Volume 1, Issue 1 by Int. j. comput. netw. commun. secur.
International journal of computer networks and communications security, Jun 30, 2013
This paper presents a case study of socio-economic disparities – human factors – having tremendo... more This paper presents a case study of socio-economic disparities – human factors – having tremendous impact on the performance and behavior of a cloud-based software system. Failures to take such factors into account lead to serious design, implementation, and operational problems. A detailed empirical analysis of a commercial mobile network address book web application, serving over 8.3 million subscribers, was conducted for the joint purposes of building realistic subscriber behavior and data models and to explain certain performance characteristics and expectations. Extensive analysis of anonymized production data revealed that many aspects of users' data and activity exhibited strongly-heavy-tailed characteristics, particularly characteristics affecting database performance and interactive request latencies, which could be ameliorated by traditional techniques such as caching or multi-threading. Several performance-critical aspects of users' data were found to be well-described by the Log-Normal probability distribution, were heavily-skewed to the right, and exhibited Gini coefficients consistent with income inequalities in the Western world. The analytical model was translated into enhanced simulation and performance tooling, enabling more realistic performance and capacity testing of the product. Our deeper understanding also lead to changes in monitoring and system performance evaluation and quality-of-service parameters, statements of performance and capacity ratings, and architecture that would not otherwise have been justifiable.
International journal of computer networks and communications security, Jun 30, 2013
Direct Torque Control (DTC) of induction motor is preferred control strategy recently, due to it... more Direct Torque Control (DTC) of induction motor is preferred control strategy recently, due to its quick torque response, simplicity, less sensitivity against motor parameter variation. In general, PI speed controllers are widely used in industrial applications due to their simple structure. Due to the continuous variation of machine parameters, model uncertainties, nonlinear dynamics and system external disturbance, fixed gain PI controllers may becomes unable to provide the required control performance. Genetic Algorithm (GA) is used to tune the PI controller gains to ensure optimal performance. GA is more attractive for applications that involve non smooth or noisy signals. GA is used to minimize speed error and attains optimal values of the PI controller gains. The efficient and effective speed controllers can be designed by using adaptive control techniques. In which the conventional PI controller is replaced by structures based on Sliding Mode Control (SMC) strategy. SMC is known for its capability to cope with bounded disturbance as well as model imprecision which makes it ideal for the robust nonlinear control of IM drives.
International journal of computer networks and communications security, Jun 30, 2013
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. Ho... more Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. In this paper, we present and evaluate a new technique, which we have called Virtual Network for SIP (VNSIP) to fix the problem related to the constraints of SIP deployment in Ad Hoc network. The main idea of this technique is to create a virtual infrastructure, enabling SIP to proceed in a distributed architecture inside the Ad hoc Network.
International Journal of Computer Networks and Communications Security , Jun 30, 2013
Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studie... more Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks called Wormhole Attack that two adversary node collaborate together to transmit the packets in out of band channel. In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.
International Journal of Computer Networks and Communications Security , Jun 30, 2013
Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) with two key ... more Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) with two key differences which are the high and constrained mobility of its nodes. Because of this high mobility, the topology of VANET is considered so dynamic. As a reason of this highly dynamic topology, the link breakages in these networks are something common. This problem causes high data loss and delay. In order to decrease these problems, the idea of link breakage prediction has appeared to deal with this phenomenon in MANET. This idea has proved to be successful to enhance the performance of routing protocols in MANET, but till now it did not be applied to the area of VANET. In this paper the idea of link breakage prediction was used to enhance the performance of the well known Dynamic Source Routing protocol (DSR) in VANET by applying a new mechanism which includes replacing the whole effected route (Not only the effected link). This new mechanism was able to decrease the packet loss and delay that occur in the original protocol.
Volume 1, Issue 2 by Int. j. comput. netw. commun. secur.
International Journal of Computer Networks and Communications Security , Jul 30, 2013
Internet is based on TCP/IP but TCP/IP architecture is not sufficient to cope with the dynamics o... more Internet is based on TCP/IP but TCP/IP architecture is not sufficient to cope with the dynamics of MANET. Number of architectures are already available in literature but cross layer architecture is most popular one. To enhance performance of protocols a Cross Layer- Performance Enhancement Architecture (CL-PEA) is proposed. In this architecture one hardware layer is added and all layers can exchange their parameters. CL-PEA enhances the protocol performances by taking decisions on the basis of information available on layers.
International Journal of Computer Networks and Communications Security , Jul 30, 2014
Cloud computing, the utility base computing, is going to become the mainstream of IT future. Gove... more Cloud computing, the utility base computing, is going to become the mainstream of IT future. Governments and enterprises are realizing that by immigrating into the cloud they can significantly enhance their current infrastructure or application services with minimum cost and maximum elasticity. But securing cloud user digital assets and addressing privacy concerns of cloud costumers has become serious challenge. Providing security in cloud always has to consider performance. Employing high secure methods with massive complexity will increase overall service cost, to address this problem in this paper a two- tier security architecture is proposed. This architecture use multiple work mode for security components in guest level to decrease security process over-head and a security supervisory in hypervisor layer to make sure avoiding from false security alarms.
International Journal of Computer Networks and Communications Security , Jul 30, 2013
Wireless Sensor Networks (WSNs) are emerging network technology with innumerable applications. Bu... more Wireless Sensor Networks (WSNs) are emerging network technology with innumerable applications. But security and energy constraints reduce its successful deployments. The nodes in network are greatly involved in transmissions and other processing operations for maintenance other than establishing or handling a call. Due to limited processing ability, storage capacity and most importantly the available battery power of the nodes, it is required to minimize the transmission power and the amount of data transmitted, for efficient operation. This paper presents a power aware routing protocol designed for wireless sensor networks. The proposed routing protocol is an extended and enhanced version of Dynamic Source Routing protocol. It adds energy awareness to the existing implementation of DSR protocol. Energy metric is considered during route selection process to choose an optimal path in terms of overall energy of the nodes along the path, and “low energy notification” method is used during route maintenance process to increase the lifetime of the 'bridge' nodes to avoid network partitioning. The performance of DSR protocol and Energy Aware DSR (EADSR) protocol are compared through NS2 simulation under different scenarios. In all the cases, it is seen that EADSR protocol out-performs DSR protocol by energy saving in efficient manner.
International Journal of Computer Networks and Communications Security , Jul 30, 2013
The emergence of sensor networks as one of the dominant technology trends in the coming decades h... more The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against WSN security. Further, various DoS attacks on different layers of OSI are proposed.
Volume 1, Issue 3 by Int. j. comput. netw. commun. secur.
International Journal of Computer Networks and Communications Security , Aug 30, 2014
Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. Ho... more Ad Hoc Networks provide a real opportunity to design flexible networks, very simple to deploy. However they remain a particular computation environment, characterized by the deficiency of pre-existed and centralized infrastructure. In the other hand, SIP protocol, which knows a huge booming in internet networks, requires centralized entities, like proxy server, registrar server and location service; consequently SIP is not adapted to Ad Hoc networks. We have presented in a new technique VNSIP (Virtual Network for Session Initiation Protocol) to fix the problem related to constraints of SIP deployment in MANET (Mobile Ad Hoc Networks). In this paper we use a new algorithm which we have called MCAC (MANET Call Admission Control) to improve VNSIP Performances.
International Journal of Computer Networks and Communications Security , Aug 30, 2014
As business activities are becoming increasing globally and as numerous firms expand their operat... more As business activities are becoming increasing globally and as numerous firms expand their operations into overseas markets, there is need for human resource management (HRM) to ensure that they hire and keep good employees. From ages, firms/organizations have been having great problems in getting the right professionals into appropriate jobs and training. This research focuses at exploiting information technology in order to overcome these problems. The system, which is a network of inter–related processes, collects data from applicants through a web-based interface and matches with appropriate jobs. This prevents the frustration and some other problems inherent in the manual method of job recruitment, which is the traditional unstructured interview and knowledge based method for matching applicants to jobs. The proposed system is a neural network web-based human resource management system model running on Internet Information (IIS) server with capabilities for Active Server Page (ASP) and Microsoft Access; while Hypertext Markup Language (HTML) are used for authoring web pages. Finally, the system can run on the minimum Pentium machines with Windows XP operating system.
International Journal of Computer Networks and Communications Security , Aug 30, 2014
Boolean functions play important role in cryptography, since in convention a symmetric encryption... more Boolean functions play important role in cryptography, since in convention a symmetric encryption algorithm can be designed by composing Boolean functions satisfying good cryptographic criteria. In this paper; state of the art in mathematical and practical study of the most important cryptographic criteria of Boolean functions and how to implement algorithms that fulfill these criteria are introduced. Also; the most known constructions for generating Boolean functions that satisfy good cryptographic criteria are summarized.
International Journal of Computer Networks and Communications Security , Aug 30, 2014
Cloud Computing is one of the rapidly adopted technology in the field of Information and Communic... more Cloud Computing is one of the rapidly adopted technology in the field of Information and Communication Technology (ICT) in which resources (like processor and storage devices) can be rented out and released by the Cloud customer by using the Internet in on-demand basis. Information Security issues in Cloud Computing hold vital importance as the global economy depends upon the secure flow of information within the organization and exchange of information with other organization (private and public Cloud). To measure security in Cloud Computing at each level, Information Security metrics are better tools that help the organization to take good decisions on the base of qualitative and quantitative analysis, performance reports, efficiency and effectiveness of the implemented standard or certification security controls. SLA metrics are mostly used to evaluate performance of the service object but not to measure Information Security risks. These service objects can be further categorized as Hardware, Software, Network, Storage and Help Desk / Service Desk. Each object has its own quality metrics and can be combined to form a complex and compound service. COBIT is IT Governance framework which is widely used in IT industry. It covers several areas of IT Governance. Information Security is the part of this framework and the same part can be used to build SLA based Information Security Metrics in Cloud Computing. To obtain Information Security Metrics particularly for Cloud Computing, a criteria have been developed and Information Security Metrics are developed accordingly to facilitate both Cloud Customers and Cloud Service Providers.
International Journal of Computer Networks and Communications Security , Aug 30, 2014
In this paper, we present a new structure to develop 64-bit RSA encryption engine on FPGA that ca... more In this paper, we present a new structure to develop 64-bit RSA encryption engine on FPGA that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. The algorithm also requires random prime numbers so a primality tester is also design to meet the needs of the algorithm. We use right-to-left-binary method for the exponent calculation. This reduces the number of cycles enhancing the performance of the system and reducing the area usage of the FPGA. These blocks are coded in Verilog and are synthesized and simulated in Xilinx 13.2 design suit.
Volume 1, Issue 4 by Int. j. comput. netw. commun. secur.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
Single Nucleotide Polymorphisms (SNPs), a single DNA base varying from one individual to another,... more Single Nucleotide Polymorphisms (SNPs), a single DNA base varying from one individual to another, are believed to be the most frequent form responsible for genetic differences. Haplotypes have more information for disease-associating than individual SNPs or genotypes; it is substantially more difficult to determine haplotypes through experiments. Hence, computational methods that can reduce the cost of determining haplotypes become attractive alternatives. MEC, as a standard model for haplotype reconstruction, is fed by fragments input to infer the best pair of haplotypes with minimum errors needing correction. It is proved that haplotype reconstruction in the MEC model is a NP-Hard problem. Thus, researchers’ desire reduced running time and obtaining acceptable results. Heuristic algorithms and different clustering methods are employed to achieve these goals. In this paper, Harmony Search (HS) is considered a clustering approach. Extensive computational experiments indicate that the designed HS algorithm achieves a higher accuracy than the genetic algorithm (GA) or particle swarm optimization (PSO) to the MEC model in most cases.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
Task Scheduling (TS) poses a challenging problem in distributed systems such as multiprocessor s... more Task Scheduling (TS) poses a challenging problem in distributed systems such as multiprocessor systems, flow-shop scheduling, and project management problems in which there are multiple tasks and processors (resources), and the problem is to efficiently assign tasks to processors. The importance of this problem includes several aspects such as heterogeneity of processors, computational complexity of reaching a solution as well as theoretical performance analysis. In this paper, control theory is used to construct a modeling paradigm. The approach which is basically a switching state space model opens a possibility of using the extensive theoretical developments that have taken place in this field within the past several decades. In this study, first we show the role of nonlinear state space equations in modeling the standard TS, a suitable transformation is then devised to convert this model to linear switching state space (LS3) equations with nonlinear constraints, and then the most important aspects of a control-based system – the stability, controllability, observability and stabilizability – for the proposed method is analytically proven. Finally we inspected the robustness of the proposed model in a similar way at the presence of the changes in processing power and link failure.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
For decades, several image enhancement techniques have been proposed. Although most techniques re... more For decades, several image enhancement techniques have been proposed. Although most techniques require profuse amount of advance and critical steps, the result for the perceive image are not as satisfied, In this paper a new approach for enhancing brightness of color image based on contourlet transform and histogram equalization proposes. The color image is converted to HSI (hue, saturation, intensity) values. The i, which represent the luminance value of color image, decomposed to its coefficients by non-sampling contourlet transform, then applying grey-level contrast enhancement technique on some of the coefficients. Then, inverse contourlet transform is performed to reconstruct the enhanced S compoment. The S component is enhanced by histogram equalization while the H component does not change to avoid degradation color balance between the HSI components. Finally the enhanced S and I together with H are converted back to its original color system. The new approach gives Brightness enhancement more than 20% when was applied on different type of images and tested the performance.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
Texts hiding in digital image have recently received quite a bit of attention because it is very... more Texts hiding in digital image have recently received quite a bit of attention because it is very important in invisible communication. This paper presents a new data hiding technique for embedding text data in images represented in HSV color space using (NSCT). The text data is first converted to ASCII format and then represented in binary form and then, added to contourlet coefficients. A high frequency directional pass band from of the contourlet transform is selected for data embedding. Image features like Peak Signal to Noise Ratio (PSNR). The proposed method show that we could successfully embed data in cover_images and extract it with the average embedding capacity of (1/16 ) bits per pixel without any error . High capacity can be achieved using this method according to block size.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
The digital signature verification has become an interesting domain, which is widely needed. The... more The digital signature verification has become an interesting domain, which is widely needed. The usage of online and offline digital signatures has been spreaded worldwide due to the increase of use of bank transactions and user authentication and other similar activities. This requires the creation and the diversification of new online and offline signature verification methods. The signature verification methods contain both online (or dynamic) and offline (or static) signature verification methods. In this paper, an offline digital signature verification technique is proposed, that depends on extracting several features from the signatures to be used during simulation. Some signatures were used for training and others were used for testing only. Different methods such as, vectors manipulation, ensemble classification using boosted trees, and bagged trees, were used in this paper during simulation to obtain results.
International Journal of Computer Networks and Communications Security , Sep 30, 2013
Changes in the Internet, World Wide Web technologies and services lead to new developments in the... more Changes in the Internet, World Wide Web technologies and services lead to new developments in the way of E-Government efforts to provide better services to citizens and businesses due to governments handles their internal operations. One of the revolutionary developments comes from adoption of wireless technologies in government related activities. E-Governance is an influential tool for bringing challenges to the government process in the developing world. Mainly, E-Governance operates at the cross roads between information and communication Technology (ICT) and Government Processes (GP). An effective E-Governance model is that systematically applied to a specific healthcare industry sector. As E-Governance is involved in global technology transfers data from the original project context into a different socio-cultural environment. The Health Services to the public is a collaborative program between the clinical medical programs and the Department of Health Systems; Management & Policy at the Public Health System and Health Educational System are an interdisciplinary program that evaluates organization, delivery and reimbursement in health care to public. It is response to the Government access the information from all sectors and will give them valuable suggestions. The need to collect data about people’s physical, physiological, psychological, cognitive, and behavioral processes in spaces ranging from urban and rural area. In this paper we present the the recent availability of the technologies that enable this data collection, storing, retrieving and security system for the information through wireless sensor networks for healthcare. In this paper, we outline prototype systems spanning application domains from physiological and activity monitoring the urban and rural hospitals and behavioral works and emphasize ongoing treatment challenges to the patient day to day and that information will be available in centrally. Then any moments the higher authorities can able to verify.
Uploads
Volume 1, Issue 1 by Int. j. comput. netw. commun. secur.
Volume 1, Issue 2 by Int. j. comput. netw. commun. secur.
Volume 1, Issue 3 by Int. j. comput. netw. commun. secur.
Volume 1, Issue 4 by Int. j. comput. netw. commun. secur.