The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The importance of utilizing biometrics to establish personal authenticity and to detect imposters is growing in the present scenario of global security concern. Also the Development of a biometric system for personal identification, which fulfills the requirement for access control of secured areas and other applications like identity validation for social welfare, crime detection, ATM access, computer...
Identity-based Cryptography (IBC) is an exciting alternative to public-key Cryptography (PKC), as it eliminates the need for certificate that is a major issue in PKC. However, IBC suffers from an additional limitation viz. the key escrow problem — that is — a user's private key is generated by the central trusted Key Generation Centre (KGC) — that being a single entity, lends itself to the security...
The WEP (wired equivalent privacy) is an IEEE 802.11's optional stream cipher scheme implemented in its MAC layer for confidentiality of the data frames. It uses RC4 for pn-sequence generation and the same is xored with the plain text and added integrity check value produced by the CRC-32. In this paper, the WEP has been implemented using the Linear Feedback Shift Register (LFSR) as a pn-sequence...
This paper presents a binary Firefly Algorithm (FA), for cryptanalysis of knapsack cipher algorithm so as to deduce the meaning of an encrypted message (i.e. to determine a plaintext from the cipher text). The implemented algorithm has been characterized, in this paper, by a number of properties and operations that build up and evolve the fireflies' positions. These include light intensity, distances,...
Intrusion detection system (IDS) plays a vital role in a computer security scheme as the number of security-breaking attempts originating inside organizations is increasing steadily. In this paper, we describe an architecture of Host based Intrusion Detection System for DoS attack in distributed WLAN (HIDS). The proposed system is an intelligent system that will detect the intrusion dynamically and...
In 1985 a powerful and public-key scheme was produced by ElGamal. ElGamal encryption/decryption algorithm is based on the difficulty of discrete logarithm problem where it is straight forward to raise numbers to large powers but it is much harder to do the inverse computation of the discrete logarithm. Now, there are so many algorithms available which can solve the discrete logarithm problem of small...
Cloud services are generally deployed in dedicated machines within Data-center. A cloud using distributed services and voluntary resources to build up its data center, where storage and computational resources of participating individual machines are harnessed non-intrusively, providing security to resources, services and users are primary objectives. Authentication and authorization are keys to any...
In Ciphertext Policy Attribute Based Encryption (CP-ABE)a previously defined association between the attributes of a user and the ciphertext associated with these attributes is exploited to determine the secret key of the user. However, for a user with multiple attributes, the length of the key depends on the number of attributes. The existing methods that use reasonably computable decryption policies...
RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large number (modulus) is difficult. In RSA if one can factor modulus into its prime numbers then the private key is also detected and hence the security of the cryptosystem is broken. The Subset-Sum cryptosystem (Knapsack Cryptosystem) is also an asymmetric cryptographic...
Visual Cryptography is an encryption technique used to hide visual information in such a way that it can be decrypted by the human visual system, without using any decryption algorithm. There exist various schemes like digital watermarking algorithm etc. In this paper we have proposed a new algorithm to enhance the security in visual cryptography. To achieve this level of security, we have proposed...
The lack of centralised infrastructure in adhoc network makes it vulnerable to various attacks. MANET routing disrupts if the participating node start performing malicious activity instead of the intended function. One such specific attack is a blackhole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. In this paper, we propose a protocol...
Today, the comprehensive protection of a computer network from malware is extremely important. The increasing usage of interactive internet applications in the areas of stock trades, medicine, weather forecasting, banks, businesses, education, defense, research etc. has induced a rise in risks and possibilities of misuse of computer networks. Over the last decade, malicious software or malware in...
The phenomenal growth of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defense are operated. In present era, the Internet is considered as main infrastructure of the global information society. Therefore, the availability of Internet is very critical. Distributed denial-of-service (DDoS) attacks pose an immense threat to the availability...
Cloud Computing has started an era of “shared based IT infrastructure”, in which large pools of computer systems are linked together to provide IT services on “pay per user basis”. It uses virtual resources and hence is not limited by the power and capabilities of local or remote computers. It transforms computer processing, data storage, and software applications, allowing them to be delivered as...
Distributed denial-of-service (DDoS) is a rapidly growing problem. In a typical DDOS attacks a large number of compromised hosts (Zombies) are amassed to send useless packets to jam the victim, or its Internet connection or both. The problem of identifying the attack sources is one of the hardest threats in internet security due to the similarity between the legitimate and illegitimate traffic. Firstly,...
The research on software security is still in its infancy. Moreover, the design phase of software development is much ignored. Though, enough research is done for improvement of object oriented design quality, the improvement of object oriented design security has received little attention. The unavailability of any existing framework for minimization of object oriented design vulnerability has made...
A Delay Tolerant Network (DTN) is a type of Mobile Ad Hoc Network, where end-to-end connectivity between a pair of nodes may never exist. Due to this lack of end-to-end connectivity, traditional routing methods are not suitable in a DTN. However, various approaches have been proposed to achieve message transfer in such a network. This work looks into utilizing the capacity of 802.11n wireless standard,...
A dual band L-strip proximity fed slot loaded rectangular microstrip patch antenna is proposed and investigated theoretically as well as simulated by IE3D. Numerical results for the input impedance, VSWR and return loss are presented and compared with simulated results. The effect on varying height h2, slot width and width of the strip are analyzed to obtained the optimum values for dual band operation...
In optical burst switched (OBS) networks burst scheduling is one of the key issue, which affects the burst loss in the optical networks. Scheduling algorithms utilizes wavelength channels by scheduling burst efficiently and reduces burst losses. Several types of scheduling algorithms such as horizon and void filling are used to schedule bursts. Horizon algorithms consider only unscheduled time whereas...
Sensor Web Services has potential usage in a wide range of application domain. However due to advancement of OGC SWE standard, there are still challenges left that has to be addressed within the context of discovery of Sensor Web Registry services throughout heterogeneous environment which raises several concerns like performance, reliability, and robustness. Many approaches and frameworks have been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.