submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Editors-in-Chief:
Ashutosh Dutta, AT&T, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

Associate Editor:
Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India


ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 2   Issue: Combined Issue 3 & 4

Published In:   July & October, 2014

Publication Frequency: Quarterly


Search Available Volume and Issue for Journal of Cyber Security and Mobility


Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Adaptive Correction Algorithm for OFDM-IDMA Systems With Carrier Frequency OFFSET in A Fast Fading Multipath Channel

doi: 10.13052/jcsm2245-1439.231
Muyiwa B. Balogun1, Olutayo O. Oyerinde2 and Stanley H. Mneney1

1School of Engineering, Discipline of Electrical, Electronic and Computer Engineering, University of KwaZulu-Natal, Durban, 4041, South Africa
2School of Electrical and Information Engineering, University of the Witwatersrand, Johannesburg, 2050, South Africa.

Abstract: [+]    |    Download File [ 1767KB ]   |    Read Article Online

Abstract: The Orthogonal Frequency Division Multiplexing-Interleave Division MultipleAccess (OFDM-IDMA) scheme, which offers significant improvement onthe performance of the conventionalIDMAtechnique, has been in the forefrontof recent mobile communication researches as it is expected to deliver a highquality, flexible and efficient high data-rate mobile transmission. Most paperson OFDM-IDMA scheme assume a system free of carrier frequency offset.

However, the scheme is susceptible to synchronization errors and performancedegradation because of the presence of OFDM, which is highly sensitive tocarrier frequency offset (CFO) especially at the uplink. The effect of CFOon the performance of the scheme, in a slow fading multipath channel scenario,is therefore investigated, and analyzed. Also, the effect of CFO on theperformance of the OFDM-IDMAscheme, in a fast fading multipath channel,which has not been hitherto reported in literature, is investigated and analyzed.

An LMS-based adaptive synchronization algorithm is therefore employed tomitigate the degrading impact of carrier frequency offset errors on the OFDMIDMAscheme. Simulation results clearly show that the presence of CFOdegrades the performance of the system and that performance degradationdue to CFO, increases in a fast fading multipath channel in comparisonwith slow fading channel scenario. Furthermore, results show substantialimprovement in the overall output of the system upon the application of theadaptive synchronization algorithm, which is implemented in both slow, andfast fading Rayleigh multipath channel scenarios.

Keywords: OFDM, IDMA, OFDM-IDMA, CFO, LMS.

Efficient Fine Grained Access Control for RFID Inter-Enterprise System

doi: 10.13052/jcsm2245-1439.232
Bayu Anggorojati, Neeli Rashmi Prasad, and Ramjee Prasad

Center for TeleInFrastruktur (CTIF) Aalborg University, Denmark

Abstract: [+]    |    Download File [ 844KB ]   |    Read Article Online

Abstract: Access control management is a very challenging task in an inter-enterpriseRFID system due to huge amounts of information about things or objectsthat can be collected and accessed to and from the system. Furthermore, theinformation stored in the inter-enterprise RFID system contains sensitive andconfidential data related to the activities of the organization involved aroundthe RFID system. Hence, the efficiency and high-granularity are critical in thedesign of access control for such system. This paper presents a novel accesscontrol model which is efficient and fine grained for such a system. A detaildefinition and mechanism of the access control model are described in thepaper. A system implementation is developed for the evaluation purpose. Animportant performance measure in big data processing is delay in processingtime, thus the evaluation aims at measuring the access control processing time.The evaluation results show that the model is consistent, and is able to achieveless delay than the inter-enterprise RFID system without access control at acertain point.

Keywords: access control, policy, security, RFID, IoT.

Dynamic AES – Extending the Lifetime?

doi: 10.13052/jcsm2245-1439.233
Henrik Tange1 and Birger Andersen2

1Aalborg University, Frederik Bajers Vej 7, DK-9220 Aalborg, Denmark,
2Center for Wireless Systems and Applications / CTIF-Copenhagen, TechnicalUniversity of Denmark, DTU Ballerup Campus, DK-2750 Ballerup, Denmark,

Abstract: [+]    |    Download File [ 368KB ]   |    Read Article Online

Abstract: AES (Advanced Encryption Standard) is a worldwide used standard forsymmetric encryption and decryption. AES is for instance used in LTE(Long-Term Evolution) and in Wi-Fi. AES is based on operations of permutationsand substitutions. Furthermore, AES is using a key schedulingalgorithm. It has been proven that AES is vulnerable to side-channelattacks, related sub-key attacks and biclicque attacks. This paper introducesa new dynamic version of AES where the main flow is depending on theTNAF (τ-adic Non-Adjacent Form) value. This new approach can preventside-channel attacks, related sub-key attacks and biclique attacks.

Keywords: AES, side-channel attacks, attack countermeasures,TNAF, ECC,related sub-key attacks, biclique attacks.

Performance Evaluation of Beamspace MIMO Systems with Channel Estimation in Realistic Environments

doi: 10.13052/jcsm2245-1439.234
Konstantinos Maliatsos, Panagiotis N. Vasileiou andAthanasios G. Kanatas

Department of Digital Systems, University of Piraeus, Greece,

Abstract: [+]    |    Download File [ 1823KB ]   |    Read Article Online

Abstract: Beamspace MIMO (BS-MIMO) systems have been recently proposed as ameans to address the two key weaknesses of conventional MIMO systems:the antenna size and the need for multiple RF chains. BS-MIMO transmissionis supported by the Electronically Steerable Passive Array Radiators (ESPAR)with a single active and multiple parasitic elements. The main objective is todevelop efficient MIMO multiplexing schemes that use only one Radio Frequency(RF) chain and simultaneously maintain extremely small antenna size.Moreover, the recent research results have shown thatBS-MIMOsystems haveincreased multiplexing and beamforming capabilities and for small antennasizes clearly outperform equivalent conventional systems in terms of systemcapacity. Nevertheless, research on BS-MIMO has been focusing on the studyof the ESPAR antenna properties that facilitate beamspace transmission andthe theoretical analysis of the ergodic capacity provided by the aerial degrees offreedom (aDoF) of the beamspace channel. Recently, the first steps have beenmade to design and evaluate practical BS-MIMO systems. This paper presentsextended results of the first attempt to design practical and realistic BS-MIMOtransmission and reception schemes and it specifically focuses on channelestimation techniques for BS-MIMO systems with adaptive pattern reconfiguration.Adaptation of the basic least-squares (LS) and minimum mean squarederror (MMSE) estimators for the beamspace radio channels is performed andthe algorithms are incorporated in an adaptive Singular Value Decomposition(SVD)-based system. Finally, fundamental results extracted by the developedbeamspace link level simulator are presented in order to evaluate and compare BS-MIMO with equivalent conventional MIMO systems.

Keywords: beamspace, MIMO, BS-MIMO, channel estimation, ESPAR,link level evaluation.

New Efficient Timing and Frequency Error Estimation In OFDM

doi: 10.13052/jcsm2245-1439.235
A. P. Rathkanthiwar1 and A. S. Gandhi2

1Department of Electronics Engineering, Priyadarshini College of Engineering, Nagpur, MS, India
2Professor, Department of Electronics, Vesvesvarya National Institute of Technology, Nagpur, MS, India

Abstract: [+]    |    Download File [ 1791KB ]   |    Read Article Online

Abstract: Orthogonal frequency division multiplexing (OFDM) technique is beingapplied extensively to high data rate digital transmission as it is a bandwidthefficient modulation scheme. In OFDM system, intersymbol interference(ISI) and intercarrier interference (ICI) occur due to synchronization errors.Fast, simple and robust synchronization algorithms are necessary for OFDMsystems. In OFDM downlink transmission, every terminal perform synchronizationby exploiting reference symbols called training symbols of receivedframe. In this paper we are presenting very simple method of synchronizationwhich uses training symbol to determine timing and frequency synchronizationerror. Proposed synchronization techniques result in better performancewith respect to all the parameters despite being simple.

Keywords: Synchronization, orthogonal frequency division multiplexing(OFDM), timing estimation, CFO, CFO estimation

Green Cooperative Web of Trust for Securityin Cognitive Radio Networks

doi: 10.13052/jcsm2245-1439.236
Vandana Milind Rohokale, Neeli Rashmi Prasad and Ramjee Prasad

Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Abstract: [+]    |    Download File [ 2173KB ]   |    Read Article Online

Abstract: Spectrum is a scarce and very essential resource for the ever growing mobilecommunication applications. Radio networks (CRN) is the best evolved solutiontowards spectrum scarcity. Cooperative spectrum sensing is a well-knownand proven mechanism in the CRNs.As compared to other traditional wirelessnetworks, CRNs are more delicate and open to the wireless environmentsdue to their heterogeneous nature. Therefore, the CRNs have more securitythreats than the conventional wireless networks. The spectrum sensing andsharing mechanisms are inherently vulnerable to the malicious behaviors inthe wireless networks due to its openness. This paper proposes an energyefficient lightweight cryptographic Cooperative web of trust (CWoT) for thespectrum sensing in CRNs which is proved to be appropriate for the resourceconstrained wireless sensor networks (WSNs). Development of trust based authentication and authorization mechanism for the opportunistic large array(OLA) structured CRNs is the main objective of this paper. Received signalstrength (RSS) values obtained can be utilized to avoid Primary user emulationattacks (PUEA) in CRNs.

Keywords: Cooperative Spectrum Sensing, Cognitive Radio Network(CRN), Cooperative Web of Trust (CWoT), Wireless Sensor Network(WSN), etc.

Performance Evaluation on 6LoWPANand PANA in IEEE 802.15.4gMesh Networks

doi: 10.13052/jcsm2245-1439.237
Yoshihiro Ohba1 and Stephen Chasko2

1Toshiba Corporate R&D Center, Japan
2Landis+Gyr, USA

Abstract: [+]    |    Download File [ 1845KB ]   |    Read Article Online

Abstract: In this paper, we evaluate performance of 6LoWPAN and PANA over amesh network based on mathematical analysis, considering IEEE 802.15.4MAC/PHYbehavior,6LoWPANbehavior including fragmentation and PANAprotocol behavior. End-to-end IP packet error rate, mean end-to-end IP packetdelay, PANAsession failure rate and mean PANAsession establishment delayare used as the performance criteria. We show tradeoff points between LongFrame and Short Frame profiles for 6LoWPAN and PANA performance. Asa result of performance analysis, we show a recommended PANA profile forIEEE 802.15.4g mesh networks to use Long Frame profile as long as MACperformance metric meet certain criterion.

Keywords: IEEE 802.15.4, 6LoWPAN, PANA, Fragmentation, Performanceevaluation.

NGSON Service Composition Ontology

doi: 10.13052/jcsm2245-1439.238
Reinhard Schrage

Schrage Consult Seelze, Germany

Abstract: [+]    |    Download File [ 281KB ]   |    Read Article Online

Abstract: The paradigm of Next Generation Service Overlay Networks(NGSON)strivesto provide a unified and standardized framework of IP-based service overlaynetworks, creating an ecosystem of context-aware, dynamically adaptive,and self-organizing networking capabilities, including advanced routing andforwarding schemes. Service composition, i.e. the facility to combine certainatomic services into an aggregated service is considered a vital part ofNGSON. As a future directed, next generation oriented paradigm NGSONmust enable an intelligent, automated service composition platform. In orderto also meet the objectives of being context-aware, dynamically adaptive, andself-organizing this platform needs to know and understand the semanticsof its underlying functional entities. Furthermore, to be accepted by users,enterprises and service developers existing, proven, but likewise extendablestandards need to be utilized as much as possible.
The W3C consortium has released OWL2 for building ontologies thatserve to provide machine-understandable semantics. In order to be feasiblefor NGSON a service composition ontology also needs to include conceptsfrom deontic logic, i.e. needs to be able to differentiate between omissibleand permissible classes, or -in finer granularity- prohibited, obligatory andoptional components when composing a service from atoms.This paper aims to underline the need for an OWL2 ontology, makesuggestions on its structure and required interfaces to other network entitiesas e.g. Software Defined Networks and Network Virtualization Functions.

Keywords: NGSON; Service Composition; OWL2 Ontology

River Publishers: Journal of Cyber Security and Mobility