Friday, June 30, 2017

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Paper Submission

Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page 

For more detais : http://airccse.org/journal/ijnsa.html

Thursday, June 29, 2017


International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Topics of interest include but are not limited to, the following


• Network and Wireless Network Security
• Mobile, Ad Hoc and Sensor Network Security
• Peer-to-Peer Network Security
• Database and System Security
• Intrusion Detection and Prevention
• Internet Security & Applications
• Security & Network Management
• E-mail security, Spam, Phishing, E-mail fraud
• Virus, worms, Trojon Protection
• Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
• Ubiquitous Computing Security
• Web 2.0 security
• Cryptographic protocols
• Performance Evaluations of Protocols & Security Application
FOR MORE PLEASE VISIT - http://airccse.org/journal/ijnsa

.html

Monday, June 26, 2017

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html


Article title:

                       A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS 
ABSTRACT : 

The emergence of wireless sensor networks (WSNs) can be considered one of the most important revolutions in the field of information and communications technology (ICT). Recently, there has been a dramatic increase in the use of WSN applications such as surveillance systems, battleground applications, object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in such applications. As a result, many solutions and approaches have been proposed for different attacks and vulnerabilities to achieve security requirements. This paper surveys different security approaches for WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths and weaknesses for each technique are also discussed at the conclusion of this paper. 

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
youtube                   :https://www.youtube.com/watch?v=W6TY_viGhx0&feature=youtu.be

Friday, June 23, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Article title:

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM 
ABSTRACT:
The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
youtube                   :https://www.youtube.com/watch?v=W6TY_viGhx0&feature=youtu.be
The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html
Article title:

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM 
ABSTRACT:

The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
youtube                   :https://www.youtube.com/watch?v=W6TY_viGhx0&feature=youtu.be

Thursday, June 22, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Article title:

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM 
ABSTRACT:

The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
youtube                   :https://www.youtube.com/watch?v=W6TY_viGhx0&feature=youtu.be

Tuesday, June 20, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
Article title:

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM 
ABSTRACT:

The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
youtube                   :https://www.youtube.com/watch?v=W6TY_viGhx0&feature=youtu.be

Monday, June 19, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Article title:

A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DISASTER NOTIFICATION SYSTEM 



ABSTRACT:

The number of disaster occurrences around the world based on the climate changes due to the global warming has been indicating an increase. To prevent and cope with such disaster, a number of researches have been actively conducted to combine the user location service as well as the sensor network technology into the expanded IoT to detect the disaster at early stages. However, due to the appearance of the new technologies, the scope of the security threat to the pre-existing system has been expanding. In this thesis, the D-SASS using the beacon to provide the notification service to the disaster-involved area and the safe service to the users is proposed. The LEA Algorithm is applied to the proposed system to design the beacon protocol collected from the smartphone to safely receive the notification information. In addition, for data protection of a notification system, LEA and SEED algorithms were applied, and a comparative analysis was conducted.

or more please visit :http://aircconline.com/ijnsa/V9N1/9117ijnsa01.pdf
or more please visit : http://allconferencecfpalerts.com/cfp/view.php?eno=6984
      


Sunday, June 18, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html




Article title:
      A SECURE E- MEDICAL EXEMPTION SYSTEM (E-MES): JORDAN CASE 

ABSTRACT:

In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol. Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.

or more please visit : http://aircconline.com/ijnsa/V9N2/9217ijnsa02.pdf

Friday, June 16, 2017

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)


Article title:
                 A SECURE E- MEDICAL EXEMPTION SYSTEM (E-MES): JORDAN CASE 

ABSTRACT:

 In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol. Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.  

or more please visit : http://aircconline.com/ijnsa/V9N2/9217ijnsa02.pdf

Thursday, June 15, 2017

A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Article title:
           ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND      NEW TECHNIQUES

ABSTRACT :
     The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’ private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers. We present a novel, holistic model with a new handshake protocol and online account access control, which authenticate account access and form a sandbox around third-party access to users’ accounts. When utilizing these novel techniques, users’ login credentials can remain private, providing safeguards against unauthorized transactions on their accounts.

or more please visit -http://aircconline.com/ijnsa/V9N3/9317ijnsa02.pdf

The International Journal of Network Security & Its Applications (IJNSA)

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)



Article title:
           ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND      NEW TECHNIQUES

ABSTRACT :
     The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’ private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers. We present a novel, holistic model with a new handshake protocol and online account access control, which authenticate account access and form a sandbox around third-party access to users’ accounts. When utilizing these novel techniques, users’ login credentials can remain private, providing safeguards against unauthorized transactions on their accounts.

or more please visit -http://aircconline.com/ijnsa/V9N3/9317ijnsa02.pdf

Tuesday, June 13, 2017

The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)


Article title:

                A CONCEPTUAL SECURE BLOCKCHAIN- BASED ELECTRONIC VOTING SYSTEM

ABSTRACT :

Blockchain is offering new opportunities to develop new types of digital services. While research on the topic is still emerging, it has mostly focused on the technical and legal issues instead of taking advantage of this novel concept and creating advanced digital services. In this paper, we are going to leverage the open source Blockchain technology to propose a design for a new electronic voting system that could be used in local or national elections. The Blockchain-based system will be secure, reliable, and anonymous, and will help increase the number of voters as well as the trust of people in their governments. 

or more please visit -http://aircconline.com/ijnsa/V9N3/9317ijnsa01.pdf 
The International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
Article title:
Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
Abstarct :
The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers.

Monday, June 12, 2017

International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Topics of interest include, but are not limited to, the following:

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojon Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

For more details : http://airccse.org/journal/ijnsa.html

Friday, June 9, 2017

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Paper Submission

Authors are invited to submit papers for this journal through E-mail ijnsa@airccse.org. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. For paper format download the template in this page



For more detais : http://airccse.org/journal/ijnsa.html

Thursday, June 8, 2017

International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Article Title:

A Hybrid Approach Combining Rule-Based and Anomaly-Based Detection Against DDoS Attacks

ABSTRACT

We have designed a hybrid approach combining rule-based and anomaly-based detection against DDoS attacks. In the approach, the rule-based detection has established a set of rules and the anomaly-based detection use one-way ANOVA test to detect possible attacks. We adopt TFN2K (Tribe Flood, the Net 2K) as an attack traffic generator and monitor the system resource of the victim like throughput, memory utilization, CPU utilization consumed by attack traffic. Target users of the proposed scheme are data center administrators. The types of attack traffic have been analysed and by that we develop a defense scheme. The experiment has demonstrated that the proposed scheme can effectively detect the attack traffic.

KEYWORDS

Distributed denial of service, firewall, detection

For more details: http://aircconline.com/ijnsa/V8N5/8516ijnsa01.pdf

Wednesday, June 7, 2017

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Topics of interest include but are not limited to, the following

• Network and Wireless Network Security
• Mobile, Ad Hoc and Sensor Network Security
• Peer-to-Peer Network Security
• Database and System Security
• Intrusion Detection and Prevention
• Internet Security & Applications
• Security & Network Management
• E-mail security, Spam, Phishing, E-mail fraud
• Virus, worms, Trojon Protection
• Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
• Ubiquitous Computing Security
• Web 2.0 security
• Cryptographic protocols
• Performance Evaluations of Protocols & Security Application



FOR MORE PLEASE VISIT - http://airccse.org/journal/ijnsa.html

Tuesday, June 6, 2017

The International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

http://airccse.org/journal/ijnsa.html

Most Cited Article in Volume 5 - 2013

Title-Security Challenges, Issues and Their Solutions For Vanet

Abstract:

Vehicular Ad hoc Networks (VANETs) are the promising approach to provide safety and other applications to the drivers as well as passengers. It becomes a key component of the intelligent transport system. A lot of works have been done towards it but security in VANET got less attention. In this article, we have discussed about the VANET and its technical and security challenges. We have also discussed some major attacks and solutions that can be implemented against these attacks. We have compared the solution using different parameters. Lastly we have discussed the mechanisms that are used in the solutions.


For more details: http://airccse.org/journal/nsa/5513nsa08.pdf

Monday, June 5, 2017

International Journal of Network Security & Its Applications (IJNSA)


ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Article Title:

A Secure E-Medical Exemption System (E-MES): Jordan Case

ABSTRACT

In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key
Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the proposed system is summarized into three phases: first, the hospital process for applying the patient's application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which receives the hospital report, will then send a request to the ministry of health, the income and sales tax department, and the ministry of social development in order to check the patient's condition for a medical exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment. Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system is more efficient than the traditional medical protocols since the patient can apply for a medical exemption directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key encryption and digital signature system ensures and guarantees the security of the proposed protocol.
Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.

KEYWORDS

Cryptography, Information security, medical system, and exemption.

For more details : http://aircconline.com/ijnsa/V9N2/9217ijnsa02.pdf

Friday, June 2, 2017

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
http://airccse.org/journal/ijnsa.html

Current Issue:

May 2017, Volume 9, Number 3
A Conceptual Secure Blockchain Based Electronic Voting System
Ahmed Ben Ayed, Colorado Technical University, USA

For more details : http://aircconline.com/ijnsa/V9N3/9317ijnsa01.pdf

Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques
Mehrdad Nourai and Haim Levkowitz, University of Massachusetts Lowell, USA

For more details: http://aircconline.com/ijnsa/V9N3/9317ijnsa02.pdf

Thursday, June 1, 2017

International Journal of Network Security & Its Applications (IJNSA)

ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Article Title:

Enhancing Cyber Security of Online Accounts via A Novel Protocol and New Techniques

ABSTRACT

The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to use in their homes on their personal computers. These tools were a local install, often expensive, and required a learning curve to use them effectively. With a paradigm shift to cloud computing and storage, users are looking for inexpensive alternatives that are accessible at home or on their mobile devices. As a result, third-party companies have been forming over the last few years to meet this need. However, to access the functionality of these online resources, users are required to divulge their personal financial account login credentials. While third-party companies claim that subscribers’ private information is safely stored on their servers, one cannot ignore the fact that hackers may be able to break into their system to steal users’ information. Once hackers manage to compromise users’ login credentials, they have complete control over their accounts. Therefore, there is a need to have a holistic approach that incorporates security elements to protect users’ accounts from hackers. We present a novel, holistic model with a new handshake protocol and online account access control, which authenticate account access and form a sandbox around third-party access to users’ accounts. When utilizing these novel techniques, users’ login credentials can remain private, providing safeguards against unauthorized transactions on their accounts.



For more detailshttp://aircconline.com/ijnsa/V9N3/9317ijnsa02.pdf

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...