Volume 4, Issue 9, September 2013

Using Information and Communication Technology (ICT) to Improve Polytechnic Education in Ghana
Pages: 1-7 (7) | [Full Text] PDF (371K)
Nana Yaw Asabere
Computer Science Department, School of Applied Sciences and Arts, Accra Polytechnic, Accra, Ghana

Abstract -
In the past decade, there has been a tremendous growth of Information and Communication Technology for Education (ICT4E) in the West African sub region and the African continent as a whole. Through the support of both international and local development agencies, several Higher Education Institutions (HEIs) in Ghana have engaged in introducing, implementing and supporting ICT4E. Using a review of existing and relevant literature, this study aims at providing a description, analysis and guide of how Polytechnics in Ghana can use ICT to improve their education and make such enhancements a reality. Furthermore, the study aims to propose two considerable and adoptable frameworks that can be incorporated as implementation strategies by various Polytechnics in Ghana. Such ICT frameworks will pave the way for the successful implementation of ICT4E in Polytechnics in Ghana.
 Index Terms - HEIs, ICT4E, Infrastructure, Policies, Polytechnics, Ghana and ICT4AD
An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN
Pages: 8-13 (6) | [Full Text] PDF (289K)
Veena Janardhanan, Arun Jose, Parameshachari B. D., Muruganantham C. and H. S. DivakaraMurthy
Department of ECE, Nehru College of Engineering and Research Centre, Pampady, Thiruvilawamala, Kerala, India

Abstract -
Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this attack adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using enroute filtering and cryptographic techniques are used for preventing such attacks. This paper focuses on the design of RSA based security scheme with on demand routing. On- demand routing protocol is used in this scheme to lower the energy consumption. This work evaluates and compares the performance of the network system using RSA algorithm and authentication algorithm. Study and implementation of these security schemes are been carried out using network simulator (ns2) and metrics such as Packet Delivery Ratio, Energy, Throughput. Results are presented as a function of these metrics and the graphs generated show that RSA based security scheme with on-demand routing performs better than the security schemes using authentication algorithms.
 Index Terms - False Data Injection, RSA Algorithm, On-Demand Routing, Performance Evaluation and Wireless Sensor Network
Comparative Study of AODV and OLSR Protocols in MANET Network under the Impact of Black Hole Attack
Pages: 14-19 (6) | [Full Text] PDF (535K)
Karim Shamekh and Essam Elden Elfakharany
Computer Science Department, High Technology Institute, 10th of Ramadan, Egypt
Arab Academy for Science, Technology and Maritime, Cairo, Egypt

Abstract -
Wireless Networks are raising fast today, as users wants to have wireless network anywhere they are located. Mobile Ad-Hoc Networks also named as MANETs became one of the most well-liked wireless networks because it is easy to be deployed and due to its dynamic nature. Existence of MANETs created a new set of demands to be implemented and to provide efficient better end-to-end delay communication. MANET is a collection of mobile nodes that dynamically form a temporary network without the aid of any established infrastructure or centralized administration. It has many numbers of applications mainly in the areas of Sensor Networks (SN), medical military and rescue operations. MANETs works on TCP/IP structure in order to provide the communication between the work stations. Work stations are mobile, that is why the traditional TCP/IP model needs to be modified to compensate the MANETs mobility and provide efficient functionality of the network. Based on that routing protocol, ad-hoc networks are classified into two main categories; Proactive routing protocol such as Optimized Link State Routing (OLSR) and Reactive Routing Protocol such as Ad-Hoc on Demand Distance Vector (ADOV). Despite of routing protocols, the nature of such networks increased threat of attacks while MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. One of the attacks is the black hole attack.
 Index Terms - MANET, Ad-Hoc on Demand Routing Protocol (AODV), Open Link State Routing (OLSR) and Black Hole Attack
Hybrid Evolutionary Game Theory in QoS Routing of Wireless Mesh Networks
Pages: 20-28 (9) | [Full Text] PDF (780K)
Dadmehr Rahbari
Artificial Intelligence Group of Mashhad Azad University, Iran

Abstract -
Wireless mesh networks are a powerful and reliable solution to create and access wireless broadband services for Internet service providers, network construction, military applications and other end users are considered. These networks have features such as high reliability, low installation cost, wide coverage area and connect to the network automatically. The QoS routing service is a primary problem for wireless mesh networks. Evolutionary game theory by which agents can play optimal strategies in the absence of rationality. Through the process of Darwinian selection, a population of agents can evolve to an Evolutionary Stable Strategy. In this article we have tried to solve this problem by using evolutionary game theory as a hybrid genetic algorithm to optimize the parameters by simulated anneling at lower cost than traditional routing arrived. The results of the simulation and compare it with other optimization algorithms confirms that the evolutionary game parameters can be optimized by the evolutionary algorithms and achieve better results.
 Index Terms - Wireless Mesh Networks, QoS Routing, Genetic Algorithm, Game Theory and Simulated Anneling
Acknowledge Enabled Secure Algorithm for Dynamically Updating Programs Installed in Wireless Sensor Nodes
Pages: 29-33 (5) | [Full Text] PDF (462K)
Vishwa Pratap Singh, Kishore Mishra, Jay Shankar Sharma and Ankit shirivastava
Indian Institute of Information Technology, Gwalior, India
Apex Institute of Engineering and Technology, Jaipur, Rajasthan, India

Abstract -
There are several programs installed in wireless sensor nodes, time to time these programs need to update in secure manner, such that any unauthorized person could not update the programs. Sensor nodes have several constraints so we cannot use conventional cryptographic algorithms. In this paper we have proposed an algorithm for updating programs installed in wireless sensor nodes in secure manner. We have used distributed key approach and ECC. We have eliminated the shortcoming, "one sided communication between sensor nodes and base station", present in algorithm from paper secure dynamic program update protocol for ZigBee using ECC.....
 Index Terms - Wireless Sensor Networks, ZigBee, ECC and Distributed Key Approach
Performance Analysis of WiMAX Physical Layer under Scrambling Security Threat Using MATLAB Simulation
Pages: 34-41 (8) | [Full Text] PDF (573K)
Muhammad Aamer, Abdul Maalik and M. Junaid Arshad
Department of Electronics, The University of Lahore, Pakistan
Department of Computer Science and Engineering, UET, Lahore-Pakistan

Abstract -
In WiMAX environment jamming and scrambling threats can be destroy the Communication. Scrambling is type of jamming and it is more dangerous for WiMAX system because it occurs for very short intervals of time and effect on specific frames or parts of frames. As scrambling effect on specific frames so if it affects control and information frames then there should be great problem in WiMAX Network. Scrambling can also be generated naturally that is why this threat is also important in the WiMAX network. Due to all these scrambling issues, before implementing the WiMAX architecture, we will introduce our scrambling in the WiMAX system then using MATLAB simulation check out its effect on this WiMAX system. In the end we add our descrambler module at the receiver side that is used to discard the scrambling.
 Index Terms - Worldwide Interoperability for Microwave Access (WiMAX), Orthogonal Frequency Division (OFDM), Physical Layer (PHY), MAC, Scrambling and MATLAB
A Review Study on the Privacy Preserving Data Mining Techniques and Approaches
Pages: 42-46 (5) | [Full Text] PDF (294K)
Manish Sharma, Atul Chaudhary, Manish Mathuria and Shalini Chaudhary
Department of CSE, Govt. Engineering College, Ajmer
Department of I.T, Govt. Engineering College, Ajmer

Abstract -
With the extensive amount of data stored in databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which extracts the useful information from the large repositories. Knowledge discovery in database (KDD) is another name of data mining. Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. In this paper we review on the various privacy preserving data mining techniques like data modification and secure multiparty computation based on the different aspects. We also analyze the comparative study of all techniques followed by the future research work.
 Index Terms - Privacy and Security, Data Mining, Privacy Preserving, Secure Multiparty Computation (SMC) and Data Modification