International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 7, No. 4, Mar. 2015

Cover page and Table of Contents: PDF (size: 113KB)

Table Of Contents

REGULAR PAPERS

Server-Side Encrypting and Digital Signature Platform with Biometric Authorization

By Leszek Siwik Lukasz Mozgowoj

DOI: https://doi.org/10.5815/ijcnis.2015.04.01, Pub. Date: 8 Mar. 2015

The most important shortcomings of solutions based on public key infrastructure and digital signatures are: costs, ambiguous laws, and nuisance of daily use.
The purpose of this article is to discuss the motivation and benefits, as well as a presentation of concepts, high-level architecture, and demonstration of the operation of bioPKI; i.e., a server-side encryption and digital signature platform with biometric authorization. The usefulness of even the most advanced platform of any type is negligible if convenient and easy-to-implement mechanisms are not provided to integrate this solution with external systems and applications. Thus, the possibility of integrating the bioPKI platform with applications and systems supporting PKCS#11 or CryptoAPI CSP is discussed.

[...] Read more.
Innovative Method for Enhancing Key Generation and Management in the AES-Algorithm

By Omer K. Jasim Mohammad Safia Abbas El-Sayed M. El-Horbaty Abdel-Badeeh M.Salem

DOI: https://doi.org/10.5815/ijcnis.2015.04.02, Pub. Date: 8 Mar. 2015

With the extraordinary maturity of data exchange in network environments and increasing the attackers capabilities, information security has become the most important process for data storage and communication. In order to provide such information security the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a development of the advanced encryption standard (AES) algorithm, which is considered as the most eminent symmetric encryption algorithm. The development focuses on the generation of the integration between the developed AES based S-Boxes, and the specific selected secret key generated from the quantum key distribution.

[...] Read more.
DNS Pharming through PHP Injection: Attack Scenario and Investigation

By Divya Rishi Sahu Deepak Singh Tomar

DOI: https://doi.org/10.5815/ijcnis.2015.04.03, Pub. Date: 8 Mar. 2015

With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are designed through PHP. It has used as a core script in Web Content Management System (WCMS), such as Joomla, WordPress, Drupal, SilverStripe etc. PHP has also security flaws due to the certain vulnerabilities such as PHP injection, remote file inclusion and unauthorized file creation. PHP injection is a variant of code injection attacks in which PHP script may be exploited to execute remote commands. The contribution of this paper is twofold: First, it presents a unifying view of PHP injection vulnerability, which causes alteration in the ‘hosts file’; Second, It introduces an investigation process against alteration in ‘hosts file’ through PHP injection. This attack has been introduced as a type of DNS pharming. In this investigation process a chain of evidence has been created and an algebraic signature has been developed to detect explained attack.

[...] Read more.
Microcontroller Based Home Security and Load Controlling Using Gsm Technology

By Mustafijur Rahman A.H.M Zadidul Karim Sultanur Nyeem Faisal Khan Golam Matin

DOI: https://doi.org/10.5815/ijcnis.2015.04.04, Pub. Date: 8 Mar. 2015

“Home automation” referred to as ‘Intelligent home’ or ‘automated home’, indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detection and lock system etc. Furthermore it has advanced security compared to other houses and can send a message to the user for action that occur inside his/her house while he/she is away from home. It can also allow a person to control appliances from a remote location by mobile phone using GSM technology.

[...] Read more.
Object Authentication Using RFID Technology: A Multi-tag Approach

By Subhasish Dhal Indranil Sen Gupta

DOI: https://doi.org/10.5815/ijcnis.2015.04.06, Pub. Date: 8 Mar. 2015

Authentication is an important requirement in various applications to restrict the non-legitimate access to certain resources. Radio Frequency Identification (RFID) technology helps to perform the authentication task. The detection probability of an object during the authentication process can be increased using multiple number of RFID tags in the object. However, many security risks such as eavesdropping, location privacy etc. are involved in this technology. This paper proposes a secure and lightweight authentication scheme assuming the objects are attached with multiple number of RFID tags. Proper analysis has been carried out to evaluate the security of the proposed scheme, including comparison with a few existing schemes in terms of computation, communication and storage requirements.

[...] Read more.
Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks

By Sohel Rana Ali Newaz Bahar Nazrul Islam Johirul Islam

DOI: https://doi.org/10.5815/ijcnis.2015.04.07, Pub. Date: 8 Mar. 2015

The Wireless Sensor Network (WSN) is made up with small batteries powered sensor devices with lim-ited energy resources within it. These sensor nodes are used to monitor physical or environmental conditions and to pass their data through the wireless network to the main location. One of the crucial issues in wireless sensor network is to create a more energy efficient system. Clustering is one kind of mechanism in Wireless Sensor Networks to prolong the network lifetime and to reduce network energy consumption. In this paper, we propose a new routing protocol called Fuzzy Based Energy Effi-cient Multiple Cluster Head Selection Routing Protocol (FEMCHRP) for Wireless Sensor Network. The routing process involves the Clustering of nodes and the selection of Cluster Head (CH) nodes of these clusters which sends all the information to the Cluster Head Leader (CHL). After that, the cluster head leaders send aggregated data to the Base Station (BS). The selection of cluster heads and cluster head leaders is performed by using fuzzy logic and the data transmission process is performed by shortest energy path which is selected applying Dijkstra Algorithm. The simulation results of this research are compared with other protocols BCDCP, CELRP and ECHERP to evaluate the performance of the proposed routing protocol. The evaluation concludes that the proposed routing protocol is better in prolonging network lifetime and balancing energy consumption.

[...] Read more.
A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator

By Rakesh Kumar Jha Pooja Kharga

DOI: https://doi.org/10.5815/ijcnis.2015.04.08, Pub. Date: 8 Mar. 2015

Due to frequent topology changes and routing overhead, selection of routing protocol in Mobile Ad-hoc Network (MANET) is a great challenge. A design issue for an efficient and effective routing protocol is to achieve optimum values of performance parameters under network scenarios. There are various routing protocols available for MANET. This paper involves study of four routing protocols (Ad-hoc On Demand Distance Vector Routing, Optimized Link State Routing, Dynamic Source Routing and Distance Sequenced Distance Vector), and performance comparisons between these routing protocols on the basis of performance metrics (throughput, packet delivery ratio, Packet dropped, jitter and end to end delay measured after simulation of network) with the help of NS3 Simulator.

[...] Read more.