IJCNIS Vol. 9, No. 6, Jun. 2017
Cover page and Table of Contents: PDF (size: 174KB)
REGULAR PAPERS
The IEEE 802.15.4 standard is considered as the most notorious MAC layer for wireless sensor networks (WSNs) in both centralized and distributed context. For instance, in multi hop environment, the beaconless IEEE 802.15.4 is used. Several works evaluated the performance of the beaconless IEEE 802.15.4 in terms of average delay, average energy consumption, throughput etc. But, none of the existing studies derived accurate energy consumption bounds of this MAC layer. In this paper, our contribution is twofold. We first propose a comprehensive energy consumption analysis of the unslotted CSMA/CA algorithm. The results are validated through simulation. Then, we exploit our analysis to propose a cross layer routing scheme that enhances the native PEGASIS protocol. Our scheme called Average Energy Enhanced PEGASIS (AE2-PEGASIS) considers the average energy consumption at the MAC layer when constructing the routes to the sink.
[...] Read more.An effective security system is designed and implemented through the application of embedded systems and the Internet of Things (IoT). The main goal of this work is to present the IoT system and modern technology systems / embedded intelligent networks. IoT is the technology of the future in contact machine / machine device / machine is possible thanks to the electronics, sensor technology, software and connectivity system to enable these items to collect and exchange data. Embedded system is a real-time mainframe structure on a particular task, an automatic or electrical system including, often within the limits of real-time raking as sensors, modules with microcontrollers, etc...This is integrated with sensor main server and GSM global system For mobile), it is able to send data and IP addresses through SMS message. This will facilitate the identification of the unknown person embedded in real-time in these devices. The video data are transferred to another back-end server via TCP (Transmission Control Protocol) of the device. This server collects data and provides HTTP Web. A browser is used to view data and can be remotely controlled. This type is giving an idea about the probability and effectiveness of the system, this thesis presents the results of the investigation into the security system and some realistic implementations.
[...] Read more.Brute-force attacks are known to be the promising way to break into even most complicated systems by trying every possible permutation of the keys. But since cryptosystems began to use longer and more complex keys, brute-force attacks has lost their usability, because of relatively high complexity of trying every possible permutation with respect to computational power and computation time that was available to crypto breakers. Although computational power is increasing continuously, its increasing rate is less than that of key length and complexity. Having these assumptions in mind, it is infeasible for centralized traditional computing architectures with limited computation power to break into modern cryptosystem by compromising the key with implementing schemes like conventional brute-force. In this paper authors aim for devising a novel brute-force scheme which integrates a modern computing architecture (grid computing) with botnets in order to perform brute-force attacks with lower computation time and lower equipment cost for individual cryptobreakers who have no access to supercomputers. In summary, GCDBF uses a portion of computation power of each of the infected nodes belonging to a botnet in a grid-based environment in order to process a portion of total workload of a brute-force attack which is needed for breaking a specific key. This approach neutralizes the need of acquiring supercomputers for individual hackers while reducing the required time for breaking the key because of using grid computing architecture. For the purpose of evaluation, GCDBF is implemented in different scenarios to prove its performance in comparison to centralized brute-force scheme.
[...] Read more.In this paper the method of network-centric monitoring of cyberincidents was developed, which is based on network-centric concept and implements in 8 stages. This method allows to determine the most important objects for protection, and predict the category of cyberincidents, which will arise as a result of cyberattack, and their level of criticality.
[...] Read more.Sensor nodes present in WSN plays its crucial role in sensing, processing and communicating data in brutal conditions. Power source like battery is required by these nodes for energy, which got sucked out in the processes like aggregation, compression and communication of sensed data. Extensive flaws seen now days are energy source constraints. After deploying nodes in nasty environment, worthwhile a battery is not rehabilitate. Therefore, proliferate usage of energy to enhance network lifetime is main issue. To clear up this trouble various clustering techniques are popularized. In clustering, sensor nodes group together to generate small clusters and CH is elected for aggregating data coming from cluster members. For large networks, hierarchical clustering model is applicable to assemble data at every cluster and transmit that processed data to the base station. This phase out repetitious data to be communicated which further curtail energy consumption. Various LEACH protocols are discussed in this review to enhance network lifetime.
[...] Read more.Mobile Cloud Computing (MCC) is a paradigm that integrates Cloud Computing and Mobile Computing to deliver a better Quality of Experience (QoE) and Quality of Service (QoS) to mobile users and cloud subscribers. Mobile Cloud Computing (MCC) inherited resource limitation from Mobile Computing which was solved with Cloud Computing. Meanwhile, Cloud Computing has inherent problems such as privacy of user’s data stored on cloud, intrusion detection, platform reliability, and security threats caused by multiple virtual machines. Thus, hindering the growth and the full acceptance of Mobile Cloud Computing (MCC) by subscribers. However, using a signature based hybrid cryptography ensures confidentiality, integrity, authentication and non-repudiation on resource-poverty devices used in Mobile Cloud Computing. This paper presents a data protection scheme where data is encrypted using a hybrid cryptographic algorithm which is composed of Advanced Encryption Standard (AES), Blake2b and Schnorr signature before being stored in the cloud storage (Amazon Simple Storage Server). Thus, data confidentiality, integrity, authentication and non-repudiation are ensured.
[...] Read more.Software Defined Network (SDN) is more dynamic, manageable, adaptive and programmable network architecture. This architecture separates the control plane from the forwarding plane that enables the network to become directly programmable. The programmable features of SDN technology has dramatically improved network efficiency and simplify the network configuration and resource management. SDN supports Open-Flow technology as forwarding function and centralized control successfully. Wireless environment has recently added to the SDN infrastructure that has rapidly emerged with Open-Flow protocol. To achieve more deterministic network behaviors, QoS provisioning is a necessary consideration. In this paper, the Spanning Tree Protocol (STP) has applied on a SDWN and then analyzed the Quality of Service (QoS) using Mininet-Wifi. STP protocol is used to suppress the occurrence of broadcast streams and observe the performance of the QoS parameters. Various parameters that determine QoS, such as, bandwidth utilization, packet transmission rate, round trip time, maximum obtained throughput, packet loss ratio, delay time is analyzed for different base stations defined in the SDWN architecture.
[...] Read more.