International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 9, No. 3, Mar. 2017

Cover page and Table of Contents: PDF (size: 174KB)

Table Of Contents

REGULAR PAPERS

Efficient Dynamic Resource Allocation in OFDMA Systems by Firefly Pack Algorithm

By Haider M. AlSabbagh Mohammed Khalid Ibrahim

DOI: https://doi.org/10.5815/ijcnis.2017.03.01, Pub. Date: 8 Mar. 2017

The resource allocation of Orthogonal Frequency Division Multiple Access (OFDMA) is one of the core issues in the next generation mobile systems. The improvement in the performance and quality of service (QoS) of communication systems is relying upon the efficient utilization of the available communication resources. The resource allocation of the OFDMA systems is mainly depends on both power and subcarrier allocations of each user for different operation scenarios and channel conditions. This paper proposes and applies Firefly Pack Algorithm (FPA) to find the optimal or near optimal power and subcarrier allocations for OFDMA systems. It takes into consideration the power and subcarrier allocations constrains, channel and noise distributions, distance between users equipments and base station, user priority weight to approximate the most of the variables, constrains, and parameters that encounter in the OFDMA systems. Four important cases for the number of subcarriers and users are addressed, simulated, and analyzed with employing the FPA algorithm under specific operation scenarios to meet the standard specifications. The results demonstrate that FPA is an effective algorithm in finding the optimal or near optimal for both subcarrier and power allocation.

[...] Read more.
Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things

By Mahmoud Moshref

DOI: https://doi.org/10.5815/ijcnis.2017.03.02, Pub. Date: 8 Mar. 2017

The most important research in the world in these days, research that looking at the internet of thing's (IoT) topics and their applications. Most of these applications depend on RFID system, which includes RFID readers and tags. The important issues in RFID system or network are how we can reduce anti-collision between readers to identify and read tags data. In these paper, we suggest an Improved anti-collision protocol, which can be used to connect RFID readers with RFID tags and reduce the number of RFID tag's collisions. The simulation shows that an Improved Class-1 Generation 2 algorithm is better than Slotted Aloha, Class-1 Generation-2 (Number of Tags Known), Class-1 Generation-2 (Number of Tags Unknown) algorithms.

[...] Read more.
A Survey of Applications and Security Issues in Software Defined Networking

By Azka S Revathi Angelina Geetha

DOI: https://doi.org/10.5815/ijcnis.2017.03.03, Pub. Date: 8 Mar. 2017

With increasing number of mobile phones and smart devices, it has become hard to manage the networks proactively as well as reactively. Software Defined Networking (SDN) is an emerging technology that promises to solve majority of the challenges faced by the networks in current times. SDN is based on decoupling of data plane and control plane. SDN has a generalized control plane for all networking devices of the network which makes it simple and easy to configure devices on the fly. This paper surveys how Software Defined Networks evolved to be one of the most preferred technology of contemporary times. The architecture and working of all the planes of SDN have been discussed. SDN finds application in variety of areas, some of which have been highlighted in this paper. SDN faces many security threats in each of its planes. The major security challenges are also presented in detail at the end of the paper.

[...] Read more.
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera

By Instructor Baidaa A. Atya Abdul Monem S. Rahma Abdul Mohssen J. Abdul Hossen

DOI: https://doi.org/10.5815/ijcnis.2017.03.04, Pub. Date: 8 Mar. 2017

In the last decades, monitoring cameras begin to play a vital role in securing sensitive systems such as government sites or establishments. Generally, these kinds of cameras are fixed-location (i.e. outdoor camera) such that the viewpoint is limited to small area and not covering the whole place. In addition, there are some drawbacks that appear when using these kinds of cameras such as being breakable (intentionally or not) which may lead to camera malfunction or breaking in the linked electrical wires that may cause disconnection between the camera, monitor and its receiver. However, the main problem is the lacking of secure protecting system that prevents intruders from entering into the system disabling or malfunction it.
In this research a new system is proposed in order to solve these problems by using wireless-mobile camera with embedded programmable operating system which enables controlling this camera remotely by sending wireless commands through the embedded component called Arduino card controller. This card enables the connection between the camera and the server to be programmatic by the user or developer. The main goal of this research is to design a monitoring system to detect any suspicious events and to ensure that the transferring monitoring data from the camera to the server is not infiltrated by unauthorized person by applying a set of techniques from image detection, object tracking and security algorithms to the instructions or the program of the camera. Compared with other researches, this work achieved the following goals: 1- Using Arduino card for programming the camera. 2- IP camera does not require user name and password. 3- The images and the other information are (encrypted) when sending to/from computer, 4- Using Mobile-wireless camera. 5- Process of keys exchanging between camera and computer. The results of this research are good and achieved the main goals of new developed technique.

[...] Read more.
Distributed Defense: An Edge over Centralized Defense against DDos Attacks

By Karanbir Singh Kanwalvir Singh Dhindsa Bharat Bhushan

DOI: https://doi.org/10.5815/ijcnis.2017.03.05, Pub. Date: 8 Mar. 2017

Distributed Denial of Service (DDoS) attack is a large-scale, coordinated attack on the availability of services of a target/victim system or network resource/service. It can be launched indirectly through many compromised machines on the Internet. The Purpose behind these attacks is exhausting the existing bandwidth and makes servers deny from providing services to legitimate users. Most detection systems depend on some type of centralized processing to analyze the data necessary to detect an attack. In centralized defense, all modules are placed on single point. A centralized approach can be vulnerable to attack. But in distributed defense, all of the defense modules are placed at different points and do not succumb to the high volume of DDoS attack and can discover the attacks timely as well as fight the attacks with more resources. These factors clearly indicate that the DDoS problem requires a distributed solution than the centralized solution. In this paper, we compare both types of defense mechanisms and identify their relative advantages and disadvantages. Later they are compared against some performance metrics to know which kind of solution is best.

[...] Read more.
Evaluation of Secure Cloud Transmission Protocol

By Dinesha H.A D.H.Rao

DOI: https://doi.org/10.5815/ijcnis.2017.03.06, Pub. Date: 8 Mar. 2017

Authentication, Authorization, integrity, availability and confidentiality are important aspects in cloud computing services. Cloud services market demands can be increased by enhancing the authentication, data confidentiality and customer trust. To achieve strong authentication, security and to earn customer trust, we had proposed and published secure cloud transmission protocol (SecCTP) which describes SecCTP techniques in detail. In this paper, we evaluated the SecCTP and presented the GUI implementation. We discuss the applicability, usefulness and advantages of SecCTP techniques i.e. multi-dimensional password generation and multi-level authentication in comparison with existing cloud authentication and confidentiality techniques. We describe how SecCTP improves the identity, access management, integrity and confidentiality in existing cloud service access. We evaluated SecCTP resistance in multiple attacks.

[...] Read more.
Enhancing Quality of Service in Heterogeneous Wireless Network using EDLAS

By Divya Suman

DOI: https://doi.org/10.5815/ijcnis.2017.03.07, Pub. Date: 8 Mar. 2017

The transmission through different interfaces of the different wireless network is a challenging issue. This paper presents an enhanced dynamic link aggregation scheme (EDLAS), an enhanced technique for the transmission of data through different interfaces present in different wireless networks. The proposed technique uses the existing sequential and parallel DLAS technique by using the fuzzy. The fuzzy system decides whether to transfer data by using sequential or the parallel DLAS depending upon the number of the chunks, user mobility, the number of users, chunk size. The work is implemented using the MATLAB. The simulation results generated using the MATLAB shows the effectiveness of the technique with increased throughput with same residual battery power.

[...] Read more.