International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 10, No. 6, Jun. 2018

Cover page and Table of Contents: PDF (size: 172KB)

Table Of Contents

REGULAR PAPERS

Ensure Symmetrical Traffic Flow, to prevent the Dropping of Response Packet by the Firewall, on the Active-Active Data Centers

By Irwan Piesessa Benfano Soewito

DOI: https://doi.org/10.5815/ijcnis.2018.06.01, Pub. Date: 8 Jun. 2018

This paper illustrates the problem in the Active-Active Data Centers of an organization, where response traffic from the destination server is dropped by the firewall because the initial traffic from the client departs from another firewall in different Data Center (asymmetric traffic). This problem can be solved by two proposed solutions, namely the implementation of the BGP Community attributes and OSPF over GRE tunnel. The case study also compares both proposed solutions in terms of recovery time, packet loss, ICMP response time and TCP three-way handshake time for HTTP connection.

[...] Read more.
Improving the Performance of Fuzzy Minimum Spanning Tree based Routing Process through P-Node Fuzzy Multicasting Approach in MANET

By Soham Bandyopadhyay Sunil Karforma

DOI: https://doi.org/10.5815/ijcnis.2018.06.02, Pub. Date: 8 Jun. 2018

Mobile Ad-hoc Network (MANET) is mostly decentralized and self-adjustable network system. It is significant to optimize the overall network energy utilization and improve packet sending performance by reducing the errors, generated due to different real-life environmental effects. In this paper, considering atmospheric, environmental change and varying distance for topological change, we try to generate the routing cost. By introducing m-minimum (membership value as m) triangular fuzzy number at interval based cost and energy of the network, we try to handle the uncertain environment. Here we generate both fuzzy minimum spanning tree (FMST) for a given n- nodes network and p-node fuzzy multicast minimum spanning tree (pFMMST), in fuzzy interval based format. Applying the fuzzy credibility distribution we modify the network routing cost and energy utilization for both FMST and pFMMST. Comparing the routing cost and residual energy for FMST and pFMMST of MANET, it is concluded that, pFMMST is better FMST based packet routing approach, with minimum routing cost, optimized total energy utilization and best possible technique to reduce the error which is generated due to the deviation of interval of upper and lower limit data in route cost and residual energy.

[...] Read more.
Efficient Multimedia Transmission over Scalable IoT Architecture

By Vasileios A. Memos

DOI: https://doi.org/10.5815/ijcnis.2018.06.03, Pub. Date: 8 Jun. 2018

Today the new technology concept, called “Internet of Things” (IoT), presents a significant field of research, due to the fact that it promises many advantages to the users worldwide. Besides this, multimedia file streaming tends to be a daily user habit, as a result of the evolution of the internet and the capabilities of devices, such as mobile phones and computers. This tendency has established Cloud Computing (CC) as a vital technology due to the fact that it reduces economic costs, improves accessibility and flexibility, while it increases the total network performance too. This paper demonstrates a new technological approach for IoT architecture, where a layered implementation with the use of many cloud servers can offer optimized streaming and download, because of the significant reduction of the transfer time costs and the storage space of the Main Cloud Server (MCS). Moreover, users will have the ability to choose or adapt to their devices’ restrictions, between low - up to - Ultra-High Definition (UHD) quality for multimedia access and downloading, thanks to a new quality scalability feature which is introduced and is based on the new High-Efficiency Video Coding (HEVC) compression standard. Experimental results show the efficiency of the proposed approach with math formulas and graphs.

[...] Read more.
Alleviating Malicious Insider Attacks in MANET using a Multipath On-demand Security Mechanism

By Mir Shahnawaz Ahmad

DOI: https://doi.org/10.5815/ijcnis.2018.06.04, Pub. Date: 8 Jun. 2018

MANET is a family of ad hoc networks that spans a huge spectrum of other networking paradigms such as WMN, WSN, and VANET etc. There is a dire need for strengthening the base of all these networks from the security point of view. The vulnerability of MANET towards the attacks is huge as compared to its wired counterparts. MANETs are vulnerable to attacks because of the unique characteristics which they exhibit like the absence of central authority, usage of wireless links, dynamism in topology, shared media, constrained resources, etc. The ramification being that the security needs of MANETs become absolutely different than the ones which exist in the customary networks. One of the basal vulnerabilities of MANETs comes from their peer to peer architecture which is completely open wherein the mobile nodes act as routers, the medium of communication is open making it reachable to both the legitimate users of the network as well as the malicious nodes. Consequently, there is a bankruptcy of clear line of defense from the perspective of security design. This in turn implies that any node which may even be authentic can enter the network and affect its performance by dropping the packets instead of forwarding them. The occurrences of the attacks of this type in ad hoc networks result in the situation where even the standard routing protocols do not provide the required security. The proposed solutions in literature such as SAODV, ARAN, and SEAODV all provide authentication and encryption based solutions to these attacks. But, the attack on availability which is the most common and easiest of them all cannot be avoided by the authentication and encryption because even the authentic user can be the attacker. Also, the encryption cannot be helpful to prevent such attacks. Therefore, in such a situation if a proper solution is not provided the entire MANET operation will get crippled. The main aim of this paper is to guarantee a security solution which provides defense against these attacks. To achieve this, a Multipath On-demand security Mechanism, called Secure Multipath Ad hoc On-demand Distance vector routing protocol (SMAODV), is presented which eliminates the malicious nodes from the network thereby preventing MANETs from the effects of such malicious nodes.

[...] Read more.
A Combined TCP-friendly Rate control with WFQ Approach for Congestion Control for MANET

By Y. Narasimha Reddy P V S. Srinivas

DOI: https://doi.org/10.5815/ijcnis.2018.06.05, Pub. Date: 8 Jun. 2018

Congestion control techniques are extensively used to avoid congestion over the wireless network. But these techniques are incapability of to handle the increased utilization of the various application which raising high congestion and packet loss over the network and causing inconvenient to different services. The TCP-friendly rate control (TFRC) protocol is primarily considered to describe the effective and finest potential provision for such applications which is following it preeminent in the wired and wireless environment. But it also suffers due to slow start and time-consuming process which required several round-trip-time (RTT) to reach an optimal level of the communication rate. As the TRFC transmission rate is highly affected by the increase RTTs and this results in an raise in the packet loss and a corresponding significant decrease in the throughput. In this paper, we propose an integrated TFRC with weighted fair queue (WFQ) approach to overcoming the congestion and minimize the RTTs. The WFQ mechanism manages the incoming heavy traffic to ease the data rate control for smooth data flow to improve throughput. The simulation evaluation of the approach shows an improvisation in throughput with the low delay in different data flow conditions.

[...] Read more.
Analysis of CRT-based Watermarking Technique for Authentication of Multimedia Content

By Turker Tuncer

DOI: https://doi.org/10.5815/ijcnis.2018.06.06, Pub. Date: 8 Jun. 2018

Watermarking techniques are widely used for image authentication and copyright protection. Weaknesses of the “A novel CRT-based watermarking technique for authentication of multimedia contents,” [12] are analyzed in this study. 4 attacks are proposed to analysis of this method. These attacks are most significant bits, modulo number, tamper detection probability calculation and algorithm analysis attacks. The proposed attacks clearly show that the crt-based method is a data hiding method but this method is not used as image authentication method. The title of presented method in Ref. [12] include “authentication” but the authors of Ref. [12] evaluated their method in view of copyright protection. The fragile watermarking methods for image authentication should consist of watermark generation, watermark embedding, watermark extraction and tamper detection but Ref. [12] has no watermark generation, tamper detection and tampered area localization algorithms. The proposed attacks are demonstrated that Ref. [12] cannot be utilized as an image authentication method and Ref. [12] is not effectively coded.

[...] Read more.
Real Time Universal Scalable Wireless Sensor Network for Environmental Monitoring Application

By Idakwo Monday Abutu Umoh J. Imeh Tekanyi M.S Abdoulie Adedokun E. Adewale Muazu M. Bashir

DOI: https://doi.org/10.5815/ijcnis.2018.06.07, Pub. Date: 8 Jun. 2018

There are several wireless sensor network use for environmental monitoring applications. However, most wireless sensor network designed for real time environmental monitoring application are application specific and static in nature. Hence, the need for reprogramming of base station for every change in sensor type or the introduction of new sensor node into the network. More so, since these sensors nodes are deploy by end users in a random region of interest, it is necessary to develop a new plug and play mechanisms with more software modules and more user-friendly interface that is scalable to ease larger area deployment, installation and maintenance. Hence, this paper developed a base station with an auto detection and configuration system for detecting new sensor node, faulty nodes, and update user in real time. The developed system is implemented on a mesh topology network and was calibrated using standard Davis vantage pro2 weather station in Ahmadu Bello University Liquefied Natural Gas Environmental Laboratory and a mean error of 0.12 and root mean square error of 0.14 were obtained.

[...] Read more.