International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 3, No. 1, Feb. 2011

Cover page and Table of Contents: PDF (size: 122KB)

Table Of Contents

REGULAR PAPERS

Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

By Wazir Zada Khan Yang Xiang Mohammed Y Aalsalem Quratulain Arshad

DOI: https://doi.org/10.5815/ijcnis.2011.01.01, Pub. Date: 8 Feb. 2011

Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

[...] Read more.
Application of CL multi-wavelet transform and DCT in Information Hiding Algorithm

By Tao ZHANG Shuai REN

DOI: https://doi.org/10.5815/ijcnis.2011.01.02, Pub. Date: 8 Feb. 2011

Taking advantage of a feature that allows theenergy of an image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub image after first-order CL multi-wavelet transform, and Using the advantage of Discrete Cosine Transform in application of information hiding, propose an Information Hiding scheme based on CL multi-wavelet transform and Discrete Cosine Transform (abbreviated as CL-DCT). LL2 is embedded module of robust parameters (optimized code of Chebyshev scrambling and Hash value of embedding information). Embed hiding Information in LH2 and HL2 with RAID1 and fragile sign in HH2. Select a different range of DCT coefficients in LH2, HL2 and HH2. The embedding sequence of each bit plane is traversal according to Knight-tour rout. Experimental results indicate that the proposed scheme can increase invisibility and robustness separately by 5.24% and 28.33% averagely. In particular, the scheme has better ability against cutting attacks. The scheme has certain ability against steganalysis such as Higher Order Statistics based on wavelet coefficients. Moreover, the scheme has excellent sensitivity of image processing.

[...] Read more.
A Semantic Context-Based Model for Mobile Web Services Access Control

By Haibo Shen Yu Cheng

DOI: https://doi.org/10.5815/ijcnis.2011.01.03, Pub. Date: 8 Feb. 2011

As mobile web services becomes more pervasive, applications based on mobile web services will need flexible access control mechanisms. Unlike traditional approaches based on the identity or role for access control, access decisions for these applications will depend on the combination of the required attributes of users and the contextual information. This paper proposes a semantic context-based access control model (called SCBAC) to be applied in mobile web services environment by combining semantic web technologies with context-based access control mechanism. The proposed model is a context-centric access control solutions, context is the first-class principle that explicitly guides both policy specification and enforcement process. In order to handle context information in the model, this paper proposes a context ontology to represent contextual information and employ it in the inference engine. As well as, this paper specifies access control policies as rules over ontologies representing the concepts introduced in the SCBAC model, and uses semantic web rule language (SWRL) to form policy rule and infer those rules by JESS inference engine. The proposed model can also be applied to context-aware applications.

[...] Read more.
A Method of Hash Join in the DAS Model

By Ma Sha Yang Bo Li Kangshun

DOI: https://doi.org/10.5815/ijcnis.2011.01.04, Pub. Date: 8 Feb. 2011

In the Database As Service(DAS) model, authenticated join processing is more difficult than authenticated range query because the previous approach of authenticated range query, signature on a single relation, can not be used to verify join results directly. In this paper, an authenticated hash join processing algorithm is described in detail, which can take full advantage of database service since most of work is pushed to database service provider. We analyze the performance with respect to cost factors, such as communication cost, server-side cost and client-side cost. Finally, results of experiments validating our approach are also presented.

[...] Read more.
The energy-saving modification program of lighting equipment based on the economic evaluation

By Yuan Yang Wei-hua Li Xin-zheng Zhang Chu-qi Yang Dong Lv Hai-qiang Liao Lin Yang

DOI: https://doi.org/10.5815/ijcnis.2011.01.05, Pub. Date: 8 Feb. 2011

Considering many lighting energy-saving modification programs have the phenomenon of diseconomy; this paper takes into account economic evaluation to solve this problem. The optimal program of total energy-saving benefit will be found under the limited investment according to economic evaluation of the price, life span and power consumption of lighting equipments. Firstly, the benefit ratio will be used to evaluate on the necessity of modification, and get the order. If the biggest benefit ratio exists in different equipments simultaneously, the better one will be selected in terms of relative payback period of investment. And on the basis, the relative remaining time is innovatively introduced into economic evaluation to determine the locations of modification. Then an example from a factory can prove that the program is workable.

[...] Read more.
A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network

By Li MengYang Duan YunNa Zhang ChunFei

DOI: https://doi.org/10.5815/ijcnis.2011.01.06, Pub. Date: 8 Feb. 2011

Merging MPLS into multicast routing protocol in Mobile Ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast Routing Protocol (LSMRP) is presented in this paper.

[...] Read more.
A Model of Workflow-oriented Attributed Based Access Control

By Guoping Zhang Jing Liu

DOI: https://doi.org/10.5815/ijcnis.2011.01.07, Pub. Date: 8 Feb. 2011

The emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC), and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

[...] Read more.
Cross Layer Transmission for AOS Packet Service

By Bi Mingxue

DOI: https://doi.org/10.5815/ijcnis.2011.01.08, Pub. Date: 8 Feb. 2011

In this paper, the AOS packet service data transfers structure is presented first. Based on it, the effective throughput rate of AOS packet service is analyzed. Then, in order to improve the effective throughput rate, a scheme of AOS cross layer transmission system is presented. In the proposed scheme, based on the space channel state, the dynamic optimization parameters of network layer, Space Date Link Protocol sublayer and Sync and Channel Coding sublayer in AOS are selected. Then the switch thresholds are presented. Finally, the effective throughput rate of the proposed AOS cross layer transmission system is simulated. Simulations show that the throughput rate can be optimized effectively.

[...] Read more.