Abstract: A new secure knapsack cryptosystem based on the
Merkle-Hellman public key cryptosystem will be proposed in this
paper. Although it is common sense that when the density is low, the
knapsack cryptosystem turns vulnerable to the low-density attack. The
density d of a secure knapsack cryptosystem must be larger than
0.9408 to avoid low-density attack. In this paper, we investigate a
new Permutation Combination Algorithm. By exploiting this
algorithm, we shall propose a novel knapsack public-key cryptosystem.
Our proposed scheme can enjoy a high density to avoid the
low-density attack. The density d can also exceed 0.9408 to avoid
the low-density attack.
Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) which is a combination of path fingerprint and client puzzle concepts. In this each IP packet has a unique fingerprint is embedded that represents, the route a packet has traversed. The server maintains a mapping table which contains the client IP address and its corresponding fingerprint. In ingress router, client puzzle is placed. For each request, the puzzle issuer provides a puzzle which the source has to solve. Our design has the following advantages over prior approaches, 1) Reduce the network traffic, as we place a client puzzle at the ingress router. 2) Mapping table at the server is lightweight and moderate.
Abstract: In this paper, we present a new learning algorithm for
anomaly based network intrusion detection using improved self
adaptive naïve Bayesian tree (NBTree), which induces a hybrid of
decision tree and naïve Bayesian classifier. The proposed approach
scales up the balance detections for different attack types and keeps
the false positives at acceptable level in intrusion detection. In
complex and dynamic large intrusion detection dataset, the detection
accuracy of naïve Bayesian classifier does not scale up as well as
decision tree. It has been successfully tested in other problem
domains that naïve Bayesian tree improves the classification rates in
large dataset. In naïve Bayesian tree nodes contain and split as
regular decision-trees, but the leaves contain naïve Bayesian
classifiers. The experimental results on KDD99 benchmark network
intrusion detection dataset demonstrate that this new approach scales
up the detection rates for different attack types and reduces false
positives in network intrusion detection.
Abstract: Electronic seal is an electronic device to check the
authenticity and integrity of freight containers at the point of arrival.
While RFID-based eSeals are gaining more acceptances and there are
also some standardization processes for these devices, a recent
research revealed that the current RFID-based eSeals are vulnerable to
various attacks. In this paper, we provide a feasible solution to
enhance the security of active RFID-based eSeals. Our approach is to
use an authentication and key agreement protocol between eSeal and
reader device, enabling data encryption and integrity check. Our
protocol is based on the use of block cipher AES, which is reasonable
since a block cipher can also be used for many other security purposes
including data encryption and pseudo-random number generation. Our
protocol is very simple, and it is applicable to low-end active RFID
eSeals.
Abstract: Health problems linked to urban growth are current
major concerns of developing countries. In 2002 and 2005, an
interdisciplinary program “Populations et Espaces ├á Risques
SANitaires" (PERSAN) was set up under the patronage of the
Development and Research Institute. Centered on health in
Cameroon-s urban environment, the program mainly sought to (i)
identify diarrhoea risk factors in Yaoundé, (ii) to measure their
prevalence and apprehend their spatial distribution. The crosssectional
epidemiological study that was carried out revealed a
diarrheic prevalence of 14.4% (437 cases of diarrhoea on the 3,034
children examined). Also, among risk factors studied, household
refuse management methods used by city dwellers were statistically
associated to these diarrhoeas. Moreover, it happened that levels of
diarrhoeal attacks varied consistently from one neighbourhood to
another because of the discrepancy urbanization process of the
Yaoundé metropolis.
Abstract: In this paper, a new robust audio fingerprinting
algorithm in MP3 compressed domain is proposed with high
robustness to time scale modification (TSM). Instead of simply
employing short-term information of the MP3 stream, the new
algorithm extracts the long-term features in MP3 compressed domain
by using the modulation frequency analysis. Our experiment has
demonstrated that the proposed method can achieve a hit rate of
above 95% in audio retrieval and resist the attack of 20% TSM. It has
lower bit error rate (BER) performance compared to the other
algorithms. The proposed algorithm can also be used in other
compressed domains, such as AAC.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
Abstract: The present work describes a computational study of
aerodynamic characteristics of GLC305 airfoil clean and with 16.7
min ice shape (rime 212) and 22.5 min ice shape (glaze 944).The
performance of turbulence models SA, Kε, Kω Std, and Kω SST
model are observed against experimental flow fields at different
Mach numbers 0.12, 0.21, 0.28 in a range of Reynolds numbers
3x106, 6x106, and 10.5x106 on clean and iced aircraft airfoil
GLC305. Numerical predictions include lift, drag and pitching
moment coefficients at different Mach numbers and at different angle
of attacks were done. Accuracy of solutions with respect to the
effects of turbulence models, variation of Mach number, initial
conditions, grid resolution and grid spacing near the wall made the
study much sensitive. Navier Stokes equation based computational
technique is used. Results are very close to the experimental results.
It has seen that SA and SST models are more efficient than Kε and
Kω standard in under study problem.
Abstract: In recent years with the rapid development of Internet and the Web, more and more web applications have been deployed in many fields and organizations such as finance, military, and government. Together with that, hackers have found more subtle ways to attack web applications. According to international statistics, SQL Injection is one of the most popular vulnerabilities of web applications. The consequences of this type of attacks are quite dangerous, such as sensitive information could be stolen or authentication systems might be by-passed. To mitigate the situation, several techniques have been adopted. In this research, a security solution is proposed using Artificial Neural Network to protect web applications against this type of attacks. The solution has been experimented on sample datasets and has given promising result. The solution has also been developed in a prototypic web application firewall called ANNbWAF.
Abstract: In this paper, an artificial intelligent technique for
robust digital image watermarking in multiwavelet domain is
proposed. The embedding technique is based on the quantization
index modulation technique and the watermark extraction process
does not require the original image. We have developed an
optimization technique using the genetic algorithms to search for
optimal quantization steps to improve the quality of watermarked
image and robustness of the watermark. In addition, we construct a
prediction model based on image moments and back propagation
neural network to correct an attacked image geometrically before the
watermark extraction process begins. The experimental results show
that the proposed watermarking algorithm yields watermarked image
with good imperceptibility and very robust watermark against various
image processing attacks.
Abstract: Numerical analysis for the aerodynamic characteristics
of the WIG (wing-in ground effect) craft with highly cambered and
aspect ratio of one is performed to predict the ground effect for the
case of with- and without- lower-extension endplate. The analysis is
included varying angles of attack from 0 to10 deg. and ground
clearances from 5% of chord to 50%. Due to the ground effect, the lift
by rising in pressure on the lower surface is increased and the
influence of wing-tip vortices is decreased. These two significant
effects improve the lift-drag ratio. On the other hand, the endplate
prevents the high-pressure air escaping from the air cushion at the
wing tip and causes to increase the lift and lift-drag ratio further. It is
found from the visualization of computation results that two wing-tip
vortices are generated from each surface of the wing tip and their
strength are weak and diminished rapidly. Irodov-s criteria are also
evaluated to investigate the static height stability. The comparison of
Irodov-s criteria shows that the endplate improves the deviation of the
static height stability with respect to pitch angles and heights. As the
results, the endplate can improve the aerodynamic characteristics and
static height stability of wings in ground effect, simultaneously.
Abstract: There is a acute water problem especially in the dry
season in and around Perundurai (Erode district, Tamil Nadu, India)
where there are more number of tannery units. Hence an attempt was
made to use the waste water from tannery industry for construction
purpose. The mechanical properties such as compressive strength,
tensile strength, flexural strength etc were studied by casting various
concrete specimens in form of cube, cylinders and beams etc and
were found to be satisfactory. Hence some special properties such as
chloride attack, sulphate attack and chemical attack are considered
and comparatively studied with the conventional potable water. In
this experimental study the results of specimens prepared by using
treated and untreated tannery effluent were compared with the
concrete specimens prepared by using potable water. It was observed
that the concrete had some reduction in strength while subjected to
chloride attack, sulphate attack and chemical attack. So admixtures
were selected and optimized in suitable proportion to counter act the
adverse effects and the results were found to be satisfactory.
Abstract: Recently, many existing partially blind signature scheme based on a single hard problem such as factoring, discrete logarithm, residuosity or elliptic curve discrete logarithm problems. However sooner or later these systems will become broken and vulnerable, if the factoring or discrete logarithms problems are cracked. This paper proposes a secured partially blind signature scheme based on factoring (FAC) problem and elliptic curve discrete logarithms (ECDL) problem. As the proposed scheme is focused on factoring and ECDLP hard problems, it has a solid structure and will totally leave the intruder bemused because it is very unlikely to solve the two hard problems simultaneously. In order to assess the security level of the proposed scheme a performance analysis has been conducted. Results have proved that the proposed scheme effectively deals with the partial blindness, randomization, unlinkability and unforgeability properties. Apart from this we have also investigated the computation cost of the proposed scheme. The new proposed scheme is robust and it is difficult for the malevolent attacks to break our scheme.
Abstract: The interaction of the blade tip with the casing
boundary layer and the leakage flow may lead to a kind of cavitation
namely tip vortex cavitation. In this study, the onset of tip vortex
cavitation was experimentally investigated in an axial flow pump.
For a constant speed and a fixed angle of attack and by changing the
flow rate, the pump head, input power, output power and efficiency
were calculated and the pump characteristic curves were obtained.
The cavitation phenomenon was observed with a camera and a
stroboscope. Finally, the critical flow region, which tip vortex
cavitation might have occurred, was identified. The results show that
just by adjusting the flow rate, out of the specified region, the
possibility of occurring tip vortex cavitation, decreases to a great
extent.
Abstract: Biometric techniques are gaining importance for
personal authentication and identification as compared to the
traditional authentication methods. Biometric templates are
vulnerable to variety of attacks due to their inherent nature. When a
person-s biometric is compromised his identity is lost. In contrast to
password, biometric is not revocable. Therefore, providing security
to the stored biometric template is very crucial. Crypto biometric
systems are authentication systems, which blends the idea of
cryptography and biometrics. Fuzzy vault is a proven crypto
biometric construct which is used to secure the biometric templates.
However fuzzy vault suffer from certain limitations like nonrevocability,
cross matching. Security of the fuzzy vault is affected
by the non-uniform nature of the biometric data. Fuzzy vault when
hardened with password overcomes these limitations. Password
provides an additional layer of security and enhances user privacy.
Retina has certain advantages over other biometric traits. Retinal
scans are used in high-end security applications like access control to
areas or rooms in military installations, power plants, and other high
risk security areas. This work applies the idea of fuzzy vault for
retinal biometric template. Multimodal biometric system
performance is well compared to single modal biometric systems.
The proposed multi modal biometric fuzzy vault includes combined
feature points from retina and fingerprint. The combined vault is
hardened with user password for achieving high level of security.
The security of the combined vault is measured using min-entropy.
The proposed password hardened multi biometric fuzzy vault is
robust towards stored biometric template attacks.
Abstract: The expansive nature of soils containing high
amounts of clay minerals can be altered through chemical
stabilization, resulting in a material suitable for construction
purposes. The primary objective of this investigation was to
study the changes induced in the molecular structure of
phosphoric acid stabilized bentonite and lateritic soil using
Nuclear Magnetic Resonance (NMR) and Fourier Transform
Infrared (FTIR) spectroscopy. Based on the obtained data, it
was found that a surface alteration mechanism was the main
reason responsible for the improvement of treated soils.
Furthermore, the results indicated that the Al present in the
octahedral layer of clay minerals were more amenable to
chemical attacks and also partly responsible for the formation
of new products.
Abstract: Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.
Abstract: The paper presents the modeling of nonlinear
longitudinal aerodynamics using flight data of Hansa-3 aircraft at
high angles of attack near stall. The Kirchhoff-s quasi-steady stall
model has been used to incorporate nonlinear aerodynamic effects in
the aerodynamic model used to estimate the parameters, thereby,
making the aerodynamic model nonlinear. The Maximum Likelihood
method has been applied to the flight data (at high angles of attack)
for the estimation of parameters (aerodynamic and stall
characteristics) using the nonlinear aerodynamic model. To improve
the accuracy level of the estimates, an approach of fixing the strong
parameters has also been presented.