Volume 3 Number 1 March 2012

    
A New Method based on Finite State Machine for Detecting Misbehaving Nodes in Ad hoc Networks

Dina Sadat Jalali, Alireza Shahrbanoonezhad

https://doi.org/

Abstract In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing... Read More


A Novel Group Signature Scheme based upon DLP

Sujata Mohanty, Banshidhar Majhi

https://doi.org/

Abstract This paper presents a novel group signature scheme based on the discrete logarithm problem. In this scheme the length of the signature is independent of the number of members of the group and it supports message recovery feature. In case, some members left the group or joins the group, the group signature remains valid. All valid signatures are traceable by... Read More


A Privacy Awareness System for Facebook Users

Charles Hélou, Ala Eddine Gandouz, Esma Aïmeur

https://doi.org/

Abstract Social networking sites have experienced a steady and dramatic increase in the number of users over the past several years. Thousands of user accounts, each including a significant amount of private data, are created daily. As such, an almost countless amount of sensitive and private information is read and shared across the various accounts. This jeopardizes the privacy and safety... Read More


Hybrid Approach based Mobile Agent for Intrusion Detection System: HAMA-IDS

Boukhlouf Djemaa,Kazar Okba

https://doi.org/

Abstract Information systems are more and more opened on Internet today. This opening, a prior beneficial, nevertheless raises a major problem: it ensues from it an increasing number of attacks. The IDS was developed with the aim of detecting abnormal functioning of information systems and networks, indicating that actions not corresponding to the safety policy are led by one or several... Read More