New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1169-1175, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11691175
Abstract
An ADHOC arranges is an accumulation of remote portable hubs or hosts framing an impermanent system without necessity of any settled framework. In such a domain, to forward a packet from source host to goal have require an on-way host to forward information bundles. ADHOC frameworks rely upon multi-hop guiding from a source to an objective center point or centers. These frameworks have various impediments in light of helplessness of radio interface and its requirements .Problems faced by communication system due to lack security, Attacks has shown that if security is not included in the basic system at the beginning stage, then malicious nodes/users would exploit in the network. With this research work, New Security framework for prevention from suspicious nodes in the mobile ADHOC network is represented. This new security framework will contain efficient approach that will detect, isolate and prevent data from suspicious node by using scattering techniques. This will lead us to propose new security in MANET communication.
Key-Words / Index Term
MANET, Wireless Network, Protocol, Secure Communication, Security
References
[1] Al-Shurman, M., Yoo, S. M., & Park, S. “Black hole attack in mobile ad hoc networks” , In ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference. 2014
[2] Balachandran, R. K., Ramamurthy, B., Zou, X., &Vinodchandran, N, “An efficient key agreement scheme for secure group communications in wireless ad hoc networks” In IEEE ICC. 2005
[3] Capkun, S., Buttyan, L., & Hubaux, J. P. ,”Sector: Secure tracking of node encounters in multi-hop wireless networks.” In ACM workshop on security of ad hoc and sensor networks. 2003
[4] Cordasco, J., & Wetzel, S., “Cryptographic vs. trust-based methods for manet routing security”. Electronic Notes in Theoretical Computer Science, 197(2). 2008
[5] Dabideen, S., & Garcia-Luna-Aceves, J.,”Ordering in time: A new routing approach for wireless networks.” In Proceedings of IEEE MASS. 2010
[6] Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02), ACM, November 2002.
[7] K. Lu, Y. Qian, M. Guizani, and H.-H. Chen, “A framework for a distributed key management scheme in heterogeneous wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 2, 2008.
[8] H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security And Privacy, May 2003.
[9] W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, “A pairwise key predistribution scheme for wireless sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 2, 2005.
[10] D. Liu, P. Ning, and L. I. Rongfang, “Establishing pairwise keys in distributed sensor networks,” ACM Transactions on Information and System Security, vol. 8, no. 1, 2005.
[11] Khatri P, Rajput M, Shastri A, Solanki K, “Performance study of ad-hoc reactive routing protocols” J ComputSci 6(10):1159–1163, 2010
[12] Medadian M, Yektaie MH, Rahmani AM,”Combat with black hole attack in AODV routing protocol in MANET”. In: First asianhimalayas international conference on internet, IEEE Press, New York, 2009
[13] Gwertzman, J.S. and M. Seltzer. “The Case for Geographical Push-Caching” Workshop on Hot Operating Systems. 1995.
[14] Kleinrock, L., “Nomadic Computing (Keynote Address).” In Int. Conf. on Mobile Computing and Networking., Berkeley, CA. 1995
[15] Amir, E., S. McCanne, and H. Zhang. A n Application Level Video Gateway. inA C M Multimedia ‘95. 1995. San Francisco, CA.
[16] Le, M.T., F. Burghardt, and J. Rabaey, ”Software Architecture of the Infopad System.” In Mobidata Workshop on Mobile and Wireless Information Systems, New Brunswick, NJ. 1994
[17] Pasquale, J.C., et al., ”Filter Propagation in Dissemination Trees: Trading Off Bandwidth and Processing in Continuous Media Networks.” In 4th Intl. Workshop on Network and Operating System Support for Digital Audio and Video. 1993.
[18] Clark, D.D. “The Design Philosophy of the DARPA Internet Protocls”. In ACM Sigcomm Symposium. Stanford, CA. 1988
[19] Von Eicken, T., et al.”Active Messages: A Mechanism for Integrated Communication and Computation”. In 19th Int. Symp. on Computer Architecture. Gold Coast, Australia. 1992
[20] Agarwal, A., et al., “The MIT Alewife Machine: Architecture and Performance”. In 22nd Int. Symp. On Computer Architecture (ISCA ‘95). 1995.
[21] O’Malley, S.W. and L.L. Peterson, ”A Dynamic Network Architecture”. ACM Transactions on Computer Systems, 10(2) p. 110-143. 1992
[22] Jones, M. “Interposition Agents: Transparently Interposing User Code at the System Interface”. In 14th ACM Symp. On Operating Systems Principles. Asheville, NC. 1993
[23] Bershad, B., et al. Extensibility, Safety and Performance in the SPIN Operating System. In 15th ACM Symp. On Operating Systems Principles. 1995.
[24] Engler, D.R., M.F. Kaashoek, and J. O’Toole Jr. Exokernel, Operating System Architecture for Application-Level Resource Management”. In 15th ACM Symp. on Operating Systems Principles. 1995.
[25] Borenstein, N. “Email with a Mind of its Own: The Safe-Tcl Language for Enabled Mail.” In IFIP International Conference. Barcelona, Spain. 1994
[26] Gosling, J. and H. McGilton, “The Java Language Environment: A White Paper”, Sun Microsystems. 1995
[27] Gosling, J. “Java Intermediate Bytecodes”, In SIGPLAN Workshop on Intermediate Representations (IR95). San Francisco, CA. 1995
Citation
Priya, Yogesh Kumar, Rahul Rishi, "New Secure Communication Framework for Detection, Prevention & Isolation of Malicious Modes in MANET," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1169-1175, 2018.
Study of Mobile Phone Jammer Technique
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1176-1179, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11761179
Abstract
the following research paper presents an overview of mobile phone jammer technique. It focuses on study of mobile jammer, its components, architecture and different types of jammers. With the increased use of mobile phone it has been observed that and different studies proved that mobile phone caused many accidents. Unnecessary use of mobile phone is creating disturbance in public places. Mobile phones are being used for many unethical purposes. The solution to this problem is the use of mobile jammer. This paper gives clear idea about the use of jammers and how mobile jammer works.
Key-Words / Index Term
Jammers, Mobile, Mobile Jammer, Jammer Devices
References
[1]. S. Jeong, K. Lee, H. Huh, and J. Kang, “Secure Transmission in Downlink Cellular Network with a Cooperative Jammer,” IEEE Wireless Communication Letters”, 2162-2337
[2]. Y. Yang, W.-K. Ma, J. Ge, and P. C. Ching, “Cooperative secure beam forming for AF relay networks with multiple eavesdroppers”, IEEE Signal Process. Lett., Vol. 20, Issue.1, pp. 35–38, Jan. 2013
[3]. S. Zorn, “A power saving jamming system for E-GSM900 and DCS1800 cellular phone networks for search and rescue applications.” 2011 IEEE Topical Conference on Wireless Sensors and Sensor Networks (2011): 33-36.
[4]. D.S. Madara, “Design and Testing of a Mobile-Phone-Jammer”, Innovative Systems Design and Engineering, Vol 7, No 7
[5]. S. Jeong, K. Lee, J. Kang, Y. Baek, and B. Koo, “Cooperative jammer design in cellular network with internal eavesdroppers,” in Proc. 2012IEEE Mil. Comm. Conf., pp. 1–5.
Citation
Waman R. Parulekar, Damini D. Bhingarde, "Study of Mobile Phone Jammer Technique," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1176-1179, 2018.
Attendance System for Face Recognition using GSM module
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1180-1184, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11801184
Abstract
The scenario of our Indian education system in our country has made compulsory for attendance to be recorded in the classroom .Today many Colleges of rural area are facing problem to have a record of attendance in the classroom and our education system in India arises a question to the department for their irresponsibility. Education department also seeks records of all the students which are very difficult to maintain. A keen idea to develop prototype development is to maintain the record of all the students. This led to the development of the project titled face recognition based attendance system using GSM Module exclusively caters to the need of Indian teachers. Face recognition is often referred; person’s face image input through a camera. A face recognition system using the SIFT (Scale invariant feature transform) algorithm was implemented. The algorithm is based on Image features approach which represents a SIFT method in which a small set of significant features are used to describe the variation between face images. Face recognition consists of two steps, firstly at input side camera capture the image. Then match and it with stored database. In the second step if the image is matched then LCD displays the student 1 is present. After that gsm module send a sms to authorize mobile number. The serial communication is used to interface between the GUI in matlab and arduino it allows input data transmission from matlab to arduino Uno. This project is very useful like in military, school, sport, health, industry, security, animal, and other areas.
Key-Words / Index Term
face recognition, GSM module, SIFT algorithm, LCD display, Arduino
References
[1] Musab coskun”face recognition based on convolutional neural network”, IEEE 2017.
[2] Dr Rupali telgad “Efficient secure biometric system by using iris, fingerprint, face”, IEEE 2017.
[3] atuegwu charity”A bimodal biometric student attendance system”,IEEE 3rd interational conference on elecro-technology for national development.2017.
[4] kai lin,qingxiang wu”A facial features matching method with age robutness based on sift algorithm” 4th interational conferences on information science and control engineering,2017.
[5] rekha.e”efficient automated attendance management system based on eigen face recognition”,IEEE, 2017.
Citation
Kirti B Hubballi, Vandana S Bhat, "Attendance System for Face Recognition using GSM module," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1180-1184, 2018.
Cost Based Routing Protocols in WBAN: a Review
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1185-1193, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11851193
Abstract
In the current scenario, Wireless Sensor Networks (WSNs) have become a very essential tool to fix many challenges in real life. One of the major key challenge is healthcare monitoring. Wireless Body Area Networks (WBANs) constitute a key application of WSNs for monitoring the vital sign related data of human body. As the sensors worn on the human body are small in size, energy constrained and with small battery, it necessitates the design of routing protocols for WBANs to improve the energy efficiency for delivering the data from a given node to the sink. There are various factors such as energy, topology, temperature, mobility, radio range of sensors and quality of service that need to be considered while designing routing protocols. The main contribution of this paper is to provide a detailed review of existing cost based energy efficient routing protocols proposed in the literature. A state-of-the-art comparison of the existing Cost based routing protocols on the basis of techniques and various performances parameters is also presented.
Key-Words / Index Term
Wireless Body Area Networks, Routing, Cost Function, Energy efficiency
References
[1] J. Anand, and D. Sethi, “Comparative analysis of energy efficient routing in WBAN”, In Computational Intelligence & Communication Technology (CICT), pp.1-6, 2017.
[2] M.T. Arefin, M.H. Ali and A.F. Haque, “Wireless Body Area Network: An Overview and Various Applications”, Journal of Computer and Communications, Vol.5, Issue.7, pp.53-64, 2017.
[3] A. Kurian and D.R, “A survey on energy efficient routing protocols in wireless body area networks (WBAN)”, In Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1-6, 2017.
[4] R.Kumari, P.Nand, "Recent Research on Wireless Body Area Networks: A Survey ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), Vol.3, Issue.1, PP. 492-503, 2018.
[5] N.Chhabra, "Comparative Analysis of Different Wireless Technologies", International Journal of Scientific Research in Network Security & Communication, Vol.1, Issue.5, PP. 3-4, 2013.
[6] S. Singla, K. Sharma, “A Review Paper on Wireless Body Area Network for Health Care Applications, International Journal of Computer Science and Mobile Computing, Vol.5, Issue.10, pp. 1-10, 2016.
[7] J.I. Bangash, A.H. Abdullah, M.H. Anisi and A.W. Khan, “A survey of routing protocols in wireless body sensor networks”, Sensors, Vol.14, Issue.1, pp. 1322-1357, 2014.
[8] B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester, “A survey on wireless body area networks”, Wireless Networks, Vol.17, Issue.1, pp. 1-18, 2011.
[9] Suman Saroj, Raj Gaurang Tiwari and Pankaj Kumar, "Review of Different Criteria For Designing Routing Protocols", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.22-25, 2015.
[10] S. Movassaghi, M.Abolhasan, J. Lipman, D. Smith and A. Jamalipou, “Wireless body area networks: A survey”, IEEE Communications Surveys & Tutorials, Vol.16, Issue.3, pp. 1658-1686, 2014.
[11] N. Kaur and S. Singh, “Optimized cost effective and energy efficient routing protocol for wireless body area networks, Ad Hoc Networks, Vol.61, Issue.1, pp. 65-84, 2017.
[12] V. Navya, P. Deepalakshmi, “Mobility supported threshold based stability increased throughput to sink using multihop routing protocol for link efficiency in wireless body area networks (M-TSIMPLE)”, In Intelligent Techniques in Control, Optimization and Signal Processing (INCOS), pp. 1-7, 2017.
[13] S.Singh, S.Negi, A. Uniyal, and S.K. Verma, “Modified new-attempt routing protocol for wireless body area network, In Advances in Computing, Communication, & Automation (ICACCA, pp. 1-5, 2016.
[14] N. Javaid, A. Ahmad, Q. Nadeem, M. Imran, and N. Haider, “iM-SIMPLE: iMproved stable increased-throughput multi-hop link efficient routing protocol for Wireless Body Area Networks, Computers in Human Behavior, Vol.51, pp. 1003-1011, 2015.
[15] S. Ahmed, N. Javaid, S. Yousaf, A. Ahmad, M.M. Sandhu, M. Imran, Z.A. Khan, and N. Alrajeh,” Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks, Computers in Human Behavior, Vol.51, pp. 1205-1215, 2015.
[16] S. Ahmed, N. Javaid, M. Akbar, A. Iqbal, Z.A. Khan, and U. Qasim,” LAEEBA: link aware and energy efficient scheme for body area networks, In Advanced Information Networking and Applications (AINA), Vol.51, pp. 435-440, 2014.
[17] Q. Nadeem, N. Javaid, S.N. Mohammad, M.Y. Khan, S. Sarfraz, and M. Gull, “Simple: Stable increased-throughput multi-hop protocol for link efficiency in wireless body area networks, In Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 221-226, 2013.
[18] S. Movassaghi, M. Abolhasan, and J. Lipman, “Energy efficient thermal and power aware (ETPA) routing in body area networks, In Personal Indoor and Mobile Radio Communications (PIMRC), pp. 1108-1113, 2012.
[19] Z.A. Khan, S. Sivakumar, W. Phillips, and N. Aslam, “A new patient monitoring framework and Energy-aware Peering Routing Protocol (EPR) for Body Area Network communication, Journal of Ambient Intelligence and Humanized Computing, Vol.5, Issue.3, pp. 409-423, 2014.
Citation
T. Kaur, N. Kaur, G. Sidhu, "Cost Based Routing Protocols in WBAN: a Review," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1185-1193, 2018.
Information Use Pattern among Medical Professionals in Union Territory of Puducherry
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1194-1199, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.11941199
Abstract
Information Seeking Behavior is one of the important areas in user studies .The motives and purposes of users give rise to information needs and requirements. To satisfy such needs and requirements ,users adopt many ways and means of accessing and searching sources of information .Then they try to acquire necessary information both in regular and in adhoc manner as necessary from these sources. In the act of acquiring information ,the uses or calls upon the sources of predetermined ,thus leading to satisfaction or dissatisfaction in relation to purposes and needs.
Key-Words / Index Term
Information, Medicine, Pudhucherry, Territory
References
[1]. Mgaywa Robert M, “ The use of foreign language journals by social science faculty Of the University of Dar-Es-Salaam,” International Library Movement, 15,(1993): 26-32
[2]. Millson Martual ,C and V. Meneon. “Customer expectations: Concepts and reality for Academic library services,” College and Research Libraries,56, (1995): 37-47.
[3]. Mitra, D.P. “User attitude to microforms in academic libraries,” Library Herald, 22 (1983): 54-59
[4]. Mittra, A., Challenge of periodicals procurement in university libraries.In University Libraries in India; 1980s and beyond,1991, Medallion,New Delhi, 53-63
[5]. Mohinder Singh, “Survey methods in the evaluation of library resources,” Annals of Library Science and Documentation,24, (1977): 154-157.
[6]. Moss, C.D., and A.M.V. Green, “students opinion of the services at a university Library. ASLIB Proceeding ,32, (1980); 161-166.
[7]. Murphy Murcy, Measuring library effectiveness: a prelude to change. In panwar B.S And S.D. Vyas (SD),Ed. Library Management.BR Publishing Corporation, Delhi,(1986): 192-210
[8]. Nandy subodh Gopal, “ Periodical Literature of the University library and their use: A survey report.” International Library Movement 8, (1986): 144-150.
[9]. Narendra Kumar,” Use of periodical literature in Zoology at Delhi University Library System: A Users’ survey IASLIC Bulletin. 30 (1985): 41-54.
[10]. Nelson,J.” Faculty awareness attitude towards academic library reference services;” A measure of communication,College and Research Libraries,34, (1973): 268-270
[11]. Nzotta Briggs C. “ Evaluative study collection,personnel and services of college of Education libraries in Nilgries.”Herald of library science .28,(1989): 305-317.
[12]. Onadiran,G.T., and R.w. Onadiran, Nigerian University Library services: students Opinion ,”Journal of Library and Information Science,11,(1986): 45-50
[13]. Paisley, W.J., “ The Flow of Behvioural Science Information, A Review of the Research Literature.” Poo Alttocal, standard University, 1965.
[14]. Pangannaya,S., and M.R. Ramakrishna Rao, Information gathering Habits of R&D Peronnel, Annals of library Science and Documentation,12, (1993): 28-42
[15]. Panwaar,B.s and S.D. Vyas’ “Users ‘survey of the women college libraries,” Herald Of Library Science,15, (1976): 3-25.
[16]. Paster, A. and B. Osif, “ Great expectations satisfying today’s patrons,” Herald of Libraries,83,(1992): 195-198.
[17]. Patel Jashu, “Evaluation techniques and methods in library science,” Herald of Library Science ,30(1991): 159-167.
[18]. Pelser N. L., etc. “Library use and information seeking behavior of veterinary Students revisited in the electronic environment.” Bulletin of the Medical Library Association ,86,(1998): 346-355.
[19]. Prasad II N , “Information needs and users ,1992,”Indian Bibliographic Centre,Varanasi Prasher R.G .Library Surveys ,Lucknow Librarian,19,(1987): 57-66.
a. Premist,P, “ Information needs of academic medical scientist at Chulalonkorn University,” Bulletin of Medical Library Association.78,(1990): 383-387.
b. Prentice Ann E, “ Information seeking pattern of selected professionals, Public Library quarterly ,’ 2, (1980): 27-28
[20]. Pulla Reddy, V. Job satisfaction of library professional staff, Tirupati, Sri Venkateswara University, Ph.D., (1991), (Unpublished).
[21]. Rajagopal, T.A critical study of information seeking behavior of medical specialities in Madras city (India) ,Tirupathi : Sri Venkateshwara University, 1989,Dissertation.
[22]. Ralinson, H. “ Information Use Pattern of social Scientist,” annals of Library science And Documentation,38, (1995): 32-40
[23]. Ramaiah, C.K. “ Use of Chemistry Periodical literature in a University Library,” ILA Bulletin,24, (1988): 14-36
[24]. Ramesh, D.B., “ User studies ,Tools for evaluation of Special Library,” Annals of Library Science and Documentation,41,(1994).
[25]. Ranganathan,S.R. “ Library Science based Library Service, “ Library Science with a Slant to documentation ,6 (19690: 103-105.
Citation
A. Sampath, "Information Use Pattern among Medical Professionals in Union Territory of Puducherry," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1194-1199, 2018.
Safeguarding Against Reactive Jammers In Wireless Sensor Network
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1200-1204, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12001204
Abstract
Amid the most recent decade, Reactive Jamming Attack has developed as an extraordinary security danger to remote sensor systems, because of its mass devastation to authentic sensor correspondences and trouble to be unveiled and safeguarded. Thinking about the particular qualities of receptive jammer hubs, another plan to deactivate them by proficiently recognizing every single trigger hub, whose transmissions summon the jammer hubs, has been proposed and created. Such a trigger-recognizable proof technique can fill in as an application-layer administration and advantage numerous current receptive sticking protecting plans. In this paper, from one viewpoint, we use a few advancement issues to give an entire trigger-distinguishing proof administration structure for problematic remote sensor systems. Then again, we give an enhanced calculation respect to two refined sticking models, with a specific end goal to upgrade its heartiness for different system situations. Hypothetical investigation and reenactment comes about are incorporated to approve the execution of this structure.
Key-Words / Index Term
Jamming, Transmissions, network optimization, WSN’s
References
[1] Du. D.Z and F. Hwang. F, “Pooling Designs: Group Testing in Molecular Biology”.World Scientific, 2006.
[2] Goodrich .M Atallah .M, and Tamassia .R, “Indexing Information for Data Forensics,” Proc. Third Applied Cryptography and Network Security Conf. (ACNS), 2005.
[3] Gupta .R, Walrand .J, and Goldschmidt .O, “Maximal Cliques in Unit Disk Graphs: Polynomial Approximation,” Proc. Int’l Network Optimization Conf. (INOC), 2005.
[4] Guruswami .V and Rangan .C, “Algorithmic Aspects of Clique- Transversal and Clique-Independent Sets,” Discrete Applied Math., vol. 100, pp. 183-202, 2000.
[5] Hang .W, Zanji .W, and Jingbo .G, “Performance of DSSS Against Repeater Jamming,” Proc. IEEE 13th Int’l Conf. Electronics, Circuits and Systems (ICECS), 2006
[6] Shin .I, Shen .Y, Xuan .Y,Thai .M.T, and Znati .T, “Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: An Efficient Mitigating Measure by Identifying Trigger Nodes,” Proc. Second ACM Int’l Workshop Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2009.
[7] Sidek .O and Yahya .A, “Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment,” Am. J. Applied Sciences, vol. 5, no. 10, pp. 1281-1284, 2008.
[8] Strasser .M, Danev .B, and Capkun .S, “Detection of Reactive Jamming in Sensor Networks,” ACM Trans. Sensor Networks, vol. 7, pp. 1-29, 2010.
[9] Tague .P, Nabar .S, Ritcey .J.A, and Poovendran .R, “Jamming- Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,” IEEE/ACM Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
[10]Wang .H, Guo .J, and Wang .Z, “Feasibility Assessment of Repeater Jamming Technique for DSSS,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007. [10] Wood .A.D, Stankovic .J, and Son .S, “A Jammed-Area Mapping Service for Sensor Networks,” Proc. IEEE 24th Real-Time Systems Symp. (RTSS), 2003.
Citation
Qureshi Hafsa Mohammadi, Raafiya Gulmeher, "Safeguarding Against Reactive Jammers In Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1200-1204, 2018.
A Diplomatic Data Collection in Wireless Sensor Networks using MLEACH Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1205-1210, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12051210
Abstract
Wireless Sensor Networks entitled with Mobile Sinks (WSN-MSs) based routing schemes have been extensively explored to prolong the network lifetime. Data collection is an important issue for sensor nodes as they have limited energy, various routing have been proposed earlier for data collection of both homogeneous and heterogeneous networks. In this research paper, we propose Diplomatic Data collection using Mutated LEACH (DDC-ML) Routing protocol for (WSN-MSs) ensures maximum throughput, minimum delay and packet loss rate. Clustering is an effective approach to increase energy efficient data transmission. The behaviour of our proposed technique is the node that takes the role of Cluster Head (CH) supposing of CH dies. So CH is based on maximum energy. Thus, the proposed activities minimize the overall energy consumption of the network and periodically increase the data transferred to Base Station (BS). Ultimately, DDC-ML performs better than the selected existing techniques in terms of the chosen performance metrics thereby outperforming in large scale sensor networks.
Key-Words / Index Term
Wireless Sensor Networks, Routing protocols, Clustering, Data Collection, Mobile Sink
References
[1] Jun Zheng, Abbas Jamalipour, “Introduction to Wireless Sensor Network”, Networking Perspective, pp. 1-18, 2009.
[2] J.Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Network survey”, “Computer Networks, vol. 52, no.12, pp.2292-2330, 2008.
[3] Neethu M. Nair, A. Felix Arokya Jose, “Survey on Data Collection Methods in Wireless Sensor Networks”, International Journal of Engineering Research & Technology, Vol.2, 2013.
[4] Qing, Li, Zhu, and Qingxin, “Design of a Distributed Energy-Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks”, Computer Communications, vol.29, no.12, pp.2230-2237, 2006.
[5] Basilis Mamalis, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou, “Clustering in Wireless Sensor Networks”, Zhang/RFID and Sensor Networks, pp. 324, 2009.
[6] Seema Bandyopadhyay, Edward J. Coyle, “An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks”, INFOCOM, 2003.
[7] Harneet Kour, Ajay K. Sharma, “Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network”, International Journal of Computer Applications, vol. 4, no.6, pp.0975-8887, 2010.
[8] RitwikBanerjee, Chandan Kr. Bhattacharyya, “Energy Efficient Routing and Bypassing Energy-Hole through Mobile Sink in WSN”, International Conference on Computer Communication and Informatics, 2014.
[9] P. Sasikumar, Sibaram Khara, “K-Means Clustering in Wireless Sensor Networks”, International Conference on Computational Intelligence and Communication Networks, 2012.
[10] Giuseppe Anastasi, Marco Conti, and Mario Di Francesco, “Data Collection in Sensor Networks with Data Mules: an Integrated Simulation Analysis”, Pervasive Computing & Networking Lab.
[11] Long Cheng, Yimin Chen, Canfeng Chen and Jian Ma, “Query-Based Data Collection in Wireless Sensor Networks with Mobile Sinks”, National Natural Science Foundation of China (NSFC), pp.21-24, Jul 2009.
[12] Shuai Gao, Hongke Zhang, and Sajal K. Das, “Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks”, IEEE Transactions on Mobile Computing, Vol. 10, No. 5, APR 2011.
[13]Young Sang Yun, Ye Xia, “Maximizing the Lifetime of Wireless Sensor Networks with Mobile Sink in Delay-Tolerant Applications”, IEEE Transactions on Mobile Computing, Vol. 9, No. 9, Sep 2010.
[14] Dajin Wang,“A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks,” Proc. IEEE Transactions on, Mobile Computing, 2006.
[15] Fan Ye, Haiyun Luo, Jerry Cheng, Songwu Lu and Lixia Zhang, “A Two-Tier Data Dissemination Model for Large-scale Wireless Sensor Networks”, ACM Mobicom, pp. 23-28, Sep 2002.
[16] Junyoung Park, Kyoungjin Moon, Sungjoo Yoo, and Sunggu Lee, “Optimal Stop Points for Data Gathering in Sensor Networks with Mobile Sinks”, Scientific Research, 2012.
[17] Shusen Yang, Usman Adeel, Yad Tahir, and Julie A. McCann, “Practical Opportunistic Data Collection in Wireless Sensor Networks with Mobile Sinks” in IEEE Transactions on Mobile Computing, pp.67-79, 2016.
[18] S. Ahmed, M.M. Sandhu, N. Amjad, A. Haider, M. Akbar, A. Haider, M.Akbar, A. Ahmad, Z. A. Khan, U.Qasim, and N. Javaid, “imod leach: improved modified LEACH Protocol for Wireless Sensor Networks”, Journal of Basic and Applied Scientific Research, pp.25-32, 2013.
[19] Muhammad Imran, Asfandyar khan, and Azween B.Abdullah, “Energy Balancing Through Cluster Head Selection Using K-Theorem in Homogeneous Wireless Sensor Networks”, International Conference on Science & Technology: Applications in Industry & Education, 2008.
[20] Maurizio Bocca, Heikki Koivo, “Kick-Off: An Initialization Procedure for Convergecast in Wireless Sensor Networks”.
[21] David Houcque “Introduction to Matlab for Engineering Students”, 2005.
Citation
A. Rehash Rushmi Pavitra, E. Srie Vidhya Janani, "A Diplomatic Data Collection in Wireless Sensor Networks using MLEACH Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1205-1210, 2018.
Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1211-1215, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12111215
Abstract
Security plays the most crucial role in cloud computing. Since the past years, there is a lot of research is going on security. On the other side of the coin, attackers are exploring, developing themselves drastically and exploiting the vulnerabilities in the cloud. Virtualization technology can be defined as backbone of the Cloud computing. Exploiters are taking the advantage of vulnerabilities in Virtual Machines. Thereby launching DDOS attacks, they can able to compromise virtual machines. Services like Saas, IaaS which helps for support end users may get affected and attackers may launch attacks either directly or by using zombies. Generally, Every Data Centre has their own security policies to deal with the security issues. However, in data centers, all the security policies are commonly been applied to the applications irrespective of their category or security threats that it face. The existing approach may take lots of time and wastage of resources. In this paper, we have developed an approach to segregate the applications as per the type of threats (by adapting detection mechanisms) being faced. Based on the zone in which applications are falling, only the relevant security policies will only be applied. This approach is optimized where we can effectively reduce the latency associated with applying security policies.
Key-Words / Index Term
Virtual Machines,Virtual Machine Types
References
[1]. Arbor Application Brief: “The Growing Threat of Application-Layer DDoS Attacks”.2011.
[2]. Zhang Fu, Marina Papatriantafilou, and Philippas Tsigas “Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts” IEEE Transactions On Dependable And Secure Computing, Vol.9, No.3, May/June 2012.
[3]. Shui Yu, Weijia Jia, Song Guo, Yong Xiang, and Feilong Tang ,“Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient” IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 6, June 2012.
[4]. Ke Li, Wanlei Zhou, Ping Li, Jing Hai and Jianwen Liu, “Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics” Third International Conference on Network and System Security pno: 9-17 .2009.
[5]. Ari, B. Hong, E. L. Miller, S. A. Brandt, and D. D. E. Long, “ Modeling , Analysis and Simulation of Flash Crowds on the Internet,” Storage Systems Research Centre Jack Baskin School of Engineering University of California, Santa Cruz Santa Cruz, CA, ech. Rep. UCSC-CRL -03-15, Feb. 28, 2004 .
Citation
E.S. Phalguna Krishna, G.Mani Kumar, B.Madhu Priya, "Applying Appropriate Security Policies against Threats on Virtual Machines using Multi-Step Approach: A Strategy," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1211-1215, 2018.
A Novel Technique to Detects and Segments Brain Tumor
Research Paper | Journal Paper
Vol.6 , Issue.7 , pp.1216-1219, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12161219
Abstract
The specialist area of medical imaging is gaining significance in the prevalent times due to the ever-increasing need of automated and speedy diagnosis in the shortest period of time. According to the literature available, researchers have suggested that clustering, Fuzzy K-C-Means (FCM), Magnetic Resonance Imaging (MRI), K-means methods are extremely effective for timely detection and segmentation of brain tumor with the help of MRI scanned images. Some of the major limitations of these methods include complexity, ambiguous nature of the fuzzy boundaries, and diversified nature of the infarct areas or regions. This paper proposes a new technique for overcoming these drawbacks or limitations by using Conditional Random Field (CRF) based framework. The suggested method combines the information in Tumor 1 (T1) and FLAIR in probabilistic domain, so that the foreground and back ground are identified. The performance of the proposed method is validated using peal signal to noise ratio, sensitivity, specificity, accuracy, Jacard coefficient and Dice coefficient. CRF based framework is an efficient and simple method that can be incorporated for modelling shapes and for observing the functions of energy.
Key-Words / Index Term
Brain Tumor, MRI Images, Fuzzy C-means clustering, Energy function, Conditional Random Field (CRF).
References
[1]. Vasupradha Vijay, A.R.Kavitha, S.Roselene Rebecca. "Automated Brain Tumor Segmentation and Detection in MRI Using Enhanced Darwinian Particle Swarm Optimization(EDPSO)", Procedia Computer Science, 2016
[2]. C.Hema Sundara Rao, P.V.Naganjaneyulu, K.Satya Prasad." Brain Tumor Detection and Segmentation Using Conditional Random Field", 2017 IEEE 7th International Advance Computing Conference (IACC), 2017
[3]. Navpreet Kaur, Manvinder Sharma. "Brain tumor detection using self-adaptive K-means clustering", 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017
[4]. Heena Hooda, Om Prakash Verma, Tripti Singhal. "Brain tumor segmentation: A performance analysis using K-Means, Fuzzy C-Means and Region growing algorithm", 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014
[5]. Yu Zheng, Like Liu, Long hao wang, Xing Xie. "Learning transportation mode from raw gps data for geographic applications on the web", Proceeding of the 17th international conference on World Wide Web - WWW `08, 2008
[6]. Ahirwar, Anamika. "Study of Techniques used for Medical Image Segmentation and Computation of Statistical Test for Region Classification of Brain MRI", International Journal of Information Technology and Computer Science, 2013.
Citation
P. Nagaveni, Chandra Mohan Reddy Sivappagari, "A Novel Technique to Detects and Segments Brain Tumor," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1216-1219, 2018.
Exploring Internet of Things Applications, Technologies, Challenges in the Cloud and Use of Fog Computing in IoT Devices
Review Paper | Journal Paper
Vol.6 , Issue.7 , pp.1220-1223, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.12201223
Abstract
The main purpose of this critique is to deal with the features of Internet of Things, applications, challenges involved with the storage in cloud with IoT and making IoT to utilize the fog computing. The promising model of this approach is the assimilation of technology with wireless sensor networks, communication protocols and smart objects. The objective of this consideration is focusing on Internet of Things vision and its emerging applications for different domains such as health care sector for continues health monitoring, industrial domain for analyzing water quality, home and office security door systems, city traffic controlling system, agriculture domain for soil monitoring application, and Challenges in the traditional network architecture. The major challenges are latency problem and slow response due to voluminous and variety of data handled while using cloud with IoT devices. The proposed solution is connecting the nearby IoT Devices using Fog nodes along with cloud will avoid the latency problem in the cloud.
Key-Words / Index Term
Fog computing, IoT, Cloud computing
References
[1] R. P. Ram Kumar,Hima Sampathrao, Vijay Kumar Burugari, Sanjeeva Polepaka, “Applications Domains of Internet of Things: A Survey” International Journal of Engineering Technology Science and Research, Volume 3, Issue 10, PP.54-59, October 2016.
[2]Partha Pratim Ray, “Understanding the role of internet of things towards smart e-health care services”, Biomed Res- India 2017, Vol.28, No.2, PP.1-6.
[3] S. Nazeem Basha, S.A.K. Jilani, Mr.S. Arun, “An intelligent door system using Raspberry Pi ans Amazon Web Services in IoT”, International Journal of Engineering Trends and Technology, Vol.33, No. 2, PP.84-89, March 2016.
[4] Shailaja.M.Gunda Nikkam, V. R. Pawar , “Analyzing water quality for industrial application under IoT environment”, International Research Journal of Engineering and Technology, Vol.3, No.4, PP.882-885, April 2016.
[5] Ms. Supriya Chandrakant Padwal, Mr. Suraj Vishnu Kurde, “Long-Term environment monitoring for IoT applications using Wireless Sensor Network”, International Journal of Engineering Technology, Management and Applied Sciences, Vol.4, No.2, PP.50-55, February 2016,
[6] S.Sivagami, D.Revathy, L.Nithyabharathi, “Smart Health care System Implemented using IoT”, International Journal of Contemporary Research in Computer Science and Technology, Vol.2, No.3, PP.641-646, March 2016.
[7] Hon Fong Chong, Danny Wee Kiat Ng, “Development of Iot Device for Traffic Management System”, 2016 IEEE Student Conference on Research and Development (SCOReD),2016,
[8] Yashashree Joshi, Ashwini Joshi, Neha Tayade , Priyanka Shinde , Prof. S.M. Rokade, “IoT Based Smart Traffic Density Alarming Indicator”, International Research Journal of Engineering and Technology, Vol.03, No.10, PP.1086-1089, October 2016.
[9] Pooja Kanase, Sneha Gaikwad, “Smart Hospitals Using Internet of Things (IoT)”, International Research Journal of Engineering and Technology, Vol.3, No.3, PP.1735-1737, March 2016.
[10] Kai Ding, Pingyu Jiang, “RFID-based Production Data Analysis in an IoT-enabled Smart Job-shop”, IEEE/CAA JOURNAL OF AUTOMATICA SINICA, PP.1-11, 2016.
[11] A. Imtar Chaudary [2016], “Towards the Development of an Efficient and Cost Effective Intelligent Home System Based on the Internet of Things”, International Journal of Computer Science and Information Security, Vol.16, No.6, PP.343-350, June 2016.
[12] Mantripatjit Kaur, Anjum Mohd Aslam, “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, PP.81-85, June 2018
Citation
D. Gajalakshmi, "Exploring Internet of Things Applications, Technologies, Challenges in the Cloud and Use of Fog Computing in IoT Devices," International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1220-1223, 2018.