{"title":"Wifi Pentesting Roadmap for Classic-Future Attacks and Defenses","authors":"Ramafiarisona Hajasoa Malalatiana, Rakotondramanana Radiarisainana Sitraka","doi":"10.11648/j.ajnc.20241301.14","DOIUrl":"https://doi.org/10.11648/j.ajnc.20241301.14","url":null,"abstract":"The most advanced attack on the Wireless Fidelity (WIFI) network uses social engineering. The hacker makes portal captive and forces the victim for disconnecting to internet instead of entering the real password of the WIFI. In normal actions, asking WIFI password on the web interface is not the real process, but sometimes the victim is not experience enough on security and thinks that it is a technical problem. Also, the victim didn’t have internet connection due to the hard deauthentication and the select open access, which is not his WIFI network. The future generation of WIFI could be use a secure deauthentication. So, this article proposed how the actual attack will be processed, how is the secure deauthentication and how hacker could use this same attack with more secure network. Like conclusion, solutions to resolve this problem will be proposed. New hacking arsenal for replacing the deauthentication is the smart-jamming. With the secure deauthentication, reforging the packet for telling the victim to deauthenticate to the network will not be possible anymore. The smart-jamming select the frequency of the access point of the victim and jam only this specific frequency by sending a noise. In this scenario, the same effect of the first attack is still possible. For the best security of network, two solutions will be proposed: secure deauthentication and hopping frequency. A defensive proposition about secure deauthentication will be found in this article by using cryptographic key exchange like Diffie Hellman (DH), Elliptic Curve Diffie Hellman (ECDH) and Super Isogenies Diffie Hellman (CSIDH).\u0000","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"32 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140226348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Éric Michel Deussom Djomadji, Maniba Garga, Bienvenue Arsene Roger Fouba, T. Bouétou
{"title":"Genetic Algorithm for Mode Selection in Device-to-Device (D2D) Communication for 5G Cellular Networks","authors":"Éric Michel Deussom Djomadji, Maniba Garga, Bienvenue Arsene Roger Fouba, T. Bouétou","doi":"10.11648/j.ajnc.20241301.13","DOIUrl":"https://doi.org/10.11648/j.ajnc.20241301.13","url":null,"abstract":"The widespread use of smart devices and mobile applications is leading to a massive growth of wireless data traffic. With the rapidly growing of the customers’ data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future fifth-generation (5G) wireless communication network. In a conventional cellular system, devices are not allowed to directly communicate with each other in the licensed cellular spectrum and all communications take place through the base stations (BS) and core network. Device-to-Device (D2D) communication refers to a technology that enables devices to communicate directly with each other, without sending data to the base station and the core network. This technology has the potential to improve system performance, enhance the user experience, increase spectral efficiency, reduce the terminal transmitting power, reduce the burden of the cellular network, and reduce end to end latency. In D2D communication user equipment’s (UEs) are enabled to select among different modes of communication which are defined based on the frequency resource sharing. Dedicated mode where D2D devices directly transmit by using dedicated resources. Reuse mode where D2D devices reuse some resources of the cellular network. Outband mode where D2D communication uses unlicensed spectrum (e.g. the free 2.4 GHz Industrial Scientific and Medical (ISM) band or the 38 GHz millimetre wave band) where cellular communication does not take place. Cellular mode where the D2D communication is relayed via gNode B (gNB) and it is treated as cellular users. In this work, the target was to reach the optimal mode selection policy and genetic algorithm method was used with the objective of maximizing the total fitness function. Optimal mode selection policy was presented and analysed amongst cellular, dedicated, reused and outband mode. In the present study of mode selection issues in D2D enabled networks, genetic algorithm was proposed for the case when the cellular user equipment (UE) moves in the network. Quality of service (QoS) parameters, mobility parameters and Analytic Hierarchy Process (AHP) method were used to define the mode selection algorithm. To evaluate the performance of the proposed genetic algorithm, a study of the convergence of the algorithm and the signal-to-interference plus noise ratio (SINR) was done.\u0000","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"20 95","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140260236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santanam Kasturi, Xiaolong Li, Peng Li, John Pickard
{"title":"A Proposed Approach to Integrate Application Security Vulnerability Data with Incidence Response Systems","authors":"Santanam Kasturi, Xiaolong Li, Peng Li, John Pickard","doi":"10.11648/j.ajnc.20241301.12","DOIUrl":"https://doi.org/10.11648/j.ajnc.20241301.12","url":null,"abstract":"This paper has proposed a method to develop an attack tree, from application vulnerability data discovered through tests and scans and correlation analysis using incoming transaction requests monitored by a Web Application Firewall (WAF) tool. The attack tree shows multiple pathways for an attack to shape through vulnerability linkages and a deeper analysis of the Common Weakness Enumeration (CWE) and Common Vulnerability Exposure (CVE) mapping to individual vulnerabilities. By further relating to a parent, peer, or child CWE (including CWEs that follow another CWE and in some cases precede other CWEs) will provide more insight into the attack patterns. These patterns will reveal a multi-vulnerability, multi-application attack pattern which will be hard to visualize without data consolidation and correlation analysis. The correlation analysis tied to the test and scan data supports a vulnerability lineage starting from incoming requests to individual vulnerabilities found in the code that traces a possible attack path. This solution, if automated, can provide threat alerts and immediate focus on vulnerabilities that need to be remedied as a priority. SOAR (Security Orchestration, Automation, and Response), XSOAR (Extended Security Orchestration, Automation, and Response), SIEM (Security Information and Event Management), and XDR (Extended Detection and Response) are more constructed to suit networks, infrastructure and devices, and sensors; not meant for application security vulnerability information as collected. So, this paper makes a special case that must be made for integration of application security information as part of threat intelligence, and threat and incident response systems.\u0000","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"28 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140260417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tonye Emmanuel, Deussom Djomadji Eric Michel, Ebai Oben Brolynes Agbor
{"title":"Virtualization of a 4G Evolved Packet Core Network Using Network Function Virtualization (NFV) Technology with NS3 for Enterprise and Educational Purpose","authors":"Tonye Emmanuel, Deussom Djomadji Eric Michel, Ebai Oben Brolynes Agbor","doi":"10.11648/j.ajnc.20241301.11","DOIUrl":"https://doi.org/10.11648/j.ajnc.20241301.11","url":null,"abstract":"The current networks of many operators dispose an increasing variety of purpose built, vertically integrated, and vendor-locked hardware equipment. This makes it difficult to easily scale their radio access and core networks as it requires yet another variety of equipment, leading to increased Time-to-Market and inefficient resource utilization. Furthermore, network equipment are expensive to procure and upgrade (increased CAPEX), and are difficult to adapt and program for new services (increased OPEX). These trends have recently spurred several efforts to redesign various components of mobile networks, notably the 4G Evolved Packet Core (EPC). With regards to this, the present work proposes a solution based on Network Function Virtualization (NFV), which can be deployed for educational or enterprises purpose like in Data Centers, or network nodes with a fine-grained QoS, while maintaining the scalability of the virtualized network function entities, and optimum resource utilization. The actual work develops a mobile network simulation module centered on the 4G Core network comprising its major components; MME, SGW, and PGW (vEPC), as well as the networking amongst these entities, core network related aspects such as its interaction with the Enhanced Radio Access Network (E-UTRAN) and the Packet Data Network Services (Internet). This solution gives to core network engineers and EPC network agents the possibility to design, analyze and test variable types of network scenarios. The solution can be also integrated in engineering schools and college for labs’ practical work or to any e-laboratory initiative to allow students in virtual environment to analyze signaling, modify the network configuration and better understand some theoretical concepts taught during the courses. The results obtained from the present work can be of great help during the final deployment phase of the network for full production for engineers of carriers’ network or improve the engineering understanding of core network in academic domain. In this light, the network can easily be scaled, adjust virtually for the time to commercialize a service reduced for carrier or enterprises’ solutions or for testing in e-laboratories.\u0000","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"48 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140259065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Optimized Routing OLSR Protocol with Low Control Overhead for UAV Ad Hoc Networks","authors":"Qizheng Zhu, Zhou Zhou, Jie Yang, Zeliang Fu","doi":"10.11648/J.AJNC.20211001.12","DOIUrl":"https://doi.org/10.11648/J.AJNC.20211001.12","url":null,"abstract":"OLSR (Optimized Link State Routing) protocol is a priori Routing protocol applied in MANET network. All nodes in the network have Routing information to other nodes locally and need to send a large number of control messages to maintain the topology information of the whole network. In UAV application scenarios, with the increase of node density, the control overhead will be too high and the problems of hidden terminals will be intensified. Secondly, due to the fast moving speed of UAVs, when the neighboring UAVs have moved out of the communication range of the local node, the local node still retains the routing information of the neighbor node, leading to the problem of packet loss when the link information is updated behind time. Aiming at the above problems, an OLSR protocol with low control overhead and optimal routing is proposed. The protocol uses the incremental HELLO message mechanism to ensure that only incremental information is exchanged when the network topology changes slowly, and the control overhead is greatly reduced. When calculating routing, in the range of n hops, the more stable link is selected under the same number of hops. Simulation results show that the proposed algorithm can significantly improve the success rate of packet transmission and end-to-end delay, and reduce the system control overhead.","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126321420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kashale Chimanga, Nimrod Siluyele, Shumba Langton, Edward Nkonde
{"title":"A Comparative Study of Students Performance in Object Oriented Programming (OOP) Using Java Before and During COVID-19 (A Case of Kapasa Makasa Campus)","authors":"Kashale Chimanga, Nimrod Siluyele, Shumba Langton, Edward Nkonde","doi":"10.11648/J.AJNC.20211001.11","DOIUrl":"https://doi.org/10.11648/J.AJNC.20211001.11","url":null,"abstract":"The purpose of this study was to compare the performance of students in Object Oriented Programming using Java before and during COVID-19 pandemic, to this effect a total of 66 students were selected to take part in the study and their results compared. The results revealed that the performance of students in OOP Java before COVID-19 pandemic outbreak were better than during the pandemic. The reasons for this was that, before the outbreak, the students were taught in physical class and were able to use the university facilities such as Internet and Computer laboratory for their practice. On the other hand, during the COVID-19 pandemic, students were subjected to virtual learning which proved to be a challenge to most of them, especially those in rural areas with no access to the Internet and electricity but affordability of the data bundles too. The study also established that gender had no effect on students’ performance in OOP in Java regardless of the mode conclusion provided; the study recommended that deliberate measures should be put in place to encourage online learning in order to motivate learners in embracing technology in learning, more especially during this second wave of the COVID-19 pandemic. This will ensure continuity in learning without any major changes to the learning ability. In addition, more strategic interventions and pedagogies to teach practical courses such as programming online should be derived and used for teaching and learning so that students take advantage of both modes of studies (online and face to face).","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121111042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of the Challenges and Benefits of Digital Migration in Zambia","authors":"Kashale Chimanga, P. Mumba","doi":"10.11648/J.AJNC.20200902.11","DOIUrl":"https://doi.org/10.11648/J.AJNC.20200902.11","url":null,"abstract":"Digitization is the current trend in Television broadcasting, both in Zambia and the world over. The International Telecommunication Union (ITU), set 2015 as the year for the entire broadcasting stations in the world to go digital in order to have better signal quality and increase in the capacity of broadcast transmission networks by improving spectrum efficiency. Despite these and many other advantages that come with digital migration, Zambia is yet to realize the full benefits of digital migration implementation. It’s against this background that the study was conducted to assess the challenges of digital migration process and its benefits in Zambia. The emphasis was on assessing the television digital migration implementation process; examine the challenges of switching from analogue to digital technology and its benefits. To this effect, a quantitative research design was used on a sample of 300 stakeholders who had direct influence on the process to determine their views. The data collected was analysed using Statistical Package for Social Sciences (SPSS) to categorise the challenges of the migration process and its benefits. The results established that lack of awareness by the public was a major challenge was encountered. In addition, inadequate infrastructure for digital migration coupled with inadequate funding towards the hindered the process of migration. However, the study also established that the country has benefited from migrating from analog to digital broadcasting. Notable ones include; quality of transmission, improved content delivery, and ability of the viewers to view more than one TV channel at once thereby giving them a better viewing pleasure among other benefits. In view of the challenges and benefits of the digital migration to the country, the study recommends that deliberate policies should be put in place to ensure that the infrastructure needed for the digital migration are readily available and that Government should create public awareness with regards to the importance of the digital migration process to allow for more public participation.","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Compact Bandpass Microstrip Filter of Bandwidth 1.54GHz","authors":"K. Devi, Umadevi, J. Baligar","doi":"10.11648/J.AJNC.20190802.12","DOIUrl":"https://doi.org/10.11648/J.AJNC.20190802.12","url":null,"abstract":"A new compact Bandpass Microstrip filter with very wide band is presented using Reconfigurable Bandpass Microstrip Filter, it is reconfigured and simulated to Reconfigured Compact Bandpass Microstrip (RCBM) Filter to minimize the size of the filter and to enhance its bandwidth (BW). The achieved BW is 1.54GHz with minimum amount of insertion loss of -0.5dB and compactness of 1/3rd size reduction in the filter compared to its original filter size. In this methodology- varying the spacing, length and width of transmission lines of this RCBM is done. Hence by the variation of its dimensions the size of the filter is reduced with enhanced BW. These filters are used in handheld communication systems- here the size of each component, size of overall system and incorporating more number of features to that system is the main goal in recent research of handheld communication and these are the most important parameters. For this purpose compact filters are required, hence the proposed work is to achieve the compactness of the Microstrip Bandpass Filter by reconfiguring the compact Bandpass micro strip filter and increasing their performance. The proposed RCBM Filter is successfully realised in theory and verified by full wave electromagnetic simulation and the experiment. The simulated and measured results are in excellent agreement.","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132035606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulrahman Abdulkarim, I. Muhammed, Lele Mohammed, Abbas Babayaro
{"title":"Performance Analysis of an Improved Load Balancing Algorithm in Cloud Computing","authors":"Abdulrahman Abdulkarim, I. Muhammed, Lele Mohammed, Abbas Babayaro","doi":"10.11648/J.AJNC.20190802.11","DOIUrl":"https://doi.org/10.11648/J.AJNC.20190802.11","url":null,"abstract":"Cloud computing consists of a cluster of computing resources that are delivered over a network, which is accomplished by utilizing virtualization technologies to consolidate and allocate resources suitable for various different software applications. Therefore, an efficient task scheduling in the cloud would be required to improve the performance of the cloud. In this paper, implementation of a model that seeks to improve load balancing algorithm for virtual machine load balancing was performed using simulations. A method by which average burst time was used as the time quantum for the round robin load balancing algorithm to achieve more effective time sharing. Results obtained from the simulations along with performance evaluation carried out shows response time and data center processing time achieved using the improved model is slightly minimal compared to the other algorithms. This shows more effective load balancing by achieving a better overall throughput.","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive OFDM-IM System Over Faded Shadowing Channel","authors":"Ibrahim Aboharba, Q. Rahman, R. Rao","doi":"10.11648/J.AJNC.20190801.14","DOIUrl":"https://doi.org/10.11648/J.AJNC.20190801.14","url":null,"abstract":"Spectral efficiency (SE) and energy efficiency (EE) play major roles in evaluating the quality of service (QoS) of a wireless communication system. Designing an efficient wireless communication system requires trade-off between these two parameters. Orthogonal frequency division multiplexing technique with Index Modulation (OFDM-IM) has been introduced in the literature to increase the SE compared to traditional OFDM. In this paper, an adaptive technique with OFDM-IM is introduced in an M-QAM based scheme to maintain a guaranteed level of average bit error probability (ABEP) with enhanced SE. It has been demonstrated that by adaptively varying the number of active subcarriers and modulation levels in M-QAM scheme, maximum EE can also be achieved for an acceptable ABEP. The closed-form expressions of ABEP and pairwise error probability (PEP) for OFDM-IM with M-ary QAM modulation are derived and examined over the composite Nakagami-m Gamma (NG) fading channel model using greedy detection (GD). In addition, the performance of adaptive OFDM-IM with M-QAM Modulation scheme is evaluated in terms of efficiency metrics, outage probability, and ABEP. The obtained results show that the adaptive scheme offers high potential for accomplishing significant improvement in SE and EE while maintaining acceptable ABEP even under severe channel impairment.","PeriodicalId":118404,"journal":{"name":"American Journal of Networks and Communications","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}