Volume-1 (International Conference on Emerging Trend in Engineering and Management Research (ICETEMR-2016))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detection of Provenance Forgery And Packet Drop Attacks in Wireless Sensor Networks Using Bloom Filter Algorithm |
Country | : | India |
Authors | : | S.Mailvizhi || S.Ramya || M..Sreema |
Abstract: Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decisionmakingfor critical infrastructures .A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustworthiness is crucial for correct decision-making. Data provenance represents a key factor in evaluating the trustworthiness of sensor data.......
Keywords - Provenance, security, sensor networks.
[1]. H. Lim, Y. Moon, and E. Bertino, "Provenance-Based Trustworthiness Assessment in Sensor Networks," Proc. Seventh Int'l Workshop Data Management for Sensor Networks, pp. 2-7, 2010.
[2]. I. Foster, J. Vockler, M. Wilde, and Y. Zhao, "Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation," Proc. Conf. Scientific and Statistical Database Management,
[3]. pp. 37-46, 2002.
[4]. K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, "Provenance-Aware Storage systems," Proc. USENIX Ann. Technical Conf., pp. 4-4, 2006.
[5]. Y. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science," ACMSIGMODRecord, vol. 34, pp. 31-36, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Remote Authentication Via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks |
Country | : | India |
Authors | : | R.Ramani || V.Sowmiya || T.Shabana || K.Babu || Dr. C. Kumar |
Abstract: Inwireless communications sensitive information is frequently exchanged, requiring remote authentication. Remote authentication involves the submission of encrypted information, along with visual and audio cues (facial images/videos, human voice etc.). Nevertheless, Trojan Horse and other attacks can cause serious problems, especially in cases of remote examinations (in remote studying) or interviewing (for personnel hiring).........
Keywords: Wireless communication, Authentication, Data hiding, Encrypted information, Choatic encryption, Sematic segmentation
[1]. E.-J. Yoon and K.-Y. Yoo, "Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem," The Journal of Supercomputing, vol. 63, no. 1, pp. 235– 255, Jan. 2013.
[2]. H. Kim, W. Jeon, K. Lee, Y. Lee, and D. Won, "Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme," in Computational Science and Its Applications, ser. Lecture Notes in Computer Science, vol. 7335. Spinger-Verlag, 2012, pp. 391–406.
[3]. E.-J. Yoon, S.-H. Kim, and K.-Y. Yoo, "Cryptanalysis and security enhancement of a "more efficient & secure dynamic id-based remote user authentication scheme‟,"International Journal of Innovative Computing, Information and Control, vol. 8, no. 5(B), pp. 3661–3675, May 2012.
[4]. R. Madhusudhan and R. C. Mittal, "Dynamic id-based remote user password authentication schemes using smart cards: A review," Intelligent Algorithms for Data-Centric Sensor Networks, vol. 35, no. 4, pp. 1235– 1248, Jul. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Pairwise Independent Network Using Key Generation Algorithm |
Country | : | India |
Authors | : | K.Kalaivani || K.Renugadevi || .Nithya |
Abstract: We consider two secret key generation problems under a pairwise independent network model, and propose low complexity key generation schemes in a framework that connects our problems to network flow problems in graphs. Our schemes have two components: 1) local key generation and 2) global key propagation. In the local key generation, we use point-to-point source coding with side information to establish pairwise keys, from which we construct a graph with the capacity of each edge being the key rate of the corresponding point-to-point local key...........
Keywords- Capacity, multicommodity ,pairwise keys .
[1]. L. Lai and S.-W. Ho, "Simultaneously generating multiple keys and multi-commodity flow in networks," in Proc. IEEE Inf. Theory Workshop, Lausanne, Switzerland, Sep. 2012, pp. 627–631.
[2]. U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, May 1993.
[3]. R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography. I. Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, Jul. 1993.
[4]. V. Stankovic, A. D. Liveris, Z. Xiong, and C. N. Georghiades, "On code design for the Slepian-Wolf problem and lossless multiterminal networks," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1495–1507, Apr.
[5]. 2006.