Welcome to International Transaction of Electrical and Computer Engineers System

International Transaction of Electrical and Computer Engineers System is among the very first occupants of the virtual scholarly information space, and having been there for well over a decade, are now well entrenched in that space. Partly because of their strong research credentials, they dominate the scholarly information and publishing agenda (e.g. open access, institutional repositories, Big Deals, Double peer review).

ISSN (Print): 2373-1273

ISSN (Online): 2373-1281

Editor-in-Chief: Dr. Pushpendra Singh

Website: http://www.sciepub.com/journal/ITECES

   

Article

Distributed Cognitive Routing in Multi-channel Multi-hop Networks with Accessibility Consideration

1Department of Electrical Engineering, Birjand University, Birjand, Iran

2Department of Computer Engineering, Shahid bahonar university of Kerman, Kerman, Iran


International Transaction of Electrical and Computer Engineers System. 2014, 2(6), 149-157
doi: 10.12691/iteces-2-6-1
Copyright © 2014 Science and Education Publishing

Cite this paper:
Mehdi Golestanian, Mohammad Reza Azimi, Reza Ghazizade. Distributed Cognitive Routing in Multi-channel Multi-hop Networks with Accessibility Consideration. International Transaction of Electrical and Computer Engineers System. 2014; 2(6):149-157. doi: 10.12691/iteces-2-6-1.

Correspondence to: Mehdi  Golestanian, Department of Electrical Engineering, Birjand University, Birjand, Iran. Email: mehdi.golestanian@gmail.com

Abstract

Among Cognitive Radio Network (CRN) research topics, routing algorithms especially for multi-channel networks are in the early stages. In this paper, we design a novel cognitive routing scheme for multi-channel multi-hop wireless networks. The main contribution of the proposed routing scheme is the sub-optimal low computational complexity which makes it applicable for distributed network architecture with power constraints. Other important aspect of the proposed routing scheme is considering the objectives related to the network performance, accessibility and efficient spectrum utilization jointly. As the simulation results demonstrate the presented scheme provides a significant improvement in the spectral efficiency and adequate QoS in term of delay propagation and interference in CRN.

Keywords

References

[1]  Y. Xiao and F. Hu, Cognitive radio networks, Auerbach Publications, 2008.
 
[2]  T. Yucek, H. Arsalan, “A survey of spectrum sensing algorithms for cognitive radio applications,” IEEE Communications and Tutorial, vol. 11, no. 1, pp. 116-130, Oct. 2009.
 
[3]  M. Cesana, F. Cuomo and E. Ekici, “Routing in Cognitive Radio Networks: Challenges and Solutions,” Ad-hoc networks Journal, vol. 9, no. 3, pp. 228-248, May. 2011.
 
[4]  M. Xie, W. Zhang and K. Wong, “A Geometric Approach to Improve Spectrum Efficiency for Cognitive Relay Networks,” IEEE Transaction on Wireless Communication, vol. 9, no. 1, pp. 268-281, Jan. 2010.
 
[5]  H. Ma, L. Zheng, X. Ma, Y. luo, “Spectrum aware routing for multi-hop cognitive radio networks with a single transceiver,” 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, pp. 1-6, 2008.
 
Show More References
[6]  G. Cheng, W. Liu, Y. Li, W. Cheng, “Spectrum aware on-demand routing in cognitive radio networks,” 2nd IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 571-574, 2007.
 
[7]  H.-P. Shiang, M. van der Schaar, “Distributed resource management in multi-hop cognitive radio networks for delay-sensitive transmission,” IEEE Transactions on Vehicular Technology, Vol. 58 no. 2, pp. 941-953, 2009.
 
[8]  I. Pefkianakis, S. Wong, S. Lu, “SAMER: spectrum aware mesh routing in cognitive radio networks,” 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, pp. 1-5, 2008.
 
[9]  T. Liu and W. Liao, “On Routing in Multichannel Wireless Mesh Networks: Challenges and Solutions,” IEEE network, vol. 22, no. 1, pp. 13-18, Jan. 2008.
 
[10]  N. Baldo, M.Zorzi, “Learning and adaptation in cognitive radios using neural networks,” IEEE Consumer Communications and Networking Conference, pp. 998-1003, Jan. 2008.
 
[11]  I. A. Akbar, W. H. Tranter, “Dynamic Spectrum Allocation in Cognitive Radio Using Hidden Markov Models: Poisson Distributed Case,” in Proceeding of IEEE Southeast Conference, pp. 196-201, March. 2007.
 
[12]  C, Ghosh, C. Cordeiro, D. P. Agrawal, M. B. Rao, “Markov Chain Existence and Hidden Markov Models in Spectrum Sensing,” IEEE International Conference on Pervasive Computing and Communications, pp. 1-6, March. 2009.
 
[13]  Y. Song, Y. Fang, Y. Zhang, “Stochastic channel selection in cognitive radio networks,” IEEE global telecommunication conference, pp. 4878-4882, 2007.
 
[14]  D. Chen, M. Haenggi, and J. N. Laneman, “Distributed spectrum efficient routing algorithms in wireless networks,” IEEE Transaction on Wireless Communication, vol. 7, no. 12, pp. 5297-5305, Dec. 2008.
 
[15]  T. Weiss, J. Hillenbrand, A. Krohn, and F. K. Jondral, “Mutual interference in OFDM-based spectrum pooling systems,” in Proc. IEEE Vehicular Tech. Conf., pp. 1873-1877, May 2004.
 
[16]  Q. Wu, Y.Yao, J. Wang, G. Ding, “Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions,” IEEE Signal Processing Magazine, vol. 30, no. 4, pp. 126-136, July 2013.
 
[17]  “Decentralized sensor selection for cooperative spectrum sensing based on unsupervised learning,” in Proc. IEEE International Conference on Communications (ICC), June 2012, pp. 1576-1580.
 
[18]  D. Bharadia, G. Bansal, P. Calagineedi and V. K. Bhargava, “Relay and power allocation schemes for OFDM-based cognitive radio systems,” IEEE Transaction on Wireless Communications, vol. 10, no. 9, pp. 2812-2817, Sep. 2011.
 
[19]  S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004.
 
[20]  W. Wang, J. Cai, A. S. Alfa, “Distributed Routing Schemes with Accessibility Consideration in Multi-hop Wireless Networks,” IEEE Transaction on Wireless Communications, vol. 9, no. 10, pp. 3178-3188, Oct. 2010.
 
Show Less References

Article

Review on Network Security and Cryptography

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India


International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11
doi: 10.12691/iteces-3-1-1
Copyright © 2015 Science and Education Publishing

Cite this paper:
Shyam Nandan Kumar. Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):1-11. doi: 10.12691/iteces-3-1-1.

Correspondence to: Shyam  Nandan Kumar, M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India. Email: shyamnandan.mec@gmail.com

Abstract

With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. Data security is the utmost critical issue in ensuring safe transmission of information through the internet. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-criminals. It comprises authorization of access to information in a network, controlled by the network administrator. The task of network security not only requires ensuring the security of end systems but of the entire network. In this paper, an attempt has been made to review the various Network Security and Cryptographic concepts. This paper discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.

Keywords

References

[1]  Shyam Nandan Kumar, “Technique for Security of Multimedia using Neural Network,” Paper id-IJRETM-2014-02-05-020, IJRETM, Vol: 02, Issue: 05, pp.1-7. Sep-2014
 
[2]  Simmonds, A; Sandilands, P; van Ekert, L (2004). “An Ontology for Network Security Attacks”. Lecture Notes in Computer Science. Lecture Notes in Computer Science 3285: 317-323.
 
[3]  Bellare, Mihir; Rogaway, Phillip (21 September 2005). “Introduction. Introduction to Modern Cryptography. p. 10.
 
[4]  Menezes, A. J.; van Oorschot, P. C.; Vanstone, S. “A. Handbook of Applied Cryptography”. ISBN 0-8493-8523-7.
 
[5]  Davis, R., “The Data Encryption Standard in Perspective, Proceeding of Communication Society magazine, IEEE, Volume 16 No 6, pp. 5-6, Nov. 1978.
 
Show More References
[6]  S. NIST Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May 2004.
 
[7]  Daemen, J., and Rijmen, V. “Rijndael: AES-The Advanced Encryption Standard, Springer, Heidelberg, March 2001.
 
[8]  FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26, 2001.
 
[9]  Bruce Schneier (1993). “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish). Fast Software Encryption, Cambridge Security Workshop Proceedings (Springer-Verlag): 191-204.
 
[10]  Schneier, Bruce (2005-11-23). “Twofish Cryptanalysis Rumors. Schneier on Security blog. Retrieved 2013-01-14.
 
[11]  Matsui, Mitsuru; Tokita, Toshio (Dec 2000). “MISTY, KASUMI and Camellia Cipher Algorithm Development. Mitsibishi Electric Advance (Mitsibishi Electric corp.) 100: 2-8. ISSN 1345-3041.
 
[12]  General Report on the Design, Speification and Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms”. 3GPP. 2009
 
[13]  O. Dunkelman, N. Keller, A. Shamir, \A practical-time attack on the KASUMI cryptosystem used in GSM and 3G telephony, Advances in Cryptology, Proceedings Crypto'10, LNCS, T. Rabin, Ed., Springer, Heidelberg, 2010
 
[14]  R.L.Rivest, A.Shamir, and L.Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, Volume 21 No. 2, Feb. 1978.
 
[15]  Diffie, W.; Hellman, M. (1976). “New directions in cryptography. IEEE Transactions on Information Theory 22 (6): 644-654.
 
[16]  Koblitz, N., 1987. “Elliptic curve cryptosystems. Mathematics of Computation” 48, 203-209.
 
[17]  Miller, V., 1985. “Use of elliptic curves in cryptography”. CRYPTO 85.
 
[18]  FIPS 180, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180, NIST, U.S. Dept. of Commerce, May 11, 1993.
 
[19]  M. Lamberger, F. Mendel, C. Rechberger, V. Rijmen, M. Schla er, \Rebound distinguishers: results on the full Whirlpool compression function, Advances in Cryptology, Proceedings Asiacrypt'09, LNCS 5912, M. Matsui, Ed., Springer, Heidelberg, 2009, pp. 126-143.
 
[20]  Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (1996). “Keying Hash Functions for Message Authentication”.
 
[21]  NIST Special Publication 800-38B, “Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005.
 
Show Less References

Article

Cryptography during Data Sharing and Accessing Over Cloud

1M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India


International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 12-18
doi: 10.12691/iteces-3-1-2
Copyright © 2015 Science and Education Publishing

Cite this paper:
Shyam Nandan Kumar. Cryptography during Data Sharing and Accessing Over Cloud. International Transaction of Electrical and Computer Engineers System. 2015; 3(1):12-18. doi: 10.12691/iteces-3-1-2.

Correspondence to: Shyam  Nandan Kumar, M.Tech-Computer Science and Engineering, Lakshmi Narain College of Technology-Indore (RGPV, Bhopal), MP, India. Email: shyamnandan.mec@gmail.com

Abstract

Data sharing is an important functionality in cloud environment. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. In this article, an efficient methodology is provided to securely, efficiently, and flexibly share data with others in cloud computing. In this technique, the secret key holder can release a constant-size aggregate key for flexible choices of cipher-text set in cloud storage, but the other encrypted files outside the set remain confidential. Secure cryptographic architecture and working methodology are proposed in this paper for optimal services over the cloud.

Keywords

References

[1]  L. Hardesty, “Secure computers aren’t so secure,” MIT press, 2009, http://www.physorg.com/news176107396.html.
 
[2]  D. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”. Proceedings of the IEEE Symposium on Security and Privacy, 2000, pp. 44-55.
 
[3]  D. Boneh, G. D. Crescenzo, R. Ostrovsky, G. Persiano. “Public key encryption with keyword search”. Advances in Cryptology-EUROCRYPT'04, 2004, LNCS 3027, Springer, pp. 506-522.
 
[4]  V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS ’06). ACM, 2006, pp. 89-98.
 
[5]  M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM Conference on Computer and Communications Security, 2009, pp. 121-130.
 
Show More References
[6]  S. S. M. Chow, J. Weng, Y. Yang, and R. H. Deng, “Efficient Unidirectional Proxy Re-Encryption,” in Progress in Cryptology-AFRICACRYPT 2010, ser. LNCS, vol. 6055. Springer, 2010, pp. 316-332.
 
[7]  G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,” ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1-30, 2006.
 
[8]  Seung-Hyun Seo, Nabeel, M, Bertino, E. and Xiaoyu Ding, “An Efficient Certificateless Encryption for Secure Data Sharing in Public CloudsIEEE Transactions on Knowledge and Data Engineering, Volume: 26, Issue: 9, pp. 2107-2119, 05 August 2013
 
[9]  Ruhr (2011) “Cloud computing: Gaps in the cloud”. NewsRx Health Sci.
 
[10]  D. Boneh, C. Gentry, and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys,” in Proceedings of Advances in Cryptology-CRYPTO ’05, ser. LNCS, vol. 3621. Springer, 2005, pp. 258-275.
 
Show Less References