scispace - formally typeset
Search or ask a question
JournalISSN: 2074-9090

International Journal of Computer Network and Information Security 

MECS Publisher
About: International Journal of Computer Network and Information Security is an academic journal published by MECS Publisher. The journal publishes majorly in the area(s): Computer science & Wireless sensor network. It has an ISSN identifier of 2074-9090. It is also open access. Over the lifetime, 1064 publications have been published receiving 8670 citations. The journal is also known as: I.J. computer network and information security.


Papers
More filters
Journal ArticleDOI
TL;DR: The current state of the art in security mechanisms for WSNs is discussed and various types of attacks are discussed and their countermeasures presented.
Abstract: Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.

229 citations

Journal ArticleDOI
TL;DR: All the four types of cloud models available in the market are defined, discussed and compared with the benefits and pitfalls, thus giving a clear idea, which model to adopt for your organization.
Abstract: These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

171 citations

Journal ArticleDOI
TL;DR: A survey on recent advances in honeypot research from a review of 80+ papers on honeypots and related topics mostly published after year 2005 reveals that there has not been widely accepted agreement on the legal and ethical issues about honeypots.
Abstract: This paper presents a survey on recent advances in honeypot research from a review of 80+ papers on honeypots and related topics mostly published after year 2005. This paper summarizes 60 papers that had significant contribution to the field. In reviewing the literature, it became apparent that the research can be broken down into five major areas:  new types of honeypots to cope with emergent new security threats,  utilizing honeypot output data to improve the accuracy in threat detections,  configuring honeypots to reduce the cost of maintaining honeypots as well as to improve the accuracy in threat detections,  counteracting honeypot detections by attackers, and  legal and ethical issues in using honeypots. Our literature reviews indicate that the advances in the first four areas reflect the recent changes in our networking environments, such as those in user demography and the ways those diverse users use new applications. Our literature reviews on legal and ethical issues in using honeypots reveals that there has not been widely accepted agreement on the legal and ethical issues about honeypots, which must be an important agenda in future honeypot research.

89 citations

Journal ArticleDOI
TL;DR: The paper analyzes systems vulnerability targeted by TCP segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack.
Abstract: The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

84 citations

Journal Article
TL;DR: This article is a survey of almost 50 position-based routing protocols and it comes as an aid in the implementation of this type of routing in various applications which may need to consider the advantages and pitfalls of position- based routing.
Abstract: A focus of the scientific community is to design network oriented position-based routing protocols and this has resulted in a very high number of algorithms, different in approach and performance and each suited only to particular applications However, though numerous, very few position-based algorithms have actually been adopted for commercial purposes This article is a survey of almost 50 position-based routing protocols and it comes as an aid in the implementation of this type of routing in various applications which may need to consider the advantages and pitfalls of position-based routing An emphasis is made on geographic routing, whose notion is clarified as a more restrictive and more efficient type of position-based routing The protocols are therefore divided into geographic and non-geographic routing protocols and each is characterized according to a number of network design issues and presented in a comparative manner from multiple points of view The main requirements of current general applications are also studied and, depending on these, the survey proposes a number of protocols for use in particular application areas This aims to help both researchers and potential users assess and choose the protocol best suited to their interest

81 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
202315
202235
202133
202025
201965
201879