Vol. 12 No. 4 APR 2014

Vol. 12 No. 4 APRIL 2014 International Journal of Computer Science and Information Security
Publication APRIL
 2014, Volume 12 No. 4 (Download Full Journal) (Archive) (Download 2)
.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 31031436: Building High Performance Computing Using Beowulf Linux Cluster (pp. 1-7)
Full Text: PDF

.
Sedeeq Hasan Albana Ali Al-Khazraji, College of Computer Sciences and Mathematics - Dept. of Computer Sciences, University of Mosul, Mosul - Iraq
Mohammed A. Younus Al-Sa'ati, Department of Administrative Affairs, The presidency of the University of Mosul, Mosul - Iraq
Nashwan Mahmod Abdullah, Al-hadba University College, Mosul - Iraq

.
Abstract - A Beowulf Cluster is a type of apportioned parallel processing system, which consists of a collection of reticulated standalone computers working together as a single integrated computing resource generally having a single system image (SSI), that is the users generally view the clusters as a single system. The relatively low cost of two commodity components which are the fast CPUs designed primarily for the personal computer and networks designed to connect personal computers together (in local area network or LAN) makes full advantage of the use of Beowulf Cluster, in this paper we benefit from these components to build larger system. The model was implemented in this paper is using the message passing interface technique developed in C language and use Linux operating system and the goal is to build Beowulf cluster to solve large mathematic operation faster as an example for matrix multiplication and PI problem …etc. the same approach can be used in scientific applications that need supercomputing power or in various other areas like databases, multimedia, web services, etc. In addition the users can access any node of the cluster and use it independently as a local personal computer.
.
Keywords— Parallel processing system; Network; Networking and Systems; Linux.
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 31031417: Evaluation of Cryptanalytic Algorithm for A5/2 Stream Cipher (pp. 8-17)
Full Text: PDF

.
Shahzad Khan, Shahzad Shahid Peracha, Zain Ul Abideen Tariq
Department of Communications System Engineering, School of Electrical Engineering and Computer Sciences (SEECS),National University of Sciences and Technology (NUST), Islamabad, Pakistan

.
Abstract - The stream cipher A5/2 is used in GSM (Global System for mobile Communication) for authentication and data encryption. There have been numerous successful attacks that were launched on A5/2 hence breaking down its security. In this paper an evaluation of Cipher-text only attack is presented with an easy understanding of the equation solver; how the equations are generated and solved. Furthermore this paper also reviews that how hardware-only attacker can easily recover the initial states of A5/2 that is more than enough in decrypting all other frames without any pre-computation and storage of the information. It also tries to suggest corrections in the design, if any, based on the deeper analysis of the operations.
.
Keywords- A/5, GSM, cryptanalysis, stream ciphers
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31031430: Simulation and Modeling of Handover Failure and Call Drop In GSM Network for Different Scenarios (pp. 18-27)
Full Text: PDF

.
Syed Foysol Islam, Faculty of Engineering, University Of Development Alternative (UODA), Dhaka, Bangladesh
Fahmi Ahmed, Faculty of Engineering, University Of Development Alternative (UODA), Dhaka, Bangladesh

.
Abstract — In this Research paper, the simulations of call drop and handover failure in GSM network tele-traffic through OMNeT++ are presented. The results obtained in different scenarios are examined and analyzed which simulates a large business city in busy hour a number call attempts by the mobile phone users, with different characteristics of network coverage. This simulator is a discrete event simulator programmed in OMNeT++, focusing on the research of wireless or wired networks. It is also a flexible environment which allows its extension to different aspects of GSM technology, such as the simulation of successful calls, call drops and handover failure probabilities etc.
.
Keywords - Graphical NED Editor; Integrated Development Environment; Mobile Station; Base Transceiver Station; Integrated Services Digital Networks; OMNET;
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 31101318: Route optimization and roaming capability based MIPv6 protocol in internet network (pp. 28-32)
Full Text: PDF

.
Marzieh Izanlou, Dept. of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran
Mohamadali Pourmina, Faculty of Electrical and Computer Engineering, Islamic Azad University, Tehran, Iran
Afrouz Haghbin, Faculty of Electrical and Computer Engineering, Islamic Azad University, Tehran, Iran

.
Abstract — MIPv6 is a proper replacement for MIPv4 protocol which recommended by IETF. IPv6 lieu IPv4 has been chosen as convergence layer for next heterogeneous access networks. MIPv4 has limiting in protocol, but MIPv6 is created fundamental changes such as security enhancements, elimination of the Foreign Agent (FA) and route optimization. The MIPv6 characteristics defined by the IETF provides perspicuous host mobility within IPv6 networks. In MIPv6 MN is move between IP subnets without change in its original IPv6 address configuration. This means that MN ever is addressable in the internet via its Home Address (HoA). HoA is IPv6 address that is allocated to the MN in its home network. When away from the home network, MN can still detect by its HOA in the internet, Because packets routed to its HoA. Also In this way, mobility transparency of higher layer protocols like Transport layer or higher is achieved.
.
Keywords- MIPv6; routing; roaming capability
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 30031431: Utilization DCTC and Vonoroi of Tracking in Wireless Sensor Networks (pp. 33-36)
Full Text: PDF

.
Maan younus Abdullah, University of Mosul, Education College /computer science department, Mosul, Iraq
.
Abstract - Wireless sensor networks (WSN) may consist of several to thousands of sensors that share the need to organize for network data collection sink routing. This paper addressed the problems of tracking moving of wireless sensor network objects. The traditional tracking method, called Dynamic Convoy Tree-Based Collaboration (DCTC) presented. In additional describe a method, called Distributed computation of Voronoi cells in sensor networks. Proposed solutions of WSNs challenges using converge cast traffic, covering networks configuration and efficient routing routines. We also present the intermediate routing sensor nodes expend an excessive amount of their energy resources. thus can achieve superior tracking accuracy with faster tracking convergence speed and reducing the network lifetime.
.
Index Terms - DCTC,Voronoi , Tracking
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 31031421: Effective Measurement Requirements for Network Security Management (pp. 37-44)
Full Text: PDF

.
Dr. Rabiah Ahmad, Department of System & Computer Communication, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia
Prof. Shahrin Sahib, Department of System & Computer Communication, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia
M. P. Azuwa, Research Department, Cybersecurity Malaysia, Selangor, Malaysia

.
Abstract — Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and incompetence of the implementation. This paper proposes a model of technical security metric to measure the effectiveness of network security management. The measurement is based on the effectiveness of security performance for (1) network security controls such as firewall, Intrusion Detection Prevention System (IDPS), switch, wireless access point, wireless controllers and network architecture; and (2) network services such as Hypertext Transfer Protocol Secure (HTTPS) and virtual private network (VPN). We use the Goal-Question-Metric (GQM) paradigm [1] which links the measurement goals to measurement questions and produce the metrics that can easily be interpreted in compliance with the requirements. The outcome of this research method is the introduction of network security management metric as an attribute to the Technical Security Metric (TSM) model. Apparently, the proposed TSM model may provide guidance for organizations in complying with effective measurement requirements of ISO/IEC 27001 Information Security Management System (ISMS) standard. The proposed model will provide a comprehensive measurement and guidance to support the use of ISO/IEC 27004 ISMS Measurement template.
.
Keywords- Security metrics; Technical security metrics model; Measurement; Goal-Question-Metric (GQM); Effective measurement; Network security management
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 13051401: A Survivability Strategy in Mobile Network by Key Distribution and Cross-layer protocol (pp. 45-49)
Full Text: PDF

.
Anu Chaudhary, Department of information Technology, AKJ Institute of Technology and Management, GZB, India
K.K Gautam, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India
Nirbhay Ahlawat, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India

.
Abstract - The capability to provide network service even under a significant network system element disruption is the backbone for the survival of network technology in today’s world, keeping this view in mind, the present paper highlights cryptosystem and Cross-Layer Protocol. A global initial key distribution method based on public key certificate chain shall be presented. And also present a method for survivability strategy in mobile network.
.
Keywords: Survivability, Mobile Network, Key Distribution Cross-layer protocol
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 13051402: Effect of Cross Layer optimization of Traffic Management in Ad Hoc Mobile Network (pp. 50-53)
Full Text: PDF

.
Anu Chaudhary, Department of information Technology, AKJ Institute of Technology and Management, GZB, India
K.K Gautam, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India
Nirbhay Ahlawat, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India

.
Abstract:- The optimal and distributed provisioning of high through output in Mobile Ad Hoc Network (MANET) is a network consisting of a set of wireless mobile routers and Communication with each other. The Network Mobility(NEMO) for the traffic represents the moving behavior of directional antenna and mobile rooters. Use the Cross-layer protocol in ad hoc wireless network we can drastically improve the utilization through overlapping communication is the different direction for the traffic. This paper highlight the challenge to find out a route of effect the cross-layer protocol for traffic-management in Ad Hoc wireless network. In present paper we propose mobility for traffic management in Ad Hoc wireless network by use of theory of Cross-layer protocol.
.
Keywords:-Ad hoc Network, Cross-layer protocol, Directional Antenna, Mobile Router, Network Mobility
.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 31051403: Performance of and Traffic management for a Mobile networks by using Cross-layer protocol (pp. 54-58)
Full Text: PDF

.
Anu Chaudhary, Department of information Technology, AKJ Institute of Technology and Management, GZB, India
K.K Gautam, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India
Nirbhay Ahlawat, Department of Computer Science & Technology, Phonics Group of Institutions, Roorkee, India
.

Abstract:- Over the Recent years a considerable amount of effort has been devoted towards the traffic management and root is the important capability to provide best network technology in today’s world. Present paper we study the traffic management for mobile networks and we addresses current issue of the traffic management. Present the performance of Mobile Network by using Cross-layer protocol.
.
Index Terms:- Mobile Networks, call admission control, QoS (Quality of Service), route optimization

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 28021402: A Fast Survey Focused on Methods for Classifying Anonymity Requirements (pp. 58-63)
Full Text: PDF 
.
Morteza Yousefi Kharaji Department of Computer Science and Information Technology Mazandaran University of Science and Technology Mazanadan, Iran
Fatemeh Salehi Rizi Department of Computer Science and Information Technology Sheikh Bahaei University of Isfahan Isfahan, Iran

.
Abstract — Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and concealing entities’ privacy inside a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. In this paper, first, accurate and perfect definitions of privacy and anonymity are presented then most important problems in anonymity field are investigated. Afterwards, the numbers of main anonymity protocols are described with necessary details. Finally, all findings are concluded and some more future perspectives are discussed.
.
Keywords-anonymity; privacy; online security

 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------


 

Comments