International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 11, No. 7, Jul. 2019

Cover page and Table of Contents: PDF (size: 174KB)

Table Of Contents

REGULAR PAPERS

Performance Evaluation of MAC Protocols with Multi-Sink for Mobile UWSNs

By Areeg Fahad Rasheed A E Abdelkareem

DOI: https://doi.org/10.5815/ijcnis.2019.07.01, Pub. Date: 8 Jul. 2019

Currently, Underwater Wireless Sensor Network (UWSN) is one of modern science and have attached many researchers especially how interesting with Wireless Sensor Network (WSN). A mobile node in UWSN is one of the powerful mechanisms, it can be used for many aquatic applications such as Surveillance for wildlife, Pollution control, Military applications, etc. UWSN is different from the terrestrial network in terms of using acoustic waves as a communication medium. Due limitation of bandwidth, high latency, and long propagation delay of acoustic waves, many proper MAC protocols that work efficiently in Static UWSN are not suitable for the mobile network. In this article two MAC protocols appropriate for mobile underwater network Broadcast as Direct access and geo-routing aware MAC protocol (GOAL) as Handshaking are evaluated, in both static and mobile nodes with respect to throughput, energy consumption, and delay. Then the effect of using Multi-Sink on the performance is shown, the evaluation is done based on AquaSim simulator, Aqua3D Animator, and AWK programming language have been used to extract the results. As a result, the performance has been improved by using multi-Sink with two types of MAC address, and for all the metrics.

[...] Read more.
Open Source Intelligence Testing Using the OWASP Version 4 Framework at the Information Gathering Stage (Case Study: X Company)

By I Putu Agus Eka Pratama Anak Agung Bagus Arya Wiradarma

DOI: https://doi.org/10.5815/ijcnis.2019.07.02, Pub. Date: 8 Jul. 2019

The application of technology in various fields makes mobility even higher, one of them is by making a website for exchange and manage information. However, with information disclosure causing security and protection issues to be considered. One of the website security techniques can be done by using the penetration testing method to know the vulnerability of the system. This study will implement tools with the Open Source Intelligence concept, namely Maltego as a medium for conducting security testing and using the OWASP version 4 framework as a standardization of steps taken when security test goes on. This study will focus on information gathering security testing of important factor of the X Company's website. The results of testing and analysis with the OWASP version 4 framework with the Testing for Information Gathering module show that the web application system used by X Company has information vulnerability of the used web server version, GET and POST requests, URL systematics, website framework, website builder component, and the outline of the website architecture. The researcher gave several recommendations related to the vulnerability of the website which later can be used by X Company website administrators to improve website security and protection.

[...] Read more.
An improved DNA Based Security Model using Reduced Cipher Text Technique

By Lalit Mohan Gupta Hitendra Garg Abdus Samad

DOI: https://doi.org/10.5815/ijcnis.2019.07.03, Pub. Date: 8 Jul. 2019

An essential parameter of information security during data transmission is a secure cryptographic system. In this paper a new cryptographic security technique is proposed to secure data from un-authorized access. The proposed system incorporate cryptology technique of encryption inherits the concept of DNA based encryption using a 128-bit key. Besides this key, round key selection technique, random series of DNA based coding and modified DNA based coding are followed by unique method of substitutions. The proposed technique increases size of the cipher text by 33% as compared to conventional DNA and non DNA based algorithms where size of the cipher text becomes almost double of the original file. This reduction in cipher text improves memory utilization along with data security.
The paper is organized in six Sections. Section 1, gives the introduction and also briefly describes related work. In Section 2, the proposed model for solving the problem is described. Various steps involved during encryption and decryption are explained in Section 3, and the results obtained by implementing the proposed algorithm are presented and discussed in Section 4. The Section 5 concludes the work and brief outline of the future work is given in Section 6.

[...] Read more.
Proposing a Method for Enhancing the Reliability of RPL Routing Protocol in the Smart Grid Neighborhood Area Networks

By Hossein Mohammadinejad Fateme Mohammadhoseini

DOI: https://doi.org/10.5815/ijcnis.2019.07.04, Pub. Date: 8 Jul. 2019

The RPL routing protocol is one of the most prominent protocols for low-power wireless networks. It has many benefits, including high flexibility and compatibility with different topologies, quality assurance, automatic configuration, self-healing, avoiding the creation of tree loops, and independence and transparency. Since the RPL's capability to meet the reliability requirements has not been sufficiently investigated and there is not much research about the reliability of this protocol, the purpose of this study is to propose a method for enhancing the reliability of RPL routing protocol in the Smart Grid Neighborhood Area Networks (NAN). We propose three methods for increasing the reliability of the RPL protocol: addition of cache at each node, considering two parents for each node and finally the combination of the two mentioned methods. The type of research is descriptive-analytic. Simulations have been performed in OPNET simulator. The results of this study indicate that the proposed methods significantly increase the reliability of this routing protocol in Smart Grid NAN.

[...] Read more.
Agent Based Trust Establishment between Vehicle in Vehicular Cloud Networks

By Shailaja S. Mudengudi Mahabaleshwar S. Kakkasageri

DOI: https://doi.org/10.5815/ijcnis.2019.07.05, Pub. Date: 8 Jul. 2019

In order to enhance the driving experience with increased security and privacy, a category of MANET has emerged i.e VANET. The nodes are highly mobile, uncoordinated and dynamic in nature. An progressive step in this vision is Vehicular Cloud (VC) the advancement in Intelligent Transport System (ITS).The resources are shared between the vehicle nodes to provide the services at a economical cost. In order to provide them there should be hassle free secure communication link established between the Vehicle nodes, Road side unit (RSU) and the Cloud. Trust establishment in VC between vehicle nodes enhances the security aspects in VC. In this paper we put forth an trust evaluation scheme based on Dempster Shafer theory. The trust evaluation is based on Direct trust and Indirect trust, the priority of which can be accustomed.

[...] Read more.
Ensemble Feature Selection and Classification of Internet Traffic using XGBoost Classifier

By N Manju B S Harish V Prajwal

DOI: https://doi.org/10.5815/ijcnis.2019.07.06, Pub. Date: 8 Jul. 2019

Identification and classification of internet traffic is most important in network management to ensure Quality of Service (QoS). However, existing machine learning models tend to produce unsatisfactory results when applied with imbalanced datasets involving multiple classes. There are two reasons for this: the models have a bias towards classes which have more samples and they also tend to predict only the majority class data as features of the minority class are often treated as noise and therefore ignored. Thus, there is a high probability of misclassification of the minority class compared with the majority class. Therefore, in this paper, we are proposing an ensemble feature selection based on the tree approach and ensemble classification model using XGboost to enhance the performance of classification. The proposed model achieves better classification accuracy compared to other tree based classifiers.

[...] Read more.