International Journal of Computer Networks and Communications Security

Volume 7, Issue 12, December 2018

 

 

Using A Dynamic Generated Captcha and Visual Cryptography for Multi-Layer Authentication
 

Using A Dynamic Generated Captcha and Visual Cryptography for Multi-Layer Authentication

Pages: 270-276 (7) | [Full Text] PDF (655 KB)
N Aldowighri, SA Alsuhibany
Computer Science Department, College of Computer, Qassim University, Buridah, Saudi Arabia

Abstract -
In recent years, many social and online banking sites were targeted by phishing attacks. The aim of such an attack is to fraud the user to submit his/her personal information, like credit card details, to these sites and then uses them illegally. Nowadays, many websites are relaying on multi-authentication schemes where username and passwords are only considered as a first layer to verify the user. Furthermore, many multi-layer authentication schemes, which are based on images and visualization, have been proposed including the use of visual cryptography (VC) and CAPTCHAs. In particular, a CAPTCHA image is generated during the registration phase. Then, this image is encrypted using visual cryptography approach. A share of this encrypted image is sent to the user. This share would be used later in the login process. However, using a static CAPTCHA every time would need to insure saving this share in a secure yet accessible location; so the user might not be able to use this share anytime from any location. This paper, therefore, proposes a method to increase the usability and security levels of a multi-layer authentication model using a dynamic generated CAPTCHA image for every session, and encrypting this image using VC algorithm; then retrieving the user share via a secure and accessible location using a cloud service.
 
Index Terms - Text-based CAPTCHA, Visual Cryptography, Phishing Attack, Multi-Layer Authentication, Cloud

Citation - N Aldowighri, SA Alsuhibany. "Using A Dynamic Generated Captcha and Visual Cryptography for Multi-Layer Authentication." International Journal of Computer Science and Software Engineering 7, no. 12 (2018): 270-276.

Analysis of Knowledge Evolution on Software Quality Concepts
 

Analysis of Knowledge Evolution on Software Quality Concepts

Pages: 277-283 (7) | [Full Text] PDF (258 KB)
R Rossi
Department of Computer Engineering, University of Sao Paulo, Sao Paulo, Sao Paulo, Brazil

Abstract -
The analysis of knowledge evolution of a student’s group based on Software Quality concepts is the main objective of this research. The course was prepared using appropriate instructional design model and cognitive strategies. The research respondents consisted of 28 students of a Graduate Software Engineering Program coming from different undergraduate courses. The method used for the research development is based on data collection using a structured questionnaire with questions about software quality concepts as well as software quality frameworks and management practices. The questionnaire was given to the respondents at three different times: the first one was in the first class, the second on the fourth class and the third one on the seventh class. With these data collection, a diagnostic evaluation could be done at the first time and formative evaluation was done in the next ones. These evaluations favored the understanding of knowledge acquisition and its evolution, enabling instructional adjustments towards better learning.
 
Index Terms - Cognitive Strategies, Instructional Design, Knowledge Acquisition, Software Quality

Citation - R Rossi. "Analysis of Knowledge Evolution on Software Quality Concepts." International Journal of Computer Science and Software Engineering 7, no. 12 (2018): 277-283.

SmartAuth: Multi-Factor Authentication using Smart Card and Android on Web
 

SmartAuth: Multi-Factor Authentication using Smart Card and Android on Web

Pages: 284-295 (13) | [Full Text] PDF (963 KB)
M Shahbaz, AG Abbasiy, MS Shaheenz
Department of Computer Engineering, University of Sao Paulo, Sao Paulo, Sao Paulo, Brazil

Abstract -
To protect any resource in a system from an unauthorized entity, the authentication process is basic and the first line of defense. Several authentication schemes are available for user authentication or verification to solve the issue of secure authentication mostly enforcing an extra layer of security with two-factor or multi-factor authentication. In this paper, we propose SmartAuth, a secure and usable multi-factor authentication mechanism using contactless smart-card and Android device on the web. The SmartAuth provides ownership base authentication system using Android device and contactless smart-card via NFC on the web. The SmartAuth is based on PKI and a prototype of the proposed authentication mechanism is also developed and presented in this research paper.
 
Index Terms - Smart Authentication, Multi-Factor, Smart Card, Android on Web

Citation - M Shahbaz, AG Abbasiy, MS Shaheenz. "SmartAuth: Multi-Factor Authentication using Smart Card and Android on Web." International Journal of Computer Science and Software Engineering 7, no. 12 (2018): 284-295.

Effect of Proxy Nodes on the Performance of TCP-Based Transport Layer Protocols in Wireless Sensor Networks
 

Effect of Proxy Nodes on the Performance of TCP-Based Transport Layer Protocols in Wireless Sensor Networks

Pages: 296-302 (7) | [Full Text] PDF (403 KB)
FS Tabei, B Askarian
Department of Electrical and Computer Engineering, Texas Tech University, Lubbock, TX 79409, USA

Abstract -
Wireless Sensor Networks (WSNs) have recently attracted many researchers’ attentions due to their wide range of applications. Even though a plethora of studies have been carried out on characteristics, special conditions, and various aspects of WSNs, t. ransport protocol which is compatible with conditions of WSNs has not been considerably addressed. WSNs have limitations such as storage space, energy resources, and wireless communication issues. Accordingly, widely-used transport protocols like Transmission Control Protocol (TCP) may not enjoy sufficient efficiency in such networks. In this paper, we study the characteristics of WSNs leading to design transport layer protocol for WSNs and aim at evaluating the efficiency of TCP and its dependent protocols (TCP variables), which are introduced to wireless networks. We propose to employ proxy nodes near sinks to improve the performance of transport layer. Our NS-2 simulation results indicate that throughput and packet delivery ratio are improved from 20 to 50 percent after employing proxy nodes, while the average message delay is almost increased twice.
 
Index Terms - Wireless Sensor Networks (WSN), Transport Layer Protocol, Transmission Control Protocol (TCP), TCP Variants

Citation - FS Tabei, B Askarian. "Effect of Proxy Nodes on the Performance of TCP-Based Transport Layer Protocols in Wireless Sensor Networks." International Journal of Computer Science and Software Engineering 7, no. 12 (2018): 296-302.

Review Paper: Perceived Drivers and Outcomes of the Adoption of G-cloud in the Saudi Arabian Public Sector
 

Review Paper: Perceived Drivers and Outcomes of the Adoption of G-cloud in the Saudi Arabian Public Sector

Pages: 303-308 (6) | [Full Text] PDF (218 KB)
Rayan-Alzighaibi, Ali-Quazi, Majharul-Talukder
Business, Government and Law, University of Canberra Canberra, ACT 2617, Australia

Abstract -
This review article will focus on demonstrating perceived drivers and outcomes that could be used to construct a unique framework for the adoption of G-cloud in the Saudi Arabian public sector. Despite the growing importance of cloud computing, not much academic research has been undertaken on cloud computing and its adoption especially in the context of a nations public sector.
 
Index Terms - E-government, Cloud-computing, Adoption, G-cloud, cloud-based e-government

Citation - Rayan-Alzighaibi, Ali-Quazi, Majharul-Talukder. " Review Paper: Perceived Drivers and Outcomes of the Adoption of G-cloud in the Saudi Arabian Public Sector ." International Journal of Computer Science and Software Engineering 7, no. 12 (2018): 303-308.