Wednesday, April 24, 2019

DESIGN OF REVERSIBLE MULTIPLIERS FOR LINEAR FILTERING APPLICATIONS IN DSP
Rakshith Saligram1  and Rakshith T.R2
1Department of Electronics and Communication, B.M.S College of Engineering, Bangalore, India
2Department of Telecommunication, R. V College of Engineering, Bangalore, India

ABSTRACT

Multipliers in DSP computations are crucial. Thus modern DSP systems need to develop low power multipliers to reduce the power dissipation. One of the efficient ways to reduce power dissipation is by the use of bypassing technique. If a bit in the multiplier and/or multiplicand is zero the whole array of row and/or diagonal will be bypassed and hence the name bypass multipliers. This paper presents the column Bypass multiplier and 2-D bypass multiplier using reversible logic; Reversible logic is a more prominent technology, having its applications in Low Power CMOS and quantum computations. The switching activity of any component in the bypass multiplier depends only on the input bit coefficients. These multipliers find application in linear filtering FFT computational units, particularly during zero padding where there will be umpteen numbers of zeros. A bypass multiplier reduces the number of switching activities as well as the power consumption, above which reversible logic design acts to further almost nullify the dissipations.

KEYWORDS

Reversible logic, Low power Multipliers, Column Bypass multiplier, 2-D Bypass Multiplier ,Reduced Switching Activity, Fast Fourier Transform, Zero Padding. 


Original Source Link : http://aircconline.com/vlsics/V3N6/3612vlsics06.pdf
http://airccse.org/journal/vlsi/vol3.html

IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Honeypots

IP Traceback for Flooding attacks on Internet Threat Monitors (ITM ) Using Honeypots
K.Munivara Prasad1 and A.Rama Mohan Reddy2 V Jyothsna3
1Department of Computer Science and Engineering, Rayalaseema University, Kurnool
2Professor and Head,Departmentof Computer Science and Engineering,SVUCE,SV University, Tirupati
3Department of Information technology, Sree vidyanikethan Engg.College,Tirupati

ABSTRACT

The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS) and distributed Denial of Service (DDoS) attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. One possible way to counter DDoS attacks is to trace the attack sources and punish the perpetrators. we propose a novel traceback method for DDoS using Honeypots. IP tracing through honeypot is a single packet tracing method and is more efficient than commonly used packet marking techniques.

KEYWORDS

Internet Threat Monitors (ITM), DDoS, Flooding attack,IpTrcing, Botnet and Honeypot. 



Monday, April 22, 2019

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2
1Department of Computer Science, University of Kashmir, J&k, India
2Department of Computer Science, Jazan University, KSA

ABSTRACT

The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.

KEYWORDS

Internet of Things, privacy, attacks, security, threats, protocols. 




Tuesday, April 16, 2019

KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE

KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim,Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh
Le Quy Don Technical University No 236 Hoang Quoc Viet Street , Hanoi, Vietnam

Abstract

File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store. Our method makes EFS portable and flexible; Kernel size will not increase in Operating System.

Keywords: 

File System in User Space (FUSE), Key-Value store, Encrypt File System, KVEFS, Data Protection



Wednesday, April 10, 2019

A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS

A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
Hiten Choudhury
Department of Computer Science & Information Technology Cotton University, Guwahati, Assam, India

ABSTRACT

Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these solutions, with the expectation that researcher envisioning to work in this area will get a direction in devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile networks.

KEYWORDS

Identity; Privacy; Authentication; Anonymity; IMSI; UMTS; LTE; Interworking





Monday, April 8, 2019

DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION

DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
Huda H.Al.Ghuraify1, Dr. Ali A.Al-Bakry2 and Dr. Ahmad T. Al-Jayashi3
1Engineering technical college,al-furat al-awsat university,al-najaf
2Dean of engineering technical college,al-furat al-awsat university,al-najaf
3Assistance deanof engineering technical college,al-furat al-awsat university,al-najaf

ABSTRACT

Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.

KEYWORDS

Image steganography, Spatial domain , Matrix partition, Least Significant Bit 






Friday, April 5, 2019

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
Dr. Gorine and Rabia Saleh
School of Business and Technology, Gloucestershire University, Cheltenham, England

ABSTRACT

MANETs routing protocols are vulnerable to various types of security attacks such as selfish nodes, grey-hole and black-hole attacks.  These routing protocols are unprotected and subsequently result in various kinds of malicious mobile nodes being injected into the networks. In this paper, three types of attacks such as selfish, grey-hole and black-hole attacks have been applied to two important MANET routing protocols; Ad-hoc On demand Distance Vector (OADV) and Dynamic Source Routing (DSR) in order to analyse and compare the impact of these attacks on the network performance based on throughput, average delay, packet loss and consumption of energy.

KEYWORDS

Mobile Ad-Hoc Networks, DSR, AODV, Routing Protocols, Wireless Network Security, Malicious Node, Network Performance




Tuesday, April 2, 2019

SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST

SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
ChandreyeeChowdhury *SarmisthaNeogy
Dept. of Computer Scienceand Engineering Jadavpur University, West Bengal

ABSTRACT

The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.

KEYWORDS

Mobile Agent, Security, Hashcode, Trust, Dempster–Shafer Belief Theory






Monday, April 1, 2019

A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS

A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
Hiten Choudhury
Department of Computer Science & Information Technology Cotton University, Guwahati, Assam, India

ABSTRACT

Universal Mobile Telecommunication System (UMTS) is a popular 3G standard for mobile telecommunication networks. ‘Vulnerability of the subscriber’s identity privacy and the need to eliminate this vulnerability’, is an established security issue in UMTS. This vulnerability continues to exist up to various extents in the descendent networks of UMTS, like LTE. Several solutions suggesting improvements to the identity privacy in UMTS is present in the literature. In this paper, we look into select few of these solutions, with the expectation that researcher envisioning to work in this area will get a direction in devising an efficient mechanism in improving identity privacy in UMTS, its descendants and future mobile networks.

KEYWORDS

Identity; Privacy; Authentication; Anonymity; IMSI; UMTS; LTE; Interworking






International Journal of Network Security & Its Applications (IJNSA)

International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Current Issue : March 2019, Volume 11, Number 2

Performance Analysis of Routing Protocols in MANET Under Malicious Attacks
Gorine1 and Rabia Saleh, 1Gloucestershire University, England


Dual Security Using Image Steganography Based Matrix Partition
Huda H.Al.Ghuraify, Ali A.Al-Bakry, Ahmad T. Al-Jayashi, al-furat al-awsat university, Iraq


A Review of Selected Proposals for Improving Identity Privacy in UMTS
Hiten Choudhury, Cotton University, India


KVEFS: Encrypted File System Based on Distributed Key-Value Stores and FUSE
Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh, Le Quy Don Technical University, Vietnam


Security& Privacy Threats, Attacks and Countermeasures in Internet of Things
Faheem Masoodi1, Shadab Alam2 and Shams Tabrez Siddiqui2, 1University of Kashmir, India and 2Jazan University, KSA





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...