Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.20180101.pre
Volume 9
Gulshan Shrivastava, Nhu Nguyen Gia, Mohamed Salim Bouhlel, Kavita Sharma
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Shrivastava, Gulshan, et al. "Special Issue on Advance Research in Model Driven Security, Privacy, and Forensic of Smart Devices." IJISMD vol.9, no.1 2018: pp.6-8. http://doi.org/10.4018/IJISMD.20180101.pre
APA
Shrivastava, G., Gia, N. N., Bouhlel, M. S., & Sharma, K. (2018). Special Issue on Advance Research in Model Driven Security, Privacy, and Forensic of Smart Devices. International Journal of Information System Modeling and Design (IJISMD), 9(1), 6-8. http://doi.org/10.4018/IJISMD.20180101.pre
Chicago
Shrivastava, Gulshan, et al. "Special Issue on Advance Research in Model Driven Security, Privacy, and Forensic of Smart Devices," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 6-8. http://doi.org/10.4018/IJISMD.20180101.pre
Export Reference
Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.2018010101
Volume 9
Rudra Pratap Ojha, Pramod Kumar Srivastava, Goutam Sanyal
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true potential. It is hard to tackle due to operational constraints of networks. Worms have become an emergent...
Show More
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true potential. It is hard to tackle due to operational constraints of networks. Worms have become an emergent threat to the wireless networks. The spread of worms in the network is epidemic in nature. This article proposes a novel mathematical model with pre-vaccination and quarantine for study of worm propagation dynamics in WSN that is based on epidemic model. Further, the authors have devised an expression to determine threshold communication radius and node density. The objective of this proposed model is to study the propagation dynamics of worms in wireless sensor networks. Through the model, investigate the stability condition of networks in the presence of malicious codes. The experimental studies indicate that the proposed model outperforms in terms of security and energy efficiency over other existing models. It is a leap toward worm-controlling mechanisms in sensor networks. Finally, the control mechanism and performance of the proposed model is validated through extensive simulation results.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ojha, Rudra Pratap, et al. "Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks." IJISMD vol.9, no.1 2018: pp.1-20. http://doi.org/10.4018/IJISMD.2018010101
APA
Ojha, R. P., Srivastava, P. K., & Sanyal, G. (2018). Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks. International Journal of Information System Modeling and Design (IJISMD), 9(1), 1-20. http://doi.org/10.4018/IJISMD.2018010101
Chicago
Ojha, Rudra Pratap, Pramod Kumar Srivastava, and Goutam Sanyal. "Pre-Vaccination and Quarantine Approach for Defense Against Worms Propagation of Malicious Objects in Wireless Sensor Networks," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 1-20. http://doi.org/10.4018/IJISMD.2018010101
Export Reference
Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.2018010102
Volume 9
Rajib Ghosh, Partha Pratim Roy, Prabhat Kumar
Secure authentication is a vital component for device security. The most basic form of authentication is by using passwords. With the evolution of smart devices, selecting stronger and unbreakable...
Show More
Secure authentication is a vital component for device security. The most basic form of authentication is by using passwords. With the evolution of smart devices, selecting stronger and unbreakable passwords have become a challenging task. Such passwords if written in native languages tend to offer improved security since attackers having no knowledge of such scripts finding it hard to crack. This article proposes two zone-wise feature extraction approaches - zone-wise structural and directional (ZSD) and zone-wise slopes of dominant points (ZSDP), to recognize online handwritten script and word in four major Indic scripts - Devanagari, Bengali, Telugu and Tamil. These features have been used separately and in combination in HMM-based platform for recognition purpose. The dimension reduction of the ZSD-ZSDP combination with factor analysis has shown the best performance in all the four scripts. This work can be utilized for setting up the authentication schemes with the Indic scripts' passwords thus rendering it difficult to crack by hackers having no knowledge of such scripts.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ghosh, Rajib, et al. "Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features." IJISMD vol.9, no.1 2018: pp.21-55. http://doi.org/10.4018/IJISMD.2018010102
APA
Ghosh, R., Roy, P. P., & Kumar, P. (2018). Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features. International Journal of Information System Modeling and Design (IJISMD), 9(1), 21-55. http://doi.org/10.4018/IJISMD.2018010102
Chicago
Ghosh, Rajib, Partha Pratim Roy, and Prabhat Kumar. "Smart Device Authentication Based on Online Handwritten Script Identification and Word Recognition in Indic Scripts Using Zone-Wise Features," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 21-55. http://doi.org/10.4018/IJISMD.2018010102
Export Reference
Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.2018010103
Volume 9
Sumit Kumar Yadav, Kavita Sharma, Arushi Arora
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS...
Show More
In this article, the authors propose a DDoS mitigation system through access list-based configurations, which are deployed at the ISP (Internet Service Provider's) edge routers to prohibit DDoS attacks over ISPs' networks traffic. The effectiveness of the proposed system relies heavily on the willingness of ISPs in implementing the system. Once each ISP implements the system, most attacks can easily be stopped close to their point of origin. The main challenge is to implement such a system with the fixed amount of memory and available processing power with routers. A coordinated effort by participating ISPs filters out attacks close to their source, reducing the load on other routers. The suspicious traffic is first filtered out based on their source IP address. The authors also implemented the WRED algorithm for their case and conduct GNS3 experiments in a simulated environment.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Yadav, Sumit Kumar, et al. "Security Integration in DDoS Attack Mitigation Using Access Control Lists." IJISMD vol.9, no.1 2018: pp.56-76. http://doi.org/10.4018/IJISMD.2018010103
APA
Yadav, S. K., Sharma, K., & Arora, A. (2018). Security Integration in DDoS Attack Mitigation Using Access Control Lists. International Journal of Information System Modeling and Design (IJISMD), 9(1), 56-76. http://doi.org/10.4018/IJISMD.2018010103
Chicago
Yadav, Sumit Kumar, Kavita Sharma, and Arushi Arora. "Security Integration in DDoS Attack Mitigation Using Access Control Lists," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 56-76. http://doi.org/10.4018/IJISMD.2018010103
Export Reference
Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.2018010104
Volume 9
Nisha Rathee, Rajender Singh Chhillar
Smart mobile pay applications on smart devices have been considered as the most efficient and secure mode of contactless payment. To safeguard customer credit/ debit card details, testing of mobile...
Show More
Smart mobile pay applications on smart devices have been considered as the most efficient and secure mode of contactless payment. To safeguard customer credit/ debit card details, testing of mobile pay solutions like Samsung Pay is most important and critical task for testers. Testing of all the test cases is very tedious and a time-consuming task, therefore optimization techniques have been used to identify most optimized test paths. In this article, a hybrid genetic and tabu search optimization (HGTO) algorithm is proposed to secure optimized test paths using activity diagram of the smart Samsung Pay application. The proposed approach has been implemented using C++ language on the case study of the Smart Samsung Pay and an online airline reservation system. The experimental results show that the proposed technique is more effective in automatic generation and optimization of test paths, as compared to a simple genetic algorithm.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Rathee, Nisha, and Rajender Singh Chhillar. "Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm." IJISMD vol.9, no.1 2018: pp.77-91. http://doi.org/10.4018/IJISMD.2018010104
APA
Rathee, N. & Chhillar, R. S. (2018). Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm. International Journal of Information System Modeling and Design (IJISMD), 9(1), 77-91. http://doi.org/10.4018/IJISMD.2018010104
Chicago
Rathee, Nisha, and Rajender Singh Chhillar. "Model Driven Approach to Secure Optimized Test Paths for Smart Samsung Pay using Hybrid Genetic Tabu Search Algorithm," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 77-91. http://doi.org/10.4018/IJISMD.2018010104
Export Reference
Published: Jan 1, 2018
Converted to Gold OA:
DOI: 10.4018/IJISMD.2018010105
Volume 9
Vinod Vijaykumar Kimbahune, Arvind V. Deshpande, Parikshit N. Mahalle
The computational complexity of the next generation internet (NGI) is increasing at a faster rate. Due to the large scale of ubiquitous devices, effective and secure communication and addressing...
Show More
The computational complexity of the next generation internet (NGI) is increasing at a faster rate. Due to the large scale of ubiquitous devices, effective and secure communication and addressing mechanism is vulnerable to several threats. Apart from resource constraints of the devices, the unknown topology of the network and the higher risk of device capture make the key management a more challenging task in NGI. In this context, a novel attack resistant and salable key management scheme must be in place to enable end-to-end secure communication. In the first part of the article, is a detailed analysis of various threats along with behavioral modeling of attack. Further, this article presents comprehensive literature survey and the gap analysis. The proposed key management scheme has been evaluated in two scenarios viz. centralized and decentralized and its formal security analysis also proves that it is safe from replay attack. The proposed key management scheme has been evaluated with a performance metric like delay and the results shows that it is salable in nature.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kimbahune, Vinod Vijaykumar, et al. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach." IJISMD vol.9, no.1 2018: pp.92-121. http://doi.org/10.4018/IJISMD.2018010105
APA
Kimbahune, V. V., Deshpande, A. V., & Mahalle, P. N. (2018). A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach. International Journal of Information System Modeling and Design (IJISMD), 9(1), 92-121. http://doi.org/10.4018/IJISMD.2018010105
Chicago
Kimbahune, Vinod Vijaykumar, Arvind V. Deshpande, and Parikshit N. Mahalle. "A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach," International Journal of Information System Modeling and Design (IJISMD) 9, no.1: 92-121. http://doi.org/10.4018/IJISMD.2018010105
Export Reference
IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJISMD should be directed to the attention of:
Submission-Related InquiriesAll inquiries regarding IJISMD should be directed to the attention of:Dr. Mehdi Khosrow-Pour
Editor-in-Chief
International Journal of Information System Modeling and Design
Email:
journaleditor@igi-global.comm
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100