Monday, May 29, 2017

International Journal of Network Security & Its Applications (IJNSA)

     
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Article Title:

End to End Quality of Service Assurance for Multi-Service Provisioning in Mobile Ad Hoc Networks.

ABSTRACT

Multimedia streaming over Mobile Ad Hoc networks has been a very challenging issue due to the dynamic behavior and uncertain nature of the channels. Transmission of real time video has bandwidth, delay and loss requirements. However there are no Quality of Service (QoS) guarantees for video transmission in today’s network. There are many challenging issues that need to be addressed in designing mechanisms for video transmission, which include end-to-end Quality of Service, Bandwidth, Delay, Loss, Congestion, and Heterogeneity. The Challenges of delivering Multi-media signals are even pronounced in Wireless Networks (Mobile Ad Hoc Networks, Wireless Fidelity (Wi-Fi) and Cellular Networks) which are heavily bandwidth constrained and have no fixed infrastructures. In this Research we provide a theoretical model for minimum buffer size as a means of achieving smoother, higher quality streaming video. This Research presents a general optimal video smoothing algorithm based on the concept of dynamically controlled Coefficient of Variance (CV), which is the ratio of standard deviation of the end-to-end delay and the expected value of the delay for each ensemble of packets being transmitted through the network. The results
discuss how the size of the “receive buffer” is affected by the allocated bandwidth for each source-pair end users for supporting video streaming applications without any gaps. The simulation performance show that the dynamic client buffer size based on measured bandwidth variation achieves negligible jitter in the video streaming which is subjectively acceptable.

For more visit:http://airccse.org/journal/nsa/6414nsa01.pdf

Saturday, May 27, 2017

The International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Article title:

Service Oriented Configuration Management of ‎Software ‎Architecture

Authors:

Razie Alidoosti, Shahrouz Moaven and Jafar Habibi

Abstract :

Software configuration management (SCM) is an important activity in the software engineering life cycle. SCM by control of the evolution process of products leads to constancy and stability in software systems. Nowadays, use of software configuration management is essential during the process of software development as rules to control and manage the evolution of software systems. SCM effects different levels of abstraction included the architectural level. Configuration of software architecture causes improvement in the configuration of the lower abstraction levels. CM of software architecture is more significant in large scale software with longevity of life cycle. Traditional SCM approaches, at the architectural level, do not provided the necessary support to software configuration management, so systems that use these approaches are faced with problems. These problems arise because of the lack of a serious constant and repeated changes in the software process. To overcome this it is necessary to create an infrastructure. Hence, a service oriented approach for configuration management is presented in this paper. In this approach, the activities of configuration management are conducted from a service oriented viewpoint. This approach was also used to try and control the evolution and number of versions of different software systems in order to identify, organize and control change and reforms during the production process. This approach can compose services and create composite services for new undefined activities of configuration.

For more visithttp://airccse.org/journal/nsa/7115nsa03.pdf

Friday, May 26, 2017

International Journal of Network Security & Its Applications (IJNSA)

UGC Listed, ERA Indexed

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)


Paper submission

Authors are invited to submit papers for this journal through e-mail : ijnsa@airccse.org  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.



For other details please visit : http://airccse.org/journal/ijnsa.html






Thursday, May 25, 2017

The International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)



Topics of interest:

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojon Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application


For more details visit : http://airccse.org/journal/ijnsa.html

Wednesday, May 24, 2017

The International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Article title:

Wearable Technology Devices Security and Privacy Vulnerability Analysis

Authors:

Ke Wan Ching and Manmeet Mahinderjit Singh

Abstract

Wearable Technology also called wearable gadget, is acategory of technology devices with low processing capabilities that can be worn by a user with the aim to provide information and ease of access to the master devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable technology becomes significant when people start their invention in wearable computing, where their mobile devices become one of the computation sources. However, wearable technology is not mature yet in term of device security and privacy acceptance of the public. There exists some security weakness that prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is authentication issue. The low processing due to less computing power of wearable device causethe developer's inability to equip some complicated security mechanisms and algorithm on the device.In this study, an overview of security and privacy vulnerabilities on wearable devices is presented.

For more visit : http://aircconline.com/ijnsa/V8N3/8316ijnsa02.pdf 

Tuesday, May 23, 2017

The International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)



Submission Procedure:

Authors are invited to submit papers for this journal through e-mail : ijnsa@airccse.org . Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

For other details please visit  http://airccse.org/journal/ijnsa.html

Monday, May 22, 2017

METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE APPROACH BASED ON COMPONENT DEPENDENCY

Suhail Qadir Mir and S.M.K. Quadri 

1 Post Graduate Department of computer sciences, University of Kashmir, India 2Department of Computer Science, Jamia Millia Islamia, India
 
ABSTRACT

 The purpose of the paper is to present a metric for availability based on the design of the information system. The availability metric proposed in this paper is twofold, based on the operating program and network delay metric of the information system (For the local bound component composition the availability metric is purely based on the software/operating program, for the remote bound  omponent composition the metric incorporates the delay metric of the network). The aim of the paper is to present a quantitative availability metric derived from the component composition of an Information System, based on the dependencies among the individual measurable components of the system. The metric is used for measuring and evaluating availability of an information system from the security perspective, the measurements may be done during the design phase or may also be done after the system is fully functional. The work in the paper provides a platform for further research regarding the quantitative security metric (based on the components of an information system i.e. user, hardware, operating program and the network.) for an information system that addresses all the attributes of information and network security.

 KEYWORDS

Availability, Metric, Security, Dependency, Information System.  

Wednesday, May 3, 2017

A NEW DNA BASED APPROACH OF GENERATING KEYDEPENDENT SHIFT ROWS TRANSFORMATION

Auday H. Al-Wattar1 , Ramlan Mahmod2 , Zuriati Ahmad Zukarnain3 , and Nur Izura Udzir4 ,
1 Faculty of Computer Science and Information Technology Universiti Putra Malaysia, 
43400 UPM, Serdang, Selangor. 

ABSTRACT

 The use of key-dependent shiftRows can be considered as one of the applied methods for altering the quality of a cryptographic algorithm. This article describes one approach for changing the ShiftRows transformation employed in the algorithm AES. The approach employs methods inspired from DNA processes and structure which depended on the key while the parameters of the created new ShiftRows have characteristics identical to those of the original algorithm AES in addition to increase its resistance against attacks. The proposed new ShiftRows were tested for coefficient correlation for dynamic and static independence between the input and output. The NIST Test Suite tests were used to test the randomness for the block cipher that used the new transformation.

 KEYWORDS

 ShiftRows, Block cipher, DNA, AES, NIST, Coefficient correlation


International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...