cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 3 Documents
Search results for , issue "Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)" : 3 Documents clear
RESEARCH TRENDS AND SOLUTIONS FOR SECURE TRAFFIC MANAGEMENT OF SDN Pandey, Ravi Shankar; Srivastava, Vivek; Yadav, Lal Babu
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network (SDN) decouples the responsibilities of route management and datatransmission of network devices present in network infrastructure. It integrates the control responsibility at thecentralized software component which is known as controller. This centralized aggregation of responsibilities mayresult the single point of failure in the case malicious attack at the controller side. These attacks may also affect thetraffic flow and network devices. The security issues due to such malicious attacks in SDN are dominating challengesin the implementation and utilization of opportunities provided by this new paradigm. In this paper we haveinvestigated the several research papers related to proposal of new research trends for security and suggestionswhich fulfil the security requirements like confidentiality, integrity, availability, authenticity, authorization,nonrepudiation, consistency, fast responsiveness and adaptation. We have also investigated the new future researchfor creating the attack free environment for implementing the SDN.
A LIGHTWEIGHT INTER-ZONAL AUTHENTICATION PROTOCOL FOR MOVING OBJECTS IN LOW POWERED RF SYSTEMS Shyamala, C. K.; Rajagopalan, Anand K.
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smartcards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in lowpowered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security representsa critical component for enabling the large scale adoption of automatic identification systems. Providing an effectivesecurity solution for low powered systems is a major area of concern; it directs research towards ?powerconsumption aware? computations in security solutions. This paper proposes a Lightweight Inter-ZonalAuthentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysisof the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks?eaves dropping, reader andtag impersonation, replay and desynchronization.
RK ALGORITHM: STOCHASTIC PARALLEL METHODOLOGY FOR SYMMETRIC KEY CRYPTOGRAPHY Ramesh, Yegireddi; Reddi, Kiran Kumar
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and lengthy. As society is moving towards digital information age we necessitate highlystandard algorithms which compute faster when data size is of wide range or scope. On survey, numerous sequentialapproaches carried out by symmetric key algorithms on 128 bits as block size are ascertained to be highly insecurable and resulting at a low speed. As in the course the commodities are immensely parallelized on multi coreprocessors to solve computational problems, in accordance with, propound parallel symmetric key based algorithmsto encrypt/decrypt large data for secure conveyance. The algorithm is aimed to prevail by considering 64 character(512 bits) plain text data, processed 16 characters separately by applying parallelism and finally combine each 16-character cipher data to form 64-character cipher text. The round function employed in the algorithm is verycomplex, on which improves efficacy.

Page 1 of 1 | Total Record : 3