International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 13, No. 2, Apr. 2021

Cover page and Table of Contents: PDF (size: 270KB)

Table Of Contents

REGULAR PAPERS

Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain

By Alexandr Kuznetsov Inna Oleshko Vladyslav Tymchenko Konstantin Lisitsky Mariia Rodinko Andrii Kolhatin

DOI: https://doi.org/10.5815/ijcnis.2021.02.01, Pub. Date: 8 Apr. 2021

A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.

[...] Read more.
An Efficient Route Failure Detection Mechanism with Energy Efficient Routing (EER) Protocol in MANET

By D. S. Jayalakshmi D. Hemanand G. Muthu Kumar M. Madhu Rani

DOI: https://doi.org/10.5815/ijcnis.2021.02.02, Pub. Date: 8 Apr. 2021

Mobile ad-hoc network (MANET) is a network with two or more number of nodes with restricted energy constraint. The high dynamic nature in MANET attracts needs to consider the energy efficient features in their construct. The routing protocol is an important criterion to be considered for evaluating the performance of the MANET. Energy consumption plays vital role in MANET. Hence designing the scheme that supports energy efficient is much needed for the high dynamic MANET environment concerned. This paper proposes the Energy Efficient Routing (EER) protocol based on efficient route failure detection. The Scope of this paper is to suggest a fresh routing procedure for Mobile Ad-hoc Network minimizes unsuccessful communication. The projected procedure practices three important criterions to locate the path that assure authentic communication. The channel caliber, connection caliber and node’s residual energy is important reason for the failure of the node in MANET. Hence, the suggested routing mechanism believes these three different parameters to choose the finest node in the route. The reliable transmission and reception are attained by transferring information through route nominated by the suggested system verified by means of NS-2 simulator.

[...] Read more.
An Optimized Protocol of M2M Authentication for Internet of Things (IoT)

By Mohamed M. Samy Wagdy R. Anis. Ahmed A. Abdel-Hafez Haitham D. Eldemerdash

DOI: https://doi.org/10.5815/ijcnis.2021.02.03, Pub. Date: 8 Apr. 2021

The Internet of Things (IoT) consists of sensors, networks, and services to connect and control production systems. Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices are enabled to exchange information with each other in an autonomous way without human intervention. Resource-Constrained Devices (RCD) have found an expanding demand in the Internet of Things (IoT) applications as these gadgets are essentially working with delicate information. Thus, information security has ended up vital for both makers and clients. However, the creation of defenseless gadgets still challenging regarding the restriction of involved assets especially with the attackers ‘continuous trials to misuse these restrictions chasing important information. Hence, connecting an open key crypto-system becomes a must to extend gadget proficiency and relieve the chance of touchy data loss. Deployments of Elliptic curve cryptography (ECC) are fundamentally an open key crypto-system with the basic distinction of speedier advancing capacity whereas yielding an assortment of distinctive approaches to the arrangement of the cryptographic calculation. We will submit a proposed protocol to overcome the demands of information security and the speed of data circulation. The proposed protocol is characterized by low computational cost, communication and storage overhead, while achieving mutual authentication, session key agreement, device’s identity confidentiality, and resistance against various attacks.

[...] Read more.
Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization

By M. Selvi B. Ramakrishnan

DOI: https://doi.org/10.5815/ijcnis.2021.02.04, Pub. Date: 8 Apr. 2021

Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.

[...] Read more.
A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS

By Vinay D R Ananda Babu J

DOI: https://doi.org/10.5815/ijcnis.2021.02.05, Pub. Date: 8 Apr. 2021

Most of the present hiding techniques on video are considered over plaintext domain and plain video sequences are used to embed information bits. The work presented here reveals the novelty for information embedding in a video sequence over the ciphered domain. The carrier video signal is encrypted using chaos technique which uses multiple chaotic maps for encryption. The proposed reversible video information hiding scheme (RVIHS) exhibits an innovative property that, at the decoding side we can perfectly extract the information along with carrier video without any distortion. The public key modulation is a mechanism used to achieve data embedding, where as in secret key encryption is not required. The proposed approach is used to differentiate encoded and non-encoded picture patches at decoder end by implementing 2 class Support Vector Machine grouping. This helps for us to retrieve the original visual sequence with embedded message and to scale up embedding capacity. The experiment is conducted using real time videos for embedding the information. The outcome of proposed work bring about best embedding capacity, compared to existing techniques.

[...] Read more.