Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1166

SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm

SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm

Ali Gozali, Keivan Borna

Статья научная

The Ad-Hoc networks are the kind of wireless networks that their configuration is done automatically and also the nodes are moving with a certain speed. For this reason the created paths (routes) are often unstable and these paths are usually broken by switching nodes. In this respect, choosing the right path and routing mechanism become more diverse in these networks. In this research by applying some changes to the AODV routing protocols, two new protocols are presented: The first protocol is SAODV, which is a protocol for multi-path which finds the minimum length path between source and destination nodes and then sequentially sends the packets in these paths. The second protocol is SMAODV, which is a verified version of the first one but it finds multi-paths with minimum length for sending the control packets by the use of webpage rank algorithm and a smart mechanism for determining the amount of sending packets. This would cause the energy at any point in the network nodes with minimum variance and increase the network lifetime. The results of simulations in the NS-2 network simulator also verify that our proposed methods have better efficiency than the basic AODV protocol, and improve the network performance and decrease the end-to-end delay of receipt packets.

Бесплатно

Satellite Attitude Determination Filter using Square Root based Spherical Simplex Unscented Transformation

Satellite Attitude Determination Filter using Square Root based Spherical Simplex Unscented Transformation

Kaichun Zhao, Zheng You

Статья научная

A square root based spherical simplex unscented transform was adopted in micro satellite attitude determination filter. The filter computation cost was reduced evidently by means of spherical simplex unscented transformation (SSUT) and the square root technique with modified Rodrigues parameters (MRPs). The filter performance and numerical stability were guaranteed by unscented transformation with positive-semi definiteness of the state covariance propagation. The simulation results of some micro-satellite showed that this algorithm could insure accuracy, fast convergence and high robustness with high computation efficiency, which was suitable for the attitude estimation of micro-satellite.

Бесплатно

Scheduling in Grid Systems using Ant Colony Algorithm

Scheduling in Grid Systems using Ant Colony Algorithm

Saeed Molaiy, Mehdi Effatparvar

Статья научная

Task scheduling is an important factor that directly influences the performance and efficiency of the system. Grid computing utilizes the distributed heterogeneous resources in order to support complicated computing problems. Grid can be classified into two types: computing grid and data grid. Job scheduling in computing grid is a very important problem. To utilize grids efficiently, we need a good job scheduling algorithm to assign jobs to resources in grids. This paper presents a new algorithm based on ant colony optimization (ACO) metaheuristic for solving this problem. In this study, a proposed ACO algorithm for scheduling in Grid systems will be presented. Simulation results indicate our ACO algorithm optimizes total response time and also it increase utilization.

Бесплатно

Scrum and Temporal Distance-Based Global Software Development

Scrum and Temporal Distance-Based Global Software Development

Asmaa Fowzi Alotaibi, M. Rizwan Jameel Qureshi

Статья научная

Global software development (GSD) is one of modern trends in software engineering. The last years has witnessed a significant increase in the adoption of Agile in GSD .This paper considers the issue by examining whether Scrum practices used in mitigation of temporal distance-based GSD coordination challenges. We were used Cisco TelePresence tool in Synchronization communication for simulation of face to face meetings. We were designed a simple algorithm to help project managers in determining the appropriate strategies. This algorithm is based on the temporal difference between the sites. This is may be great or simple. Through temporal difference, we calculated number of working hours overlapping. Which are classified in the three cases and each case has number of strategies are sufficient to overcome this challenges.

Бесплатно

Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

Fangfang Guo, Jing Xu

Статья научная

The inherent mobility of MP2P peers lead to an efficient of existing resources positioning method low, and the proposed application model is single. The proposed methods considered the resource positioning in the direction of the resource provider's, and implement it base on the diffusion resource index, which are spread in the model of epidemic. Networking connectivity model is built in the diffusion path. Diffusion resources index are used to position resources, so as to solve the low positioning efficiency of existing positioning method and large time delay. By comparing the proposed method, the flooding resource location method and the Structural resources localization methods, the obtained simulation results show that the proposed method can effectively improve resource efficiency and accuracy of the location method.

Бесплатно

Sectorized Hamming Concentric Circular Arrays for Stratospheric Platforms Cellular Design

Sectorized Hamming Concentric Circular Arrays for Stratospheric Platforms Cellular Design

Yasser Albagory

Статья научная

Recently, stratospheric platform communications system (SPs) has gained great interest due to its superior performance compared to conventional communications systems. This paper addresses one of the major performance keys in SPs which is the cellular design based on adaptive concentric circular arrays (CCA). The proposed design technique aims to provide circular cells at any elevation angle to overcome the cell flattening and broadening which result in ellipsoidal cell shape. The cell footprint is controlled by adjusting the beamwidths which can be established by sectorizing the CCA and tapering the current amplitudes of the effective sectors by Hamming function while the others are muted and the resulted array is called Sectorized Hamming tapered CCA (SHTCCA). In this array, each sector has an angular width of 90o and some and two opposite sectors are fully fed while the others has less number of quarter-circular arrays. The tapering of the active sectors results in lower sidelobe levels which is a paramount improvement for the cellular systems. In addition, the SHTCCA is analyzed and optimized to provide the desired beamwidths at any elevation angle that are needed to design circular cell footprint.

Бесплатно

Secure Access of Folders and Files after Removal of Duplicacy over the Cloud

Secure Access of Folders and Files after Removal of Duplicacy over the Cloud

A. Archana, N. Kumar, Mohammad Zubair Khan

Статья научная

Cloud computing is an emerging concept that makes better use of a large number of distributed resources. The most significant issue that affects the cloud computing environment is resource provisioning. Better performance in the shortest amount of time is an important goal in resource provisioning. Create the best solution for dynamically provisioning resources in the shortest time possible. This paper aims to perform resource provisioning with an optimal performance solution in the shortest time. Hybridization of two Meta-heuristics techniques, such as HSMOSA (Hybrid Spider Monkey Optimization with Simulated Annealing), is proposed in resource provisioning for cloud environment. Finds the global and local value using Spider Monkey Optimization's (SMO) social behavior and then utilizes Simulated Annealing (SA) to search around the global value in each iteration. As a result, the proposed approach aids in enhancing their chances of improving their position. The CloudSimPlus Simulator is used to test the proposed approach. The fitness value, execution time, throughput, mean, and standard deviation of the proposed method were calculated over various tasks and execution iterations. These performance metrics are compared with the PSO-SA algorithm. Simulation results validate the better working of the proposed HSMOSA algorithm with minimum time compared to the PSO-SA algorithm.

Бесплатно

Secure Allocation of Resources in Cloud Using Trust

Secure Allocation of Resources in Cloud Using Trust

Usha Divakarla, K. Chandrasekaran

Статья научная

Cloud is the recent emerging technology in all aspects. The basic concern with the usage of this Cloud Technology is security. Security poses a major drawback with data storage, resource utilization, virtualization, etc. In the highly competitive environment the assurances are insufficient for the customers to identify the trust worthy cloud service providers. As a result all the entities in cloud and cloud computing environment should be trusted by each other and the entities that have communication should have valid trust on each other. Trust being the profound component in any network has attracted many researchers for research in various ways. The models developed so far are platform dependent and are not valid for heterogeneous platforms. An efficient model which can be ported on any platform is the current research trend in the research world. Our model is platform independent and also helps in calculating trust while migrating to another platform. The result shows that the proposed model is much more efficient in terms of computation time.

Бесплатно

Secure Data Storage and Retrieval over the Encrypted Cloud Computing

Secure Data Storage and Retrieval over the Encrypted Cloud Computing

Jaydip Kumar, Hemant Kumar, Karam Veer Singh, Vipin Saxena

Статья научная

Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.

Бесплатно

Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation

Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation

Pradeep Kumar, Niraj Singhal, Dhiraj Pandey, Avimanyou Vatsa

Статья научная

Mobile agent is a processing unit works on the behalf of host computer. Mobile agent with intelligence provides a new computing prototype that is totally different from conventional prototype. Mobile agents are automatically itinerating from one host Computer to another host computer and execute assigned task on the behalf of user in heterogeneous environment under own control. Because mobile agents roam around distributed networks automatically, the security of the agents and platforms is a major concern. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most protection systems in the mobile agent paradigm focus on platform security and provide few guidelines for mobile agent security, which is still a challenging topic. There is a risk to information carries by mobile agents from the malicious mobile agents who can modify and steal the confidential information. In this paper proposed multilevel authentication framework of mobile agents and platform based on Lagrange interpolation and fast Fourier transformation (LIFFT). In this frame work ‘n’ number of mobile agent have two level of security first level key used authentication and second level of key used for execution of mobile agents.

Бесплатно

Secure Model for SMS Exchange over GSM

Secure Model for SMS Exchange over GSM

Mohammed Baqer M. Kamel, Loay E. George

Статья научная

Distributed systems use General Packet Radio Service (GPRS) to exchange information between different members of the system. The members of the system depend critically upon their ability to access internet connection in order to exchange data via GPRS and the system will shut down in case of unavailability of Internet connection. There is a strong need for developing another backup communication media. In this paper a data transaction method based on encoded Short Message Service (SMS) over Global System for Mobile Communication (GSM) is proposed. This new method guarantees the functionality of the system in case of inaccessibility to GPRS which may be not always available due to measures such as attacks that affect its availability. The proposed method is based on third party agent who can keep the address secrecy of both communicators besides keeping confidentiality, integrity and availability.

Бесплатно

Secure Usable Authentication Using Strong Pass text Passwords

Secure Usable Authentication Using Strong Pass text Passwords

C. Shoba Bindu

Статья научная

Traditional alphanumeric passwords used for remote user authentication does not offer both usability and security. Graphical passwords were proposed as an alternative to these textual passwords for improving usability and security. This paper proposes a remote user authentication scheme, which extends the existing pass text scheme. The usability and security of the proposed scheme is analyzed. Using Morea tool the Usability of the proposed scheme is investigated.

Бесплатно

Secure and Fast Chaos based Encryption System using Digital Logic Circuit

Secure and Fast Chaos based Encryption System using Digital Logic Circuit

Ankur A. Khare, Piyush B. Shukla, Sanjay C. Silakari

Статья научная

Chaotic system based message encryption system for wired and wireless networks broadly used in computer engineering, communication and network security, such as robotic systems, encryption, synchronization and genetic network. The main motive for developing the chaos based cryptosystem is to attain encryption with several compensation over the conventional encryption algorithms such as high security, speed, complexity, cost and quality assurance. These challenges encourage the researchers to develop novel chaos based data encryption techniques with digital logics dealing with encryption of messages for fast and secure communication networks. This effort provides a modified version of traditional data encryption algorithms to provide good quality and performance in a secure communication network environment. A cryptology technique is widely used in network security during communication. An avalanche effect is the attractive property of cryptography in which two different keys produce different cipher text for the same data information and also some Important properties related to chaotic systems are sensitivity to initial condition and nonlinearity, which makes two similar or slightly different keys to generate completely different cipher text to produce confusion. It has been proposed a novel fast & secure encryption Technique which uses the chaotic map function to generate the different multiple keys and shows that negligible difference in parameters of chaotic function generate completely different keys as well as cipher text. Cryptanalysis of the proposed algorithm shows the strength and security of algorithm and keys.

Бесплатно

Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency

Secure and Optimized Authentication Scheme in Proxy Mobile IPv6 (SOAS-PMIPv6) to reduce Handover Latency

Arun Kumar Tripathi, J. S. Lather, R. Radhakrishnan

Статья научная

Advancement in wireless technologies allows mobile devices to access Internet from anywhere at any time. Each network is identified by unique IP address. Mobile IP allows a mobile node to change its network without changing IP address. Internet Engineering Task Force (IETF) has suggested several mobility management protocols such MIPv6, HMIPv6, PMIPv6 etc. for perpetual mobility. MIPv6 is a Host-Based Mobility Management (HBMM) protocol and provides global mobility solution to the mobile node. MIPv6 suffers from basic mobility related problems such as handover latency, packet loss etc. Recently the IETF has suggested Network-Based Mobility Management (NBMM) protocol. The Proxy Mobile IPv6 (PMIPv6) is first NBMM protocol. PMIPv6 significantly decreases the signaling overhead, but still has some issues related to the security, handover latency and packet loss. This paper proposes Secure and an Optimized Authentication Scheme in PMIPv6 (SOAS-PMIPv6) to reduce signaling overhead. The proposed scheme provides higher security than the basic PMIPv6 protocol and moreover reduces the signaling cost with respect to contemporary protocols. This paper performs comprehensive analysis on handover latency, packet delivery cost, packet loss etc. and the performance of protocols is mathematically investigated. Numerical result shows that the proposed scheme has improved performance than the MIPv6 in terms of handover latency and provides optimized security than PMIPv6 based protocols.

Бесплатно

Secure data transmission of video steganography using Arnold scrambling and DWT

Secure data transmission of video steganography using Arnold scrambling and DWT

Hnin Lai Nyo, Aye Wai Oo

Статья научная

For the sensitive information, the best privacy demand must be supported in commercial, technical and legal regulations. In this system we used combination of steganography and cryptography techniques in order to improve imperceptibility, robustness, payload capacity and to transmit data securely. As the preprocessing step, Arnold scrambling and discrete wavelet transform (DWT) techniques are used over the secret image. Then the referable values are calculated from the values of transformed secret image with the use of a secret key and embed these referable values in the video file by least significant bit (LSB) technique. Moreover, the secret key is encrypted with a pre-shared key by a new stream cipher Twisted Exchange Algorithm. And the result encrypted message is embedded behind the audio file by Parity coding technique. As the experimental results, performance of the system is tested with different real time images and various video quality files and measured by different parameters (PSNR, MSE), then it is also analyzed with attacks.

Бесплатно

Secure multiparty computation for privacy preserving range queries on medical records for star exchange topology

Secure multiparty computation for privacy preserving range queries on medical records for star exchange topology

Ahmed M. Tawfik, Sahar F. Sabbeh, Tarek A. EL-Shishtawy

Статья научная

Moving from a paper-based to electronic-based medical records has become recently a target for many medical institutions to increase efficiency and decrease costs. However, this makes patient's sensitive data – collected and stored in electronic medical records (EMRs) – more vulnerable and at the risk of privacy violations and breaches. For this sake, institutions try to protect the privacy of its patients' data. However, being a part of a bigger medical system may require that an institution be a part of a global query, such situation imposes new challenges for hospitals to preserve their data privacy while being able to participate in global analytical queries with other hospitals. Secure multi-party computation protocols (SMC) help in executing global analytical queries between a set of distrustful data owners who have no desire to share their confidential data, however they all need to cooperate to answer global queries about patients' medical history. The bulk of SMC protocols targets the ring topology execution environment in which query results at one node are passed to next node in the topology. In this paper, we propose a privacy preserving SMC technique to execute equality-test and range queries on EMRs. Our proposed technique uses bucketization to reduce computational cost. We replaced the conventional ring topology by start where each party can exchange messages directly over a private connection with the mediator. This too can improve management and improves the overall performance. Our experimental results show the effectiveness of our technique which provides better privacy without the need for trusted third party (TTP).

Бесплатно

Secure video compression and integration technique for data transmission

Secure video compression and integration technique for data transmission

A.D.Senthil Kumar, T.S.Anandhi, Ranganath Muthu

Статья научная

This paper approaches security application for digital image and video processing. The techniques involve H.264 Video Compression, Elliptical Curve Cryptography Encryption followed by Image Interleaving and last by Pixel Integration to generate integrated multi-video. The user can choose any of the videos among the several integrated videos displayed with a unique security key for each video. With the secure key assigned for each video input, the original video is displayed by decrypting it from multiple videos.

Бесплатно

Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization

Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization

M. Selvi, B. Ramakrishnan

Статья научная

Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.

Бесплатно

Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication

Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication

Javeria Ambareen, Prabhakar M.

Статья научная

Wireless sensor networks (WSNs) when combined with Internet-of-things (IoT) enable a wide range of applications across multiple domains. Sensor nodes in these wireless sensor networks like any other Internet-connected device are resource constrained and vulnerable to a variety of malicious attacks thereby compromising security. Consequently, a secure and efficient lightweight cryptographic protocol is required that can provide a balance between end-to-end security offering all features but yet lightweight. For secure data transmission and access, newer multi-factor authentication and key management features must be developed as majority of existing techniques have high computational overheads and are vulnerable to a wide range of attacks. In this paper, we propose a Rabin-assisted three-factor authentication protocol that uses the computational asymmetry of Rabin cryptosystem in addition to user password, smartcard and biometric for increased security. NS2 based simulation proves that the proposed protocol outperforms the baseline ad-hoc on-demand distance vector (AODV) protocol in terms of throughput, computation cost, and delay performance. Also, it has the ability to tolerate most common attacks and offers additional functionality features thereby offering a lightweight and highly secure protocol that can be extended to other critical domains like Smart Transportation Systems (STS), Smart grids, Smart buildings etc.

Бесплатно

Securing Voice Communications Using Audio Steganography

Securing Voice Communications Using Audio Steganography

Anthony Phipps, Karim Ouazzane, Vassil Vassilev

Статья научная

Although authentication of users of digital voice-based systems has been addressed by much research and many commercially available products, there are very few that perform well in terms of both usability and security in the audio domain. In addition, the use of voice biometrics has been shown to have limitations and relatively poor performance when compared to other authentication methods. We propose using audio steganography as a method of placing authentication key material into sound, such that an authentication factor can be achieved within an audio channel to supplement other methods, thus providing a multi factor authentication opportunity that retains the usability associated with voice channels. In this research we outline the challenges and threats to audio and voice-based systems in the form of an original threat model focusing on audio and voice-based systems, we outline a novel architectural model that utilises audio steganography to mitigate the threats in various authentication scenarios and finally, we conduct experimentation into hiding authentication materials into an audible sound. The experimentation focused on creating and testing a new steganographic technique which is robust to noise, resilient to steganalysis and has sufficient capacity to hold cryptographic material such as a 2048 bit RSA key in a short audio music clip of just a few seconds achieving a signal to noise ratio of over 70 dB in some scenarios. The method developed was seen to be very robust using digital transmission which has applications beyond this research. With acoustic transmission, despite the progress demonstrated in this research some challenges remain to ensure the approach achieves its full potential in noisy real-world applications and therefore the future research direction required is outlined and discussed.

Бесплатно

Журнал