Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1110

VoIP Performance Analysis over IPv4 and IPv6

VoIP Performance Analysis over IPv4 and IPv6

Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi

Статья научная

The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.

Бесплатно

Void Avoidance in Underwater Acoustic Sensor Network Using Secure Opportunistic Energy Efficient Depth Routing Protocol

Void Avoidance in Underwater Acoustic Sensor Network Using Secure Opportunistic Energy Efficient Depth Routing Protocol

Ashok Battula, S. Emalda Roslin, W. Florin

Статья научная

For starters, in UASN, distance between nodes as they move with water current, improved network's energy usage. The second problem with UASNs is void hole occurrence, which affects network performance. Nodes are unable to deliver data to the destination because there are no forwarder nodes (FNs) in the network. As a result, routing in UASNs aims to solve the previously mentioned issues in order to increase the network's lifespan. This research proposed novel technique in Void avoidance in underwater acoustic sensor network (UASN) with improving the energy efficiency of the network and analysing depth with security. In this proposed model, secure opportunistic energy efficient void avoidance protocol (Se_Opp_EE_VA) is used and the depth of the network has been analysed. By avoiding the vacuum zone and balancing network energy with depth analysis and security, the suggested effort extends the network lifetime. Routing techniques must be comprehensive enough to overcome all of these constraints as well as provide an energy-efficient routing that avoids empty zones while also extending network lifetime. The depth factor is used in depth-based algorithms proposed in recent decades to assess the path from sender to sink. They reduce information replication by using the holding time calculation. 81% of QoS, 92% of PDR, 96% of energy efficiency, Network lifetime attained by Proposed Se_Opp_EE_VA is 94%, and 50% of end to end delay have all improved as a result of the simulation.

Бесплатно

Vulnerabilities in Academic E-governance Portals

Vulnerabilities in Academic E-governance Portals

Subhash Chander, Ashwani Kush

Статья научная

Internet has become one of the most versatile sources of information and on the other way it has become source of various security threats. Various existing vulnerabilities in the web portals are compromised easily by hackers sitting at their places. There are so many vulnerabilities available in various websites in case of government sectors may be because of financial constraints or other. E-government is a new fast growing area in developing as well as in developed countries. New e-governance applications are emerging and being implemented and utilized by the common man. Providing government information and services on the web has resulted in mushrooming of websites with very little attention is paid to security issues of these websites. This paper discusses certain security issues & vulnerabilities in websites of educational institutes. The organizations taken into consideration are educational institutes of Haryana.

Бесплатно

Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS

Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS

Gilson da Silva Francisco, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Eduardo Takeo Ueda, Adilson Eduardo Guelfi, Jose Jesus Perez Alcazar

Статья научная

OAuth 2.0 provides an open secure protocol for authorizing users across the web. However, many modalities of this standard allow these protections to be implemented optionally. Thus, its use does not guarantee security by itself and some of the deployment options in the OAuth 2.0 specification can lead to incorrect settings. FIWARE is an open platform for developing Internet applications of the future. It is the result of the international entity Future Internet Public-Private Partnership. [1,2] FIWARE was designed to provide a broad set of API to stimulate the development of new businesses in the context of the European Union. This platform can be understood as a modular structure to reach a broad spectrum of applications such as IoT, big data, smart device management, security, open data, and virtualization, among others. Regarding security, the exchange of messages between its components is done through the OAuth 2.0 protocol. The objective of the present work is to create a system that allows the detection and analysis of vulnerabilities of OAuth 2.0, executed on HTTP/HTTPS in an on-premise development environment focused on the management of IoT devices and to help developers to implement them ensuring security for these environments. Through the system proposed by this paper, it was possible to find vulnerabilities in FIWARE components in HTTP/HTTPS environments. With this evidence, mitigations were proposed based on the mandatory recommendations by the IETF.

Бесплатно

Wavelength switching delay and distribution in optical fiber networks

Wavelength switching delay and distribution in optical fiber networks

Farhan Nisar, Samad Baseer, Arshad Khan

Статья научная

Advanced network engineering is rapidly evolving and providing ever larger levels of communications capacity. This work explores deployed wavelength division modulation (WDM) optical networks and the flexible light path scheduling problems. Light path switching can improve the performance of routing and wavelength allocation (RWA) in WDM by relaxing the continuity constraint and consequently reducing connection request blocking probability during RWA process. Through extensive simulations, we are able to conclude that our proposed delayed allocation (DA) algorithm with wavelength switching improves resource consumption efficiency and lowers call blocking. We also evaluate demands with limited wavelength switching such that a reason- able result can be specified. This wavelength switching is found to significantly increase the performance improvement of DA.

Бесплатно

Weighted Round Robin and Rate Limiter based Fair Queuing for WRR

Weighted Round Robin and Rate Limiter based Fair Queuing for WRR

Tomáš Balogh, Martin Medvecký

Статья научная

In this paper we present a new packet scheduling method based on parallel usage of multiple WRR schedulers, rate limiters and output bandwidth calculation for modern NGN networks. The main idea of the presented method is to provide queueing fairness within queues. The method provides the same results in output bandwidth allocation as the compared algorithm, while within one queue flows with different packet size and arrival rates gets the same output bandwidth. With this method we are able to achieve the overall result of bandwidth assignment as algorithms like WRR, WFQ, WRRPQ and LLQ by only changing the mathematical model used to calculate the bandwidth assignment. We call this method Weighted Round Robin and Rate Limiter based Fair Queuing (WRRRLbFQ). We prove the model outcome with simulation results using NS2 simulator and compare the behavior with the WRR scheduler.

Бесплатно

Wi-Fi Networks Security and Accessing Control

Wi-Fi Networks Security and Accessing Control

Tarek S. Sobh

Статья научная

As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission. This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

Бесплатно

Wireless wearable smart healthcare monitoring using android

Wireless wearable smart healthcare monitoring using android

Manasa, U. B Mahadevaswamy

Статья научная

The healthcare monitoring system is very useful for the old age people, cardiac vascular endues and many others for observing vital parameters like blood pressure, heart rate, pulse rate, body temperature etc. The proposed work utilizes 8bit X-Mega2560 microcontroller with an application created for overseers and hospital to constantly watch the patient’s parameters from their home, hospitals etc. The proposed system senses the vital parameters of the patients and sends an alert message to respective caretakers, through Wi-Fi which utilizes COAP conventions. These models are integrated to a simple arduino uno microcontroller to exhibit different functionalities. The system will reduce the cost, empowering the patients who are not able to consult the doctors for diagnosis and also minimize the patient’s transportations. This system will bridge the gap between patient and doctor in real time.

Бесплатно

a novel energy efficient routing protocol EACBM for scalable wireless sensor networks

a novel energy efficient routing protocol EACBM for scalable wireless sensor networks

Amanjot Singh Toor, A.K. Jain

Статья научная

Recent advancements in the field of wireless communication results in the improvement of Wireless Sensor Networks (WSNs) having low powered, low cost and smallest multi-operational sensing units called Sensor Nodes (SNs). The limited battery life of these SNs is the major issue of WSNs. The dissipation of SN energy for transmitting information of one SN to Base Station (BS) is the major cause of depletion of SN energy. Also, SNs energy is in direct relation with battery lifetime of WSNs. Due to which WSN is affected in terms of scalability, a lifetime of network and energy efficiency. Many routing protocols have been proposed to overcome this issue and clustering is the most dominant scheme in which the whole network is divided into small clusters. This clustering scheme is based on the principle of divide and conquers along with data aggregation. In this paper, authors propose a new routing protocol i.e. Energy Aware Cluster Based Multi-hop (EACBM) which uses the principle of clustering and multi-hop communication pattern for transferring information to BS. So that minimum SNs energy is consumed and hence increases the lifetime of WSN. It also uses the concept of sub-clustering to cover those areas of SNs where CH cannot reach to gather information or which cannot take part in any clustering process due to its far away position. Simulation results show that energy efficiency is greatly optimized by reducing the number of transmission distance between CH and BS via multi-hopping. It also shows how network lifetime, packets transmitted to BS and CH and number of dead SNs is affected by scaling i.e. by different network sizes (100*100m2; 500*500m2 and 1000*1000m2) in EACBM by comparing it with SEP, LEACH, CEEC and LEFCA routing protocols.

Бесплатно

performance analysis of underwater acoustic communication using IDMA-OFDM-MIMO with reed Solomon and turbo code

performance analysis of underwater acoustic communication using IDMA-OFDM-MIMO with reed Solomon and turbo code

Rajashri Khanai, Salma S. Shahapur, Dattaprasad Torse

Статья научная

The underwater acoustic environment is a promising technology which explores the real-time data collection for various applications. However, these channels are prone to errors, and characterized by propagation delay, half duplex communication. At low frequencies, the fading phenomenon extensively affect the behavior of the channel and hence the effect the design of reliable communication system. The underwater acoustic channels to perform appreciably reliable communication, an attempt are made by various modulation and coding techniques. Simulation esults for the combination of BPSK modulation with Reed Solomon code (BPSK-RS) having various interleavers Random Interleaver, Matrix Interleaver, have been investigated. To improve the Bit Error Rate performance various modulation techniques such as BPSK, QPSK, and QAM were combined with coding algorithms like RS code, Turbo code and different Interleavers. The investigation of the above combination reveals that IDMA-OFDM-MIMO with BPSK modulation, Turbo code with Random Interleaver technique improves significantly Bit Error Rate performance.

Бесплатно

Журнал