International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 4, No. 2, Mar. 2012

Cover page and Table of Contents: PDF (size: 121KB)

Table Of Contents

REGULAR PAPERS

Hardware Implementation of Elliptic Curve Cryptography over Binary Field

By Sandeep S.V Hameem Shanavas .I Nallusamy.V Brindha.M

DOI: https://doi.org/10.5815/ijcnis.2012.02.01, Pub. Date: 8 Mar. 2012

This paper presents high-performance Elliptic Curve Cryptography (ECC) architecture over binary field, based on the Montgomery scalar multiplication algorithm. The word-serial finite field arithmetic unit (AU) is proposed with the optimized operation scheduling and bit-parallel modular reduction. With a dedicated squarer, the 163-bit point scalar multiplication with coordinate conversion can be done in 20.9μs by the design of one AU, and can be further improved to 11.1μs by the one of three AUs, both using 0.13μm CMOS technology. The comparison with other ECC designs justifies the effectiveness of the proposed architecture in terms of performance and area-time efficiency.

[...] Read more.
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks

By S. Saqaeeyan M. Roshanzadeh

DOI: https://doi.org/10.5815/ijcnis.2012.02.02, Pub. Date: 8 Mar. 2012

In our presented paper by proposing a optimum routing protocol, in some of Quality of Service achieved improvements in the field of reliability in data sending to destination and load balancing in wireless sensor network. In our proposed protocol, to ensure that a data packet correctly send to the destination, it used of an improved hybrid method based on multipath data sending. The routing decisions in this method are by considering the remaining energy of nodes that are in neighbors of sender nodes. Simulation results shows that release rate of data packets in this method is reduced and reliability in data sending to destination is increased. Also, the energy efficiency of sensor nodes effectively improved and thus increase the overall lifetime of wireless sensor networks.
[...] Read more.
Improved Classification Methods for Brain Computer Interface System

By YI Fang LI Hao JIN Xiaojie

DOI: https://doi.org/10.5815/ijcnis.2012.02.03, Pub. Date: 8 Mar. 2012

Brain computer interface (BCI) aims at providing a new communication way without brain’s normal output through nerve and muscle. The electroencephalography (EEG) has been widely used for BCI system because it is a non-invasive approach. For the EEG signals of left and right hand motor imagery, the event-related desynchronization (ERD) and event-related synchronization(ERS) are used as classification features in this paper. The raw data are transformed by nonlinear methods and classified by Fisher classifier. Compared with the linear methods, the classification accuracy can get an obvious increase to 86.25%. Two different nonlinear transform were arised and one of them is under the consideration of the relativity of two channels of EEG signals. With these nonlinear transform, the performance are also stable with the balance of two misclassifications.

[...] Read more.
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

By M. Anand Kumar S.Karthikeyan

DOI: https://doi.org/10.5815/ijcnis.2012.02.04, Pub. Date: 8 Mar. 2012

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

[...] Read more.
Error Detection & Correction in Wireless Sensor Networks by Using Residue Number Systems

By M. Roshanzadeh S. Saqaeeyan

DOI: https://doi.org/10.5815/ijcnis.2012.02.05, Pub. Date: 8 Mar. 2012

Wireless Sensor Networks have potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a fault tolerant operation is critical to the success of WSNs. The integrity of data has tremendous effects on performance of any data acquisition system. Noise and other disturbances can often degrade the information or data acquired from these systems. Devising a fault-tolerant mechanism in wireless sensor networks is very important due to the construction and deployment characteristics of these low powered sensing devices. Moreover, due to the low computation and communication capabilities of the sensor nodes, the fault-tolerant mechanism should have a very low computation overhead. In this paper we focus our work on low complexity error detection technique which can be implemented with low data redundancy and efficient energy consuming in wireless sensor node by using of Residue Number Systems.

[...] Read more.
A Novel Security Scheme for Secret Data using Cryptography and Steganography

By Phad Vitthal S. Bhosale Rajkumar S. Panhalkar Archana R.

DOI: https://doi.org/10.5815/ijcnis.2012.02.06, Pub. Date: 8 Mar. 2012

With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for distributing new information technology. It is necessary to protect this information while communicated over insecure channels. Thus, a need exists for developing technology that will help protect the integrity of digital content and secure the intellectual property rights of owners. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. In this proposed system we developed high security model by combining cryptographic and Steganographic security. In cryptography we are using advanced encryption standard (AES) algorithm to encrypt secret message and then pixel value differencing (PVD) with K-bit least-significant-bit (LSB) substitution is used to hide encrypted message into truecolor RGB image. Our proposed model gives two tier security to secret data. Further our proposed method gives high embedding capacity and high quality stego images.

[...] Read more.
Semifragile Watermarking Schemes for Image Authentication- A Survey

By Archana Tiwari Manisha Sharma

DOI: https://doi.org/10.5815/ijcnis.2012.02.07, Pub. Date: 8 Mar. 2012

Digital images are very easy to manipulate, store, publish and secondary creation this juggle will lead to serious consequence in some applications such as military image, medical image. So, integrity of digital image must be authenticated. Tools that help us establish the authenticity and integrity of digital media are thus essential and can prove vital whenever questions are raised about the origin of an image and its content. To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication. Semifragile watermarking aim to monitor contents of images not its representations. In present paper various semi fragile water marking algorithm are studied using some image quality matrices, insertion methods used, verification method. Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques.

[...] Read more.
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

By V.K. Narendira Kumar B. Srinivasan

DOI: https://doi.org/10.5815/ijcnis.2012.02.08, Pub. Date: 8 Mar. 2012

Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric and Radio Frequency Identification to support various cryptographic, as this is considered the basic tools to prove the authenticity and integrity of the Machine Readable Travel Documents. The large-scale worldwide PKI is construction, by means of bilateral trust relationships between Countries. Investigate the good practices, which are essential for the establishment of a global identification scheme based on e-passports. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

[...] Read more.