|
|
 |
Search published articles |
 |
|
, , Volume 3, Issue 1 (9-2014)
Abstract
The purpose of this paper is twofold: Study of the mathematical background on lattice theory and its applications to cryptography. In the latter area, lattice theory has played a crucial role in the definition of new cryptosystems, in the study of cryptographic primitives and in cryptanalysis. Lattice-based public-key cryptosystems relies on computational hard problems based on the shortest vector problem (SVP) and the closest vector problem (CVP) in lattices for their security. In this paper, we present a short introduction to lattice theory and its hard problems and also we study the most important lattice-based public-key cryptosystems and digital signature together with their security analysis and some applied examples.
, , , Volume 3, Issue 1 (9-2014)
Abstract
The Cloud computing is a low-cost high performance model of computing services in response to the needs of users of Information Technology. Current security and privacy challenges in cloud environment have led to distaste some users and organizations to apply cloud instead of traditional infrastructures. Although many prevention efforts and acts are performed in current network architectures, detection and tracing of the attacker is necessary after the event is occurred. But current architecture of cloud computing does not satisfy the cloud forensics needs. Therefore, in this field the cloud forensic investigation have many different challenges. Regarding the low cost and high performance services of cloud computing, for the sake of security issues it can never be ignored. So far several solutions have been proposed regardingcloud’s security issues based on dynamic and elastic nature of cloud computing and legal issues. The main goal of this survey is to classify and and explore the cloud forensics issues and challenges.
, , Volume 3, Issue 1 (9-2014)
Abstract
A set of technologies, that use radio waves for identifying people or objects, is called radio frequency identification system or RFID. RFID performance depends on tag and reader devices which use radio waves to communicate to each other. In some applications of RFID systems, the proof of concurrent presence for a number of objects or persons together in a given time is crucial. Grouping proof protocols are designed to address these needs, in fact grouping proof shows that two or more tags are evaluated by a reader simultaneously. This proof must be verified by the corresponding verifier. In this article this type of protocols are introduced and analyzed. At the first, the idea of designing a grouping proof is presented and then related protocols and their security analysis are presented. Finally, a comparison between protocols is provided.
, , , Volume 3, Issue 1 (9-2014)
Abstract
With the increase in attacks, the different mechanisms in different layers of defense are applied in order to detect and prevent attacks. In this case we are encountered with massive amounts of alerts with low level and scattered information. Alert correlation is one of the solutions that are used to combine alerts and create a high level view of under controlled network security situations, and a lot of researches have been done in this field. In this paper, we describe the OSSIM and introduce its features. In addition with a combined approach to the alert correlation problem, a new categorization is done on the scientific researches and with respect to these researches, we described the process of alert correlation in the OSSIM and established a correspondence between components of the OSSIM and one of the researches. In most researches the focus is on the alerts correlation of intrusion detection systems, we have shown in this paper that the other resources are effective in multi-stage attacks correlation.
, , Volume 3, Issue 1 (9-2014)
Abstract
In recent years, electronic payments has grown rapidly among internet activities so nowadays has attracted many customers due to its speed, efficiency, cost reduction and ease of access. Credit cards can be considered as one of the most widely used tools for electronic payments transactions . Purpose of this research is the identification and extraction feature of fraudulent transaction followed by correct classification of them into two categories of legal and fraud, using support vector machine algorithm and cross-validation. The results of ths method to show improvement in fraud detection so that false negative reduction has 77%, cost 88% and detection rate increased by 11%.
, , , Volume 3, Issue 1 (9-2014)
Abstract
Doctor Nasoor Bagheri, Mr Reza Aghamohammadi, Volume 3, Issue 2 (3-2015)
Abstract
Narges Salehpour, Mohammad Nazari Farokhi, Ebrahim Nazari Farokhi, Volume 3, Issue 2 (3-2015)
Abstract
Abstract One of the most important issues in securing computer networks is an Intrusion Detection System. Intrusion detection systems are searching for malicious behavior, deviation normal patterns and attacks on computer networks are discovered. This system recognizes the type of traffic allowed for unauthorized traffic. Since the today's data mining techniques to intrusion detection in computer networks are used. In this research is provided, a method for designing an intrusion detection system based on machine learning. One of the features of neural networks and machine learning systems, training is based on the training data. In this research is used for detecting the intrusion of machine learning to learn the features of the theory of Rough property that has a higher correlation coefficient is used. To train and evaluate has used the proposed approach the KDD CUP 99 dataset. This study, the accuracy of our method compares with feature-based learning algorithm, neural network self and decision tree. The simulation results show that the proposed system has high accuracy and speed of detection based on rough theory is right
, , , Volume 3, Issue 2 (3-2015)
Abstract
, , Volume 3, Issue 2 (3-2015)
Abstract
Organizations should use from enterprise security architectures to secure their information assets. Security patterns are a good way to build and test new security mechanisms. Enterprise security pattern as an instance of model-driven architecture offers a solution to recurring information systems security problems. In this paper, we present a model-driven enterprise security pattern called Secure SaaS., which the organizations could apply to protect their information assets when using SaaS. On the other hand Cloud Computing is a approach for the efficient use of computational resources. cloud delivers computing as a service. However, security concerns prevent many individuals and organizations from using clouds. Second section of this paper focuses on the Security problem of Platform-as-a-Service (PaaS) clouds including access control, privacy and service continuity while protecting both the service provider and the user. Security problems of PaaS clouds are explored and classified. Countermeasures are proposed and discussed.
Sonia Naderi, Doctor Mohammadreza Javan, Volume 3, Issue 2 (3-2015)
Abstract
In this paper, a cooperative scheme for secure device to device (D2D) communications underlaying cellular networks is proposed. In our scheme, the cellular base station (BS) wants to transmit its information to a cellular user (CU). Meanwhile, two devices want to communicate directly using the same spectrum used by cellular network with the help of some decode-and-forward (DF) relay nodes. In addition, there exists a malicious user which wants to eavesdrop on information transmission of D2D pair. The transmit power of the transmitter of the D2D pair (TD2D) and the relays is limited such that the outage performance of cellular network is satisfied. We study the performance of the proposed scheme, which is measured based on the outage probability, and obtain the closed form expression for the outage probability for the optimal relay selection scheme. Finally, the performance of the proposed scheme is evaluated using simulations.
, , Volume 3, Issue 2 (3-2015)
Abstract
Trust and reputation are known social concepts which have an important role in human society. Nowadays, these concepts are also employed in computer science as computational trust and reputation systems (TRSs) that are able to compute the trustworthiness rank of entities based on a collection of experiments and recommendations. Since it is expected that a dishonest entity has a lower trust, the trust values can help the entities to detect and isolate the malicious or selfish entities. TRSs have been applied in many modern computer systems, and also are the most important tool in soft security as the next generation of security mechanisms. Despite the importance and applications of these systems, they are vulnerable to some kind of attack in which the attacker deceives the system using a sequence of misleading behavior. These attacks enable the attacker to manipulate the computation of trust values in his favor. A vulnerable system not only can’t help detecting the malicious entities, but also may be used by them to empower their attack. Hence, robustness evaluation is a critical step before using TRSs. Simulation and formal verification are two main approaches for robustness evaluation of TRSs. Despite the wide usage of simulation in evaluation of TRSs, it is an approximation method that can be used to validate the behavior of the system just for some particular computation paths. In contrast, formal verification based methods provide guarantees for the validation of the whole computation paths of the given system, thus not only their results are exact and provable but also may be used to find whole possible attacks against a given system. Considering the advantages of verification based methods, there is a narrow but progressing trend for proposing such methods in recent years. In this paper, both formal and simulation based methods for robustness evaluation of TRSs are reviewed and compared with each other.
Ms Elham Abed, Dr Reza Ebrahimi Atani, Volume 4, Issue 1 (9-2015)
Abstract
Withe the growth rate of smartphones, we are daily witness malwares which sits on them confidential information such as financial information and transactions, mobile banking, contact information and even steal SMS messages. One of the major damage that malware can cause the formation of mobile cellular botnets. According to statistics published in 2014, F-secure site on mobile malware threats every 5 botnet threat is one of them. The term botnet refers to a group of mobile smartphones to remotely influenced by the Director of the bot command and control channel for the control activities. In this paper, the new plans provided by mobile botnets from three points of distribution, channel botnet command and control and topology will be reviewed and ways to deal with this threat are briefly presented.
Mr. Afshin Rashidi, Dr. Reza Ebrahimi Atani, Mr. Hamid Nasiri, Volume 4, Issue 1 (9-2015)
Abstract
In the past decade with distribution software such as browsers, online stores, Internet banking, electronic mail systems and the Internet, to carry out reverse engineering attacks, illegal use of illegal software or reproduce it is.A new attack techniques have failed and this creates competition between the attackers and software developers. So far, many techniques based architecture, hardware and software for this semester has been introduced to protect each aspect of the application process. In this paper, we introduce a variety of threats to software and then try to categorize and review of techniques to protect our software.
, Volume 4, Issue 1 (9-2015)
Abstract
Users of wireless sensor networks face difficulties like key distribution. Also there is a large number of keys saved in them. Thus, they tended to use public key cryptography for identification and key agreement. On the other hand, certificate-based public key cryptography makes use of public key infrastructure (PKI). Clearly implementing PKI requires a large amount of memory computations and communications which are impassible for sensor networks. To solve this problem we can use identity based cryptography (IBC). In this type of cryptography, user’s public identities like their IP or email addresses are used as their public key as a result, there will be no need for PKI. After introduction of pairing based cryptography, this type of cryptography was applicable used. In this paper, we will take a look at how to use pairings on wireless sensor networks.
, , Volume 4, Issue 1 (9-2015)
Abstract
The next generation of heterogeneous wireless access network technologies are include such as wireless networks (WiFi and WiMax) and cellular networks (such as WCDMA and HSPA and 4G). One of the major issues in heterogeneous wireless network design, support for mobile users is vertically integrated handover. handover process between different wireless technology, called vertical handover. The wireless technology of different features, services, pricing, and offer different regional coverage. Vertical handover can be combined with the benefits of mobile networks to obtain user satisfaction and improve efficiency, can be used. So concepts and review the measures taken are necessary. The main purpose of this article we discribe the basic concepts related to handover, classification, algorithms, protocols, and features favorable factors in handover for Next Generation Networks.
, , Volume 4, Issue 1 (9-2015)
Abstract
Mahdi Ahmadipari, Meysam Moradi, Volume 4, Issue 1 (9-2015)
Abstract
In recent years, the use of Meta-heuristic algorithms on various problem taken into consideration. Meta-heuristic algorithms in solving various problem, different performance show. An Meta-heuristic algorithm to solve a particular problem may have better performance than other algorithms and poorer performance have in other issue. In this study the performance of Meta-heuristic algorithms for a specific problem that explore cryption key Vigenere encryption algorithm will be examined. And Meta-heuristic different algorithms performance in terms of accuracy and speed of convergence of the results will be cryptanalyzed and the best algorithm is selected
Dr Reza Alimoradi, Volume 4, Issue 2 (3-2016)
Abstract
In public key cryptography, systems based on integer factorization problem are increasing replaced by systems based on discrete logarithm problem (DLP). In fact, Elliptic curve cryptography(ECC) makes the key size much smaller than similar RSA systems do that is why ECC became very popular among cryptography system designers. The designers always need to get to a cryptography system with the smallest key size the highest security. Thus they tend to use hyper elliptic curve in cryptography. In this paper, we will study how to use this type of curves in cryptography.
Also, this study takes a look at these curves’ resistance against algorithms of solving the discrete logarithm problem. Energy consumed for implementation of the scalar multiplication in hyper elliptic curves of the genus g<5 will be analyzed too.
, , Volume 4, Issue 2 (3-2016)
Abstract
The fourth-generation Telecommunication communication system is base on LTE technology . LTE Evolved High-Speed Packet Access networks (HSPA) and to achieve higher data rates, greater compatibility with heterogeneous networks and more uniform network architecture is presented. LTE version of the standard release 8, 3GPP is. One of the goals of LTE and wireless systems is providing integrated handover and fast from one cell (source cell) to another cell (target cell) . The process defined in Version 8 supports LTE handover mobility are provided, but not suitable for all modes of mobility and even compared to 2nd and 3rd generation systems, may be user dissatisfaction. This paper, first we defined LTE network architecture and its Vulnerabe. Then handover related concepts in LTE network and recent actions in this area have been investigated.
|
|