

A Fault Tolerant Approach for WSN Chain Based Routing Protocols |
Pages: 27-32 (6) | [Full Text] PDF (613 KB) |
A Jalili, S Homayoun, M Keshtgary |
PhD Student in IT, School of Computer Engineering & IT, Shiraz University of Technology, IranAssistant Professor, School of Computer Engineering & IT, Shiraz University of Technology, Iran |
Abstract - Wireless Sensor Networks (WSNs) have been applied in variety of industrial, medical and military applications. There are many routing protocols proposed for WSNs to deal with challenges such as energy depletion and latency of data transmission from nodes to base station. Recently, researchers have focused on Chain-based protocols. CCBRP (Chain-Chain Based Routing Protocol) tries to decrease both energy consumption and latency time, but it has some challenges such as randomness in choosing of chain leaders and not supporting of any fault tolerant mechanism. Due to energy depletion and mobility of nodes, nodes failure is unavoidable in WSNs. However, few protocols considered fault tolerant mechanisms while fault tolerant routing is a critical task in WSNs in dynamic environments to improve network reliability. In this paper, we aim to employ fault tolerant mechanism in CCBRP. We propose an approach to prevent early failures of chains in wireless sensor grid networks. The approach is modeled by Markov chain and the results show more reliability for our approach than simple CCBRP. |
Index Terms - WSNs, CCBRP Routing Protocol, Fault Tolerant Systems, Markov Chain |
C itation - A Jalili, S Homayoun, M Keshtgary. "A Fault Tolerant Approach for WSN Chain Based Routing Protocols." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 27-32. |
Network Forensics: Detection and Analysis of Stealth Port Scanning Attack |
Pages: 33-42 (10) | [Full Text] PDF (802 KB) |
RR Singh, DS Tomar |
Maulana Azad National Institute of Technology, Bhopal, India |
Abstract - Network administrator performs port scanning for the purpose of network monitoring and troubleshooting on the other hand this facility become vulnerability when attacker performs port scanning for probing networks, searching for vulnerabilities and then infiltrate IT assets. It is often a primarily tactic that is adopted by attacker prior to launching a targeted cyber-attack. Moreover in recent times, port scanning techniques become highly distributed, composite, hybrid, and stealthy, therefore almost all current detection techniques are unfeasible. Stealth is considered to be a type of port scan which is undetected by available auditing tools such as firewall, routes, filters etc. A stealth port scan method does not produce any TCP sessions; hence, none of these scans should appear in any of the application logs. Therefore, it is of vital importance to research and adopt methods for the detection and attribution of stealth port scanning attack. In this work a network forensic architecture for detection and analysis of stealth port Scanning attack is proposed. It consist of two main modules, a capturing module that captures fine grained evidences from the network traffic and an analysis module that classifies each packet based on the predefined signature. A proof of concept prototype is implemented which utilize, operational network traffic data injected with crafted scans to test the system. It is reported that the proposed system correctly identifies crafted scans injected into real traffic. |
Index Terms - Network forensic, Network Scanning, Port scan, NIDS, Snort |
C itation - RR Singh, DS Tomar. "Network Forensics: Detection and Analysis of Stealth Port Scanning Attack." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 33-42. |
Utilization of ECDLP for Constructing a New Certificate Based Digital Signature |
Pages: 33-42 (7) | [Full Text] PDF (282 KB) |
L Abedi-Ostad, M Nikooghadam |
Department of Computer Engineering, University of Imam Reza, Mashhad 91735-553, Iran |
Abstract - Digital signatures that are used to achieve the integrity along with the authentication could be classified into various types. PKI based, ID based, certificate based and certificateless digital signatures are the most important types. Regarding advantages of certificate-based signatures (CBS), we want to propose a CBS scheme by means of employing elliptic curve discrete logarithm problem (ECDLP).The proposed schemes security is proven under the elliptic curve discrete logarithm assumption in the random oracle model. Results of comparing our scheme with existing pairing-free certificate-based signature schemes, shows that ours has much lower computational cost. |
Index Terms - Elliptic Curve Discrete Logarithm Problem, Certificate-Based Digital Signature, Random Oracle Model, Pairing-Free, Elliptic Curve Cryptography |
C itation - L Abedi-Ostad, M Nikooghadam. "Utilization of ECDLP for Constructing a New Certificate Based Digital Signature." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 33-42. |
New Encryption Algorithm Based on Network RFWKIDEA8-1 Using Transformation of AES Encryption Algorithm |
Pages: 43-47 (5) | [Full Text] PDF (387 KB) |
G TUYCHIEV |
National University of Uzbekistan, Republic of Uzbekistan, Tashkent |
Abstract - In this article we developed a new block encryption algorithm based on network RFWKIDEA8-1 using of the transformations of the encryption algorithm AES, which is called AES- RFWKIDEA8-1. The blocks length of this encryption algorithm is 256 bits; the numbers of rounds are 10, 12 and 14. The advantages of the encryption algorithm AES- RFWKIDEA8-1 are that, when encryption and decryption process used the same algorithm. In addition, the AES-RFWKIDEA8-1 encryption algorithm encrypts faster than AES. |
Index Terms - Advanced Encryption Standard, Feystel Network, Lai–Massey Scheme, Round Function, Round keys, Output Transformation, Multiplicative Inverse, Additive Inverse |
C itation - G TUYCHIEV. "New Encryption Algorithm Based on Network RFWKIDEA8-1 Using Transformation of AES Encryption Algorithm." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 43-47. |
The Impact of QoS Changes towards Network Performance |
Pages: 48-53 (6) | [Full Text] PDF (370 KB) |
W SUGENG, JE ISTIYANTO, K MUSTOFA, A ASHARI |
Itenas, Informatics Engineering Department, BANDUNG, INDONESIAUGM, Computer Science Program, YOGYAKARTA, INDONESIA |
Abstract - Degrading or declining network performance in an installed computer network system is the most undesirable condition. There are several factors contribute to the decline of network performance, which their indications can be observed from quality changes in Quality of Service (QoS) parameters measurement result. This research proposes recommendations in improving network performance towards the changes of QoS parameters quality. |
Index Terms - Network Performance, Quality Parameters, QoS Changes, Network Recommendation |
C itation - W SUGENG, JE ISTIYANTO, K MUSTOFA, A ASHARI. "The Impact of QoS Changes towards Network Performance." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 48-53. |
Introduction to the Optical Communications by Simulating an Optical High Debit Transmission Chain Using OptiSystem with Comparison of Optical Windows |
Pages: 53-62 (10) | [Full Text] PDF (1.38 MB) |
A BOUDKHIL, A OUZZANI, B SOUDINI |
Dept. of Electronics, Faculty of Technology, University of Sidi Bel abbes, Sidi Bel Abbes, ALGERIADept. of Electronics, Faculty of Technology, University of Saida, Saida, ALGERIA |
Abstract - This article proposes a global study of an optical high debit chain presenting a complete simulation by comparing between the tree optical windows of telecommunications, led as an experience for teaching optical communications which are currently characterized by a grand demand for their exceptional transmission quality offering high debit, long distance of propagation and strong immunity against noise. The aim of this work extends to introduce the concepts and advantages provided by optical transmission systems using optical fiber, to observe and analyze the various limitations introduced in such systems and also to justify the choice of the optical window according to the use. |
Index Terms - Optical Communication, Laser Diode, Optical Fiber, PIN Photodiode, Optical Windows |
C itation - A BOUDKHIL, A OUZZANI, B SOUDINI. "Introduction to the Optical Communications by Simulating an Optical High Debit Transmission Chain Using OptiSystem with Comparison of Optical Windows." International Journal of Computer Networks and Communications Security 3, no. 2 (2015): 53-62. |