Pub Date : 2017-12-31DOI: 10.14257/ijsia.2017.11.12.03
R. Saini, Ritika
{"title":"Security Solution for Secure Communication for Cross Layer Design in WSN","authors":"R. Saini, Ritika","doi":"10.14257/ijsia.2017.11.12.03","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.12.03","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42809227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-31DOI: 10.14257/IJSIA.2017.11.12.05
A. Tyagi, Sreenath Niladhuri
{"title":"ISPAS: An Intelligent, Smart Parking Allotment System for Travelling Vehicles in Urban Areas","authors":"A. Tyagi, Sreenath Niladhuri","doi":"10.14257/IJSIA.2017.11.12.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.12.05","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46527210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/ijsia.2017.11.11.04
Sagarika Borah, B. Borah
Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.
{"title":"Evaluation Metrics used in 3D Mesh Watermarking: A Study","authors":"Sagarika Borah, B. Borah","doi":"10.14257/ijsia.2017.11.11.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.11.04","url":null,"abstract":"Three Dimensional (3D) models are watermarked to protect their ownership information and to maintain the integrity while transmitted over networked communication. These watermarking operations change the mesh details during data embedding, which in turn affects the perceptual quality or geometrical details of the mesh. There are two different situations where a mesh watermarking technique needs to be evaluated. One of them is to make sure that the watermark embedding function induces minimal perceptual distortion to the original model and the second situation is assessing the similarity between the extracted watermark and the original one to estimate robustness of the watermarking scheme. However surface mesh quality is assessed in two ways: subjective way (observation directly from the human) or objective way where some metrics are formulated by researchers to measure the mesh quality that can meet the human observation. This study covers a detailed discussion of various objective mesh quality assessment metrics proposed for detecting the mesh degradation due to different classes of watermarking techniques. Robustness estimation metrics to assess the similarity of watermarks are also discussed.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/ijsia.2017.11.11.04","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45588755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJSIA.2017.11.11.03
M. Q. Saleem
Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.
{"title":"Security Problems of SOA Applications","authors":"M. Q. Saleem","doi":"10.14257/IJSIA.2017.11.11.03","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.03","url":null,"abstract":"Service Oriented Architecture has gained the popularity in the market because workflows of a business process can easily be realized by the composition of services. Post-development stages express the real strength of the SOA paradigm when a new business process can be realized by just composing existing services and a new application is developed by just assembling existing reusable services. However; due to increase in the number of services, connectivity between the services also increases which causes the rise of the security risk exponentially. Security, which is one of the most important aspects of any software system, is often neglected or given less importance while developing SOA applications. This paper compiled the work of different researchers working in the area of SOA security. The focus of the paper is to present the security problems of SOA applications highlighted by the several authors. These security problems must be addressed for the development of secure Services Oriented applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44210226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJSIA.2017.11.11.02
M. Al-Muhammed, R. A. Zitar
Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.
{"title":"Dynamic Text Encryption","authors":"M. Al-Muhammed, R. A. Zitar","doi":"10.14257/IJSIA.2017.11.11.02","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.02","url":null,"abstract":"Although many encryption algorithms achieve high levels of security, they adopt a static computational behavior that is ensured only by the secret key. If the key is predicted, the ciphered text can be easily decrypted, and thus it is unclear how the security of these algorithms will play out given the tremendous increase in processor power and the availability of sophisticated tools that can analyze ciphered text and predict a key. This paper proposes a dynamic approach to encryption in which a static knowledge of symbols and mapping tools is defined, but also in which the computations of the algorithm, and consequently the encryption, is dynamically controlled by adjusting the behavior of the operations. In addition to a key, the dynamic behavior of the algorithm provides additional tools such as masking and mapping rules to protect ciphered. Experiments conducted with our prototype implementation showed that our system is effective with linear execution time and fixed space requirements.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47140095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJSIA.2017.11.11.01
Farhan Tariq, S. Baig
This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.
{"title":"Machine Learning Based Botnet Detection in Software Defined Networks","authors":"Farhan Tariq, S. Baig","doi":"10.14257/IJSIA.2017.11.11.01","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.01","url":null,"abstract":"This paper proposed a flow-based approach to detect botnet by applying machine learning algorithms to software defined networks without reading packet payload. The proposed work uses network flows as input and process it in two windows based modules to extract a statistical feature set to be used for classification. The first module process network flow stream to extract flow traces. The window size of this module is 10 which means a flow trace with 10 flows is considered as a trace of interest and forwarded to the next module for further processing. The second module processes the selected trace and fetches historical flows in last 60-minute window for the source and destination IPs of the trace. The feature set is extracted from selected trace and relevant historical flows. The approach applies supervised decision tree based machine learning algorithm to create a model during a training phase using extracted feature set. This model is then used to classify flow traces during the testing phase. The dataset for experimentation is extracted from publicly available real botnet and normal traces. The experimental findings show that the method is capable to detect unknown botnet. The results show detection rate of 97% for known botnets and 90% for unknown botnets.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.01","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47055728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJSIA.2017.11.11.05
A. Bashir, A. H. Mir
Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.
{"title":"Securing Publish-Subscribe Services with Dynamic Security Protocol in MQTT Enabled Internet of Things","authors":"A. Bashir, A. H. Mir","doi":"10.14257/IJSIA.2017.11.11.05","DOIUrl":"https://doi.org/10.14257/IJSIA.2017.11.11.05","url":null,"abstract":"Rapid developments in the field of embedded system, sensor technology, IP addressing and wireless communication are driving the growth of Internet of Things (IoT) in a variety of applications which include environment monitoring, smart manufacturing, e-health and smart agriculture. Due to heterogeneous and constrained nature of IoT nodes, many new security and privacy issues are introduced. IoT devices and systems collect a lot of private data about people, for example an intelligent meter knows when you are home and what devices you use when you are there. This data is shared with other devices and also stored in database or cloud server. Absence of security protocols for these resource constrained smart devices averts their widespread implementation. To address this problem, we propose a mechanism for securing application layer MQTT (Message Queue Telemetry Transport) protocol messages in IoT. The proposed security method for Internet of Things is lightweight in nature and suits well for resource constricted devices. The proposed method counters most of the likely confidentiality attacks in IoT.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.14257/IJSIA.2017.11.11.05","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41837644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijsia.2017.11.10.04
S. Zaidi, Samreen Hussain
Information security is one of the main challenges faced today in purview of the increase in trend of online purchases. Many ciphering schemes are available that provide data encryption. But the strength of stream ciphers available is very squat as compared to block ciphers. To ensure better security, block ciphers are used in various ways for streaming application at the cost of increased computational load. This paper discusses the implementation of AES-128 in output feedback (OFB) mode for real-time streaming applications. The target performance parameter for the implementation of the algorithm is speed as well as reduced memory resources. Implementation techniques for various blocks of the algorithm have been discussed for achieving the target performance. The implementation is functionally tested on Virtex – 6 FPGA. The performance achieved in terms of latency, speed, memory resources and other logic resources is also presented. This shows the effectiveness of the proposed hardware implementation for real-time streaming cipher applications.
{"title":"Fast Hardware Implementation of AES-128 Algorithm in Streaming Output Feedback Mode for Real Time Ciphering","authors":"S. Zaidi, Samreen Hussain","doi":"10.14257/ijsia.2017.11.10.04","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.04","url":null,"abstract":"Information security is one of the main challenges faced today in purview of the increase in trend of online purchases. Many ciphering schemes are available that provide data encryption. But the strength of stream ciphers available is very squat as compared to block ciphers. To ensure better security, block ciphers are used in various ways for streaming application at the cost of increased computational load. This paper discusses the implementation of AES-128 in output feedback (OFB) mode for real-time streaming applications. The target performance parameter for the implementation of the algorithm is speed as well as reduced memory resources. Implementation techniques for various blocks of the algorithm have been discussed for achieving the target performance. The implementation is functionally tested on Virtex – 6 FPGA. The performance achieved in terms of latency, speed, memory resources and other logic resources is also presented. This shows the effectiveness of the proposed hardware implementation for real-time streaming cipher applications.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41278247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijsia.2017.11.10.01
Shin-Yan Chiou
Cloud storage is widely used and has become prevalent over the past decade. It has very desirable properties such as scalability, fault tolerance, robustness, and data availability and accessibility. Several Cloud index structures have been proposed for equality queries, range queries, or other purposes. However, Cloud system is fraught with security risks and many security issues still exist in Cloud system. For solving these security issues, in our paper, we propose a secure and balanced storage system for Cloud system. The system offers load balance, secrecy, integrity, and robustness for data protection. It is efficient, reliant, resilient and scalable.
{"title":"A Secure Distributed Cloud Storage System Achieving Data Secrecy and Load Balance","authors":"Shin-Yan Chiou","doi":"10.14257/ijsia.2017.11.10.01","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.01","url":null,"abstract":"Cloud storage is widely used and has become prevalent over the past decade. It has very desirable properties such as scalability, fault tolerance, robustness, and data availability and accessibility. Several Cloud index structures have been proposed for equality queries, range queries, or other purposes. However, Cloud system is fraught with security risks and many security issues still exist in Cloud system. For solving these security issues, in our paper, we propose a secure and balanced storage system for Cloud system. The system offers load balance, secrecy, integrity, and robustness for data protection. It is efficient, reliant, resilient and scalable.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46920135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijsia.2017.11.10.02
S. K. Srivastava, B. Mishra, B. Mishra
{"title":"Two Time Delay Quarantine Model for the Transmission of Worms in Wireless Network","authors":"S. K. Srivastava, B. Mishra, B. Mishra","doi":"10.14257/ijsia.2017.11.10.02","DOIUrl":"https://doi.org/10.14257/ijsia.2017.11.10.02","url":null,"abstract":"","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41520685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}