Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.121-124, Feb-2016
Abstract
The network technology which is used to form a communication network by the use of cars as mobile nodes is known as Vehicular Ad-hoc Network (VANET).In VANET, there is a very important and significant role of routing protocols. The protocol helps to find out the performance of all those packets which are received and send between the mobile nodes. In this paper, we consult the performance of routing protocols over Constant Bit Rate data type with the help of Destination-Sequenced Distance Vector routing protocol (DSDV). The main focus of this paper is to compare and examine the best routing protocol so as to secure the network in future. For validate result , DSDV performs with all other evaluated protocols.
Key-Words / Index Term
VANET;MANET;IVC;WIMAX
References
[1] Fernando Terroso-Sáenz, Mercedes Valdés-Vela, Cristina Sotomayor-Martínez, Rafael Toledo-Moreo,and Antonio F. Gómez-Skarmeta “A Cooperative Approach to Traffic Congestion Detection With Complex Event Processing and VANET”, IEEE Transactions on Intelligent Transportation Systems, VOL. 13, NO. 2, JUNE 2012.
[2] Kalpalatha Sankarasubramaniam, Srikanth Subramanian “A Performance Study of Uplink Scheduling in Wimax Network” ICRTIT-2012.
[3] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route Update Mechanism” IEEE 14TH International Conference On High Performance Computing And Communications 2012.
[4] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012.
[5] D. Ben, C. Zehua, W. Yan, and Y. Hui, "An improved AODV routing protocol for VANETs," in Wireless Communications and Signal Processing (WCSP), 2011 International Conference on, 2011, pp. 1-5.
[6] A. K. Bisht, B. Kumar, and S. Mishra, "Efficiency evaluation ofrouting protocols for Vehicular Ad-Hoc Networks using city scenario,"in Computer Communication and Informatics (ICCCI), 2012 International Conference on, 2012, pp. 1-7.
Citation
Richa Mishra and Sachin Choudhari, "Performance Analysis of Mobility Pattern for Vehicular Ad-Hoc Network Using Various Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.121-124, 2016.
Fuzzy Keyword Search over Encrypted Stego in Cloud
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.125-127, Feb-2016
Abstract
Today cloud is a relatively young and booming technological advancement. Cloud services are getting more and more popular these days, from online software to cloud storages like Google drive, one drive, Dropbox, etc. Smartphones and increasing internet connectivity are the main catalyst to this booming industry. The benefits that can be obtained from this technology are many like low cost, low maintenance and many more. Consumers now don’t have to worry about the storage space, now they can subscribe to cloud storage and avail much more data storage capacity at low cost compared to actual hardware. But there are many problems too, security and privacy is one of the major one. In this paper we will propose a solution for this problem in the context of cloud storage. We propose usage of cryptography and steganography. Cryptography converts ordinary information (plain text) into something that doesn’t make sense or incomprehensible information (cipher text). Steganography is concealment of information. Unlike cryptography it doesn’t attract attention, it just appears to be a normal data but within it a sensitive data is hidden. The other problem is data retrieval or searching. We propose using fuzzy logic for this.Fuzzy keyword search incredibly improves framework ease of use by giving back the coordinating data when clients seeking inputs precisely coordinate the predefined keywords or the nearest conceivable coordinating data in view of keyword similitude semantics, when careful match comes up short.
Key-Words / Index Term
Cloud Computing, Fuzzy Keyword Search, Privacy, Cloud Security
References
[1] Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02
[2] Chih-Chung Lu and Shau-Yin Tseng , ”Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter” ,IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’02) 1063-6862/02
[3] “How to base 64” by Randy Charles Morin, www.kbcafe.com
[4] Gunjan Nehru, Puja Dhar, “A Detailed look of Audio Steganography Techniques LSB and Genetic Algorithm Approach”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, January 2012, ISSN (Online): 1694-0814
[5] Jin Li, Qian Wang, Cong Wang, Ning Cao, KuiRen†, and Wenjing Lou, “Fuzzy Keyword Search over Ecrypted Data in Cloud Computing,” IEEE INFOCOM 2010,978-1-4244-5837-0/10
Citation
TanmayDahake, MirsohailShaikh, Vipul Khandeparkar,Neerav Panchal4and Gajanan Bherde, "Fuzzy Keyword Search over Encrypted Stego in Cloud," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.125-127, 2016.
Intelligent Face Recognition
Technical Paper | Journal Paper
Vol.4 , Issue.2 , pp.128-133, Feb-2016
Abstract
Face recognition has been an important and hard problem in computer vision application. Recently, haar cascade method has proven to be an effective method for face recognition. In this thesis, a simple and powerful approach is developed for real time multi face recognition system. A threefold stage application is developed. in the first stage face detection is done by using Haar cascade. In second stage, Haar cascade features are stored in the memory and compare with the data base faces. In third stage the matched database face is recognized for the query face and displayed with recognized face name. The three stages are mentioned as face detection, feature extraction storage & comparison and at last face recognition. The experimental results for real time multiple recognition system is shown and elaborates the benefit of using the described approach.
Key-Words / Index Term
Face detection, Face recognition, Feature extraction, Haar cascade.
References
[1] Y.-F. Yao, X.-Y.Jing, and H.-S. Wong, "Face and palmprint feature level fusion for single sample biometrics recognition," Neurocomputing, Vol.70, pp. 1582-1586, 2007.
[2] J. Zhou, G. Su, C. Jiang, Y. Deng, and C. Li, "A faceand fingerprint identity authentication system based on multi-route detection," Neurocomputing, Vol.70, pp.922-931, 2007.
[3] C. Nastar and M. Mitschke, "Real time face recognition using feature combination," in ThirdIEEE International Conference on Automatic Faceand Gesture Recognition. Nara, Japan, 1998, pp. 312-317.
[4] S. Gong, S. J. McKenna, and A. Psarrou, “Dynamic Vision: From Images to Face Recognition” ImperialCollege Press (World Scientific Publishing Company),
[5] B. Moghaddam and M. H. Yang, "Learning Gender with Support Faces," IEEE Transactions on PatternAnalysis and Machine Intelligence, Vol.24, pp.707-711, 2002.
[6] J. N. K. Liu, M. Wang, and B. Feng, "iBotGuard: an Internet-based intelligent robot security system using invariant face recognition against intruder," IEEETransactions on Systems Man And Cybernetics PartC-Applications And Reviews, Vol.35, pp.97-105, 2005.
[7] R. Brunelli and T. Poggio, "HyperBF Networks for Gender Classification," Proceedings of DARPAImage Understanding Workshop, pp.311-314, 1992.
[8] A. Colmenarez, B. J. Frey, and T. S. Huang, "A probabilistic framework for embedded face and facial expression recognition," in Proceedings of theIEEE Conference on Computer Vision and PatternRecognition, Vol.1. Ft. Collins, CO, USA, 1999, pp. 1592-1597.
[9] Y. Shinohara and N. Otsu, "Facial Expression Recognition Using Fisher Weight Maps," in SixthIEEE International Conference on Automatic Faceand Gesture Recognition, Vol.100, 2004, pp.499-504.
[10] F. Bourel, C. C. Chibelushi, and A. A. Low, "Robust Facial Feature Tracking," in British Machine VisionConference.Bristol, 2000, pp.232-241.
[11] K. Morik, P. Brockhausen, and T. Joachims, "Combining statistical learning with a knowledgebasedapproach -- A case study in intensive care monitoring," in 16th International Conference onMachine Learning (ICML-99). San Francisco, CA, USA: Morgan Kaufmann, 1999, pp.268-277.
[12] S. Singh and N. Papanikolopoulos, "Vision-based detection of driver fatigue," Department of Computer Science, University of Minnesota, Technical report 1997.
[13] D. N. Metaxas, S. Venkataraman, and C. Vogler, "Image-Based Stress Recognition Using a Model- Based Dynamic Face Tracking System," InternationalConference on Computational Science, pp.813-821, 2004.
[14] M. M. Rahman, R. Hartley, and S. Ishikawa, "A Passive AndMultimodal Biometric System for Personal Identification," in International Conferenceon Visualization, Imaging and Image Processing. Spain, 2005, pp.89-92.
Citation
Akram Qureshi and Ashok Kajla, "Intelligent Face Recognition," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.128-133, 2016.
Implementation of OCR Based on Template Matching and Integrating it in Android Application
Technical Paper | Journal Paper
Vol.4 , Issue.2 , pp.134-136, Feb-2016
Abstract
Smart lens is an implementation of OCR in an android application which is an augmented reality meaning application. It uses built in camera on smart phones to quickly scan an image to find and recognize the word and then displays the meaning of the given word on the device’s display. Its main component is optical character recognition (OCR), which is used to identify words in that image and uses a dictionary to provide the meaning. Optical character recognition is an electronic or mechanical process which converts handwritten, typed or printed text into machine encoded text. The desired word is extracted and the word undergoes various processes like filtering, gray scaling, binarization, feature extraction and character recognition. In this paper we present a way to build an OCR which can be used to read the text and thereby integrating it into the android application which will provide the meaning for the word using the inbuilt dictionary.
Key-Words / Index Term
Android application, Augmented reality, Optical Character Recognition (OCR)
References
[1] RavinaMithe, SupriyaIndalkar, NilamDivekar, “Optical Character Recognition”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-1, March 2013.
[2] R. Smith, “An overview of the Tesseract OCR Engine”, Proc 9th Int. Conf. on Document Analysis and Recognition, IEEE, Curitiba, Brazil, Sep 2007, pp629-633.
[3] G.Vamvakas, B.Gatos, N. Stamatopoulos, and S.J.Perantonis,“A Complete Optical Character Recognition Methodology for Historical Documents”, Computational Intelligence Laboratory, Institute of Informatics and Telecommunications, National Center for Scientific Research “Demokritos”, GR-153 10 AgiaParaskevi, Athens, Greece.
[4] Faisal Mohammad, JyotiAnarase, Milan Shingote, Pratik Ghanwat, “Optical Character Recognition Implementation Using Pattern Matching”, International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014.
[5] VeljkoPapiü, ŽeljkoDjuroviü and BrankoKovaþeviü, “OCR Based on ARG Matching Algorithm”, Systems Control Department at the Faculty of Electrical Engineering University of Belgrade Belgrade, 11120, Serbia and Montenegro.
[6] Sang Sung Park, Won Gyo Jung, Young Geun Shin, Dong-Sik Jang, “Optical Character Recognition System Using BP Algorithm”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008.
[7] Karina Toscano, Gabriel Sanchez, Mariko Nakano, Héctor Perez, Makoto Yasuhara, “Cursive Character Recognition System”, Proceedings of the Electronics, Robotics and Automotive Mechanics Conference (CERMA'06) 0-7695-2569-5/06, 2006.
Citation
Aayushi Jain, Nitish Joshi, MayureshKhendkar, "Implementation of OCR Based on Template Matching and Integrating it in Android Application," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.134-136, 2016.
An Implementation of Intrusion Detection System Based on Genetic Algorithm
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.137-141, Feb-2016
Abstract
The intrusion detection downside is turning into a difficult task attributable to the proliferation of heterogeneous networks since the raised property of systems provides larger access to outsiders and makes it easier for intruders to avoid identification. Intrusion observation systems are accustomed detect unauthorized access to a system. By This paper I am going to present a survey on intrusion detection techniques that use genetic rule approach. Currently Intrusion Detection System (IDS) that is outlined as an answer of system security is used to spot the abnormal activities during a system or network. To this point completely different approaches are utilized in intrusion detections, however regrettably any of the systems isn't entirely ideal. Hence, the hunt of improved technique goes on. During this progression, here I even have designed AN Intrusion Detection System (IDS), by applying genetic rule (GA) to expeditiously observe numerous styles of the intrusive activities among a network. The experiments and evaluations of the planned intrusion detection system are performed with the NSL KDD intrusion detection benchmark dataset. The experimental results clearly show that the planned system achieved higher accuracy rate in distinctive whether or not the records are traditional or abnormal ones and obtained cheap detection rate.
Key-Words / Index Term
Intrusion Detection, Genetic Algorithm, NSL KDD, MATLAB
References
[1] R.Elamaran and R.Mala, “A Study on Network Intrusion Detection System (NIDSs) In Virtual Network Structure”, International Journal of Computer Sciences and Engineering (IJCSE), Vol. 03, Issue - 11,November-2015, pp.59 – 164.
[2] Mostaque Md. Morshedur Hassan, LCB College, Maligaon, Guwahati, Assam, India,“Current Studies on Intrusion Detection System, Genetic Algorithm and Fuzzy Logic”, International Journal of Distributed and Parallel Systems, Vol. 4, Issue-2, March-2013,pp.35-47.
[3] Y.Dhanalakshmi and Dr. I. Ramesh Babu, “Intrusion Detection Using Data Mining Along Fuzzy Logic and Genetic Algorithms”, Dept. of Computer Science & Engineering , Acharya nagarjuna University, Guntur, A.P. India International Journal of Computer Science & Network Security (IJCSNS), Vol.8,Issue-2,Februry-2008,pp.27-32.
[4] Zorana Banković, José M. Moya, Álvaro Araujo, Slobodan Bojanić and Octavio Nieto-Taladriz, “A Genetic Algorithm based Solution for Intrusion Detection”, Journal of Information Assurance and Security(JIAS), Vol.4 , Issue-3 ,June-2009, pp.192-199.
[5] Shelly Xiaonan Wu, Wolfgang Banzhaf, “The use of computational intelligence in intrusion detection systems: a review”, Applied Soft Computing, Vol.10, Issue-01, January-2010, pp.1–35.
[6] Mohammad Sazzadul Hoque, Md. Abdul Mukit & Md. Abu Naser Bikas, “An Implementation of Intrusion Detection System using Genetic Algorithm” , Department of Computer Science and Engineering, Shahjalal University of Science and Technology, Sylhet, Bangladesh, International Journal of Network Security and Its Applications (IJNSA),Vol.4,Issue-2,March-2012, pp.109-120.
[7] S Selvakani Kandeeban, and Rengan S Rajesh , Department of Computer Applications, Jaya Engineering College1 Chennai, Tamilnadu, 602 024, India. Dept. of CSE, MS University, Tirunelveli, Tamilnadu, 627 009, India,“Integrated Intrusion Detection System using Soft computing”, International Journal of Network Security, Vol.10, Issue-2, March -2010,pp.87-92.
[8] W. Lu and I. Traore, Department of Electrical and Computer Engineering, University of Victoria, Victoria B.C., Canada “Detecting New Forms of Network Intrusion Using Genetic Programming”, Computational Intelligence, vol. 20, Issue-03, August -2004, pp.475-494.
[9] K. Burbeck & N.Y. Simmin (2007), Department of Computer and Information Science, Linkoping University ,Sweden,“Adaptive Real-Time Anomaly Detection with Incremental Clustering”, Information Security Technical Report, Vol. 12, Issue- 1 ,07-March- 2007,pp.56–67.
[10] T.S. Chou, K.K. Yen & J. Luo , “Network Intrusion Detection Design using Feature Selection of Soft Computing Paradigms”, International Journal of Computational Intelligence, Vol. 4, Issue-3, 2008, pp.196–208.
[11] Bhavani M. Thuraisingham,Latifur Khan, Mamoun Awad , University of Texas at Dallas, Dallas , USA,“A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering”, The International Journal on Very Large Data Bases, Vol.16, Issue-04,October-2007,pp.507–521.
[12] S. M. Aqil Burney,M. Sadiq Ali Khan and Jawed Naseem,Department of Computer Science ,University of Karachi , Pakistan, “Efficient Probabilistic Classification Methods for NIDS”, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8 ,Issue-08 , November-2010, pp.168-172.
[13] Baoyi Wang; Feng Li; Shaomin Zhang, “Research onIntrusion Detection Based on Campus Network”, Intelligent Information Technology Application, Vol.01, 2009, pp.468-471.
Citation
Kamlesh Patel and Prabhakar Sharma, "An Implementation of Intrusion Detection System Based on Genetic Algorithm," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.137-141, 2016.
Crack Detection in Concrete Railway Sleeper
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.143-144, Feb-2016
Abstract
In India, railway transport occupies an important position in providing the needful transport infrastructure to assist needs of a rapidly growing economy. Even though India has one of the largest rail networks in the world, it has not reached the global level in terms of safety and reliability. The major problems which affect safety and reliability are the crack detection done of the structures. These cracks lead to derailments of the tracks which may cause damage to life and property. This paper proposes a solution to the problem of railway sleeper crack detection using various image processing techniques.
Key-Words / Index Term
Crack Detection, Image Processing, Concrete Sleepers
References
[1] The Indian Railways Website. [Online]. Available: http://indianrailways.gov.in/railwayboard/uploads/directorate/stat_econ/IRSP_2013-14/pdf/Statistical_Summary/Summary%20Sheet_Eng.pdf
[2] The Indian Railways Website. [Online]. Available: http://www.indianrailways.gov.in/railwayboard/uploads/directorate/finance_budget/Budget_2015-16/BudgetStatement1516.pdf
[3] Somalraju S., Murali V., Saha G., Vaidehi V., "Robust railway crack detection scheme (RRCDS) using LED-LDR assembly", in Recent Trends In Information Technology (ICRTIT), 2012 International Conference, ISBN: 978-1-4673-1601-9, Page No (477-482), April 19-21, 2012.
[4] Slideshare Website. [Online]. Available: http://www.slideshare.net/mkalaimathi/final-univ-ppt-railway
[5] The Indian Railways Website. [Online]. Available: http://indianrailways.gov.in/railwayboard/view_section.jsp?lang=0&id=0,1,304,366,554
[6] Accidents in Indian Railways. [Online]. Available: https://factly.in/indian-railway-accidents-statistics-review-last-5-years/
Citation
Shruthi Ramesh, Sonali Chavan, Juhi Kankani and Uday Joshi, "Crack Detection in Concrete Railway Sleeper," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.143-144, 2016.
Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.145-150, Feb-2016
Abstract
Mobile Ad hoc Network (MANET) is a new field of communication operating in an extremely unpredictable and dynamic environment. These networks are gaining increasing popularity in recent years because of their ease of deployment. A MANET consists of collection of wireless mobile nodes that are capable of communicating with each other without the use of any network or any centralized administration. In ad hoc networks, routing protocols are challenged with establishing and maintaining multi-hop routes with security in the face of mobility, bandwidth limitation and power constraints. In particular in MANET, any node may be compromise the routing protocol functionality by disrupting the route discovery process. To achieve broad protection and desirable network performance, routing security is unavoidable. In this research work, a secure routing protocol for MANET is designed with the countermeasures to reduce or eliminate different types of security vulnerabilities and attacks. This paper provides routing security to the Ad hoc on demand Distance Vector (AODV) routing protocol by eliminating the threat of Black Hole attack, Wormhole attack, Rushing attack, and Impersonation attack. The proposed solutions are tested using Network Simulator2 (NS2), a scalable network simulator. The performance is studied for in various routing parameters such as packet delivery ratio, average end - to - end delay and routing overhead and are compared with the AODV and DSR. Hence we have known Cryptographic algorithm such as RSA (Rivest Shamir Adleman) Algorithm is used for providing a secure routing between mobile nodes even in the presence of malicious nodes .In brief, this paper presents a counter measure to overcome Black hole attack.
Key-Words / Index Term
Wireless Ad-Hoc Network, Blackhole Attack, Tunnel, Performance Analysis, Routing Protocol, MANET Security
References
[1] Perkins and Royer,E. “Ad-hoc On-Demand Distance Vector Routing,” Second IEEE Workshop on Mobile Computer Systems and Applications, pp. 90-100, February 1999.
[2] Haas, Pearlman, and Samar. ZRP IEFT-MANET DRAFT, 5 Edition, July 2002.
[3] Razak, A. S., Furnell, M. and Brooke, P. J. "Attacks against Mobile Ad-hoc Networks Routing Protocols," 2004.
[4] Sanzgiri. K., LaFlammey, D., Dahilly,B.(2002). Authenticated Routing for Ad hoc Networks, IEEE, 2002
[5] Abbas, S., Merabti, M., Jones, D.L., Kifayat, K., Lightweight Sybil Attack Detection in MANETs, IEEE Systems Journal, Vol. 7, No. 2, 2013
[6] Guan, Q., Yu, F.R., Jiang, S., Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications, IEEE Transactions on vehicular technology, Vol. 61, No. 6, July 2012
[7] Ming-Yang, S. “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Computer communications, Vol.34, No.1, pp.107-117, 2010.
[8] Gupta, S., Gill, S. and Joshi, A. “Analysis of Black Hole Attack on AODV and OLSR Routing Protocols in MANET”, International journal of Computer application, Issue 1, Vol 1, pp. 11 – 19,October 2011.
[9] Zapata, M.G. “ Secure Ad-hoc On-Demand Distance Vector Routing”, Mobile Computing and Communications Review, Volume 6, Number 3, pp. 106 – 107.(2002).
[10] Khalil, Bagchi,S. andShroff,N.B. “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: International Conference on Dependable Systems and Networks (DSN), 2005, pp. 612–621.
[11] Kannhavong,B.,Nakayama,H., Nemoto,Y. and Kato, N.“A Survey Of Routing Attacks In Mobile Ad-hoc Networks”, IEEE Wireless Communications , pp. 85- 91,October 2007.
[12] Putra, S. “An overview of mobile ad hoc networks for the existing protocols and applications”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks, Vol.2, No.1, pp.87-110, 2010.
[13] Rakesh kumar Sahu,Narendra S chaudhari “performance evaluation of ad hoc network under black hole attack 978-1-4673-4805- 8/$31.00, IEEE 2012
[14] Prasad lokulwar* and vivek shelkhe, “Security aware routing protocol for MANET using asymmetric cryptography using RSA algorithm”, BIO-INFO Security Informatics ISSN: 2249-9423 &E-ISSN: 2249-9431, Volume 2, Issue 1, pp.-11-14. 2012.
[15] Kameswari Chebrolu “NS2 Tutorial” Dept. of Computer Science and Engineering, IIT Bombay.
Citation
Meenakshi Jamgade and Vimal Shukla , "Comparative on AODV and DSR under Black Hole Attacks Detection Scheme Using Secure RSA Algorithms in MANET," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.145-150, 2016.
Road-Based Routing Protocol for Vanet Using Sumo and Move
Research Paper | Journal Paper
Vol.4 , Issue.2 , pp.151-155, Feb-2016
Abstract
Vehicular Ad Hoc Network (VANET) is a form of Mobile Ad Hoc Networks (MANET). The field of VANETs started gaining attention in 1980s and it has been an active field of research and development. VANETs provide us with the infrastructure for developing new systems to enhance drivers’ and passengers’ safety and comfort. There are many routing protocols that have been proposed and assessed to improve the efficiency of VANET. Simulator tool has been preferred over outdoor experiment because it is simple, easy and cheap. In this paper, simulation of one of the routing protocols i.e. AODV is done on simulators which allow users to generate real world mobility models for VANET simulations. The Simulation of Urban Mobility (SUMO) and MObility model generator for VEhicular network tools used. MOVE tool is built on top of SUMO which is an open source micro-traffic simulator. Output of MOVE is a real world mobility model and using the simulation of Network Simulator tool and then graphs were plotted using Trace Graph for evaluation. Based on the simulation results obtained, the performance of AODV is analyzed and compared with different node density i.e. 5, 10, 15 and 20 with respect to various parameters like Throughput, Packet size, Packet drops, End to End delay etc.
Key-Words / Index Term
VANET, AODV, SUMO, MOVE, On Board Units
References
[1] J.Hoebeke,I.Moerman, B.Dhoedt and P.Demeester, “An overview of mobile ad-hoc network: Application and challenges” in 43rd European Telecommunications Congress, Ghent, Belgium, 2004.
[2] [Online]. Available: http://www.car-accidents. com / pages / fatal-accident- statistics.html. [Accessed may 2013].
[3] “IEEE P802.11p/D3.0, Draft Amendment for Wireless Access in Vehicular,” 2007.
[4] G. Pei, M. Gerla, and T. Chen, “Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks,” in ICC 2000, New Orleans, 2000.
[5] Ana M. Popescu, Ion G. Tudorache, Bo Peng, A.H. Kemp, “Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks,” in International Journal of Communication Networks and Information Security (IJCNIS), 2012
[6] S. Zeadally, R. Hunt ,Y. S. Chen, A. Irwin, A. Hassan, “Vehicular ad hoc networks (VANETS): status, results, and challenges,” Springer Science Business Media, LLC, 2010.
[7] D. Bertsekas and R.Gallager, Data Networks, Prentice Hall, 1987, pp. 297-333.
[8] “Qualnet Network Simulator,” [Online]. Available: www.scalablenetworks.com.
[9] “Paramics: Microscopic Traffic Simulation,” [Online]. Available: www.paramics-online.com.
[10] “CORSIM: Microscopic Traffic Simulation Model,” [Online]. Available: www.mctrans.ce.ufl.edu/featured/ tsis/version5/corsim.htm.
[11] “OPNET Simulator,” [Online]. www.opnet.com.
[12] M. Greis, “Network Simulator Tutorial”, [Online].
Available: www.isi.edu/nsnam/ns/tutorial/index.html..
[13] “Mobility model generator for Vehicular
networks (MOVE)”.
[14] “Simulation of Urban Mobility (SUMO),”
[Online]. Available: www. sumo.sourceforge.net.
Citation
Devipriya. D and Muruganandam.A, "Road-Based Routing Protocol for Vanet Using Sumo and Move," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.151-155, 2016.
Steganography Using Reversible Texture Synthesis
Review Paper | Journal Paper
Vol.4 , Issue.2 , pp.156-158, Feb-2016
Abstract
We suggest a new way as steganography applying a convertible framework combination. A convertible framework method examine a shorter convertible figure, whichever combine a current convertible figure along a same limited presentation also an approximate area. We unite the framework combination method into steganography to hide unseen information. In opposition to applying an extant mask figure to conceal information, our invention hide the authority framework figure also merge the hidden information completed the procedure of convertible framework. This permits us to passage the convertible information and authority framework againsta steganography authority framework. Our ways suggest three explicit benefits. First, our method suggests the merging sufficiency that is equivalent to the region of the steganography framework figure. Second, a steganalytic invention is not probable to beat our steganographic method. Third, the convertible facility ingrained against our scenario gives performance, whichever admit improving of the authority framework. Exploratory creature have confirmed that our advanced invention can give different characters of merging accommodation, give a optically reasonable framework figure, also reclaim theconnected combination.
Key-Words / Index Term
Information Merging, Instance-Located Suggestion, Convertible, Steganography, Framework, Combination
References
[1] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen,” Computer, vol. 31, no. 2, pp. 26–34, 1998.
[2] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy, vol. 1, no. 3, pp. 32–44, May/Jun. 2003.
[3] A. A. Efros and W. T. Freeman, “Image quilting for texture synthesis and transfer,” in Proc. 28th Annu. Conf. Comput. Graph. Interact. Techn., 2001, pp. 341–346.
[4] K. Xu et al., “Feature-aligned shape texturing,” ACM Trans. Graph., vol. 28, no. 5, 2009, Art. ID 108.
[5] H. Otori and S. Kuriyama, “Data-embeddable texture synthesis,” in Proc.8th Int. Symp. Smart Graph, Kyoto, Japan, 2007, pp. 146–157.
[6] H. Otori and S. Kuriyama, “Texture synthesis for mobile data communications,”IEEEComput.Graph. Appl., vol. 29, no. 6, pp. 74–81, Nov. /Dec. 2009.
Citation
J. SenthilMurugan, G. Hariharan and R. Kirubagaran, "Steganography Using Reversible Texture Synthesis," International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.156-158, 2016.