GLOBAL DIGITAL LIBRARY

 

Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books. 

Visit Website >

IOARP EDITORIAL SYSTEM

 

IES is a comprehensive web-based software designed exclusively to manage the review process for conferences, journals, and books.

 

Visit Website >

LATEST RESEARCH NEWS

Our dedicated team researches through thousands of scholarly articles, blogs, and technology magazines to publish cutting-edge research in your field of interest. 

Read Research News >

IOARP NEWSLETTER

 

We publish a monthly newsletter to keep our readers posted about IOARP activities, information on products and services, and benefits of publishing with us.

 

Read Newsletter >

IOARP Journal of Communication and Networks

IOARP Journal of Communication and Networks

Volume 2

IOARP Journal of Communication and Networks (IOARP JCN) aims to provide an opportunity to the scientists, researchers, engineers, physicists, applied mathematicians, and practitioners to publish their high-quality research on fundamental advances, the current state of the technology, outcomes of ongoing research, and emerging issues in the domains of communication and networks. We are particularly interested in publishing cutting-edge communication and networks research converging with the domains such as; engineering and physical sciences, social sciences and humanities, and life, health, and biomedical sciences.


Volume 2
Issue 1, March 2018 | Issue 2, June 2018 | Issue 3, September 2018 | Issue 4, December 2018 |

IOARP Journal of Communication and Networks (JCN)
15 October 2018
JCN02
46
Dr M Adeel
www.jcn.ioarp.org
Copyright © 2015-2021 IOARP

Journal Homepage on Global Digital Library
PDF
PDF
PDF
PDF
PDF
PDF

Wireless Body Area Network (WBAN): Security and Authentication Methods

Munir Hussain

The demand for WBAN has increased for last few years because it is useful network to monitor and improve various health conditions of human being. Information’s exchanges among different entities are very sensitive, so it is vital to keep this information’s secure from unauthorized access in order to avoid unpleasant incidents. Security and privacy are the most critical issues. Security is the important issue for any network and especially in WBANs its proper management is very crucial otherwise biomedical data collected by sensor nodes should be mixed with other user’s data. Also patients do not want their personal data to be misused and WBAN should provide the privacy to prevent eavesdropping. Mutual authentication is also a key challenge in WBAN and patients’ data originality and integrity are important for their treatment diagnosis etc. Development of the new mutual authentication schemes in healthcare applications without considering security makes patient privacy vulnerable. In this paper, we discuss communication technologies, possible attacks and recently most used popular authentication methods in WBANs.

More...


Efficient Data Aggregation Scheme in Secure Tree based Wireless Sensor Networks (EDAS)

Khalid Khan

Wireless sensor networks (WSNs) have emerged as an important area of research from the last two decades. In WSNs, sensors have limited memory, computational capability and battery power. One of the solutions to these issues is to reduce the data transmission and today, various data aggregation protocols have been proposed to reduce network traffic. But they created security issues like authentication, data integrity and freshness. Hop-by-hop secure data aggregation protocols were proposed to provide security along with data aggregation function. But, data on the aggregators still need to be secured because aggregators are exposed to node compromises. End-to-end secure data aggregation protocols are proposed. They provide end-to-end security and privacy of data. One of these protocols is Secure End-to-End Data Aggregation (SEEDA), which ensured end-to-end privacy of data. However, the protocol has higher communication cost and computational overheads because it sends extra bits/data regarding non-responding nodes and performs unnecessary computations for non-responding nodes. I proposed new protocol, EDAS which reduces 12% to 25% communication and computational overheads as compared to SEEDA and it is also efficient in energy consumption.

More...


Collecting Statistical Parameters on Mobile Phones for Detection of Security Attacks and Mobile Malware

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Communication between mobiles using technologies like Bluetooth, MMS, SMS, Mobile and Home Broadband can increases their susceptibility to mobile security threats. In the past few years, mobile malware has emerged as one of the major threats for modern-day mobile devices. Since the first malware outbreak in 2004, hundreds of mobile viruses, worms, Trojans and spyware and over thousands of their variants have been discovered. With such a large number of ever-evolving malware, it is challenging to develop an electronic system capable of detecting such malware. In this work, the statistical data generated as a consequence of interactions on mobile devices and the mechanism of recording this data against statistical parameters on mobile devices is discussed. We also provide a detailed taxonomy of the low and high-order statistical parameters, and discuss how these parameters (besides utilisation in other scenarios) can be affectively utilised in the detection of a variety of security attacks and malware types.

More...


SKEP & SEEKDP: Towards Secure and Energy-Efficient Key Exchange and Distribution in Wireless Sensor Networks

Munir Hussain, Khalid Khan

Security and Energy are important issues when wireless sensor network (WSN) is deployed in harsh environments. WSN security becomes real challenge for the researchers because these networks are vulnerable to security attacks due to the broadcast nature of transmission. Due to the limited memory, CPU, and battery power of sensor nodes, traditional asymmetric-key distribution protocols are expensive and rather infeasible. Thus only a very few conventional protocols can readily be used in sensor networks and key management schemes should be designed carefully to reduce computations power over the sensor node as well. In this paper we analyse existing Key Management Protocols like SPINS, SEKEN, SNAKE, and Security Architecture for Mobile WSNs and BROSK for their vulnerabilities against Denial of Service attacks. In WSNs, where the most protocols working on point-to-point handshaking procedures to negotiate link dependent keys, this influence the scalability of the network, we present a novel protocol SKEP to construct link dependent keys by unicasting. We also propose SEEKDP a security protocol that prevents certain attacks, distribute keys, exchange information in an efficient manner and provide security by consuming less energy of regular sensor node.

More...