Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1066

A state-of-the-art survey of coverless text information hiding

A state-of-the-art survey of coverless text information hiding

Shahbaz Ali

Статья научная

Information plays a pre-eminent role in people's routine lives. It provides people with facts about abundant topics of interest. Information can be represented by a variety of communicative media such as text, video, audio, and image, out of which text is the most common medium for representing the information. In the digital era, the information can easily be imitated, exchanged and distributed from one place to another in an instant. Thus, it is incredibly essential to hide the confidential information so that it couldn’t be accessed by unauthorized means. The traditional information hiding techniques require a designated carrier to hide the secret information, which ultimately introduces some modifications in the carrier. As a result, it is quite hard for the existing traditional methods to escape from the steganalysis. In contrast to conventional information hiding techniques, the term ‘coverless information hiding’ has been coined by the researchers lately, which doesn’t require a designated carrier to conceal the secret information. Hence, the technique of coverless information hiding can efficiently resist the attacks of steganalysis. This paper presents a state-of-the-art survey of coverless text information hiding by discussing the current scope of the aforementioned technique comprehensively. The existing coverless text information hiding methods are compared and contrasted by various vital aspects such as embedding capacity, algorithm efficiency, ability to resist steganalysis, and methods’ theoretical and real-world significance. Moreover, some future aspects of coverless text information hiding are highlighted at the end.

Бесплатно

ANM to Perceive and Thwart Denial of Service Attack in WLAN

ANM to Perceive and Thwart Denial of Service Attack in WLAN

Durairaj M, Persia A

Статья научная

Wireless infrastructure network is vulnerable to Denial of Service (DoS) attack which makes the resources unavailable for its intended user. As an outcome of DoS attack, authenticated user is denied from accessing the network by spoofing legitimate client identity. Reduced protection in management frame led to MAC spoof DoS attack. Though 802.11w was developed to protect the management frame, the network is vulnerable to different DoS attacks and unable to prevent all types of DoS attacks. This motivated us to propose a mechanism to detect and prevent substantial number of DoS attacks. This paper proposes an algorithm called Alternative Numbering Mechanism (ANM) which prevents DoS attacks. The proposed solution is simulated in NS2 for experimentation. Packet delivery ratio, control overhead, normalized routing overhead, delay time, throughput and packet drop were measured for experimentation and to evaluate the performance of ANM. The experimental results of ANM demonstrate that the performance of ANM is encouraging and prevents nearly all types of DoS attacks.

Бесплатно

AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services

AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services

Olakanmi O.Oladayo

Статья научная

Most organizations concurrently maintain private Automatic Branch Exchange (PABX) and Local Area Network (LAN) for information interchange within their organization. This is obviously a waste of resources and avoidable duplication of communication systems. The existing LAN can be used as a communication backbone for the in house telephone operations with no extra cost and resources. In view of this, a portable and a platform independent Software-Based Cell Phone (SCP) was proposed for the existing LANs infrastructure in the organizations. The SPC is a telephony application with a user friendly interface which is capable of handling voice, video and text messages without compromising the Quality of Service (QoS) of the existing LAN.

Бесплатно

Accelerating the Response of Query in Semantic Web

Accelerating the Response of Query in Semantic Web

Nooshin Azimi, Shahla Kiani

Статья научная

Today, XML has become one of the important formats of saving and exchanging data. XML structure flexibility enhances its use, and the content of XML documents is increasing constantly. As a result, since file management system is not able to manage such content of data, managing XML documents requires a comprehensive management system. With the striking growth of such databases, the necessity of accelerating the implementing operation of queries is felt. In this paper, we are searching for a method that has required ability for a large set of queries; the method that would access fewer nodes and would get the answer through a shorter period of time, compared to similar ways; the method which has the ability of matching with similar ways indicator, and can use them to accelerate the queries. We are seeking a method which is able to jump over the useless nodes and produces intermediate data, as compared to similar ones. A method by which nodes processing are not performed directly and automatically through a pattern matching guide.

Бесплатно

Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients

Achieving Open-loop Insulin Delivery using ITM Designed for T1DM Patients

Akash Rajak, Kanak Saxena

Статья научная

To simulate the glucose-insulin concentration of type 1 diabetic patient an Intelligent Temporal Mediator (ITM) has been designed. The ITM integrates the tasks of temporal reasoning and temporal maintenance. The paper discusses the design of ITM reasoning system which was based on open-loop insulin delivery technique. The result shows that ITM successfully models the blood glucose profile of the diabetic patient. The designed ITM is also compared with existing open-loop simulator for checking its performance.

Бесплатно

Achieving confidentiality in electronic health records using cloud systems

Achieving confidentiality in electronic health records using cloud systems

Robert French-Baidoo, Dominic Asamoah, Stephen Opoku Oppong

Статья научная

Currently, existing methods for enforcing access to records in an Electronic Health Record system relies on a single Trusted Server which stores health records and mediates access. Such Trusted Severs employ either a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) or Key-Policy Attribute-Based Encryption (KP-ABE) method for storing and controlling access. However, Trusted Server storage of health records is susceptible to single-point-of-threat attack and a successful attack invariably leads to compromising the integrity of records on the server. In this research work. This paper presents a methodology that defines and creates simple Access Structures and eliminates need for private keys during encryption and/or decryption of health records which is the Enhanced Ciphertext-Policy Attribute-Based Encryption (ECP-ABE). The ECP-ABE yields high cryptographic performance creates simple Access Structures, eliminates need for private keys and presents an implementation architecture that makes cloud-based EHR system secure and confidential. The ECP-ABE also performs cryptographic functions using less CPU time, minimal computer memory and produces high encryption and decryption throughput especially with increasing file sizes.

Бесплатно

Acknowledgement based localization method (ALM) to improve the positioning in vehicular ad hoc networks

Acknowledgement based localization method (ALM) to improve the positioning in vehicular ad hoc networks

M. Chitra, S. Siva Sathya

Статья научная

Localization in Vehicular Ad Hoc Networks is a challenging issue due to the dynamic topology and high mobility of vehicles. Finding the exact location of the vehicles is not possible in this network due to the vehicles moving speed. In vehicular ad hoc networks, various kinds of localization techniques are used to know the position and the location of the vehicles. These techniques do have some limitations due to obstacles on the roadside, building shadow, tunnels and bad weather condition, etc. This paper is motivated to propose an algorithm to increase the localization accuracy and localization error. Acknowledgement based Localization Method (ALM) is used to improve the vehicle’s positioning information while broadcasting an Emergency Safety Message. ALM updates the position information whenever the vehicle changes its position. The proposed algorithm is compared with RSSI, TOA and DLM based localization techniques. The result shows that ALM algorithm improves the accuracy level and reduces the error rate caused by incorrect position estimation.

Бесплатно

Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR

Acoustic lightweight pseudo random number generator based on cryptographically secure LFSR

Mohammed Abdul Samad AL-khatib, Auqib Hamid Lone

Статья научная

In this paper, we propose a secure, lightweight acoustic pseudo-random number generator (SLA-LFSR-PRNG) that consumes less memory, CPU capacity and adopts the multi-thread parallelization to generate huge random numbers per second by taking the advantages of multi-core CPU and massively parallel architecture of GPU. The generator is based on cryptographically secure Linear Feedback Shift Register(LFSR) and extracts the entropy from sound sources. The major attraction of proposed Pseudo Random Number Generator(PRNG) is its immunity to major attacks on pseudo-random number generators. The paper presents test results of proposed PRNG subjected to NIST SP 800-22 statistical test suite and also shows the performance comparison of proposed generator on different systems.

Бесплатно

Action-Dependent Adaptive Critic Design Based Neurocontroller for Cement Precalciner Kiln

Action-Dependent Adaptive Critic Design Based Neurocontroller for Cement Precalciner Kiln

Baosheng Yang, Deguang Cao

Статья научная

There are many factors that can affect the calciner process of cement production, such as highly nonlinearity and time-lag, making it very difficult to establish an accurate model of the cement precalciner kiln (PCK) system. In order to reduce transport energy consumption and to ensure the quality of cement clinker burning, one needs to explore different control methods from the traditional way. Adaptive Critic Design (ACD) integrated neural network, reinforcement learning and dynamic programming techniques, is a new optimal method. As the PCK system parameters change frequently with high real-time property, ADACD (Action-Dependant ACD) algorithm is used in PCK system to control the temperature of furnace export and oxygen content of exhaust. ADACD does not depend on the system model, it may use historical data to train a controller offline, and then adapt online. Also the BP network of artificial neural network is used to accomplish the network modeling, and action and critic modules of the algorithm. The results of simulation show that, after the fluctuations in the early control period, the controlled parameters tend to be stabilized guaranteeing the quality of cement clinker calcining.

Бесплатно

Active Defense Strategy against Jamming Attack in Wireless Sensor Networks

Active Defense Strategy against Jamming Attack in Wireless Sensor Networks

Nawfal F. Abdulqader AL-Shaihk, Reza Hassanpour

Статья научная

Wireless Sensor Networks WSNs are being utilized increasingly nowadays due to their ability to collect data from stationary, moving, reachable or unreachable fields. Progressive developments in WSN techniques add efficiency, reliability and better power management possibility, but they are still vulnerable and sensitive to security threats. The most effective threat to WSN is DOS attacks, which are detectable but in many cases unpreventable yet. An authentication-based defensive approach against DOS attack combined with jamming attack that prevents transferring data between attacked nodes in a cluster and cluster head node is proposed in this study. The proposed method encompasses developing an algorithm with ability to bypass attacked path via alternative safe one under control of cluster head to mitigate the False Node Excluding DOS due to jamming attack. The proposed method has been experimentally tested against similar methods from the literature with arbitrary study cases. Our proposed algorithm shows promising results in mitigating False Node Exclusion DOS (FNEDOS) attack where a full recovery of the attacked node is achieved in case of isolated nodes, and improvement between 36% and 52% is obtained when the attack affects a group of nodes at proximity.

Бесплатно

Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions

Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions

K. Seshadri Sastry, M.S.Prasad Babu

Статья научная

This paper presents Adaptive Population Sizing Genetic Algorithm (AGA) assisted Maximum Likelihood (ML) estimation of Orthogonal Frequency Division Multiplexing (OFDM) symbols in the presence of Nonlinear Distortions. The proposed algorithm is simulated in MATLAB and compared with existing estimation algorithms such as iterative DAR, decision feedback clipping removal, iteration decoder, Genetic Algorithm (GA) assisted ML estimation and theoretical ML estimation. Simulation results proved that the performance of the proposed AGA assisted ML estimation algorithm is superior compared with the existing estimation algorithms. Further the computational complexity of GA assisted ML estimation increases with increase in number of generations or/and size of population, in the proposed AGA assisted ML estimation algorithm the population size is adaptive and depends on the best fitness. The population size in GA assisted ML estimation is fixed and sufficiently higher size of population is taken to ensure good performance of the algorithm but in proposed AGA assisted ML estimation algorithm the size of population changes as per requirement in an adaptive manner thus reducing the complexity of the algorithm.

Бесплатно

Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques

Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques

Manish Mahajan, Navdeep Kaur

Статья научная

Steganography is the science that deals with hiding of secret data in some carrier media which may be image, audio, formatted text or video. The main idea behind this is to conceal the very existence of data. We will be dealing here with image steganography. Many algorithms have been proposed for this purpose in spatial & frequency domain. But in almost all the algorithms it has been noticed that as we embed the secret data in the image the certain characteristics or statistics of the image get disturbed. Based on these disturbed statistics steganalysts can get the reflection about the existence of secret data which they further decode with the help of available steganalytic tools. Steganalysis is a science of attacking the hidden data to get an authorized access. Although steganalysis is not a part of this work but it may be sometimes discussed as a part of literature. Even in steganography we are not purely concerned with spatial or frequency domain rather our main emphasis is on adaptive steganography or model based steganography. Adaptive steganography is not entirely a new branch of steganography rather it is based upon spatial & frequency domain with an additional layer of mathematical model. So here we will be dealing with adaptive steganography which take care about the important characteristics & statistics of the cover image well in advance to the embedding of secret data so that the disturbance of image statistics as mentioned earlier, which attracts the forgery or unauthorized access, can be minimized. In this survey we will analyze the various steganography algorithms which are based upon certain mathematical model or in other words algorithms which come under the category of model based steganography.

Бесплатно

Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks

Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks

Adwan Yasin, Salah Jabareen

Статья научная

In this paper we present a new algorithm for clustering MANET by considering several parameters. This is a new adaptive load balancing technique for clustering out Mobile Ad-hoc Networks (MANET). MANET is special kind of wireless networks where no central management exits and the nodes in the network cooperatively manage itself and maintains connectivity. The algorithm takes into account the local capabilities of each node, the remaining battery power, degree of connectivity and finally the power consumption based on the average distance between nodes and candidate cluster head. The proposed algorithm efficiently decreases the overhead in the network that enhances the overall MANET performance. Reducing the maintenance time of broken routes makes the network more stable, reliable. Saving the power of the nodes also guarantee consistent and reliable network.

Бесплатно

Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs

Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs

Ankit D. Patel, Rutvij H. Jhaveri

Статья научная

One of the important issues related to MANETs is the security. Grayhole attack is one of the most prominent attacks on the network layer of MANET which tends to degrade the network performance by performing selective packet dropping. In this paper, we propose a security mechanism that tends to mitigate the Grayhole attack during the route discovery time as well as during data transmission time. We modify AODV protocol such that it can avoid Grayhole attacker node from participating in the data transmission route, and if the attacker node somehow enters the route, it can be detected through the promiscuous mode monitoring.

Бесплатно

Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism

Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism

Dipti Chauhan, Sanjay Sharma

Статья научная

One day IPv6 is going to be the default protocol used over the internet. But till then we are going to have the networks which IPv4, IPv6 or both networks. There are a number of migration technologies which support this transition like dual stack, tunneling & header translation. In this paper we are improving the efficiency of IPv6 tunneling mechanism, by compressing the IPv6 header of the tunneled packet as IPv6 header is of largest length of 40 bytes. Here the tunnel is a multi hop wireless tunnel and results are analyzed on the basis of varying bandwidth of wireless network. Here different network performance parameters like throughput, End-to-End delay, Jitter, and Packet delivery ratio are taken into account and the results are compared with uncompressed network. We have used Qualnet 5.1 Simulator and the simulation results shows that using header compression over multi hop IPv6 tunnel results in better network performance and bandwidth savings than uncompressed network.

Бесплатно

Agent based trust establishment between vehicle in vehicular cloud networks

Agent based trust establishment between vehicle in vehicular cloud networks

Shailaja S. Mudengudi, Mahabaleshwar S. Kakkasageri

Статья научная

In order to enhance the driving experience with increased security and privacy, a category of MANET has emerged i.e VANET. The nodes are highly mobile, uncoordinated and dynamic in nature. An progressive step in this vision is Vehicular Cloud (VC) the advancement in Intelligent Transport System (ITS).The resources are shared between the vehicle nodes to provide the services at a economical cost. In order to provide them there should be hassle free secure communication link established between the Vehicle nodes, Road side unit (RSU) and the Cloud. Trust establishment in VC between vehicle nodes enhances the security aspects in VC. In this paper we put forth an trust evaluation scheme based on Dempster Shafer theory. The trust evaluation is based on Direct trust and Indirect trust, the priority of which can be accustomed.

Бесплатно

Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism

Alleviating malicious insider attacks in MANET using a multipath on-demand security mechanism

Shahnawaz Ahmad

Статья научная

MANET is a family of ad hoc networks that spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET towards the attacks is huge as compared to its wired counterparts. MANETs are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared media, constrained resources, etc. The ramification being that the security needs of MANETs become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANETs comes from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open making it reachable to both the legitimate users of the network as well as the malicious nodes. Consequently, there is a bankruptcy of clear line of defense from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. The occurrences of the attacks of this type in ad hoc networks result in the situation where even the standard routing protocols do not provide the required security. The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attacks. But, the attack on availability which is the most common and easiest of them all cannot be avoided by the authentication and encryption because even the authentic user can be the attacker. Also, the encryption cannot be helpful to prevent such attacks. Therefore, in such a situation if a proper solution is not provided the entire MANET operation will get crippled. The main aim of this paper is to guarantee a security solution which provides defense against these attacks. To achieve this, a Multipath On-demand security Mechanism, called Secure Multipath Ad hoc On-demand Distance vector routing protocol (SMAODV), is presented which eliminates the malicious nodes from the network thereby preventing MANETs from the effects of such malicious nodes.

Бесплатно

Alternative Equations for Guillou-Quisquater Signature Scheme

Alternative Equations for Guillou-Quisquater Signature Scheme

J. Ettanfouhi, O. Khadir

Статья научная

In 1990, Guillou and Quisquater published an article where they described a new digital signature system. Their technique was based on the RSA algorithm. In this paper, we present several modified Guillou-Quisquater digital signature protocols. We discuss their security and complexity. These schemes can be seen as alternative signature methods if existing systems are completely broken.

Бесплатно

An Algebraic Method for the N-Queens Problem Based on Permutation Operation Group

An Algebraic Method for the N-Queens Problem Based on Permutation Operation Group

Jun Zhang, Zili Zhang

Статья научная

To analyze N-Queens problem in permutation space, this paper defines isomorphic operations of permutation to dihedral group D4. With these operations to find elements within an orbit, two operations on orbits are also defined to generate new orbit from existing ones. Orbit signature is proposed to uniquely identify different orbits in orbit space. A search algorithm based on orbit signature is presented, and finally the effectiveness of the algorithm is illustrated by an example.

Бесплатно

An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

An Algorithm for Static Tracing of Message Passing Interface Programs Using Data Flow Analysis

Alaa I. Elnashar, Said F. El-Zoghdy

Статья научная

Message Passing Interface (MPI) is a well know paradigm that is widely used in coding explicit parallel programs. MPI programs exchange data among parallel processes using communication routines. Program execution trace depends on the way that its processes are communicated together. For the same program, there are a lot of processes transitions states that may appear due to the nondeterministic features of parallel execution. In this paper we present a new algorithm that statically generates the execution trace of a given MPI program using data flow analysis technique. The performance of the proposed algorithm is evaluated and compared with that of two heuristic techniques that use a random and genetic algorithm approaches to generate trace sequences. The results show that the proposed algorithm scales well with the program size and avoids the problem of processes state explosion which the other techniques suffer from.

Бесплатно

Журнал