International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1157

Статья научная
The need for scalable systems in market demands in terms of lower computing costs and protection of customer investment in computing: scaling up the system to quickly meet business growth is obviously a better way of protecting investment: hardware, software, and human resources. A scalable system should be incrementally expanded, delivering linear incremental performance with a near linear cost increase, and with minimal system redesign (size scalability), additionally, it should be able to use successive, faster processors with minimal additional costs and redesign (generation scalability). On the architecture side, the key design element is the interconnection network. The interconnection network must be able to increase in size using few building blocks and with minimum redesign, deliver a bandwidth that grows linearly with the increase in system size, maintain a low or (constant) latency, incur linear cost increase, and readily support the use of new faster processors. The major problem is the ever-increasing speed of the processors themselves and the growing performance gap between processor technology and interconnect technology. Increased central processing unit (CPU) speeds and effectiveness of memory latency-tolerating techniques.
Бесплатно

Video Forensics in Temporal Domain using Machine Learning Techniques
Статья научная
In defence and military scenarios, Unmanned Aerial Vehicle (UAV) is used for surveillance missions. UAV's transmit live video to the base station. Temporal attacks may be carried out by the intruder during video transmission. These temporal attacks can be used to add/delete objects, individuals, etc. in the live transmission feed. This can cause the video information to misrepresent facts of the UAV transmission. Hence, it is needed to identify the fake video from the real ones. Compression techniques like MPEG, H.263, etc. are popularly used to compress videos. Attacker can either add/delete frames from videos to introduce/remove objects, individuals etc. from video. In order to perform attack on the video, the attacker has to uncompress the video and perform addition/deletion of frames. Once the attack is done, the attacker needs to recompress the frames to a video. Wang and Farid et. al. [1] proposed a method based on double compression technique to detect temporal fingerprints left in the video caused due to frame addition/deletion. Based on double MPEG compression, here we propose a video forensic technique using machine learning techniques to detect video forgery. In order to generate a unique feature vector to identify forged video, we analysed the effect of attacks on Prediction Error Sequence (PES) in various domains like Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) domain etc. A new PES feature γ is defined and extracted from DWT domain, which is proven robust training parameter for both Support Vector Machine (SVM) and ensemble based classifier. The trained SVM was tested for unknown videos to find video forgery. Experimental results show that our proposed video forensic is robust and efficient in detecting video forgery without any human intervention. Further the proposed system is simpler in design and implementation and also scalable for testing large number of videos.
Бесплатно

Video Steganography: Secure Data Hiding Technique
Статья научная
Today, the security is getting the major attention due to the increased use of internet. As the use of internet is increased, the rate at which the data is exchanged per day is also increased. The data that is exchanged every day may become the victim of hackers. To deal with this problem one of the effective solution is the Steganography. The Steganography is a way to hide secret information behind an innocent cover file, such that the existence of information is not usually recognized. This paper uses the concept of video Steganography, where the data is hidden behind the frames of videos. This paper provides two level of security to the data i.e. Steganography and cryptography. First the data is encrypted using cryptography algorithm, next the encrypted data is embedded into frames of videos. The technique used to embed the data is LSB coding. It is the most common technique, but can hide large amount of data in most simplest and efficient way.
Бесплатно

Visual Semagram: An Enhanced Technique for Confidentiality Requirement of Electronic Voting System
Статья научная
One of the rights of citizens in any democratic society is to freely elect a particular candidate into a specific office for governance. This implies that among the candidates participating in an election, one of them would emerge as a winner based on the specified rules and regulation. The recent reports on the election in different parts of the world revealed that the corrupt politicians and corrupt election officers did manipulate the sensitive results thereby leading to undesired candidate emerge as a winner. This implies that election results had not been adequately secured against an attack such as alteration for false results. This paper reviewed scholarly published work and presented a novel technique using visual semagram to satisfy the confidentiality requirement of the electronic voting system. The mathematical equations on how the three primary additive colours (Red, Green and Blue) could be used to modify and conceal the election results against suspicion and alteration were presented. The significance of this paper included the presentation of a technique that would conceal any sensitive message from attackers’ suspicion and scholarly piece of information for further investigation in handling insecurity issues. The future work would involve the implementation and evaluation of the proposed technique to achieve the confidentiality requirement of the e-voting system, and to establish the validity and reliability of proposed technique.
Бесплатно

Visualization of Influencing Nodes in Online Social Networks
Статья научная
The rise of the Internet accelerates the creation of various large-scale online social networks. The online social networks have brought considerable attention as an important medium for the information diffusion model, which can be described the relationships and activities among human beings. The online social networks’ relationships in the real world are too big to present with useful information to identify the criminal or cyber attacks. The methodology for information security analysis was proposed with the complementary of Cluster Algorithm and Social Network Analysis, which presented anomaly and cyber attack patterns in online social networks and visualized the influencing nodes of such anomaly and cyber attacks. The closet vertices of influencing nodes could not avoid from the harmfulness in social networking. The new proposed information security analysis methodology and results were significance analysis and could be applied as a guide for further investigate of social network behavior to improve the security model and notify the risk, computer viruses or cyber attacks for online social networks in advance.
Бесплатно

VoIP Performance Analysis over IPv4 and IPv6
Статья научная
The advance of technology often requires the emergence of complementary technologies, of which the transition from IPv4 to IPv6 presents a significant example. The move of protocol has focussed attention on the level of performance for associated technologies. Among the many Internet applications, in contemporary digital communications, VoIP stands apart in importance. This paper presents a performance analysis of VoIP using IPv4 and IPv6. Using OPNET to simulate the protocols and to investigate areas of performance weakness.
Бесплатно

Статья научная
For starters, in UASN, distance between nodes as they move with water current, improved network's energy usage. The second problem with UASNs is void hole occurrence, which affects network performance. Nodes are unable to deliver data to the destination because there are no forwarder nodes (FNs) in the network. As a result, routing in UASNs aims to solve the previously mentioned issues in order to increase the network's lifespan. This research proposed novel technique in Void avoidance in underwater acoustic sensor network (UASN) with improving the energy efficiency of the network and analysing depth with security. In this proposed model, secure opportunistic energy efficient void avoidance protocol (Se_Opp_EE_VA) is used and the depth of the network has been analysed. By avoiding the vacuum zone and balancing network energy with depth analysis and security, the suggested effort extends the network lifetime. Routing techniques must be comprehensive enough to overcome all of these constraints as well as provide an energy-efficient routing that avoids empty zones while also extending network lifetime. The depth factor is used in depth-based algorithms proposed in recent decades to assess the path from sender to sink. They reduce information replication by using the holding time calculation. 81% of QoS, 92% of PDR, 96% of energy efficiency, Network lifetime attained by Proposed Se_Opp_EE_VA is 94%, and 50% of end to end delay have all improved as a result of the simulation.
Бесплатно

Vowel based Speech Watermarking Techniques using FFT and Min Algorithm"
Статья научная
The critical challenge with the continuously increasing number of Internet users is copying and duplication, which has caused content integrity and protection. To manage and secure the signals from unauthorized consumers of digital content, we require certain procedures. Digital watermarking scheme on vowel-based approach can address these problems. Thus, we can provide a robust and secure method that solves the issues of copyright, illegal intentional or unintentional modification. In this paper, we have proposed vowel-based speech watermarking techniques using the FFT method with the help of the Min algorithm. We observe that the proposed FFT-based watermarking scheme provides better results in comparison to the existing methods.
Бесплатно

Vulnerabilities in Academic E-governance Portals
Статья научная
Internet has become one of the most versatile sources of information and on the other way it has become source of various security threats. Various existing vulnerabilities in the web portals are compromised easily by hackers sitting at their places. There are so many vulnerabilities available in various websites in case of government sectors may be because of financial constraints or other. E-government is a new fast growing area in developing as well as in developed countries. New e-governance applications are emerging and being implemented and utilized by the common man. Providing government information and services on the web has resulted in mushrooming of websites with very little attention is paid to security issues of these websites. This paper discusses certain security issues & vulnerabilities in websites of educational institutes. The organizations taken into consideration are educational institutes of Haryana.
Бесплатно

Статья научная
OAuth 2.0 provides an open secure protocol for authorizing users across the web. However, many modalities of this standard allow these protections to be implemented optionally. Thus, its use does not guarantee security by itself and some of the deployment options in the OAuth 2.0 specification can lead to incorrect settings. FIWARE is an open platform for developing Internet applications of the future. It is the result of the international entity Future Internet Public-Private Partnership. [1,2] FIWARE was designed to provide a broad set of API to stimulate the development of new businesses in the context of the European Union. This platform can be understood as a modular structure to reach a broad spectrum of applications such as IoT, big data, smart device management, security, open data, and virtualization, among others. Regarding security, the exchange of messages between its components is done through the OAuth 2.0 protocol. The objective of the present work is to create a system that allows the detection and analysis of vulnerabilities of OAuth 2.0, executed on HTTP/HTTPS in an on-premise development environment focused on the management of IoT devices and to help developers to implement them ensuring security for these environments. Through the system proposed by this paper, it was possible to find vulnerabilities in FIWARE components in HTTP/HTTPS environments. With this evidence, mitigations were proposed based on the mandatory recommendations by the IETF.
Бесплатно

Wavelength switching delay and distribution in optical fiber networks
Статья научная
Advanced network engineering is rapidly evolving and providing ever larger levels of communications capacity. This work explores deployed wavelength division modulation (WDM) optical networks and the flexible light path scheduling problems. Light path switching can improve the performance of routing and wavelength allocation (RWA) in WDM by relaxing the continuity constraint and consequently reducing connection request blocking probability during RWA process. Through extensive simulations, we are able to conclude that our proposed delayed allocation (DA) algorithm with wavelength switching improves resource consumption efficiency and lowers call blocking. We also evaluate demands with limited wavelength switching such that a reason- able result can be specified. This wavelength switching is found to significantly increase the performance improvement of DA.
Бесплатно

Weighted Round Robin and Rate Limiter based Fair Queuing for WRR
Статья научная
In this paper we present a new packet scheduling method based on parallel usage of multiple WRR schedulers, rate limiters and output bandwidth calculation for modern NGN networks. The main idea of the presented method is to provide queueing fairness within queues. The method provides the same results in output bandwidth allocation as the compared algorithm, while within one queue flows with different packet size and arrival rates gets the same output bandwidth. With this method we are able to achieve the overall result of bandwidth assignment as algorithms like WRR, WFQ, WRRPQ and LLQ by only changing the mathematical model used to calculate the bandwidth assignment. We call this method Weighted Round Robin and Rate Limiter based Fair Queuing (WRRRLbFQ). We prove the model outcome with simulation results using NS2 simulator and compare the behavior with the WRR scheduler.
Бесплатно

Wi-Fi Networks Security and Accessing Control
Статья научная
As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission. This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.
Бесплатно

Wireless wearable smart healthcare monitoring using android
Статья научная
The healthcare monitoring system is very useful for the old age people, cardiac vascular endues and many others for observing vital parameters like blood pressure, heart rate, pulse rate, body temperature etc. The proposed work utilizes 8bit X-Mega2560 microcontroller with an application created for overseers and hospital to constantly watch the patient’s parameters from their home, hospitals etc. The proposed system senses the vital parameters of the patients and sends an alert message to respective caretakers, through Wi-Fi which utilizes COAP conventions. These models are integrated to a simple arduino uno microcontroller to exhibit different functionalities. The system will reduce the cost, empowering the patients who are not able to consult the doctors for diagnosis and also minimize the patient’s transportations. This system will bridge the gap between patient and doctor in real time.
Бесплатно

a novel energy efficient routing protocol EACBM for scalable wireless sensor networks
Статья научная
Recent advancements in the field of wireless communication results in the improvement of Wireless Sensor Networks (WSNs) having low powered, low cost and smallest multi-operational sensing units called Sensor Nodes (SNs). The limited battery life of these SNs is the major issue of WSNs. The dissipation of SN energy for transmitting information of one SN to Base Station (BS) is the major cause of depletion of SN energy. Also, SNs energy is in direct relation with battery lifetime of WSNs. Due to which WSN is affected in terms of scalability, a lifetime of network and energy efficiency. Many routing protocols have been proposed to overcome this issue and clustering is the most dominant scheme in which the whole network is divided into small clusters. This clustering scheme is based on the principle of divide and conquers along with data aggregation. In this paper, authors propose a new routing protocol i.e. Energy Aware Cluster Based Multi-hop (EACBM) which uses the principle of clustering and multi-hop communication pattern for transferring information to BS. So that minimum SNs energy is consumed and hence increases the lifetime of WSN. It also uses the concept of sub-clustering to cover those areas of SNs where CH cannot reach to gather information or which cannot take part in any clustering process due to its far away position. Simulation results show that energy efficiency is greatly optimized by reducing the number of transmission distance between CH and BS via multi-hopping. It also shows how network lifetime, packets transmitted to BS and CH and number of dead SNs is affected by scaling i.e. by different network sizes (100*100m2; 500*500m2 and 1000*1000m2) in EACBM by comparing it with SEP, LEACH, CEEC and LEFCA routing protocols.
Бесплатно

Статья научная
The underwater acoustic environment is a promising technology which explores the real-time data collection for various applications. However, these channels are prone to errors, and characterized by propagation delay, half duplex communication. At low frequencies, the fading phenomenon extensively affect the behavior of the channel and hence the effect the design of reliable communication system. The underwater acoustic channels to perform appreciably reliable communication, an attempt are made by various modulation and coding techniques. Simulation esults for the combination of BPSK modulation with Reed Solomon code (BPSK-RS) having various interleavers Random Interleaver, Matrix Interleaver, have been investigated. To improve the Bit Error Rate performance various modulation techniques such as BPSK, QPSK, and QAM were combined with coding algorithms like RS code, Turbo code and different Interleavers. The investigation of the above combination reveals that IDMA-OFDM-MIMO with BPSK modulation, Turbo code with Random Interleaver technique improves significantly Bit Error Rate performance.
Бесплатно

Статья научная
Due to the maximal transistor count, Multi-Processor System-on-Chip (MPSoC) delivers more performance than uniprocessor systems. Network on Chip (NoC) in MPSoC provides scalable connectivity compared to traditional bus-based interconnects. Still, NoC designs significantly impact MPSoC design as it increases power consumption and network latency. A solution to this problem is packet compression which minimizes the data redundancy within NoC packets and reduces the overall power consumption of the whole network by minimizing a data packet size. Latency and overhead of compressor and decompressor require more memory access time, even though the packet compression is good for the improved performance of NoC. So, this problem demands a simple and lightweight compression method like delta compression. Consequently, this research proposes a new delta-difference Hybrid Tree coding (∆DHT-Zip) to de/compress the data packet in the NoC framework. In this compression approach, the Delta encoding, Huffman encoding and DNA tree (deoxyribonucleic acid) coding are hybridized to perform the data packet de/compression approach. Moreover, a time series approach named Run Length Encoding (RLE) is used to compress the metadata obtained from both the encoding and decoding processes. This research produces decreased packet loss and significant power savings by using the proposed ∆DHT-Zip method. The simulation results show that the proposed ∆DHT-Zip algorithm minimizes packet latency and outperforms existing data compression approaches with a mean Compression Ratio (CR) of 1.2%, which is 79.06% greater than the existing Flitzip algorithm.
Бесплатно