Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1110
A privacy-aware dynamic authentication scheme for IoT enabled business services
Статья научная
Tech-savvy users are striving to bring automation and digitization in their lifestyle to make life more comfortable and efficient; Internet of Things (IoT) is an enabler in this direction. Technology advancements and new business opportunities are rapidly changing the IoT adoption landscape, and thereby security and privacy concerns have also started raising and realizing. The increasing number of IP enabled electronic devices, enormous data generation, and communication traffic have enhanced the attack surface for security and privacy violators. Many security attack scenarios are the result of poor identification and authentication mechanisms of communicating entities. In this paper, we present a secure scheme to perform a business transaction initiated by a smart device in the IoT environment. Scheme performs dynamic authentication of a business transaction while ensuring the privacy of the associated user(s). This scheme relies on Message Authentication Code (MAC) and dynamic key generation method to achieve a secure workflow. In this paper, we present a pluggable Roaming Smart Meters (RSM) concept to demonstrate the applicability of the proposed authentication scheme.
Бесплатно
A programmable and managed software defined network
Статья научная
Software Defined Networking is a paradigm-shifting technology in the field of computer networking. It empowers network administrators by giving them the ability to manage the network services through abstraction of the low-level network functionalities. This technology simplifies networking and makes it programmable. This paper presents an implementation of this new paradigm of networking, which can replace the currently existing legacy networking infrastructure to provide more control over the network, perform a better analysis of the network operation and hence program the network according to the needs of the network administrator. This implementation also empowers the network administrators to provide Quality of Service to its users that are connected to the network and uses the services of the network. Therefore, it benefits both the network administrator and the users. Also, the ping latency in the network is reduced by 5-10%, and the number of packets in is reduced by 60-70% in the solution developed depending on the size of the network.
Бесплатно
Статья научная
On the features of short content and nearly real-time broadcasting velocity of micro-blog information, our lab constructed a public opinion corpus named MPO Corpus. Then, based on the analysis of the status of the network public opinion, it proposes an approach to calculate the sentiment intensity from three levels on words, sentences and documents respectively in this paper. Furthermore, on the basis of the MPO Corpus and HowNet Knowledge-base and sentiment analysis set, the feature words’ semantic information is brought into the traditional vector space model to represent micro-blog documents. At the same time, the documents are classified by the subjects and sentiment intensity. Therefore, the experiment result indicates that the proposed method improves the efficiency and accuracy of the micro-blog content classification,the public opinion characteristics analysis and supervision in this paper. Thus, it provides a better technical support for content auditing and public opinion monitoring for micro-blog platform.
Бесплатно
A solution for water factories in Vietnam using automatic meter reading technology
Статья научная
A solution for water factories in Vietnam using automatic meter reading technology is proposed in this paper. The water meters and water quality meters for water factories in Vietnam have been designed and prototyped. Water meters differ from conventional meters in that they record the water consumption and communicate that information back to the water suppliers for monitoring and billing without the need for manual readings. Water quality meters monitor multiple parameters relating to water quality such as pH, electro-conductivity, temperature, etc., and transmit these parameters to a server via GPRS network. Therefore, customers and water suppliers can monitor the water consumption, water quality parameters from anywhere via the Internet. This project has been conducted in a water factory located in Thai Nguyen Province, Vietnam. The results have shown that the consideration of this solution has been operated well in the real condition in Vietnam.
Бесплатно
A solution to secure personal data when Aadhaar is linked with DigiLocker
Статья научная
With spread of digitalization in India, the government initiated many welfare schemes for citizens as a part of e-governance. To ensure security, it is made mandatory to link Aadhaar card of beneficiaries with different schemes. The government also proposed to link UIDAI with DigiLocker to lead India towards the paperless economy. Due to this, worries related to security concern arise. Once UIDAI connected with DigiLocker, a resident can share personal data with other agencies. It generates enormous amount of Data and it may cause misuse of personal data. It is very important to keep data secure with controlled and authenticated access. It is a challenge to manage and secure this amount of data. In this paper, we propose a framework and model to secure personal data using proper authentication process. Availability of the documents should be verified by the owner and post verification, the document should be accessible for the limited time. Failing which revalidation is required.
Бесплатно
A state-of-the-art survey of coverless text information hiding
Статья научная
Information plays a pre-eminent role in people's routine lives. It provides people with facts about abundant topics of interest. Information can be represented by a variety of communicative media such as text, video, audio, and image, out of which text is the most common medium for representing the information. In the digital era, the information can easily be imitated, exchanged and distributed from one place to another in an instant. Thus, it is incredibly essential to hide the confidential information so that it couldn’t be accessed by unauthorized means. The traditional information hiding techniques require a designated carrier to hide the secret information, which ultimately introduces some modifications in the carrier. As a result, it is quite hard for the existing traditional methods to escape from the steganalysis. In contrast to conventional information hiding techniques, the term ‘coverless information hiding’ has been coined by the researchers lately, which doesn’t require a designated carrier to conceal the secret information. Hence, the technique of coverless information hiding can efficiently resist the attacks of steganalysis. This paper presents a state-of-the-art survey of coverless text information hiding by discussing the current scope of the aforementioned technique comprehensively. The existing coverless text information hiding methods are compared and contrasted by various vital aspects such as embedding capacity, algorithm efficiency, ability to resist steganalysis, and methods’ theoretical and real-world significance. Moreover, some future aspects of coverless text information hiding are highlighted at the end.
Бесплатно
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Статья научная
Wireless infrastructure network is vulnerable to Denial of Service (DoS) attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM) which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.
Бесплатно
AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
Статья научная
Most organizations concurrently maintain private Automatic Branch Exchange (PABX) and Local Area Network (LAN) for information interchange within their organization. This is obviously a waste of resources and avoidable duplication of communication systems. The existing LAN can be used as a communication backbone for the in house telephone operations with no extra cost and resources. In view of this, a portable and a platform independent Software-Based Cell Phone (SCP) was proposed for the existing LANs infrastructure in the organizations. The SPC is a telephony application with a user friendly interface which is capable of handling voice, video and text messages without compromising the Quality of Service (QoS) of the existing LAN.
Бесплатно
Accelerating the Response of Query in Semantic Web
Статья научная
Today, XML has become one of the important formats of saving and exchanging data. XML structure flexibility enhances its use, and the content of XML documents is increasing constantly. As a result, since file management system is not able to manage such content of data, managing XML documents requires a comprehensive management system. With the striking growth of such databases, the necessity of accelerating the implementing operation of queries is felt. In this paper, we are searching for a method that has required ability for a large set of queries; the method that would access fewer nodes and would get the answer through a shorter period of time, compared to similar ways; the method which has the ability of matching with similar ways indicator, and can use them to accelerate the queries. We are seeking a method which is able to jump over the useless nodes and produces intermediate data, as compared to similar ones. A method by which nodes processing are not performed directly and automatically through a pattern matching guide.
Бесплатно
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Статья научная
To simulate the glucose-insulin concentration of type 1 diabetic patient an Intelligent Temporal Mediator (ITM) has been designed. The ITM integrates the tasks of temporal reasoning and temporal maintenance. The paper discusses the design of ITM reasoning system which was based on open-loop insulin delivery technique. The result shows that ITM successfully models the blood glucose profile of the diabetic patient. The designed ITM is also compared with existing open-loop simulator for checking its performance.
Бесплатно
Achieving confidentiality in electronic health records using cloud systems
Статья научная
Currently, existing methods for enforcing access to records in an Electronic Health Record system relies on a single Trusted Server which stores health records and mediates access. Such Trusted Severs employ either a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) or Key-Policy Attribute-Based Encryption (KP-ABE) method for storing and controlling access. However, Trusted Server storage of health records is susceptible to single-point-of-threat attack and a successful attack invariably leads to compromising the integrity of records on the server. In this research work. This paper presents a methodology that defines and creates simple Access Structures and eliminates need for private keys during encryption and/or decryption of health records which is the Enhanced Ciphertext-Policy Attribute-Based Encryption (ECP-ABE). The ECP-ABE yields high cryptographic performance creates simple Access Structures, eliminates need for private keys and presents an implementation architecture that makes cloud-based EHR system secure and confidential. The ECP-ABE also performs cryptographic functions using less CPU time, minimal computer memory and produces high encryption and decryption throughput especially with increasing file sizes.
Бесплатно
Статья научная
Localization in Vehicular Ad Hoc Networks is a challenging issue due to the dynamic topology and high mobility of vehicles. Finding the exact location of the vehicles is not possible in this network due to the vehicles moving speed. In vehicular ad hoc networks, various kinds of localization techniques are used to know the position and the location of the vehicles. These techniques do have some limitations due to obstacles on the roadside, building shadow, tunnels and bad weather condition, etc. This paper is motivated to propose an algorithm to increase the localization accuracy and localization error. Acknowledgement based Localization Method (ALM) is used to improve the vehicle’s positioning information while broadcasting an Emergency Safety Message. ALM updates the position information whenever the vehicle changes its position. The proposed algorithm is compared with RSSI, TOA and DLM based localization techniques. The result shows that ALM algorithm improves the accuracy level and reduces the error rate caused by incorrect position estimation.
Бесплатно
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Статья научная
In this paper, we propose a secure, lightweight acoustic pseudo-random number generator (SLA-LFSR-PRNG) that consumes less memory, CPU capacity and adopts the multi-thread parallelization to generate huge random numbers per second by taking the advantages of multi-core CPU and massively parallel architecture of GPU. The generator is based on cryptographically secure Linear Feedback Shift Register(LFSR) and extracts the entropy from sound sources. The major attraction of proposed Pseudo Random Number Generator(PRNG) is its immunity to major attacks on pseudo-random number generators. The paper presents test results of proposed PRNG subjected to NIST SP 800-22 statistical test suite and also shows the performance comparison of proposed generator on different systems.
Бесплатно
Action-Dependent Adaptive Critic Design Based Neurocontroller for Cement Precalciner Kiln
Статья научная
There are many factors that can affect the calciner process of cement production, such as highly nonlinearity and time-lag, making it very difficult to establish an accurate model of the cement precalciner kiln (PCK) system. In order to reduce transport energy consumption and to ensure the quality of cement clinker burning, one needs to explore different control methods from the traditional way. Adaptive Critic Design (ACD) integrated neural network, reinforcement learning and dynamic programming techniques, is a new optimal method. As the PCK system parameters change frequently with high real-time property, ADACD (Action-Dependant ACD) algorithm is used in PCK system to control the temperature of furnace export and oxygen content of exhaust. ADACD does not depend on the system model, it may use historical data to train a controller offline, and then adapt online. Also the BP network of artificial neural network is used to accomplish the network modeling, and action and critic modules of the algorithm. The results of simulation show that, after the fluctuations in the early control period, the controlled parameters tend to be stabilized guaranteeing the quality of cement clinker calcining.
Бесплатно
Active Defense Strategy against Jamming Attack in Wireless Sensor Networks
Статья научная
Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proximity.
Бесплатно
Статья научная
This paper presents Adaptive Population Sizing Genetic Algorithm (AGA) assisted Maximum Likelihood (ML) estimation of Orthogonal Frequency Division Multiplexing (OFDM) symbols in the presence of Nonlinear Distortions. The proposed algorithm is simulated in MATLAB and compared with existing estimation algorithms such as iterative DAR, decision feedback clipping removal, iteration decoder, Genetic Algorithm (GA) assisted ML estimation and theoretical ML estimation. Simulation results proved that the performance of the proposed AGA assisted ML estimation algorithm is superior compared with the existing estimation algorithms. Further the computational complexity of GA assisted ML estimation increases with increase in number of generations or/and size of population, in the proposed AGA assisted ML estimation algorithm the population size is adaptive and depends on the best fitness. The population size in GA assisted ML estimation is fixed and sufficiently higher size of population is taken to ensure good performance of the algorithm but in proposed AGA assisted ML estimation algorithm the size of population changes as per requirement in an adaptive manner thus reducing the complexity of the algorithm.
Бесплатно
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
Статья научная
Steganography is the science that deals with hiding of secret data in some carrier media which may be image, audio, formatted text or video. The main idea behind this is to conceal the very existence of data. We will be dealing here with image steganography. Many algorithms have been proposed for this purpose in spatial & frequency domain. But in almost all the algorithms it has been noticed that as we embed the secret data in the image the certain characteristics or statistics of the image get disturbed. Based on these disturbed statistics steganalysts can get the reflection about the existence of secret data which they further decode with the help of available steganalytic tools. Steganalysis is a science of attacking the hidden data to get an authorized access. Although steganalysis is not a part of this work but it may be sometimes discussed as a part of literature. Even in steganography we are not purely concerned with spatial or frequency domain rather our main emphasis is on adaptive steganography or model based steganography. Adaptive steganography is not entirely a new branch of steganography rather it is based upon spatial & frequency domain with an additional layer of mathematical model. So here we will be dealing with adaptive steganography which take care about the important characteristics & statistics of the cover image well in advance to the embedding of secret data so that the disturbance of image statistics as mentioned earlier, which attracts the forgery or unauthorized access, can be minimized. In this survey we will analyze the various steganography algorithms which are based upon certain mathematical model or in other words algorithms which come under the category of model based steganography.
Бесплатно
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks
Статья научная
In this paper we present a new algorithm for clustering MANET by considering several parameters. This is a new adaptive load balancing technique for clustering out Mobile Ad-hoc Networks (MANET). MANET is special kind of wireless networks where no central management exits and the nodes in the network cooperatively manage itself and maintains connectivity. The algorithm takes into account the local capabilities of each node, the remaining battery power, degree of connectivity and finally the power consumption based on the average distance between nodes and candidate cluster head. The proposed algorithm efficiently decreases the overhead in the network that enhances the overall MANET performance. Reducing the maintenance time of broken routes makes the network more stable, reliable. Saving the power of the nodes also guarantee consistent and reliable network.
Бесплатно
Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs
Статья научная
One of the important issues related to MANETs is the security. Grayhole attack is one of the most prominent attacks on the network layer of MANET which tends to degrade the network performance by performing selective packet dropping. In this paper, we propose a security mechanism that tends to mitigate the Grayhole attack during the route discovery time as well as during data transmission time. We modify AODV protocol such that it can avoid Grayhole attacker node from participating in the data transmission route, and if the attacker node somehow enters the route, it can be detected through the promiscuous mode monitoring.
Бесплатно
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
Статья научная
One day IPv6 is going to be the default protocol used over the internet. But till then we are going to have the networks which IPv4, IPv6 or both networks. There are a number of migration technologies which support this transition like dual stack, tunneling & header translation. In this paper we are improving the efficiency of IPv6 tunneling mechanism, by compressing the IPv6 header of the tunneled packet as IPv6 header is of largest length of 40 bytes. Here the tunnel is a multi hop wireless tunnel and results are analyzed on the basis of varying bandwidth of wireless network. Here different network performance parameters like throughput, End-to-End delay, Jitter, and Packet delivery ratio are taken into account and the results are compared with uncompressed network. We have used Qualnet 5.1 Simulator and the simulation results shows that using header compression over multi hop IPv6 tunnel results in better network performance and bandwidth savings than uncompressed network.
Бесплатно