GLOBAL DIGITAL LIBRARY

 

Global Digital Library provides an opportunity to the researchers to access high-quality content published in our conferences, journals, and books. 

Visit Website >

IOARP EDITORIAL SYSTEM

 

IES is a comprehensive web-based software designed exclusively to manage the review process for conferences, journals, and books.

 

Visit Website >

LATEST RESEARCH NEWS

Our dedicated team researches through thousands of scholarly articles, blogs, and technology magazines to publish cutting-edge research in your field of interest. 

Read Research News >

IOARP NEWSLETTER

 

We publish a monthly newsletter to keep our readers posted about IOARP activities, information on products and services, and benefits of publishing with us.

 

Read Newsletter >

IOARP Journal of Communication and Networks

IOARP Journal of Communication and Networks

Volume 1

IOARP JCN aims to provide an opportunity to the scientists, researchers, engineers, physicists, applied mathematicians, and practitioners to publish their high-quality research on fundamental advances, the current state of the technology, outcomes of ongoing research, and emerging issues in the domains of communication and networks. We are particularly interested in publishing cutting-edge communication and networks research converging with the domains such as; engineering and physical sciences, social sciences and humanities, and life, health, and biomedical sciences.


Volume 1
Issue 1, September 2017 | Issue 2, December 2017 |

IOARP Journal of Communication and Networks (JCN)
15 October 2017
JCN01
22
Dr M Adeel
www.jcn.ioarp.org
Copyright © 2015-2020 IOARP

Journal Homepage on Global Digital Library
PDF
PDF
PDF
PDF
PDF
PDF

Lightweight Secure and Scalable Key Sharing Protocol for Wireless Sensor Networks

Munir Hussain, Khalid Khan

Wireless Sensor Networks (WSN) technology is still immature and thus faces a variety of problems due to limited memory, CPU and battery power resources. WSNs are prone to active and passive attacks. While the former is capable of affecting minimal resources, the latter type of attack is difficult to launch but very powerful in terms of affecting critical resources. Most shared key security protocols used in WSNs are not scalable as they depend upon third party or KDC. Although in some situations this concept works well, besides reducing scalability, finding a trustworthy third party is also very difficult in KDC concept of key sharing. This paper gives a brief overview of WSNs, posed security threats to these networks and relevant security issues. This paper also brings in a novel key sharing model for traversing secret key in WSNs that does not depend on third party concept and hence it is a more scalable and secure.

More...


The Taxonomy of Behavioural Parameters on Mobile Devices

M Adeel, L N Tokarchuk, M A Azam, S K A Khan

Mobile malware has emerged as one of the major threats for modern-day mobile networks. Since the first inception a decade ago, hundreds of types of mobile malware and their variants have been discovered. Interactions between mobile using technologies like Bluetooth, MMS, SMS, and mobile and home broadband, leave significant usage footprints on mobile devices. If acquired and processed, these footprints can be utilised for a variety of purposes including the detection of mobile malware. This work is aimed at introducing various behaviour parameters against which the footprints can be recorded, and the processing of these parameters to produce high-order parameters that can prove very effective in different types of device and network-specific analysis including detection of malware. It is important to state that this work is limited to presenting a comprehensive taxonomy of behaviour parameters only, and a discussion on the mechanism of utilising the behaviour parameters in analysis such as detection of malware is beyond the scope of this work.

More...