Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

Performance Evaluation of Distributed Protocols Using Different Levels of Heterogeneity Models in Wireless Sensor Networks

Samayveer Singh, Satish Chand, Bijendra Kumar

Статья научная

Most of the protocols for enhancing the lifetime of wireless sensor networks (WSNs) are of a homogeneous nature in which all sensors have equal amount of energy level. In this paper, we study the effect of heterogeneity on the homogeneous protocols. The ALBPS and ADEEPS are the two important homogeneous protocols. We incorporate heterogeneity to these protocols, which consists of 2-level, 3-level and multi-level heterogeneity. We simulate and compare the performance of the ALBPS and ADEEPS protocols in homogeneous and heterogeneous environment. The simulation results indicate that heterogeneous protocols prolong the network lifetime as compared to the homogeneous protocols. Furthermore, as the level of heterogeneity increases, the lifetime of the network also increases.

Бесплатно

Performance Evaluation of Face Recognition system by Concatenation of Spatial and Transformation Domain Features

Performance Evaluation of Face Recognition system by Concatenation of Spatial and Transformation Domain Features

Raveendra K., Ravi J.

Статья научная

Face biometric system is one of the successful applications of image processing. Person recognition using face is the challenging task since it involves identifying the 3D object from 2D object. The feature extraction plays a very important role in face recognition. Extraction of features both in spatial as well as frequency domain has more advantages than the features obtained from single domain alone. The proposed work achieves spatial domain feature extraction using Asymmetric Region Local Binary Pattern (ARLBP) and frequency domain feature extraction using Fast Discrete Curvelet Transform (FDCT). The obtained features are fused by concatenation and compared with trained set of features using different distance metrics and Support Vector Machine (SVM) classifier. The experiment is conducted for different face databases. It is shown that the proposed work yields 95.48% accuracy for FERET, 92.18% for L-space k, 76.55% for JAFFE and 81.44% for NIR database using SVM classifier. The results show that the proposed system provides better recognition rate for SVM classifier when compare to the other distance matrices. Further, the work is also compared with existing work for performance evaluation.

Бесплатно

Performance Evaluation of IPv4/IPv6 Transition Mechanisms

Performance Evaluation of IPv4/IPv6 Transition Mechanisms

Adira Quintero, Francisco Sans, Eric Gamess

Статья научная

The exhaustion of IPv4 addresses has forced the deployment of the new version of the Internet Protocol (IPv6). However, the migration to the new protocol is done gradually and with the due care for many reasons that include: cost, inclusion of support for IPv6 in existing applications, training of technical staff, lack of web content available over IPv6 from important providers, and obsolete devices not anymore supported by manufacturers. For those reasons, many transition mechanisms have been proposed, each one to fill distinct requirements, with different operational theory and availability according to the network environment. A performance evaluation of these mechanisms can help network administrators and researchers in their selection of the best transition technology for their environment. In this paper, we present a performance comparison of some transition mechanisms such as ISATAP, 6to4, and NAT64 in real testbeds with Debian, Windows 7, Windows 8, and Windows 10. For NAT64, two different tools were tested: TAYGA and Jool. We measure the OWD and the throughput for UDP and TCP for every mechanism, for both Ethernet and Fast Ethernet technologies. From this research, we can conclude that all the modern operating systems for PCs already have good support for IPv6, and a very similar network performance. Also, we can infer from our work that in controlled environments, native IPv4 has the best performance, closely followed by native IPv6. The difference is essentially due to the length of the IP header (20 bytes in IPv4 and 40 bytes in IPv6). The tunneling solutions chosen for this research (ISATAP and 6to4) have a similar performance, which is the lowest of the studied technologies, because of the additional IPv4 header in the tunnel.

Бесплатно

Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks

Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks

Bodunde O. Akinyemi, Oluwatoyin H. Odukoya, Mistura L. Sanni, Gilbert Sewagnon, Ganiyu A. Aderounmu

Статья научная

Many techniques have been proposed to detect and prevent spam over Internet telephony. Human spam calls can be detected more accurately with these techniques. However, robocalls, a type of voice spammer whose calling patterns are similar to those of legitimate users, cannot be detected as effectively. This paper proposes a model for robocall detection using a machine learning approach. Voice data recordings were collected and the relevant features for study were selected. The selected features were then used to formulate six (6) detection models. The formulated models were simulated and evaluated using some performance metrics to ascertain the model with the best performance. The C4.5 decision tree algorithm gave the best evaluation result with an accuracy of 99.15%, a sensitivity of 0.991%, a false alarm rate of 0.009%, and a precision of 0.992%. As a result, it was concluded that this approach can be used to detect and filter both machine-initiated and human-initiated spam calls.

Бесплатно

Performance Evaluation of Power Aware VM Consolidation using Live Migration

Performance Evaluation of Power Aware VM Consolidation using Live Migration

Gaganpreet Kaur Sehdev, Anil Kumar

Статья научная

Power Efficiency is the efficient use of power and is a crucial come forth in cloud computing environment. Green Computing is nothing but is a cloud computing with efficient use of power and green refers to make the environment friendly to the user by saving heat and power. Data centre power efficiency in cloud environment will be reduced when virtualization is used as contrary to physical resource deployment to book adequate to grant all application requests. Nevertheless, in any case of the resource provisioning approximation, occasion remains in the way in which they are made attainable and workload is scheduled. The objective of this research work is therefore to pack workload into servers, selected as a function of their cost to operate, to achieve (or as close to) the utmost endorsed employment in a cost-efficient manner, avoiding occurrences where devices are under-utilized and management cost is acquired inefficiently. This work has enhanced the existing work by introducing the dynamic wake up calls either to shut down the active servers or restart the passive server. The wakeup calls has been initiated dynamically. The overall objective is to decrease the response time of users which will be increased during wakeup time in existing research work.

Бесплатно

Performance Evaluation of Routing Protocols in Vehicular Networks

Performance Evaluation of Routing Protocols in Vehicular Networks

Ameur BENNAOUI, Mustapha GUEZOURI, Mokhtar KECHE

Статья научная

Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study of routing protocols in various network environment (Urban, Highway) based on metrics such as throughput, packet delivery ratio and average end-to-end delay. For the implementation purpose we have used network simulator-2 (NS-2) and VanetMobisim.

Бесплатно

Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption

Poonam Jindal, Brahmjit Singh

Статья научная

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Tradeoff between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation for link adaptive encryption scheme are compared with the fixed block length encryption technique operating in Cipher Block Chaining (CBC) mode of operation. Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in CBC mode is a better solution for security and throughput tradeoff.

Бесплатно

Performance Evaluation of Unslotted CSMA/CA for Wireless Sensor Networks: Energy Consumption Analysis and Cross Layer Routing

Performance Evaluation of Unslotted CSMA/CA for Wireless Sensor Networks: Energy Consumption Analysis and Cross Layer Routing

Inès El Korbi, Leila Azouz Saïdane

Статья научная

The IEEE 802.15.4 standard is considered as the most notorious MAC layer for wireless sensor networks (WSNs) in both centralized and distributed context. For instance, in multi hop environment, the beaconless IEEE 802.15.4 is used. Several works evaluated the performance of the beaconless IEEE 802.15.4 in terms of average delay, average energy consumption, throughput etc. But, none of the existing studies derived accurate energy consumption bounds of this MAC layer. In this paper, our contribution is twofold. We first propose a comprehensive energy consumption analysis of the unslotted CSMA/CA algorithm. The results are validated through simulation. Then, we exploit our analysis to propose a cross layer routing scheme that enhances the native PEGASIS protocol. Our scheme called Average Energy Enhanced PEGASIS (AE2-PEGASIS) considers the average energy consumption at the MAC layer when constructing the routes to the sink.

Бесплатно

Performance Improvement of Cache Management In Cluster Based MANET

Performance Improvement of Cache Management In Cluster Based MANET

Abdulaziz Zam, N. Movahedinia

Статья научная

Caching is one of the most effective techniques used to improve the data access performance in wireless networks. Accessing data from a remote server imposes high latency and power consumption through forwarding nodes that guide the requests to the server and send data back to the clients. In addition, accessing data may be unreliable or even impossible due to erroneous wireless links and frequently disconnections. Due to the nature of MANET and its high frequent topology changes, and also small cache size and constrained power supply in mobile nodes, the management of the cache would be a challenge. To maintain the MANET’s stability and scalability, clustering is considered as an effective approach. In this paper an efficient cache management method is proposed for the Cluster Based Mobile Ad-hoc NETwork (C-B-MANET). The performance of the method is evaluated in terms of packet delivery ratio, latency and overhead metrics.

Бесплатно

Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link

Performance Measures of Tele-Protection System Based on Networked Microwave Radio Link

Jitendra Singh, Rabins Porwal, S.P.Singh

Статья научная

The purpose of paper is to compute reliability of Digital Tele-Protection System employing Digital Microwave Radio Link. In this paper, the whole Tele-Protection system is divided into six subsystems. The first subsystem is digital relaying equipment. Second subsystem is the tale-protection signaling equipment where the timing to sample line power currents is synchronized. Both relaying and Tele-Protection signaling equipments, are now assemble three-phase current data, sampled at 600 Hz for 50 Hz EHV systems and some control data into a 90 bit frame format at a transmission rate of 54 Kb/s. A frame consists of a frame synchronization field and some information fields including a cycle’s redundancy check field. The third subsystem, Tele-Protection signed multiplexing equipment generates a super frame by multiplexing the seven, 54 Kb/s Tele-Protection signals into a 1.544 Mb/s stage using multi-point sampling technique to minimize the delay time variation and send them to the subsystem four, which is radio equipment, from here the data is transmitted with the help of the channel (subsystem 5) to the repeater station (subsystem 6). The subsystem six is used to remove the noise and to improve the power of the data. In this paper, we have taken standby digital relaying equipment and that can be online through an imperfect switching device. Also parallel redundant Tele-Protection signaling equipment is taken to improve system’s overall performance.

Бесплатно

Performance Study of Spread Spectrum Systems with Hard Limiters

Performance Study of Spread Spectrum Systems with Hard Limiters

Oleksandr Pliushch, Viktor Vyshnivskyi, Volodymyr Tolubko, Vadym Mukhin, Serhii Ishcheryakov, Mykhailo Okhramovych, Vitalii Loza

Статья научная

Use of spread spectrum systems in telecommunications is studied. It is shown that spread spectrum techniques can substantially enhance noise and interference immunity in the currently deployed information transmission networks. Primitive polynomials are proposed to obtain respective spreading codes. A spreading code consisting of 1023 chips is synthesized and its characteristics are studied. It is deduced that powerful interferences can exceed dynamic range of the receiving part of the system and, as a result, deteriorate information transmission. To overcome this problem, utilization of limiters is proposed, in which limitation level equals that of the internal noise of the receiving part. Computer simulation is employed to test the performance of the proposed solution. Performance of the spread spectrum system for information transfer is studied both without the limiter and with the limiter. Research results show that, for binary modulation, performance of the system with limitation and without limitation is nearly identical while limiters can substantially reduce requirements for the dynamic range. Compared to the existing approaches, it is proposed to use the synthesized spreading coding sequence with the limitation technique in practical implementations of those telecommunication networks, in which noise immunity and transmission concealment are required, such as in unmanned aerial vehicles. This can replace currently used approaches, such as frequency hopping, transmission power adjustment and antenna pattern changes.

Бесплатно

Performance analysis of classification techniques by using multi Agent based intrusion detection system

Performance analysis of classification techniques by using multi Agent based intrusion detection system

Aumreesh Kumar Saxena, Sitesh Sinha, Piyush Shukla

Статья научная

In this paper we have designed Agent based intrusion detection system (ABIDS) where agents will travel between connected client systems from server in a client-server network. The agent will collect information from client systems through data collecting agents. It will then categorize and associate data in the form of report, and send the same to server. Intrusion detection system (IDS) will support runtime addition of new ability to agents. We have illustrated the design of ABIDS and show the performance of ABIDS with various classification techniques that could produce good results. The motive of the work is to examine the best performance of ABIDS among various classification techniques for huge data. Moreover sophisticated NSL KDD dataset are used during experiments for more sensible assessment than the novel KDD 99 dataset.

Бесплатно

Performance analysis of convolution code with variable constraint length in shallow underwater acoustic communication

Performance analysis of convolution code with variable constraint length in shallow underwater acoustic communication

Krishnamoorthy Narasu Raghavan, Suriyakala C. D., Ramadevi Rathinasabapathy, Marshiana Devaerakkam, Sujatha Kumaran

Статья научная

One of the most complex environment for the data transmission is the underwater channel. It suffers frequency selective deep fading with serious multi path time delay. The channel also has limited bandwidth. In this paper, the effect of Least Code Weight – Minimum Hamming Distance (LCW-MHD) polynomial code is studied using Viterbi Decoding Algorithm for the shallow Underwater Acoustic Communication (UAC) channel. Two different channels with the range of 100 and 1000 meters are considered for simulation purpose and the channel is designed using Ray Tracing algorithm. For data and image transmission in the channel, three different code rate of 1/2, 1/3 and 1/4 are considered and corresponding Bit Error Rate (BER) are evaluated. Result showed that the BER is least for the LCG-MHD polynomial code.

Бесплатно

Performance comparison of steganography techniques

Performance comparison of steganography techniques

Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta

Статья научная

Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v 8.1.0.604.

Бесплатно

Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator

Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator

Radha Raman Chandan, Bindeshwar Singh Kushwaha, Pramod Kumar Mishra

Статья научная

Today, Due to mobility wireless network have a heavy demand especially for wireless Ad-Hoc network. In Ad-Hoc network a group of wireless mobile nodes cooperate with each other by routing of packets. So it is necessary to design a wireless network which gives the best performance by suitable protocol selection and path routing. The selection of protocol should be suitable in terms of data integrity as well as data delivery. Hence performance evaluation of protocol is a major issue before selection of a routing protocol. In this paper our aim is to analyse the performance matrices including end to end delay, jitter, packet loss and packet delivery fraction of multi hop network by simulation. Performance evaluation of wireless ad hoc network routing protocols specially Ad-hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector (DSDV) have been completed using NS-3 Simulator. After simulation we have found that OLSR routing protocol gives the best result comparison to AODV and DSDV in large and dense network.

Бесплатно

Performance evaluation of MAC protocols with multi-sink for mobile UWSNs

Performance evaluation of MAC protocols with multi-sink for mobile UWSNs

Areeg Fahad Rasheed, A. E. Abdelkareem

Статья научная

Currently, Underwater Wireless Sensor Network (UWSN) is one of modern science and have attached many researchers especially how interesting with Wireless Sensor Network (WSN). A mobile node in UWSN is one of the powerful mechanisms, it can be used for many aquatic applications such as Surveillance for wildlife, Pollution control, Military applications, etc. UWSN is different from the terrestrial network in terms of using acoustic waves as a communication medium. Due limitation of bandwidth, high latency, and long propagation delay of acoustic waves, many proper MAC protocols that work efficiently in Static UWSN are not suitable for the mobile network. In this article two MAC protocols appropriate for mobile underwater network Broadcast as Direct access and geo-routing aware MAC protocol (GOAL) as Handshaking are evaluated, in both static and mobile nodes with respect to throughput, energy consumption, and delay. Then the effect of using Multi-Sink on the performance is shown, the evaluation is done based on AquaSim simulator, Aqua3D Animator, and AWK programming language have been used to extract the results. As a result, the performance has been improved by using multi-Sink with two types of MAC address, and for all the metrics.

Бесплатно

Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations

Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations

M.Nirmala, Ramachandra.V.Pujeri

Статья научная

Satellite networking is different from wired or wireless networks. The behavior and the performance of TCP/IP in normal wireless network as well as in wired network are different from one another. The TCP/IP protocol was not designed to perform well over high-latency or noisy channels so its performance over satellite networks are totally different. Each satellite networks/constellations have different properties. The deployment height, motion, direction, link capacity – all differ from one satellite constellations to another. So, certainly the behavior of TCP/IP will considerably differ from one satellite constellations than another. The Performance of three different TCP Congestion algorithms, Vegas, Reno and Bic are taken for evaluation on the simulated satellite network Iridium and the performance of the three algorithms under the satellites constellation is measured using suitable metrics. It is observed that, irrespective of the high end to end delay, the behavior of TCP/IP under Satellite network is somewhat resembling a high latency wired network. TCP under satellite network is not like that of a mobile ADHOC network. The observation resulted that the overall performance of Vegas was good in Iridium constellations. These reasons should be explored for designing a better congestion control algorithm exclusively for Satellite Networks.

Бесплатно

Pre-Processing of University Webserver Log Files for Intrusion Detection

Pre-Processing of University Webserver Log Files for Intrusion Detection

Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi

Статья научная

Web Server log files can reveal lots of interesting patterns when analyzed. The results obtained can be used in various applications, one of which is detecting intrusions on the web. For good quality of data and usable results, there is the need for data preprocessing. In this research, different stages of data preprocessing were carried out on web server log files obtained over a period of five months. The stages are Data Conversion, Session Identification, Data Cleaning and Data Discretization. Data Discretization was carried out in two phases to take care of data with continuous attributes. Some comparisons were carried out on the discretized data. The paper shows that with each preprocessing step, the data becomes clearer and more usable. At the final stage, the data presented offers a wide range of opportunities for further research. Therefore, preprocessing web server log files provides a standard processing platform for adequate research using web server logs. This method is also useful in monitoring and studying web usage pattern in a particular domain. Though the research covers webserver log obtained from a University domain, and thus, reveals the pattern of web access within a university environment, it can also be applied in e-commerce and any other terrain.

Бесплатно

Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks

Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks

ChukwuNonso H. Nwokoye, Godwin C. Ozoegwu, Virginia E. Ejiofor

Статья научная

This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects' spread in networks. This Pre-quarantine concept addresses and implements the "assume guilty till proven innocent" slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/pre-quarantining improves the recovery rate in relative terms.

Бесплатно

Predict Link Failure in AODV Protocol to provide Quality of Service in MANET

Predict Link Failure in AODV Protocol to provide Quality of Service in MANET

Sedrati Maamar, Benyahia Abderezzak

Статья научная

Quality of Service (QoS) in Ad hoc networks (MANETs) and more precisely in routing is the subject of several studies with the aim of providing better solutions for new applications requiring high throughput and very low delay. The objective of this work is to enhance the AODV (Ad hoc On Demand Distance Vector) routing strategy in maintenance phase, to improve QoS. It aims to add a mechanism able to predict link failure in use based on signal strength which is able to determine if the quality of link will be improved (i.e. stable) or more bad (i.e. probability of failure) in order to allow us not only to make the link management more robust but to anticipate on link breaking and improve QoS. When signal quality is declining due to neighbor node remoteness, a discovery of a part of road rescue with two hops will be established and it will be used when disconnection happens. Simulations under Network Simulator (Ns2) were conducted to measure traffic control, packets delivery and lost ratio in original protocol and modified version which are presented in this paper.

Бесплатно

Журнал