Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash,
cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is
summarized in three processes: firstly, the authentication process, which involves the authentication phases
for the applied customers. Secondly, the member recognition process which tests and ensures the customer
membership by the market server. Finally, payment processwhich will be done by ciphering the customer
information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to
the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since
the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key
encryption system ensures the security of the proposed method. However, to prevent a brute force attack,
the choice of the key size becomes crucial.
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
This is a class room presentation taught by Prof Chowdari Prasad to MBA (Banking) students on developments of Technology in Indian Banking. It was well received and needs to be updated. Any suggestions are welcome from bankers, students, researchers, etc.
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
This is a class room presentation taught by Prof Chowdari Prasad to MBA (Banking) students on developments of Technology in Indian Banking. It was well received and needs to be updated. Any suggestions are welcome from bankers, students, researchers, etc.
Discover why accepting contactless payments can boost your small business, increase your customers, their average spend and isn't as expensive as you might think. This free guide has all you need to know about the fast emerging technology of contactless card payment.
Mobile wallets are rapidly emerging as a alternative mode of making payments and transferring money. The document is a very brief note on current information on this space. For a more detailed version, please contact IBR
Transformation of the Electronic Payments Industry - Strategies for Growthfrancisfoo
This presentation provides a glimpse into the evolution of the digital payment industry and a discussion of both short-term and long-term strategies that players in this space could potentially adopt to stay ahead of the competition.
I've diverse interests across wide-ranging topics and industries and I thoroughly enjoy analyzing information and devising strategies to help companies better position themselves for the challenges ahead.
If you require more information and data, feel free to reach out to me at francisfoo@wustl.edu or connect with me on LinkedIn www.linkedin.com/in/francisfoo/.
Thank you for your interest! Hope you find the information useful.
SPA Presentation at Cartes America
Contactless Card Shipments Break all Records as
Consumers Adopt New Ways to Pay
• Contactless technology was present on 23 percent of all payment cards shipped worldwide in 2012
• Contactless growth in Western Europe and Asia exceeded 100 percent
• More than 220 million contactless cards were delivered by Smart Payment Association (SPA) members in 2012
• SPA believes the harmonization of ISO, SEPA and EMVCo standards will ensure the global interoperability of new NFC contactless services for consumers.
23rd April 2013
Consumers adaptability and acceptance of e walletMathew Lawrence
This presentation was given in the One day International Multi-Disciplinary Conference on “World Road to Cashless economy” organised by Clara's college of commerce in association University of Mumbai & India Accounting Association (Thane Branch)
This presentation covers the Payments systems in India. It starts with Introduction and then cover paper payment systems like Cheque Truncation System (CTS), MICR, CTS 2010. In Electronic payment systems it covers RTGS, IFSC, UTR No, NEFT, IMPS & difference between them. It also covers the limitations of Indian Payment system. In last leg it covers in detail SWIFT in details with latest statistics
PSD2 is the second Payment Services Directive, which is set to further revolutionise the payments industry. PSD2 is affecting everything from the way we pay online, to what information we see when making a payment.
Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Discover why accepting contactless payments can boost your small business, increase your customers, their average spend and isn't as expensive as you might think. This free guide has all you need to know about the fast emerging technology of contactless card payment.
Mobile wallets are rapidly emerging as a alternative mode of making payments and transferring money. The document is a very brief note on current information on this space. For a more detailed version, please contact IBR
Transformation of the Electronic Payments Industry - Strategies for Growthfrancisfoo
This presentation provides a glimpse into the evolution of the digital payment industry and a discussion of both short-term and long-term strategies that players in this space could potentially adopt to stay ahead of the competition.
I've diverse interests across wide-ranging topics and industries and I thoroughly enjoy analyzing information and devising strategies to help companies better position themselves for the challenges ahead.
If you require more information and data, feel free to reach out to me at francisfoo@wustl.edu or connect with me on LinkedIn www.linkedin.com/in/francisfoo/.
Thank you for your interest! Hope you find the information useful.
SPA Presentation at Cartes America
Contactless Card Shipments Break all Records as
Consumers Adopt New Ways to Pay
• Contactless technology was present on 23 percent of all payment cards shipped worldwide in 2012
• Contactless growth in Western Europe and Asia exceeded 100 percent
• More than 220 million contactless cards were delivered by Smart Payment Association (SPA) members in 2012
• SPA believes the harmonization of ISO, SEPA and EMVCo standards will ensure the global interoperability of new NFC contactless services for consumers.
23rd April 2013
Consumers adaptability and acceptance of e walletMathew Lawrence
This presentation was given in the One day International Multi-Disciplinary Conference on “World Road to Cashless economy” organised by Clara's college of commerce in association University of Mumbai & India Accounting Association (Thane Branch)
This presentation covers the Payments systems in India. It starts with Introduction and then cover paper payment systems like Cheque Truncation System (CTS), MICR, CTS 2010. In Electronic payment systems it covers RTGS, IFSC, UTR No, NEFT, IMPS & difference between them. It also covers the limitations of Indian Payment system. In last leg it covers in detail SWIFT in details with latest statistics
PSD2 is the second Payment Services Directive, which is set to further revolutionise the payments industry. PSD2 is affecting everything from the way we pay online, to what information we see when making a payment.
Minimum Physical Hop (MPH) has been proposed as a peer selection algorithm for decreasing inter-AS (Autonomous System) traffic volume in P2P live streaming. In MPH, a newly joining peer selects a peer whose physical hop count (i.e., the number of ASes traversed on the content delivery path) from it is the minimum as its providing peer. However, MPH shows high inter-AS traffic volume when the number of joining peers is large. In this paper, we propose IMPH that tries to further decrease the inter-AS traffic volume by distributing peers with one logical hop count (i.e., the number of peers or origin streaming servers (OSSes) traversed on the content delivery path from an OSS to the peer) to many ASes and encouraging the following peers to find their providing peers within the same AS. Numerical examples show that IMPH achieves at the maximum of 64% lower inter-AS traffic volume than MPH.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
A proposal to enhance cellular and wifiIJCNCJournal
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many years. However, the interoperability issue between the two networks needs to be enhanced so that WiFi can efficiently supplement for the cellular network in case of congestion or outage. In this paper, we propose a novel network roaming and selection scheme based on 3GPP TS 24.312 and IEEE 802.11k, u standards to enhance cellular and WiFi interworking. The proposed scheme is aimed at enhancing the network roaming and selection so that WiFi network can serve as a supplement and backup access network for the cellular not only for congestion control but also in case of unexpected network failure event. We also model and evaluate the proposed scheme in a typical HetNet with interworking WiFi access points and cellular base stations. The simulation result shows that our proposed scheme quickly detects unexpected network failure event and assists active UEs to perform handoff to preferable alternative point of access. As a result, service disruption is substantially reduced and quality of experience (downlink/uplink’s throughput) is improved. Therefore, our proposed scheme can be used for a more reliable HetNet in terms of congestion control and disruption tolerance.
PERFORMANCES OF ORTHOGONAL WAVELET DIVISION MULTIPLEX (OWDM) SYSTEM UNDER AWG...IJCNCJournal
Orthogonal Wavelet Division Multiplexing (OWDM) has been considered as an alternative of Orthogonal
Frequency Division Multiplexing (OFDM) in the recent years. OWDM has lower computational complexity
and higher flexibility compared to its OFDM counterpart. The core component of OWDM is wavelet.
Wavelet has been a much investigated and applied topic in digital image processing for a long time.
Recently, it has drawn considerable attention of the researchers working in communication field. In this
work we investigate the performances of OWDM under different channel conditions. We consider three
channel conditions namely Additive White Gaussian Noise (AWGN), Rayleigh, Ricean, and frequency
selective. We consider a number of wavelets namely Haar, Daubechies, Biorthogonal, Reverse
Biorthogonal, Coiflets, and Symlets in OWDM design. For system model we choose Digital Video
Broadcasting-Terrestrial (DVB-T). Originally DVB-T system was designed based on OFDM. In this work
we use OWDM instead. The simulation results show OWDM outperforms OFDM in terms of bit error rate
(BER), noise resiliency, and peak-to-average ration. The results also show that the Haar wavelet based
OWDM outperforms other wavelets based OWDM system under all three considered three channel
conditions.
GEOGRAPHIC MAPS CLASSIFICATION BASED ON L*A*B COLOR SYSTEMIJCNCJournal
Today any geographic information system (GIS) layers became vital part of any GIS system , and
consequently , the need for developing automatic approaches to extract GIS layers from different image
maps like digital maps or satellite images is very important.
Map classification can be defined as an image processing technique which creates thematic maps from
scanned paper maps or remotely sensed images. Each resultant theme will represent a GIS layer of the
images.
A new proposed approach to extract GIS layers (classes) automatically based on L*A*B colorsystem
selected from ( A and B ) is proposed in this paper, our experiments shows that the hsi color space gives
better than L*A*B.
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
We introduce a family of authenticated data structures — Ordered Merkle Trees (OMT) — and illustrate
their utility in security kernels for a wide variety of sub-systems. Specifically, the utility of two types of
OMTs: a) the index ordered merkle tree (IOMT) and b) the range ordered merkle tree (ROMT), are
investigated for their suitability in security kernels for various sub-systems of Border Gateway Protocol
(BGP), the Internet’s inter-autonomous system routing infrastructure. We outline simple generic security
kernel functions to maintain OMTs, and sub-system specific security kernel functionality for BGP subsystems
(like registries, autonomous system owners, and BGP speakers/routers), that take advantage of
OMTs.
SIMPLIFIED CBA CONCEPT AND EXPRESS CHOICE METHOD FOR INTEGRATED NETWORK MANAG...IJCNCJournal
The process of choosing and integrating a network management system (NMS) to an existing computer
network became a big question due to the complexity of used technologies and the variety of NMS options.
Most of computer networks are being developed according to their internal rules in cloud environments.
The use of NMS requires not only infrastructural changes, consequently increasing the cost of integration
and maintenance, but also increases the risk of potential failures. In this paper, conception and method of
express choice to implement and integrate a network management system are presented. Review of basic
methods of cost analysis for IT systems is presented. The simplified conception of cost benefits analysis
(CBA) is utilized as a basis of the offered method. A final estimation is based on three groups of
parameters: parameters of expected integration risk evaluation, expected effect and level of completed
management tasks. The explanation of the method is provided via example.
ADAPTIVE MULTI-TENANCY POLICY FOR ENHANCING SERVICE LEVEL AGREEMENT THROUGH R...IJCNCJournal
The appearance of infinite computing resources that available on demand and fast enough to adapt with
load surges makes Cloud computing favourable service infrastructure in IT market. Core feature in Cloud
service infrastructures is Service Level Agreement (SLA) that led seamless service at high quality of service
to client. One of the challenges in Cloud is providing heterogeneous computing services for the clients.
With the increasing number of clients/tenants in the Cloud, unsatisfied agreement is becoming a critical
factor. In this paper, we present an adaptive resource allocation policy which attempts to improve
accountable in Cloud SLA while aiming for enhancing system performance. Specifically, our allocation
incorporates dynamic matching SLA rules to deal with diverse processing requirements from
tenants.Explicitly, it reduces processing overheadswhile achieving better service agreement. Simulation
experiments proved the efficacy of our allocation policy in order to satisfy the tenants; and helps improve
reliable computing.
Fuzzy based clustering and energy efficientIJCNCJournal
Underwater Wireless Sensor Network (UWSN) is a particular kind of sensor networks which is
characterized by using acoustic channels for communication. UWSN is challenged by great issues specially
the energy supply of sensor node which can be wasted rapidly by several factors. The most proposed
routing protocols for terrestrial sensor networks are not adequate for UWSN, thus new design of routing
protocols must be adapted to this constrain. In this paper we propose two new clustering algorithms based
on Fuzzy C-Means mechanisms. In the first proposition, the cluster head is elected initially based on the
closeness to the center of the cluster, then the node having the higher residual energy elects itself as a
cluster head. All non-cluster head nodes transmit sensed data to the cluster head. This latter performs data
aggregation and transmits the data directly to the base station. The second algorithm uses the same
principle in forming clusters and electing cluster heads but operates in multi-hop mode to forward data
from cluster heads to the underwater sink (uw-sink). Furthermore the two proposed algorithms are tested
for static and dynamic deployment. Simulation results demonstrate the effectiveness of the proposed
algorithms resulting in an extension of the network lifetime.
Efficient management of bandwidth in wireless networks is a critical factor for a successful communication system. Special features of wireless networks such user mobility and growth of wireless applications and their high bandwidth intensity create a major challenge to utilize bandwidth resources optimally. In this research, we propose a model for an adaptable network bandwidth management method that combines bandwidth reservation and bandwidth adaptation to reduce call blocking and dropping probabilities. The model is an integer program that determines whether or not to accept new calls and decides how to allocate bandwidth optimally in a way to maximize user satisfaction. The results of a simulation study show that the proposed method outperforms an existing method with respect to key performance measures such as call blocking and dropping probabilities and call time survivability. This survivability indicator is a new measure that is introduced for the first time in this paper. We also present a second tradeoff model to allow the network manager to control call dropping probability. The results of a second simulation study show that network users are better off if a zero call dropping policy is adopted as proposed in the first model.
FLEXIBLE VIRTUAL ROUTING FUNCTION DEPLOYMENT IN NFV-BASED NETWORK WITH MINIMU...IJCNCJournal
In a conventional network, most network devices, such as routers, are dedicated devices that do not
have much variation in capacity. In recent years, a new concept of Network Functions
Virtualisation (NFV) has come into use. The intention is to implement a variety of network functions
with software on general-purpose servers and this allows the network operator to select any
capabilities and locations of network functions without any physical constraints.
This paper focuses on the deployment of NFV-based routing functions which are one of critical
virtual network functions, and present the algorithm of virtual routing function allocation that
minimize the total network cost. In addition, this paper presents the useful allocation policy of
virtual routing functions, based on an evaluation with a ladder-shaped network model. This policy
takes the ratio of the cost of a routing function to that of a circuit and traffic distribution in the
network into consideration. Furthermore, this paper shows that there are cases where the use of
NFV-based routing functions makes it possible to reduce the total network cost dramatically, in
comparison to a conventional network, in which it is not economically viable to distribute smallcapacity
routing functions
LIGHT FIDELITY (LI-FI) BASED INDOOR COMMUNICATION SYSTEMIJCNCJournal
Indoor wireless communication is an essential part of next generation wireless communication system.For
an indoor communication number of users and their device are increasing very rapidly so as a result
capacity of frequency spectrum to accommodate further users in future is limited and also it would be
difficult for service providers to provide more user reliable and high speed communication so this short
come can be solve in future by using Li-Fi based indoor communication system. Li-Fi which is an emerging
branch of optical wireless communication can be useful in future as a replacement and backup of Wireless
Fidelity (Wi-Fi)for indoor communication because it can provide high data rate of transmission along with
high capacity to utilize more users as its spectrum bandwidth is much broader than the radio spectrum. In
this paper we will look at the different aspects of the Li-Fi based indoor communication system,summarizes
some of the research conducted so far andwe will also proposed a Li-Fi based communication model
keeping in mind coverage area for multiple user and evaluate its performance under different scenarios .
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network’s environments, where issues such as mobility are highly variable. This paper proposes a method to distribute the bandwidth for wireless network nodes depending on dynamic methodology;this methodology uses intelligent clustering techniques that depend on the student’s distribution at the university campus, rather than the classical allocation methods. We propose a clustering-based approach to solve the dynamic bandwidth allocation problem in wireless networks, enabling wireless nodes to adapt their bandwidth allocation according to the changing number of expected users over time. The proposed solution allows the optimal online bandwidth allocation based on the data extracted from the lectures timetable, and fed to the wireless network control nodes, allowing them to adapt to their environment. The environment data is processed and clustered using the KMeans clustering algorithm to identify potential peak times for every wireless node. The proposed solution feasibility is tested by applying the approach to a case study, at the Arab American University campus wireless network.
SIMULATING CORTICAL MAPS FOR ATTENTION SHIFT IN AUTISMIJCNCJournal
Autism is a pervasive neuro-developmental disorder, primarily encompassing difficulties in the social,
language, and communicative domains. Because autism is a spectrum disorder, it affects each individual
differently and has varying degrees. There are three core aspects of impairment based upon the Diagnostic
and Statistical Manual of Mental Disorders (DSM-IV), namely impairment in socialization, impairment in
communication, and restricted repetitive activities or interests. This work describes the experiment aims at
expressing autistic traits through the use of self-organizing map. Works related to simulating autism
through self-organizing map is limited. This work compare and contrast the difference in attention index
for normal learning and marred attention shift learning ability. It was found that the attention index of
normal learning is 9 times better marred attention shift for both random and pre-fixed input data. In the
marred attention shift context, neurons adapt more towards the mean of both sources combined under
marred context while some neurons adapt towards mean of one source under normal context. The normal
learning ability produces maps with neurons orienting towards mean values of combined stimuli source.
Impairment in learning ability produces similar cortical maps compared to normal learning ability. The
major difference is in the attention index.
ESTABLISHMENT OF VIRTUAL POLICY BASED NETWORK MANAGEMENT SCHEME BY LOAD EXPER...IJCNCJournal
In the current Internet-based systems, there are many problems using anonymity of the network
communication such as personal information leak and crimes using the Internet systems. This is because
the TCP/IP protocol used in Internet systems does not have the user identification information on the
communication data, and it is difficult to supervise the user performing the above acts immediately. As a
solution for solving the above problem, there is the approach of Policy-based Network Management
(PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication
control of every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the
whole LAN by locating the communication control mechanisms on the course between network servers and
clients. The second is the scheme of managing the whole LAN by locating the communication control
mechanisms on clients. As the second scheme, we have been studied theoretically about the Destination
Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system
management, we intend to realize the policy-based Internet system management finally. In the DACS
Scheme, the inspection is not done about compatibility to cloud environment with virtualization technology
that spreads explosively. As the result, the coverage of the DACS Scheme is limited only in physical
environment now. In this study, we inspect compatibility of the DACS Scheme for the cloud environment
with virtualization technology, and enlarge coverage of this scheme. With it, the Virtual DACS Scheme
(vDACS Scheme) is established.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
Implementing a Secured E-Payment Authorisation System Using Two-Factor Authen...IJRESJOURNAL
ABSTRACT:Most of the current payment methods that can be used in conducting transactions on the Internet have major drawbacks either in terms of functionality, usability, costs or security. The only widely accepted way of securely and reliably authorizing electronic payment transactions is through the use of digital signatures in a public key infrastructure (PKI) framework which is computationally expensive. This paper presents an electronic payment(E-Payment) authorization system where two factor authentication (T-FA) was utilized for the authorization of payment transactions. The description approach is based on UML notation ,the functional processes are presented as use cases, the classes that make up the system structures were presented and the system was implemented on java technology with MS ASP for the web presentation and MS SQL for the DBMS. The system enables securely authorizing payment transactions using the Internet channel.
How digital payment solutions are transforming payments experienceNikunj Gundaniya
In the digital economy, we've come a long way, and multi-channel distribution is now a must-have for any company. Customers are now progressing beyond buying stuff and making payments to engaging in seamless customer-driven interactions via mobile devices, which is the next level of interactions.
The series of presentations contains the information about "Management Information System" subject of SEIT for University of Pune.
Subject Teacher: Tushar B Kute (Sandip Institute of Technology and Research Centre, Nashik)
http://www.tusharkute.com
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7207 81
MOBILE PAYMENTMETHODBASED ON PUBLIC-KEY
CRYPTOGRAPHY
Adnan A. Hnaif andMohammad A. Alia
Faculty of Science and Information Technology – Al-Zaytoonah University of
Jordan
ABSTRACT
Mobile payment is defined as mobile money, which is considered as an attractive alternative for cash,
cheque, or credit. In this paper we propose a new secure mobile paymentmethod. This method is
summarized in three processes: firstly, the authentication process, which involves the authentication phases
for the applied customers. Secondly, the member recognition process which tests and ensures the customer
membership by the market server. Finally, payment processwhich will be done by ciphering the customer
information using public-key encryption cryptosystem (RSA), to be submitted over an insecure network to
the market server. Actually, this mobile payment methodis more efficient than otherpayment methods since
the customer can pay from his/her own mobilephone without any extra cost and effort. The RSA public-key
encryption system ensures the security of the proposed method. However, to prevent a brute force attack,
the choice of the key size becomes crucial.
KEYWORDS
Mobile Payment, Cryptography, Information security, and Encryption.
1. INTRODUCTION
In business, shop offers goods or services to customers for selling. In shopping,retailers presents
their available products to be purchased by customers. Meanwhile, the shopping can be affected
by variant factors including how the customer is treated, convenience, the type of goods being
purchased, and payment technique[1].
On other hand, payment is the activity of transferring item of value from one party to another for
the provision of goods, servicesor both.However, barter is the oldest form of payment, in which
good or service can be exchanged between parties. In the modern world, cheque, debit, credit,
or bank transfer, are common means of payment. In complex transactions between businesses,
payments can take the form of stock or other more complicated
arrangements.Change coin, money and banknote in terms of the price is defined as exchanging
payment. While provisioning payment is quoted as the other form of payment since it is used to
transfer money from one account to another. In fact, a third party must be involved in some
payment methods such as electronic payments methods. Methods such as credit card, debit card,
cheques, money transfers, and recurring cash are alsoconsidered electronic payments methods.
Moreover, magnetic stripecard, smartcard, contactless card and mobile handset are proposed as
advanced electronic payments technologies. Specifically, mobile handset based payments are
called mobile payments.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
82
A credit card is a payment system that allows the cardholder to pay for goods and services based
on the legitimate contract between the cardholder and the credit card provider [1]. The cardholder
must create an account to be granted a line of creditby credit card provider as a cash advance for
electronic payment.As mentioned earlier, credit card is typically electronic payment that involves
a third party. The third party pays the seller and is reimbursed by the buyer.
As mentioned earlier, a credit card service provider (such as a bank or credit union) issues the
credit cards for costumers,respectively after the customer account has been approved by the credit
provider. Whereby, cardholders can use their credit cards to make purchases atmerchants who
acceptcredit card. Usually, merchants advertise their acceptable cards by showing credit cards
marks or logos. However, credit card user must agree his/her purchases to pay the card issuer.
Since the merchant asks the cardholder to entering a personal identification number (PIN) and
sometime to sign the receipt with a record of the card details. Currently, most merchants accept
telephone authorization and internet authorization. These kind of authorization is commonly
known as a card not present transaction (CNP).
Instantaneously, most of the electronic verification systems allow merchants to verify the card
validation and covering the purchase in a few seconds. However, a credit card payment
terminal or point-of-sale (POS) system with a communications link to the merchant's acquiring
bank perform the electronic verification. The magnetic stripe or chip on the card involves secured
and private information about the card. Monthly, card provider sends a regular statement
indicating the purchases undertaken with the card, any outstanding fees, and the total amount
owed to the cardholder.Electronic statements are also offered by banks in addition to the physical
statements.Electronic statement can be simply viewed at any time by the cardholder via the
provider's website. Normally, card provider notifies the cardholders about their purchases
amount,and statementsby email or mobile SMS.
On other hand, credit cards can be a significant financial asset in certain cases. Whereby, credit
cards can land a consumer in a tough financial situation when it is used unwisely. Thereare some
benefits and risks defined with credit cards.However, credit cards benefits are basically presented
as; easy to access, customersdon't have to reapply when the payment is down or off, almost
accepted everywhere, and it can help to build a solid credit history and rating. Whereby, some
credit card risks are highlighted as; it has high interest rates, it may find difficulties in monitoring
the spending of the credit card when the cardholder exceeds the levels of debt, extra interest
should be added if the cardholder doesn't pay his/her bill on the limited time, and cardholder who
has lots of cards will definitely fight administrative nightmare.
Mobile payment is also referred toelectronic payment. It is defined as mobile money,
mobile money transfer, and mobile wallet. In modern payment methods, mobile payment comes
to be an attractive alternative for cash, cheque, or credit cards payment methods. Since the
costumer can easily use his/her standard mobile phone to pay for a wide range of services and
purchases. Widely,the use of mobile payment becomes prevalent since 2008. Therefore, this study
proposes a new payment method for store shopping by using standard mobile phone. This study is
actually focused on the secure mobile payment, since the proposed method is basically based on
public key cryptosystem.
2. RELATED WORKS
Recently, electronic payment has been widely applied in most shopping center and sites.
However, there are several successfulavailable models for mobile payments, among them:
3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
83
Premium SMS based transactional payments, Direct Mobile Billing, Mobile web payments
(WAP), Contactless NFC (Near Field Communication), and Direct carrier/bank co-
operation.These mobile payment solutions have been implemented by Financial
institutions and credit card companies[2] as well as Internet companies [3] and a number of
mobile communication companies, and major telecommunications infrastructure [4][5].
2.1 SMS/USSD-based transactional payments
In this model (refer to Figure 1), consumers request a premium charge to be applied to their phone
bill or their online wallet by sending a payment request via an SMS text message or an USSD to
a short code. Consequently, the involved merchantis informed of the payment success and can
then release the paid for goods.Since these goods are most frequently digital, the merchant
replying using a Multimedia Messaging Service (MMS) to deliver the purchased music,
ringtones, wallpapers, etc. Another form of deliver using MMS is the barcode,which can be used
as an electronic ticket for access to cinemas and events or to collect hard goods. These barcodes
can then be scanned for confirmation of payment by a merchant. However, poor reliability, slow
speed, security, and high cost are weaknesses encountered using SMS/USSD payment method
[2, 6].
Figure 1: Mobile Channel Series: USSD[7]
2.2Direct mobile billing
This model is used with e-commerce sites, in which the consumer uses the mobile billing option
during checkout to make a payment. The payment needs a two-factor authentication that includes
a PIN and One-Time-Password (OTP), to charge the consumer's mobile account. This type of
mobile payment is an alternative payment method that avoid banks involvement, since it does not
require the use of credit/debit cards or pre-registration at an online payment solution [8].
2.3Mobile web payments (WAP)
This payment model uses WAP (Wireless Application Protocol) as an underlying technology. To
make a payment, the consumer uses web pages or applications downloaded and installed on the
mobile phone.However, the mobile account should be directly charged through a mobile network
operator. Otherwise, the use of a credit/debit card or pre-registration at online payment solution
still required [9].
4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
84
2.4Near Field Communication (NFC)
NFC model (refer to Figure 2) is a payment method used in physical stores or transportation
services. In this payment method, the consumer use a special mobile phone equipped with a
smartcard. Furthermore, the consumer mobile is wavedif he/she stays close to the reader module.
Some transactions require authentication using PIN, before transaction is completed. The
payment could be deducted from a pre-paid account or charged to a mobile or bank account
directly.However, the drawback of NFC mobile payment method is the lack of supporting
infrastructure, complex ecosystem of stakeholders, and standards [10].
Figure 2: Near Field Communication [11]
2.5 Direct carrier/bank co-operation
This model is also known as direct operator billing, mobile content billing, WAP billing, and
carrier billing. It is a mechanism of buying content from WAP Wireless Application
Protocol sites that is charged directly to consumer's mobile phone bill. This payment method
should be integrated with another party called operator.In this payment model, the consumer can
purchase goods, transfer money, cash-out, and cash-in. The front end interface to the consumers is
the mobile phone and the phone carrier. A special code can be entered on the mobile phone to
open a 'mini wallet' account, by depositing money at a participating local merchant and the
mobile phone number. Similarly, other transactions can be accomplished by entering special
codes and the phone number of the other party on the consumer's mobile phone.Moreover,
consumers can buy mobile content without registering for a service or entering a username or
password. Consumers can download content by clicking on a link and agrees to make a
purchase[12, 13].
3. THE PROPOSED METHOD
Generally, the proposed method describes three processes for mobile payment system (refer to
Figures 1-3). Whereby, the proposed method is based on the integer factorization problem for
RSA public-key cryptosystem [14, 15]. Meanwhile, RSA cryptosystem is typically divided into
three sub-algorithms; key generation, encryption, and decryption algorithms. However, the
proposed methodprocesses are: the authentication process, the member recognition process, and
payment process.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
85
3.1 Authentication (Getting Service) Process
This process is the first step in the proposed mobile payment system that prepares the customer to
be able to use the mobile for payment. In this phase, the Bank, the Visa Center, and the Mobile
Center plays the main role, whereby confirmation can be given to the customer. As illustrated in
Figure 3 Step 1, the customer should request the mobile payment service from the bank. Once the
customerrequested the service from the bank,the following steps should have been done by the
bank. As shown in Figure 3 Steps2 and 3, the bank should contact the visa center depending on
the customer’s request to give authorization for the mobile. Following these two steps, the bank
should notify the mobile center that the service is authorized by sending the customer information
as shown in Figure 3 Step 4. The mobile center, in turn, confirms this process by sending a
message to the customeras shown in Figure 3 Step 5. Figure 3 step 6 shows that the customer gets
the service by receiving the PIN from the bank. Once the customer gets the PIN, the bank will
generate a computed RSA public-key and private-key (refer to Figure 3 step 7) and then pass the
public-key to the market (refer to Figure 3 step 7). After that the market will generate a computed
RSA public-key and private-key (refer to Figure 3 step 9) and then pass the public-key to the
bank (refer to Figure 3 step 10). Finally, the customer can go to the market and use the mobile for
payment.
Figure 3: Authentication process
3.2 Member Recognition Process
This processis clarified in Figure 4 from the beginning to the end. When the customer enters the
market (Figure 4 Step 1), the market server should test the customer membership as illustrated in
6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
86
Figure 4 Steps 2 and 3. If the customer was a member, then a welcome message from the market
server will be sent to the customer (Figure 4 Step 4). Otherwise, thecustomer will be ignored
(Figure 4 Step 5).
Figure 4: Member Recognition Process
3.3 Payment Process
The third process in the proposed system is the payment process. This step involves payment
phase and payment confirmation phase.
3.3.1Payment Phase
The payment phase starts when the customer, who is a member in mobile payment service,
reaches the cashier, where the member is given the choice to pay via cash, visa or mobile (Figure
5 Step 1). If the member chooses the mobile payment, the following steps will be implemented
securely. First, the market server should ensure the customer membership as illustrated in Figure
5 Steps 2. If the customer was a member, then a number of steps will take place. The market
server should contact the visa center to guarantee that the payment amount is available (Figure 5
step 3). Therefore, the RSA encryption algorithm is implemented to encrypt the customer
information using the bank public-key (Bpu)and sendthese information as a ciphertext (encrypted
text) to the visa center. When the visa center receives the encrypted text, the RSA algorithm is
implemented to decrypt it using the bank private-key (Bpr)andtests for valid amount as shown in
Figure 5 step 4. If the amount is valid or not, then the visa center will send the result (valid or not
valid) to the mobile company as illustrated in Figure 5 step 5. After that, the mobile company
sends a message to the member for payment confirmation and the member should respond to the
message with the PIN (Figure 5 steps 6 and 7). In Figure 5 step 8 shows the deduction of the
amount from mobile company to the visa center.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
87
Figure 5: Payment Phase
3.3.2 Payment confirmation phase
This phase follows the payment phase to confirm the payment process as shown in Figure 6. The
phase begins by sending a report for the payment process from visa center to the market server as
illustrated in Figure 6Step 1. This report is encrypted by implementing the RSA algorithm using
the market public-key (Mpu). The market server receives the encrypted report and decrypts it by
applying the RSA algorithm using the market private-key (Mpr) as shown in Figure 6Step 2.
Meanwhile, the visa center sends an operation success notification to the mobile company (Figure
6 Step 3). Finally, the mobile company sends an operation success (authentication) message to
the member (Figure 6 Step 4).
Figure 6: Payment Confirmation Phase
8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
88
4.PERFORMANCE EVALUATION BASED ON KEY SIZES FOR RSA PUBLIC-
KEY PROTOCOL
As mentioned earlier, the proposed method is actually based on the public-key RSA
cryptosystem, since the encryption and decryption processes are being performed over the
insecure network to apply the confidentiality cryptographic service on the user information (refer
to Figure 6). Therefore, we have compared the performance of the three sub-algorithms for RSA
public-key protocol. Table1 shows the performance for RSA key generation, RSA encryption,
RSA decryption algorithms. These protocols were coded in TurboC with GMP library, and run on
a computer with Intel CORE i7 processor. We also used Miller-Rabin algorithm [15, 16] for
theprimality test which was coded using C and GMP as well.The implementation for RSA
protocolshows that RSA performs high level of security at a much lowcost, this is in terms of key
size and execution time (refer to Figures 7, 8, 9, and 10).
Table 1: Performance evaluation for public-key RSA protocols
Description
RSA
Key Size
Time
(Millisecond)
Key generation
512 - bits
290
Encryption 3
Decryption 5
Key generation 516
Encryption 14
Decryption 1024-bits 128
Key generation
2048 – bits
1697
Encryption 16
Decryption 315
Key generation
3072 - bits
3490
Encryption 29
Decryption 4800
Key generation
7680-bits
5232
Encryption 39
Decryption 7731
Key generation
15360-bits
18221
Encryption 150
Decryption 54193
9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
89
Figure 7: RSA keys generation time.
Figure 8: RSA encryption time.
0
10000
20000
512 bit
1024 bit
2048
3072 bit
7680 bit
15360 bit
Millisecond
RSA Keys Generation
0
50
100
150
512 bit 1024 bit 2048 3072 bit 7680 bit 15360 bit
Millisecond
RSA Encryption
0
20000
40000
60000
512 bit 1024 bit 2048 3072 bit 7680 bit 15360
bit
Millisecond
RSA Decryption
10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
90
Figure 9: RSA decryption time.
Figure 10: Overall time for RSA public-key algorithm time
5.CONCLUSIONS
Thispaper shows the possibility of establishing mobile payment based on public-key encryption
cryptosystem. The security of the proposed mobile payment depends on RSA public key
encryption protocol. As the discussion, the proposed method is more efficient than the others
methods. It allows the customer to pay from his/her own personal mobile without any extra cost
and effort. As new technology for mobile payment method, this method is proposed to replace the
unreliable previous paymentmethods, since customers feel justifiably confident that their payment
will be accurate. As well as, the proposed method needs only the basic requirements such as;
mobile phone, mobile center, market server, and visa center.
6.ACKNOWLEDGMENT
The authors would like to thank Al-Zaytoonah University of Jordan for supporting this study.
0
20000
40000
60000
80000
512 bit 1024 bit 2048 3072 bit 7680 bit 15360
bit
Millisecond
Overall Time: RSA
11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
91
REFERENCES
[1] M. J. Arnold, K. E. Reynolds, N. Ponderc, and J. E. Lueg. “Customer delight in a retail context:
investigating delightful and terrible shopping experiences”. Journal of Business Research, 58 (8):
1132–1145. doi:10.1016/j.jbusres.2004.01.006, 2012.
[2] S. Karnouskos, and F. Fokus. “Mobile Payment: A Journey Through Existing Procedures And
Standardization Initiatives”, IEEE Communications Surveys & Tutorials, Vol. 6, No. 4, Pp. 44–66,
2004.
[3] Y.A. Au, and R.J. Kauffman. “The economics of mobile payments: Understanding stakeholder issues
for an emerging financial technology application”. Electronic Commerce Research and Applications,
doi:10.1016/j.elerap.2006.12.004, 2007.
[4] E. Hardcastle. “Ericsson launches mobile phone banking services”. Thomson Reuters, 2012.
[5] Ericsson Money. “Ericsson Money Services brings connected mobile money to Europe”.
Ericsson.com.2014.
[6] S. Bhawan, and J. L. Nehru Marg. “USSD-based Mobile Banking Services for Financial Inclusion”.
Telecom Regulatory Authority of India. 2013
[7] G. kamonzo. “Mobile Money Exchange”, WordPress.com. The Pilcrow Theme, 2011.
[8] Y.-Y. Chen, J.-K.Jan, and C.-L. Chen. “A fair and secure mobile billing system.Computer Networks”,
48(4), pp.517-524, 2005.
[9] Ericsson, “Western Union partner to push mobile financial services". Mobile Payments Today, 2013.
[10] Payment Systems, “VDC: NFC Adoption Will Be Slower Than Expected”. RFID Journal. 2008.
[11] D. Murph. “Wave-and-Pay System Headed to Canada”. Engadget, 2007.
[12] L. Chaix, and D.Torre. “Four models for mobile payments”. University Nice Sophia-Antipolis, JEL
Classification: E42, O33, 2011.
[13] R. Englund, and D. Turesson. “Contactless mobile payments in Europe: Stakeholders´ perspective on
ecosystem issues and developments”. KTH Industrial Engineering and Management. SE-100 44
STOCKHOLM, DiVA, 2012.
[14] R. A. Rivest, A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-
Key Cryptosystems”.Communications of the ACM, 21(2), pp.120-126, 1978.
[15] Menezes, A., P. Van Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”. CRC Press,
pp.4-15, 516, 1996.
[16] G. L. Miller. “Riemann's Hypothesis and Tests for Primality”.Journal of Computer and System
Sciences, 13 (3), pp. 300–317, 1976.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
92
Authors
Dr. Adnan Hnaifis an Assistance professor at the computer networks department, Faculty
of Science Computer and information technology, Al Zaytoonah University of Jordan. Dr.
Hnaif received his PhD degree in networks security from University Sains Malaysia –
National Advanced IPv6 Centre and Excellence (NAV6) in 2010. He received his MSc
degree of Computer Science from department of Computer Science- Alneelain University
in 2003, and obtained his Bachelor degree of Computer Science from the department of Computer Science,
Mu’tah University in 1999/2000. His researches focus on the network security, matching algorithms and
parallel processing.
Dr. Mohammad Alia is an Associate professor at the computer information systems
department, Faculty of science Computer and information technology, Al Zaytoonah
University of Jordan. He received the B.Sc. degree in Science from the Alzaytoonah
University, Jordan, in 1999. He obtained his Ph.D. degree in Computer Science from
University Science of Malaysia, in 2008. During 2000 until 2004, he worked at Al-
Zaytoonah University of Jordan as an instructor of Computer sciences and Information Technology. Then,
he worked as a lecturer at Al-Quds University in Saudi Arabia from 2004 - 2005. Currently he is working
as a Chair of Computer Information Systems dept. at Al Zaytoonah University of Jordan. His research
interests are in the field of Cryptography, and Network security.