IOSR Journal of Computer Engineering (IOSR-JCE)

Nov - Dec 2018 Volume 20 - Issue 6

Version 1 Version 2 Version 3

Paper Type : Research Paper
Title : Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
Country : India
Authors : Mr. P. Daniel Sundar Raj || Dr. K. Arulanandam
: 10.9790/0661-2006010105     logo

Abstract: When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control or centralized administrationis not in this network. Wireless Ad-hoc networks are organized and configured in self mode. Each and every node in this network is set up using a wireless transmitter and a wireless receiver. The networktransmits data with other nodes in its communication range only. When the data are transmitted, the nodes communicate with each other usinga common physical media. The nodes send and receive signals using the same frequency band and by doing so, it follows the same hopping method. If the receiving node is not inside the transmission range.........

 

Keyword: Network Security, Plaintext, Cipher Text, Cryptology, Multi-level Encryption, Decryption

[1]. Here we have mentioned various references from which we actually collected our problem and Also found the solution for our
problem.
[2]. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE
[3]. L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile
Networks and Applications, vol. 8, no. 5, 2003.
[4]. K. Balakrishnan is with the Security Services Group, Deloitte and Touche LLP, 1750 Tysons Boulevard, Suite 800, McLean, VA
22102. E-mail: kbalakrishnan@deloitte.com.
[5]. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug.
2000..


Paper Type : Research Paper
Title : Energy Consumption Algorithms on Green Computing Technology
Country : India
Authors : D. Jasmine Priskilla
: 10.9790/0661-2006010608     logo

Abstract: Green computing is the eco-friendly technology for the environmentally responsible of computers and their resources usage. Green computing is also defined as the way that reduces their environmental impact on study of designing, engineering, and manufacturing, using and disposing of computing devices.The data centre includes all the aspects of energy usage in an efficient manner from the IT equipment to the HVAC (Heating, ventilation and air conditioning) equipment of actual construction of the labs and offices.Green computing concept is introduced in 1992, by the Environmental Protection Agency (EPA) in the Energy Star Program. Many IT companies are trying to invent the energy-efficient computing devices for reducing the wastages and improving the recycle techniques in the creation of digital devices.Green Computing, additionally called green innovation, is the earth dependable utilization..........

 

Keywords–Green computing, computing energy conservation, energy efficiency data

[1]. "Best Practices Guide for Energy-Efficient Data Center Design", prepared by the National Renewable Energy Laboratory for the U.S. Department of Energy, Federal Energy Management Program, March 2011.

[2]. Alonso, Pedro, "Improving power efficiency of dense linear algebra algorithms on multi-core processors via slack control", IC on High Performance Computing and Simulation (HPCS), 2011,PP 463- 470.

[3]. Krongold, Brian Scott, "Computationally efficient optimal power allocation algorithms for multicarrier communication systems", Communications, IEEE Transactions on Jan 2000, pp 23-27.

[4]. Jianlizhuo and chaitalichakrabarti "Energy-Efficient Dynamic Task Scheduling Algorithms for DVS Systems", ACM Journal Name, Vol. V, No. N, Month 20YY, Pages 1– 22.
[5]. EPA: ENERGY STAR Program. Report to Congress on Server and Data Center Energy Efficiency. Technical report, United States Environmental Protection Agency (2007).


Paper Type : Research Paper
Title : A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography
Country : India
Authors : S.Uma Mageshwari || Dr. R.Santhi
: 10.9790/0661-2006010911     logo

Abstract: Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. Using keys, data can be encryted( plaintext to ciphertext) and decrypted( ciphertext to original text).While transmitting data in a network, it should be safeguard from third party. The unique identification of key helps us to transmit data in a secured manner as well as an intruder not able to identify the key.The keys shows an important role in keeping the information confidential. This paper highlights the significance of keys , Diffie – Hellman algorithm with sample output and basics of Elliptic Curve Cryptography

 

Keywords–Diffie Hellman, ECC, Key.

[1]. Cryptography and Network Security – William Stallings, Fourth Edition, PHI,2006.
[2]. https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties.
[3]. https://security.stackexchange.com/questions/46802/what-is-the-difference-between-dhe-and-ecdh
[4]. Certicom,https://www.certicom.com/ecc
[5]. Elliptic Curve Cryptography: a gentle introduction, http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/


Paper Type : Research Paper
Title : Security Issues and Attacks in Wireless Sensor Network
Country : India
Authors : M.Sujatha
: 10.9790/0661-2006011215     logo

Abstract: Remote sensor arranges is a standout amongst the most developing innovation for detecting and playing out the distinctive undertakings. Such systems are valuable in numerous fields, for example, crises, wellbeing observing, ecological control, military, enterprises and these systems inclined to vindictive clients' and physical assaults because of radio scope of system, un-confided in transmission, unattended nature and get to effectively. Security is a crucial prerequisite for these systems. In this paper, our focal point of consideration is on physical assaults and issues in remote sensor systems. Through this audit, effectively recognize the reason and capacities of the aggressors. Further, we talk about surely understood methodologies of security recognition against physical assaults.

 

Keywords–Remote sensor, Security, Transmission, Numerous

[1]. Haboub, R. and M. Ouzzif, 2011. Secure Routing IN WSN. International Journal, pp: 2.
[2]. Jain, M.K., 2011. Wireless sensor networks: Security issues and challenges. International Journal of Computer and Information Technology, 2(1): 62-67.
[3]. Singh, S.K., M. Singh and D. Singhtise, 2011. A survey on network security and attack defense mechanism for wireless sensor networks. Int. J. Comput. Trends Tech, pp: 5-6.
[4]. Deng, J., R. Han and S. Mishra, 2005. Defending against path-based DoS attacks in wireless sensor networks. in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. ACM.
[5]. Ning, P., A. Liu and W. Du, 2008. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(1): 1/


Paper Type : Research Paper
Title : Steganography Techniques Used To Hide the Information
Country : India
Authors : K.Priya
: 10.9790/0661-2006011619     logo

Abstract: Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which only conceals the content of the message not the continuation of the message. Original message is being hidden within a file such that the changes so occurred in the file are not noticeable. To hide the secret information verity of steganography techniques can be used and are more complex than others while all of them have respective strong and weak points. The absolute invisibility of the secret information is maintained by different applications, while others require a large secret message to be hidden. This paper discussesan overview of image steganography, its uses and techniques to satisfy the need for privacy on the internet. Various steganography techniques to provide privacy while transferring data from source to destination

 

Keywords–steganography, cryptography, secret information, digital image.

[1]. http://www.lia.deis.unibo.it/Courses/RetiDiCalcolatori/Progetti98/Fortini/history.html
[2]. http://stegano.net/tutorial/steg-history.html
[3]. https://null-byte.wonderhowto.com/how-to/introduction-steganography-its-uses-0155310/
[4]. Steganography and steganalysis-Robert Krenn, Internet Publication, March 2004 http://www.krenn.nl/univ/cry/steg/article.pdf
[5]. Steganography and Its Applications in Security, International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645


Paper Type : Research Paper
Title : An Efficient Algorithm for Mining Sequential Patterns Using Association Rules in Large Databases
Country : India
Authors : G.Ramesh Kumar || Dr. K. Arulanandam
: 10.9790/0661-2006012022     logo

Abstract: Knowledge discovery in databases (KDD) is characterized as the non-unimportant extraction of valid certain, possibly valuable also, at last reasonable data in expansive databases For quite a while, an extensive variety of utilizations in different spaces have profited from KDD strategies and numerous works have been directed to this point. The issue of mining, visit designs emerged first as a sub-issue of mining affiliation rules, however, it at that point swung out to be available in an assortment of issues. Since the multifaceted nature of this issue is exponential in the span of the double database input connection and for this connection needs to be checked a few times amid the procedure, effective calculations for mining, visit designs are required. So I show an effective calculation that produces all noteworthy affiliations leads between things in the database. The calculation...........

[1]. R. Agrawal, T. hnielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc. ACM SIGMOD Int'l Conf. on Management of Data, pages 207-216, May 1993.
[2]. R. Agrawal and l~. Srikant. Fast algorithms for mining association rules in large databases. In Proe. of the ~Oth Int'l Conf. on Very Large Data Bases (VLDB), pages 478-499, June 1994.
[3]. R. Agrawal and R. Srikant. Mining sequential patterns. In Proe. of the llth Int'l Conf. on Data Engineering (ICDE), pages 3- 14, Mar. 1995.
[4]. Y. Bastide, N. Pasquier, R. Taoull, G. Stumme, and L. Lakhal. Mining minimal non-redundant rules using frequent closed itemsets. In Proc. of the 1st Int'l Conf. on Computational Logic (6th Int'l Conf. on Database Systems - DOOD), pages 972-986. Springer, July 2000.
[5]. S. D. Bay. The UCI KDD Archive [http://kdd.icn. uci .edu]. Irvine, CA: University of California, Department of Information and Computer Science.


Paper Type : Research Paper
Title : Effective query processing techniques for heterogeneous application data
Country : India
Authors : P.Hariharan || K.Arulanandham
: 10.9790/0661-2006012326     logo

Abstract: In the different application environment, in order to a chievea effective query processing result stechniques are required. This type of effective query processing result techniques are implementing in order to different applications at the time of developing, the respective applications of query processing results will be very effective and needful. This paper gives well suited techniques for effective equery processing frame work in different applications such as E-learning, Banking and health data

 

Keywords–Energy consumption ontology, Information retrieval

[1]. The National Center for Biomedical Ontology,www.bioontology.org Swathi Rajasurya, Tamizhamudhu Muralidharan, Sandhiya Devi, S.S wamynathan Semantic Information Retrieval Using Ontology In University Domain", 2012, CoRRabs/1207.5745
[2]. D. T sarkovandI .Horrocks, FaCT DescriptionLogicReasoner: System Description.InThirdInternational Joint Conference onAutomatedReasoning,2006, pages 292–297. Springer.69
[3]. E. Kayaaslan, B.B. Cambazoglu,R. Blanco, F. P. Junqueira, and C. Aykanat, "Energy-price-drivenquery processingin multi-center web search engines," in Proc. SIGIR, 2011, pp. 983–992.
[4]. R. Blanco, M. Catena, and N. Tonellotto, "Exploiting green energy to reduce the operational costsof multi-center websearchengines," inProc. WWW,2016, pp. 1237–1247.
[5]. A. Teymorian, O. Frieder, andM. A. Maloof, "Rank-energy selective query forwarding for distributed search systems," inProc.CIKM,2013,pp.389–398


Paper Type : Research Paper
Title : A Study of Universal Design and Web Accessibility of Websites with High Purpose Using of the Internet
Country : Republic of Korea
Authors : Eunju Park || Hankyu Lim
: 10.9790/0661-2006012732     logo

Abstract:As the Internet has become an essential tool in human life, a need for building accessible web pages is being emphasized. Universal design indicates implementation of products and services that are fair and easy to use, regardless of age or disability. Universal design emphasizing universality, thus, shares common goals with web accessibility, and web pages built with universal design can improve universality. In this paper, we evaluated web accessibility of domestic websites that are highly used in the purpose of using the Internet, identifying whether such pages adopt the principles of the universal design correctly. The results showed that web accessibility gets better each year but universal design principles are not observed in many pages.

 

Keywords– Evaluation of Accessibility, HCI, Mobile Accessibility, Web, Web Accessibility, Universal Design,

[1]. Jim Thatcher andMichael R Burks, Web accessibility & web standards and regulatory compliance, Acorn Publishing Co, 2011.
[2]. Wonkyung Lee andEungyoungSeo, Website Design for Improving Accessibility of Disabled People, Journal of the Korean Society
for Information Management, 30(1), 2013, 193-219.
[3]. Jonghong Jeon andSeungyun Lee, UI/UX Technology Trends in the Next Generation Web, Communications of the Korean Institute
of Information Scientists and Engineer, 29(8), 2011, 9-17.
[4]. Moonyoung Lee, A Study on E-Learning UI Design for the Elderly based on Universal Design, Graduate School of Dongguk
University, Department of Multimedia, Korea, 2013.
[5]. Suyun Hong, A study on the Design Factor Analysis in a High Preferable Web site Design - With a focus on Graphic Image, Color,
Layout, Background –With a focus on Graphic Image, Color, Layout, Background, Korean Design Forum, 34,2012, 561-570.


Paper Type : Research Paper
Title : A Survey on Secure Key Policy Attribute-Based Encryption Policy for Data Sharing Among Dynamic Groups in the Cloud
Country : India
Authors : Soniya Thomas || Mr.J.Santhosh
: 10.9790/0661-2006013339     logo

Abstract:Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration cost. Then, we should give security insurances to the sharing information records since they are outsourced. Lamentably, in view of the continuous change of the participation, sharing information while giving security saving is still a testing issue, particularly for an untrusted cloud because of the intrigue assault. Besides, to exist conspires, the security of key appropriation depends on the protected correspondence channel, be that as it may, to have such channel is a solid supposition and is troublesome for practice. In this paper, we propose a secure information sharing plan for element individuals..............

 

Keywords– ................

.................


Paper Type : Research Paper
Title : Performance of Network Security Issues in Open Source Servers Using iptables
Country : Bangladesh
Authors : Mohammad Jahangir Alam || Tanjia Chowdhury || Mohammed Hossain Ibrahim
: 10.9790/0661-2006014051     logo

Abstract:In network system, there are several Open source servers such as DNS, Mail, FTP, Web and SIP. To maintain a secure network environment every server administrator follows an effective method for controlling and operating the different servers and protect them from several attacks because Security is the main issue for networking system. In this research, we established a secure environment for open source based servers using packet filtering firewall tools known as iptables. To protect the open source servers from external attack we have applied some rules at Linux iptables on the basis of respective port numbers, allowing and disallowing particular IP address or IP addresses with subnet for the important protocols like TCP, UDP, RTP and ICMP. After applying rules on protocols............

 

Keywords– Open Source Servers; Iptables; SIP server; Wireshark; Server Security.

[1]. William Stallings, Cryptography and Network Security Principles and Practices,(4th ed, Prentice Hall,2005).
[2]. Ali Mohammed, Sachin Sama and Majeed Mohammed, Enhancing Network Security in Linux Environment, School of Information
Science, Computer and Electrical Engineering, Halmstad University, Sweden, February 2012.
[3]. Kinjal Shah, Satya Prakash Ghrera, Alok Thaker, A Novel Approach For Security Issues In VOIP Networks In Virtualization With
IVR. International Journal of Distributed and Parallel Systems (IJDPS),3(3), May 2012.
[4]. Muhammad Arafat, Muhammad Alam, Feroz Ahmed, Study on Security Issue in Open Source SIP Server , Modern Applied
Science, 8(2), 2014.
[5]. Sowgandh Sunil Gadi, Security hardened kernels for linux servers, Wright State University, 2004.


Paper Type : Research Paper
Title : Fuzzy Logic Expert System for the Diagnosis of Chili Diseases
Country : Nigeria
Authors : Amosa Babalola || Ateko Busayo || Ugwu Jennifer || Adegoke Moses
: 10.9790/0661-2006015264     logo

Abstract: Chilli plant is one of the major cash crop in the world, many economy depends on its production. Chilli farmer has lost a lot of their crop due to diseases which in return causes farmers to loss lot of money and time such Chilli disease includes grey Mould, Bacterial soft/wilt, pepper mosaic virus, Anthracnose, Damping off, Chilli Wilt, Basal stem rot etc. The symptoms sometimes can be very difficult to identify by a human expert which often leads to the death of the chill plant. The goal of this research is to develop a Fuzzy logic system for diagnosing various types of Chilli plant diseases, and also to illustrate the architecture of fuzzy logic system. The knowledge base system holds the symptoms for Chilli diseases and a sequence of methodical and analytical decision steps that enhance the quality and meaning of the logic. The system eliminates the uncertainties often associated with human expert. The software used for the development of necessary Graphical User interfaces (GUI), for fuzzy modeling, fuzzy inference system editor, membership function editor, rule editor, rule editor, rule viewer and surface viewer is MATLAB. The system has been tested by some domain experts.

[1]. Bosland PW, Botava EJ. (2000): Peppers: vegetable and spice capsicums. CABI. Publishing, Wallingford, United Kingdom. pp.
204-205)
[2]. Wang, D., W. Paul and P.W. Bosland, (2006). The Genes of Capsicum. Hort Science, 41(5): pp.1169-1187.
[3]. El-Ghoraba AH, Javedb 4Q, Anjumb FM, Hamedc SF, Shaabana HA (2013). Pakistani Bell Pepper (Capsicum annum L.):
Chemical Compositions and its Antioxidant Activity. International Journal of Food Properties, pp. 18-32
[4]. Wahyuni Y, Ballester A-R, Sudarmonowati E, Bino RJ, Bovy AG,(2013). Secondary Metabolites of Capsicum Species and Their
Importance in the Human Diet. J. Nat.Prod.,DOI:10.1021/np300898z (online first)
[5]. Karungi J, Obua T, Kyamanywa S, Mortensen CN, Erbaugh M, (2013). Seedling protection and field practices for management of
insect vectors and viraldiseases of hot pepper (CapsicumchinenseJacq.)in Uganda. International Journal of Pest
Management.DOI:10.1080/09670874.2013.772260 (online first).


Researcher can also search IOSR published article contents through

IOSR Xplore