Top Downloads

Collecting Statistical Parameters on Mobile Phones for Detection of Security Attacks and Mobile Malware

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Communication between mobiles using technologies like Bluetooth, MMS, SMS, Mobile and Home Broadband can increases their susceptibility to mobile security threats. In the past few years, mobile malware has emerged as one of the major threats for modern-day mobile devices. Since the first malware outbreak in 2004, hundreds of mobile viruses, worms, Trojans and spyware and over thousands of their variants have been discovered. With such a large number of ever-evolving malware, it is challenging to develop an electronic system capable of detecting such malware. In this work, the statistical data generated as a consequence of interactions on mobile devices and the mechanism of recording this data against statistical parameters on mobile devices is discussed. We also provide a detailed taxonomy of the low and high-order statistical parameters, and discuss how these parameters (besides utilisation in other scenarios) can be affectively utilised in the detection of a variety of security attacks and malware types.

Read More on GDL

SKEP & SEEKDP: Towards Secure and Energy-Efficient Key Exchange and Distribution in Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Security and Energy are important issues when wireless sensor network (WSN) is deployed in harsh environments. WSN security becomes real challenge for the researchers because these networks are vulnerable to security attacks due to the broadcast nature of transmission. Due to the limited memory, CPU, and battery power of sensor nodes, traditional asymmetric-key distribution protocols are expensive and rather infeasible. Thus only a very few conventional protocols can readily be used in sensor networks and key management schemes should be designed carefully to reduce computations power over the sensor node as well. In this paper we analyse existing Key Management Protocols like SPINS, SEKEN, SNAKE, Security Architecture for Mobile WSNs and BROSK for their vulnerabilities against Denial of Service attacks. In WSNs, where the most protocols working on point-to-point handshaking procedures to negotiate link dependent keys, this influence the scalability of the network, we present a novel protocol SKEP to construct link dependent keys by unicasting. We also propose SEEKDP a security protocol that prevents certain attacks, distribute keys, exchange information in an efficient manner and provide security by consuming less energy of regular sensor node.

Read More on GDL

Lightweight Secure and Scalable Key Sharing Protocol for Wireless Sensor Networks

Munir Hussain, Khalid Khan

Abstract

Wireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.

Read More on GDL

The Taxonomy of Behavioural Parameters on Mobile Devices

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

Mobile malware has emerged as one of the major threats for modern day mobile networks. Since the first inception a decade ago, hundreds of types of mobile malware and their variants have been discovered. Interactions between mobile using technologies like Bluetooth, MMS, SMS, and mobile and home broadband, leave significant usage footprints on mobile devices. If acquired and processed, these footprints can be utilised for a variety of purposes including the detection of mobile malware. This work is aimed at introducing various behaviour parameters against which the footprints can be recorded, and the processing of these parameters to produce high-order parameters that can prove very effective in different types of device and network-specific analysis including detection of malware. It is important to state that this work is limited to presenting a comprehensive taxonomy of behaviour parameters only, and a discussion on the mechanism of utilising the behaviour parameters in analysis such as detection of malware is beyond the scope of this work.

Read More on GDL

Evaluation of Energy Efficiency of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Over the last few years, the popularity of both electronic and mobile commerce (M-Commerce) has increased due to advancement in the Information Technology (IT). Evaluation of E-commerce and M-commerce protocols has always remained a subject of sustained effort to find an optimal solution. Mobile devices are resource constrained in terms of memory, processing and battery power. There have been efforts in the past for evaluation of such protocols based on the issues like privacy, security and efficiency. In this paper special consideration however is given to the battery power and thus evaluates few well-known M-commerce payment protocols for their battery requirements in terms of energy cost and compares energy cost of these protocols to find the most optimal solution for mobile payment. Initial objective of this paper finds out energy consumption for every individual entity involved in the most popular mobile payments protocols. After the earlier has been achieved, the second and the most fundamental objective of this work is to calculate the overall energy consumption and to analyze these selected protocols to find out the most energy efficient protocol.

Read More on GDL

Ad-hoc and Opportunistic Routing in Dynamic Scatternet Environment

S K A Khan, M Adeel, M A Azam

Abstract

In reality, mobile ad-hoc networks are highly unpredictable because any node can join or leave the network at any time, thus making reliable and effective communication a problem. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that has evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. This paper presents a conceptual study for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies such as popularity and use of hybrid communication by applying opportunistic concepts on top of traditional ad-hoc routing such as AODV to gain maximum message directivity. The experiment results have shown that by combining traditional ad-hoc routing with opportunistic forwarding has not only improved directivity but as a result have achieved a great improvement in message delivery to intended destinations.

Read More on GDL

Technical Evaluation of the Functionality of Popular Mobile Payment Protocols

Munir Hussain, Syed Usman Jamil

Abstract

Today, mobile commerce flexibility has totally changed businesses in the world due to easy mobile-based online bookings and payments. Its implementation is not limited to any single area but it can be utilized in all sorts of situations and organizations in various ways. It can be utilized in banking, electronic publication distribution, online sales, online payments for different utility bills and online booking of airlines etc. These kinds of online booking, buying and selling, and their payment services are available to anyone 24/7 in the world. When using these types of facilities, one needs to understand and study different types of characteristics of this new technology i.e., it is important to understand different modes of payments, various technologies using mobile payment system, and different M-commerce payment protocols. As we know that energy consumption is a critical issue in M-commerce, so it is important to reduce battery power consumption as much as possible. In this paper, we will explore some of the most popular mobile payment protocols step-by-step to fully understand their working environment.  

Read More on GDL

Evaluation of the MPeersim – A Simulation Environment for Mobile Networks

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Abstract

MPeersim is a simulation environment for mobile and mobile P2P networks. It simulates different types of mobile nodes and communication technologies such as Bluetooth, MMS, and SMS. With a primary emphasis of evaluation of MPeersim in terms of simulation statistics, this paper will elaborate on various MPeersim functionalities in context of availability of generic, node, and network-specific simulation parameters, node and network-specific statistics available for various types of analyses, and on the capabilities of MPeersim in terms of presenting empirical data in different formats including graphs and visualisation for monitoring purposes. Providing a comprehensive understanding of the relationship between parameters and statistics will assist researchers in planning for developing simulation environments.

Read More on GDL

IOARP EDITORIAL SYSTEM

IES is a comprehensive web-based software designed exclusively to manage the review process for conferences, journals, and books.

Visit Website >

GLOBAL DIGITAL LIBRARY

Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books. 

Visit Website >

LATEST RESEARCH NEWS

Our dedicated team researches through thousands of scholarly articles, blogs, and technology magazines to publish cutting-edge research in your field of interest. 

Read Research News >

IOARP NEWSLETTER

We publish a monthly newsletter to keep our readers posted about IOARP activities, information on products and services, and benefits of publishing with us.

Read Newsletter >

IOARP RESEARCH BLOG

Renowned researchers in academia and industry publish their blogs with IOARP on cutting-edge research, recent innovations, and novel research directions in different domains.

Read Research Blog >

IOARP Shop

Use our e-shop to purchase a wide range of products, pay for our services, or to access offers and discounts available across multiple IOARP websites.

Visit IOARP Shop >