International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 16, No. 6, Dec. 2024

Cover page and Table of Contents: PDF (size: 156KB)

Table Of Contents

REGULAR PAPERS

Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution

By Akhramovych Volodymyr Lehominova Svitlana Stefurak Oleh Akhramovych Vadym Chuprun Sergii

DOI: https://doi.org/10.5815/ijcnis.2024.06.01, Pub. Date: 8 Dec. 2024

For the first time was researched the dynamic models of the data defensive system (DMDDS) in social networks (SN) from the volumes of development of social networks (VSNE) were investigated and the reliability of the data defensive system (RDDS), which indicates the academic achievements of this work. 
Created DMDDS in CN from the conditions of RDDS. In the DMDDS, currently known opportunities, actions and technologies are involved, for which the modality of uncertainty is confirmed as a state of a defined condition on a time grid, and this relationship interprets the transformation of the previous state over time. 
SN is a set of actors and their types of communications. Actors can be people themselves, their subgroups, associations, settlements, territories, continents. The form of interaction includes not only the transmission and reception of information, but also communication, exchange of opportunities and types of activities, including controversial points and views. 
From the point of view of mathematics, a prototype of the DMDDS was developed on the basis of nonlinear differential equations (NDE) and its transcendental review was carried out. Transcendental review of dynamic models of DMSDD in SN proved that parameters of VSNE significantly influence data defensives (DD) at possible value values - up to one hundred percent.
The phase types (PT) of DD have been checked, which prove RDDS in the working volume of values even at the maximum values of negative excitations.
For the first time the research of the developed NDE systems was conducted and the quantitative values between the VSNE parameters and the DD values, as well as the RDDS, were shown, which indicates the theoretical and practical value of the scientific work and its significance for the further development of scientific research in the field of SN.
The proposed model will contribute to increasing the quality and reliability of DD in SN around the world.

[...] Read more.
Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network

By Satish S. Bhojannawar Shrinivas R. Managalwede Carlos F. Cruzado

DOI: https://doi.org/10.5815/ijcnis.2024.06.02, Pub. Date: 8 Dec. 2024

Wireless mesh networks (WMNs) extend and improve broadband Internet connectivity for the end-users roaming around the edges of the wired network. Amid the explosive escalation of users sharing multimedia content over the Internet, the WMNs need to support the effective implementation of various multimedia applications. The multimedia applications require assured quality of service (QoS) to fulfill the user requirements. The QoS routing in WMNs needs to guarantee the QoS requirements of multimedia applications. Admission control (AC) is the primary traffic control mechanism used to provide QoS provisioning. AC admits a new flow only if the QoS requirements of already admitted flows are not violated, even after the admission of a new flow. We propose a new QoS routing protocol integrated with AC called Delay-Sensitive QoS Routing with integrated Admission Control (DSQRAC) to control the admission of delay-sensitive flows. A delay-aware cross-layer routing metric is used to find the feasible path. DSQRAC is implemented using ad-hoc on-demand distance vector (AODV) routing protocol, where a delay-sensitive controlled flooding mechanism is used to forward the route request packets. In the proposed work, we adjust/reassign the channels to aid the QoS routing to increase the likelihood of accepting a new flow. The simulation results show that the performance of the proposed QoS routing protocol is better than the existing schemes.

[...] Read more.
Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System

By Ahmed Mounsif Kebir Asmaa Boughrara

DOI: https://doi.org/10.5815/ijcnis.2024.06.03, Pub. Date: 8 Dec. 2024

In blockchain technology, copyright protection can be achieved through the use of smart contracts and decentralized platforms. These platforms can create a tamper-proof, timestamped record of the creation and ownership of a work, as well as any subsequent transactions involving that work. The choice of platform or type of blockchain is mainly dependent upon the type of consensus algorithm. This article presents a novel approach to copyright protection using blockchain technology. The proposed approach introduces a new consensus mechanism called Proof of Notoriety (PoN) to enhance the security and efficiency of copyright registration and verification processes.
The Proof of Notoriety consensus mechanism leverages notoriety scores to determine the validity and credibility of the participants in the copyright registration process. Participants with higher notoriety scores are given more weightage in reaching a consensus on the validity of copyright claims. This ensures that only reputable entities are responsible for registering and verifying copyright, thereby reducing the risk of fraudulent claims and unauthorized use.

[...] Read more.
ANTMAC: Addressing Novel Congestion Technique Hybrid Model for Collision Control in IoT-based Environments using Contention-based MAC Protocol

By Rabindra Kumar Shial Premanshu Rath Sudhir Ranjan Patnaik Sarat Chandra Nayak Umashankar Ghugar

DOI: https://doi.org/10.5815/ijcnis.2024.06.04, Pub. Date: 8 Dec. 2024

In the communication model of the OSI layer, the Media access control (MAC) layer has been given higher priority than other layers. It is a sub-layer of the data link layer, mainly controlling the physical equipment and interacting with the channels over the Internet of Things (IoT) sensor nodes. Mac layers have used two protocol types: contention-based and contention-free during transmission. These two protocols have controlled the physical equipment and data transmission for the last decade. Yet in the MAC layers transmission, some challenging issues are complicated to resolve. Data collisions are the significant changing issues at the MAC layer. As per the survey of researchers, the contention-based protocol is more affected by collision due to allowing the sharing of channels to all nodes over networks. As a result, it has got message delay, demanding more energy, data loss, and retransmission. The researcher always focuses on reducing collision during transmission to overcome these issues. They mainly evaluate the priority-based collision control using the contention-based protocol. In this ANTMAC model, we have considered the lower energy nodes’ priority to enhance the likelihood that a node will gain access to the transmission channel before its power and batteries run out. Our recommended method ANTMAC outperforms ECM-MAC in terms of content retrieval time (CRT), total no of retransmission (TNR), total energy consumption (TEcm), throughput and network lifetime (NLT).

[...] Read more.
Two-factor Mutual Authentication with Fingerprint and MAC Address Validation

By J.S. Jolin A. Theophilus A. Kathirvel

DOI: https://doi.org/10.5815/ijcnis.2024.06.05, Pub. Date: 8 Dec. 2024

Mobile Ad hoc NETworks (MANET), unlike typical wireless networks, may be used spontaneously without the need for centralized management or network environment. Mobile nodes act as mediators to help multi-hop communications in such networks, and most instances, they are responsible for all connectivity tasks. MANET is a challenging endeavor because these systems can be attacked, which can harm the network. As a result, security concerns become a primary factor for these types of networks. This article aims to present an efficient two-factor smart card-based passcode authentication technique for securing legitimate users on an unprotected network. This scheme enables the password resetting feature. A secured mechanism for sharing keys is offered by using the hash function. We present a new two-factor mutual authentication technique based on an entirely new mechanism called the virtual smart card. Compared to authentication, the proposed method has fewer computation processes but is more time efficient since it is based on a hash function. Additionally, this approach is resistant to most attacker behaviors, such as Mutual authentication, Gateway node bypassing attacks, DoS attacks, replay attacks, Man in the middle attacks, and stolen smart device attacks. Experimental results validate the efficiency of this scheme, and its security is also analyzed.

[...] Read more.
GDAR: A Secure Authentication for Dapp Interoperability in Blockchain

By Surekha Thota Shantala Devi Patil Gopal Krishna Shyam Bhanu Prasad

DOI: https://doi.org/10.5815/ijcnis.2024.06.06, Pub. Date: 28 Dec. 2024

Enterprises are adopting blockchain technology to build a server-less and trust-less system by assuring immutability and are contributing to blockchain research, innovation, and implementation. This led to the genesis of various decentralized blockchain platforms and applications that are unconnected with each other. Interoperability between these siloed blockchains is a must to reach its full potential. To facilitate mass adoption, technology should have the ability to transact between various decentralized applications (dapps) on the same chain, integrate with existing systems, and initiate transactions on other networks. In our research, we propose a secured authentication mechanism that enables various decentralized applications on the same chain to interact with each other using a global dapp authentication registry (GDAR). We carried out an in-depth performance evaluation and conclude that our proposed mechanism is an operative authentication solution for dapp interoperability.

[...] Read more.
An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks

By Shridhar Sanshi Ramesh Vatambeti Revathi V. Syed Ziaur Rahman

DOI: https://doi.org/10.5815/ijcnis.2024.06.07, Pub. Date: 8 Dec. 2024

In the realm of wireless network security, the role of intrusion detection cannot be overstated in identifying and thwarting malicious activities within communication channels. Despite the existence of various intrusion detection system (IDS) approaches, challenges persist in terms of accurate classification and specification. Consequently, this article introduces a novel and innovative approach, the African Vulture-based Modular Neural System (AVbMNS), to address these issues. This research aims to detect and categorize malicious events in wireless networks effectively. The methodology begins with preprocessing the dataset and extracting relevant features. These extracted features are then subjected to a novel training technique to enhance the detection and classification of network attacks. The integration of African Vulture optimization significantly enhances the detection rate, leading to more precise attack identification. The research's effectiveness is demonstrated through validation using the NSL-KDD dataset, with impressive results. The performance analysis reveals that the developed model achieves a remarkable 99.87% detection rate and 99.92% accuracy when applied to the NSL-KDD dataset. Furthermore, the outcomes of this novel model are compared with existing approaches to gauge the extent of improvement. The comparative assessment affirms that the developed model outperforms its counterparts, underscoring its effectiveness in addressing the challenges of intrusion detection in wireless networks.

[...] Read more.
Anti-jamming and Power Minimization Interference Nulling in Uplink MIMO-NOMA Technique

By Suprith P. G. Mohammed Riyaz Ahmed Mithileysh Sathiyanarayanan

DOI: https://doi.org/10.5815/ijcnis.2024.06.08, Pub. Date: 8 Dec. 2024

Non-orthogonal Multiple Access (NOMA) provides use of the power domain to boost system efficiency in the spectrum. This letter explores the use of a new transceiver design and non-orthogonal multiple access (NOMA) for MIMO uplinks. The overall energy use can be reduced while still meeting individual rate requirements by utilizing a new NOMA implementation scheme with group interference cancellation. Jamming attacks can target NOMA communication. MIMO technology is used to implement anti-jamming regulations in NOMA systems. While subsequent interference cancellation utilized to get rid of between groups interference, interference nulling at the transmitters and equalizers at the jointly designed receivers for improved power system efficiency. Where the transmitter is side, interference nulling techniques have been developed. By using the above technique, the total power consumption (dBm) which it required which it is less when compare to traditional technique like orthogonal multiple access (OMA). The outcomes of the simulation show that, in comparison to both signal alignment NOMA and orthogonal multiple-use communication, the proposed NOMA scheme typically requires less power.

[...] Read more.
A Novel GAN-based Chaotic Method with DNA Computing for Enhancing Security of Medical Images

By Anita Murmu Piyush Kumar

DOI: https://doi.org/10.5815/ijcnis.2024.06.09, Pub. Date: 8 Dec. 2024

Medical images are utilized to diagnose patients' health conditions. Nowadays, medical images are sent over the internet for diagnosis purposes. So, they should be protected from cyber attackers. These medical images are sensitive to any minor changes, and the data volume is rapidly increasing. Thus, security and storage costs must be considered in medical images. Traditional encryption and compression methods are ineffective for encrypting medical images due to their high execution time and algorithm complexity. In this paper, a novel 2D-chaos and Generative Adversarial Network (GAN) with DeoxyriboNucleic Acid (DNA) computing is proposed for generating encryption keys and improving the security of medical images. The proposed scheme uses GAN and 2D-chaos to generate the private key and diffusion process. The pixel values of the original images in the proposed schemes are shuffled using Mersenne Twister (MT) to improve the security of medical images. Moreover, the novel 2D-Chaotic Tent Map (2D-CTM) method is used to construct the key while performing XOR-based encryption. The proposed model has been tested on different medical images, namely the COVIDx-19 X-ray images, the malaria microscopic images, and the brain MRI images. The experiment results have been evaluated using performance metrics, namely key space, histogram analysis, entropy, key sensitivity, robustness analysis, correlation, SSIM, and MS-SSIM. The outcomes demonstrate that the proposed scheme is more effective than the state-of-the-art schemes.

[...] Read more.
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization

By Rajit Ram Yadava Ranvijay Ranvijay

DOI: https://doi.org/10.5815/ijcnis.2024.06.10, Pub. Date: 8 Dec. 2024

Wireless sensor networks (WSNs), which provide sensing capabilities to Internet of Things (IoT) equipment with limited energy resources, are made up of specialized transducers. Since substitution or re-energizing of batteries in sensor hubs is extremely difficult, power utilization becomes one of the pivotalmattersin WSN. Clustering calculation assumes a significant part in power management for the energy-compelled network. Optimal cluster head selection suitably adjusts the load in the sensor network, thereby reduces the energy consumption and elongates the lifetime of assisted sensors. This article centers around to an appropriate load balancing and routing technique by the utilization recently developed of Elephant Herding Optimization (EHO) algorithm that alternates the cluster location amongst nodes with the highest energy. The Scheme considered various parameter residual energy, initial energy and an optimum number of cluster head for the next cluster heads selection. The proposed model increases the lifetime of the network by keeping more nodes active even after the 2700th round. The experiment results of the trials show that the proposed EHO-based CH selection strategy outperforms the cutting-edge CH selection models. 

[...] Read more.