submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of Cyber Security and Mobility

Hybrid Journal

Ashutosh Dutta, Johns Hopkins University, USA
Ruby Lee, Princeton University, USA
Neeli R. Prasad, International Technological University, San Jose, USA
Wojciech Mazurczyk, Warsaw University of Technology, Poland

ISSN: 2245-1439 (Print Version),

ISSN: 2245-4578 (Online Version)
Vol: 5   Issue: 1

Published In:   January 2016

Publication Frequency: Quarterly

Articles in 2020

Search Available Volume and Issue for Journal of Cyber Security and Mobility

Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Packet-Based Load Balancing in Data Center Networks

Yagiz Kaymak and Roberto Rojas-Cessa

Networking Research Laboratory, Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, NJ 07102

Abstract: [+]    |    Download File [ 1803KB ]    |   Read Article Online

Abstract: In this paper, we evaluate the performance of packet-based load balancing in data center networks (DCNs). Throughput and flow completion time are some of the main the metrics considered to evaluate the performance of the transport of flows over the presence of long flows in a DCN. Load balancing in a DCN may improve those metrics but it may also generate out-of-order packet forwarding. Therefore, we investigate the impact of outof- order packet delivery on the throughput and flow completion time of long and short flows, respectively, in aDCN.We focus on per-packet load balancing. Our simulations show the presence of out-of-order packet delivery in a DCN using this load balancing approach. Simulation results also reveal that packetbased load balancing may yield smaller average flow completion time for short flows and larger average throughput for long flows than the single-path transport model used byTransmission Control Protocol (TCP), which prevents the presence of out-of-order packet delivery. Queueing diversity in the multipath structure of DCNs promotes susceptibility of out-of-order delivery. As the delay difference between alternative paths decreases, the occurrence of out-of-order packet delivery in packet-based load balancing also decreases. Therefore, under the studied scenarios, the benefits of the packet-based load balancing seem to outweigh the out-of-order problem.

Keywords: data center network, load balancing, multipath forwarding, flow completion time, TCP.

The Economic Impact in Biosecurity Breach – The Perspective of a Translational Scientist

Pranela Rameshwar

Rutgers, New Jersey Medical School, Dept of Medicine, 185 South Orange Avenue, Newark, NJ 07103

Abstract: [+]    |    Download File [ 351KB ]    |   Read Article Online

Abstract: This short opinion article discusses the overlooked problem of protecting biological data generated in biotechnology companies and at universities. This type of security should fall under the umbrella of a biosecurity and perhaps as a subgroup of cybersecurity. The article discusses some of the problems and address how the security, universities and scientists could begin to form teams to ensure the security of the data. More importantly, the article also discusses the economic impact of breach in the security data.

Keywords: Biosecurity, cybersecurity, economic impact, biotechnology, biological sciences, Pharmaceutical.

Vulnerability Assessment and Experimentation of Smart Grid DNP3

Ihab Darwish, Obinna Igbe and Tarek Saadawi

City University of New York, City College, USA

Abstract: [+]    |    Download File [ 6840KB ]    |   Read Article Online

Abstract: Smart-grids security is becoming a challenging research area that has emerged in recent years facing the energy sector. Threats are arising every day that could cause great scale of damages in critical infrastructure. Our paper will assess vulnerabilities pertaining to internal security threats associated with the smart grid.We will perform penetration testing using various attack scenarios in a simulated virtual environment involving DNP3 protocol. Vulnerability analysis and penetration testing involving Man-in-the-middle (MITM) attack will be addressed. Ultimately, by utilizing theoretical modeling of smart-grid attacks using game theory, we will be able to optimize our detection and mitigation strategies to reduce cyber threats in DNP3 environment. Intrusion detection system (IDS) will be necessary to identify attackers targeting the smart grid infrastructure. Mitigation techniques will ensure a healthy check of the network. Performing DNP3 vulnerabilities assessment, security attacks, detections, preventions and counter measures will be our goals to achieve in this research paper.

Keywords: Smart-Grid, SCADA, DNP3, IED, Malicious Attacks, MITM, DoS, and Game Theory.

Cyber Security for Smart Grid – The Backbone of Social Economy

Vandana Rohokale1 and Ramjee Prasad2

1SKN Sinhgad Institute of Technology and Sciences (SKNSITS), Lonavala, Maharashtra, India
2Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Abstract: [+]    |    Download File [ 2719KB ]    |   Read Article Online

Abstract: Ever-growing population of people and new electronic gadgets demand huge electricity. Existing power grids mostly use non-renewable energy sources for electricity generation which is unidirectional energy flow. Aging equipments and manual meter reading, power line failure detection and power quality measurements result in lot of power losses and delays. Smart Grid assures modern, computerized and automated electricity power generation, distribution and management. It also ensures energy efficiency with quality improvement and reliability. But since it involves some kind of wired and wireless communication, there are the chances of enormous vulnerabilities. Electricity theft, authentication, authorization, trust ranking, distributed denial of service attack, man in the middle attack are the real challenges for smart grid. Cyber Security should ensure security for smart grid system with appropriate levels of trust, privacy and security. This paper puts forth the security challenges for smart grid and discusses about possible security solutions.

Keywords: Cyber Security, Smart Grid, Power Grid, etc.

River Publishers: Journal of Cyber Security and Mobility