Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.50-56, Sep-2014
Abstract
Malicious and selfish behaviors represent a serious threat against routing in Delay/Disruption Tolerant Networks (DTNs). Due to the unique network characteristics, designing a misbehavior detection scheme in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing towards efficient trust establishment. The basic idea of iTrust is introducing a periodically available Trusted Authority (TA) to judge the node�s behavior based on the collected routing evidences and probabilistically checking. A new VANET-based smart parking scheme (SPARK) for large parking lots provide three convenient services for drivers: 1) real-time parking navigation; 2) intelligent anti-theft protection; and 3) friendly parking information dissemination. TA could ensure the security of DTN routing at a reduced cost. To further improve the efficiency of the proposed scheme, we correlate detection probability with a node�s reputation, which allows a dynamic detection probability determined by the trust of the users. The extensive analysis and simulation results show that the proposed scheme substantiates the effectiveness and efficiency of the proposed scheme.
Key-Words / Index Term
VANET ,ITRUSTED , DTNS
References
[1] R. Lu, X. Lin, H. Zhu, and X. Shen, �SPARK: A New VANET-based Smart Parking Scheme for Large Parking Lots�, IEEE INFOCOM�09, April 2009.
[2]A. Lindgren, A. Doria, and O. Schelen, �Probabilistic routing in intermittently connected networks�,ACM SIGMOBILE CCR, vol. 7, no. 3, pp. 19�20, 2003.
[3]E.Daly and M. Haahr, �Social network analysis for routing in disconnected delay-tolerant MANETs, �Proc. MobiHoc, pp. 32�40, 2007.
[4] J. J. Jaramillo and R. Srikant, �Darwin: Distributed and adaptive Reputation mechanism for wireless ad-hoc networks� , Proc. MobiCom, 2007.
[5] H.Zhu, X.Lin, R.Lu, Y.Fan and X. Shen,�SMART:A Secure Multilayer Credit -Based Incentive Scheme for Delay-Tolerant Networks,� IEEE vol.58,no.8,pp.828-836,2009.
[6] S.Reidt, M.Srivatsa, S.Balfe,�The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks� inCCS�09,2009.
[7] E. Ayday, H. Lee and F. Fekri,�Trust Management and Adversary Detection for Delay Tolerant Networks,� inMilcom�10, 2010.
[8] B.B.Chen, M.C.Chan,�Mobicent:a Credit-Based Incentive System for Disruption Tolerant Network� IEEE INFOCOM�2010.
[9] A. Balasubramanian, B. N. Levine, and A. Venkataramani, �Dtn routing as a resource allocation problem,�Proc. ACM SIGCOMM, 2007.
[10] M. Dawande, J. Kalagnanam, P. Keskinocak, R. Ravi, and F. Salman, �Approximation algorithms for the multiple knapsack problem with assignment restrictions,�Journal of Combinatorial Optimization,vol.4, pp. 171�186, 2000.
[11] M. Granovetter, �The strength of weak ties,� The American Journal of Sociology, vol. 78, no. 6, 1973.
[12] A. Mislove, M. Marcon, K. P. Gummadi, Druschel, and Bhattacharjee, �Measurement and analysis of online social networks,�Proc. IMC, 2007.
[13] E. Gilbert and K. Karahalios, �Predicting tie strength with social media,�Proc. CHI, 2009.
[14] P. Hui, J. Crowcroft, and E. Yoneki, �Bubble rap: social-based forwarding in delay tolerant networks,� Proc. MobiHoc, pp. 241�250, 2008.
[15] V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot, �Delegation Forwarding,�Proc. MobiHoc, 2008.
Citation
B. Swetha, D.B. Rao, P.N. Rao, "Intelligent Anti-Theft Finding Scheme Towards Itrust Establishment in Delay Tolerant Networks Using VANET," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.50-56, 2014.
Trade-off between Utility and Security using Group Privacy Threshold Sanitization
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.57-60, Sep-2014
Abstract
Data mining is a well-known technique for automatically and intelligently extracting useful information or knowledge from a large amount of data, but it can also disclose sensitive information of an individual or a company. This promotes the need for privacy preserving data mining which is becoming an increasingly important field of research and many researchers have proposed techniques for handling this concept. However, most of the privacy preserving data mining approaches concentrate on fixed disclosure threshold strategy for all sensitive information. This article proposes an approach for group-based threshold strategy which may help facilitate to use varying sensitivity level for the information to be hidden.
Key-Words / Index Term
Restricted patterns, Sanitization, Sensitive transactions, Group-based Threshold
References
[1] Richard Yevich, "Data Mining," In: Joyce Bischoff, Ted Alexander and Sid Adelman (editors). DataWarehouse: Practical Advice from the Experts. Upper Saddle River, N.J.: Prentice Hall, (1997).
[2] A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrk, “Privacy Preserving Mining of Association Rules”, In Proceedings the 8th ACM SIGKDD International Conference on Knowledge Discovery in Databases and Data Mining, pp.217-228, 2002.
[3] S. Rizvi, J. Haritsa, “Maintaining Data Privacy in Association Rule Mining”, In Proceedings the 28th International Conference on Very Large Data Bases, pp.682-693, 2002.
[4] L. Sweeney, “k-Anonymity: A Model for Protecting Privacy”, International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol.10, no.5, pp.557-570,2002.
[5] X.K. Xiao, Y.F. Tao, “Personalized Privacy Preservation”, In Proceedings of the ACM Conference on Management of Data (SIGMOD), pp.229-240, 2006.
[6] M. Kantarcioglu, C. Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge and Data Engineering, vol.16, no.9, pp.1026-1037, 2004.
[7] Lindell, Yehuda, Pinkas, “Privacy preserving data mining”, In Proceedings of the Advances in Cryptology–CRYPTO, pp.36–54,2000.
[8] J. Vaidya, C. Clifton, “Privacy Preserving Association Rule Mining in Vertically Partitioned Data”, In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.639-644, 2002.
[9] Cynthia Selvi P., Mohamed Shanavas A.R., “Towards Information Privacy Using Transaction-Based Maxcover Algorithm”, World Applied Sciences Journal 29 (Data Mining and Soft Computing Techniques): 06-11, 2014, ISSN 1818-4952, © IDOSI Publications, 2014, DOI:10.5829/ idosi.wasj.2014.29. dmsct.2, Pages. 06-11
[10] The Dataset used in this work for experimental analysis was generated using the generator from IBM Almaden Quest research group and is publicly available from http://fimi.ua.ac.be/data/.
[11] Pavon J, Viana S, Gomez S, “Matrix Apriori: speeding up the search for frequent patterns,” Proc. 24th IASTED International Conference on Databases and Applications, 2006, pp. 75-82.
Citation
Cynthia Selvi P and Mohamed Shanavas A.R, "Trade-off between Utility and Security using Group Privacy Threshold Sanitization," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.57-60, 2014.
Outlier Detection via online OSPCA in High Dimensional Space
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.61-64, Sep-2014
Abstract
Outlier detection is the process of identifying unusual behavior. It is widely used in data mining, for example, to identify customer behavioral change, fraud and manufacturing flaws. In recent years many researchers had proposed several concepts to obtain the optimal result in detecting the anomalies. But the process of PCA made it challenging due to its computations. In order to overcome the computational complexity, online oversampling PCA has been used. The algorithm enables quick Online updating of the principal directions for the effective computation and satisfying the online detecting demand and also oversampling will improve the impact of outliers which leads to accurate detection of outliers. Experimental results show that this method is effective in computation time and need less memory requirements also clustering technique is added to it for optimization.
Key-Words / Index Term
online oversampling PCA, Online updating Technique, Outlier detection
References
[1] M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, �LOF: Identifying Density-Based Local Outliers,� Proc. ACM SIGMOD Int�l Conf. Management of Data, 2000.
[2] F. Angiulli, S. Basta, and C. Pizzuti, �Distance-Based Detection and Prediction of Outliers,� IEEE Trans. Knowledge and Data Eng., vol. 18, no. 2, pp. 145-160, 2006.
[3] N.L.D. Khoa and S. Chawla, �Robust Outlier Detection Using Commute Time and Eigen space Embedding,� Proc. Pacific-Asia Conf. Knowledge Discovery and Data Mining, 2010.
[4] V.Barnett and T. Lewis, �Outliers in Statistical Data�, John Wiley Sons, 2006.
[5] D.M. Hawkins, �Identification of Outliers�. Chapman and Hall, 1980.
[6] W. Jin, A.K.H. Tung, J. Han, and W. Wang, �Ranking Outliers Using Symmetric Neighborhood Relationship,� Proc. Pacific-Asia Conf. Knowledge Discovery and Data Mining, 2006.
[7] H.-P. Kriegel, M. Schubert, and A. Zimek, �Angle-Based Outlier Detection in High- Dimensional Data,� Proc. 14th ACM SIGKDD Int�l Conf. Knowledge Discovery and data Mining, 2008.
[8] C.C. Aggarwal and P.S. Yu, �Outlier Detection for High Dimensional Data,� Proc. ACM SIGMOD Int�l Conf. Management of Data, 2001.
[9] T. Ahmed, �Online Anomaly Detection using KDE,� Proc. IEEE Conf. Global Telecomm., 2009.
[10] X. Song, M. Wu, and C.J., and S. Ranka, �Conditional Anomaly Detection,�IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 631-645, May 2007.
[11] L. Huang, X. Nguyen, M. Garofalakis, M. Jordan, A.D. Joseph, and N. Taft, �In-Network Pca and Anomaly Detection,� Proc. Advances in Neural Information Processing Systems 19, 2007.
[12] V. Chandola, A. Banerjee, and V. Kumar, �Anomaly Detection: A Survey,� ACM Computing Surveys, vol. 41, no. 3, pp. 15:1-15:58,2009.
[13] W. Wang, X. Guan, and X. Zhang, �A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security,� Proc. Int�l sym. Neural Networks, 2004.
Citation
P.G.K. Pabhita, K. Bhaskarnaik , "Outlier Detection via online OSPCA in High Dimensional Space," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.61-64, 2014.
Survey of Classification Techniques in Data Mining
Survey Paper | Journal Paper
Vol.2 , Issue.9 , pp.65-74, Sep-2014
Abstract
Classification in data mining is a technique based on machine learning algorithms which uses mathematics, statistics, probability distributions and artificial intelligence... To predict group membership for data items or to represent descriptive analysis of data items for effective decision making .Now a day�s data mining is touching every aspect of individual life includes Data Mining for Financial Data Analysis, Data Mining for the Telecommunications Industry Data Analysis, Data Mining for the Retail Industry Data Analysis, Data Mining in Healthcare and Biomedical Research Data Analysis, and Data Mining in Science and Engineering Data Analysis, etc. The goal of this survey is to provide a comprehensive review of different classification techniques in data mining based on decision tree, rule based Algorithms, neural networks, support vector machines, Bayesian networks, and Genetic Algorithms and Fuzzy logic.
Key-Words / Index Term
Classifiers, Data Mining Techniques, Intelligent Data Analysis, Learning Algorithms, Artificial Intelligence, Decision Support System, Data Mining, KDD, Classification Algorithms, Fuzzy sets, Genetic Algorithm,etc
References
�Machine learning: a review of classification and
combining techniques�, Springer Science10 November
2007.
[2] Raj Kumar, Dr. Rajesh Verma,� Classification
Algorithms for Data Mining P: A Survey� IJIET
Vol. 1 Issue August 2012, ISSN: 2319 � 1058.
[3] Ms. Aparna Raj, Mrs. Bincy, Mrs. T.Mathu �Survey on
Common Data Mining Classification Techniques�,
International Journal of Wisdom Based Computing,
Vol. 2(1), April 2012.
[4] http://www.tutorialspoint.com/data_mining/dm_rbc.htm
[5] M.Archana Survey of Classification Techniques in Data
Mining International Journal of Computer Science and
Mobile Applications Vol.2 Issue. 2, February- 2014
ISSN: 2321-8363.
[6] Thair Nu Phyu Survey of Classification Techniques in
Data Mining Proceedings of the International
Multi Conference of Engineers and Computer Scientists
2009,Vol I IMECS 2009, March 18 - 20, 2009, Hong
Kong.
[7] Jensen, F. (1996). An Introduction to Bayesian
Networks. Springer.
[8] Cover, T., Hart, P. (1967), Nearest neighbor pattern
classification.
[9] http://docs.oracle.com/cd/B28359_01/datamine.111/b28129.pdf
[10] Text Book: Introduction to data mining by michael
steinback, Pang-Ning Tan, Vipin Kumar.
[11] http://en.wikipedia.org/wiki/Decision_tree_learning.
Citation
V. Krishnaiah, G. Narsimha, N.S. Chandra, "Survey of Classification Techniques in Data Mining," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.65-74, 2014.
Design of Dual Dynamic Flip-Flop with Featuring Efficient Embedded Logic for Low Power Cmos Vlsi Circuits
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.75-77, Sep-2014
Abstract
In this paper, we introduce a new dual dynamic node hybrid flip-flop (DDFF) and a novel embeddedlogic module (DDFF-ELM) based on DDFF. The proposed designs eliminate the large capacitance present in the pre-charge node of several state-of-the-art designs by following a split dynamic node structure to separately drive the output pull-up and pull down transistors. The aim of the DDFF-ELM is to reduce pipeline overhead. It presents an area, power, and speed efficient method to incorporate complex logic functions into the flip-flop. The performance comparisons made in a 90 nm technology when compared to the Semi dynamic flip-flop, with no degradation in speed performance. The leakage power and process-voltage-temperature variations of various designs are studied in detail and are compared with the proposed designs.
Key-Words / Index Term
Flip-Flops, High-Speed, Leakage Power, Low-Power.
References
[1] J. Yuan and C. Svensson, �New single-clock CMOS latches and flipflops with improved speed and power savings,�IEEE J. Solid-State Circuits, vol. 32, no. 1, pp. 62�69, Jan. 1997.
[2] A. Hirata, K. Nakanishi, M. Nozoe, and A. Miyoshi, �The cross chargecontrol flip-flop: A low-power and high-speed flip-flop suitable for mobile application SoCs,� inProc. Symp. VLSI Circuits Dig. Tech. Papers, Jun. 2005, pp. 306�307.
[3] N. Nedovic, M. Aleksic, and V. G. Oklobdzija, �Conditional pre-charge techniques for power-efficient dual-edge clocking,� inProc. Int. Symp. Low-Power Electron. Design, 2002, pp. 56�59.
[4] P. Zhao, T. K. Darwish, and M. A. Bayoumi, �High-performance and low-power conditional discharge flip-flop,� IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 12, no. 5, pp. 477�484, May 2004.
[5] V. Stojanovic and V. Oklobdzija, �Comparative analysis of masterslave latches and flip-flops for high-performance and low-power systems,� IEEE J. Solid-State Circuits, vol. 34, no. 4, pp. 536�548, Apr. 1999
[6] J. M. Rabaey, A. Chandrakasan, and B. Nikolic, Digital Integrated Circuits: A Design Perspective, 2nd ed. Englewood Cliffs, NJ: PrenticeHall, 2003.
Citation
B. Balaji, S.S. malik, "Design of Dual Dynamic Flip-Flop with Featuring Efficient Embedded Logic for Low Power Cmos Vlsi Circuits," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.75-77, 2014.
Design and Verification of Five Port Router for Network on Chip Using VERILOG
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.78-80, Sep-2014
Abstract
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the five port router for network on chip using the latest verification methodologies, Hardware Verification Languages and EDA tools and qualifies the Design for Synthesis an implementation. This Router design contains Four output ports and one input port, it is packet based Protocol. This Design consists Registers, Fsm and FIFO�s.For larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized time multiplexed approach was used. Compared to the provided software reference implementation, our direct-mapped approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude speedup, depending on the network and router configuration.
Key-Words / Index Term
FIFO, Fsm, Network-On-Chip, Register blocks, Simulation, Router
References
[1] �D. Chiou, �MEMOCODE 2011 Hardware/Software CoDesign Contest�, https://ramp.ece.utexas.edu/redmine/ Attachments/ DesignContest.pdf
[2] Blue spec Inc, http://www.bluespec.com
[3] Xilinx, �ML605 Hardware User Guide�,
http://www.xilinx.com/support/documentation /boards and kits/ug534.pdf
[4] Xilinx, �LogiCORE IP Processor Local Bus (PLB) v4.6�,
http://www.xilinx.com/support/documentation/ip documentation/plb v46.pdf
[5] �Application Note: Using the Router Interface to Communicate Motorola, ANN91/D Rev. 1, 01/2001.
[6] Cisco Router OSPF: Design& Implementation Guide, Publisher: McGraw-Hill
[7] �Nortel Secure Router 4134�, Nortel Pvt.Ltd.
Citation
K. Venkatasuresh, K. Bala , "Design and Verification of Five Port Router for Network on Chip Using VERILOG," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.78-80, 2014.
Online Shopping: An Empirical Study of Indian Consumers
Technical Paper | Journal Paper
Vol.2 , Issue.9 , pp.81-84, Sep-2014
Abstract
Online shopping - Consumers are playing an important role. In India young generations are using Internet at an increasing rate it greatly provides an emerging prospect for online retailers. There are various factors which affects Indian consumers, buying behaviou and the associations between these factors and type of online buyers, then they can further develop their marketing strategies to convert potential customers into active ones. In this study four key dimensions of online shopping as perceived by consumers in India are identified and the different demographic factors are also studied which are the primary basis of market segmentation for retailers. It was discovered that overall website quality, commitment factor, customer service and security are the four key factors which influence consumers� perceptions of online shopping. the study revealed that the perception of online shoppers is independent of their age and gender but not independent of their education & gender and income & gender Finally, the recommendations presented in this research may help foster growth of Indian online retailing in future.
Key-Words / Index Term
Online Shopping, Consumers, India, Website, Behaviour.
References
[1]. Alba, J., Lynch, J., Weitz, B., Janiszewski, C., Lutz, R., Saywer, A. and Wood, S., �Interactive Home Shopping: Consumer, Retailer, and Manufacturers Incentives to Participate in Electronic Marketplaces�, Journal of Marketing, Vol. 61, No. 3: 38-53, 1997.
[2]. Anderson, J. C. and Narus, J.A., �A Model of Distributor Firm and Manufacturer Firm Working Relationships�, Journal of Marketing, 54, No. 1: 42-58, 1990.
[3]. Baty, J.B. and Lee, R.M., �Intershop: Enhancing the vendor/customer dialectic in electronic shopping�, Journal of Management Information Systems, Vol. 11, No. 4: 9-31, 1995.
[4]. Bearden, W.O. and Teel, J.E., �Selected Determinants of Consumers Satisfaction and Complaint Reports�, Journal of Marketing Research, Vol. 20, No. 1: 21-28, 1983.
[5]. Butler, P. and Peppard, J., �Consumer purchasing on the Internet: Process and Prospects�, European Management Journal, Vol. 16, No. 5: 600-610, 1998.
[6]. Chen, Q., Clifford, S.J. and Wells, W., �Attitude Toward the Site: New Information�, Journal of Advertising Research, Vol. 42, No. 2: 33-45, 2000.
[7]. Churchill, G.A. and Surprenant, C., �An Investigation into the Determinant of Customer Satisfaction�, Journal of Marketing Research, Vol. 19, No. 4: 491-504, 1982.
[8]. Cronbach, L.J., �Coefficient Alpha and the Internal Structure of Tests�, Psychometrika, Vol. 16, No. 3: 297-334, 1951.
[9]. Culnan, M.J. Georgetown Internet Privacy Policy Survey, �Report to the Federal Trade
Citation
N. Gupta, J. Chandel, J. Yadav, "Online Shopping: An Empirical Study of Indian Consumers," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.81-84, 2014.
Cross-Layer arrangement for Wireless Mesh Networks
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.85-89, Sep-2014
Abstract
Cross-Layer arrangement has lately grow the new hype in wireless communication systems. Cross-layer arrangement has a countless possible in upcoming wireless communication Systems. Cross-layer arrangement for excellence of facility (QoS) in wireless mesh networks (WMNs) has complicated abundant investigation attention recently. Numerous key machineries spanning all layers, after bodily up to network layer, consume to be browbeaten and unique procedures for harmonic and well-organized layer communication necessity be designed.
Key-Words / Index Term
Wireless ad hoc networks, osi-iso layer, irritated layer design, Wireless mesh networks, QoS
References
[1] Xinheng Wang ; Coll. of Eng., Swansea Univ., Swansea, UK ; Shancang Li �Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets� Published in: Systems Journal, IEEE (Volume:7 , Issue: 1 ) Date of Publication: March 2013 Page(s): 50 � 58.
[2] Qiu Wang ; Fac. of Inf. Technol., Macau Univ. of Sci. & Technol., Macau, China ; Hong-Ning Dai ; Qinglin Zhao �Eavesdropping security in wireless ad hoc networks with directional antennas� Published in: Wireless and Optical Communication Conference (WOCC), 2013 22nd Date of Conference: 16-18 May 2013 Page(s): 687 � 692.
[3] Biagioni, E.S. ; Univ. of Hawai``i at Manoa, Honolulu �Algorithms for Communication in Wireless multi-hop ad hoc Networks using Broadcasts in Opportunistic Large Arrays (OLA)� Published in: Computer Communications and Networks, 2007. ICCCN 2007. Proceedings of 16th International Conference on Date of Conference: 13-16 Aug. 2007 Page(s): 1111 � 1116.
[4] Chi Ma ; Google Inc., Mountain View, CA, USA ; Yuanyuan Yang �A Battery-Aware Scheme for Routing in Wireless Ad Hoc Networks� Published in: Vehicular Technology, IEEE Transactions on (Volume:60 , Issue: 8 ) Date of Publication: Oct. 2011 Page(s): 3919 � 3932.
[5] Gabale, V. ; Dept. of Comput. Sci. & Eng., IIT Bombay, Mumbai, India ; Raman, B. ; Dutta, P. ; Kalyanraman, S. more authors �A Classification Framework for Scheduling Algorithms in Wireless Mesh Networks� Published in: Communications Surveys & Tutorials, IEEE (Volume:15 , Issue: 1 )Date of Publication: First Quarter 2013 Page(s): 199 � 222.
[6] Gaur, N. ; Indian Inst. of Space Sci. & Technol. (IIST), Thiruvananthapuram, India ; Chakraborty, A. ; Manoj, B.S. �Load-aware routing for non-persistent small-world wireless mesh networks� Published in: Communications (NCC), 2014 Twentieth National Conference on Date of Conference: Feb. 28 2014-March 2 2014 Page(s): 1 � 6.
[7] Wei Liu ; Grad. Sch. of Inf. Sci., Tohoku Univ., Sendai, Japan ; Nishiyama, H. ; Kato, N. ; Shimizu, Y. more authors �A novel gateway selection method to maximize the system throughput of Wireless Mesh Network deployed in disaster areas� Published in: Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on Date of Conference: 9-12 Sept. 2012 Page(s): 771 � 776.
[8] Prasanthi, S. ; Dept. of Comput. Eng., Pusan Nat. Univ., Busan, South Korea ; Sang-Hwa Chung �An Efficient Algorithm for the Performance of TCP over Multi-hop Wireless Mesh Networks� Published in: Information Technology: New Generations (ITNG), 2010 Seventh International Conference on Date of Conference: 12-14 April 2010 Page(s): 816 � 821.
[9] Baek-Young Choi ; Univ. of Missouri, Kansas City, MO, USA ; Sejun Song ; Yue Wang ; Eun Kyo Park �Using RTT Variability for Adaptive Cross-Layer Approach to Multimedia Delivery in Heterogeneous Networks� Published in: Multimedia, IEEE Transactions on (Volume:11 , Issue: 6 ) Date of Publication: Oct. 2009 Page(s): 1194 � 1203.
[10] Hussain, A. ; Dept. of Electr. Eng., Nat. Univ. of Comput. & Emerging Sci., Lahore ; Akbar, M.S. ; Cheema, M.A. �A simple cross-layer approach to reduce duplicate acknowledgements for TCP over WLAN� Published in: Networking and Communications Conference, 2008. INCC 2008. IEEE International Date of Conference: 1-3 May 2008 Page(s): 63 � 66.
[11] Mirani, F.H. ; Dept. of Comput. Sci. & Networks, Telecom ParisTech, Paris, France ; Xiaofei Zhang ; Boukhatem, N. ; Thi-Mai-Trang Nguyen �Cross-layer FPS: A SCTP-based cross-layer data scheduling approach� Published in: Consumer Communications and Networking Conference (CCNC), 2011 IEEE Date of Conference: 9-12 J an. 2011 Page(s): 192 � 197.
[12] Yeonjoon Chung ; Electron. & Telecommun. Res. Inst., Daejeon ; Min Ho Park ; Eui Hyun Paik �A QoS negotiable service framework for multimedia services connected through subscriber networks� Published in: Consumer Electronics, 2006. ISCE `06. 2006 IEEE Tenth International Symposium on Date of Conference: 0-0 0 Page(s): 1 � 4.
[13] Ito, Y. ; Dept. of Comput. Sci. & Eng., Nagoya Inst. of Technol., Nagoya ; Tasaka, S. �QRPp1-1: User-Level QoS Assessment of a Multipoint-to-Multipoint TV Conferencing Application over IP Networks� Published in: Global Telecommunications Conference, 2006. GLOBECOM `06. IEEE Date of Conference: Nov. 27 2006-Dec. 1 2006 Page(s): 1 � 6.
[14] Taher, L. ; Dept. of Comput. Sci., Sharjah Univ., United Arab Emirates ; Basha, R. ; El Khatib, H. �Establishing association between QoS properties in service oriented architecture� Published in: Next Generation Web Services Practices, 2005. NWeSP 2005. International Conference on Date of Conference: 22-26 Aug. 2005 Print ISBN: 0-7695-2452-4.
Citation
P. Sangeetha, R. Mala, "Cross-Layer arrangement for Wireless Mesh Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.85-89, 2014.
Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.90-99, Sep-2014
Abstract
Ad hoc networks, such as device and moveable ad hoc networks, necessity overwhelmed a myriad of care examinations to realize their possible in composed civil and armed applications. Typically, ad hoc nets are prearranged in un-trusted environments. Consequently, verification is a precursor to any safe connections in these networks. Recently, frequent verification procedures consume remained future for ad hoc networks. To date, there is no communal outline to assess these protocols. In the direction of emerging such a framework, this newspaper proposes a general verification procedure and a new taxonomy that clarifies resemblances and changes amid verification procedures stated in the literature. The taxonomy is based upon the role of nodes in the verification function, founding of credentials, and type of credentials. We also inspire the essential for a verification group building and deliberate certain exposed investigation issues.
Key-Words / Index Term
Authentication, net Security, procedure Taxonomy, ad hoc Networks, Credentials
References
[1] Xuguang Ren ; Coll. of Inf. Sci. & Technol., Jinan Univ., Guangzhou, China ; Xin-Wen Wu, �A novel dynamic user authentication scheme�, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 713 � 717
[2] Jinwei Wang ; 28th Res. Inst, CETC, Nanjing ; Shiguo Lian ; Guangjie Liu, �On the analysis and design of secure multimedia authentication scheme�, Published in: Communications and Networking in China, 2008. ChinaCom 2008. Third International Conference on Date of Conference: 25-27 Aug. 2008 Page(s): 1298 � 1302
[3] Shen-Ho Lin ; Dept. of Electr. Eng., Chang Gung Univ., Taiwan ; Jung-Hui Chiu ; Sung-Shiou Shen, �The Iterative Distributed Re-authentication Scheme Based on EAP-AKA in 3G/UMTS-WLAN Heterogeneous Mobile Networks� Published in: Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on Date of Conference: 4-6 Nov. 2010 Page(s): 429 � 434
[4] Qing Li ; Wireless Inf. Network Lab. (WINLAB), Rutgers Univ., Piscataway, NJ, USA ; Trappe, W. �Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security� Published in: Information Forensics and Security, IEEE Transactions on (Volume:1 , Issue: 2 ) Date of Publication: June 2006 Page(s): 190 � 204
[5] Bachan, P. ; Electron. & Commun. Engig. Dept., GL A Group of Instn., Mathura, India ; Singh, B. �Performance evaluation of authentication protocols for IEEE 802.11 standard� Published in: Computer and Communication Technology (ICCCT), 2010 International Conference on Date of Conference: 17-19 Sept. 2010 Page(s): 792 � 799
[6] Javed, A. ; Horst Gortz Inst. for IT Security, Ruhr-Univ. Bochum, Bochum, Germany ; Bletgen, D. ; Kohlar, F. ; Durmuth, M. more authors �Secure Fallback Authentication and the Trusted Friend Attack� Published in: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on Date of Conference: June 30 2014-July 3 2014 Page(s): 22 � 28
[7] Dinesha, H.A. ; CORI, Bangalore, India ; Agrawal, V.K. �Multi-level authentication technique for accessing cloud services� Published in: Computing, Communication and Applications (ICCCA), 2012 International Conference on Date of Conference: 22-24 Feb. 2012 Page(s): 1 � 4
[8] Fang Lan ; Dept. of Network Res., Inst. of Syst. Eng., Beijing, China ; Wang Chunlei ; Ma Guoqing, �A framework for network security situation awareness based on knowledge discovery� Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:1 ) Date of Conference: 16-18 April 2010 Page(s): V1-226 - V1-231
[9] Wu Kehe ; Dept. of Comput. Sci. & Technol., North China Electr. Power Univ., Beijing, China ; Zhang Tong ; Li Wei ; Ma Gang, �Security Model Based on Network Business Security� Published in: Computer Technology and Development, 2009. ICCTD `09. International Conference on (Volume:1 ) Date of Conference: 13-15 Nov. 2009 Page(s): 577 � 580
[10] Zhihu Wang ; Guangxi Econ. Manage. Cadre Coll., Nanning, China, �Design and realization of computer network security perception control system� Published in: ommunication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on Date of Conference: 27-29 May 2011 Page(s): 163 � 166
[11] Rongrong Xi ; Inst. of Comput. Technol., Beijing, China ; Shuyuan Jin ; XiaoChun Yun ; YongZheng Zhang, �CNSSA: A Comprehensive Network Security Situation Awareness System� Published in: Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on Date of Conference: 16-18 Nov. 2011 Page(s): 482 � 487
[12] Xiaoyan Li ; Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Qingxian Wang ; Lin Yang ; Xiangyang Luo, �The Research on Network Security Visualization Key Technology� Published in: Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on Date of Conference: 2-4 Nov. 2012 Page(s): 983 � 988
[13] Bhandari, P. ; Doaba Coll., Jalandhar, India ; Gujral, M.S. �Ontology based approach for perception of network security state� Published in: Engineering and Computational Sciences (RAECS), 2014 Recent Advances in Date of Conference: 6-8 March 2014 Page(s): 1 � 6
[14] Zhiyong Lu ; LEETC, Luoyang, China ; Yunyan Zhou, �The Evaluation Model for Network Security� Published in: Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on Date of Conference: 7-9 April 2014 Page(s): 690 � 694
[15] Songmei Zhang ; Sch. of Comput. Sci. & Eng., Beihang Univ., Beijing, China ; Shan Yao ; Xin`en Ye ; Chunhe Xia, �A Network Security Situation Analysis framework based on information fusion� Published in: Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International (Volume:1 ) Date of Conference: 20-22 Aug. 2011 Page(s): 326 � 332
[16] Beydoun, K. ; Dept. of Comput. Sci., Lebanese Univ., Hadath, Lebanon ; Felea, V. �WSN hierarchical routing protocol taxonomy� Published in: Telecommunications (ICT), 2012 19th International Conference on Date of Conference: 23-25 April 2012 Page(s): 1 � 6
[17] Kelly, D. ; Human Effectiveness Directorate, Air Force Res. Lab., Wright-Patterson AFB, OH, USA ; Raines, R. ; Baldwin, R. ; Grimaila, M. more authors �Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics� Published in: Communications Surveys & Tutorials, IEEE (Volume:14 , Issue: 2 ) Date of Publication: Second Quarter 2012 Page(s): 579 � 606
[18] Syverson, P. ; Naval Res. Lab., Washington, DC, USA, �A taxonomy of replay attacks [cryptographic protocols]� Published in: Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings Date of Conference: 14-16 Jun 1994 Page(s): 187 � 191
[19] Ramalho, M. ; Alcatel Corp. Res. Centre, Antwerp, Belgium, �Intra- and inter-domain multicast routing protocols: A survey and taxonomy� Published in: Communications Surveys & Tutorials, IEEE (Volume:3 , Issue: 1 ) Date of Publication: First Quarter 2000 Page(s): 2 � 25
[20] Obraczka, K. ; Inf. Sci. Inst., Univ. of Southern California, Marina del Rey, CA, USA, �Multicast transport protocols: a survey and taxonomy� Published in: Communications Magazine, IEEE (Volume:36 , Issue: 1 ) Date of Publication: Jan 1998 Page(s): 94 � 102
[21] Nan Guo ; Coll. of Inf. Sci. & Eng., Northeastern Univ., Shenyang, China ; Tianhan Gao ; Bin Zhang, �BPVrfy: Hybrid Cryptographic Scheme Based -- Federate Identity Attributes Verification Model for Business Processes� Published in: Availability, Reliability and Security (ARES), 2012 Seventh International Conference on Date of Conference: 20-24 Aug. 2012 Page(s): 417 � 424
[22] Chun-Hong Jiang ; Dept. of Electron. Eng., Tsinghua Univ., Beijing, China ; Guang-da Su, �Information fusion in face and fingerprint identity verification system� Published in: Machine Learning and Cybernetics, 2004. Proceedings of 2004 International Conference on (Volume:6 ) Date of Conference: 26-29 Aug. 2004 Page(s): 3529 - 3535 vol.6
[23] Slomovic, A. �Privacy Issues in Identity Verification� Published in: Security & Privacy, IEEE (Volume:12 , Issue: 3 ) Date of Publication: May-June 2014 Page(s): 71 � 73
[24] Junhua Chen ; Sch. of Comput. Sci. & Technol., Beijing Inst. of Technol., Beijing ; Wu Peng �A Zero-Knowledge Identity Verification Protocol Using Blind Watermark� Published in: Computer Engineering and Technology, 2009. ICCET `09. International Conference on (Volume:2 ) Date of Conference: 22-24 Jan. 2009 Page(s): 496 � 498
[25] Songwei Wang ; R&D Inst. of Integrated Meas. & Control, Dalian Polytech. Univ., Dalian, China ; Changwu Li ; Jian Liu ; Zhisen Wang, �Design of identity verification unit and management system� Published in: Communication Technology and Application (ICCTA 2011), IET International Conference on Date of Conference: 14-16 Oct. 2011 Page(s): 792 � 795
[26] Shen, T.W. ; Dept. of Biomed. Eng., Wisconsin Univ., Madison, WI, USA ; Tompkins, W.J. ; Hu, Y.H. �One-lead ECG for identity verification� Published in: Engineering in Medicine and Biology, 2002. 24th Annual Conference and the Annual Fall Meeting of the Biomedical Engineering Society EMBS/BMES Conference, 2002. Proceedings of the Second Joint (Volume:1 ) Date of Conference: 2002 Page(s): 62 - 63 vol.1
[27] Do Hoon Kim ; Korea Univ., Seoul ; Taek Lee ; Jung, S.-O.D. ; Hoh Peter In more authors, �Cyber Threat Trend Analysis Model Using HMM� Published in: Information Assurance and Security, 2007. IAS 2007. Third International Symposium on Date of Conference: 29-31 Aug. 2007 Page(s): 177 � 182
[28] Zhou Yanbing ; North China Electr. Power Univ., Beijing, China ; Liu Yibing ; Xin Weidong ; Wei Ruiyan, �Trend analysis for gear pitting fault based on the non-Gaussian characteristic� Published in: Intelligent Control and Information Processing (ICICIP), 2011 2nd International Conference on (Volume:2 ) Date of Conference: 25-28 July 2011 Page(s): 1144 � 1148
[29] Trevisan, B. ; Textlinguistics/ Tech., Commun., RWTH Aachen Univ., Aachen, Germany ; Erasme, D. ; Jakobs, E.-M. �Web comment-based trend analysis on deep geothermal energy� Published in: Professional Communication Conference (IPCC), 2013 IEEE International Date of Conference: 15-17 July 2013 Page(s): 1 � 8
[30] Jianguo Cui ; Sch. of Autom., Shenyang Aerosp. Univ., Shenyang, China ; Jianqiang Shi ; Shiliang Dong ; Liying Jiang more authors, �The condition trend analysis of aircraft key components based on D-S evidence theory� Published in: Control and Decision Conference (CCDC), 2012 24th Chinese Date of Conference: 23-25 May 2012 Page(s): 2264 - 2269
Citation
M. Bhuvaneswari, L. VijayaKalyani, "Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.90-99, 2014.
Hadoop Mapreduce Outline in Big Figures Analytics
Research Paper | Journal Paper
Vol.2 , Issue.9 , pp.100-104, Sep-2014
Abstract
As Hadoop is a Substantial scale, exposed basis software design scheme dedicated to adaptable, disseminated, info concentrated processing. Hadoop [1] mapreduce is a software design construction for professionally composing requisitions which prepare boundless events of info (multi-terabyte info sets) in parallel on extensive bunches (many hubs) of merchandise fittings in a dependable, shortcoming tolerant way. A mapreduce [6] skeleton comprises of two parts. They are "mapper" and "reducer" which consume remained inspected in this paper. Fundamentally this newspaper saves tabs on mapreduce adapting model, preparation undertakings, overseeing and re-execution of the fizzled assignments. Workflow of mapreduce is designated in this exchange.
Key-Words / Index Term
Framework, HDFS, Mapreduce, Shuffle, Workflow
References
[1] Yuan Bao ; Lei Ren ; Lin Zhang ; Xuesong Zhang ; Yongliang Luo �Massive sensor data management framework in Cloud manufacturing based on Hadoop� Industrial Informatics (INDIN), 2012 10th IEEE International Conference on Publication Year: 2012 , Page(s): 397 - 401
[2] Abbasi, A. ; Khunjush, F. ; Azimi, R. �A preliminary study of incorporating GPUs in the Hadoop framework� Computer Architecture and Digital Systems (CADS), 2012 16th CSI International Symposium on Publication Year: 2012 , Page(s): 178 � 185
[3] R.K. ; Manimegalai, R. ; Kumar, S.S. �Medical Image Retrieval System in Grid Using Hadoop Framework Grace�, Computational Science and Computational Intelligence (CSCI), 2014 International Conference on Volume: 1 Publication Year: 2014 , Page(s): 144 � 148
[4] Tomar, Anuradha ; Bodhankar, Jahnavi ; Kurariya, Pavan ; Jain, Priyanka ; Lele, Anuradha ; Darbari, Hemant ; Bhavsar, Virendrakumar C. �Translation Memory for a Machine Translation System Using the Hadoop Framework� Advances in Computing and Communications (ICACC), 2014 Fourth International Conference on Publication Year: 2014 , Page(s): 203 � 207
[5] Lan Huang ; Wang Xiao-wei ; Zhai Yan-dong ; Bin Yang �Extraction of User Profile Based on the Hadoop Framework Wireless Communications�, Networking and Mobile Computing, 2009. WiCom `09. 5th International Conference on Publication Year: 2009 , Page(s): 1 - 6
[6] Therdphapiyanak, J. ; Piromsopa, K. �An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework� Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2013 10th International Conference on Publication Year: 2013 , Page(s): 1 � 6
[7] Sethi, Priyanka, Kumar, Prakash �Leveraging hadoop framework to develop duplication detector and analysis using Mapreduce, Hive and Pig� Contemporary Computing (IC3), 2014 Seventh International Conference on Publication Year: 2014 , Page(s): 454 � 460
[8] Jai-Andaloussi, S. ; Elabdouli, A. ; Chaffai, A. ; Madrane, N. ;Sekkaki, A. �Medical content based image retrieval by using the Hadoop framework� Telecommunications (ICT), 2013 20th International Conference on Publication Year: 2013 , Page(s): 1 � 5
[9] Hui Li ; Chunmei Liu �Prediction of protein structures using a map-reduce Hadoop framework based simulated annealing algorithm� Bioinformatics and Biomedicine (BIBM), 2013 IEEE International Conference on Publication Year: 2013 , Page(s): 6 � 10
[10] Weikuan Yu ; Yandong Wang ; Xinyu Que �Design and Evaluation of Network-Levitated Merge forHadoop Acceleration� Parallel and Distributed Systems, IEEE Transactions on Volume: 25 , Issue: 3 Publication Year: 2014 , Page(s): 602 � 611
[11] Shen Li ; Shaohan Hu ; Shiguang Wang ; Lu Su ; Abdelzaher, T. ;Gupta, I. ; Pace, R. �WOHA: Deadline-Aware Map-Reduce Workflow Scheduling Framework over Hadoop Clusters Distributed Computing Systems (ICDCS)�, 2014 IEEE 34th International Conference on Publication Year: 2014 , Page(s): 93 � 103
[12] Lightweight workflow engine based on HADOOP and OSGI Shengmei Luo ; Lixia Liu ; Juan Yang ; Di Zhang Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on Publication Year: 2013 , Page(s): 262 � 267
[13] Wenjun Wu ; Hui Zhang ; Yaokuan Mao ; Liang Luo GreenPipe,�A Hadoop Based Workflow System on Energy-efficient Clouds� Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2012 IEEE 26th International Publication Year: 2012 , Page(s): 2211 - 2219
[14] Sethi, M. ; Sachindran, N. ; Raghavan, S. �SASH: Enabling continuous incremental analytic workflowson Hadoop Data Engineering (ICDE), 2013 IEEE 29th International Conference on Publication Year: 2013 , Page(s): 1219 � 1230
[15] Gattiker, A. ; Gebara, F.H. ; Hofstee, H.P. ; Hayes, J.D. ; Hylick, A. �Big Data text-oriented benchmark creation for Hadoop� IBM Journal of Research and Development Volume: 57 , Issue: 3/4 Publication Year: 2013 , Page(s): 10:1 - 10:6
[16] Liu, Yewei ; Xiao, Guirong ; Wu, Jianwei ; Lin, Jianfeng CSWf: A cloud service workflow system Information Science and Technology (ICIST), 2013 International Conference on Publication Year: 2013 , Page(s): 408 � 413
[17] Zhuoyao Zhang ; Cherkasova, L. ; Boon Thau Loo Getting more for less in optimized MapReduce workflows Integrated Network Management (IM 2013), 2013 IFIP/IEEE International Symposium on Publication Year: 2013 , Page(s): 93 � 100
[18] Altintas, I.�Workflow-driven programming paradigms for distributed analysis of biological big data� Computational Advances in Bio and Medical Sciences (ICCABS), 2013 IEEE 3rd International Conference Publication Year: 2013 ,
Page(s): 1-5
[19] Rongrong Gu ; Shaochun Wu ; Han Dong ; Yongquan Xu ; Gaozhao Chen ; Lingyu Xu A Modeling Method of Scientific Workflow Based on Cloud Environment Computer and Information Science (ICIS), 2012 IEEE/ACIS 11th International Conference on Publication Year: 2012 , Page(s): 31 � 36
[20] Tudoran, R. ; Costan, A. ; Rad, R.R. ; Brasche, G. ; Antoniu, G. �Adaptive file management for scientific workflows on the Azure cloud Big Data�, 2013 IEEE International Conference on Publication Year: 2013 , Page(s): 273 - 281
[21] Jingui Li ; Xuelian Lin ; Xiaolong Cui ; Yue Ye �Improving the Shuffle of Hadoop MapReduce Cloud Computing Technology and Science (CloudCom)�, 2013 IEEE 5th International Conference on Volume: 1 Publication Year: 2013 , Page(s): 266 � 273
[22] Yandong Wang ; Cong Xu ; Xiaobing Li ; Weikuan Yu �JVM-Bypass for Efficient Hadoop Shuffling� Parallel & Distributed Processing (IPDPS), 2013 IEEE 27th International Symposium on Publication Year: 2013 , Page(s): 569 � 578
[23] Mandal, A. ; Yufeng Xin ; Baldine, I. ; Ruth, P. ; Heerman, C. ; Chase, J. ; Orlikowski, V. ; Yumerefendi, A. �Provisioning and Evaluating Multi-domain Networked Clouds for Hadoop-based Applications Cloud Computing Technology and Science (CloudCom)�, 2011 IEEE Third International Conference on Publication Year: 2011 , Page(s): 690 - 697
[24] Wasi-Ur-Rahman, M. ; Islam, N.S. ; Xiaoyi Lu ; Jose, J. ; Subramoni, H. ; Hao Wang ; Panda, D.K.D. �High-Performance RDMA-based Design of HadoopMapReduce over InfiniBand� Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW), 2013 IEEE 27th International Publication Year: 2013 , Page(s): 1908 � 1917
[25] Hadoop Acceleration in an OpenFlow-Based Cluster Narayan, S. ; Bailey, S. ; Daga, A. High Performance Computing, Networking, Storage and Analysis (SCC), 2012 SC Companion: Publication Year: 2012 , Page(s): 535 - 538
Citation
M. Dhivya, D. Ragupathi, V.R. Kumar, "Hadoop Mapreduce Outline in Big Figures Analytics," International Journal of Computer Sciences and Engineering, Vol.2, Issue.9, pp.100-104, 2014.