Vol. 11 No. 7 JUL 2013

Vol. 11 No. 7 JULY 2013 International Journal of Computer Science and Information Security

Publication JULY 2013, Volume 11 No. 7 (Download Full Journal) (Archive) (Download 2)

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. Paper 30061315: Patterned & Protected AODV Against Blackhole, Wormhole and Greyhole Attacks in convalescing Routing for Ad-hoc Network (pp. 1-5)

Full Text: PDF

.

Khyati Choure, PG-Scholar, DoCSE, OIST, Bhopal, India

Sanjay Sharma, Assistant Professor, DoCSE, OIST, Bhopal, India

.

Abstract— In this research work, AODV has been modified in such a way to improve its security feature. Obviously, performance has been improved in terms of Throughput and Packet Delivery Ratio, Avg, end-to-end Delay and Routing Overhead. A simulation has been performed to achieve better performance of modified New-AODV in presence of different attackers. Better results have been generated in terms of Throughput and Packet Delivery Ratio.

.

Keywords: Throughput, End-To-End Delay, AODV, PDR, Routing Overhead, Attacks.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Paper 30061321: Rule Based Approach for Keystroke Biometrics to identify authenticated user (pp. 6-13)

Full Text: PDF

.

Kulwinder Singh, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab, India

Harjeet Kaur, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar, Punjab, India

.

Abstract — Advancement in the field of Information Technology makes information security is an inseparable part of it. Biometric technologies are very reliable for providing authentication and verification. So, in order to deal with security, Authentication plays an important role. This paper investigates the study of keystroke dynamics to identify individuals based on their typing rhythm behavior with the help of fuzzy rule based system. Identification of the user becomes more accurate with the use of Neighbor Key Pattern, Which will help to differentiate between the imposter and legitimate user. The User Type has been identified on the basis of some critical keystroke factors. This approach makes use of the inter-stroke gap that exists between consecutive characters of the user identification. With the use of behavioral traits such as typing rhythm of different users more accurate results are analyzed. However, the quality of the user’s patterns of behavior based biometric can be improved by increasing the peculiarity of the typing style.

.

Keywords- Authentication; Biometrics; Fuzzy Logic; Keystroke Dynamics; Computer Security.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. Paper 30061333: Scale Invariant Feature Transform Based Multimodal Biometric System with Face and Finger: A Review (pp. 14-17)

Full Text: PDF

.

Shubhangi Sapkal, Dr. R. R. Deshmukh

Govt. College of Engg., Aurangabad, India

.

Abstract - Biometrics has long been known as a robust approach for person authentication. The face is one of the most acceptable biometrics because it is one of the most common methods of recognition that humans use in their visual interactions. In addition, the method of acquiring face images is nonintrusive. It is very challenging to develop face recognition techniques that can tolerate the effects of aging, facial expressions, and the variations in the pose of the face with respect to camera. No single biometric is expected to effectively meet the requirements of all the applications. In other words, no single biometric is optimal. To reduce limitations of biometrics, multimodal biometrics can be used. This paper deals with a biometric authentication system by fusing face and finger images. Scale Invariant Feature Transform (SIFT) is used to extract invariant features from images. Principal Component Analysis (PCA) and Fisher Linear Discriminant (FLD) are commonly used feature extraction methods for face recognition. In this paper, the focus is on perspective biometrics method based on facial and finger images using Scale Invariant Feature Transform. Image features generation transforms an image into a large collection of feature vectors, each of which is invariant to image translation, scaling, and rotation. It is useful due to its distinctiveness, which enables the correct match for keypoints between subjects. These features can be used to find distinctive objects in different images.

.

Keywords- SIFT, Biometric, Keypoints, Security, Person Identification, Scale invariant.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. Paper 30061335: A Novel approach to provide 4 level High Security for the Mass of Cloud Data (pp. 18-24)

Full Text: PDF

.

R. Balasubramanian, Manonmanium Sundaranar University, Tirunelveli, Tamilnadu, India.

Dr. M. Aramuthan, Perunthalaivar Kamarajar Institute of Eng.& Technology, Karaikal, Pondicherry,India

.

Abstract - In the world of Information Technology cloud computing is one of the emerging technologies. Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. When this cloud is made available for the general customer on pay per use basis, it has some security issues that must be considered during its deployment. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. Hence the primarily aim is to highlight the major high security issues existing in current cloud computing environments. Keeping in mind of the security required, this paper introduces a four level high security approach in the mass of cloud data. This new approach will give high security for the customer as well as the cloud storage service providers.

.

Keywords: Cloud Storage Service; Authentication; User Level Security; Data Level Security; Shared Level Security; Maintenance Level Security; Cloud server ; Service Provider.

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. Paper 30061336: Practical Routing Strategy in Delay-Tolerant Networks: A survey (pp. 25-30)

Full Text: PDF

.

Lalitesh Kumar Choudhary, CSE, UIT, RGPV, Bhopal, India

Manish Kumar Ahirwar, CSE, UIT, RGPV, Bhopal, India

Uday Chaurasiya, CSE, UIT, RGPV, Bhopal, India

.

Abstract - A delay tolerant network is a special type of emerging network that experience frequent and intermittent connectivity or delays during communication. Also the delay tolerant network is a partition based network in which at any given time, the path between source and destination does not exist by which we may conclude that two nodes may never exist in a one connected portion of the network. As compared to conventional network the distinguishing feature can be summarized by two points i.e. Delay ( Since there is no fixed connectivity and hence messages take time until they reach the destination ) and resource constraints (Since all the nodes carry some limited buffer, it has to drop older messages if the buffer gets full in order to accommodate new messages). In this paper we have given emphasis on the various DTN routing approaches along with its pros and cons.

.

Keywords- Delay tolerant network; Knowledge Oracle; Custody Transfer

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. Paper 30061332: Design and Implementation of Multi Factor Mechanism for Secure Authentication System (pp. 32-37)

Full Text: PDF

.

Khalid Waleed Hussein, Dr. Nor Fazlida Mohd. Sani, Professor Dr. Ramlan Mahmod, Dr. Mohd. Taufik Abdullah

Faculty Computer Science & IT, University Putra Malaysia (UPM), Kuala Lumpur, Malaysia

.

Abstract - A secure network depends in part on user authentication and regrettably the authentication systems currently in use are not completely safe. However, the user is not the only party that needs to be authenticated to ensure the security of transactions on the Internet. Existing OTP mechanism cannot guarantee reuse of user's account by an adversary, re-use stolen user's device which is used in the process of authentication, and non-repudiation. This paper proposed mechanism of multi factor for secure electronic authentication. It intends to authenticate both of user and mobile device and guarantee non-repudiation, integrity of OTP from obtaining it by an adversary. The proposal can guarantee the user’s credentials by ensuring the user’s authenticity of identity and checking that the mobile device is in the right hands before sending the OTP to the user. This would require each user having a unique phone number and a unique mobile device (unique International Mobile Equipment Identity (IMEI)), in addition to an ID card number. By leveraging existing communication infrastructures, the mechanism would be able to guarantee the safety of electronic authentication, and to confirm that it demonstrates excellence in non-repudiation, authenticate user and mobile device which are used in the process of authentication, certification strength and also in comparison and analysis through experimenting with existing OTP mechanisms.

.

Keyword- Security, non-repudiation, multi factor authentication, IMEI,

.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------