Version-6 (Nov-Dec 2014)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7 Ver-8
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Approach to Identify Dishonest Nodes Using MAC Protocol in Multihop Cellular Networks |
Country | : | India |
Authors | : | Mr. P.Vijaya Babu Varma || Mrs. Lavanya Pamulaparty || Mr. T. Praveen Kumar |
Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than their own rightful packet for enhancing network performance. It happens due to the availability of some selfish or malicious nodes which do not cooperate in transmission of received packets to honest nodes, which totally reduces the network performance. A fairness issue arises when a selfish/malicious node access the advantage of the honest nodes without providing their contributions to honest nodes which significantly degrades the performance of network and May results in failure of entire communication. In this paper, we are analyzing network performance by using Message Authentication Code (MAC) Based protocol which can identify misbehaving/malicious nodes.MAC uses only........
Keyword: Mobile networks, honest nodes, Symmetric cryptography, node authentication..
[1] Y. Lin and Y. Hsu, "Multihop Cellular: A New Architecture for Wireless Communications," Proc. IEEE INFOCOM, vol. 3, pp. 1273-1282, Mar. 2000.
[2] X. Li, B. Seet, and P. Chong, "Multihop Cellular Networks: Technology and Economics," Computer Networks, vol. 52, no. 9, pp. 1825-1837, June 2008.
[3] C. Gomes and J. Galtier, "Optimal and Fair Transmission Rate Allocation Problem in Multi-Hop Cellular Networks," Proc. Int'l Conf. Ad-Hoc, Mobile and Wireless Networks, Aug. 2009.
[4] H. Wu, C. Qios, S. De, and O. Tonguz, "Integrated Cellular and Ad Hoc Relaying Systems: iCAR," IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless Access Networks," Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | IPv4 to IPv6 Transition Complaint Mediastreaming Using ARM 11 |
Country | : | India |
Authors | : | Manju priya G |
Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently in the transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4 addresses almost completely depleted, the implementation of IPv6 has become a priority for many organizations. However, it is not all that feasible to just switch everything over to IPv6 without some type of transition. This project reconsiders the basic problems and key differences in IPv4-Ipv6 transition. IPv6 transition mechanisms are the technology that facilitates the transition of internet from its initial and current IPv4 infrastructure to the successor addressing and routing system of IPv6 (Internet Protocol Version 6). As IPv4 and IPv6 networks are not directly interoperable, these technologies are designed to permit hosts on either network to participate in networking with the other network. To meet its technical criteria, IPv6 must have a straight forward transition plan from the current IPv4. Internet......
Keywords: IPv4, IPv6, Raspberry pi, Streaming, SIP, Transition, Auto configuration
[1]. Alain Durand (2011) 'Deploying IPv6', IEEE Internet computing Vol. 5, No. 2, pp. 79-81.
[2]. Baker F., Li X, and Bao C. (2011) 'Frame work for IPV4 to IPV6 translation', IETF RFC 6144.
[3]. Chen W.E., Taiwan I. and Ssushien (2012) 'Client based IPv4 to IPv6 transition for session initiation protocol multimedia services in next generation networks', IEEE Internet Computing RFC 2529.
[4]. Clercq J. and Pervost. S. (2007) 'Connecting IPv6 islands over MPLS using provider edge routers', IETF RFC 4798.
[5]. Cynthia E. Martin SI International Reston, VA and Jeffrey (2007) 'Internet Protocol Version 6 (IPV6) security assessment', IEEE Internet Computing RFC 2460..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Audit Services for Data Outsourcing in Clouds |
Country | : | India |
Authors | : | Anuraj C.K |
Abstract: This paper introduce a dynamic audit service for integrity verification of untrusted and outsourced storages. Our audit service is constructed based on the techniques, fragment structure, random sampling, and index-hash table, supporting provable updates to outsourced data and timely anomaly detection. Constructed on interactive proof system (IPS) with the zero knowledge property, our audit service can provide public auditability without downloading raw data and protect privacy of the data. Also, our audit system can support dynamic data operations and timely anomaly detection with the help of several effective techniques, such as fragment structure, random sampling, and index-......
Keywords: Cloud storage, audit service, storage security.
[1]. M. Mowbray, "The Fog over the Grimpen Mire: Cloud Computing and the Law," Technical Report HPL-2009-99, HP Lab., 2009..
[2]. A.A. Yavuz and P. Ning, "BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems," Proc. Ann.Computer Security Applications Conf. (ACSAC), pp. 219-228, 2009.
[3]. H.-C. Hsiao, Y.-H. Lin, A. Studer, C. Studer, K.-H. Wang, H.Kikuchi, A. Perrig, H.-M. Sun, and B.-Y. Yang, "A Study of User-Friendly Hash Comparison Schemes," Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 105-114, 2009.
[4]. A.R. Yumerefendi and J.S. Chase, "Strong Accountability for Network Storage," Proc. Sixth USENIX Conf. File and Storage Technologies (FAST), pp. 77-92, 2007.
[5]. Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau, "Efficient Provable Data Possession for Hybrid Clouds," Proc. 17th ACM Conf. Computer and Comm. Security, pp. 756-758, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification |
Country | : | India |
Authors | : | Kumar Rajpurohit || Rutu Shah || Sandeep Baranwal || Shashank Mutgi |
Abstract: The recent developments in cognitive sciences and Artificial Intelligence has made possible the process of automation in object detection and recognition using various low level visual features used to represent a standard image of an object. Our approach uses analysing the methods used by most intelligent living entities, humans. Humans use the sense of sight and intuition to recognise objects. This paper highlights the methodologies that can be used to identify objects using details such as colour, texture and shape of an image to infer the object.
Keywords: CBVR, Edge Detection, Feature Extraction, Object Identification, Video Segmentation
[1] Shweta Ghodeswar , B.B. Meshram , Content Based Video Retrieval, International Journal of UbiComp (IJU), Vol.3, No.2, April 2012.
[2] Canny Edge Detection 09gr820 March 23, 2009.
[3] Ivica Dimitrovisci, Suzana Loskovska, Gorgi Kakasevki and Inam Chorbev, Video Content Based Retrieval System, The International Conference on "Computer as a tool", September 2012.
[4] Dr.S.Vijayarani, Mrs.M.Vinupriya, Performance Analysis of Canny and Sobel Edge Detection Algorithms in Image Mining, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 8, October 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Proposed Framework for Integrating Stack Path Identification and Encryption Informed by Machine Learning as a Spoofing Defense Mechanism |
Country | : | Kenya |
Authors | : | Anne Kaluvu |
Abstract: Spoofing attacks have been terrorizing the information world for decades; so many methodologies have been formulated to attempt the eradication of these attacks. This study elaborates on a proposed framework for integrating StackPi and Encryption informed by Machine learning as spoofing defense methodologies. IP Spoofing is one of the major tools used by hackers in the internet to mount spoofing attacks and has been difficult to eradicate. Stack Pi uses Path Identification markings to differentiate between spoofed packets and the legitimate packets and in addition encryption is used to apply proper authentication measures that can enhance the speed of detection and prevention of IP spoofed packet. Machine learning incorporated in this framework to address the short comings of StackPi-IP filtering method and thereby increasing its efficiency. The integration of these three methodologies makes an ideal mechanism for eradicating spoof attacks
Keywords: Spoof attacks, Stack Pi, Encryption, Machine Learning
[1]. Linta S. R. and Khan, R. . Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention. Santa Cruz, CA. GRIN Verlag. 2013.
[2]. Linta S. R. and Khan, R. . Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention. Santa Cruz, CA. GRIN Verlag. 2013.
[3]. Wyld D. C, Wozniak M and Chaki. N, Trends in Network and Communications: International Conferences. In Proceedings Volume 197 of Communications in Computer and Information Science, ISSN 1865-0937. Chennai, India. Springer Science & Business Media. 2011.
[4]. Gupta, V & Kavyashree, H. Comparative Study of IP Address Spoofing: Attacks and Their Defense Mechanism. International Journal of Innovative Research and Studies. Vol 2 Issue 5. ISSN 2319-9725. 2013.
[5]. Gupta, V & Kavyashree, H. Comparative Study of IP Address Spoofing: Attacks and Their Defense Mechanism. International Journal of Innovative Research and Studies. Vol 2 Issue 5. ISSN 2319-9725. 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The impact of the attachment implementation in the healthcare domain |
Country | : | Morocco |
Authors | : | Hicham Amine || Abdelouahab Mesnaoui || Safaa Elkhaddam |
Abstract: An "attachment" is any supplemental health documentation needed from a provider to support a specific business process in the Healthcare domain while using electronic exchange within the organization or between healthcare companies and payer and/or providers. The purpose of this study is to enhance the submission of the healthcare transactions by adding an attachment for each transaction. This study includes the submission of medical documentation to support; that includes Health care claims, Appeals, Pre-authorizations for services, Referral authorizations, Enrollee eligibility inquiries and Coordination of benefits. An attachment can be 'solicited' via a request from the provider or 'unsolicited' (sent pro-actively by the provider and not tied to a health plan request.) The majority of Attachments are solicited vs. unsolicited. We can notice a high difference.......
Keywords: Attachment- healthcare- information
[1]. Pawson, R.;The Science of Evaluation: a Realist Manifesto. Sage, London, (2013).
[2]. Federal register; the daily journal of the united state government; health and human department ; (2005).
[3]. Best A., Greenhalgh T., Lewis S., Sau J.E., Carroll, S., Bitz, J.; Large-system transformation in health care: a realist review. Millbank Q. 90, 421- 456, (2012).
[4]. Clark, A.; What are the component of complex interventions? Theorizing approaches to parts, powers and the whole intervention. Soc. Sci. Med. 93, 185-193, (2013).
[5]. Thomson S., Osborn R., Squires D., Jun M., International Profiles of Health Care Systems, The Commonwealth Fund, New York, (2012).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automated Traffic Assistance System |
Country | : | |
Authors | : | Aryadip Sarkar |
Abstract: In this paper we have described the design and implementation concept of an automated traffic assistance system. In our project we are trying to recover the common problems that everyone faces most of the days in this congested society with heavy traffic movements. We have tried to make the support system fully automated rather than the manual control. We thought to use of the Traffic Signal Lights as the server and the vehicles moving towards the signals as clients and clients can communicate with the server via wireless communication. Clients can make queries like the route for a specific destination......
....
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Advanced Client Repudiation Diverge Auditor in Public Cloud |
Country | : | India |
Authors | : | Ms.Nita R. Mhaske || Prof. S.M.Rokade |
Abstract: With data storage and sharing services provided by cloud , people work together by sharing data as a group . After creating group and shared data in the cloud user in the group is able to access and modified and also share the latest updated data with the rest of the group . To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is repudiated from the group, the blocks which were previously signed by this repudiated user must be re-signed by an.....
Keywords: Diverge auditing, shared data, user repudiation, cloud computing.
[1]. B. Wang, B. Li, Member, H. Li, ―Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud ― in the Proceedings of IEEE INFOCOM 2014, 2014
[2]. B. Wang, B. Li, and H. Li, ―Public Auditing for Shared Data with Efficient User Revoation in the Cloud,‖ in the Proceedings of IEEE INFOCOM 2013, 2013, pp. 2904–2912.
[3]. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, an M. Zaharia, ―A View of Cloud Computing,‖ Communications of the ACM, vol. 53, no. 4, pp. 50–58, Apirl 2010.
[4]. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable Data Possession at Untrusted Stores,‖ in the Proceedings of ACM CCS 2007, 2007, pp. 598–610.
[5]. H. Shacham and B. Waters, ―Compact Proofs of Retrievability,‖ in the Proceedings of ASIACRYPT 2008. Springe Verlag,2008,pp. 90–107.