Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage

Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko

Статья научная

Blockchain technology unarguably has over a decade gained widespread attention owing to its often-tagged disruptive nature and remarkable features of decentralization, immutability and transparency among others. However, the technology comes bundled with challenges. At center-stage of these challenges is privacy-preservation which has massively been researched with diverse solutions proposed geared towards privacy protection for transaction initiators, recipients and transaction data. Dual-key stealth address protocol for IoT (DkSAP-IoT) is one of such solutions aimed at privacy protection for transaction recipients. Induced by the need to reuse locally stored data, the current implementation of DkSAP-IoT is deficient in the realms of data confidentiality, integrity and availability consequently defeating the core essence of the protocol in the event of unauthorized access, disclosure or data tampering emanating from a hack and theft or loss of the device. Data unavailability and other security-related data breaches in effect render the existing protocol inoperable. In this paper, we propose and implement solutions to augment data confidentiality, integrity and availability in DkSAP-IoT in accordance with the tenets of information security using symmetric encryption and data storage leveraging decentralized storage architecture consequently providing data integrity. Experimental results show that our solution provides content confidentiality consequently strengthening privacy owing to the encryption utilized. We make the full code of our solution publicly available on GitHub.

Бесплатно

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Review of Segmentation Methods for Brain Tissue with Magnetic Resonance Images

Ritu Agrawal, Manisha Sharma

Статья научная

Medical Magnetic Resonance Images (MRI) is characterized by a composition of small differences in signal intensities between different tissues types. Thus ambiguities and uncertainties are introduced in image formation. In this paper, review of the current approaches in the tissue segmentation of MR Brain Images has been presented. The segmentation algorithms has been divided into four categories which is able to deal with different intensity non-uniformity as adaptive spatial Fuzzy C - means, Markov Random Field, Fuzzy connectedness method and atlas based re-fuzzy connectedness. The performance of these segmentation methods have been compared in terms of validation metric as dice similarity coefficient, overlap ratio and Jaccard coefficient. The comparison of all validation metric at different levels of intensity non-uniformity shows that adaptive Fuzzy C - means clustering segmentation method give better result in segmentation of brain tissue.

Бесплатно

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes

Rabail S. Satti, Fakeeha Jafari

Статья научная

Digital Forensics can be defined as a field of study involving the usage of technical and proved procedures for collecting, preserving, validating, analyzing, interpreting and presenting the Evidences extracted from the digital sources for presenting those in the court of law. Different process models have been proposed by the researchers for cyber crimes' investigation process, each having its own suitability to environments where they are applicable and other pros and cons. The paper includes the tailoring of existing process models to the particular domain of higher education institutes. With the growing access of computing resources and internet to the students, employees and overall citizens, it is the need of time that organizations should establish and maintain their cyber forensics analysis policy along with whole process to be followed in case of any cyber crime scene reporting.

Бесплатно

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management

Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Osama S. Fragallah, Mohamed G. El-Abyad

Статья научная

In simple wavelength-division multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and wavelength assignment problem involves finding a route (routing) and assigning a wavelength to each request. This paper has presented the WDM technology is being extensively deployed on point to point links within transport networks in the EGYPT. However, WDM promises advantages for switching and routing as well as for transmission. Optical cross connects are currently being developed which can switch an entire wavelength from an input fiber to an output fiber so that large bandwidth circuits can be routed through the network according to wavelength. High speed, fixed bandwidth, end to end connections called lightpaths can then be established between different nodes. Our suggested Trans-Egypt Network (TEGYNET) which uses optical cross connects to route lightpaths through the network are referred to as wavelength routing networks. The average setup time, average link utilization, traffic load, blocking probability, and achievable link utilization in the presence of both single path and multi math routing are the major interesting parameters in the design of TEGYNET topology.

Бесплатно

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm

Оleksandr Korystin, Svyrydiuk Nataliia, Olena Mitina

Статья научная

The paper focuses on the study of cyber security in Ukraine and creation of a predictive model for reducing the risk of identified cyber threats. Forecasting is performed using a linear regression model, taking into account the optimal dependence of specific threats in the field of cyber security of Ukraine on variables characterizing capabilities / vulnerabilities of cyber security. An unique empirical base was used for the analysis, which was formed on the basis of an expert survey of the cyber security system’s subjects in Ukraine. In order to increase the representativeness of the research, based on the selection of reliable expert population, data cleaning is provided. Methodological research is based on a risk-oriented approach, which provided a risk assessment of the spread of cyber threats and, on this basis, the determination of capabilities / vulnerabilities of the cyber security system in Ukraine. The value of the research is formed not only by assessing the risks of the spread of cyber threats, but by a more in-depth analysis of the dependence of the cyber threats’ level on the vulnerability of the cyber security system based on the search for optimal and statistically significant relationships. The experiment was conducted on the basis of determining the optimal model for forecasting the risk of the spread of one of the most significant threats in Ukraine – data confidentiality breach (54.67%), depending on the variables that characterize the capabilities / vulnerabilities of the cyber security system in Ukraine. The experiment showed that the optimal model emphasizes the predictors characterizing the vulnerability of the organizational cyber security system – "Departmental level of cybersecurity monitoring" and capabilities: "The level of use of risk management approaches at the operational level" and "The level of methodological support for cybersecurity of the critical infrastructure system".

Бесплатно

Risk Management Strategies for the Use of Cloud Computing

Risk Management Strategies for the Use of Cloud Computing

Chiang Ku Fan, Chen-Mei Fan Chiang, Tong Liang Kao

Статья научная

Cloud computing may lead to both cost-efficiency and flexibility, but it also inevitably triggers a certain degree of loss exposure. Unfortunately, there is little objective, scientific research focused on identifying and evaluating the loss exposure that results from cloud computing. In this study, a modified Delphi method and the analytic network process were employed to identify and evaluate risks of cloud computing. This research finds all solutions for "contract or agreements", "cross-cloud compatibility" and "social engineering" can only reduce the risks of recurrence (risk frequency) but not eliminate recurrences. In other words, risk is inevitable, but risks with severe consequences may be heavy burdens. Purchasing insurance, if possible, is also strongly recommended.

Бесплатно

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption

Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid

Статья научная

With the integration of cloud computing approaches in the healthcare systems, medical images are now processed and stored remotely on third-party servers. For such digital medical image data, privacy, protection, and security must be maintained by using image encryption methods. The aim of this paper is to design and apply a robust medical encryption framework to enhance the protection of medical image transformation and the patient information confidentiality. The proposed Framework encrypt the digital medical images using DNA computation and hyperchaotic RKF-45 random sequence approach. For which, the DNA computation is enhanced by applying hyperchaoticRKF-45 random key to the different Framework phases. The simulation results on different medical images were measured with various security analyses to prove the proposed framework randomness and coherent. Simulation results showed the ability of the hyperchaotic DNA encryption framework to withstand multiple electronic attacks with high performance compared to its counterparts of encryption algorithms. Finally, simulation and comparative studies have shown that, the proposed cryptography framework reported UACI and NPCR values 33.327 and 99.603 respectively, which are near to the theoretical optimal value.

Бесплатно

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

Robust Distributed Power Control with Resource Allocation in D2D Communication Network for 5G-IoT Communication System

K. Pandey, R. Arya

Статья научная

In the domain of communication technologies, the Device-to-Device (D2D) communication becomes a predominant technology for the implementation of 5G communication system and Internet of Things (IoT) applications. In D2D communication Network, resource allocation and power management are the key areas of interest with ensuring the Quality of Services (QoS). Firstly, we propose the power control problem which is a non-convex problem. By using the log transformation approach, the non-convex problem converts into the convex optimization problem. Robust distributed power control method is further utilized for the power optimization at both ends (base station and D2D user) for underlay Inband D2D communication, where the cellular user and D2D user both use the cellular spectrum. After the power control, resource allocation is done to maximize the energy efficiency by 66.67% for the D2D system. Our proposed work provides new insight to power control techniques in D2D communication. Numerical analysis of the proposed algorithm reflects the impact of robust distributed power control for maintaining the quality of services and enhancing the energy efficiency of the system.

Бесплатно

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network

Audrey Nangue, Elie Fute Tagne, Emmanuel Tonye

Статья научная

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on the cooperation between the nodes of this network. Indeed, given the vulnerability of wireless sensor networks to attack, some entities may engage in malicious behavior aimed at undermining the proper functioning of the network. As a result, the selection of reliable nodes for task execution becomes a necessity for the network. To improve the cooperation and security of wireless sensor networks, the use of Trust Management Systems (TMS) is increasingly recommended due to their low resource consumption. The various existing trust management systems differ in their methods of estimating trust value. The existing ones are very rigid and not very accurate. In this paper, we propose a robust and accurate method (RATES) to compute direct and indirect trust between the network nodes. In RATES model, to compute the direct trust, we improve the Bayesian formula by applying the chaining of trust values, a local reward, a local penalty and a flexible global penalty based on the variation of successful interactions, failures and misbehaviors frequency. RATES thus manages to obtain a direct trust value that is accurate and representative of the node behavior in the network. In addition, we introduce the establishment of a simple confidence interval to filter out biased recommendations sent by malicious nodes to disrupt the estimation of a node's indirect trust. Mathematical theoretical analysis and evaluation of the simulation results show the best performance of our approach for detecting on-off attacks, bad-mouthing attacks and persistent attacks compared to the other existing approaches.

Бесплатно

Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks

Bindiya Bhatia, M.K.Soni, Parul Tomar

Статья научная

In today's world mobile agents and mobile ad-hoc networks are the two technologies that are contributing towards better connectivity and communicability. When the two technologies used jointly, the interest is increased. Due to the properties like self-configuration and infrastructure-less, the mobile ad-hoc networks provide various remarkable features. But the various challenges are also associated with mobile ad-hoc networks like dynamic topology, mobility, energy constraint etc. Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity. Mobile agents move around the ad-hoc networks in a different and better way than the other widespread client server architecture based applications. Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc. The paper reviews the role of the mobile agents in the mobile ad-hoc networks, and emphasizes its application on the various layers of a layered architecture of mobile ad-hoc networks and concludes its merits as compared to other conventional approaches.

Бесплатно

Role of scripting language on Unix operating system for risk assessment

Role of scripting language on Unix operating system for risk assessment

Padma Lochan Pradhan

Статья научная

This proposed dynamic scripting language is a vital role in the complex real-time operating system to review, analysis, protect, detect & correct on data, application, network, software and hardware as per the desired manner to achieve the highest performance of the RTOS. The dynamic language is a primarily responsible for analysis of the fine tuning, performance, fault-tolerance, throughput of the system components at the right time. This research work contributes to the design and development of an automated mechanism that objective to investigate the minimal resource utilization to the robust computing services. We have to define & deployment the Unix scripting codes for real time operating system to achieve the reliability, scalability of the real-time MIMD platform. We have to run this SPL on background process to integrate with real-time hardware, software, network to facilitate to other dependants components. This dynamic code is integrating, interfacing, communicating, message passing, replicating among the several subjects and objects over a real-time operating system.

Бесплатно

Router-based Content-aware Data Redirection for Future CDN Systems

Router-based Content-aware Data Redirection for Future CDN Systems

Janaka L. Wijekoon, Erwin H. Harahap, Shinichi Ishida, Rajitha L. Tennekoon, Hiroaki Nishi

Статья научная

Delivery of data-enriched applications has become a top priority on the Internet, and Internet users are demanding faster and higher-quality services. Cater such requirements, Content Delivery Networks (CDNs) were introduced. However, the growth rate of information on the Internet requires infrastructural modifications to keep the consistency while maintaining quality of the Internet services. To this end, the Service-oriented Router is introduced to provide content based services by shifting the current Internet infrastructure to information-based open innovation platform. In this study, initially we provide implementation notes of a software-designed SoR. Then we propose a new method of CDN Request Redirection (RR) (SoR-based RR), which is designed to redirect packets based on the content of packets and the status of content servers using an SoR as an edge router of a CDN. Furthermore, we present the design and implementation of a prototype to realize the SoR-based RR in a testing network. By analyzing the result of the prototype implementation, we show that the SoR-based RR can enhance the both client experience and faster adaptations to the server changes in CDN environments.

Бесплатно

Routers Sequential Comparing Two Sample Packets for Dropping Worms

Routers Sequential Comparing Two Sample Packets for Dropping Worms

Kannaiyaraja, Babu, Senthamaraiselvan, Arulandam

Статья научная

Network IDS perform a vital role in protecting network connection in the worldwide from malicious attack. Nowadays the recent experiment work related to inspecting the packet for network security that is a minimal amount of process overhead. In this work, analysis the network intrusion for packet inspection that is together the testing data which inspect only group of packet selected as sample predominantly from small flows and select first two packets and comparing with each other overall packets and create tabelazied for find out different malicious debuggers. This experiment results shows that overcome the existing work.

Бесплатно

SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

Khaled Zeraoulia, Nadjib Badache

Статья научная

Next-generation wireless networks (NGN) and internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be managed is a real challenge. Consequently, Seamless mobility management should be provided to support various services in heterogeneous networks. A SIP-based network appears as a very attractive alternative to mobile multimedia applications. In this paper, we introduce a novel mobility management strategy for mobile SIP networks, in which we develop a seamless handover used mobile SIP scheme called SM-SIP (Seamless Mobility Management for Heterogeneous Wireless Networks for Mobile SIP environment). SM-SIP can significantly reduce the system signaling cost and handover delay, by proactively processing the address allocation and session updates using link layer information of wireless networks. Also, our performance study shows that SM-SIP reduces efficiently packets loss using an anticipated buffering scheme.

Бесплатно

SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm

SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm

Ali Gozali, Keivan Borna

Статья научная

The Ad-Hoc networks are the kind of wireless networks that their configuration is done automatically and also the nodes are moving with a certain speed. For this reason the created paths (routes) are often unstable and these paths are usually broken by switching nodes. In this respect, choosing the right path and routing mechanism become more diverse in these networks. In this research by applying some changes to the AODV routing protocols, two new protocols are presented: The first protocol is SAODV, which is a protocol for multi-path which finds the minimum length path between source and destination nodes and then sequentially sends the packets in these paths. The second protocol is SMAODV, which is a verified version of the first one but it finds multi-paths with minimum length for sending the control packets by the use of webpage rank algorithm and a smart mechanism for determining the amount of sending packets. This would cause the energy at any point in the network nodes with minimum variance and increase the network lifetime. The results of simulations in the NS-2 network simulator also verify that our proposed methods have better efficiency than the basic AODV protocol, and improve the network performance and decrease the end-to-end delay of receipt packets.

Бесплатно

Satellite Attitude Determination Filter using Square Root based Spherical Simplex Unscented Transformation

Satellite Attitude Determination Filter using Square Root based Spherical Simplex Unscented Transformation

Kaichun Zhao, Zheng You

Статья научная

A square root based spherical simplex unscented transform was adopted in micro satellite attitude determination filter. The filter computation cost was reduced evidently by means of spherical simplex unscented transformation (SSUT) and the square root technique with modified Rodrigues parameters (MRPs). The filter performance and numerical stability were guaranteed by unscented transformation with positive-semi definiteness of the state covariance propagation. The simulation results of some micro-satellite showed that this algorithm could insure accuracy, fast convergence and high robustness with high computation efficiency, which was suitable for the attitude estimation of micro-satellite.

Бесплатно

Scheduling in Grid Systems using Ant Colony Algorithm

Scheduling in Grid Systems using Ant Colony Algorithm

Saeed Molaiy, Mehdi Effatparvar

Статья научная

Task scheduling is an important factor that directly influences the performance and efficiency of the system. Grid computing utilizes the distributed heterogeneous resources in order to support complicated computing problems. Grid can be classified into two types: computing grid and data grid. Job scheduling in computing grid is a very important problem. To utilize grids efficiently, we need a good job scheduling algorithm to assign jobs to resources in grids. This paper presents a new algorithm based on ant colony optimization (ACO) metaheuristic for solving this problem. In this study, a proposed ACO algorithm for scheduling in Grid systems will be presented. Simulation results indicate our ACO algorithm optimizes total response time and also it increase utilization.

Бесплатно

Scrum and Temporal Distance-Based Global Software Development

Scrum and Temporal Distance-Based Global Software Development

Asmaa Fowzi Alotaibi, M. Rizwan Jameel Qureshi

Статья научная

Global software development (GSD) is one of modern trends in software engineering. The last years has witnessed a significant increase in the adoption of Agile in GSD .This paper considers the issue by examining whether Scrum practices used in mitigation of temporal distance-based GSD coordination challenges. We were used Cisco TelePresence tool in Synchronization communication for simulation of face to face meetings. We were designed a simple algorithm to help project managers in determining the appropriate strategies. This algorithm is based on the temporal difference between the sites. This is may be great or simple. Through temporal difference, we calculated number of working hours overlapping. Which are classified in the three cases and each case has number of strategies are sufficient to overcome this challenges.

Бесплатно

Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

Searching Methods of MP2P Based on Diffusion Strategy of Resources Index

Fangfang Guo, Jing Xu

Статья научная

The inherent mobility of MP2P peers lead to an efficient of existing resources positioning method low, and the proposed application model is single. The proposed methods considered the resource positioning in the direction of the resource provider's, and implement it base on the diffusion resource index, which are spread in the model of epidemic. Networking connectivity model is built in the diffusion path. Diffusion resources index are used to position resources, so as to solve the low positioning efficiency of existing positioning method and large time delay. By comparing the proposed method, the flooding resource location method and the Structural resources localization methods, the obtained simulation results show that the proposed method can effectively improve resource efficiency and accuracy of the location method.

Бесплатно

Sectorized Hamming Concentric Circular Arrays for Stratospheric Platforms Cellular Design

Sectorized Hamming Concentric Circular Arrays for Stratospheric Platforms Cellular Design

Yasser Albagory

Статья научная

Recently, stratospheric platform communications system (SPs) has gained great interest due to its superior performance compared to conventional communications systems. This paper addresses one of the major performance keys in SPs which is the cellular design based on adaptive concentric circular arrays (CCA). The proposed design technique aims to provide circular cells at any elevation angle to overcome the cell flattening and broadening which result in ellipsoidal cell shape. The cell footprint is controlled by adjusting the beamwidths which can be established by sectorizing the CCA and tapering the current amplitudes of the effective sectors by Hamming function while the others are muted and the resulted array is called Sectorized Hamming tapered CCA (SHTCCA). In this array, each sector has an angular width of 90o and some and two opposite sectors are fully fed while the others has less number of quarter-circular arrays. The tapering of the active sectors results in lower sidelobe levels which is a paramount improvement for the cellular systems. In addition, the SHTCCA is analyzed and optimized to provide the desired beamwidths at any elevation angle that are needed to design circular cell footprint.

Бесплатно

Журнал