International Journal of Computer Network and Information Security @ijcnis
Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1177
A novel infrared (IR) based sensor system for human presence detection in targeted locations
Статья научная
Human presence detection is a continuously sought of an issue by the scientific community. Visual camera-based technologies have emerged recently with low cost and easy usage. However, these technologies have been increased the user privacy issues. Hence it is highly essential to design a human detection system without compromising the user privacy, comfort, cost and easy deployment. The pyroelectric infrared (PIR) based sensor systems are introduced however this technology is incapable to detect the presence of stationary human because it can detect the fluctuating signals only. In this paper, we have proposed a novel infrared (IR) based sensor system to detect the human presence either mobile or immobile in targeted locations with high accuracy. The proposed infrared (IR) sensor is designed to sense the heat radiation emitted by the human body, it detects the human presence accurately in targeted locations. The proposed IR based sensor system has successfully deployed in a targeted location and tested successfully for detecting the human presence and also other objects.
Бесплатно
A novel scheme for isolation of distributed denial of service attack in VANETs
Статья научная
A network in which the vehicular nodes are free to join or leave the network is known as vehicular ad hoc network (VANET). Either vehicle to vehicle or vehicle to infrastructure types of communication is performed in this decentralized type of network. The identification and elimination of Distributed-Denial of Service (DDoS) attacks from VANETs is the major objective of this research. The nodes that can flood victim nodes with large numbers of rough packets are chosen by the malicious nodes in this kind of attack. Identifying such malicious nodes from the network is an important research objective to be achieved. The technique which is proposed in this research is based on the two step verification. In the two steps verification technique, when the network performance is reduced to threshold value then the traffic is monitored that which node is sending data on such high rate. NS2 simulator is used to implement the proposed technique. With respect to various performance parameters, the proposed technique is analyzed. A comparative evaluation of results achieved from proposed and existing techniques is also done to conclude the level of improvement achieved.
Бесплатно
A passive approach for detecting image splicing using deep learning and haar wavelet transform
Статья научная
Passive image forgery detection has attracted many researchers in the recent years. Image manipulation becomes easier than before because of the fast development of digital image editing software. Image splicing is one of the most widespread methods for tampering images. Research on detection of image splicing still carries great challenges. In this paper, an algorithm based on deep learning approach and wavelet transform is proposed to detect the spliced image. In the deep learning approach, Convolution Neural Network (CNN) is employed to automatically extract features from the spliced image. CNN is applied and then Haar Wavelet Transform (HWT) is used. Support Vector Machine (SVM) is used later for classification. Additional experiments are performed. That is, Discrete Cosine Transform (DCT) replaces HWT and then Principle Component Analysis (PCA) is applied. The proposed algorithm is evaluated on a publicly available image splicing datasets (CASIA v1.0 and CASIA v2.0). It achieves high accuracy while using a relatively low dimension feature vector. Our results demonstrate that the proposed algorithm is effective and accomplishes better performance for detecting the spliced image.
Бесплатно
A privacy-aware dynamic authentication scheme for IoT enabled business services
Статья научная
Tech-savvy users are striving to bring automation and digitization in their lifestyle to make life more comfortable and efficient; Internet of Things (IoT) is an enabler in this direction. Technology advancements and new business opportunities are rapidly changing the IoT adoption landscape, and thereby security and privacy concerns have also started raising and realizing. The increasing number of IP enabled electronic devices, enormous data generation, and communication traffic have enhanced the attack surface for security and privacy violators. Many security attack scenarios are the result of poor identification and authentication mechanisms of communicating entities. In this paper, we present a secure scheme to perform a business transaction initiated by a smart device in the IoT environment. Scheme performs dynamic authentication of a business transaction while ensuring the privacy of the associated user(s). This scheme relies on Message Authentication Code (MAC) and dynamic key generation method to achieve a secure workflow. In this paper, we present a pluggable Roaming Smart Meters (RSM) concept to demonstrate the applicability of the proposed authentication scheme.
Бесплатно
A programmable and managed software defined network
Статья научная
Software Defined Networking is a paradigm-shifting technology in the field of computer networking. It empowers network administrators by giving them the ability to manage the network services through abstraction of the low-level network functionalities. This technology simplifies networking and makes it programmable. This paper presents an implementation of this new paradigm of networking, which can replace the currently existing legacy networking infrastructure to provide more control over the network, perform a better analysis of the network operation and hence program the network according to the needs of the network administrator. This implementation also empowers the network administrators to provide Quality of Service to its users that are connected to the network and uses the services of the network. Therefore, it benefits both the network administrator and the users. Also, the ping latency in the network is reduced by 5-10%, and the number of packets in is reduced by 60-70% in the solution developed depending on the size of the network.
Бесплатно
Статья научная
On the features of short content and nearly real-time broadcasting velocity of micro-blog information, our lab constructed a public opinion corpus named MPO Corpus. Then, based on the analysis of the status of the network public opinion, it proposes an approach to calculate the sentiment intensity from three levels on words, sentences and documents respectively in this paper. Furthermore, on the basis of the MPO Corpus and HowNet Knowledge-base and sentiment analysis set, the feature words’ semantic information is brought into the traditional vector space model to represent micro-blog documents. At the same time, the documents are classified by the subjects and sentiment intensity. Therefore, the experiment result indicates that the proposed method improves the efficiency and accuracy of the micro-blog content classification,the public opinion characteristics analysis and supervision in this paper. Thus, it provides a better technical support for content auditing and public opinion monitoring for micro-blog platform.
Бесплатно
A solution for water factories in Vietnam using automatic meter reading technology
Статья научная
A solution for water factories in Vietnam using automatic meter reading technology is proposed in this paper. The water meters and water quality meters for water factories in Vietnam have been designed and prototyped. Water meters differ from conventional meters in that they record the water consumption and communicate that information back to the water suppliers for monitoring and billing without the need for manual readings. Water quality meters monitor multiple parameters relating to water quality such as pH, electro-conductivity, temperature, etc., and transmit these parameters to a server via GPRS network. Therefore, customers and water suppliers can monitor the water consumption, water quality parameters from anywhere via the Internet. This project has been conducted in a water factory located in Thai Nguyen Province, Vietnam. The results have shown that the consideration of this solution has been operated well in the real condition in Vietnam.
Бесплатно
A solution to secure personal data when Aadhaar is linked with DigiLocker
Статья научная
With spread of digitalization in India, the government initiated many welfare schemes for citizens as a part of e-governance. To ensure security, it is made mandatory to link Aadhaar card of beneficiaries with different schemes. The government also proposed to link UIDAI with DigiLocker to lead India towards the paperless economy. Due to this, worries related to security concern arise. Once UIDAI connected with DigiLocker, a resident can share personal data with other agencies. It generates enormous amount of Data and it may cause misuse of personal data. It is very important to keep data secure with controlled and authenticated access. It is a challenge to manage and secure this amount of data. In this paper, we propose a framework and model to secure personal data using proper authentication process. Availability of the documents should be verified by the owner and post verification, the document should be accessible for the limited time. Failing which revalidation is required.
Бесплатно
A state-of-the-art survey of coverless text information hiding
Статья научная
Information plays a pre-eminent role in people's routine lives. It provides people with facts about abundant topics of interest. Information can be represented by a variety of communicative media such as text, video, audio, and image, out of which text is the most common medium for representing the information. In the digital era, the information can easily be imitated, exchanged and distributed from one place to another in an instant. Thus, it is incredibly essential to hide the confidential information so that it couldn’t be accessed by unauthorized means. The traditional information hiding techniques require a designated carrier to hide the secret information, which ultimately introduces some modifications in the carrier. As a result, it is quite hard for the existing traditional methods to escape from the steganalysis. In contrast to conventional information hiding techniques, the term ‘coverless information hiding’ has been coined by the researchers lately, which doesn’t require a designated carrier to conceal the secret information. Hence, the technique of coverless information hiding can efficiently resist the attacks of steganalysis. This paper presents a state-of-the-art survey of coverless text information hiding by discussing the current scope of the aforementioned technique comprehensively. The existing coverless text information hiding methods are compared and contrasted by various vital aspects such as embedding capacity, algorithm efficiency, ability to resist steganalysis, and methods’ theoretical and real-world significance. Moreover, some future aspects of coverless text information hiding are highlighted at the end.
Бесплатно
A4C: A Novel Hybrid Algorithm for Resource-Aware Scheduling in Cloud Environment
Статья научная
Scheduling in cloud computing is an NP-hard problem, where traditional metaheuristic algorithms often fail to deliver approximate solutions within a feasible time frame. As cloud infrastructures become increasingly dynamic, efficient Task Scheduling (TS) remains a major challenge, especially when minimizing makespan, execution time, and resource utilization. To address this, we propose the Ant Colony Asynchronous Advantage Actor-Critic (A4C) algorithm, which synergistically combines the exploratory strengths of Ant Colony Optimization (ACO) with the adaptive learning capabilities of the Asynchronous Advantage Actor-Critic (A3C) model. While ACO efficiently explores task allocation paths, it is prone to getting trapped in local optima. The integration with A3C overcomes this limitation by leveraging deep reinforcement learning for real-time policy and value estimation, enabling adaptive and informed scheduling decisions. Extensive simulations show that the A4C algorithm improves throughput by 18.7%, reduces makespan by 16%, execution time by 14.60%, and response time by 21.4% compared to conventional approaches. These results validate the practical effectiveness of A4C in handling dynamic workloads, reducing computational overhead, and ensuring timely task completion. The proposed model not only enhances scheduling efficiency but also supports quality-driven service delivery in cloud environments, making it well-suited for managing complex and time-sensitive cloud applications.
Бесплатно
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Статья научная
Wireless infrastructure network is vulnerable to Denial of Service (DoS) attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM) which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.
Бесплатно
Статья научная
In the communication model of the OSI layer, the Media access control (MAC) layer has been given higher priority than other layers. It is a sub-layer of the data link layer, mainly controlling the physical equipment and interacting with the channels over the Internet of Things (IoT) sensor nodes. Mac layers have used two protocol types: contention-based and contention-free during transmission. These two protocols have controlled the physical equipment and data transmission for the last decade. Yet in the MAC layers transmission, some challenging issues are complicated to resolve. Data collisions are the significant changing issues at the MAC layer. As per the survey of researchers, the contention-based protocol is more affected by collision due to allowing the sharing of channels to all nodes over networks. As a result, it has got message delay, demanding more energy, data loss, and retransmission. The researcher always focuses on reducing collision during transmission to overcome these issues. They mainly evaluate the priority-based collision control using the contention-based protocol. In this ANTMAC model, we have considered the lower energy nodes’ priority to enhance the likelihood that a node will gain access to the transmission channel before its power and batteries run out. Our recommended method ANTMAC outperforms ECM-MAC in terms of content retrieval time (CRT), total no of retransmission (TNR), total energy consumption (TEcm), throughput and network lifetime (NLT).
Бесплатно
AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
Статья научная
Most organizations concurrently maintain private Automatic Branch Exchange (PABX) and Local Area Network (LAN) for information interchange within their organization. This is obviously a waste of resources and avoidable duplication of communication systems. The existing LAN can be used as a communication backbone for the in house telephone operations with no extra cost and resources. In view of this, a portable and a platform independent Software-Based Cell Phone (SCP) was proposed for the existing LANs infrastructure in the organizations. The SPC is a telephony application with a user friendly interface which is capable of handling voice, video and text messages without compromising the Quality of Service (QoS) of the existing LAN.
Бесплатно
Статья научная
Abstractive summarization plays a critical role in managing large volumes of textual data, yet it faces persistent challenges in consistency and evaluation. Our study compares two state-of-the-art models, PEGASUS and Flan-T5, across a diverse range of benchmark datasets using both ROUGE and BARTScore metrics. Findings reveal that PEGASUS excels in generating detailed, coherent summaries for large-scale texts evidenced by an R-1 score of 0.5874 on Gigaword while Flan-T5, enhanced by our novel T5 Dual Summary Framework, produces concise outputs that closely align with reference lengths. Although ROUGE effectively measures lexical overlap, its moderate correlation with BARTScore indicates that it may overlook deeper semantic quality. This underscores the need for hybrid evaluation approaches that integrate semantic analysis with human judgment to more accurately capture summary meaning. By introducing a robust benchmark and the pioneering T5 Dual Framework, our research advocates for task-specific optimization and more comprehensive evaluation methods. Moreover, current dataset limitations point to the necessity for broader, more inclusive training sets in future studies.
Бесплатно
Accelerating the Response of Query in Semantic Web
Статья научная
Today, XML has become one of the important formats of saving and exchanging data. XML structure flexibility enhances its use, and the content of XML documents is increasing constantly. As a result, since file management system is not able to manage such content of data, managing XML documents requires a comprehensive management system. With the striking growth of such databases, the necessity of accelerating the implementing operation of queries is felt. In this paper, we are searching for a method that has required ability for a large set of queries; the method that would access fewer nodes and would get the answer through a shorter period of time, compared to similar ways; the method which has the ability of matching with similar ways indicator, and can use them to accelerate the queries. We are seeking a method which is able to jump over the useless nodes and produces intermediate data, as compared to similar ones. A method by which nodes processing are not performed directly and automatically through a pattern matching guide.
Бесплатно
Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients
Статья научная
To simulate the glucose-insulin concentration of type 1 diabetic patient an Intelligent Temporal Mediator (ITM) has been designed. The ITM integrates the tasks of temporal reasoning and temporal maintenance. The paper discusses the design of ITM reasoning system which was based on open-loop insulin delivery technique. The result shows that ITM successfully models the blood glucose profile of the diabetic patient. The designed ITM is also compared with existing open-loop simulator for checking its performance.
Бесплатно
Achieving confidentiality in electronic health records using cloud systems
Статья научная
Currently, existing methods for enforcing access to records in an Electronic Health Record system relies on a single Trusted Server which stores health records and mediates access. Such Trusted Severs employ either a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) or Key-Policy Attribute-Based Encryption (KP-ABE) method for storing and controlling access. However, Trusted Server storage of health records is susceptible to single-point-of-threat attack and a successful attack invariably leads to compromising the integrity of records on the server. In this research work. This paper presents a methodology that defines and creates simple Access Structures and eliminates need for private keys during encryption and/or decryption of health records which is the Enhanced Ciphertext-Policy Attribute-Based Encryption (ECP-ABE). The ECP-ABE yields high cryptographic performance creates simple Access Structures, eliminates need for private keys and presents an implementation architecture that makes cloud-based EHR system secure and confidential. The ECP-ABE also performs cryptographic functions using less CPU time, minimal computer memory and produces high encryption and decryption throughput especially with increasing file sizes.
Бесплатно
Статья научная
Localization in Vehicular Ad Hoc Networks is a challenging issue due to the dynamic topology and high mobility of vehicles. Finding the exact location of the vehicles is not possible in this network due to the vehicles moving speed. In vehicular ad hoc networks, various kinds of localization techniques are used to know the position and the location of the vehicles. These techniques do have some limitations due to obstacles on the roadside, building shadow, tunnels and bad weather condition, etc. This paper is motivated to propose an algorithm to increase the localization accuracy and localization error. Acknowledgement based Localization Method (ALM) is used to improve the vehicle’s positioning information while broadcasting an Emergency Safety Message. ALM updates the position information whenever the vehicle changes its position. The proposed algorithm is compared with RSSI, TOA and DLM based localization techniques. The result shows that ALM algorithm improves the accuracy level and reduces the error rate caused by incorrect position estimation.
Бесплатно
Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR
Статья научная
In this paper, we propose a secure, lightweight acoustic pseudo-random number generator (SLA-LFSR-PRNG) that consumes less memory, CPU capacity and adopts the multi-thread parallelization to generate huge random numbers per second by taking the advantages of multi-core CPU and massively parallel architecture of GPU. The generator is based on cryptographically secure Linear Feedback Shift Register(LFSR) and extracts the entropy from sound sources. The major attraction of proposed Pseudo Random Number Generator(PRNG) is its immunity to major attacks on pseudo-random number generators. The paper presents test results of proposed PRNG subjected to NIST SP 800-22 statistical test suite and also shows the performance comparison of proposed generator on different systems.
Бесплатно
Action-Dependent Adaptive Critic Design Based Neurocontroller for Cement Precalciner Kiln
Статья научная
There are many factors that can affect the calciner process of cement production, such as highly nonlinearity and time-lag, making it very difficult to establish an accurate model of the cement precalciner kiln (PCK) system. In order to reduce transport energy consumption and to ensure the quality of cement clinker burning, one needs to explore different control methods from the traditional way. Adaptive Critic Design (ACD) integrated neural network, reinforcement learning and dynamic programming techniques, is a new optimal method. As the PCK system parameters change frequently with high real-time property, ADACD (Action-Dependant ACD) algorithm is used in PCK system to control the temperature of furnace export and oxygen content of exhaust. ADACD does not depend on the system model, it may use historical data to train a controller offline, and then adapt online. Also the BP network of artificial neural network is used to accomplish the network modeling, and action and critic modules of the algorithm. The results of simulation show that, after the fluctuations in the early control period, the controlled parameters tend to be stabilized guaranteeing the quality of cement clinker calcining.
Бесплатно