International Journal of Computer Networks and Communications Security

Volume 2, Issue 5, May 2014

 

 

 

Secure Wireless Text Message Transmission with the Implementation of RSA Cryptographic Algorithm

Pages: 146-151 (6) | [Full Text] PDF (305 KB)
Md. Ashraful Islam, A. Z. M. Touhidul Islam
Lecturer, Department of ICE, University of Rajshahi, Rajshahi-6205, Bangladesh
Associate Professor, Department of ICE, University of Rajshahi, Rajshahi-6205, Bangladesh

Abstract —
Security is crucial to a wide range of wireless data applications and services. This paper presents a simulation based study of a wireless communication system with the implementation of secured asymmetric RSA cryptographic encryption/decryption algorithm on text message transmission. The system under investigation incorporates 2/3-rated CRC channel coding and QPSK digital modulation over an additive white Gaussian noise (AWGN) channel. For tackling the security problems a text message is first RSA encrypted at the transmitter while it is decrypted at the receiver end and compared for different levels of SNR. The Computer simulation has been performed using Matlab 2009b programming language. The transmitted text message is found to have retrieved effectively at the receiver end under the implementation of RSA cryptographic algorithm. It has also been anticipated that the performance of RSA security based wireless communication system degrades with the increase of noise power.
 
Index Terms — RSA, AWGN, CRC, QPSK, Test Message.

 

 

SCMR: Static Clustering based Multi-hop Routing in Wireless Sensor Network

Pages: 152-157 (6) | [Full Text] PDF (487 KB)
Hamta Sedghani and Mina Zolfy Lighvan
Faculty of electrical and computer engineering, University of Tabriz, Tabriz, Iran

Abstract —
The most challengeable issue in wireless sensor networks is the limited energy of their nodes that are distributed in a field for collecting information from the environment. Thus, energy efficiency and lifetime of these networks consider one of important and controversial issues in this field. In this paper, a new energy effective routing algorithm is presented which is based on static clustering and multi-hop transmission. The SCMR (Static Clustering Based Multi-hop Routing) Algorithm is verified with MATLAB simulator. Simulation results show that the new method compared to previous methods such as LEACH, could balances the energy consumption, thus increase the stable period of network. 
 
Index Terms — Wireless sensor networks, energy efficiency, Static Clustering, Multi-hop Routing, MATLAB.

 

 

A Comparative Analysis on Existing DNS Performance Measurement Mechanisms

Pages: 158-167 (10) | [Full Text] PDF (692 KB)
Ejaz Ahmad and Kashif Sarwar
Ericsson Ltd, Middlesex University, London, United Kingdom
Cyber Age Ltd, London, United Kingdom

Abstract —
DNS maps the complex IP addresses, making it crucial for internet communication for users and applications. DNS, an integral component of internet, is faced with many challenges. Enormous data growth and inherent security weakness demands continuous monitoring and performance measurement of DNS traffic. DNSSEC can improve security at the cost of DNS performance. This tradeoff needs to be evaluated before actual implementation. DNS performance measurement is critical for this evaluation. IPv6 will increase load on DNS exponentially, resulting in greater need for DNS performance evaluation. Despite the critical need for DNS performance measurement, very little research has happened on DNS performance measurement. Most of this little research has been done on client and authoritative layers of DNS. The most vulnerable and functionally important Caching layer performance measurement is hugely under researched. There are some software and hardware techniques available for DNS performance measurement. The software techniques provide burst of unrealistic data for limited time, restricting the scope of performance measurement and evaluation. Hardware data generation systems can be both expensive and inflexible. There is a need for more realistic DNS data traffic which can be used for flexible and cost effective performance measurement over a longer period for thorough evaluation.  
 
Index Terms — DNS Performance Measurement, DNS Traffic generation, DNS Security, DNS Challenges, DNS Growth.

 

 

A Fuzzy Model for Network Intrusion Detection

Pages: 168-172 (5) | [Full Text] PDF (191 KB)
S.Sethuramalingam and Dr.E.R.Naganathan
Associate Professor and Head, Department of CS, Aditanar College, Tiruchendur
Professor and Head, Department of CSE, Hindustan Univesity, Chennai

Abstract —
The network intrusion becomes ever growing problem. The complexity present in the collected network data set is absence of clear boundary between anomaly connection and normal connection. However fuzzy logic can well address this problem. In earlier works, combining fuzzy logic and data mining to develop fuzzy rules are explored to address this problem. In this paper, a new fuzzy model is developed to detect anomaly connections. The developed model is tested with NSLKDD data set. The model gives better result. 
 
Index Terms — Network intrusion ,anomaly detection, fuzzy model, 10-fold cross validation

 

 

The Threat Level Tolerance in the Company of Accounting Information System

Pages: 173-178 (6) | [Full Text] PDF (209 KB)
Dian Indri Purnamasari
Pembangunan Nasional University “Veteran” Yogyakarta-Indonesia

Abstract —
Accounting information system developments that provide benefits in many organizations it also has risks that are not light. How can an organization tolerate the possibility of a threat in the accounting information system will be different with other organizations. This study wanted to know whether there are differences in levels of tolerance to the threat of companies in the accounting information system. With a sample of all companies listing on the Indonesia Stock Exchange (IDX) and the rate of return of 18.8% of respondents, this study provides a statistical conclusion that there is no difference in the level of tolerance to the threat of accounting information system among companies listing on the IDX. This is because companies are listing on the IDX is a company that is ready for the public so that they also prepare all the things associated with information systems, including accounting information system and the maximum fine.  
 
Index Terms — Accounting, System, Information, Threat, Tolerance.

 

 

Packet Sniffer – A Comparative Study

Pages: 179-187 (9) | [Full Text] PDF (699 KB)
Dr. Charu Gandhi, Gaurav Suri, Rishi P. Golyan, Pupul Saxena, Bhavya K. Saxena
Assistant professor, Department of computer science, JIIT, Noida-201307
Student, Department of computer science, JIIT, Noida-201307

Abstract —
Packet Sniffer is a tool which captures all the packets on the network irrespective of the final destination of the packet. Packet Sniffer could be used to monitor the bottlenecks in the network, alarm the irregular behaviour in the network, capture passwords and VoIP from any system in that network. This paper gives a brief introduction of what is a packet sniffer, its structure and what is its working. Then key features of top packet sniffing tools (i.e. Wireshark, TCPdump and Colasoft Capsa) are discussed. Further, the above tools are compared on the basis of characteristic behaviour and quantitative parameters. Finally, one gets the best tool amongst these three in a particular situation. 
 
Index Terms — Packet Sniffer, Wireshark, Colasoft Capsa, TCPdump, Packet capture, Network monitoring tools.