Статьи журнала - International Journal of Wireless and Microwave Technologies

Все статьи: 556

Dynamic Interactive Honeypot for Web Application Security

Dynamic Interactive Honeypot for Web Application Security

Yinebeb T. Abewa, Solomon Z. Melese

Статья научная

Web application honeypots are security tools used to act as a decoy server. Over the past decades, various researches have been done on the topic. Security breaches can cause simple individual user account impersonation to bank database breaches and illegal transactions. Cybersecurity faces the daily challenge of adapting to attackers' evolving methods, including zero-day attacks. This makes intrusion detection and prevention tools unable to detect these attacks. The existing trend within the honeypot technology relies on a predefined and static level of interaction either low, medium, or high. This approach fails to account for the unpredictable nature of attack vectors and makes web application honeypots ineffective against sophisticated attacks. Application logging and request fingerprinting also have no proven methods to employ within a honeypot. A dynamic level of interaction makes the web application honeypot technology better by presenting scalable and manageable control over the attackers. We develop a modular and dynamically interactive web application honeypot capable of detecting broken access control, standard query language injection, cross-site scripting, and path traversal attack targets for web apps. We also incorporate a robust logging and fingerprinting module capable of tracing attacker requests. The proposed web application honeypot achieves an average response time of 523 milliseconds, a throughput of 105 requests per second, and an average engagement of 769.38 seconds. Improving the web application Honeypot helps organizations keep themselves ahead of attackers by empowering the significance of Honeypot. Developing a web application honeypot with a newly designed approach helps other scholars and researchers extend their work.

Бесплатно

Dynamic Request Set based Mutual Exclusion Algorithm in MANETs

Dynamic Request Set based Mutual Exclusion Algorithm in MANETs

Ashish Khanna, Awadhesh Kumar Singh, Abhishek Swaroop

Статья научная

Mutual Exclusion (ME) problem involves a group of processes, each of which intermittently requires access to the only resource present in the environment. Handling ME problem becomes difficult due to the dynamic nature of the ad hoc environment. This paper presents a token-based solution to ME problem in the mobile ad hoc environment. The proposed token based algorithm is sensitive to link forming and link breaking and thus is suitable for MANET. The algorithm uses the concept of dynamic request set (DRS). As the request set is dynamically updated, the average size of request set is reduced resulting in less number of messages exchanged per critical section. The algorithm satisfies mutual exclusion, starvation freedom, and freedom from deadlock. The present algorithm has been compared with DRS based ME algorithms for static distributed systems. The results show that the concept of DRS in MANETs can be successfully used. Token loss problem has also been handled separately in the present exposition.

Бесплатно

Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology

Dynamical Frequency Assignment of WSN Based on Cloud Computing Technology

JING Jun-li, YANG Jie

Статья научная

As the rapid development of Wireless Sensor Networks(WSN), the demands of frequency rose sharply, thereby how to deal with the frequency assignment of WSN is a difficult problem. A dynamical and real-time frequency assignment system is proposed, which was based on the network architecture of Internet of Things by the means of Cloud Computing technique. The system assigned the frequency dynamically and real-timely that it can improve the frequency utilization rate. This system is an efficient path to face the frequency needs of WSN.

Бесплатно

E-band Microwave Radios for Mobile Backhaul

E-band Microwave Radios for Mobile Backhaul

Saad Z. Asif

Статья научная

This article explores the emerging high capacity microwave radios that operate in 70-90 GHz frequency band to address the mobile backhaul challenge of the cellular industry of Pakistan. The challenge will be look from both technical and business perspectives covering topics like frequency assignments, radio capacity, and experimental results. In hindsight these millimeter wave microwave radios provide an alternative (particularly to optical fiber) to address the said challenge of one of the lowest ARPU (average revenue per user) markets of the world.

Бесплатно

EEACE: Energy Efficient ACE Algorithm for Wireless Sensor Networks

EEACE: Energy Efficient ACE Algorithm for Wireless Sensor Networks

ZHANG Meiyan, ZHENG Xiaodan, CAI Wenyu

Статья научная

The ultimate goal of researches on Wireless Sensor Networks (WSNs) is how to improve network energy efficiency as possible as can. Certainly, there are many researches concerned to energy efficient scheme in wireless sensor networks. Dividing geographically distributed sensor nodes into different clusters in order to decrease transmission range and transmission quantity is one of traditional energy efficient strategies for WSNs. In this paper, an energy efficient ACE clustering algorithm named EEACE in short is presented to improve the performance of ACE scheme. The EEACE algorithm is derived from ACE scheme but overcomes many shortcomings of ACE and other clustering algorithms such as famous LEACH and DCHS. By dividing sensor nodes into uniform clusters with minimum communication cost, EEACE algorithm improves the network’s performance at aspect of lifetime and energy efficiency significantly. The simulation results verified that EEACE algorithm prolongs the lifetime of WSNs by more than 15% comparing with ACE and DCHS algorithm.

Бесплатно

EGEC: an energy efficient exponentially generated clustering mechanism for reactive wireless sensor networks

EGEC: an energy efficient exponentially generated clustering mechanism for reactive wireless sensor networks

Sundareswaran P., Rajesh R. S., Vardharajulu K. N.

Статья научная

As most of the wireless sensor networks are unattended by humans, the energy is an important issue while deploying nodes of wireless sensor network in hazardous environments. One of the method to preserve energy consumption among sensor nodes is clustering. Using clustering, the nodes send the data to the nearest cluster head instead of far away sink. In applications using reactive wireless sensor networks, a limited number of sensor nodes are activated due to exceed in threshold values and the other nodes are under idle state. As far as the reactive wireless sensor network is concerned, the number of clusters would have been based on the number of active nodes and alive nodes. In this work, an optimum number of clusters is computed based on the ratio between active nodes and alive nodes. Extensive analysis and comparisons are made with existing protocol and found that the proposed methodology outperforms the existing protocol in terms of networks life time and throughput.

Бесплатно

Effect of Noise on the Average Received SNR of Different Combining Schemes

Effect of Noise on the Average Received SNR of Different Combining Schemes

Shivani Gupta, Pragya Awasthi

Статья научная

In wireless communication system, the multipath fading affects the performance of the system. Diversity-combining scheme is one of the powerful tools to mitigate the effect of fading. The multiple antennas provide an improvement in the capacity and reliability of the system. The performance of four combining schemes - Selection Combining (SC), Maximum Ratio Combining (MRC), Equal Gain Combining (EGC), and Generalised Selection combining (GSC)- in the presence of both the perfect and an imperfect channel state information (CSI) at the receiver is studied in this contribution by Monte Carlo simulations in the MATLAB environment, when communicating over Rayleigh fading channels. Our results show that the presence of the complex noise in the channel degrades the performance of the system in all four combining schemes, but the degradation in performance is found to be maximum in MRC and minimum in SC. Performance of EGC lies in between the performance of MRC and SC, whereas the performance of GSC depends upon the number of antennas being selected and it is upper bounded by the MRC and lower bounded by the SC. Also, the results show that as the value of SNR is increased the average received SNR increases in both the channels.

Бесплатно

Effect of Rician Factor in Satellite Communication Signal with MAP-MQAM Demodulation

Effect of Rician Factor in Satellite Communication Signal with MAP-MQAM Demodulation

Zachaeus Kayode Adeyemo, Ibraheem Folarin Bello, Damilare Oluwole Akande, Abdulahi Abiodun Badrudeen

Статья научная

This paper presents the effect of rician factors in satellite communications with Maximum A Posteriori (MAP) demodulation. Conventional QAM presently in use where the high capacity signaling scheme is required, is characterized with high errors due to the Doppler Effect and the nature of the channel as the order of modulation increases in rician fading channel. MAP detection scheme was used to reduce the error and maximize the probability of choosing correctly at the output of the QAM demodulator. MAP QAM was used as a signaling technique and obtained by taking the logarithm of Likelihood Ratio of observed binary data of an observation random variable at both the Inphase and Quadrature channels. System model was developed around MAP-QAM demodulator over rician factors of 5, 10, and 15 at 90 km/h. System model was simulated and evaluated using Bit Error Rate (BER) to determine the performances of the MAP-MQAM and conventional MQAM for comparison at modulation order 'M' of 4 and 16. The results obtained showed that as the rician factor increases, the BER values decreased indicating better performance with both MAP-MQAM and QAM signaling scheme.

Бесплатно

Effect on System Performance due to Upgradation of 2G/3G System to LTE

Effect on System Performance due to Upgradation of 2G/3G System to LTE

Jolly Parikh, Anuradha Basu

Статья научная

In the current environment of burgeoning demand for mobile broadband, Long Term Evolution (LTE) is the most preferred wireless technology for the mobile operators. Considering the legacy multi-technology networks, operators need to strategically work upon maximizing their revenue while minimizing their cost and satisfying the subscriber's requirements as well. Operators have a choice between 2 network strategies- LTE overlay and single radio access network (SRAN). A survey carried out proved SRAN to be the optimum LTE deployment strategy considering the total cost of ownership (TCO). This paper discusses the effect on the system performance due to the up gradation of network from second generation (2G) to third generation (3G) to long term evolution (LTE) systems using Nokia Siemens Network Flexi multi-radio base stations. Measurements of RSRP (Reference Signal Received Power), SINR (Signal to Interference plus Noise Ratio) and throughput were carried out by a drive test within 2Km of the deployed site area which indicated that all the 3 parameters were affected as the user equipment moved away from the site area and towards the cell edges. This problem can be addressed by deployment of low power relay nodes, one of the promising techniques, for increasing the coverage of LTE advanced networks (the future of LTE systems).

Бесплатно

Effects of Superstrate on Electromagnetically and Gap Coupled Patch Antennas

Effects of Superstrate on Electromagnetically and Gap Coupled Patch Antennas

Ravindra Kumar Yadav, Jugul Kishor, R. L. Yadava

Статья научная

In this paper the effects of water loading (termed as superstrate) on the characteristics of an electromagnetically (EM) and coupled pentagonal patch antennas operating in the ISM band have been described. The proposed antenna structures are analyzed using HFSS and the influence of the superstrate on resonant frequency, bandwidth, VSWR and radiation characteristics have also been analyzed. The obtained results also reveal that a larger bandwidth can be found in case the dielectric substrate is separated by air gap spacing. In addition, though impedance matching is little deteriorated due to loading, however the operating frequency band (BW) shifted to lower side significantly.

Бесплатно

Efficient Adaptive Path Load Balanced Gateway Management Strategies for Integrating MANET and the Internet

Efficient Adaptive Path Load Balanced Gateway Management Strategies for Integrating MANET and the Internet

Rafi U Zaman, S. Shehnaz Begum, Khaleel Ur Rahman Khan, A. Venugopal Reddy

Статья научная

Mobile nodes in a mobile ad hoc network communicate with each other. In order to facilitate communication of mobile nodes with fixed nodes in the Internet, gateways are used. The resultant integrated heterogeneous architecture is called Integrated Internet MANET in the literature. Such heterogeneous architectures are needed in order to realize the potential of, and to achieve the stated objectives of proposed 5G networks of the future. Gateways in Integrated Internet-MANET may be fixed or mobile. Several issues arise in Integrated Internet-MANET. In this paper, three critical issues encountered in Integrated Internet-MANET are addressed together. These issues are, efficient gateway selection mechanism, adjusting the gateway advertisement range and dynamically adapting the periodicity of gateway advertisements. Three strategies are proposed which use a path load balancing mechanism for efficient gateway selection. These strategies address the issues of adjusting the gateway advertisement range and dynamically adapting the periodicity of gateway advertisements in different ways. The proposed strategies have been simulated in a two-tier as well as a hybrid architecture using network simulation tool ns-2. The simulation results are presented and the scenarios, under which each of the proposed strategies is useful, are discussed.

Бесплатно

Efficient Communication for Extremely Large-Scale MIMO Systems Networks: Integrating Firefly Optimization and Machine Learning

Efficient Communication for Extremely Large-Scale MIMO Systems Networks: Integrating Firefly Optimization and Machine Learning

Samar A. Nassar, Adly S. Tag Eldien, Esraa M. Eid, Shimaa S. Ali

Статья научная

This paper proposes a novel approach for tuning the parameters of 6th generation (6G) extremely large-scale MIMO (Multiple Input Multiple Output) systems using the Firefly optimization algorithm. The main objective is to achieve accurate estimation of the hybrid field in the MIMO system. The proposed method optimizes MIMO system parameters by minimizing the cost function through a hybrid pre-coding and combining technique. This optimization problem is formulated as a nonlinear programming problem and solved using the Firefly algorithm. Experimental results demonstrate that the proposed approach provides accurate hybrid field estimation with improved system performance compared to existing state-of-the-art methods. The Firefly optimization algorithm proves to be an efficient and effective method for tuning 6G MIMO system parameters, with potential applications in future wireless communication systems. In addition to the Firefly optimization algorithm, this paper introduces a complementary machine learning-assisted resource allocation strategy to optimize network resource utilization. By leveraging machine learning algorithms, dynamic resource allocation based on real-time network conditions is ensured, enhancing overall system performance. The integration of the Firefly optimization algorithm for parameter tuning and machine learning-assisted resource allocation aims to achieve holistic optimization in 6G networks. Experimental results demonstrate that this integrated approach not only refines parameter tuning but also dynamically adapts resource allocation, leading to superior system efficiency and throughput compared to conventional methods. This comprehensive strategy addresses the evolving demands of future wireless communication systems. Results showed that using a sparsity value of 8, with 600 beams and 300 pilots, minimizes the mean square error of estimation to less than -13 dB

Бесплатно

Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

Yu Zhang, Xing She Zhou, Yee Wei Law, Marimuthu Palaniswami

Статья научная

While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. We present a security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and an identity-based aggregate signature to allow sensor nodes to check packets on-the-fly before they accept incoming encoded packets, and introduces an efficient mechanism to reduce the computation overhead at each node and to eliminate bad packets quickly. Castalia simulations show that when the 5% of the nodes in a network of 100 nodes are rogue, using our approach, the efficiency of the secure reprogramming protocol based on network coding improves almost ten-fold for a checking probability of 2%.

Бесплатно

Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Xi Chen, Yong Li

Статья научная

As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. In this paper, we propose a new cryptographic primitive Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files storaged in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. The scheme is semantically secure under the BDH assumption.

Бесплатно

Efficient Techniques to Reduce Effects of Topology Mismatch and Heterogeneity in Unstructured P2P Networks

Efficient Techniques to Reduce Effects of Topology Mismatch and Heterogeneity in Unstructured P2P Networks

B Lalitha

Статья научная

The formation of P2P logical networks oblivious to the structure of physical topology results in large amount of redundant network traffic. In addition to this mismatch problem, there exists a skew in properties of the participating peers which degrade the performance of P2P networks. So the current P2P systems call for effective overlay formation taking into consideration the underlying physical network topological properties and also inbuilt heterogeneity in participating peers. The heterogeneity of peers in the network can effectively used to bias neighbor selection and improve network performance by assigning more responsibility to nodes with higher capabilities. This paper presents two techniques to solve the problems of topology mismatch and heterogeneity. The proposed methods make use of bandwidth of peers and distance measures for overlay formation in the Gnutella network. The designed systems are tested with proper analysis and simulations to verify the correctness of the methods.

Бесплатно

Efficient low-overhead channel estimation for 5g lens based millimeter-wave massive MIMO systems

Efficient low-overhead channel estimation for 5g lens based millimeter-wave massive MIMO systems

Imran Khan

Статья научная

Beamspace MIMO performs beam-selection which can substantially reduce the number of power-consuming radio frequency (RF) chains without perceptible performance deterioration. However, for capacity-approaching performance, accurate information of the beamspace-channel of large-size is required for beam-selection, which is contesting in case of little number of RF-chains. To overcome such problem, I proposed an efficient support-detection (SD) algorithm for channel-estimation with low pilot-overhead and short number of RF chains. The key idea of SD-algorithm is to divide the whole issue of beamspace channel-estimation into a series of sub-issues, where each of them considers only one sparse channel-component. The support of each channel component is detected reliably by deploying the sparse structure attributes of the beamspace-channel. The effect of this channel-component is eliminated from the whole channel-estimation issue. Thus, the sparse beamspace-channel can be estimated with low pilot-overhead. Simulation Results shows that the proposed schemes perform much better than the conventional compressed-sensing (CS) schemes.

Бесплатно

Empirical Network Performance Evaluation of Security Protocols on Operating Systems

Empirical Network Performance Evaluation of Security Protocols on Operating Systems

Shaneel Narayan, Michael Fitzgerald

Статья научная

Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice of the operating systems and cryptographic algorithms is critical to enhancing network performance. In this research undertaking, three VPN techniques, namely DES, 3DES and AES, which are commonly used to implement IPSec VPNs, are performance analyzed on test-bed setup. These are implemented on a network with Linux Fedora and a router and Windows desktop operating systems on another node. The VPN algorithms tested show that there may be performance differences when implemented with different operating system combinations.

Бесплатно

Enabling Trust in Single Sign-On Using DNS Based Authentication of Named Entities

Enabling Trust in Single Sign-On Using DNS Based Authentication of Named Entities

Usman Aijaz N., Nikita Mittal, Mohammed Misbahuddin, A. Syed Mustafa

Статья научная

Single Sign-On (SSO) allows the client to access multiple partner e-services through a single login session. SSO is convenient for the users as the user neither needs to set multiple login credentials nor login separately for individual services every time. SSO (single sign-on) authentication is a password-authentication approach that permits end users to login into multiple systems and websites with a single set of login credentials. SSO authentication is mainly useful for IT organizations that consist of many different commercial applications. The outstanding feature of SSO is that it gives organizations centralized control of their systems by giving different levels of access to each individual. It reduces password fatigue and increases security because users only need to remember a single username/password that grants them access to multiple systems. However, the Single Sign-on poses risks related to a single point of attack which may lead to a path for cybercrimes. This paper proposes a trust model to increase the security of Single Sign-on systems against the vulnerabilities discussed in the subsequent sections. The proposed Trust model is named as DANE-based Trust Plugin (DTP) which acts as an added security layer over DNS Based Authentication of Named entities(DANE). The DTP proposes the modified SAML XML schema which enables the DTP to counter the attacks.

Бесплатно

Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform

Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform

Preeti Daffu, Amanpreet Kaur

Статья научная

Cloud computing is a rapidly growing technology in this new era. Cloud is a platform where users get charged on the basis of the services and resources they have used. It enables its users to access the cloud resources from the remote locations i.e. from anywhere at any time. It needs only a working internet connection to access the cloud services. Cloud users have always been victim to the security issues and attacks which leads to the data loss. The data is not saved on the hard disk of the computer so it is highly prone to security risks. Identifying the attacks on cloud platform is a difficult task because everything on cloud is in virtual form. EDoS (Economic Denial of Sustainability) attack is a form of DDoS attacks; carried out for a long span of time and intended to put a financial burden and cause economical loss to the users of cloud. Such attacks do not exhaust the bandwidth of the user; their main aim is to put a huge financial loss or burden on the user. A technique named as SPART (Supervised Pattern Attack Recognition Technique) implemented to mitigate the EDoS attacks in cloud computing which consumes lesser energy as compared to the existing models. The experimental results have shown the less energy consumption in proposed model.

Бесплатно

Enhanced Image Encryption Scheme Utilizing Charlier Moments and Modified Chaotic Mapping

Enhanced Image Encryption Scheme Utilizing Charlier Moments and Modified Chaotic Mapping

Shimaa A. Elanany, Abdelrahman A. Karawia, Yasser M. Fouda

Статья научная

The integration of chaos theory and orthogonal moments has gained significant traction in contemporary image analysis. This paper presents a novel approach to image encryption and decryption, leveraging a modified logistic chaotic map and discrete orthogonal moments. The coefficients derived from Charlier polynomials and the image function are utilized to obfuscate the plaintext image. Furthermore, to bolster security measures, the pixel values of the obfuscated image are shuffled employing a modified logistic chaotic map. The encryption key is constructed from the parameters of both the chaotic map and Charlier polynomials, enhancing the robustness of the encryption scheme. Extensive experimental validation is conducted to assess the security of the proposed image encryption algorithm. Results demonstrate a considerable deviation in pixel values following diffusion via Charlier moments’ coefficients. Statistical tests and comprehensive security analyses affirm the resilience of the proposed algorithm against data loss attacks. The experimental result with Pearson correlation coefficient is almost 0, key space is greater than 2^210, and information entropy can reach 7.8404, which establish its superior security posture relative to existing algorithms within the domain of image encryption. The findings underscore the efficacy and reliability of the proposed scheme, positioning it as a viable solution for safeguarding sensitive image data in various applications.

Бесплатно

Журнал