Pub Date : 2018-09-30DOI: 10.14257/ijsia.2018.12.5.03
G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles
{"title":"Analyzing the performance of Various Fraud Detection Techniques","authors":"G. Anamika, K. Mayuri, B. K. K. Reddy, N. Iyengar, Ronnie D. Caytiles","doi":"10.14257/ijsia.2018.12.5.03","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46343077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-30DOI: 10.14257/ijsia.2018.12.5.01
N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies","authors":"N. Thirupathi Rao, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.5.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.5.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46837069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-30DOI: 10.14257/IJSIA.2018.12.5.02
Hazila Hasan, S. Chuprat, M. N. Mahrin
{"title":"Secured Data Partitioning through Sequence based Mapping and Random Order of Data Separation","authors":"Hazila Hasan, S. Chuprat, M. N. Mahrin","doi":"10.14257/IJSIA.2018.12.5.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46759601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-30DOI: 10.14257/IJSIA.2018.12.5.05
Y. Wiseman
The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.
{"title":"Ancillary Ultrasonic Rangefinder for Autonomous Vehicles","authors":"Y. Wiseman","doi":"10.14257/IJSIA.2018.12.5.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.5.05","url":null,"abstract":"The latest fatal accidents of autonomous vehicle happened because of undetected peer vehicles or persons. These fatal accidents call attention to the rangefinder devices which are a very significant component of every autonomous vehicle. The rangefinder is the starting point for the decision whether the vehicle should continue to go, to stop, or bypassing an object. In this paper an ultrasonic based rangefinder device for autonomous vehicles is presented. The device can be used as an ancillary system in addition to standard LIDAR system used by almost all the autonomous vehicles, with the aim of overcoming the obstructions of conventional LIDAR systems.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49550576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-30DOI: 10.14257/ijsia.2018.12.5.04
Chandra Sekhar Musinana, K. Chilukuri, P. Reddy
Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.
动态频谱分配的发展是为了允许备用用户占用频谱漏洞,但当主用户返回时,备用用户必须切换,这就带来了跟踪用户攻击(Tracking User Attack, TUA)等新的安全问题。如果攻击者基于流量分析预测控制信道频率,则TUA可能会阻断认知无线网络(CRN)共享的控制信息。这是一种典型的拒绝服务(DOS)攻击,阻止用户切换到可用通道。在基于集群的信道选择中,集群头将一次接收大约两个用户的信道信息,并发送分配给基站的公共首选信道。基站选择一个信道并将其返回给集群头,集群头将它们返回给请求CR用户。在安全信道选择方面,可以通过基站对信息进行加密,在集群头部进行解密,防止DOS攻击。在这项工作中,我们提出了基于集群优先级的可用通道选择,我们称之为优先集群间通道选择(PICCS)。优先级本质上是根据集群中的攻击者计算出的基于历史的集群声誉。因此,在集群间通道选择期间,我们从最佳可用集群中选择一个通道,而不是随机选择可用通道的集群。我们观察了这种选择在攻击者存在时对延迟和切换的影响,并将其与基于最近可用集群的信道选择方案进行了比较。
{"title":"Secure Prioritized Inter Cluster Channel Selection for Tracking User Attack in Cognitive Radio Networks","authors":"Chandra Sekhar Musinana, K. Chilukuri, P. Reddy","doi":"10.14257/ijsia.2018.12.5.04","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.5.04","url":null,"abstract":"Dynamic spectrum allocation evolved in order to allow the spectrum holes to be occupied by secondary users (SUs), but they have to handoff when primary users (PUs) come back, which brings new security problems like Tracking User Attack (TUA) into consideration. TUA might block the control information shared by a Cognitive Radio Network (CRN), if the attacker predicts the control channel frequency based on traffic analysis. This is a typical Denial of Service (DOS) attack preventing users from handoff to available channels. In cluster based channel selection, cluster heads will receive the channel information, about two users at a time and transmit the common preferred channel that was allocated to the base station. The base station selects a channel and returns it to the cluster head which returns them to the requesting CR users. For secure channel selection, the information could be encrypted by the base station and decrypted at the cluster heads to prevent DOS attacks. In this work, we propose selection of available channels based on the priority of the cluster which we term Prioritized Inter Cluster Channel Selection (PICCS). The priority is essentially the history based reputation of the cluster calculated from the attackers in the cluster. Thus, instead of a random choice of a cluster for the available channel, during inter-cluster channel selection, we select a channel from the best available cluster. We observe the effect of such selection on both the delay and the handoffs in the presence of attackers and compare it with the channel selection scheme based on the nearest available cluster.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46251164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-31DOI: 10.14257/ijsia.2018.12.4.01
N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim
{"title":"Security and Assurance Aspects to be Observed in Cloud Computing Based Data Centers: A Study","authors":"N. Thirupathi Rao, A. Sravani, D. Bhattacharyya, Tai-hoon Kim","doi":"10.14257/ijsia.2018.12.4.01","DOIUrl":"https://doi.org/10.14257/ijsia.2018.12.4.01","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2018.12.4.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49353899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-31DOI: 10.14257/IJSIA.2018.12.4.02
Ayei E. Ibor, F. Oladeji, O. Okunoye
The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.
{"title":"A Survey of Cyber Security Approaches for Attack Detection, Prediction, and Prevention","authors":"Ayei E. Ibor, F. Oladeji, O. Okunoye","doi":"10.14257/IJSIA.2018.12.4.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.02","url":null,"abstract":"The expanding threat landscape has come with a plethora of consequences for most organizations and individuals. This is witnessed in the high volume of cyber-attacks prevalent in the cyberspace. Though several approaches have been proposed and deployed in recent times, most of them are only theoretical masterpieces while others remain computationally infeasible due to the computational requirements for implementing them. Where implementation is possible, the issue of computational complexity becomes a significant overhead in which case a large amount of computing resources such as CPU cycle, memory, network bandwidth and data structures are consumed culminating in tedious, time consuming, and error prone processes. Similarly, most of these techniques are basically reactive and as such can only be triggered when an incident is reported while most depend on the administrator to apply the necessary mitigation processes after an attack has occurred. To this effect, this paper presents a survey of cyber security approaches that have been proposed in the Literature. The paper also reviews the methodologies, strengths and weaknesses of these approaches, and finally identifies areas where further research could focus.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67048212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-31DOI: 10.14257/IJSIA.2018.12.4.03
Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast
The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.
{"title":"A New Fault-Tolerant Clustering Protocol for Wireless Sensor Networks","authors":"Mehdi Nazari Cheraghlou, A. K. Zadeh, M. Haghparast","doi":"10.14257/IJSIA.2018.12.4.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.4.03","url":null,"abstract":"The major restriction of wireless sensor networks is represented by the energy requirements of the nodes. Also, the main challenge of these networks is their faulttolerance feature since the nodes are scattered in remote, inaccessible areas. Therefore, these issues must be the main concern of the management of the network nodes and all the proposed protocols must be evaluated based on a fault-tolerance capacity and handling basic network restrictions. In this article, we introduce a new fault-tolerant clustering network consisting of two sections: in the first phase, the clustering configuration takes place, and in the second phase, we create a fault-tolerant management architecture that employs fault detection and recovery mechanisms. In the proposed protocol, besides improving the network faulttolerance capacity, the impossibility of recharging nodes was a design factor. Thus, energy conservation and an increased network lifetime are two consequences related to the implementation of our proposed algorithm. The evaluations and comparisons prove that the proposed model in addition to increasing the network nodes' fault-tolerance capacity reduces the overall network energy consumption and lays the foundation for extending the network lifetime.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2018.12.4.03","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47467602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.04
Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari
{"title":"KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level","authors":"Muhammad Salman, Rizki Yugitama, Amiruddin, R. F. Sari","doi":"10.14257/IJSIA.2018.12.3.04","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.04","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.14257/IJSIA.2018.12.3.03
Ahmed Khan, Aaliya Sarfaraz
The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.
{"title":"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2018.12.3.03","url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41751992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}