptive spatial Fuzzy C - means, Markov Random Field, Fuzzy connectedness method and atlas based re-fuzzy connectedness. The performance of these segmentation methods have been compared in terms of validation metric as dice similarity coefficient, overlap ratio and Jaccard coefficient. The comparison of all validation metric at different levels of intensity non-uniformity shows that adaptive Fuzzy C - means clustering segmentation method give better result in segmentation of brain tissue.

Бесплатно

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Rabail S. Satti, Fakeeha Jafari

Статья научная

Digital Forensics can be defined as a field of study involving the usage of technical and proved procedures for collecting, preserving, validating, analyzing, interpreting and presenting the Evidences extracted from the digital sources for presenting those in the court of law. Different process models have been proposed by the researchers for cyber crimes' investigation process, each having its own suitability to environments where they are applicable and other pros and cons. The paper includes the tailoring of existing process models to the particular domain of higher education institutes. With the growing access of computing resources and internet to the students, employees and overall citizens, it is the need of time that organizations should establish and maintain their cyber forensics analysis policy along with whole process to be followed in case of any cyber crime scene reporting.

Бесплатно

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Osama S. Fragallah, Mohamed G. El-Abyad

Статья научная

In simple wavelength-division multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and wavelength assignment problem involves finding a route (routing) and assigning a wavelength to each request. This paper has presented the WDM technology is being extensively deployed on point to point links within transport networks in the EGYPT. However, WDM promises advantages for switching and routing as well as for transmission. Optical cross connects are currently being developed which can switch an entire wavelength from an input fiber to an output fiber so that large bandwidth circuits can be routed through the network according to wavelength. High speed, fixed bandwidth, end to end connections called lightpaths can then be established between different nodes. Our suggested Trans-Egypt Network (TEGYNET) which uses optical cross connects to route lightpaths through the network are referred to as wavelength routing networks. The average setup time, average link utilization, traffic load, blocking probability, and achievable link utilization in the presence of both single path and multi math routing are the major interesting parameters in the design of TEGYNET topology.

Бесплатно

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Оleksandr Korystin, Svyrydiuk Nataliia, Olena Mitina

Статья научная

The paper focuses on the study of cyber security in Ukraine and creation of a predictive model for reducing the risk of identified cyber threats. Forecasting is performed using a linear regression model, taking into account the optimal dependence of specific threats in the field of cyber security of Ukraine on variables characterizing capabilities / vulnerabilities of cyber security. An unique empirical base was used for the analysis, which was formed on the basis of an expert survey of the cyber security system’s subjects in Ukraine. In order to increase the representativeness of the research, based on the selection of reliable expert population, data cleaning is provided. Methodological research is based on a risk-oriented approach, which provided a risk assessment of the spread of cyber threats and, on this basis, the determination of capabilities / vulnerabilities of the cyber security system in Ukraine. The value of the research is formed not only by assessing the risks of the spread of cyber threats, but by a more in-depth analysis of the dependence of the cyber threats’ level on the vulnerability of the cyber security system based on the search for optimal and statistically significant relationships. The experiment was conducted on the basis of determining the optimal model for forecasting the risk of the spread of one of the most significant threats in Ukraine – data confidentiality breach (54.67%), depending on the variables that characterize the capabilities / vulnerabilities of the cyber security system in Ukraine. The experiment showed that the optimal model emphasizes the predictors characterizing the vulnerability of the organizational cyber security system – "Departmental level of cybersecurity monitoring" and capabilities: "The level of use of risk management approaches at the operational level" and "The level of methodological support for cybersecurity of the critical infrastructure system".

Бесплатно

Risk Management Strategies for the Use of Cloud Computing

Risk Management Strategies for the Use of Cloud Computing

Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao

Статья научная

Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic network process were employed to identify and evaluate risks of cloud computing. This research finds all solutions for "contract or agreements", "cross-cloud compatibility" and "social engineering" can only reduce the risks of recurrence (risk frequency) but not eliminate recurrences. In other words, risk is inevitable, but risks with severe consequences may be heavy burdens. Purchasing insurance, if possible, is also strongly recommended.

Бесплатно

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid

Статья научная

With the integration of cloud computing approaches in the healthcare systems, medical images are now processed and stored remotely on third-party servers. For such digital medical image data, privacy, protection, and security must be maintained by using image encryption methods. The aim of this paper is to design and apply a robust medical encryption framework to enhance the protection of medical image transformation and the patient information confidentiality. The proposed Framework encrypt the digital medical images using DNA computation and hyperchaotic RKF-45 random sequence approach. For which, the DNA computation is enhanced by applying hyperchaoticRKF-45 random key to the different Framework phases. The simulation results on different medical images were measured with various security analyses to prove the proposed framework randomness and coherent. Simulation results showed the ability of the hyperchaotic DNA encryption framework to withstand multiple electronic attacks with high performance compared to its counterparts of encryption algorithms. Finally, simulation and comparative studies have shown that, the proposed cryptography framework reported UACI and NPCR values 33.327 and 99.603 respectively, which are near to the theoretical optimal value.

Бесплатно

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

K. Pandey, R. Arya

Статья научная

In the domain of communication technologies, the Device-to-Device (D2D) communication becomes a predominant technology for the implementation of 5G communication system and Internet of Things (IoT) applications. In D2D communication Network, resource allocation and power management are the key areas of interest with ensuring the Quality of Services (QoS). Firstly, we propose the power control problem which is a non-convex problem. By using the log transformation approach, the non-convex problem converts into the convex optimization problem. Robust distributed power control method is further utilized for the power optimization at both ends (base station and D2D user) for underlay Inband D2D communication, where the cellular user and D2D user both use the cellular spectrum. After the power control, resource allocation is done to maximize the energy efficiency by 66.67% for the D2D system. Our proposed work provides new insight to power control techniques in D2D communication. Numerical analysis of the proposed algorithm reflects the impact of robust distributed power control for maintaining the quality of services and enhancing the energy efficiency of the system.

Бесплатно

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Audrey Nangue, Elie Fute Tagne, Emmanuel Tonye

Статья научная

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.

Бесплатно

Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

Bindiya Bhatia, M.K.Soni, Parul Tomar

Статья научная

In today's world mobile agents and mobile ad-hoc networks are the two technologies that are contributing towards better connectivity and communicability. When the two technologies used jointly, the interest is increased. Due to the properties like self-configuration and infrastructure-less, the mobile ad-hoc networks provide various remarkable features. But the various challenges are also associated with mobile ad-hoc networks like dynamic topology, mobility, energy constraint etc. Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity. Mobile agents move around the ad-hoc networks in a different and better way than the other widespread client server architecture based applications. Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc. The paper reviews the role of the mobile agents in the mobile ad-hoc networks, and emphasizes its application on the various layers of a layered architecture of mobile ad-hoc networks and concludes its merits as compared to other conventional approaches.

Бесплатно

Role of scripting language on Unix operating system for risk assessment

Role of scripting language on Unix operating system for risk assessment

Padma Lochan Pradhan

Статья научная

This proposed dynamic scripting language is a vital role in the complex real-time operating system to review, analysis, protect, detect & correct on data, application, network, software and hardware as per the desired manner to achieve the highest performance of the RTOS. The dynamic language is a primarily responsible for analysis of the fine tuning, performance, fault-tolerance, throughput of the system components at the right time. This research work contributes to the design and development of an automated mechanism that objective to investigate the minimal resource utilization to the robust computing services. We have to define & deployment the Unix scripting codes for real time operating system to achieve the reliability, scalability of the real-time MIMD platform. We have to run this SPL on background process to integrate with real-time hardware, software, network to facilitate to other dependants components. This dynamic code is integrating, interfacing, communicating, message passing, replicating among the several subjects and objects over a real-time operating system.

Бесплатно

Router-based Content-aware Data Redirection for Future CDN Systems

Router-based Content-aware Data Redirection for Future CDN Systems

Janaka L. Wijekoon, Erwin H. Harahap, Shinichi Ishida, Rajitha L. Tennekoon, Hiroaki Nishi

Статья научная

Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of the Internet services. To this end, the Service-oriented Router is introduced to provide content based services by shifting the current Internet infrastructure to information-based open innovation platform. In this study, initially we provide implementation notes of a software-designed SoR. Then we propose a new method of CDN Request Redirection (RR) (SoR-based RR), which is designed to redirect packets based on the content of packets and the status of content servers using an SoR as an edge router of a CDN. Furthermore, we present the design and implementation of a prototype to realize the SoR-based RR in a testing network. By analyzing the result of the prototype implementation, we show that the SoR-based RR can enhance the both client experience and faster adaptations to the server changes in CDN environments.

Бесплатно

Routers Sequential Comparing Two Sample Packets for Dropping Worms

Routers Sequential Comparing Two Sample Packets for Dropping Worms

Kannaiyaraja, Babu, Senthamaraiselvan, Arulandam

Статья научная

Network IDS perform a vital role in protecting network connection in the worldwide from malicious attack. Nowadays the recent experiment work related to inspecting the packet for network security that is a minimal amount of process overhead. In this work, analysis the network intrusion for packet inspection that is together the testing data which inspect only group of packet selected as sample predominantly from small flows and select first two packets and comparing with each other overall packets and create tabelazied for find out different malicious debuggers. This experiment results shows that overcome the existing work.

Бесплатно

SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

Khaled Zeraoulia, Nadjib Badache

Статья научная

Next-generation wireless networks (NGN) and internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment). SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.

Бесплатно

Журнал