International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 5, No. 10, Aug. 2013

Cover page and Table of Contents: PDF (size: 122KB)

Table Of Contents

REGULAR PAPERS

Security Algorithms for Mitigating Selfish and Shared Root Node Attacks in MANETs

By J.Sengathir R.Manoharan

DOI: https://doi.org/10.5815/ijcnis.2013.10.01, Pub. Date: 8 Aug. 2013

Mobile ad hoc network is a type of self configurable, dynamic wireless network in which all the mobile devices are connected to one another without any centralised infrastructure. Since, the network topology of MANETs changes rapidly. It is vulnerable to routing attacks than any other infrastructure based wireless and wired networks. Hence, providing security to this infrastructure-less network is a major issue. This paper investigates on the security mechanisms that are proposed for Selfish node attack, Shared root node attack and the Control packet attack in MANETs with the aid of a well known multicast routing protocol namely Multicast Ad hoc On Demand Distance Vector (MAODV). The security solutions proposed for each of the above mentioned attacks are evaluated with the help of three evaluation parameters namely packet delivery ratio, control overhead and total overhead. The algorithmic solutions thus obtained are analysed in the simulation environment by using ns-2 simulator.

[...] Read more.
Performance Evaluation of Routing Protocols in Vehicular Networks

By Ameur BENNAOUI Mustapha GUEZOURI Mokhtar KECHE

DOI: https://doi.org/10.5815/ijcnis.2013.10.02, Pub. Date: 8 Aug. 2013

Vehicular Ad hoc Networks is promising research area to improve traffic safety by developing an intelligent inter-vehicle communication system. Routing of data in a vehicular ad hoc network is a challenging task due to the high dynamics of such a network. This paper presents a performance study of routing protocols in various network environment (Urban, Highway) based on metrics such as throughput, packet delivery ratio and average end-to-end delay. For the implementation purpose we have used network simulator-2 (NS-2) and VanetMobisim.

[...] Read more.
Dynamic Model on the Transmission of Malicious Codes in Network

By Bimal Kumar Mishra Apeksha Prajapati

DOI: https://doi.org/10.5815/ijcnis.2013.10.03, Pub. Date: 8 Aug. 2013

This paper introduces differential susceptible e-epidemic model S_i IR (susceptible class-1 for virus (S1) - susceptible class-2 for worms (S2) -susceptible class-3 for Trojan horse (S3) – infectious (I) – recovered (R)) for the transmission of malicious codes in a computer network. We derive the formula for reproduction number (R0) to study the spread of malicious codes in computer network. We show that the Infectious free equilibrium is globally asymptotically stable and endemic equilibrium is locally asymptotically sable when reproduction number is less than one. Also an analysis has been made on the effect of antivirus software in the infectious nodes. Numerical methods are employed to solve and simulate the system of equations developed.

[...] Read more.
Performance Improvement of Cache Management In Cluster Based MANET

By Abdulaziz Zam N. Movahedinia

DOI: https://doi.org/10.5815/ijcnis.2013.10.04, Pub. Date: 8 Aug. 2013

Caching is one of the most effective techniques used to improve the data access performance in wireless networks. Accessing data from a remote server imposes high latency and power consumption through forwarding nodes that guide the requests to the server and send data back to the clients. In addition, accessing data may be unreliable or even impossible due to erroneous wireless links and frequently disconnections. Due to the nature of MANET and its high frequent topology changes, and also small cache size and constrained power supply in mobile nodes, the management of the cache would be a challenge. To maintain the MANET’s stability and scalability, clustering is considered as an effective approach. In this paper an efficient cache management method is proposed for the Cluster Based Mobile Ad-hoc NETwork (C-B-MANET). The performance of the method is evaluated in terms of packet delivery ratio, latency and overhead metrics.

[...] Read more.
Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

By Zeinab Latifi Kamal Jamshidi Ali Bohlooli

DOI: https://doi.org/10.5815/ijcnis.2013.10.05, Pub. Date: 8 Aug. 2013

Capturing is the first step in intrusion detection system (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not met, packet capture system is considered as the main bottleneck of IDS and the overall efficiency of this system will be influenced. Presence of all these three characteristics calls for utilization of hardware methods. In this paper, by using of FPGA, a line sniffing and load balancing system are designed in order to be applied in IDS systems. The main contribution of our work is the feasibility of attaching labels to the beginning part of each packet, aiming at quick easy access of other IDS modules to information of each packet and also reducing workload of these modules. Packet classification in the proposed system can be configured to 2, 3, and 5 tuple, which can also be applied in IDS detection module in addition to load balancing part of this system. Load balancing module uses Hash table and its Hash function has the least flows collisions. This system is implemented on a set of virtex 6 and 7 families and is able to capture packets 100% and perform the above mentioned processes by speed of 12 Gbit/s.

[...] Read more.
KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

By Janailin Warjri E. George Dharma Prakash Raj

DOI: https://doi.org/10.5815/ijcnis.2013.10.06, Pub. Date: 8 Aug. 2013

Exchange of data over the internet is increasing day by day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence Cryptography plays a vital role in providing security. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric Key uses same or single key for encryption and decryption whereas Asymmetric Key uses separate keys for encryption and decryption. The most commonly used are the Symmetric Key algorithms. The strength of these algorithms is based on the difficulty to break the original messages. In this paper, a new Symmetric Key algorithm called as KED (Key Encryption Decryption) using modulo69 is proposed. Here not only alphabets and numbers are used, but special characters have also been included. Two keys are used in which one is a natural number which is relatively prime to 69 and finding the inverse modulo69 of it and the other key is a random number generated by the proposed key generation method. The proposed algorithm is used for Encryption and Decryption.

[...] Read more.
Biometric based Security Solutions for MANET: A Review

By Ajay Jangra Shivi Goel

DOI: https://doi.org/10.5815/ijcnis.2013.10.07, Pub. Date: 8 Aug. 2013

Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in which biometrics with cryptography or intrusion detection has gained a momentum in recent years. This paper critically reviews and investigates the present biometric based security models works for MANETs, and along with security challenges and direction of further research are proposed.

[...] Read more.
Intelligent Routing using Ant Algorithms for Wireless Ad Hoc Networks

By S. Menaka M.K. Jayanthi

DOI: https://doi.org/10.5815/ijcnis.2013.10.08, Pub. Date: 8 Aug. 2013

Wireless network is one of the niche areas and has been a growing interest owing to their ability to control the physical environment even from remote locations. Intelligent routing, bandwidth allocation and power control techniques are the known critical factors for this network communication. It is customary to find a feasible path between the communication end point which is a challenging task in this type of network. The present study proposes an Ant Mobility Model (AMM), an on-demand, multi-path routing algorithm that exercises power control and coordinate the nodes to communicate with one another in wireless network. The main goal of this protocol is to reduce the overhead, congestion, and stagnation, while increasing the throughput of the network. It can be realized from the simulation results that AMM proves to be a promising solution for the mobility pattern in wireless networks like MANETs.

[...] Read more.