IJCNIS Vol. 12, No. 1, Feb. 2020
Cover page and Table of Contents: PDF (size: 175KB)
REGULAR PAPERS
The development of technology and uses increases the interconnected digital ecosystem. This is accompanied by dense data usage. Wherever digital data is available, cyber-attacks are threatened and increase the need for cybersecurity prevention. The fact that Industry 4.0 basic fuel is data indicates that the risk of cyber-attack will continue to increase in Industry 4.0. In this study, the sources of cybersecurity threats in the Industry 4.0 ecosystem are examined in the corporate and end-user dimensions. The cybersecurity vulnerabilities most evident in Industry 4.0 systems have been determined to consist of vulnerabilities in control systems protocols, unprotected thing connections, neglect of periodic infiltration tests, inability to manage network devices effectively and untrained personnel. The cyber defense strategies and requirements for these vulnerabilities have been determined. At the same time, corporates and end-users have been told how to implement these preventions. As a result, it is not possible to completely prevent cyber-attacks within the Industry 4.0 ecosystem. Preventing the vulnerabilities identified in the study will ensure that the damage is minimal in attacks.
[...] Read more.Mobile ad hoc networks (MANETs) have become the prominent set of wireless ad hoc networks with their distinctive characteristics, and ranging several fields of applications. In these networks, the nodes are mobile devices, changing their positions with time, resulting in dynamic topologies of the network. These dynamic environments make the routing of data packets from the source to the destination through multi hoping a difficult task. With the growing popularity of sophisticated mobile devices, the demand for multimedia traffic in such networks is also increasing. Henceforth, to ensure the quality of service (QoS) for multimedia traffic over MANETs has turn into further challenging. This paper focuses on the assessment of built-in QoS support of Ad hoc On-demand Distance Vector (AODV), and its multicast extension MAODV for multimedia traffic (a combination of audio and video) over the mobile ad hoc environment. The work is carried out to measure the achievable QoS metrics like packet delivery ratio, latency, and jitter.
[...] Read more.Android is the most popular operating system in the world, with numerous applications having been developed for the platform since its inception, however, it has its fair share of security issues. Despite security precautions taken by developers and the system itself when it comes to permission delegation for applications, privilege escalation attacks are still possible up till Android API level 25. Unfortunately, many existing detection and prevention solutions fall short of the standard necessary or are taxing in resources not found on most Android devices. Proof is shown that a custom created malicious application can elevate its privileges, beyond the permissions it was given, in the existing Android system. In this paper, a modification to the existing Android framework is proposed, one that can detect inter-component communication messages between malicious apps attempting to elevate their privileges and benign applications. Part of this framework is the ability for the user to decide if permissions should be elevated, allowing them some measure of control. The results of the experimental evaluation demonstrate that the solution proposed is effective in preventing privilege escalation attacks on Android API level 24.
[...] Read more.The need for much better data rate in support for the applications having the high speed has gathered the attention to the development of Free space Optical communication technology (FSO). But the widespread usage of this technology is restrained by the several ill effects caused by the atmosphere on the propagation of optical signals. In order to mitigate such problems in the FSO communication, relay assistance has been employed and this serves the alternative to the spatial diversity. Free space optical (FSO) communication is a cost-effective and high bandwidth access technique, which has been receiving attention to recent commercialization successes. FSO get affected by the weather turbulence and it leads to severe problems in the transmission channels. In this paper, we proposed the Centralized Relay selection and Optical Filtering (CROF) for processing the signals in the FSO system which overcomes the environmental challenges. Initially, an effective relay is selected with the centralized switch and stay algorithm. This algorithm selects suitable relay for serial path transmission. Here, the serial path is considered for signal transmission in a free path and the distributed Greedy algorithm with serial transmission is utilized to obtain more information. Then atmospheric turbulence induced scintillation noise presented at the signal is eliminated through modified Kalman filtering. Finally, the performance of the proposed FSO system is evaluated in MATLAB simulation platform and these evaluations are analyzed for different atmospheric conditions like fog, haze, rain and clear weather. The performance evaluation shows that the proposed algorithm outperforms the non-cooperative scheme and an existing relay selection protocol and reliable communication with improved SNR and BER is achieved.
[...] Read more.In this paper, we analyzed VoIP data rates to minimize the bandwidth efficiently as per user demand and reduced the budget cost before implementing VoIP service at any wired and wireless network. To accomplish these results different clock rates were used to assign bandwidth administratively, CODEC schemes (G.711 and G.729) to minimized data rates and QoS (Quality of Service) such as CBWFQ and 802.11e to sustain the voice quality in congestion over the wired and wireless networks. PRTG Grapher and LAN Traffic Generator software were used to monitor a bandwidth and create congestion artificially between the link of communicating two setup LANs wired and wireless.
[...] Read more.