-
Methodology and Analysis of Smart Contracts in Blockchain-Based International Trade Application
Authors:
Asif Bhat,
Rizal Mohd Nor,
Md Amiruzzaman,
Md. Rajibul Islam
Abstract:
Blokchain is used in a variety of applications where trustworthy computing is re-quired. Trade finance is one of these areas that would benefit immensely from a decentralized way of doing transactions. This paper presents the preliminary as-sessment of Accepire-BT, a software platform developed for the practice of col-laborative Trade Finance. The proposed solution is enforced by smart contracts u…
▽ More
Blokchain is used in a variety of applications where trustworthy computing is re-quired. Trade finance is one of these areas that would benefit immensely from a decentralized way of doing transactions. This paper presents the preliminary as-sessment of Accepire-BT, a software platform developed for the practice of col-laborative Trade Finance. The proposed solution is enforced by smart contracts using Solidity, the underlying programming language for the Ethereum block-chain. We evaluated the performance in the Rinkeby test network by using Remix and MetaMask. The results of the preliminary trial show that smart contracts take less than one minute per cycle. Also, we present a discussion about costs for us-ing the public Ethereum Rinkeby network.
△ Less
Submitted 27 April, 2022; v1 submitted 14 July, 2021;
originally announced July 2021.
-
DNS attack mitigation Using OpenStack Isolation
Authors:
Hassnain ul hassan,
Rizal Mohd Nor,
Md Amiruzzaman,
Sharyar Wani,
Md. Rajibul Islam
Abstract:
The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol…
▽ More
The Domain Name System (DNS) is essential for the Internet, giving a mechanism to resolve hostnames into Internet Protocol (IP) addresses. DNS is known as the world's largest distributed database that manages hostnames and Internet Protocol. By having the DNS, only simple names that can be easily memorized will be used and then the domain name system will map it into the numeric Internet Protocol addresses that are used by computers to communicate. This research aims to propose a model for the development of a private cloud infrastructure to host DNS. The cloud infrastructure will be created using the OpenStack software platform where each server will be hosted separately in a different virtual machine. Virtual network architecture will be created using the Software Defined Networking (SDN) approach and it will be secured using Firewall as a Service (FWaaS). By hosting DNS in private cloud infrastructure, the DNS servers will be out of reach by attackers which will prevent DNS attacks. Besides, available research had proven that the cloud is the best choice for DNS. A prototype had been implemented and evaluated for its efficiencies. The findings from the evaluation carried out shown a positive result.
△ Less
Submitted 28 August, 2021; v1 submitted 8 June, 2021;
originally announced June 2021.
-
DistB-Condo: Distributed Blockchain-based IoT-SDN Model for Smart Condominium
Authors:
Anichur Rahman,
Md. Jahidul Islam,
Ziaur Rahman,
Md. Mahfuz Reza,
Adnan Anwar,
M. A. Parvez Mahmud,
Mostofa Kamal Nasir,
Rafidah Md Noor
Abstract:
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtual…
▽ More
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtualization (NFV) and Blockchain (BC). These technologies provide a robust, and secured platform to meet all kinds of challenges, such as safety, confidentiality, flexibility, efficiency, and availability. This work suggests a distributed, scalable IoT-SDN with Blockchain-based NFV framework for a smart condominium (DistB-Condo) that can act as an efficient secured platform for a small community. Moreover, the Blockchain-based IoT-SDN with NFV framework provides the combined benefits of leading technologies. It also presents an optimized Cluster Head Selection (CHS) algorithm for selecting a Cluster Head (CH) among the clusters that efficiently saves energy. Besides, a decentralized and secured Blockchain approach has been introduced that allows more prominent security and privacy to the desired condominium network. Our proposed approach has also the ability to detect attacks in an IoT environment. Eventually, this article evaluates the performance of the proposed architecture using different parameters (e.g., throughput, packet arrival rate, and response time). The proposed approach outperforms the existing OF-Based SDN. DistB-Condo has better throughput on average, and the bandwidth (Mbps) much higher than the OF-Based SDN approach in the presence of attacks. Also, the proposed model has an average response time of 5% less than the core model.
△ Less
Submitted 17 December, 2020;
originally announced December 2020.
-
Hide Secret Information in Blocks: Minimum Distortion Embedding
Authors:
Md Amiruzzaman,
Rizal Mohd Nor
Abstract:
In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focuses on DCT rounding error and optimizes that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helps t…
▽ More
In this paper, a new steganographic method is presented that provides minimum distortion in the stego image. The proposed encoding algorithm focuses on DCT rounding error and optimizes that in a way to reduce distortion in the stego image, and the proposed algorithm produces less distortion than existing methods (e.g., F5 algorithm). The proposed method is based on DCT rounding error which helps to lower distortion and higher embedding capacity.
△ Less
Submitted 16 March, 2020;
originally announced March 2020.
-
Process migration-based computational offloading framework for IoT-supported mobile edge/cloud computing
Authors:
Abdullah Yousafzai,
Ibrar Yaqoob,
Muhammad Imran,
Abdullah Gani,
Rafidah Md Noor
Abstract:
Mobile devices have become an indispensable component of Internet of Things (IoT). However, these devices have resource constraints in processing capabilities, battery power, and storage space, thus hindering the execution of computation-intensive applications that often require broad bandwidth, stringent response time, long battery life, and heavy computing power. Mobile cloud computing and mobil…
▽ More
Mobile devices have become an indispensable component of Internet of Things (IoT). However, these devices have resource constraints in processing capabilities, battery power, and storage space, thus hindering the execution of computation-intensive applications that often require broad bandwidth, stringent response time, long battery life, and heavy computing power. Mobile cloud computing and mobile edge computing (MEC) are emerging technologies that can meet the aforementioned requirements using offloading algorithms. In this paper, we analyze the effect of platform-dependent native applications on computational offloading in edge networks and propose a lightweight process migration-based computational offloading framework. The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. The proposed framework is evaluated using an experimental testbed. Numerical results reveal that the proposed framework saves almost 44% of the execution time and 84% of the energy consumption. Hence, the proposed framework shows profound potential for resource-intensive IoT application processing in MEC.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey
Authors:
Syed Adeel Ali Shah,
Ejaz Ahmed,
Feng Xia,
Ahmad Karim,
Muhammad Shiraz,
Rafidah MD Noor
Abstract:
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope…
▽ More
Vehicular communication requires vehicles to self-organize through the exchange of periodic beacons. Recent analysis on beaconing indicates that the standards for beaconing restrict the desired performance of vehicular applications. This situation can be attributed to the quality of the available transmission medium, persistent change in the traffic situation and the inability of standards to cope with application requirements. To this end, this paper is motivated by the classifications and capability evaluations of existing adaptive beaconing approaches. To begin with, we explore the anatomy and the performance requirements of beaconing. Then, the beaconing design is analyzed to introduce a design-based beaconing taxonomy. A survey of the state-of-the-art is conducted with an emphasis on the salient features of the beaconing approaches. We also evaluate the capabilities of beaconing approaches using several key parameters. A comparison among beaconing approaches is presented, which is based on the architectural and implementation characteristics. The paper concludes by discussing open challenges in the field.
△ Less
Submitted 24 May, 2016;
originally announced May 2016.
-
Availability Aware Continuous Replica Placement Problem
Authors:
Abdullah Yousafzai,
Abdullah Gani,
Rafidah Md Noor
Abstract:
Replica placement (RP) intended at producing a set of duplicated data items across the nodes of a distributed system in order to optimize fault tolerance, availability, system performance load balancing. Typically, RP formulations employ dynamic methods to change the replica placement in the system potentially upon user request profile. Continuous Replica Placement Problem (CRPP) is an extension o…
▽ More
Replica placement (RP) intended at producing a set of duplicated data items across the nodes of a distributed system in order to optimize fault tolerance, availability, system performance load balancing. Typically, RP formulations employ dynamic methods to change the replica placement in the system potentially upon user request profile. Continuous Replica Placement Problem (CRPP) is an extension of replica placement problem that takes into consideration the current replication state of the distributed system along with user request profile to define a new replication scheme, subject to optimization criteria and constraints. This paper proposes an alternative technique, named Availability Aware Continuous Replica Placement Problem (AACRPP).AACRPP can be defined as: Given an already defined replica placement scheme, a user request profile, and a node failure profile define a new replication scheme, subject to optimization criteria and constraints. In this effort we use modified greedy heuristics from the CRPP and investigated the proposed mechanism using a trace driven java based simulation.
△ Less
Submitted 13 May, 2016;
originally announced May 2016.
-
A Taxonomy for Congestion Control Algorithms in Vehicular Ad Hoc Networks
Authors:
Mohammad Reza Jabbarpour Sattari,
Rafidah Md Noor,
Hassan Keshavarz
Abstract:
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliab…
▽ More
One of the main criteria in Vehicular Ad hoc Networks (VANETs) that has attracted the researchers' consideration is congestion control. Accordingly, many algorithms have been proposed to alleviate the congestion problem, although it is hard to find an appropriate algorithm for applications and safety messages among them. Safety messages encompass beacons and event-driven messages. Delay and reliability are essential requirements for event-driven messages. In crowded networks where beacon messages are broadcasted at a high number of frequencies by many vehicles, the Control Channel (CCH), which used for beacons sending, will be easily congested. On the other hand, to guarantee the reliability and timely delivery of event-driven messages, having a congestion free control channel is a necessity. Thus, consideration of this study is given to find a solution for the congestion problem in VANETs by taking a comprehensive look at the existent congestion control algorithms. In addition, the taxonomy for congestion control algorithms in VANETs is presented based on three classes, namely, proactive, reactive and hybrid. Finally, we have found the criteria in which fulfill prerequisite of a good congestion control algorithm.
△ Less
Submitted 17 July, 2012;
originally announced July 2012.
-
Session Initiation Protocol Attacks and Challenges
Authors:
Hassan Keshavarz,
Mohammad Reza Jabbarpour Sattari,
Rafidah Md Noor
Abstract:
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are disc…
▽ More
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.
△ Less
Submitted 2 May, 2012;
originally announced May 2012.
-
Intrusion Detection System: Overview
Authors:
Hamdan. O. Alanazi,
Rafidah Md Noor,
B. B Zaidan,
A. A Zaidan
Abstract:
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear…
▽ More
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised learning methods. However, in this research, we also came across SOM or Self Organizing Map, which is an ANN-based system, but applies unsupervised methods. Another approach is Fuzzy Logic (IDS-based), which also applies unsupervised learning methods. Lastly, we will look at the SVM system or Support Vector Machine for IDS. The goal of this paper is to draw an image for hybrid approaches using these supervised and unsupervised methods.
△ Less
Submitted 21 February, 2010;
originally announced February 2010.