International Journal of Computer Network and Information Security (IJCNIS)

IJCNIS Vol. 12, No. 3, Jun. 2020

Cover page and Table of Contents: PDF (size: 270KB)

Table Of Contents

REGULAR PAPERS

High-Speed and Secure PRNG for Cryptographic Applications

By Zhengbing Hu Sergiy Gnatyuk Tetiana Okhrimenko Sakhybay Tynymbayev Maksim Iavich

DOI: https://doi.org/10.5815/ijcnis.2020.03.01, Pub. Date: 8 Jun. 2020

Due to the fundamentally different approach underlying quantum cryptography (QC), it has not only become competitive, but also has significant advantages over traditional cryptography methods. Such significant advantage as theoretical and informational stability is achieved through the use of unique quantum particles and the inviolability of quantum physics postulates, in addition it does not depend on the intruder computational capabilities. However, even with such impressive reliability results, QC methods have some disadvantages. For instance, such promising trend as quantum secure direct communication – eliminates the problem of key distribution, since it allows to transmit information by open channel without encrypting it. However, in these protocols, each bit is confidential and should not be compromised, therefore, the requirements for protocol stability are increasing and additional security methods are needed. For a whole class of methods to ensure qutrit QC protocols stability, reliable trit generation method is required. In this paper authors have developed and studied trit generation method and software tool TriGen v.2.0 PRNG. Developed PRNG is important for various practical cryptographic applications (for example, trit QC systems, IoT and Blockchain technologies). Future research can be related with developing fully functional version of testing technique and software tool.

[...] Read more.
MapReduce Algorithm for Single Source Shortest Path Problem

By Praveen Kumar Anil K. Singh

DOI: https://doi.org/10.5815/ijcnis.2020.03.02, Pub. Date: 8 Jun. 2020

Computing single source shortest path is a popular problem in graph theory, extensively applied in many areas like computer networks, operation research and complex network analysis. SSSP is difficult to parallelize efficiently as more parallelization leads to more work done by any algorithm. MapReduce is a popular programming framework for large data processing in distributed and cloud environments. In this paper, we have proposed MR-DSMR, a Map reduce version of Dijkstra Strip-mined Relaxation (DSMR) algorithm and MR3-BFS algorithms. We have compared the performance of both the algorithms with BFS. It is observed that MR-DSMR takes lesser communication and computation time compared to existing algorithms.

[...] Read more.
Design of a Green Automated Wireless System for Optimal Irrigation

By Andrews A. Okine Michael O. Appiah Ibrar Ahmad Bismark Asante-Badu Benjamin B. Uzoejinwa

DOI: https://doi.org/10.5815/ijcnis.2020.03.03, Pub. Date: 8 Jun. 2020

Towards sustainable agriculture, the management of scarce water resources has become more crucial. In this article, we proffer a green automated wireless system (GAWS) aimed at maximizing and efficiently utilizing water resources for irrigation. The proposed irrigation system is a green technology which will be powered exclusively by solar energy. In its operation, it uses solar-powered wireless sensors for obtaining and transmitting information about soil moisture content of different segments on a given farm. The GAWS will ensure that irrigation is done only when necessary via a solar-powered irrigation control centre. For optimal irrigation, the automated intelligent control centre is designed to trigger solar-powered groundwater pumps wirelessly to execute necessary irrigation for a particular portion of the farm and fall back on an external irrigation system if that proves insufficient. It is envisaged that the proposed irrigation system will improve total crop yields by maximizing the utility of scarce water resources from both internal and external irrigation sources. It will also minimize the cost of time and labour involved in irrigation management, harness renewable energy and be environmentally friendly.

[...] Read more.
Detecting Hidden Information in FAT

By Kyryl Shekhanin Alexandr Kuznetsov Victor Krasnobayev Oleksii Smirnov

DOI: https://doi.org/10.5815/ijcnis.2020.03.04, Pub. Date: 8 Jun. 2020

Various steganographic methods are used to hide information. Some of them allow you to reliably hide the fact of storage and transmission of information data. This paper analysis the methods of technical steganography that are based on hiding information messages into the structure of the FAT file system by reordering particular clusters of specially selected files (cover files). These methods allow you to reliably hide information in the file system structure, while redundancy is not explicitly entered anywhere. This means that the hidden information is not explicitly contained in the service fields or individual clusters of the file system, the size of the data stored on the physical storage medium does not change. Such steganographic systems are very difficult to detect, it is almost impossible to identify the fact of hiding information by traditional methods. The steganographic analysis technique based on the study of file system properties was developed. In particular, we analyzed the fragmentation of various files stored on a physical medium, and examine the statistical properties of various types, sizes and uses of files. Identification of anomalous properties may indicate a possible reordering of clusters of individual files, i.e. this will detect hidden information. The study of these principles is important for a better understanding of the design and counteraction of steganographic systems based on the methods of reordering clusters of cover files in the structure of the FAT. Thus, this article substantiates new approaches to steganoanalysis of cluster file systems for information hiding—é. They are based on a statistical analysis of file systems of various data carriers, as well as an assessment of the fragmentation level of both individual files and the entire file system.

[...] Read more.
Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain

By Hossein Mohammadinejad Fateme Mohammadhoseini

DOI: https://doi.org/10.5815/ijcnis.2020.03.05, Pub. Date: 8 Jun. 2020

Due to the increase of cybercrime and security risks in computer networks as well as violations of user privacy, it is essential to upgrade the existing protection models and provide practical solutions to meet these challenges. An example of these risks is the presence of a third party between users and various services, which leads to the collection and control of large amounts of users' personal information and the possibility of their databases being misused or hacked. Blockchain technology and encrypted currencies have so far shown that a decentralized network of peer-to-peer users, along with a general ledger, can do reliable computing. So, in this article, we are going to introduce a protocol that converts the blockchain network to an automated access control manager without the presence of a third party. To this end, we designed a mutual authentication protocol to create a secure channel between the user and the service and then demonstrate its accuracy and completeness using the Gong-Nidham-Yahalom belief logic [1]. The results of our evaluations show that our proposed protocol is secure enough to be used on the blockchain network and attackers are unable to penetrate, track, impersonate, inject, misrepresent or distort information using the common attacks.

[...] Read more.