American Journal of Networks and Communications

Volume 2, Issue 2, April 2013

  • Finnish Perspectives for the IOT

    Johanna Virkki

    Issue: Volume 2, Issue 2, April 2013
    Pages: 23-27
    Received: Feb. 22, 2013
    Accepted:
    Published: Apr. 02, 2013
    Downloads:
    Views:
    Abstract: The Internet of Things (IOT) means connecting people, things, and devices in order to create an omnipresent computing world. One of the most important challenges in convincing users to adopt this kind of all-around network is the protection of security and privacy in different applications. This paper presents the results of interviews conducted in... Show More
  • Defending WSNs Against Jamming Attacks

    Abdulaziz Rashid Alazemi

    Issue: Volume 2, Issue 2, April 2013
    Pages: 28-39
    Received: Apr. 09, 2013
    Accepted:
    Published: Apr. 02, 2013
    Downloads:
    Views:
    Abstract: Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming atta... Show More
  • Node Selection in P2P Content Sharing Service in Mobile Cellular Networks with Reduction Bandwidth

    S. Uvaraj, S. Suresh, E. Mohan

    Issue: Volume 2, Issue 2, April 2013
    Pages: 40-46
    Received: May 11, 2013
    Accepted:
    Published: Jun. 10, 2013
    Downloads:
    Views:
    Abstract: The peer-to-peer service has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to realize highly scalable, extensible and... Show More
  • Cryptography: Salvaging Exploitations against Data Integrity

    A. A. Ojugo, A. O. Eboka, M. O. Yerokun, I. J. B. Iyawa, R. E. Yoro

    Issue: Volume 2, Issue 2, April 2013
    Pages: 47-55
    Received: May 14, 2013
    Accepted:
    Published: Jun. 10, 2013
    Downloads:
    Views:
    Abstract: Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) w... Show More