International Journal of Network Security & Its Applications (IJNSA)

Volume 4

November 2012, Volume 4, Number 6

RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Merad Boudia Omar Rafik and Feham Mohamed, University of Tlemcen, Algeria
Secured RFID Mutual Authentication Scheme for Mifare Systems
Kuo-Tsang Huang and Jung-Hui Chiu, Chang Gung University, Taiwan
Malware Detection, Supportive Software Agents and Its Classification Schemes
Adebayo, Olawale Surajudeen1, M.A. Mabayoje2, Amit Mishra3 and Osho Oluwafemi1, 1Federal University of Technology,
Nigeria, 2University of Ilorin, Nigeria and 3IBB University Lapai, Nigeria
Mining Techniques in Network Security to Enhance Intrusion Detection Systems
Maher Salem and Ulrich Buehler, University of Applied Sciences, Germany
A Quantum based Challenge-Response User Authentication Scheme over Noiseless Channel
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1 , Hisham Zainuddin1 and Suhairi Saharudin2,
1University Putra Malaysia, Malaysia and 2MIMOS - Technology Park Malaysia, Malaysia
Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
Manu S. Hegde, Jnanamurthy HK and Sanjay Singh, Manipal University, India
The Effect of the Number of Mobile Nodes on Varying Speeds of MANETS
John Tengviel1, K. Diawuo2 and K. A. Dotche2, 1Sunyani Polytechnic, Ghana and 2KNUST Kumasi, Ghana
Wireless Public Key Infrastructure for Mobile Phones
Balachandra Muniyal, Krishna Prakash and Shashank Sharma, Manipal University, India
Secure Key Management Protocol in WIMAX
Noudjoud Kahya1, Nacira Ghoualmi1 and Pascal Lafourcade2, 1Badji Mokhtar University, Algeria and 2Joseph Fourier
University, France
A Novel Multipoint Relay based Secure Routing in MANET
Himadri Nath Saha, Debika Bhattacharyya and P.K.Banerjee, IEM KolaKata, India
Network Threat Characterization in Multiple Intrusion Perspectives using Data Mining Technique
Oluwafemi Oriola, Adesesan B. Adeyemo and Oluwaseyitanfunmi Osunade, University of Ibadan, Nigeria
Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography
Arpita Sarkar and Sachin Tripathi, Indian School of Mines Dhanbad, India
Review on IPv6 Security Vulnerability Issues and Mitigation Methods
Supriyanto1, Raja Kumar Murugesan2 and Sureswaran Ramadass3, 1Universitas Sultan Ageng Tirtayasa, Indonesia, 2Taylor's
University, Malaysia and 3National Advanced IPv6 Centre (NAv6) Universiti Sains, Malaysia

September 2012, Volume 4, Number 5

Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution
Abudhahir Buhari1, Zuriati Ahmad Zukarnain1, Shamala K. Subramaniam1, Hisham Zainuddin1 and Suhairi Saharudin2,
1University Putra Malaysia, Malaysia and 2Technology Park Malaysia, Malaysia
Comparison of High Speed Congestion Control Protocols
Jawhar Ben Abed1, Laarif Sinda2, Mohamed Ali Mani3 and Rachid Mbarek2, 1Polytech Sousse, 2ISITCOM Hammam Sousse
and 3ISTLS Sousse, Tunisia
Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts
Priyanka Dey and Suparna Biswas, West Bengal University, India
A Framework For Performance Evaluation Of ASIPs in Network-Based IDS
Majid Nezakatolhoseini1 and Mohammad Amin Taherkhani2, 1Science and Research Branch Islamic Azad University, Iran
and 2Shahid Beheshti University, Iran
Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV
Chaitali Biswas Dutta and Utpal Biswas, University of Kalyani, India
Security V/S Qos for LTE Authentication and Key Agreement Protocol
Jacques Bou Abdo1, Jacques Demerjian2 and Hakima Chaouchi3, 1Nokia Siemens Networks, Lebanon, 2Antonine University,
Lebanon and 3Telecom Sud Paris, France
Comparison of Certificate Policies Formerging Public Key Infrastructuresduring Merger and Acquisition of Companies
Balachandra Muniyal1, Prema K.V2 and Mamatha Balachandra1, 1Manipal University, India and 2Modi Institute of
Technological Sciences, India
Healthcare IT: Is Your Information At Risk?
Kimmarie Donahue1 and Syed (Shawon) M. Rahman2, 1San Antonio, USA and 2Capella University, USA
A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications
H.Jayasree1 and A.Damodaram2, 1ATRI, India and 2JNTUH - Kukatpally, India
A Survey on Web Spam Detection Methods: Taxonomy
Shekoofeh Ghiam1 and Alireza Nemaney Pour2, 1Sharif University of Technology, Iran and 2Islamic Azad University of Abhar,
Iran
Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc Network
Amol Vasudeva1 and Manu Sood2, 1Jaypee University of Information Technology, India and 2Himachal Pradesh University,
India
A Simple and Reliable Touch Sensitive Security System
Adamu Murtala Zungeru1, Jonathan Gana Kolo1 and Ijarotimi Olumide2, 1University of Nottingham, Malaysia and
2Rufus Giwa Polytechnic, Nigeria
Taxonomy Based Intrusion Attacks and Detection Management Scheme in Peer-Topeer Network
Prashant Kumar Singh1, A. K. Vatsa1, Reetu Sharma2 and Priyanka Tyagi3, 1Shobhit University, India, 2CERT, India and
3DVSIET, India
Secured Text Message Transmission in Pre -Channel Equalization Based MIMO- OFDM System with Implementation of
Concatenated ECB and CFB Cryptographic Algorithm
Laila Naznin,Shahrina Sultana, M. Golam Rashed and Shaikh Enayet Ullah, University of Rajshahi, Bangladesh
Explore Ten Different Types of Software Engineering Principles
S.Thulasee Krishna1, S.Sreekanth1, B. Bhaskar1 and N.Pavan Kumar2, 1Kuppam Engineering College, India and 2Sitams,
Chittoo(DT), India

July 2012, Volume 4, Number 4

Resilient Voting Mechanisms for Mission Survivability in Cyberspace: Combining Replication and Diversity
Charles A. Kamhoua1, Patrick Hurley1, Kevin A. Kwiat1 and Joon S. Park2, 1Air Force Research Laboratory - Information
Directorate, USA and 2Syracuse University, USA
Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP
Abdullah AlOtaibi and Hamza Aldabbas, De Montfort University, United Kingdom
Evaluation of Security Attacks on UMTS Authentication Mechanism
Mojtaba Ayoubi Mobarhan, Mostafa Ayoubi Mobarhan and Asadollah Shahbahrami, University of Guilan, Iran
Non-Profit Organizations' Need to Address Security for Effective Government Contracting
Lee E. Rice1 and Syed (Shawon) M. Rahman1,2, 1Capella University,USA and 2University of Hawaii-Hilo, USA
A Novel Energy Efficient and Administrator Based Secured Routing in MANET
Himadri Nath Saha1, Debika Bhattacharyya1 and P. K.Banerjee2, 1Institute of Engineering and Management West Bengal,
India and 2Jadavpur university, India
Dominant Features Identification for Covert Nodes in 9/11 Attack Using their Profile
S.Karthika, A.Kiruthiga And S.Bose, Anna University, India
How to Avoid the N-1 Attack Without Costly Implementations
David Tinoco Varela, Universidad Nacional Autonoma de Mexico, Mexico
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
Manas Paul1 and Jyotsna Kumar Mandal2, 1JIS College of Engineering, India and 2Kalyani University, India
Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System
TALAL AL-KHAROBI and Mohmmed Abduallah Al-Mehdhar, King Fahd University of Petroleum & Minerals(KFUPM),
Saudi Arabia
A Comparative Study of the Traditional Model of IEEE 802.15.4 and Non-Overlapping Binary Exponential Backoff
IEEE 802.15.4
Archit Verma Pushpinder Singh Patheja and Akhilesh Waoo, BIST Bhopal, India
An Improved Watchdog Technique Based On Power-Aware Hierarchical Design For Ids In Wireless Sensor Networks
A. Forootaninia1 and M. B. Ghaznavi-Ghoushchi2, 1Tehran University, Iran and 2Shahed University, Iran
Personal Safety Triggering System on Android Mobile Platform
Ashokkumar Ramalingam, Prabhu Dorairaj and Saranya Ramamoorthy, Blekinge Institute of Technology, Sweden
A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks
Mahdi Aiash, Glenford Mapp and Aboubaker Lasebae, Middlesex University, UK
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games
Karim KONATE and Abdourahime GAYE, University Cheikh Anta DIOP, Dakar

May 2012, Volume 4, Number 3

Generating Representative Attack Test Cases for Evaluating and Testing Wireless Intrusion Detection Systems
Khalid Nasr, Anas Abou El Kalam and Christian Fraboul, Universite de Toulouse Toulouse, France
Survey and Taxonomy of Key Management Protocols for Wired and Wireless Networks
Adarsh Kumar, Alok Aggarwal and Charu, Jaypee Institute of Information and Technology Noida, India
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Robayet Nasim, University of Science & Technology Chittagong, Bangladesh
Energy Constrained Reliable Routing Optimized Cluster Head Protocol for Multihop under Water Acoustic Sensor Networks
Padmavathy.T.V, Gayathri.V, Indhumathi.V and Karthiga.G, R.M.K Collge of Engineering Chennai, India
The New Age of Computer Virus and Their Detection
Nitesh Kumar Dixit1, Lokesh mishra2, Mahendra Singh Charan1 and Bhabesh Kumar Dey1, 1BIET Sikar, India and
2NCAC Sikar, India
Provable Secure Identity Based Signcryption Schemes without Random Oracles
Prashant Kushwah1 and Sunder Lal2, 1Banasthali University, India and 2Veer Bahadur Singh Purvanchal University, India
Lossless Reconstruction of Secret Image Using Threshold Secret Sharing and Transformation
P. Devaki and G. Raghavendra Rao, NIE Mysore, India
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
P.Natesan and P.Balasubramanie, Kongu Engineering College, India

March 2012, Volume 4, Number 2

A Generic Framework for Device Pairing in Ubiquitous Computing Environments
Yasir Arfat Malkani, Dan Chalmers, Ian Wakeman and Lachhman Das Dhomeja, University of Sussex, UK
LSR Protocol Based on Nodes Potentiality in Trust and Residual Energy for WSNs
Shaik Sahil Babu, Arnab Raha and M.K.Naskar, Jadavpur University, India
Cross Layer Intrusion Detection System for Wireless Sensor Network
Djallel Eddine Boubiche and Azeddine Bilami, LaSTIC Laboratory - UHL Batna, Algeria
Minimizing the Time of Spam Mail ‎Detection by Relocating ‎Filtering System to the Sender ‎Mail Server
Alireza Nemaney Pour1, Raheleh Kholghi2 and Soheil Behnam Roudsari2, 1Islamic Azad University of Abhar, Iran and
2Sharif University of Technology, Iran
A Bayesian Classification on Asset Vulnerability for Real Time Reduction of False Positives in Ids
G.Jacob Victor1, M Sreenivasa Rao2 and V.CH. Venkaiah3, 1SERP - RD Department, India, 2JNTU - Hyderabad, India and
3CRRao AIMS & CS - Hyderabad, India
Cloud Computing Security in Business Information Systems
Sasko Ristov, Marjan Gusev and Magdalena Kostoska, Ss. Cyril and Methodius University, Macedonia
Design and Analysis of a Novel Digital Image Encryption Scheme
Narendra K Pareek, M L Sukhadia University, India
An Implementation of Intrusion Detection System Using Genetic Algorithm
Mohammad Sazzadul Hoque, Md. Abdul Mukit and Md. Abu Naser Bikas, Shahjalal University of Science and Technology,
Bangladesh
Forensic Analysis of Windows Registry Against Intrusion
Haoyang Xie1, Keyu Jiang1, Xiaohong Yuan2 and Hongbiao Zeng1, 1Fort Hays State University, USA and 2North Carolina
A&T State University, USA
LPM: A Distributed Architecture and Alogorithms for Location Privacy in LBS
Muhamed Ilyas and R. Vijayakumar, Mahatma Gandhi University Kottayam, India
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Ashvini Vyavhare, Varsharani Bhosale, Mrunal Sawant and Fazila Girkar, College of Engineering - Pune, India
Lattice Based Tools in Cryptanalysis for Public Key Cryptography
R.Santosh Kumar1, C.Narasimham2 and S.Pallam Setty3, 1MVGR College of Engg., India, 2VR Siddhartha Engineering College,
India and 3Andhra University, India
Identification of Image Spam by Using Low Level & Metadata Features
Anand Gupta, Chhavi Singhal and Somya Aggarwal, Netaji Subhas Institute of Technology, India
Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security
S. Sree Vivek1, S. Sharmila Deva Selvi1, V. Radhakishan2, C. Pandu Rangan1, 1IIT Madras, India and 2NIT Trichy, India
Passblot: A Highly Scalable Graphical one Time Password System
Sainath Gupta, Shashank Sahni, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India

January 2012, Volume 4, Number 1

Optimizing One Fair Document Exchange Protocol
Abdullah M. Alaraj, Qassim University, Saudi Arabia
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots
K.Munivara Prasad1, A.Rama Mohan Reddy2 and V Jyothsna3, 1Rayalaseema University, India, 2SV University, India and
3Sree vidyanikethan Engg.College, India
Protected Data Objects Replication in Data Grid
G. Aruna Kranthi and D. Shashi Rekha, S.R. Engineering College - Warangal, India
Erratum:Due to a serious case of plagiarism this paper has been retracted.
Efficient & Secure Data Hiding Using Secret Reference Matrix
Laxman Tawade1, Rajshree Mahajan2 and Chandan Kulthe2, 1Pune University, India and 2Aditya Engineering College, India
Risks and Remedies in E-Learning System
Nikhilesh Barik and Sunil Karforma, Burdwan University, India
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Priyank Singhal and Nataasha Raul, Sardar Patel Institute of Technology - University of Mumbai, India
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network
G.Padmavathi, P.Subashini and D.Devi Aruna, Avinashiligam University for Women, India
Trust Based Scheme for QoS Assurance in Mobile Ad-Hoc Networks
Sridhar Subramanian1 and Baskaran Ramachandran2, 1Easwari Engineering College - Chennai, India and 2Anna University
- Chennai, India
A Novel Approach Using Advanced Encryption Standard to Implement Hard Disk Security
Minal Moharir and A V Suresh, R V College of Engineering Bangalore, India
A Security Suite for Wireless Body Area Networks
Raghav V. Sampangi1, Saurabh Dey2, Shalini R. Urs3 and Srinivas Sampalli1, 1Dalhousie University, Canada, 2Analytics
Quotient Bangalore, India and 3University of Mysore, India
A Defensive Mechanism Cross Layer Architecture for Manets to Identify and Correct Misbehaviour in Routing
G.S. Mamatha, R.V. College of Engineering Bangalore, India
The Coordinate Ratios as a Tool to Analyze the Intrusion based on Buzek-Hillery Quantum Copying Machine
Besma Othmani1, Mohsen Machhout1, Houcine Mejri1,2, Hafedh Belmabrouk1 and Rached Tourki1, 1Laboratoire
d'Electronique et Micro Electronique Faculte des Sciences de Monastir, Tunisia and 2Ecole Preparatoire aux Academies
Melitaires, Tunisia