International Journal of Communication Networks and Information Security

Displaying 1-21 of 21 results

  • White Papers // Dec 2013

    Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks

    Popularity of Wireless Sensor Networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Secure Method for Authenticity Verification of Handwritten Signatures through Digital Image Processing and Artificial Neural Networks

    This paper aims to propose a method to do authenticity verification of handwritten signatures based on the use of digital image processing and artificial neural networks techniques through the back propagation learning algorithm with 500 and 901 approaches, in order to optimize this verification process and act as a decision...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies

    In today's world, web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2013

    A Survey on the Communication Protocols and Security in Cognitive Radio Networks

    A Cognitive Radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is different from other wireless networks in many ways. One of the key differences is that a MANET is a multi-hop wireless network,i.e., a routing path is composed of intermediate mobile nodes and wireless links connecting them. In this paper, Heterogeneous Mobile Ad-hoc NETworks (H-MANETs)...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks

    Proxy Mobile IPv6 (PMIPv6) was proposed by the Internet Engineering Task Force (IETF) as a new network-based mobility protocol which does not require the involvement of MN's in any form of mobility management. MN can handover relatively faster in PMIPv6 than in host-based mobility protocols (e.g. Mobile IPv6 (MIPv6)) because...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks

    The high-level contributions of this paper are the design and development of two distributed spanning tree-based data gathering algorithms for wireless mobile sensor networks and their exhaustive simulation study to investigate a complex stability vs. node-network lifetime trade off that has been hitherto not explored in the literature. The topology...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks

    The future wireless communication systems demand very high data rates, anti-jamming ability and multiuser support. People want large amount of data to be continuously accessible in their personal devices. Direct Sequence (DS) spread spectrum based techniques such as Code Division Multiple Access (CDMA) fulfil these requirements but, at the same...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Self-Organized Disjoint Service Placement in Future Mobile Communication Networks

    Future mobile communication networks will offer many ubiquitous services to its clients such as voice and video communication, access to data and files, use of virtual resources in cloud, etc. The provision of these services in face of the different challenges posed by future wireless networks such as changing network...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Process Aware Host-Based Intrusion Detection Model

    Now-a-days, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2012

    QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks

    Providing Quality of Service (QoS) support in Mobile Ad Hoc NETworks (MANETs) is a particularly active research area with a number of proposals being made to support real-time applications that are based upon the interaction between the routing scheme and a QoS provisioning mechanism. This paper builds upon such ideas...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Sep 2010

    Guard Channel Based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks

    Call Admission Control (CAC) strategies are required to guarantee all service types meet their Quality of Service (QoS) requirements in wireless broadband mobile networks. Although much research focuses on modified Mobile IP to get better efficient performance, there are few papers to discuss admission control when considering handover and mobility...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Asynchronous Networks and Erlang Formulas

    The paper addresses the idea of utilization of Erlang formulas in asynchronous ATM and IP networks. Based on the common properties of synchronous and asynchronous networks the authors have proposed the utilization of Erlang formulas not only for synchronous networks, but also for asynchronous networks. It is possible to describe...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    QoS Provisioning in Three Layer MIPv6 Architecture Using RSVP

    The goal of mobile IP based architecture is to provide seamless mobility with minimized handoff latency, signaling overhead and tunneling cost. There are many research work proposed to support such seamless mobility. Most of the proposals suggest hierarchical arrangement of anchor agents to support minimized handoff latency and signaling cost....

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Broadband Cognitive Radio Transmission Based on Sub-Channel Sensing and NC-OFDM

    Cognitive Radio (CR) has now been applied for broadband communication systems, so its spectrum sensing technique should be in a broadband signal detection framework. Conventional sensing algorithms such as energy detection are only effective for narrow-band signals or a single broadband signal in the detection range of the spectrum. In...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Mesh Networks Planning: Optimization With Multi-Hop Interference

    Mesh network planning is a difficult topic to deal with. Due to the high redundancy in this type of networks, the complexity of planning such networks is greatly increased, comparing to traditional point-to-multi-point networks. In this paper, the authors have developed an optimization algorithm to perform the planning of a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Overview of Optical Local Access Networks Development and Design Challenges

    Local access network technologies tend to take advantage of the potentially huge capabilities of fiber communication to deliver faster and more various services to end users. There has been considerable research effort in implementing access networks optically. These optical access technologies were developed particularly under certain circumstances, each of which...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN

    A Wireless Sensor Network is composed of hundreds or thousands of nodes that can be equipped with limited energy resources, but can still be used over an extensive set of diverse applications such as environment monitoring, healthcare, homeland security, military surveillance, manufacturing, and industry automation. The physical layer parameter affects...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Worm Spreading and Patching in Inter-Vehicle Communications

    Inter-Vehicle Communications (IVC) rely on frequent data exchange among vehicles to facilitate road safety, congestion control, route planning, etc. The wireless connectivity among vehicles unfortunately poses a challenge for securing large-scale deployment of IVC systems. To successfully mitigate threats such as worm spreading in IVC systems, the authors describe the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS/WLAN Operations

    In this paper, two single rectangular patch antennas with a slot are designed and analyzed theoretically from the concept of multi-cavity structure. The theoretical return loss parameters of the antenna electrical characteristics are in good concordance with the Advanced Design System (ADS) simulation. Two patch antennas with rectangular slot are...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2009

    Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments

    Wireless Local Area Networks (WLANs) are providing the most economical means of Internet access. However, their access is very much limited. They can be deployed in a large scale by integrating them with cellular networks such as Universal Mobile Telecommunication System (UMTS); General Packet Radio Services (GPRS) etc. A seamless...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Queue Length and Mobility aware Routing Protocol for Mobile Ad hoc Network

    A Mobile Ad-hoc NETwork (MANET) is different from other wireless networks in many ways. One of the key differences is that a MANET is a multi-hop wireless network,i.e., a routing path is composed of intermediate mobile nodes and wireless links connecting them. In this paper, Heterogeneous Mobile Ad-hoc NETworks (H-MANETs)...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Using Media Independent Handover to Support PMIPv6 Inter-domain Mobility Based Vehicular Networks

    Proxy Mobile IPv6 (PMIPv6) was proposed by the Internet Engineering Task Force (IETF) as a new network-based mobility protocol which does not require the involvement of MN's in any form of mobility management. MN can handover relatively faster in PMIPv6 than in host-based mobility protocols (e.g. Mobile IPv6 (MIPv6)) because...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks

    The high-level contributions of this paper are the design and development of two distributed spanning tree-based data gathering algorithms for wireless mobile sensor networks and their exhaustive simulation study to investigate a complex stability vs. node-network lifetime trade off that has been hitherto not explored in the literature. The topology...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2012

    QoS-aware Multipath Routing Scheme for Mobile Ad Hoc Networks

    Providing Quality of Service (QoS) support in Mobile Ad Hoc NETworks (MANETs) is a particularly active research area with a number of proposals being made to support real-time applications that are based upon the interaction between the routing scheme and a QoS provisioning mechanism. This paper builds upon such ideas...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2009

    Performance Comparison of UMTS/WLAN Integrated Architectures with Dynamic Home Agent Assignments

    Wireless Local Area Networks (WLANs) are providing the most economical means of Internet access. However, their access is very much limited. They can be deployed in a large scale by integrating them with cellular networks such as Universal Mobile Telecommunication System (UMTS); General Packet Radio Services (GPRS) etc. A seamless...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Self-Organized Disjoint Service Placement in Future Mobile Communication Networks

    Future mobile communication networks will offer many ubiquitous services to its clients such as voice and video communication, access to data and files, use of virtual resources in cloud, etc. The provision of these services in face of the different challenges posed by future wireless networks such as changing network...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2012

    A Robust Carrier Frequency Offset Estimation Algorithm in Burst Mode Multicarrier CDMA based Ad Hoc Networks

    The future wireless communication systems demand very high data rates, anti-jamming ability and multiuser support. People want large amount of data to be continuously accessible in their personal devices. Direct Sequence (DS) spread spectrum based techniques such as Code Division Multiple Access (CDMA) fulfil these requirements but, at the same...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Secure Method for Authenticity Verification of Handwritten Signatures through Digital Image Processing and Artificial Neural Networks

    This paper aims to propose a method to do authenticity verification of handwritten signatures based on the use of digital image processing and artificial neural networks techniques through the back propagation learning algorithm with 500 and 901 approaches, in order to optimize this verification process and act as a decision...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2013

    A Survey on the Communication Protocols and Security in Cognitive Radio Networks

    A Cognitive Radio (CR) is a radio that can change its transmission parameters based on the perceived availability of the spectrum bands in its operating environment. CRs support dynamic spectrum access and can facilitate a secondary unlicensed user to efficiently utilize the available underutilized spectrum allocated to the primary licensed...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Dec 2013

    Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks

    Popularity of Wireless Sensor Networks (WSNs) is increasing continuously in different domains of daily life, as they provide efficient method of collecting valuable data from the surroundings for use in different applications. Routing in WSNs is the vital functionality that allows the flow of information generated by sensor nodes to...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2013

    A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies

    In today's world, web applications play a very important role in individual life as well as in any country's development. Web applications have gone through a very rapid growth in the recent years and their adoption is moving faster than that was expected few years ago. Now-a-days, billions of transactions...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2012

    Process Aware Host-Based Intrusion Detection Model

    Now-a-days, many organizations use Process Aware Information Systems (PAISs) to automate their business process. As any other information systems, security plays a major role in PAIS to provide a secure state and maintain the system in it. In order to provide security in a PAIS, a Process Aware Host-based Intrusion...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Overview of Optical Local Access Networks Development and Design Challenges

    Local access network technologies tend to take advantage of the potentially huge capabilities of fiber communication to deliver faster and more various services to end users. There has been considerable research effort in implementing access networks optically. These optical access technologies were developed particularly under certain circumstances, each of which...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Sep 2010

    Guard Channel Based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks

    Call Admission Control (CAC) strategies are required to guarantee all service types meet their Quality of Service (QoS) requirements in wireless broadband mobile networks. Although much research focuses on modified Mobile IP to get better efficient performance, there are few papers to discuss admission control when considering handover and mobility...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Asynchronous Networks and Erlang Formulas

    The paper addresses the idea of utilization of Erlang formulas in asynchronous ATM and IP networks. Based on the common properties of synchronous and asynchronous networks the authors have proposed the utilization of Erlang formulas not only for synchronous networks, but also for asynchronous networks. It is possible to describe...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    QoS Provisioning in Three Layer MIPv6 Architecture Using RSVP

    The goal of mobile IP based architecture is to provide seamless mobility with minimized handoff latency, signaling overhead and tunneling cost. There are many research work proposed to support such seamless mobility. Most of the proposals suggest hierarchical arrangement of anchor agents to support minimized handoff latency and signaling cost....

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Broadband Cognitive Radio Transmission Based on Sub-Channel Sensing and NC-OFDM

    Cognitive Radio (CR) has now been applied for broadband communication systems, so its spectrum sensing technique should be in a broadband signal detection framework. Conventional sensing algorithms such as energy detection are only effective for narrow-band signals or a single broadband signal in the detection range of the spectrum. In...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Aug 2010

    Mesh Networks Planning: Optimization With Multi-Hop Interference

    Mesh network planning is a difficult topic to deal with. Due to the high redundancy in this type of networks, the complexity of planning such networks is greatly increased, comparing to traditional point-to-multi-point networks. In this paper, the authors have developed an optimization algorithm to perform the planning of a...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN

    A Wireless Sensor Network is composed of hundreds or thousands of nodes that can be equipped with limited energy resources, but can still be used over an extensive set of diverse applications such as environment monitoring, healthcare, homeland security, military surveillance, manufacturing, and industry automation. The physical layer parameter affects...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Worm Spreading and Patching in Inter-Vehicle Communications

    Inter-Vehicle Communications (IVC) rely on frequent data exchange among vehicles to facilitate road safety, congestion control, route planning, etc. The wireless connectivity among vehicles unfortunately poses a challenge for securing large-scale deployment of IVC systems. To successfully mitigate threats such as worm spreading in IVC systems, the authors describe the...

    Provided By International Journal of Communication Networks and Information Security

  • White Papers // Apr 2010

    Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS/WLAN Operations

    In this paper, two single rectangular patch antennas with a slot are designed and analyzed theoretically from the concept of multi-cavity structure. The theoretical return loss parameters of the antenna electrical characteristics are in good concordance with the Advanced Design System (ADS) simulation. Two patch antennas with rectangular slot are...

    Provided By International Journal of Communication Networks and Information Security