International Journal of Network Security & Its Applications (IJNSA)

Volume 3

November 2011, Volume 3, Number 6

Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security
William K. Moses Jr. and C. Pandu Rangan, Indian Institute of Technology - Chennai, India
An Overview of Penetration Testing
Aileen G. Bacudio1, Xiaohong Yuan1, Bei-Tseng Bill Chu2 and Monique Jones1, 1North Carolina A&T State University, USA
and 2University of North Carolina at Charlotte, USA
The Evolution of IDS Solutions in Wireless Ad-Hoc Networks To Wireless Mesh Networks
Novarun Deb, Manali Chakraborty and Nabendu Chaki, University of Calcutta, India
Enhancing Infrastructure Security in Real Estate
Kyle Dees and Syed (Shawon) Rahman, Capella University, USA
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.
Alpesh R. Sankaliya, V.Mishra and Abhilash Mandloi, Sardar Vallabhbhai National Institute of Technology, India
Role of Multiple Encryption in Secure Electronic Transaction
Himanshu Gupta1 and Vinod Kumar Sharma2, 1Amity University Campus, India and 2Gurukula Kangri Vishwavidyalaya, India
Securing IEEE 802.11g WLAN Using Open VPN and its Impact Analysis
Praveen Likhar, Ravi Shankar Yadav and Keshava Rao M, Defence Research and Development Organisation (DRDO)
- Bangalore, India
Statistical Quality Control Approaches to Network Intrusion Detection
Rohitha Goonatilake1, Rafic Bachnak1 and Susantha Herath2, 1Texas A&M International University, USA and 2St. Cloud
State University, USA
Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor
Pinaki Sarkar1, Amrita Saha2 and Samiran Bag3, 1Jadavpur University, India, 2IIT Bombay, India and 3Indian Statistical
Institute, India
Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key
P. Anuradha Kameswari, R. Chaya Kumari and L. Praveen Kumar, Andhra University, India
User Authentication using Native Language Passwords
Sreelatha Malempati1 and Shashi Mogalla2, 1R.V.R. & J.C. College of Engineering, India and 2Andhra University College
of Engineering, India
Prediction of Malicious Objects in Computer Network and Defense
Hemraj Sainia1, T. C. Panda2 and Minaketan Panda3, 1Alwar Institute of Engineering & Technology, India, 2Orissa Engineering
College, India and 3SPANCO TELE, India
Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri, Salalah College of Technology, Oman
Efficient Detection of Sybil attack Based on Cryptography in Vanet
Mina Rahbari and Mohammad Ali Jabreil Jamali, Islamic Azad University, Iran
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Debasis Das and Rajiv Misra, Indian Institute of Technology - Patna, India
Experimenting with the Novel Approaches in Text Steganography
Shraddha Dulera1, Devesh Jinwala1 and Aroop Dasgupta2, 1S V National Institute of Technology, India and 2Bhaskaracharya
Institute for Space Applications and Geo-Informatics, India
Techniques and Tools for Forensic Investigation of E-mail
M. Tariq Banday, University of Kashmir, India
Enhanced OneTime Pad Cipher with MoreArithmetic and Logical Operations with Flexible Key Generation Algorithm
S.G.Srikantaswamy1 and H.D.Phaneendra2, 1National Institute of Engineering - Mysore, India and 2 CSE NIE - Mysore, India
An Effective Prevention of Attacks using GI Time Frequency Algorithm under DDoS
K.Kuppusamy1 and S.Malathi2, 1Alagappa University, India and 2Manonmaniam Sundaranar University, India
Securing Mobile Agents in MANET against Attacks using Trust
Chandreyee Chowdhury and Sarmistha Neogy, Jadavpur University, India

September 2011, Volume 3, Number 5

Information Security Synthesis in Online Universities
Maria Schuett, Crisc and Syed (Shawon) M. Rahman, Capella University, USA
A Multiple Ballots Election Scheme Using Anonymous Distribution
Manabu Okamoto, Kanagawa Institute of Technology, Japan
Enhanced Secure Algorithm for Message Communication
Shaik Rasool, G. Sridhar, K. Hemanth Kumar and P. Ravi Kumar, S.C.E.T., India
Design & Implementation of Secure AODV in Multicast Routing to Detect DDOS Attack
Vikram Singh and Vatika, Chaudhary Devi Lal University, India
An ISP Based Notification and Detection System to Maximize Efficiency of Client Honeypots in Protection of End Users
Masood Mansoori and Ray Hunt, University of Canterbury, New Zealand
Simulation of the Combined Method
Ilya Levin and Victor Yakovlev, State University of Telecommunication, Russia
Prevention of Wormhole Attack in Wireless Sensor Network
Dhara Buch1 and Devesh Jinwala2, 1Government Engineering College Rajkot, India and 2S.V. National Institute of Technology,
DDNFS: a Distributed Digital Notary File System
Alexander Zanger, Bond University, Australia
Method for reducing of noise by improving Signal-to-Noise-Ratio in wireless LAN
R.Seshadri1 and N..Penchalaiah2, 1S.V.University, India and 2ASCET, India
Handwritten Text Image Authentication Using Back Propagation
A S N Chakravarthy1, Penmetsa V Krishna Raja2 and P S Avadhani3, 1Sri Aditya Engineering College, India, 2JNTUK, India
and 3Andhra University, India
A Hierarchical Intrusion Detection Architecture for Wireless Sensor Networks
Hossein Jadidoleslamy, The University of Guilan, Iran
BSK-WBSN: BioMetric Symmetric Keys tO Secure Wireless Body Sensors Networks
Mesmoudi Samira and Feham Mohammed, University of Tlemcen, Algeria
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Chintan Bhatt, Asha Koshti, Hemant Agrawal, Zakiya Malek and Bhushan Trivedi, GLS Institute of Computer Technology, India

Special Issue on "CNSA 2011"

Botnet Command Detection using Virtual Honeynet
J.S.Bhatia, R.K.Sehgal and Sanjeev Kumar, CDAC Mohali, India
CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
L.Kavisankar and C.Chellappan, Anna University, India
Assured Full Communication by Merging BlocksRandomly in Wireless Sensor Networks usingReed Solomon Code
for Key Predistribution
Pinaki Sarkar1 and Aritra Dhar2, 1Jadavpur University, India and 2Gurunanak Institute of Technology, India
Trust Enhanced Data Security in Free Roaming Mobile agents using Symmetric Key cryptography
G.Geetha1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India
Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism
Preeti Sachan and Pabitra Mohan Khilar, National Institute of Technology Rourkela, India
Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET
V. Anjana Devi1 and R. S. Bhuvaneswaran2, 1St. Joseph's College of Engineering, India and 2Anna University, India
Error Detection and Correction for Distributed Group Key Agreement Protocol
P.Vijayakumar, S.Bose and A.Kannan, Anna University - Chennai, India

July 2011, Volume 3, Number 4

Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network
Hichem Sedjelmaci and Mohamed Feham, Abou Bakr Belkaid University - Tlemcen, Algeria
Wavelet Thresholding Approach For Image Denoising
Pankaj Hedaoo and Swati S Godbole, G. H. Raisoni College of Engineering, Nagpur, India.
Architecture Of A Identity Based Firewall System
Nenad Stojanovski1 and Marjan Gusev2, 1Makedonski Telekom AD, Orce Nikolov BB, 1000 Skopje, Macedonia and
2Ss. Cyril and Methodius University, Macedonia
Cryptovirology: Virus Approach
Shivale Saurabh Anandrao, Vishwakarma Institute Of Information Technology - Pune, India
Security Apprehensions In Different Regions Of Cloud Captious Grounds
Gurdev Singh1 Amit Sharma1 and Manpreet Singh Lehal2, 1Eternal University, HP India and 2Lyallpur Khalsa College, India
A Novel Header Matching Algorithm For Intrusion Detection Systems
Mohammad A. Alia1, Adnan A. Hnaif1, Hayam K. Al-Anie1, Khulood Abu Maria1, Ahmed M. Manasrah2 and M. Imran
Sarwar3, 1Al Zaytoonah University, Jordan, 2Al Yarmouk University, Jordon and 3Universiti Sains Malaysia, Malaysia
A Novel Scheme For Deviation Detection In Asynchronous Distributed Pricing
S.S. Prasad, Rithika Baruah and Siddharth.A, National Institute of Technology, Jamshedpur, India
E-Voting Protocol Based On Public-Key Cryptography
Hayam K. Al-Anie, Mohammad A. Alia and Adnan A. Hnaif, Al Zaytoonah University, Jordan
Optimizing And Analysing The Effectiveness Of Security Hardening Measures Using Various Optimization Techniques
as Well as Network Management Models Giving Special Emphasis To Attack Tree Model
Prabhat Kumar Vishwakarma, University of Gondar, Ethiopia
Governing Information Security In Conjunction With Cobit And Iso 27001
Tolga Mataracioglu1 and Sevgi Ozkan2, 1TUBITAK National Research Institute of Electronics and Cryptology (UEKAE),
Turkey and 2Middle East Technical University, Turkey
An Evaluation Of Fingerprint Security Using Noninvertible Biohash
N.Radha1 and S.Karthikeyan2, 1Karpagam University, India and 2College of Applied Sciences, Sultanate of Oman
RTOS Based Secure Shortest Path Routing Algorithm In Mobile Ad- Hoc Networks
R. Ramesh and S. Gayathri, Anna University, India
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer
Gulshan Kumar and Mritunjay Rai, Lovely Professional University, Jalandhar, India.
An Ancient Indian Board Game as a Tool for Authentication
Sreelatha Malempati1 and Shashi Mogalla2, 1RVR & JC College of Engineering, Guntur, A.P and 2Andhra University
College of Engineering, Visakhapatnam, A.P
Ensemble Of Blowfish With Chaos Based S Box Design For Text And Image Encryption
Jeyamala Chandrasekaran1 Subramanyan B1 and Raman G.S2, 1Thiagarajar College of Engineering, Madurai and 2KLN College
of Information Technology, Madurai

May 2011, Volume 3, Number 3

System Dynamics Based Insider Threats Modeling
Sang-Chin Yang and Yi-Lu Wang, National Defense University, Republic of China
Countermeasure Tool - Carapace for Network Security
Anand Bisen, Shrinivas Karwa and B.B. Meshram, Veermata Jijabai Technological Institute, India
On Design of PUF-Based Random Number Generators
Mehdi Ayat1, Reza Ebrahimi Atani2 and Sattar Mirzakuchaki1, 1Iran University of Science and Technology, Iran and
2The University of Guilan, Iran
Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment
Nirmal Dagdee and Ruchi Vijaywargiya, S.D. Bansal College Of Technology, India
Data Security Using Private Key Encryption System Based on Arithmetic Coding
Ajit Singh and Rimple Gilhotra, BPS Mahila Vishwavidyalaya, India
PKI in Government Identity Management Systems
Ali M. Al-Khouri, Emirates Identity Authority, United Arab Emirates
Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN
Asis Kumar Tripathy, Shradhananda Beura, Muralidhar Behera and Gunanidhi Pradhan, NM Institute of Engineering
and Technology, India
Authentication Schemes for Session Passwords Using Color and Images
M Sreelatha1, M Shashi2, M Anirudh1, Md Sultan Ahamer1 and V Manoj Kumar1, 1RVR & JC College of Engineering, India
and 2Andhra University College of Engineering, India
Transformation from Identity Stone Age to Digital Identity
Mohit Kohli, Rolta Technology Limited (RIL), India
Enterprise Delegation for Service Based Systems
Coimbatore Chandersekaran1 and William R. Simpson2, 1The Secretary of the Air Force, USA and 2The Institute for Defense
Analyses, USA
An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification
Ferdous A Barbhuiya, Santosh Biswas and Sukumar Nandi, Indian Institute of Technology - Guwahati, India
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
S.A.Arunmozhi and Y.Venkataramani, Saranathan College of Engineering, India
TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET
Ahmed M. Abd El-Haleem and Ihab A. Ali, Helwan University, Egypt

March 2011, Volume 3, Number 2

A Light Weight Protocol To Provide Location Privacy In Wireless Body Area Networks
Mohammed Mana1, Mohammed Feham1 and Boucif Amar Bensaber2, 1University of Tlemcen, Algeria and 2Universite du
Quebec a Trois-Rivieres, Canada
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards
Ashok Kumar Das, International Institute of Information Technology - Hyderabad, India
Digital Watermarking through Embedding of Encrypted and Arithmetically Compressed Data into Image using Variable
Length Key
Sabyasachi Samanta1, Saurabh Dutta2 and Goutam Sanyal3, 1Haldia Institute of Technology, India, 2Dr. B. C. Roy
Engineering College - Durgapur, India and 3National Institute of Technology - Durgapur, India
The Key Exchange Cryptosystem Used With Higher Order Diophantine Equations
Harry Yosh, HECO Ltd - Canberra, Australia
Design And Efficient Deployment Of Honeypot And Dynamic Rule Based Live Network Intrusion Collaborative System
Renuka Prasad.B1, Annamma Abraham2, Abhas Abhinav3, Sunil.V.Gurlahosur4 and Srinivasa Y4, 1R.V.College of
Engineering, India, 2BMSIT - Bengaluru, India, 3DeepRootLinux Pvt Ltd, India, 4SIT - Tumkur, India
Confidentiality & Authentication Mechanism for Biometric Information Transmitted over Low Bandwidth & Unreliable
Raju Singh and A.K.Vatsa, Shobhit University, India.
Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience
C Singh, L Singh and E Marks, University of Guyana
Uncoercibility In E-Voting And E-Auctioning Mechanisms Using Deniable Encryption
Jaydeep Howlader, Vivek Nair, Saikat Basu and A. K. Mal, National Institute of Technology - Durgapur, India
A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password
Tanmay Bhattacharya1, Sirshendu Hore2, Ayan Mukherjee3 and S. R. Bhadra Chaudhuri4, 1JIS College Engineering, India,
2Hooghly Engineering & Technology College, India, 3Institute of Science & Technology, India and 4Bengal Engineering
& Science University, India
Replication Attack Mitigations for Static And Mobile WSN
V.Manjula and C.Chellappan, Anna University - Chennai, India
Stage Staffing Scheme for Copyright Protection In Multimedia
Sumit Kumar, Santosh Kumar and Sukumar Nandi, Indian Institute of Technology - Guwahati, India
Substitution-diffusion based Image Cipher
Narendra K Pareek1, Vinod Patidar2 and Krishan K Sud2, 1M L Sukhadia University - Udaipur, India and 2Sir Padampat
Singhania University, India
A Robust Mechanism For Defending Distributed Denial Of Service Attacks On Web Servers
Jaydip Sen, Innovation Lab, Tata Consultancy Services Ltd.,- Kolkata, India
Image Encryption Based On Diffusion And Multiple Chaotic Maps
G.A.Sathishkumar1, K.Bhoopathy bagan2 and N.Sriraam3, 1Sri Venkateswara College of Engineering, India, 2Madras Institute
of Technology, India and 3SSN College of Engineering, India
A QoS Based MAC Protocol For Wireless Ad-hoc Network
Vandana khare1, D.SrinivasRao2 and Y.Madhavee Latha3, 1CMEC - Hyd, India, 2JNTUH - Hyd, India and 3MRECW - Hyd, India

January 2011, Volume 3, Number 1

Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options
Ishtiaq Ali and Natarajan Meghanathan, Jackson State University, USA
Comparison Process Long Execution Between PQ Algorthm And New Fuzzy Logic Algorithm For VOIP
Suardinata, Kamalrulnizam bin Abu Bakar and Nimitr Suanmali, University Teknologi Malaysia, Malaysia
An Overview Of The Security Concerns In Enterprise Cloud Computing
Anthony Bisong1 and Syed (Shawon) M. Rahman2, 1Capella University,USA and 2University of Hawaii-Hilo, USA
A Human-Centric Approach To Group-Based Context-Awareness
Nasser Ghadiri, Ahmad Baraani-Dastjerdi, Nasser Ghasem-Aghaee and Mohammad A. Nematbakhsh, University of Isfahan,
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
Iwendi, C. O and Allen, A. R. , University of Aberdeen, Scotland, UK
Failure of A Mix Network
Kun Peng, Institute for Infocomm Research, Singapore
Analysis of Web Logs And Web User In Web Mining
L.K. Joshila Grace1, V.Maheswari1 and Dhinaharan Nagamalai2, 1Sathyabama University, India and 2Wireilla Net Solutions
PTY Ltd, Australia