Forensic Investigations and Risk Management in Mobile and Wireless Communications - Advances in Wireless Technologies and Telecommunication
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 11)

H-INDEX

1
(FIVE YEARS 1)

Published By IGI Global

9781522595540, 9781522595564

Author(s):  
Prashant Kumar ◽  
Gulshan Shrivastava ◽  
Pramod Tanwar

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies are limited entries in a database that no one can change unless specific conditions are fulfilled. Here, in this chapter, the authors demystify Ethereum cryptocurrency. Initially, they introduce the said topic. While explaining, they follow a layered approach and explain each layer that is contributing in transactions. Eventually, they show the challenges for Ethereum cryptocurrency.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Jhum Swain

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.


Author(s):  
Shefali Arora ◽  
M. P. S. Bhatia

Biometric authentication is being increasingly used in various applications to identify people using various traits. This can be of use in various applications like forensics, passport control, etc. In the rapidly growing era of internet, it is necessary to restrict access to data on the web. Security and customer usage are some of the essential parameters which should be taken care of in a web biometric system. Also, biometric technology has been implemented on social media platforms so as to save users from cyber-attacks and breach of privacy. This chapter provides an overview of how a web biometric system works, with an approach to use deep learning algorithms to identify traits like face, iris, and fingerprints. Such techniques can also be used to authenticate people in e-commerce applications. Further, the authors discuss the implementation of biometric verification techniques on social networking platforms like Facebook, Twitter, etc.


Author(s):  
Manish Kumar ◽  
Mukul Sharma ◽  
Ivy Raina ◽  
Mehak Kawatra ◽  
Shubhanshu Sharma ◽  
...  

Making an investment is very important. According to a recent study, people used to hold a commodity for about 8 years, but now the time period has reduced to about 4 months. The market is really volatile; with the help of internet, news travels really fast and is reachable to everyone in every part of the world. Buying any commodity cannot be easier, as the number of options available is very large. Different investment options bring different types of profit and risk. One of the major issues involved is the security in using such tools and applications. A good investor always makes an investment decision by calculating and analyzing various factors that could affect his profits. The advancement in artificial intelligence and computation plays an important role while analyzing these factors. Few simple lines of code can analyze the market and help evaluate various investment options. Most of these tools are available online, but they all come with security issues associated with them.


Author(s):  
Arvind Dhaka ◽  
Amita Nandal ◽  
Rahul Dixit

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.


Author(s):  
Sherin Zafar ◽  
Samia Khan ◽  
Nida Iftekhar ◽  
Siddhartha Sankar Biswas

This chapter overviews and characterizes the protected steering convention in MANET, and furthermore, it discusses the proposed technique for alleviating those assaults. In the directing convention of the MANET while sending information bundles to different hubs, some middle hubs remove helpful data parcels and can't advance the parcel to the following hub. Some hubs may change the substance of bundles amid the information transmission session. In this way, secured transmission of information and different security administrations are the first necessity of MANET like some other foundation remote system. Ad-hoc arranges face different assaults like detached listening (passive eavesdropping) and dynamic obstruction, limiting source hub from finding the goal and system parcel. Ensuring the network layer usefulness is the most significant objective of system layer security plan for MANET, which prompts verified conveyance of bundles between the versatile hubs through multi-bounce sending.


Author(s):  
Vijander Singh ◽  
Ramesh C. Poonia ◽  
Linesh Raja ◽  
Gourav Sharma ◽  
Narendra Kumar Trivedi ◽  
...  

Intrusion detection system (IDS) is a software application that gives the facility to monitor the traffic of network, event, or activities on networks and finds if any malicious operation occurs. Hackers use different types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS finds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


Author(s):  
Monika Arora ◽  
Yogita Gigras

The number of mobile phone users has increased exponentially in the past decade. In India itself, it has crossed to over 1.2 billion mobile phone users, with at least 45% being the smartphone users, and this number is growing by the day. Almost 75% of internet traffic is generated by Smartphone users, traffic growth is irrespective of the demography of users. In this chapter, the focus is on two main categories of users (i.e., adolescents and senior citizens), who are not very tech-savvy. It discusses the threat they face even in normal usage of smartphones, and how digital forensics shall provide a secure environment without compromising much on ease of usage. Android apps are prone to attacks by hackers as basic information shared by a user on social media turns out to be very lucrative information for intruders. This chapter discusses some of the methods adopted by digital forensic experts to deal with such cybercrimes, the software/hardware tools present in a smartphone, and what preventive steps shall be taken by users to safeguard themselves against cybercrimes.


Author(s):  
Rashmi Bhardwaj ◽  
Aashima Bangia

Mathematical models show the transmission of malware into internet of things (IoT)-based wireless-grid through a disease model in which the sensor nodes are affected and cause crashes and various harms. The harmful nodes either become transmitters of e-worms or completely get destroyed. E-worms approaching the sensor node undergo a trade-off which requires fast-tracking the velocity of its spread utilizing larger transmission ranges, which occurs through strenuous use of the battery, implying the reduced overall infection propagation rate in the long-term, which is equivalent to destroying the infected nodule to wreak huge costs on the setup, which happens at the price of dropping the chance of contaminating new vulnerable nodes in the future. The numerical simulation using Lyapunov exponents, entropy for ascertaining intellectual defense strategies, could restrict the harm through suitably choosing network parameters.


Sign in / Sign up

Export Citation Format

Share Document