Volume-3 (International Conference on Emerging Trends in Engineering & Management (ICETEM-2016))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A study on Vulnerabilities of Automatic Teller Machine |
Country | : | India |
Authors | : | Minu C.M || Sheema Madhusudhanan || Prof. P. Jayakumar |
Abstract: Banking is basically about efficient service delivery. Customers can access their bank deposit or credit accounts by using an Automatic Teller Machine and make a variety of transactions. Automatic Teller Machines are a part of most of our lives. The next biggest application of security after government is in banking, and evolved to protect automatic teller machines (ATMs) from fraud. Vulnerabilities may result from bugs or design flaws in the system. A consumer becoming more dependent on ATMs and the proliferation of ATM debit cards, computer crime in this area is more likely to increase. This study is on types of ATM system vulnerabilities and security countermeasures provided currently including new efforts.
[1] S. Schaible, "How thieves clone your credit cards," Online at http: //www.wfla.com/story/26074193/credit-cards-cloned, Jul 2014, wFLA News Report.
[2] J. Kegley, "Financial crimes: Credit card 'cloning' is a growing form of identity theft," Online at http://www.kentucky.com/2012/06/24/ 2236535/financial-crimes-credit-card-cloning.html, Jun 2012
[3] R. Anderson and S. J. Murdoch, "Emv: Why payment systems fail," Communications of the ACM, vol. 57, no. 6, pp. 24–28,Jun2014.[Online].Available: http://doi.acm.org/10.1145/2602321
[4] S. Drimer and S. J. Murdoch, "Keep your enemies close: Distance bounding against smartcard relay attacks." in Proceedings USENIX Security Symposium, 2007, pp. 87–102.
[5] Christof Kier, Gerald Madlmayr, Alexander Nawratil, Michael Schafferer, Christian Schanes, Thomas Grechenig, "Mobile Payment Fraud: A practical view on the Technical Architecture and Starting Points for Forensic Analysis of new attack scenarios," Proceedings of the International Conference on IT Security Incident Management & IT Forensics, DOI 10.1109, pp. 68 - 76, May 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on Intrusion Detection and Protection Techniques |
Country | : | India |
Authors | : | Bini V C || Aswani Shaji || Prof. P Jayakumar || Nimmi M.K |
Abstract: Intrusion Detection Systems (IDS) plays a major role in computer security. In network environment IDS detect the activities that affect Confidentiality, Integrity and Availability on network data. There are two types of intruders External and Internal. External intruders are the outsiders from the network they are trying to attack the system with different techniques where as Internal Intruders are the authorized person to access the networks and they perform unauthorized or illegal activities. It is very difficult to detect the internal attacks. Most of the IDS and Firewalls detect the outsider attack only. Nowadays the numbers of cyber attacks and threats are increasing rapidly.
[1] J. Jabez and B. Muthukumar" Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach" International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) [2] Rajni Tewatia, Asha Mishra " Introduction To Intrusion Detection System: Review "INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 05, MAY 2015. [3] Sapna S. Kaushik, Dr. Prof.P.R.Deshmukh" Detection of Attacks in an Intrusion Detection System" Sapna S Kaushik et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011, 982-986. [4] Lin Ying,Zhang Yan,Ou Yang-jia "The Design and implementation of Host-Based Intrusion Detection System" IEEE Conference Publications on Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium,pages Pages: 595 – 598, [5] https://www.giac.org/.../host-vs-network-based-intrusion-detection.../102...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review of Behaviometric Techniques for User Authentication |
Country | : | India |
Authors | : | Princy Ann Thomas || Lakshmi Priya A || Dr. Suvanam Sasidhar Babu |
Abstract:Biometrics is an authentication mechanism classified into physical biometrics and behavioural biometrics. Physical biometrics uses the physical attributes of the individual to verify the claimed identity. Behavioural Biometrics or behaviometrics uses measurable behavioural patterns of device usage to verify the identity of the individual. Physical biometrics would require a special hardware device to capture the characteristics of the claimed identity for verification purposes but behaviometric does not require one in most cases. Keystroke dynamics and mouse dynamics have been researched most frequently for the purpose of static authentication, periodic authentication and continuous authentication of users. In this paper we make a comparative survey on the effectiveness of keystroke dynamics, Keystroke sound, mouse dynamics and mouse gesture dynamics individually as a defense-in-depth mechanism for authentication purposes. Keywords: Behavioural Biometrics, Keystroke Dynamics, Mouse Dynamics, Static Authentication, Continuous Authentication, Equal Error Rate (EER).
[1] F. Monrose and A.D. Rubin, "Keystroke Dynamics as a Biometric Authentication", Future Generation Computing Systems, vol. 16, no. 4, pp. 351-359, 2000. [2] F. Monrose and A.D. Rubin, "Authentication Via Keystroke Dynamics", Proceedings of the 4th ACM conference on Computer and communications security, Pages 48 – 56, ACM New York, NY, USA ©1997.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | ViCry: Visual Cryptography Schemes for Security (An overview of different types of visual cryptography schemes) |
Country | : | India |
Authors | : | Febin Baby || Arun R || Dr. Suvanam Sasidhar Babu |
Abstract: Visual Cryptography is a special kind of cryptographic technique in which the decryption can perform by the human visual capability. Ingeneral,for some criticalsecurityissue the visual cryptography scheme is used, for example to identify the difference in human and machine. Security has become an inseparable issue as Information Technology is ruling the world now. Cryptography in the study of mathematical techniques related aspects of information security such as confidentialities, data security, entity authentication, but it is not only the means of providing information security,
[1] "Visual Cryptography"-/Moni Shamir & Adi Shamir [2] "Extended Capabilities for XOR-Based Visual Cryptography"//Xiaotian Wu and Wei Sun- ieee transactions on information forensics and security, vol. 9, no. 10, October 2014 [3]. "Extended capabilities for visual cryptography "G. Ateniese et al. / Theoretical Computer Science 250 (2001) [4]. "An Overview Of Various Visual Cryptography Schemes"-Suhas B. Bhagate , P.J.Kulkarni// International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 9, September 2013 [5] "An Introduction to Different Types of Visual Cryptography Schemes"- Néelima. Guntupalli & Mr: P.D.Ratna Raju // International Journal of Science and Advanced Technology (ISSN 2221-8386) Volume 1 No 7 September 2011 [6] "k Out of n Region Incrementing Scheme in Visual Cryptography"-Ching-Nung Yang, Senior Member, IEEE, Hsiang-Wen Shih, Chih-Cheng Wu, and Lein Harn
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Attribute Based Encryption Schemes for Data Sharing |
Country | : | India |
Authors | : | Athira Rajeev || Tina Sara Kenu || Arun R || Dr. Suvanam Sasidhar Babu |
Abstract:As sensitive data is stored and shared by third party sites on the Internet, there will be a need to encrypt data stored at these sites. Attribute Based Encryption (ABE) schemes is a vision of public key encryption mechanism that allows users to encrypt and decrypt messages based on user attributes. ABE takes attributes as public key and associates them with the ciphertext and user's secret key. It is an efficient way to solve open problems in access control scenarios. In this paper, we survey the basic Attribute Based Encryption (ABE) scheme and its two varients: Key-policy ABE (KP-ABE) scheme and the Ciphertext-policy ABE (CP-ABE) scheme.
Keywords: Attribute Based Encryption, Key-policy, Ciphertext-policy, data sharing, security
[1]. A. Sahai and B. Waters, ―Fuzzy identity-based encryption,‖ inProc.EUROCRYPT, 2005, pp. 457473.
[2]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, ―Attribute based encryption for fine-grained access control of encrypted data,‖ in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006.
[3]. J. Bethencourt, A. Sahai, and B. Waters, ―Ciphertext-policy attribute-based encryption,‖ in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334,May 2007. 4) R. Ostrovsky, A. Sahai, and B.Waters, ―Attribute-based encryption with non-monotonic access structures,‖ in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 195–203, November 2007.
[4]. N. Attrapadung, B. Libert, and E. de Panafieu, ―Expressive keypolicy attribute-based encryption with constant-size ciphertexts,‖ in Public Key Cryptography—PKC 2011, vol. 6571, pp. 90– 108, Springer, 2011.
[5]. V. Goyal, A. Jain, O. Pandey, and A. Sahai, ―Bounded ciphertext policy attribute based encryption,‖ in Automata, Languages and Programming: Part II, vol. 5126 of Lecture Notes in Computer Science, pp. 579–591, Springer, Berlin, Germany, 2008.
[6]. L. Cheung and C. Newport, ―Provably secure ciphertext policy ABE,‖ in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 456–465,November 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A study on Acoustic Tractor Beam Technology |
Country | : | India |
Authors | : | Ms.Sudha T || Asst.Prof. Ms.Rini M K || Asst.Prof.Ms.Vincy DeviV.K |
Abstract: High frequency Sound waves can create oscillating packets of pressurized air, which can generate a force on particles capable of counteracting the pull of gravity. Many ultrasound levitation devices are developed based on this principle, which are working when two sound waves of the same frequency are emitted from opposite directions and superimposed on one another. That is, they require two sets of transducers to float the particles. Acoustic tractor beam is an emerging technology that can be applied to levitate and manipulate objects in air, water and human tissues with a single array of ultrasound emitters. It requires sound waves from one side to levitate particles. Acoustic tractor beam technology holds promise in a variety of fields. It can be applied for levitating and manipulating particles inside the body like kidney stones, clots, tumors and even capsules for targeted drug delivery.
[1] Holographic Acoustic Elements For Manipulation of Levitated Objects, Asier Marzo, Sue Ann Seah, Bruce W.Drinkwater,Deepak Ranjan Sahoo,Benjamin Long & Sriram Subramanian [2] http://www.smithsonianmag.com/science-nature [3] Weber, R. J. et al. Acoustic levitation: recent developments and emerging opportunities in biomaterials research. Eur. Biophys. J. 41, 397–403 (2012). [4] https://en.wikipedia.org/wiki/Tractor_beam [5] www.nature.com/nphoton/journal/ [6] http://bostoncommons.net/2015/10/lifting-objects-using-sound-waves/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Application of IoT to improve the life style of differently abled people |
Country | : | India |
Authors | : | Sharon Varghese |
Abstract: A world that anything will be connected to internet is being created ,generating an entirely new dynamic network. The Internet of thing(IoT) enables new means of communication between people ,things and the environment. By using this technology differently able people can improve their life style to some extend as normal people do. Disability is the consequence of an impairment that may be Physical, Cognitive, Mental, Sensory, Emotional, Developmental or some combination of the above. It may be right from the birth or may develop during a persons life time.
[1]: www.wikkipedia.com
[2][3]: http://www.cisco.com/web/IN/solutions/trends/iot/overview.html
[4]: http://smartertogether.telenorconnexion.com/2015/07/quality-of-life-and-iot/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A COMPARATIVE STUDY ON NETWORK OPERATING SYSTEMS |
Country | : | India |
Authors | : | Athira Joshy || Saranya Ramadas |
Abstract: Operating System gives life to a computer. Now a days networks are inevitable in human life. Different Networks demand different operating systems for their effective functioning. In this background we have made a comparative study of network operating systems. Their features, advantages and limitations are described in this paper. Keywords: TinyOS, Mantis OS, SOS.
[1] P. Alagupandi / M.E. Student Electrical and Electronics Engg Department Anna University R. Ramesh / Associate Professor Electrical and Electronics Engg Department CEG, Anna University. S.Gayathri/ Teaching Fellow Electrical and Electronics Engg Department CEG, Anna University [2] Tobias Reusing Supervisor: Christoph Söllner Seminar: sensor nodes - operation, networks & applications SS2012 Chair Network Architectures and Services, Department of Operating Systems and System Architectures Faculty of computer science, Technical University Munich [3] Muhammed Omer Farooq and Thomas Kunz Department of Systems and Computer Engineering, Carleton University Ottawa, Canada [4] Sharan Raman Paper Presentation for Advanced Operating Systems Course, Spring 2002
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Comparative Study on Recent Mobile Phone Processors |
Country | : | India |
Authors | : | Amarnath.K.P || Dijo Joseph || Shiv Prasad T.M |
Abstract: Now a days mobile phones have developed into sophisticated gadgets offering numerous prospects. They are more or like computer systems. The processor is the brain of the mobile operations. Multitasking processors are needed to handle multiple applications. A processor reads and executes the instructions provided by the users. In this paper we focus our study on 4 mainly used mobile processors namely NvidiaTegra , Samsung Exynos , Qualcomm Snapdragon and Intel Atom. The features , advantages and disadvantages of each of these are compared and discussed .
Keywords: Mobile phone Processors, Qualcomm Snapdragon, NvidiaTegra , Samsung Exynos, Apple A9, Mediatek ,Intel Atom
[1]. Farinaz Kaushanfar, Vandana Prabhu, Miodrag Potkonjak, Jan M. Rabaey: "Processors for Mobile Applications".
[2]. Andrew Fallows and Patrick Ganson: "Smartphone Hardware Architecture"
Books:
[3]. Matthew Scarpino , " Programming the Cell Processor: For Games, Graphics, and Computation 1st Edition "
Links :
[4]. https://en.wikipedia.org/wiki/Mobile_processor
[5]. http://www.qualcomm.co.in/products/snapdragon
[6]. https://en.wikipedia.org/wiki/Qualcomm_Snapdragon
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Autonomic Computing |
Country | : | India |
Authors | : | Arun Joy |
Abstract: Autonomic computing is a steadily emerging and promising research field. It aims at simplifying interoperability to diminish the management complexity in several industries. "Autonomic Computing" is a new vision of computing initiated by IBM. This new paradigm shifts the fundamental definition of the technology age from one of computing, to one defined by data. Access to data from multiple, distributed sources, in addition to traditional centralized storage devices will allow users to transparently access information when and where they need it. At the same time, this new view of computing will necessitate changing the industry's focus on processing speed and storage to one of developing distributed networks that are largely self-managing, self-diagnostic, and transparent to the user.
[1] Jeffery 0. Kelhart and David M Chess (2003) "The vision of autonomic computing".
[2] Autonomic Computing: IBM's perspective on the state of information technology.
[ 3] A. Beygelzimer, G. Grinstein, R. Linkser, and I. Rish. Improving network robustness. In Proceedings of the First International Conference on Autonomic Computing, pages 322–323. IEEE Computer Society, 2004.
[4] R. Barrett, P. P. Maglio, E. Kandogan, and J. Bailey. Usable autonomic computing systems: the administrator's perspective. In Proceedings of the First International Conference on Autonomic Computing, pages 18–25. IEEE Computer Society, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on image analysis of Myristica fragrans for Automatic Harvesting |
Country | : | India |
Authors | : | Jiss Kuruvilla || Anjali Sankar || Dhanya Sukumaran |
Abstract: The traditional method of plucking Myristica fragrans by hand is tiresome and demands huge labour. One of the major tasks in harvesting is to identify matured fruits. This study illuminates the probability of identifying Myristica fragrans by using various Image processing techniques, which include image segmentation, feature extraction & edge detection, to achieve the required classification. The proposed study intends to provide efficient methods that will lead to automatic harvesting.
Keywords: CHT, CIE L*a*b*, Edge detection, Image Processing, Segmentation
[1] Anmin Zhu, Liu Yang and Yanming Chen, An FCM-based Method to Recognize and Extract Ripe Tomato for Harvesting Robotic System Proceeding of the IEEE International Conference on Automation and Logistics Zhengzhou, China, August 2012
[2] Yutan Wang, Jiangming Kan, Wenbin Li and Chuandong Zhan, Image Segmentation and Maturity Recognition Algorithm based on Color Features of Lingwu Long Jujube, Advance Journal of Food Science and Technology 5(12): 1625-1631, 2013
[3] Zhao Jun; Tow Joel; Katupitiya Jayantha, On-tree Fruit Recognition Using Texture Properties and Color Data, in 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2005.
[4] Whittaker A, Miles G E;Mitchell O R;Gaulteny L D;Fruit location in a partially occluded image, American Society of Agriculture Engineers Volume 30,No.3,1987,pp.591-597.
[5] C. Zahn and R. Roskies.Fourier descriptors for plane closed curves.Computer Graphics and Image Processing, 21:269-281, 1972
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Issues in Cloud Computing |
Country | : | India |
Authors | : | Nisha P.K || Meera K Chandran || Smitha K.S. |
Abstract: Cloud Computing is the delivery on demand of IT resources and applications through the Internet. It allows to access servers, storage, databases and a huge set of application services over the Internet. The technology behind cloud computing is Virtualization. Cloud computing provides dynamic, reliable, and customizable services. The major concern in cloud computing is Security. Still cloud services are useful some people believe that it is not so safe. Cloud vendors try to ensure security at their maximum. This paper discusses major security issues with cloud computing and the existing counter measures to those security challenges in cloud computing. Keywords: Cloud Computing Security, Virtualization, Network Security.
[1]. http://www.leadingedge.uk.net/it-consultancy-services/cloud-computing/what-are-the-types-of-cloud-computing/
[2]. http://computer.howstuffworks.com/cloud-computing/cloud-computing.htm/printable
[3]. https://www.coursehero.com/file/p11mcqr/Clients-will-be-able-to-access-their-applications-and-data-at-any-time-from/
[4]. http://docs.aws.amazon.com/AmazonS3/latest/gsg/AmazonS3Basics.html