Communications in Computer and Information Science 335978-3-642-34135-9/1.pdf · Gaurang Mehta...

20
Communications in Computer and Information Science 335 Editorial Board Simone Diniz Junqueira Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rio de Janeiro, Brazil Phoebe Chen La Trobe University, Melbourne, Australia Alfredo Cuzzocrea ICAR-CNR and University of Calabria, Italy Xiaoyong Du Renmin University of China, Beijing, China Joaquim Filipe Polytechnic Institute of Setúbal, Portugal Orhun Kara TÜB ˙ ITAK B ˙ ILGEM and Middle East Technical University, Turkey Tai-hoon Kim Konkuk University, Chung-ju, Chungbuk, Korea Igor Kotenko St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, Russia Dominik ´ Sle˛zak University of Warsaw and Infobright, Poland Xiaokang Yang Shanghai Jiao Tong University, China

Transcript of Communications in Computer and Information Science 335978-3-642-34135-9/1.pdf · Gaurang Mehta...

Communicationsin Computer and Information Science 335

Editorial Board

Simone Diniz Junqueira BarbosaPontifical Catholic University of Rio de Janeiro (PUC-Rio),Rio de Janeiro, Brazil

Phoebe ChenLa Trobe University, Melbourne, Australia

Alfredo CuzzocreaICAR-CNR and University of Calabria, Italy

Xiaoyong DuRenmin University of China, Beijing, China

Joaquim FilipePolytechnic Institute of Setúbal, Portugal

Orhun KaraTÜBITAK BILGEM and Middle East Technical University, Turkey

Tai-hoon KimKonkuk University, Chung-ju, Chungbuk, Korea

Igor KotenkoSt. Petersburg Institute for Informatics and Automationof the Russian Academy of Sciences, Russia

Dominik SlezakUniversity of Warsaw and Infobright, Poland

Xiaokang YangShanghai Jiao Tong University, China

Sabu M. Thampi Albert Y. ZomayaThorsten Strufe Jose M. Alcaraz CaleroTony Thomas (Eds.)

Recent Trends inComputer Networksand Distributed Systems Security

International Conference, SNDS 2012Trivandrum, India, October 11-12, 2012Proceedings

13

Volume Editors

Sabu M. ThampiTony ThomasIndian Institute of Information Technology and ManagementTechnopark Campus, Trivandrum, 695581, Kerala, IndiaE-mail: [email protected]; [email protected]

Albert Y. ZomayaThe University of Sydney, School of Information TechnologiesBuilding J12, Sydney, NSW 2006, AustraliaE-mail: [email protected]

Thorsten StrufeTU Darmstadt - FB 20, FG Peer-to-Peer-NetzwerkeHochschulstr. 10, 64289 Darmstadt, GermanyE-mail: [email protected]

Jose M. Alcaraz CaleroHewlett-Packard LaboratoriesStoke Gifford, BS34 8QZ, Bristol, UKE-mail: [email protected]

ISSN 1865-0929 e-ISSN 1865-0937ISBN 978-3-642-34134-2 e-ISBN 978-3-642-34135-9DOI 10.1007/978-3-642-34135-9Springer Heidelberg Dordrecht London New York

Library of Congress Control Number: 2012948545

CR Subject Classification (1998): C.2.0, E.3, C.2.4, K.6.5, E.4, F.2.1

© Springer-Verlag Berlin Heidelberg 2012This work is subject to copyright. All rights are reserved, whether the whole or part of the material isconcerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publicationor parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,in its current version, and permission for use must always be obtained from Springer. Violations are liableto prosecution under the German Copyright Law.The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply,even in the absence of a specific statement, that such names are exempt from the relevant protective lawsand regulations and therefore free for general use.

Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India

Printed on acid-free paper

Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Networking and distributed systems provide the infrastructure for computation,communication, and storage linking of heterogeneous and possibly a great num-ber of people, hardware devices, and software processes. Security has becomemore complicated with the expanded use and networking of personal computers.Nowadays, distributed systems are very popular and extensively used throughoutthe world. With the widespread adoption of distributed systems, there are sev-eral security issues that can hurt the enterprises and user communities greatly.To provide tolerable protection for these systems, the security technologies mustrespond to more and more multifaceted issues and malicious behaviors. However,finding effective ways to guard these systems is challenging even with state-of-the-art technology and trained professionals.

The International Conference on Security in Computer Networks and Dis-tributed Systems (SNDS) aims to provide the most relevant opportunity to bringtogether students, researchers, and practitioners from both academia and indus-try to present their research results and development activities in the field ofsecurity in computer networks and distributed systems. SNDS 2012 was techni-cally co-sponsored by the IEEE Kerala Section and Computer Society of India.The conference was held in October 2012 at the Indian Institute of InformationTechnology and Management-Kerala (IIITM-K), Trivandrum, India.

There were 112 paper submissions to SNDS 2012 from 17 countries. Fromthese submissions, 34 papers were selected by the Program Committee for oralpresentations and eight papers for poster presentations. All papers were rigor-ously and independently peer-reviewed by the TPC members and reviewers. Theauthors of accepted papers made a considerable effort to take into account thecomments in the version submitted to these proceedings. In addition to the maintrack of presentations of accepted papers, two workshops were also hosted.

The final technical program of SNDS 2012 was the result of the dedicationand hard work of numerous people. We would like to extend our sincere thanks toall the authors who submitted their work, the conference Chairs/Co-chairs, TPCmembers, and additional reviewers, who greatly contributed to the success of theSNDS 2012 paper-review process under a tight schedule. Our deepest thanks tothe Steering Committee members for their timely help and supervision. Our mostsincere thanks go to all keynote speakers who shared with us their expertise andknowledge.

We greatly thank the Organizing Committee members for taking care of theregistration, logistics, and local arrangements. It is due to their hard work thatthe conference was made possible. We are truly grateful to the co-sponsoringsocieties including the IEEE and Computer Society of India. We would also liketo express our sincere thanks to all those who contributed to the success of SNDS2012 but whose names cannot be listed.

VI Preface

Last, but surely not the least, we express our sincere thanks to Alfred Hof-mann of Springer for his excellent support in publishing these proceedings ontime.

October 2012 Sabu M. ThampiAlbert Y. Zomaya

Thorsten StrufeJose M. Alcaraz Calero

Tony Thomas

Organization

Honorary Chair

Albert Y. Zomaya The University of Sydney, Australia

Steering Committee

Bharat Bhargava Purdue University, USA (Chair)Bharat Jayaraman University at Buffalo, The State University

of New York, USAAjith Abraham MIR Labs, USAM. Ponnavaikko (Executive Vice Chair, IEEE India Council),

SRM University, IndiaSatish Babu (President-Computer Society of India),

ICFOSS, IndiaDeepak Garg (Chair, IEEE Computer Society Chapter,

IEEE India Council), Thapar University,India

John F. Buford Avaya Labs Research, USAAxel Sikora University of Applied Sciences Offenburg,

GermanySubir Biswas Michigan State University, USAK. Chandra Sekaran National Institute of Technology Karnataka,

IndiaEl-Sayed El-Alfy King Fahd University of Petroleum and

Minerals, Saudi ArabiaJaime Lloret Mauri Polytechnic University of Valencia, SpainZhili Sun University of Surrey, UKXavier Fernando Ryerson University, CanadaMohan S. Kankanhalli National University of Singapore, SingaporeLisimachos Kondi University of Ioannina, GreeceSabu Emmanuel Nanyang Technological University, SingaporeMichele Pagano University of Pisa, ItalyDebabrata Das International Institute of Information

Technology, Bangalore (IIIT-B), IndiaBinod Vaidya University of Ottawa, CanadaSiani Pearson HP Labs, UKPradeep Atrey University of Winnipeg, CanadaPascal Lorenz University of Haute Alsace, France

VIII Organization

General Chairs

Shambhu Upadhyaya University at Buffalo, The State Universityof New York, USA

Sudip Misra Indian Institute of Technology, Kharagpur,India

Jiankun Hu University of New South Wales, Australia

Conference Chair

Sabu M. Thampi Indian Institute of Information Technologyand Management - Kerala, India

Program Chairs

Thorsten Strufe Darmstadt University of Technology, GermanyJose M. Alcaraz Calero Cloud and Security Lab, Hewlett-Packard

Laboratories, UKRaj Sharman University at Buffalo, USA

Workshop and Special Session Chairs

Tony Thomas Indian Institute of Information Technologyand Management - Kerala, India

Wael M. El-Medany University of Bahrain, Bahrain

Tutorial Chairs

Dilip Krishnaswamy Qualcomm Research Center, San Diego CA,USA

Punam Bedi University of Delhi, India

Poster/Demo Chair

Ryan Ko Cloud and Security Lab, Hewlett-PackardLaboratories, Singapore

Technical Program Committee

Ahmed Serhrouchni ENST, FranceAlbena Mihovska University of Aalborg, DenmarkAlexis Olivereau CEA LIST, FranceAlf Zugenmaier Munich University of Applied Sciences,

Germany

Organization IX

Al-Sakib Khan Pathan International Islamic University Malaysia(IIUM), Malaysia

Amit Sachan Institute for Infocomm Research, SingaporeAndrea Forte AT&T, USAAnitha Varghese ABB Research, Bangalore, IndiaAntonio Pescape University of Napoli Federico II, ItalyAntonio Ruiz-Martinez University of Murcia, SpainArjan Durresi Indiana University Purdue University

Indianapolis, USAAshok Das IIIT Hyderabad, IndiaBernd Becker University of Freiburg, GermanyBheemarjuna Reddy Tamma IIT Hyderabad, IndiaBogdan Carbunar Florida International University, USABruhadeshwar Bezawada International Institute of Information

Technology, IndiaBruno Crispo Universita di Trento, ItalyCarole Bassil Lebanese University, LebanonCheng-Kang Chu Institute for Infocomm Research, SingaporeChing-Mu Chen Chung Chou Institute of Technology, TaiwanDebojyoti Bhattacharya ABB, IndiaDebu Nayak Huawei, IndiaDi Jin General Motors, USAEdward Dawson Queensland University of Technology, AustraliaEfthimia Aivaloglou University of the Aegean, GreeceEric Renault TELECOM & Management SudParis, FranceFangguo Zhang Sun Yat-sen University, P.R. ChinaG. Santhosh Kumar Cochin University of Science and Technology,

IndiaGaurang Mehta USC/ISI, USAGeong-Sen Poh MIMOS, MalaysiaGeyong Min University of Bradford, UKGhassan Karame NEC Laboratories Europe, GermanyGiannis Marias Athens University of Economics and Business,

GreeceGina Kounga EADS Innovation Works, UKHamid Sharif University of Nebraska-Lincoln, USAHao Yang Nokia Research Center, USAHelmut Essen Maxonic GmbH, GermanyHsiao-Ying Lin National Chiao Tung University, TaiwanIgor Bisio University of Genoa, ItalyJaydip Sen Innovation lab, Tata Consultancy Services Ltd.,

IndiaJeffrey Voas NIST, USA

X Organization

Jiangtao Li Intel, USAJianhong Zhang North China University of Technology,

P.R. ChinaJiannong Cao Hong Kong Polytechnic University, Hong KongJie Li University of Tsukuba, JapanJoni Da Silva Fraga UFSC, BrazilJordi Forne Technical University of Catalonia, SpainJorge Sai Silva University of Coimbra, PortugalJu Wang Virginia State University, USAJun Bi Tsinghua University, P.R. ChinaKarima Boudaoud University of Nice Sophia Antipolis, FranceKarthik Srinivasan Infosys Limited, IndiaKaustubh Sinkar Applied Communication Sciences, USAKhushboo Shah Altusystems Corp, USAKishore Kothapalli International Institute of Information

Technology, IndiaKnarig Arabshian Alcatel-Lucent Bell Labs, USAKoji Nuida National Institute of Advanced Industrial

Science and Technology, JapanKouichi Sakurai Kyushu University, JapanKyriakos Manousakis Telcordia Technologies, USALau Lung UFSC, BrazilLeela Rengaraj National Institute of Technology

Tiruchirappalli India, IndiaLei Shu Osaka University, JapanLisimachos Kondi University of Ioannina, GreeceLuigi Lo Iacono Cologne University of Applied Science,

GermanyMahesh Tripunitara University of Waterloo, CanadaManimaran Govindarasu Iowa State University, USAManu Malek Stevens Institute of Technology, USAMaode Ma Nanyang Technological University, SingaporeMarco Roccetti University of Bologna, ItalyMarcus Wong Huawei Technologies, USAMarius Marcu Politehnica University of Timisoara, RomaniaMarkus Ullmann Federal Office for Information Security,

GermanyMatthias Wahlisch Freie Universitat Berlin, GermanyMichele Pagano University of Pisa, ItalyMini Ulanat Cochin University, IndiaMohamed Hamdi Carthage University, TunisiaMostafa El-Said Grand Valley State University, USANidhal Bouaynaya University of Arkansas at Little Rock, USANing Zhang University of Manchester, UKOliver Friedrich T-Systems, Germany

Organization XI

Peng Zhang Northwestern Polytechnical University, IndiaPeriklis Chatzimisios Alexander TEI of Thessaloniki, GreecePing Yang Binghamton University, USAPritam Shah DSI Bangalore, IndiaRafa Marin Lopez University of Murcia, SpainRajarathnam Nallusamy Infosys Limited, IndiaRamasubramanian Natarajan National Institute of Technology, Trichy, IndiaRamesh Hansdah Indian Institute of Science, Bangalore, IndiaRongxing Lu University of Waterloo, CanadaRuidong Li National Institute of Information and

Communications Technology (NICT), JapanSabrina Sicari University of Insubria, ItalySachin Agrawal Samsung, IndiaSamir Saklikar RSA, Security Division of EMC, IndiaSanthi Thilagam P. National Institute of Technology Karnataka,

Surathkal, IndiaSara Foresti Universita degli Studi di Milano, ItalySaurabh Mukherjee Banasthali University, IndiaSattar Sadkhan University of Babylon, IraqSherif Rashad Morehead State University, USAShrisha Rao International Institute of Information

Technology, Bangalore, IndiaShu-Ching Chen Florida International University, USASjouke Mauw University of Luxembourg, LuxemburgSkanda Muthaiah Hewlett Packard India Software Operations,

IndiaStefanos Gritzalis University of the Aegean, GreeceStephen Groat Virginia Tech, USASudha Sadhasivam PSG COllege of Technology, IndiaSudhanshu Joshi Doon University, IndiaSudhir Aggarwal Florida State University, USASuzanne McIntosh IBM T.J. Watson Research Center, USATheodore Stergiou Intracom Telecom, GreeceThomas Chen Swansea University, UKThomas Little Boston University, USATim Strayer BBN Technologies, USAVaclav Snasel VSB-Technical University of Ostrava, FEECS,

Czech RepublicVasileios Karyotis National Technical University of Athens,

GreeceVikas Saxena Jaypee Institute of Information Technology,

IndiaWinnie Cheng IBM Research, USAXiangjian He University of Technology, Sydney, Australia

XII Organization

Xinyi Huang Institute for Infocomm Research (I2R),Singapore

Yassine Lakhnech Joseph Fourier University, FranceYe Zhu Cleveland State University, USAYoung-Long Chen National Taichung University of Science

and Technology, TaiwanYu Chen State University of New York - Binghamton,

USAYuan-Cheng Lai Information Management, NTUST, TaiwanYung-Fa Huang ChaoYang University of Technology, TaiwanYves Roudier EURECOM, FranceZhenfu Cao Shanghai Jiao Tong University, P.R. ChinaZhili Sun University of Surrey, UKZouheir Trabelsi UAE University, UAE

Additional Reviewers

Adetunji Adebiyi University of East London, UKAjay Jangra KUK University, Kurukshetra, Haryana, IndiaAmine Abidi ENSI National School of Computer Science,

TunisiaAmita Sharma I.I.S. University, IndiaAngelina Geetha B.S. Abdur Rahman University, IndiaAnitha Pillai HITS, IndiaAravind Ashok Amrita Vishwa Vidyapeetham, IndiaBaljeet Kaur Bharati Vidyapeeth Deemed University, IndiaBhagyalekshmy N. Thampi Xlim, FranceBharat Amberker National Institute of Technology, Warangal,

IndiaBhawna Singla NCCE, IndiaDaphne Lopez VIT University, IndiaDeepak Choudhary LPU, IndiaDheerendra Mishra Indian Institute of Technology, Kharagpur,

IndiaEd Wilson Ferreira Federal Institute of Mato Grosso, BrazilEnrico Cambiaso IEIIT, ItalyEsshan Gupta University of Petroleum and Energy Studies,

IndiaGianluca Papaleo IEIIT, ItalyGopal Patra CSIR Centre for Mathematical Modelling and

Computer Simulation, IndiaGuillaume Bouffard Xlim, FranceHaythem Zorkta University of Aleppo, SyriaJerzy Konorski Gdansk University of Technology, PolandKomal Balasubramanian

Priya Iyer Sathyabama University, India

Organization XIII

Krishen Kandwal Tata Consultancy Services, IndiaKunwar Singh NIT Trichy, IndiaLalit Kumar NIT Hamirpur, IndiaMadhumita Chatterjee IIT Bombay, IndiaManjunath Mattam International Institute of Information

Technology, IndiaMaurizio Aiello National Research Council, ItalyMohammad Rasmi Universiti Sains Malaysia (USM), MalaysiaMonika Darji Gujarat Technological University, IndiaNandan S. University of Kerala, IndiaNilanjan Dey West Bengal University of Technology, IndiaNitin Goel Decimal Technologies Pvt. Ltd., IndiaOdelu Vanga Rajiv Gandhi University of Knowledge

Technologies, Hyderabad, IndiaPraneet Saurabh Technocrats Institute of Technology, IndiaPrashant Mishra National Institute of Technology Trichy, IndiaPrashant Singh SRM University, IndiaRam Raw Ambedkar Institute of Advanced

Communication Technologies and Research,India

Ramalingam Anitha PSG College of Technology, IndiaRizwan Ahmed G.H. Raisoni College of Engineering, Nagpur,

IndiaS. Santhanalakshmi Amrita School of Engineering, IndiaSachin Mehta Infosys Limited, IndiaSankararaman Viginesh Anna University, IndiaSaurabh Mukherjee Banasthali University, IndiaSeema Khanna National Informatics Center, IndiaSiddharth Sahu BITS Pilani K.K. Birla Goa Campus, IndiaSomanath Tripathy IIT Patna, IndiaSomayaji Siva Rama Krishnan VIT University, IndiaSuchitra Balasubramanyam Infosys Limited, IndiaTaraka Nishitha JNTU, IndiaTataram Adapa National Institute of Technology, Surathkal,

IndiaTejaswi Agarwal Vellore Institute of Technology-Chennai, IndiaThilagavathi Manoharan VIT University, IndiaTiana Razafindralambo Universite de Limoges, FranceV. Shanthi St. Joseph College of Engineering, IndiaVarghese Paul CUSAT, IndiaVeerasamy Senthil Thiagarajar School of Management, IndiaVijayaraghavan Varadharajan Infosys Limited, IndiaYatendra Sharma Banasthali University, IndiaZbigniew Kotulski Warsaw University of Technology, Poland

XIV Organization

International Workshop on Security in Self-OrganizingNetworks (SelfNet 2012)

Sabu M. Thampi IIITM-K, India (Chair)Abdelouahid Derhab CERIST, AlgeriaAdel. Ali University Technology Malaysia, MalaysiaBing Zhang National Institute of Information and

Communications Technology, JapanC-F Cheng National Chiao Tung University, TaiwanChun-Chuan Yang National Chi-Nan University, TaiwanGeorge Karagiannidis Aristotle University of Thessaloniki, GreeceGiannis Marias Athens University of Economics and Business,

GreeceGiuseppe Ruggeri University “Mediterranea” of Reggio Calabria,

ItalyHoucem Gazzah University of Sharjah, UAEIbrahim Korpeoglu Bilkent University, TurkeyJunichi Suzuki University of Massachusetts, Boston, USAKamran Arshad University of Greenwich, UKKyoung-Don Kang State University of New York, Binghamton,

USALiza A. Latiff University Technology Malaysia, MalaysiaMaytham Safar Kuwait University, KuwaitMichael Lauer Vanille-Media, GermanyMohamed El-Tarhuni American University of Sharjah, UAEMohammad Banat Jordan University of Science and Technology,

JordanNakjung Choi Bell-Labs, Alcatel-Lucent, KoreaPeriklis Chatzimisios Alexander TEI of Thessaloniki, GreeceRuay-Shiung Chang National Dong Hwa University, TaiwanSameer Tilak University of California at San Diego, USASghaier Guizani Alfaisal University, Saudi ArabiaYurong Xu Dartmouth College, USAZhenzhen Ye IBM, USA

International Workshop on Intelligence and SecurityInformatics for International Security (IIS 2012)

Adam Stewart Cumming DSTL, UKBernd Becker University of Freiburg, GermanyFabio Massacci University of Trento, ItalyJiannong Cao Hong Kong Polytechnic University, Hong KongJie Li University of Tsukuba, JapanJu Wang Virginia State University, USAKarsten Heidrich Deutsche Bank AG, GermanyThomas Chen Swansea University, UK

Organization XV

Organizing Committee (IIITM-K)

Chief Patron

S. Gopalakrishnan Executive Co-chair, Board of Directors-IIITM-Kand Chair, Executive Council,Infosys Technologies, India

Patron

Elizabeth Sherly Director, IIITM-K

Advisory Committee

Abdul Rahiman, AICTEAlex Pappachen James, IIITM-KJoseph Suresh Paul, IIITM-KK. Pradeep Kumar, IIITM-KMeraj Uddin, IIITM-KR. Ajith Kumar, IIITM-K

R. Jaishanker, IIITM-KRajasree M.S., College of Engineering,

TrivandrumT. Radhakrishnan, IIITM-KT.K. Manoj Kumar, IIITM-KVinod Chandra S.S., Kerala University

Finance Chair

P.C. Daviz, IIITM-K

Web Chair

David Mathews, IIITM-K

XVI Organization

Table of Contents

Regular Papers

A Novel Key Management Mechanism for Dynamic Hierarchical AccessControl Based on Linear Polynomials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami

Publicly Auditable Provable Data Possession Scheme for OutsourcedData in the Public Cloud Using Polynomial Interpolation . . . . . . . . . . . . . 11

B.R. Purushothama and B.B. Amberker

Performance Evaluation of the Fuzzy ARTMAP for Network IntrusionDetection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Nelcileno Araujo, Ruy de Oliveira, Ed’ Wilson Tavares Ferreira,Valtemir Nascimento, Ailton Shinoda Akira, and Bharat Bhargava

ID-Based Threshold Signcryption and Group Unsigncryption . . . . . . . . . . 35Prashant Kumar Mishra, Kunwar Singh, and Sudhanshu Baruntar

Protocol for Secure Submissions into Learning Management Systems . . . 45Manjunath Mattam

Secure Leader Election Algorithm Optimized for Power SavingUsing Mobile Agents for Intrusion Detection in MANET . . . . . . . . . . . . . . 54

Monika Darji and Bhushan Trivedi

WAKE: Authentication and Key Establishment for Wireless MeshNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Somanath Tripathy and Debasish Sahoo

Effective Implementation of DES Algorithm for Voice Scrambling . . . . . . 75Jinu Elizabeth John, A.S. Remya Ajai, andPrabaharan Poornachandran

Towards Constructing a Trustworthy Internet: Privacy-Aware Transferof Digital Identity Document in Content Centric Internetworking . . . . . . 85

Amine Abidi, Ghazi Ben Ayed, and Farouk Kamoun

Security Analysis of CAPTCHA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Anjali Avinash Chandavale and A. Sapkal

Imperceptible Image Indexing Using Digital Watermarking . . . . . . . . . . . . 110Jobin Abraham and Varghese Paul

XVIII Table of Contents

A New Deterministic Algorithm for Testing Primality Based on a NewProperty of Prime Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

Srikumar Manghat

Multilingual Speaker Identification with the Constraint of LimitedData Using Multitaper MFCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

B.G. Nagaraja and H.S. Jayanna

Secure Group Key Management Scheme for Simultaneous MultipleGroups with Overlapped Memberships Using Binomial Key Tree . . . . . . . 135

B.R. Purushothama, Kusuma Shirisha, and B.B. Amberker

An Analytical Approach to Position-Based Routing Protocolfor Vehicular Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Ram Shringar Raw, Daya Krishan Lobiyal, and Sanjoy Das

Simulation and Evaluation of Different Mobility Models in Ad-HocSensor Network over DSR Protocol Using Bonnmotion Tool . . . . . . . . . . . 157

V. Vasanthi and M. Hemalatha

Secure Authentication in Multimodal Biometric Systems UsingCryptographic Hash Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Aravind Ashok, Prabaharan Poornachandran, andKrishnasree Achuthan

Data Protection and Privacy Preservation Using Searchable Encryptionon Outsourced Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, andRajarathnam Nallusamy

A Dynamic Syntax Interpretation for Java Based Smart Cardto Mitigate Logical Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185

Tiana Razafindralambo, Guillaume Bouffard,Bhagyalekshmy N. Thampi, and Jean-Louis Lanet

Taxonomy of Slow DoS Attacks to Web Applications . . . . . . . . . . . . . . . . . 195Enrico Cambiaso, Gianluca Papaleo, and Maurizio Aiello

Crypto-Precision: Testing Tool for Hash Function . . . . . . . . . . . . . . . . . . . . 205Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel,Sambhav Sharma, and Krishna Asawa

Performance Analysis and Improvement Using LFSR in the PipelinedKey Scheduling Section of DES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

P.V. Sruthi, Prabaharan Poornachandran, and A.S. Remya Ajai

Towards Retrieving Live Forensic Artifacts in Offline Forensics . . . . . . . . . 225S. Dija, T.R. Deepthi, C. Balan, and K.L. Thomas

Table of Contents XIX

Carving of Bitmap Files from Digital Evidences by Contiguous FileFiltering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

Balan Chelliah, Divya S. Vidyadharan, P. Shabana, andK.L. Thomas

Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks . . . . . 240Adarsh Kumar and Alok Aggarwal

Intrusion Protection against SQL Injection and Cross Site ScriptingAttacks Using a Reverse Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

S. Fouzul Hidhaya and Angelina Geetha

Three-Way Handshake-Based OTP Using Random Host-Side Keysfor Effective Key Transfer in Symmetric Cryptosystems . . . . . . . . . . . . . . . 264

P.R. Mahalingam

Identity Based Privacy Preserving Dynamic Broadcast Encryptionfor Multi-privileged Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Angamuthu Muthulakshmi, Ramalingam Anitha, S. Rohini, andKrishnan Princy

A Virtualization-Level Future Internet Defense-in-DepthArchitecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek,Zbigniew Kotulski, Krzysztof Cabaj, and Pawel Szalachowski

Experimental DRM Model Using Mobile Code and White-BoxEncryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Stefan-Vladimir Ghita, Victor-Valeriu Patriciu, and Ion Bica

Towards a Secure, Transparent and Privacy-Preserving DRM System . . . 304Dheerendra Mishra and Sourav Mukhopadhyay

Time Based Constrained Object Identification in a Dynamic SocialNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314

M.T. Chitra, R. Priya, and Elizabeth Sherly

A New Approach towards Segmentation for Breaking CAPTCHA . . . . . . 323Anjali Avinash Chandavale and A. Sapkal

A Similarity Model to Estimate Attack Strategy Based on IntentionsAnalysis for Network Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336

Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, andAzri H.A. Rahman

XX Table of Contents

International Workshop on Securityin Self-Organising Networks (SelfNet’12)

Stationary Wavelet Transformation Based Self-recovery ofBlind-Watermark from Electrocardiogram Signal in WirelessTelecardiology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das, andSheli Sinha Chaudhuri

eCloudIDS – Design Roadmap for the Architecture of Next-GenerationHybrid Two-Tier Expert Engine-Based IDS for Cloud ComputingEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, andP. Revathy

A Comparative Study on Wormhole Attack Prevention Schemesin Mobile Ad-Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

Subhashis Banerjee and Koushik Majumder

Management of Routed Wireless M-Bus Networks for SparselyPopulated Large-Scale Smart-Metering Installations . . . . . . . . . . . . . . . . . . 385

Philipp Digeser, Marco Tubolino, Martin Klemm, and Axel Sikora

A Survey of Blackhole Attacks and Countermeasures in Wireless MobileAd-hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396

Subhashis Banerjee and Koushik Majumder

International Workshop on Intelligence and SecurityInformatics for International Security (IIS’12)

iReSign-Implementation of Next-Generation Two-Tier IdentityClassifier-Based Traffic Sign Recognition System Architecture UsingHybrid Region-Based Shape Representation Techniques . . . . . . . . . . . . . . . 408

Keerthi Balasundaram, Madhan Kumar Srinivasan, and K. Sarukesi

Work-in-Progress

Neural Synchronization by Mutual Learning Using Genetic Approachfor Secure Key Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

S. Santhanalakshmi, T.S.B. Sudarshan, and Gopal K. Patra

eCloudIDS Tier-1 uX-Engine Subsystem Design and ImplementationUsing Self-Organizing Map (SOM) for Secure Cloud ComputingEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432

Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, andP. Revathy

Table of Contents XXI

Implementation of MD6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444Ananya Chowdhury and Utpal Kumar Ray

Location Estimation of Mobile in GSM and CDMA Networks . . . . . . . . . . 456Adapa Tataram and Alwyn Roshan Pais

An Adaptive Distributed Intrusion Detection System for CloudComputing Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

Deepa Krishnan and Madhumita Chatterjee

Biologically Inspired Computer Security System: The Way Ahead . . . . . . 474Praneet Saurabh, Bhupendra Verma, and Sanjeev Sharma

A Comparative Analysis of the Ant Based Systems for QoS Routingin MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485

Debajit Sensarma and Koushik Majumder

Efficient Weighted Innovative Routing Protocol (EWiRP) to BalanceLoad in Mobile Ad Hoc Networks (MANETs): Simulation andFeasibility Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

Nitin Goel, Shruti Sangwan, and Ajay Jangra

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507