Journal of Network and Information Security
Latest Publications


TOTAL DOCUMENTS

9
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By Publishing India Group

2321-6859

2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Nazimuddin Ahmed ◽  
Shobha Duttadeka

In this paper we have considered a version of restricted constraints in the problem of maximum attainable flow (capacity) in minimum cost (distance) in a network (Ahmed, Das, & Purusotham, 2012b). By restricted constraints one means that the link(s) (cities or stations or nodes) are completed (or visited) in such a way that a particular link is to be preceded (completed or visited) by another link (precedence relation need not be immediate). Here the aim is to obtained an optimal route of a more realistic situation as to scheduling a restricted constraints to a maximum flows at a minimum cost from a source to a destination. The distance (cost) and arc capacity between any two stations are given.


2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Reza Alimoradi

The goal of an identification procedure is access control. Methods that permit an identification are called identification protocols. In this paper, first we introduced quaternion numbers. In addition we proposed a new identification scheme based on quaternions. Finally, the security of our scheme is analyzed.


2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Jayashree Nair ◽  
T. Padma

This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.


2015 ◽  
Vol 3 (1) ◽  
Author(s):  
B. Vidhya ◽  
Mary Joseph ◽  
D. Rajini Girinath ◽  
A. Malathi

Storage nodes play a vital role in wireless sensor networks for carrying out the storage activity of data sent by the sensor node once after capturing the details of the environment and in turn to answer the sensor data related query to the network owner. Because of the less storage capacity on the sensor node, storage node takes the whole responsibility for pre-processing the data as well as to respond to queries returned by the owner. Duplicate sensor/storage node imposes a major threat to the wireless sensor networks. The proposed approach focuses on carrying out the effective techniques for data transfer by using Elliptic Curve Encryption for encrypting the image captured from the environment and also to transmit the encrypted critical text data from source to destination, aggregate Signature to validate the sender of the message for data verification, stenography to hide the encrypted content within an image. The proposed ideas are well suited for transferring the details secure in WSN.


2015 ◽  
Vol 3 (2) ◽  
Author(s):  
Dennis Guster ◽  
Raqeeb Abdul ◽  
Erich Rice

With the advances in cloud computing and the use of virtualisation, the complexity of computing systems had never been greater. Due to this greater complexity securing these systems have also become more complex and difficult, especially given the ease with which hackers can bring to bear Denial of Service (DoS) attacks. Luckily, advances in technology have also provided the means of administering these complex computing systems through the use of mobile devices, such as with an Android OS based smartphone. In this paper we provide an option for managing the eradication of rogue processes created through DoS attacks by way of a mobile device application or app. Through the use of this mobile app built on the Android platform a system administrator would be alerted to a potential security incident and be given the tools to kill a rogue process without having to be onsite or initiate a terminal session through secure shell or another terminal program. This type of option could be very appealing to small or mid-sized enterprises which cannot afford the cost of having personnel staffed onsite 24 hours a day, seven days a week. The mobile app was built with security in mind and would provide a system administrator a quicker and more direct ability to curtail DoS attacks before they caused greater harm.


2015 ◽  
Vol 3 (1) ◽  
Author(s):  
Vahideh Khadem Hosseini ◽  
Mohammad Taghi Ahmadi

Human body detection is very important especially in the countries prone to earthquakes. Fabry-Perot filter as an ideal option in this field needs to be explored. This filter is useful for detection of objects that have temperature around that of the human body. In the presented research, an optical thin film Fabry-Perot filter (FPF) at the wavelength about 8 um to 14 um is investigated. The important factors on transmission spectrum and the band width of filter are discussed. Additionally structural factors such as layers material and their thickness are explored. Various materials with high and low refractive index are examined by TFCalc3.5 for thin film layers. Germanium (Ge) with the refractive index 4.20 is selected for layer with high refractive index and Silicon Dioxide (SiO2) with the refractive index 1.46 is selected for low refractive index layer. Our simulation results lead to optimum parameters as: Germanium layer with 196nm thickness and Silicon Dioxide layer with 451nm thickness. Simulation of proposed filter indicated that the transfer coefficient is more than 90% in desired spectrum. Filter structure can be used on Infrared detectors to improve their resolutions and detection.


Author(s):  
Addepalli VN Krishna ◽  
Addepalli Hari Narayana ◽  
Kokk Madhura Vani

In this work, a novel mechanism is considered for asymmetric mode of encrypting data. A generator matrix is used to generate a field with a large prime number. The generator matrix, prime number and quaternary vector are used as global variables. Those global variables are used to calculate public key and also sub keys which in turn are used in the ElGamal mode of encryption. The decryption of data is done with Private Key. The proposed algorithm supports the features like authenticity of users, security & confidentiality of data transmitted. The mechanism can well be used in homomorphic encryption where computations are carried out on cipher text and generate an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. Going by the construction of the algorithm, encryption is being done on blocks of data for which it consumes less computing resources. Going by complexity of the algorithm, the key length needed is much less to provide sufficient strength against crypto analysis.


2015 ◽  
Vol 3 (1) ◽  
Author(s):  
Shruti V Jadhav ◽  
Ajay Acharya

Information technology finds its wide application in many fields like healthcare, border security etc. where security of information is very important. With advancement in wireless sensor networks, gathering and processing of data have become much easier and affordable, due to its wide application, providing security to data is required. This work proposes a prototype that uses Raspberry Pi as secure sensor node that performs both regular encryption and XML encryption to provide security to the data collected by sensor nodes and transmit it to the master node in the WSN. The design uses a temperature sensor which can be replaced by any other sensor going forward and can be used in the field of healthcare, border security, and many other areas. The data are collected, processed, encrypted, and wirelessly communicated to the master node. Since there is direct interfacing between the sensor and Raspberry Pi, there is no risk of data loss. The idea of this paper is to meet the goal of comparing the two encryption techniques in terms of processing time and number of characters and to see which is better in terms of both the parameters.


Author(s):  
Sheba Jiju George ◽  
K. R. Remesh Babu

Loon Balloons, the network of balloons which provides Internet for people in rural and remote area, is a recent project undertaken by Google. Though Internet is a global network, large number of people does not have access to it. Loon technology is also helpful in disaster management, e.g.: during floods in Kashmir, where a reliable communication system was not available, Google Loon Balloons could be one of the solutions. These balloons with the help of Wi-Fi technology, help to attain unlimited connectivity to the global community of internet. The Loon Balloons provide connectivity to a ground area of about 40 km in diameter using LTE. Using LTE enabled devices and also through their phones, people can directly access the Internet. Google implemented Loon project in New Zealand in June 2013 as a pilot experiment and now improvements are being made in Loon technology based on the pilot test results.


Sign in / Sign up

Export Citation Format

Share Document