Wednesday, October 30, 2019

A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKS

A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKS

Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae
School of Science and Technology, Middlesex University, London, UK

ABSTRACT

Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support  ubiquitous connectivity and thus enhances users’ experience. However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes on these various networks. This paper looks at how existing research efforts the HOKEY WG, Mobile Ethernet and 3GPP frameworks respond to this new environment and provide security mechanisms. The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods. These methods will be extensively analysed in order to highlight their strengths and weaknesses.

KEYWORDS

Authentication and Key Agreement Protocols, Casper/FDR, Next Generation Networks, Heterogeneous Networks





Thursday, October 24, 2019

Most viewed article for an year in Academia! - IJNSA

Most viewed article for an year in Academia!

International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)

Contact Us
Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com

SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS


Wednesday, October 23, 2019

PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM

PERSONAL SAFETY TRIGGERING SYSTEM ON ANDROID MOBILE PLATFORM
Ashokkumar Ramalingam1, Prabhu Dorairaj2 and Saranya Ramamoorthy3
Department of Electrical Engineering, Blekinge Institute of Technology,Karlskrona, Sweden

ABSTRACT

Introduction of Smart phones redefined the usage of mobile phones in the communication world. Smart phones are equipped with various sophisticated features such as Wi-Fi, GPS navigation, high resolution camera, touch screen with broadband access which helps the mobile phone users to keep in touch with the modern world. Many of these features are primarily integrated with the mobile operating system which is out of reach to public, by which the users can’t manipulate those features. Google came up with an innovative operation system termed as ANDROID, which is open system architecture with customizable third party development and debugging environment which helps the user’s to manipulate the features and to create their own customizable applications. In this paper, ‘Emergency Based Remote Collateral Tracking System’ application using Google’s Android Mobile Platform is addressed. Emergency is divided into three categories: heart beat based emergency, security threats like personal safety and road accidents. This application is targeted to a person who is driving a vehicle. Heart rate monitoring device is integrated with our application to sense the heart beat of a person driving the vehicle and if there is any abnormalities in the heart beat, then our application performs a dual role. One in which, application uses a GPS to track the location information of the user and send those location information as a message via SMS, email and post it on Facebook wall Simultaneously, an emergency signal is sent to Arduino Microcontroller. Road accidents are quite common, this application is also designed to detect the accident using the sensors in the Android Mobile. Security threat can occur anywhere, our application also answers for personal safety, when the user interacts with the application by pressing the button, then automatically the application generates the geographical information and sends that location information via SMS and email to a pre-stored emergency contact and the same information will be posted on user’s Facebook wall. This application is written in JAVA programming language which runs on Eclipse Integrated Development Kit.

KEYWORDS

Accidents, Accelerometer, Android, Arduino microcontroller, Emergency, GPS, Heart rate device






Friday, October 18, 2019

AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR IDS IN WIRELESS SENSOR NETWORKS

AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR IDS IN WIRELESS SENSOR NETWORKS
A. Forootaninia1 and M. B. Ghaznavi-Ghoushchi2*
1Department of IT, Tehran University, Kish International Campus, Iran
2School of Engineering, Shahed University, Tehran, Iran

ABSTRACT

Preserving security and confidentiality in wireless sensor networks (WSN) are crucial. Wireless sensor networks in comparison with wired networks are more substantially vulnerable to attacks and intrusions. In WSN, a third person can eavesdrop to the information or link to the network. So, preventing these intrusions by detecting them has become one of the most demanding challenges. This paper, proposes an improved watchdog technique as an effective technique for detecting malicious nodes based on a power aware hierarchical model. This technique overcomes the common problems in the original Watchdog mechanism. The main purpose to present this model is reducing the power consumption as a key factor for increasing the network's lifetime. For this reason, we simulated our model with Tiny-OS simulator and then, compared our results with non hierarchical model to ensure the improvement. The results indicate that, our proposed model is better in performance than the original models and it has increased the lifetime of the wireless sensor nodes by around 2611.492 seconds for a network with 100 sensors.

KEYWORDS

WSN, Intrusion Detection System (IDS), Watchdog, Improved Watchdog, Low-Power, Hierarchical Model








Wednesday, October 16, 2019

A COMPARATIVE STUDY OF THE TRADITIONAL MODEL OF IEEE 802.15.4 AND NON-OVERLAPPING BINARY EXPONENTIAL BACKOFF IEEE 802.15.4

A COMPARATIVE STUDY OF THE TRADITIONAL MODEL OF IEEE 802.15.4 AND NON-OVERLAPPING BINARY EXPONENTIAL BACKOFF IEEE 802.15.4
Archit Verma, Pushpinder Singh Patheja and Akhilesh Waoo
Department of Computer Engineering, BIST, Bhopal,India

ABSTRACT

This paper introduces a performance model of a recently proposed backoff technique named Nonoverlapping binary exponential backoff algorithm over IEEE 802.15.4, which is designed for LRWPAN. To reduce the collision rate in highly populated wireless networks, non-overlapping binary exponential backoff tries to evenly distribute the random backoff delay by distinguishing the new range of backoff delays. For the performance measurement of non-overlapping binary exponential backoff algorithm, obtained results are compared with the traditional model of IEEE 802.15.4. Our numerical analyses show that non-overlapping binary exponential backoff improves the throughput and transmission delay comparing to the traditional BEB.

KEYWORDS

Binary Exponential back off, Window Size, Contention Windows 






6th International Conference on Cryptography and Information Security (CRIS 2020)



6th International Conference on Cryptography and Information Security (CRIS 2020)

January 25 ~ 26, 2020, Zurich, Switzerland


Scope & Topics

6th International Conference on Cryptography and Information Security (CRIS 2020) provides a forum for researchers who address this issue and to present their work in a peer-reviewed forum. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in applied cryptography and Information security.

Topics of interest include, but are not limited to, the following:

  • Cryptographic Protocols
  • Cryptography and Coding
  • Untraceability
  • Privacy and Authentication
  • Key Management
  • Trust Management
  • Quantum Cryptography
  • Computational Intelligence in Security
  • Artificial Immune Systems
  • Biological and Evolutionary Computation
  • Intelligent Agents and Systems
  • Reinforcement and Unsupervised Learning
  • Autonomy-Oriented Computing
  • Co-evolutionary Algorithms
  • Fuzzy Systems
  • Biometric Security
  • Trust Models and Metrics
  • Regulation and Trust Mechanisms
  • Data Integrity
  • Models for Authentication, Trust and Authorization
  • Wireless Network Security
  • Information Hiding
  • E- Commerce
  • Data and System Integrity
  • Access Control and Intrusion Detection
  • Intrusion Detection and Vulnerability Assessment
  • Authentication and Non-repudiation
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Secure Cloud Computing
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service, Systems Design and QoS Network Security
  • Software Security
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems

Paper Submission

Authors are invited to submit papers through the conference Submission System by October 19, 2019. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CRIS 2020, after further revisions, will be published in the special issues of the following journals


Important Dates

  • Submission Deadline : October 19, 2019
  • Authors Notification : November 20, 2019
  • Registration & Camera-Ready Paper Due : November 28, 2019

Contact Us

Here's where you can reach us: cris@cosit2020.org or crissecretary@gmail.com

Submission System






Tuesday, October 15, 2019

COMPREHENSIVE COMPARISON OF VOIP SIP PROTOCOL PROBLEMS AND CISCO VOIP SYSTEM

COMPREHENSIVE COMPARISON OF VOIP SIP PROTOCOL PROBLEMS AND CISCO VOIP SYSTEM
Dr TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar
Department of Computer Engineering, King Fahd University of Petroleum & Minerals (KFUPM), Dhahran, Saudi Arabia

ABSTRACT

Voice over IP (VoIP), use of the packet switched internet for telephony, has improved substantially in the past few years. On the other hand, VoIP has many challenges that do not exist in the public switched telephone network (PSTN), a circuit switched system. VoIP is an application running on the internet, and therefore inherits the internet’s security issues. It is important to realise that VoIP is a relatively young technology, and with any new technology, security typically improves with maturity. This paper provides a comprehensive comparison of a VoIP SIP protocol and CISCO VoIP system. The comparison involves the investigation of the vulnerabilities that target both systems and how secure each system is. With this comparison we present our conclusion on which system is more secure.

KEYWORDS

SIP, SKINNY, DOS, Cisco, and CCSCP 






Monday, October 14, 2019

Call for Papers - International Journal of Network Security & Its Applications (IJNSA)


International Journal of Network Security & Its Applications (IJNSA)
ISSN 0974 - 9330 (Online); 0975 - 2307 (Print)
                
Scope & Topics

The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.

Topics of Interest include, but are not limited to, the following:

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojan Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application

Paper submission

Authors are invited to submit papers for this journal through e-mail ijnsa@airccse.org or Submission System.  Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

  • Submission Deadline  : October 26, 2019
  • Notification                    :  November 26, 2019
  • Final Manuscript Due    :  December 04, 2019
  • Publication Date            :  Determined by the Editor-in-Chief

Contact Us

Here's where you can reach us : ijnsa@airccse.org or ijnsa@aircconline.com

Submission System



Here you can reach us in social Medias


Friday, October 11, 2019

MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION

MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION

Md Maminur Islam1, Subash Poudyal1 and Kishor Datta Gupta2
1Department of Computer Science, University of Memphis, USA
2Department of Computer Science, Lamar University, Beaumont, USA

ABSTRACT

Due to the rapid growth of the internet, malicious websites [1] have become the cornerstone for internet crime activities. There are lots of existing approaches to detect benign and malicious websites — some of them giving near 99% accuracy. However, effective and efficient detection of malicious websites has now seemed reasonable enough in terms of accuracy, but in terms of processing speed, it is still considered an enormous and costly task because of their qualities and complexities. In this project, We wanted to implement a classifier that would detect benign and malicious websites using network and application features that are available in a data-set from Kaggle, and we will do that using Map Reduce to make the classification speeds faster than the traditional approaches.[2].














Wednesday, October 9, 2019

EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM

EUNICERT: ETHEREUM BASED DIGITAL CERTIFICATE VERIFICATION SYSTEM
Trong Thua Huynh1, Dang-Khoa Pham2
1Posts and Telecommunications Institute of Technology, Hochiminh city, Vietnam
2FPT Telecom, Hochiminh city, Vietnam

ABSTRACT

The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system.

Keywords

A Digital certificate, blockchain, ethereum, verification, counterfeit.





International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed ISSN: 0974 - 9330 (Online); 0975 - 2307 (Print)...