Wednesday, December 21, 2016

A SOLUTION FRAMEWORK FOR MANAGING INTERNET OF THINGS (IOT)


Sukant K. Mohapatra1, Jay N. Bhuyan2, Pankaj Asundi1, and Anand Singh3 

1Ericsson, Monroe, LA, USA 
2Dept. of Comp. Science, Tuskegee, AL, USA 
3CenturyLink, Monroe, LA, USA

ABSTRACT

Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects)that connect to the internet, and is an emerging and active area of research with tremendous technological, social, and economical value for a hyper-connected world. In this paper, we will discuss how billions of  these internet connected devices and machines will change the future in which we shall live, communicate and do the business. The devices, which would be connected to the internet, could vary from simple systems on chip (SOC) without any Operating System (OS) to highly powerful processor with intelligent OS with widely varying processing capability and diverse protocol support. Many of these devices can also communicate with each other directly in a dynamic manner. A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. In this paper, we will discuss various management issues and challenges related to different communication protocol support and models, device management, security, privacy, scalability, availability and analytic support, etc., in managing IoT. The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to management of IoT having billions of smart objects.

KEYWORDS

IoT, SOC, M2M, OMA, SOC, CSP, SLA, CoAP, REST

More Details.....

Friday, December 9, 2016

AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION

Tran Cong Hung1 , Nguyen Thanh Tri1,2 and Ho Nhut Minh3

 1 Post & Telecommunications Institute of Technology, Vietnam 2 Binh Duong Department of Information and Communications, Vietnam 3 Saigon University, Vietnam 

ABSTRACT 

This paper is demonstrating to create a system of multifactor authentication based on biometric verification. Our system use iris for the first factor and fingerprint for the second factor. Once an attacker attempts to attack the system, there must have two factors. If one of them is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Furthermore, this system will be implemented to enhance security for accessing control login government system. 

KEYWORDS

Multifactor authentication (MFA), biometric, iris recognition, fingerprint recognition


More details.....

Thursday, December 8, 2016

PERFORMANCE EVALUATION OF DIFFERENT KERNELS FOR SUPPORT VECTOR MACHINE USED IN INTRUSION DETECTION SYSTEM

Md. Al Mehedi Hasan1 , Shuxiang Xu2 , Mir Md. Jahangir Kabir2 and Shamim Ahmad1 

1Department of Computer Science and Engineering, University of Rajshahi, Bangladesh. 
2 School of Engineering and ICT, University of Tasmania, Australia. 

ABSTRACT 

The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with numerous features. As a result, in order to get rid of this problem, several types of intrusion detection methods with different levels of accuracy have been proposed which leads the choice of an effective and robust method for IDS as a very important topic in information security. In this regard, the support vector machine (SVM) has been playing an important role to provide potential solutions for the IDS problem. However, the practicability of introducing SVM is affected by the difficulties in selecting appropriate kernel and its parameters. From this viewpoint, this paper presents the work to apply different kernels for SVM in ID Son the KDD’99 Dataset and NSL-KDD dataset as well as to find out which kernel is the best for SVM. The important deficiency in the KDD’99 data set is the huge number of redundant records as observed earlier. Therefore, we have derived a data set RRE-KDD by eliminating redundant record from KDD’99train and test dataset prior to apply different kernel for SVM. This RRE-KDD consists of both KDD99Train+ and KDD99 Test+ dataset for training and testing purposes, respectively. The way to derive RRE-KDD data set is different from that of NSL-KDD data set. The experimental results indicate that Laplace kernel can achieve higher detection rate and lower false positive rate with higher precision than other kernel son both RRE-KDD and NSL-KDD datasets. It is also found that the performances of other kernels are dependent on datasets. 

KEYWORDS 

Intrusion Detection, KDD’99, NSL-KDD, Support Vector Machine, Kernel, Kernel Selection

More details...

Wednesday, December 7, 2016

WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES

 Muhammad A. Iqbal and Dr. Magdy Bayoumi 

The Center for Advanced Computer Studies, University of Louisiana at Lafayette, Lafayette, LA 70504 USA

 ABSTRACT

The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet. 

KEYWORDS 

Internet of Things (IoT), Wireless Sensor Network (WSN), Security, Privacy, Integration, Confidentiality 


Friday, December 2, 2016

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE SYSTEM

 Nayeema Islam and Mohammed Nasir Uddin

 Department of Computer Science and Engineering, Jagannath University, Dhaka, Bangladesh 

ABSTRACT

 With the proliferation of mobile and wireless computing devices, the demand for continuous network connectivity exits for various wired-and-wireless integrated networks. Since Transmission Control Protocol (TCP) is the standard network protocol for communication on the Interne, any wireless network with Internet service need to be compatible with TCP. TCP is tuned to perform well in traditional wired networks, where packet losses occur mostly because of congestion. However cellular wireless network suffers from significant losses due to high bit errors and mobile handoff. TCP responds to all losses by invoking congestion control and avoidance algorithms, resulting in degraded end-to-end performance. This paper presents an improved Explicit Loss Notification algorithm to distinguish between packet loss due to congestion and packet loss due to wireless errors and handoffs. Simulation results show that the proposed protocol significantly improves the performance of TCP over cellular wireless network in terms of throughput and congestion window dynamics. 

KEYWORDS

 TCP, Cellular Wireless Network, Handoff, High Bit Error, Explicit Loss and Handoff Notification 

PERFORMANCE EVALUATION OF OSPF AND RIP ON IPV4 & IPV6 TECHNOLOGY USING G.711 CODEC

Mabubur Syed and Isaac Yerima Ambore

 Department of Computer Information Science, Minnesota State University, Mankato. Minnesota, USA

 ABSTRACT

 Migration from IPv4 to IPv6 is still visibly slow, mainly because of the inherent cost involved in the implementation, hardware and software acquisition. However, there are many values IPv6 can bring to the IP enabled environment as compared to IPv4, particularly for Voice Over Internet Protocol (VoIP) solutions. Many companies are drifting away from circuit based switching such as PSTN to packet based switching (VoIP) for collaboration. There are several factors determining the effective utilization and quality of VoIP solutions. These include the choice of codec, echo control, packet loss, delay, delay variation (jitter), and the network topology. The network is basically the environment in which VoIP is deployed. State of art network design for VoIP technologies requires impeccable Interior Gateway routing protocols that will reduce the convergence time of the network, in the event of a link failure. Choice of CODEC is also a main factor. Since most research work in this area did not consider a particular CODEC as a factor in determining performance, this paper will compare the behaviour of RIP and OSPF in IPv4 and IPv6 using G.711 CODEC with riverbed modeller17.5. 

KEYWORDS

 IPv4, IPv6, Network topology, VoIP, CODEC