Publication

Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 Multi-Level Access Priority Channel Allocation Strategies In Global System For Mobile Communications Networks
Publication Authors:
 169. Kuboye Bamidele Moses, Alese Boniface Kayode, Adewale Olumide Sunday
Year Published:
 2014
Abstract:
Global System for Mobile communications (GSM) telephony has great impact in cellular communication technology because of its ability to accomodate more subscribers than the analog telephone. As a result, many calls are now on the network to seize the scarce radio resources available in GSM spectrum thereby leading to congestion most of the time. This work focuses on how the congestion experienced on the GSM network can be minimized. The voice call on the network is subclassifled into four classes namely special call (sv), handoff call (hv), retrial call (rv) and new call (nv). A level of priority was established among the classes so that the most urgent and important service will have access to the channel on the network by preempting the lower priority services when there is congestion and there is no free channel to communicate. The voice communications over the GSM network using the different classes of subscribers were analyzed with Markov chain's model. The steady state probabilities for voice services were derived using Multidimensional Erlang B. The blocking and dropping probabilities models for the different services were later developed. The impacts of priorities on different subscribers in the network were shown through the graphical display of the results. The work shows that the models used gave significant reduction in congestion when compared to the traditional Erlang-B model normally used to control congestion in GSM 
Publisher:
 Journal Of Internet Technology And Secured Transactions (JITST)
Publication Type:
 Journal
Publication Title:
 Infrared Capture Of Palm-Vein Blood Vessel Patterns For Human Authentication
Publication Authors:
 Omoyele Akinsowon, Boniface Alese, Olumide Adewale
Year Published:
 2014
Abstract:
Biometric Technology is fast taking over from the conventional use of ID Cards, PINs, Tokens and Passwords. This is becoming essential because of the issues of forgotten passwords, stolen ID Cards, compromised tokens and spoofed PINs. Palm-print authentication for access control has been deployed in so many areas of security concern in developing countries. Even though it is still in the theoretical stage in Nigeria, this paper seeks to evaluate the stages involved in the processing of palm-print images for identification or human authentication. It focuses on the feature extraction stage which is where the required features are separated from the others. 
Publisher:
 International Journal Of Computer, Electrical, Automation, Control And Information Engineering, World Academy Of Science, Engineering And Technology
Publication Type:
 Journal
Publication Title:
 Curbing Cybercrime By Application Of Internet Users' Identification System (IUIS)
Publication Authors:
 K. Alese Boniface And K. Adu Michael
Year Published:
 2014
Abstract:

Nil

 
Publisher:
 International Journal For Information Security Research (IJISR)
Publication Type:
 Journal
Publication Title:
 A Multicast Packet Authentication Using Signature Amortization Scheme
Publication Authors:
 Opayinka C.A., Alese B.K., Thompson A. F., Alowolodu O. D., Osuolale F. A.
Year Published:
 2014
Abstract:
The major principle of multicast communication is that each data packet sent from one source must reach all the receivers exactly as it originates from the source without any modification on the way. For information to be authentic there is the need to ensure that the information is from where they claim to come from and that security requirements are put in place. In multicast applications, when there are packet losses, the authenticity of the packet will not be verifiable by the receiver, making authentication impossible. In view of this, there is a need to develop an authentication scheme with lower communication cost and one that can be verifiable when packet loss is high. Thus, this research work developed a multicast authentication scheme that makes verification possible when there is packet loss and minimizes the size of the communication overhead. The research simulates a network environment using C sharp programming language and was tested with different messages to a number of receivers. The program was implemented in two phases: the sender’s end and the receiver’s end. The results show that amortization technique assists in reconstruction of the packet and make verification possible even when there are high losses of packet 
Publisher:
 Lecture Notes In Engineering And Computer Science, Springer.
Publication Type:
 Journal
Publication Title:
 A Bayesian Network Model For Risk Management In Cyber Situation
Publication Authors:
 Bode Moyinoluwa A., Alese Boniface K, Thompson Aderonke F., Iyare Otasowie
Year Published:
 2014
Abstract:
The transformation in e-commerce with the advent of other internet based activities has increased the impact of Cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents a robust predictive model based on Bayes Theorem, capable of distinguishing between bad connections called threats or attacks, and good which is known as normal connections. The model analyses the state of network traffic and determine its risk using the KDD Cup 1999 dataset. In conclusion, comparison of the Bayes model with Association Rule Mining model shows efficient performance, and an improved performance with a Genetic Algorithm technique 
Publisher:
 Lecture Notes In Engineering And Computer Science, Springer
Publication Type:
 Journal
Publication Title:
 On Forensic Investigation Models
Publication Authors:
 Eso Dieko, Alese Boniface K, Thompson Aderonke F., Iyare Otasowie
Year Published:
 2014
Abstract:

Nil

 
Publisher:
 Lecture Notes In Engineering And Computer Science, Springer
Publication Type:
 Journal
Publication Title:
  A Telepathology Model Using JPEG Algorithm For Histological Image Compression
Publication Authors:
 Boniface K. Alese, Adebowale J. Adelakun, Otasowie Iyare, Oloruntoba S. Ogundele
Year Published:
 2014
Abstract:

Nil

 
Publisher:
 International Journal Of Communications, Network And System Sciences.
Publication Type:
 Journal
Publication Title:
 Sensing The Nation: Smart Grid’s Risks And Vulnerabilities
Publication Authors:
 Ajayi O. O., Alese B. K., Fadugba S. E. And Owoeye Kolade
Year Published:
 2014
Abstract:
This paper presents issues and trepidations associated with transferring from conventional methods of electricity monitoring and distribution to the cyberspace, especially in developing countries like Nigeria where current approaches have failed to provide regular, reliable electric power. The Smart Power Grid is a developing concept already put to test, successfully, in very ad-vanced countries. The implementation of the Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. Connecting the electricity grid to the Internet can provide a lot of advantages in terms of control, data viewing and generation. However, in Nigeria, the proposal to transfer conventional methods to the Smart Grid has perhaps not hit the deck yet because of excessive focus on power generation, and because of the annotated reserva-tions associated with the Internet, as the Smart Grid involves circulation and dispersal via in-ter-networking structures. This paper describes the key technologies that support Power Grid substation automation, summarizes the mode of implementation into the existing Nigerian elec-trical infrastructure and brings fore issues and mitigating approaches to provide a seamless and securitised transfer of the current power grid to the Smart Grid. 
Publisher:
 Computer Engineering And Intelligent Systems, ISSN 2222-1719 (Paper) ISSN 222-2863 (Online), Volume 4, No. 2
Publication Type:
 Journal
Publication Title:
 Design Of A Mobile Agent For Monitoring Activities Of Users
Publication Authors:
 Arakete S. A., Akinyokun O. C., Olabode O. And Alese, B. K. (2013)
Year Published:
 2013
Abstract:
Monitoring is an aspect of network management aimed at ensuring optimal performance of the network and that the users play by the rules. This paper presents the design of a mobile agent for monitoring the activities of users in a network. Users' activities can be localized on their personal workstation or extended to the enterprise network and the Internet, in which case it can impact on the subscribed bandwidth, which is a shared resource of the corporate entity that they represent. All users hope to work in an environment of unlimited resources, including disk space, RAM and bandwidth. However, though the cost of these computing resources have reduced significantly owning to advances in microelectronic technology, they are still far from being free and inexhaustible. In this research, we design a mobile agent tool that can monitor users' activities in a network environment with a view to enhancing the effective utilisation of system resources, and in particular, the physical memory. The aim is to enable optimal resource utilisation in the network environment. In this paper, we define a mathematical formulation of user activities, load overhead of mobile agents and itinerary partition to avoid the over-bloating problem. The architecture of the mobile agent is explained 
Publisher:
 International Journal Of Computer Applications (0975-8887), Volume 66 - No. 2
Publication Type:
 Journal
Publication Title:
 A Model For Computer Worm Detection In A Computer Network
Publication Authors:
 Adebayo O. T., Alese, B. K., And Gabriel A. J. (March, 2013)
Year Published:
 2013
Abstract:
This research presents a novel approach to detecting computer worms in Computer Networks by making use of detection based on the network behavior through the collection of various parameters such as: network latency, throughput, bandwidth, response time, network utilization, packet loss and reliability. Infected hosts were tracked using an algorithm developed. Documentation of network measurements (behavior) metrics for the purpose of detecting unknown worm infection using instance-based technique was achieved by taking note of the changes in the network parameters and their values were logged in the database, as worm propagated through the network. a model for calculating network performance characteristic was developed. Network Worm Simulator (NWS) was used to perform the scanning activities of worms on the network. Jpcap was used to captured network packet. In the database model, the Packets table store network packet captured, the time of capture and every packets stored is given a unique number as id. The network_metric table store the network parameter values for the packets identified by Packet_id related to the Packets table, each set of network parameter value is identified by a unique number called ID. The simulation of the model was implemented using Java programming.