NCRACS 2017 - National Conference on Recent Advances in Computer Sciences

"NCRACS- Networks 2017 Conference Papers "

Pages   [1] [2] [3] [4] [5] [6]
 




DIRECTION AND TRAJECTORY BASED DATA HANDOVER ALGORITHM (DTBD) FOR BUS VEHICULAR NETWORK[ ]


VANET is a promising communication technology that enables communication among V2V and V2I for improving driving safety and efficiency. In VANET, data transfer is done with the help of multi-hop communication in which vehicles act as data carrier. Intelligent Transportations System (ITS) has deployed a no of RSU (Road Side Units) along the roads to collect and deliver traffic information from TCC (Traffic Control Centre) to the vehicles. This paper proposes a data handover algorithm called Direction and Trajectory-Based Data handover (DTBD), tailored for Bus Vehicular Adhoc Network(BUS-VANET).The key idea of DTBD is to effectively utilize the direction and trajectory ie., moving path of smart vehicles provided by GPS-based navigation systems. Through theoretical analysis and extensive simulation, it is shown that our handover algorithm provides significant performance improvement in terms of packet delivery rate and throughput under a variety of vehicular traffic conditions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
A STUDY ON POSITION IDENTIFICATION OF NEIGHBOURHOOD VEHICLES IN VANET[ ]


Vehicular Ad hoc Networks (VANETs) is a form of Mobile Ad-hoc Network (MANET), that provide communication and exchange of information among nearby vehicles, between vehicles and nearby fixed equipment, usually described as Road Side Unit (RSU). The information among vehicles is being exchanged through direct communication within each vehicle’s radio communication range .In reality, the radio frequency signals are susceptible to interference and the direct communication may be restricted by certain topographic features, man- made structures and other moving vehicles that are of different sizes and shapes. VANET environment is not only concerned on fixed obstacles like trees and buildings but also on moving objects on the road that causes the signal block. Obstacles create a Non-Line of Sight (NLOS) state that could prevent a vehicle from receiving consistent updates and Location information from its neighbors. Although rich literature in ad hoc networks exists, the scale, availability of realistic traffic data and vehicle equipments motivate researchers to study the unique characteristics of VANET. Also, the Location verification of VANET pose new challenges for existing routing protocols. Verifying the position of vehicles is done through different techniques. Here some position identification techniques are analyzed and compared. We then examine current routing strategies designed for the vehicular networks

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SECURE COMMUNICATIONS THROUGH DAPP [ ]


A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental condition such as temperature, sound,pressure etc. The communication delay, security and delivery ratio are the three main design issue in the wireless sensor Network.To overcome these issues a novel delay aware privacy preserving (DAPP) protocol is used. while forwarding the data to server source node may far away from the destination which leads to insecure in the network. The secret key sharing that ensures security of the collected data.This can also preserve security of location while defending against attackers the location privacy has been obtained to the users for various security purpose.Our theoretical analysisand numerical results show that the three design issues can be adjusted to meet various security and practical implementation goals.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ENERGY EFFICIENT HIGH PERFORMANCE WIRELESS SENSOR NETWORKS USING LOCAL MONITORING TECHNIQUES[ ]


Energy consumption and security has becomes a primary concern in a Wireless Sensor Network. In multi-hop communications, nodes that are near a sink are responsible for forwarding data from nodes that are farther away. This makes the battery drain faster in sensor node closer to a sink while those nodes farther away may maintain more energy. This leads to non uniform depletion of energy which causes network partition and the formation of energy holes. As a result, the sink becomes disconnected from other nodes, there by impairing the WSN. Hence, preventing formation of energy holes and thus balancing the energy consumption of the sensor nodes is a critical issue in WSN. Several studies have demonstrated the benefits of using a mobile sink to prevent the formation of energy holes and to reduce the energy consumption of nodes in wireless sensor networks. Particularly in delay-sensitive applications, as all sensed data must be collected within a given time constraint. PANEL-ELMO is an energy aware algorithm for reducing the energy consumption and also increasing the security of the WSN. ELMO promises the operation of WSN in a manner that is both energy-efficient and secure. The PANEL protocol supports asynchronous sensor network applications where the sensor readings are fetched by the base stations after some delay. PANEL protocol supports reliable and persistent data storage applications, intra and inter-cluster routing while ensuring load balancing. The local monitoring is combined with more secure form of sleep-wake scheduling along with aggregator election. The new methodology enables sleep-wake management in a secure manner even in the face of adversarial nodes that choose not to awaken nodes responsible for monitoring their traffic.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BER-BASED PHYSICAL LAYER SECURITY BY COMBINING STRONG CONVERSE AND ERROR AMPLIFICATION[ ]


The BER based physical layer security is used for the systems which use TDMA based MAC protocol with dynamically allocated Time slots. In contrast with CCC (Common Control Channel) based MAC protocols, TSAMAC (Time Slot Allocation MAC) protocol is based on the TDMA mechanism, without using any CCC for control information exchange. The channels are divided into time slots and users send their control or data packets over their designated slot. TSAMAC is improve the throughput of the communication channel for the unlicensed user. This method will facilitate to decide and allocate free channel to secondary user without interfering with primary user. The protocol ensures that no slot is left vacant. This guarantees full use of the available spectrum. The protocol includes the provision for Quality of Service, where real-time and safety critical data is transmitted with highest priority and least delay.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DETECTING NODE FAILURES AND REBUILDING FAILED NODES[ ]


Node failure detection in mobile wireless networks is very challenging because of the dynamically changing network topology, the network may not be always connected, and the resources are limited. In this paper, we use localized monitoring, location estimation and node collaboration to detect failed node and to rebuild them if failed. Compared to approaches that use centralized monitoring and localized monitoring, our approach has high packet delivery ratio, low routing overhead, high throughput ratio, low average end-to-end delay ratio for packet transfer.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEM[ ]


In the field of service computing, reputation of a Web service is usually calculated using feedback ratings provided by service users. However, the existing malicious ratings and different preferences of different service users often lead to a bias towards positive or negative ratings. In this paper, we propose a novel reputation computation approach for accurately measuring the reputation of Web services. The proposed approach uses three phases to measure and compute service reputation such as, feedback data collection, malicious rating detection and reputation computation for improving the reputation computation accuracy. A framework is also proposed to detect the malicious feedback rating and determine the accurate service reputation for reliable service selection.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SURVEY ON NETWORK ATTACKS AND MALWARE[ ]


Network is defined as a group of two or more computer systems linked together. It is a telecommunication network which allows nodes to share resources. When resources are being shared in a network, there arises the threat to the data being transmitted. This paper describes the various attacks that are launched during the transmission of data or while sharing resources in a network. It also describes the cause and effect of each attack. Further, the paper involves how each attack can be dealt with, by providing the proven solutions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
TRUSTR FRAMEWORK FOR PROTECTING WIRELESS[ ]


The complexity and number of attacks oncomputer networks are dramatically increasing. Most existing security mechanisms concentrate on countering Only few attacks. We introduce an integrated router security framework, called TrustR which is able to defend various types of attacks. It integrates collaborating security primitives including cryptography based security primitives, trust management system, and trusted platform module. A method for detecting deceptive routing messages has also been proposed. The deployment of TrustR has been introduced. Simulation results show that TrustR is effective in resisting attacks and improving network performance.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
OSN BASED APPLICATION FOR COMPLAINING LOCALITY ISSUES[ ]


We propose a project that mainly focuses on sanitation and development of a municipal corporation. In earlier existing systems, one must visit the office and complaints are given through written statement. Based on the priority, the complaint can be submitted in drop box or directly to the commissioner or the concerned department, which may take physical effort and time consuming task. In this paper, the people belonging to the municipal corporation are provided with an opportunity of raising a complaint regarding any issue that take place in their locality. The issues are garbage management, water supply, electricity management, road repairs or layering of roads and threatening of animals. To raise the complaints through Social network for Municipal Corporation regarding the above categories, a simplified solution is designed where the different type of complaints made by people are integrated. The issues are verified with the help of user ratings. The complaints will be isolated based on the feedback given by the locality user. If the rating exceeds more than a particular value then E-mail will be sent automatically to authorities (Low, Medium, High).This project involves major problem solving modules where these acts as best solution for incoming bulk complaints. For every submission of complaint, the user gets complaint acknowledgement. All these type of acknowledgement is generated by the system; the solution of time may differ from the type of the complaint and category.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
HIGH LEVEL SECURITY IN MULTI BIOMODEL SYSTEM USING FINE QUANTIZATION TECHNIQUE[ ]


Biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. The popularity of biometrics and its widespread use introduces privacy risks. To mitigate these risks, solutions such as the helper-data system, fuzzy vault, fuzzy extractors, and unimodel biometrics were introduced, also known as the field of template protection. In parallel to these developments, fusion of multiple sources of biometric information has shown to improve the verification performance of the biometric system. Propose the first practical and secure way to integrate the multi biometric into cryptographic applications. A repeatable binary string from templates, which call a cryptography key, is a fusion value generated reliably from genuine fingerprint, iris and face features codes. In particular, our goal is to design cryptographic protocols for multi biometrics in the framework of a realistic security model with a security reduction .Protocols are designed for multi biometric based encryption, signature and remote authentication. This project deals with three approaches of extracting ridge features points, texture features, and ROI (Region of Interest) properties from fingerprint, face and iris and gives the optimal solution. Then, the extracted features are fused at the feature level to obtain the multi-biometric template. Finally, a multi-biometric template is used for generating an m-bit cryptographic key.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ENERGY-BALANCED SCHEME AND CONGESTION CONTROL BASED ON THE HIERARCHY USING WIRELESS SENSOR NETWORKS[ ]


Wireless  sensor  network (WSN) consists of an outsized  range  of  device nodes. The  restricted resources and many-to-one communication model typically  end in congestion and unbalanced energy consumption. Hence, the matter  of congestion control with balanced-energy  is kind of  vital  for the utilization  of WSNs. In this paper, tends to  gift  a congestion  management  and energy balanced  theme  supported  the hierarchy (CcEbH).The network model is  first  initialized into a  gradual topology, by  that  these neighbor nodes of a node  are  expressly  divided into three  sets, i.e., an equivalent  gradual  nodes, the upstream nodes,  and also the  downstream nodes. And then,within the  planned  congestion  shunning  technique, the node can use other lower hierarchy neighbor nodes to forward information once its downstream node  can be  congested. After that, the congestion  management  mechanism  can  notice  the congestion if a node via its queue length, forwarding and receiving rate, and inform its upstream nodes  to seek out  alternative next hop to unleash the congestion. Within the CcEbH, the balanced energy consumption strategy  can balance the energy consumption of lower hierarchy nodes by using the node with the foremost remaining energy. The algorithm  will effectively deal with the network congestion and unbalanced energy consumption.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
COMPARATIVE STUDY AND ANALYSIS OF VARIOUS CRYPTOGRAPHIC ALGORITHMS[ ]


Data security is a major factor for every communication system. Communication becomes a necessary tool for any business, education, defence services etc. It is desired to communicate data with high security. At present, various cryptographic algorithms have been proposed and implemented. Those algorithms are broadly classified into symmetric and asymmetric algorithms based on the number of keys used. This paper, the comparison is made between algorithms such as RSA, AES, MD5 and the combination of AES-RSA-MD5 algorithms on the basis of execution time.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ELLIPTIC CURVE CRYPTOGRAPHY SECURITY IN THE CONTEXT OF INTERNET OF THINGS[ ]


One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects into intelligent virtual objects. As many resources are being shared via internet, security becomes an essential entity in current trend..This paper describes in detail about the various security methods that can be applied to internet of things .Elliptic Curve Cryptography is one of the methods in access booting that can efficiently encrypt/decrypt the data by the use of digital signatures. Key generation serves as an important part in Elliptic Curve Cryptography, as both public and private key needs to be generated. This method ensures to provide an efficient privacy and security when compared with the other algorithms used in cryptography.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AN ENTIRE AUTOMATION OF UNMANNED GATES USING ZIGBEE AND ATMAL[ ]


Aim of this proposal is to govern the unmanned railway gates using sensors. At instance more number of accidents occurring at railway gates due to manual error and unmanned gates. This paper employs two zigbee sensors. zigbee sensors are in rails of the track on the both sides of the gate. Zigbee sensors are utilized to detect the arrival of train. As soon as the zigbee sensors resolve the arrival of train, a buzzer is alarmed indicating the regional people on the trains approach towards the gate. A DC generated motor is reported from the sensors. The same mechanism is used to open the gates respectively. This proposal also has a traffic spikes which helps in preventing the entry of vehicles at the time of closing the gates. This type of automatic mechanism is required to avoid collisions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR FILE SHARING SYSTEMS[ ]


To implement how to securely, efficiently, and flexibly share data with others in cloud storage.Data sharing is an important functionality in cloud storage. For example, bloggers can let their friends view a subset of their private pictures; an enterprise may grant their employees access to a portion of sensitive data. The challenging problem is how to effectively share encrypted data. Of course users can download the encrypted data from the storage, decrypt them, then send them to others for sharing, but it loses the value of cloud storage. Users should be able to delegate the access rights of the sharing data to others so that they can access these data from the server directly. However, finding an efficient and secure way to share partial data in cloud storage is not trivial.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
INTELLIGENT BUS LOCATOR AND POLLUTION MONITORING SYSTEM IN WIRELESS SENSOR NETWORKS[ ]


Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we discuss the use of wireless sensor networks for Intelligent Bus Location and Pollution Monitoring System. With fast growing industries, the problem of pollution is becoming more a matter of concern for the health of the population. We proposed an innovative system named IBLPS to locate buses and in addition to that monitor pollution in and around the city. Wireless Transceivers are used by the system to detect the location of buses and gas sensors such as Carbon dioxide sensor, Carbon monoxide sensor etc. are used to monitor pollution around the area. All the data gathered are stored and analyzed with special Non Duplicate Data Acquisitions algorithm for elimination of duplicate data.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
HUMAN HEALTH MONITORING SYSTEM USING WIRELESS SENSOR NETWORK[ ]


Wireless devices have invaded the medical area with a wide range of capability. To monitor the patient details in periodic interval is on overhead using existing technologies. To overcome this wireless sensor technology is needed. Sensors are used to gather patient’s medical information without being injecting inside the body. By this remote monitoring, patient’s data are collected. This adds the advantages of mobility. There is no need for a doctor to visit the patient periodically. This system can be implemented in hospitals as well as in residency of patient. The objective of this project is to design and implement a reliable, cheap, low powered, non-intrusive, and accurate system that can be worn on a regular basis and monitors the vital signs and send the parameters to the concerned doctor, if the threshold values set are crossed out. This data is also easily accessible by the physician through wireless network. The system measures various critical parameters such as temperature, blood pressure of patients. If abnormalities in the recorded parameters, then SMS will be sent to the medical authorities and the relatives concerned.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SMART-PARKING SYSTEM BASED ON RFID AND GSM TECHNOLOGY[ ]


This paper presents a design and implementation of a smart and unique car parking system to support the modern day tedious car parking design using RFID reader and microcontroller. In the presented prototype model we describe and implement a parking tower with 2 floors and 2 slots per floor . The system designed with Arudino controller automatically identifies the empty slot and parks the car at the corresponding slot. A group of Sensors, GSM and software are embedded together to work as a system to transport the car to its calculated parking slot. The System embedded with a RFID smart card helps us to calculate the time period during which the car is parked, thus helping an automatic e-commerce system to deduct the amount for the mentioned time period from the users account. The system has a GSM add-on module which will automatically respond’s to the users SMS request by letting him the available slots at a given time. TempSensors,CO2 sensor are used to indicating the security aspects in the overall parking system.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
REAL TIME INDOOR CO2 MONITORING AND CONTROL SYSTEM USING WIRELESS SENSOR NETWORKS[ ]


Indoor Air Quality has become an important human health and safety concern, clean air is essential for good health and this is especially true when it comes to indoor air. The world atmosphere carbon dioxide level is increased. However, many work environments lack proper detection mechanisms to identify health risks for occupants. Wireless sensor networks have the potential to alleviate this problem. This project proposes a real-time indoor CO2 monitoring and control system using wireless sensor network system. The system aims to monitor and detect the concentration of carbon dioxide in a real-time basis using wireless sensor nodes. If the monitored CO2 level is more than the predefined threshold level, the proposed system automatically opens the window. If the monitored value below the threshold, the system automatically closes the window. Moreover, the system coexists with minimum interference with other systems in the monitoring area.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
WIRELESS COMMUNICATION WIMAX[ ]


The growing demand of the cell phones and multimedia networks results in the development of the broad band access. One of such broad band access developed is IEEE 802.16 which is commonly known as WIMAX (Worldwide Interoperability for Microwave Access). IEEE 802.16 is a standard which is used to state the radio frequency of fixed broad band Wireless Access. There are many advantages in WIMAX compared to Wi-Fi. This article deals with explanation, architecture as well as pros and cons of WIMAX.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
AN ENHANCED FALL DETECTION SYSTEM FOR ELDERLY PERSON MONITORING USING CONSUMING HOME NETWORKS[ ]


The population of 65-and over aged people in the developed countries will approach 20% of total population in the next 20 years and will obviously become a serious healthcare issue in the near future. Among the elderly, the fall events can be an unpredictable and dangerous event. Various fall detection solutions have been previously proposed to create a reliable surveillance system for elderly people with high requirements on accuracy, sensitivity and specificity. An enhanced fall detection system is proposed for elderly person monitoring that is based on smart sensors worn on the body and operating through consumer home networks. With treble thresholds, accidental falls can be detected in the home healthcare environment. By utilizing information gathered from an accelerometer, B.P. Machine and smart sensors, the impacts of falls can be logged and distinguished from normal daily activities. Furthermore, the cost of healthcare is highly related to the response and rescue time, and can be greatly reduced by fast detection and delivering signals to the specified operator for immediate consideration

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Tracking System[ ]


Mobile Application to keep track of every movement of the subject induced with GPS tracking system. A unique application that will be a milestone after the implication of the smart city as one could track the movement of any GPS connected subject be it a means of transportation, finding a friend, tracking the movement of an autistic person, aged person, a lost phone or any gadget with GPS incorporated in it. When globally connected on satellite and own a smart phone then why would any other special device be needed separately for every single task. Hence a mobile application for performing all such wide range of operations can be a brilliant form of generalisation in GPS Tracking. The implementation of this application can be done in the Eclipse platform using Java, XML and few other inbuilt functions.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
ATTACKS ON CRYPTOGRAPHIC SERVICES: A SURVEY[ ]


This paper presents a survey on various attacks on network and segregates those attacks based on their ability to compromise the cryptographic services such as confidentiality, availability, non repudiation, integrity. Common attacks are known to everyone but for what purpose the attacks are done is dealt with this paper.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Pages   [1] [2] [3] [4] [5] [6]