We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
This document lists several publications by Tanweer Alam related to mobile technology and coronavirus detection. It describes a 2020 patent application for a technology that enables mobile phones to detect coronavirus using 3G, 4G and 5G networks. It then lists several other publications by Alam on topics including big data, IoT, blockchain, security and mobile ad-hoc networks.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
This document proposes a new framework for secure mobile commerce (m-commerce) that combines double layer encryption, steganography, and secure XML messages transferred between a mobile terminal and server. The framework is based on J2ME/MIDP and aims to provide strong security and invisibility while maintaining high operating efficiency and compatibility with many mobile terminals. It encrypts data using an elliptic curve cryptography algorithm and hides the encrypted information in images using random least significant bit steganography before transmitting between devices.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
This document proposes a new method called MDSClone for detecting clone attacks in hybrid IoT networks. MDSClone uses multidimensional scaling (MDS) to generate a network map based on relative distances between nodes, without requiring knowledge of node locations. This overcomes limitations of existing methods that rely on node geography or assume static networks. MDSClone can detect clones in hybrid networks containing both static and mobile nodes. It parallelizes parts of the detection process to speed up clone identification. The method is designed specifically for IoT environments where nodes may lack accurate location data and have varying mobility.
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Health
departments’ contact-tracing applications depended on Bluetooth technology to prevent infectious diseases
from spreading, especially COVID-19. The security threats of the Bluetooth-based contact-tracing
applications increased because an adversary can use them as surveillance tools that violate the user’s
privacy and revealpersonal information. The Bluetooth standard mainly depends on the device address in
its authenticated pairing mechanism (Secure Simple Pairing), which can collect with off-the-shelf
hardware and software and leads to a tracking attack. To avoid the risk of tracking based on this security
vulnerability in the Bluetooth protocol, we suggest a novel authentication protocol based on a non-
interactive zero-knowledge scheme to substitute the authentication protocol used in the Bluetooth standard.
The new protocol can replace the authentication protocol in the Bluetooth stack without any modification
in the device pairing flow. Finally, we prove the security of our proposed scheme against the man-in-the-
middle attack and tracking attack. A performance comparison with the authentication algorithm in the BLE
standard shows that our method mitigates the tracking attack with low communication messages. Our
results help enhance the contact-tracing application’s security in which Bluetooth access is available.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
- The document discusses securing the Internet of Things (IoT), where every physical object has a virtual presence and can interact over the Internet.
- Several obstacles stand in the way of fulfilling the IoT vision, including security issues as the Internet and its users are already under attack and constrained IoT devices are vulnerable.
- To implement IoT security successfully, researchers must understand the IoT conceptually, evaluate current Internet security, and develop solutions that can reasonably assure a secure IoT.
This document lists several publications by Tanweer Alam related to mobile technology and coronavirus detection. It describes a 2020 patent application for a technology that enables mobile phones to detect coronavirus using 3G, 4G and 5G networks. It then lists several other publications by Alam on topics including big data, IoT, blockchain, security and mobile ad-hoc networks.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
This document proposes a new framework for secure mobile commerce (m-commerce) that combines double layer encryption, steganography, and secure XML messages transferred between a mobile terminal and server. The framework is based on J2ME/MIDP and aims to provide strong security and invisibility while maintaining high operating efficiency and compatibility with many mobile terminals. It encrypts data using an elliptic curve cryptography algorithm and hides the encrypted information in images using random least significant bit steganography before transmitting between devices.
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
As per the recent studies, the volatile growth has been seen in the use of mobile devices as
the supporting technology for accessing Internet based services, as well as for personal
communication needs in networking. Various studies indicate that it is impossible to utilize strong
cryptographic functions for implementing security protocols on mobile devices. Our research negates
this. Explicitly, a performance analysis focused on the most commonly used cryptographic protocols
based on the location address (latitude & longitude) of the user for mobile applications and projected
provably secure authentication protocol that is more efficient than any of the prevailing
authentication protocol is being used by the network security methods. Understanding the use of
public key cryptography which makes potential use of discrete logarithms problem. The security of
ECC depends on the difficulty of Elliptic Curve Discrete Logarithm. To provide secure
communication for mobile devices, authenticated protocol is an important primitive for establishing
trusted connection. In this paper, it has been shown that the location based system using improved
Rabin Algorithm provides a better security and acquires much less energy consumption than the
existing authentication protocols.
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
This document proposes a new method called MDSClone for detecting clone attacks in hybrid IoT networks. MDSClone uses multidimensional scaling (MDS) to generate a network map based on relative distances between nodes, without requiring knowledge of node locations. This overcomes limitations of existing methods that rely on node geography or assume static networks. MDSClone can detect clones in hybrid networks containing both static and mobile nodes. It parallelizes parts of the detection process to speed up clone identification. The method is designed specifically for IoT environments where nodes may lack accurate location data and have varying mobility.
Bluetooth is an essential wireless standard for short-distance and low-power wireless networks. Health
departments’ contact-tracing applications depended on Bluetooth technology to prevent infectious diseases
from spreading, especially COVID-19. The security threats of the Bluetooth-based contact-tracing
applications increased because an adversary can use them as surveillance tools that violate the user’s
privacy and revealpersonal information. The Bluetooth standard mainly depends on the device address in
its authenticated pairing mechanism (Secure Simple Pairing), which can collect with off-the-shelf
hardware and software and leads to a tracking attack. To avoid the risk of tracking based on this security
vulnerability in the Bluetooth protocol, we suggest a novel authentication protocol based on a non-
interactive zero-knowledge scheme to substitute the authentication protocol used in the Bluetooth standard.
The new protocol can replace the authentication protocol in the Bluetooth stack without any modification
in the device pairing flow. Finally, we prove the security of our proposed scheme against the man-in-the-
middle attack and tracking attack. A performance comparison with the authentication algorithm in the BLE
standard shows that our method mitigates the tracking attack with low communication messages. Our
results help enhance the contact-tracing application’s security in which Bluetooth access is available.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
- The document discusses securing the Internet of Things (IoT), where every physical object has a virtual presence and can interact over the Internet.
- Several obstacles stand in the way of fulfilling the IoT vision, including security issues as the Internet and its users are already under attack and constrained IoT devices are vulnerable.
- To implement IoT security successfully, researchers must understand the IoT conceptually, evaluate current Internet security, and develop solutions that can reasonably assure a secure IoT.
This document provides an overview of the Internet of Things (IoT) in 3 sentences or less:
The document defines IoT as physical devices connected to the internet and discusses its evolution from early devices to today's ecosystem. It also covers common IoT hardware components, connectivity options, data protocols, and provides an example IoT solution for a smart home studio. The document discusses criticisms of IoT including privacy, security concerns, and issues around standards and sustainability.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
1. The document lists over 100 potential seminar topics in computer science and information technology, ranging from embedded systems and extreme programming to biometrics, quantum computing, and more.
2. Some examples include elastic quotas, electronic ink, gesture recognition, graphics processing units, grid computing, and honeypots.
3. The broad range of topics provide many options for students or professionals to explore emerging technologies and issues in computing.
Residential access control system using QR code and the IoT IJECEIAES
This document presents a residential access control system (RACs) using QR codes and the Internet of Things (IoT) that was developed to improve security and convenience for homeowners. The system uses cryptography and QR codes for authentication in two phases - an authentication phase where a QR code is generated from an app, and a verification phase where an access control device scans the QR code. The system was tested and able to automatically lock doors after 30 seconds, notify users through a LINE app, and display device statuses in real-time on a NETPIE network platform. The results showed the system had higher security than other access control methods and an average access speed of 5.63 seconds.
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
Short introduction to IoT for telecom operators, providers and vendors.
Including: value chain, working examples and more.
Also describe: Smart cities, Smart home, wearables, etc.
The document discusses Internet of Things (IoT) architectures and protocols. It begins with an overview of IoT, defining it and outlining its key enablers and challenges. It then discusses the evolution from early Machine-to-Machine (M2M) solutions to today's IoT. The document outlines a common IoT architecture consisting of device, network, application support, application and management layers. It describes the capabilities of each layer. Finally, it provides an example of an IoT protocol.
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...Irissolution
IRIS SOLUTIONS A Leading R&D Company. Providing Latest IEEE Projects ,
Software & Embedded Courses.
FINAL YEAR STUDENT PROJECTS/ MINI PROJECTS/ INPLANT TRAINING REAL TIME PROJECT ASSISTANCE
EMBEDDED SYSTEM PROJECTS:
.WIRELESS BASED EMBEDDED SYSTEM PROJECT.ZIGBEE BASED WIRELESS SENSOR NETWORKS . IEEE SOLVED PAPERS PROJECT.RFID, SMART CARD AND FINGER PRINT PROJECT.GSM/GPRS/GPS.ROBOTICS PROJECT. ELECTRICAL BASED EMBEDDED SYSTEM PROJECT.POWER ELECTRONICS PROJECT. MATLAB PROJECT.IMAGE PROCESSING PROJECT*POWER ELECTRONIC ALL IEEE PAPARS…VLSI& MATLAB.
SAFTWARE PROJECTS:
. JAVA/J2EE/J2ME PROJECTS. .Net PROJECTS,VB,C#. IMAGE PROCESSING PROJECTSFINAL YEAR PROJECTS FOR FOLLOWING DEGREES:
Research Papers
M.E /M.TECH, MCA, M.ScB.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)
HIGH QUALITY TRAINING AT AFFORDABLE COSTINVENTIVE IEEE 2011 BASED PROJECTS DETAILS & KEYTO EMERGE AS A INNOVATIVE EXPERTISE IN DIFFERENT FIELDSQUALIFIED INDUSTRIAL EXPERT FOR training FOR THE STUDENTSJOB SUPPORT FOR QUALIFIED CANDIDATES
Training For:
M.E /M.TECH, MCA, M.Sc(CSE, IT)B.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)BCA, B.Sc (CSE, IT)
With Regards,
Iris Solutions.
The document discusses recent trends and research areas related to the Internet of Things (IoT). It begins with an introduction to IoT, describing it as enabling connections between devices anytime, anywhere through any media. It then covers IoT architecture and applications, challenges including interoperability and security, and potential research directions such as developing energy efficient and secure algorithms for edge devices. The document also discusses IoT user growth ratios, platforms for IoT development, and potential future innovations. It concludes that IoT will play a major role in monitoring the environment and that further research is still needed in areas like applications, edge/fog/cloud systems, and addressing security and privacy concerns.
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
Wearable Technology also called wearable gadget, is acategory of technology devices with low processing
capabilities that can be worn by a user with the aim to provide information and ease of access to the master
devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable
technology becomes significant when people start their invention in wearable computing, where their
mobile devices become one of the computation sources. However, wearable technology is not mature yet in
term of device security and privacy acceptance of the public. There exists some security weakness that
prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is
authentication issue. The low processing due to less computing power of wearable device causethe
developer's inability to equip some complicated security mechanisms and algorithm on the device.In this
study, an overview of security and privacy vulnerabilities on wearable devices is presented.
The document discusses technologies related to the Internet of Things (IoT) and presents a diagram of an example smart city architecture. The architecture shows different zones and infrastructures within a city and examples of entities within each, connected through various technologies to create an IoT network enabling data collection and sharing.
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
A Survey on Mobile Commerce Security Issues and Applicationstheijes
Electronic saving money and Mobile managing an account are seen as one of the best business-to-buyer applications in electronic trade and versatile business. The utilization of e-saving money and m- managing an account particularly in created nations has become quickly. Low charges, time investment funds and opportunity from time and spot have been observed to be generally imperative components of e-managing an account and m-saving money. These administrations are simple to utilize helpful and good with way of life , pace of administration conveyance is quick. There are two sorts of administrations offered in e-keeping money and m-keeping money, i.e. A) Notifications and alarms and B) Data, in which the bank sends messages containing data or notice required by the client. In this paper shows another system for using so as to enhance security of these messages steganography and cryptography system together.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
This document provides an overview of the Internet of Things (IoT). It discusses the history and concept of IoT, how IoT systems work, applications of IoT, the current state and future prospects. It also outlines key research areas like artificial intelligence and machine learning in IoT. The document details the typical architecture layers in an IoT system and new wireless technologies used in IoT like ZigBee, SigFox, and LTE-M. Finally, it discusses some criticisms, problems and controversies with IoT including issues around security, platform fragmentation, privacy and data storage.
The document discusses several limitations of IoT-enabled automation solutions:
1. Cybersecurity and privacy concerns are significant as more devices are connected and hackers can more easily access building functions by exploiting vulnerabilities.
2. Lack of integration and interoperability standards means buildings use multiple incompatible protocols, increasing costs.
3. Data capturing and processing has limitations due to the expense of comprehensive sensor deployment and expert analysis needed to derive value from data.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The document is a curriculum vitae for Ma. Dolor Y. Escarpe, who has 8 years of experience in special education, content services, and business process outsourcing. She has a Bachelor's degree in Elementary Education with a focus on Special Education from the University of San Carlos. Her career includes positions as an online writer, ESL teacher, elementary teacher, customer service representative, and special education shadow teacher. She is seeking a new position where she can utilize her skills in areas like teaching, writing, and administration.
This document provides an overview of the Internet of Things (IoT) in 3 sentences or less:
The document defines IoT as physical devices connected to the internet and discusses its evolution from early devices to today's ecosystem. It also covers common IoT hardware components, connectivity options, data protocols, and provides an example IoT solution for a smart home studio. The document discusses criticisms of IoT including privacy, security concerns, and issues around standards and sustainability.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
1. The document lists over 100 potential seminar topics in computer science and information technology, ranging from embedded systems and extreme programming to biometrics, quantum computing, and more.
2. Some examples include elastic quotas, electronic ink, gesture recognition, graphics processing units, grid computing, and honeypots.
3. The broad range of topics provide many options for students or professionals to explore emerging technologies and issues in computing.
Residential access control system using QR code and the IoT IJECEIAES
This document presents a residential access control system (RACs) using QR codes and the Internet of Things (IoT) that was developed to improve security and convenience for homeowners. The system uses cryptography and QR codes for authentication in two phases - an authentication phase where a QR code is generated from an app, and a verification phase where an access control device scans the QR code. The system was tested and able to automatically lock doors after 30 seconds, notify users through a LINE app, and display device statuses in real-time on a NETPIE network platform. The results showed the system had higher security than other access control methods and an average access speed of 5.63 seconds.
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
Short introduction to IoT for telecom operators, providers and vendors.
Including: value chain, working examples and more.
Also describe: Smart cities, Smart home, wearables, etc.
The document discusses Internet of Things (IoT) architectures and protocols. It begins with an overview of IoT, defining it and outlining its key enablers and challenges. It then discusses the evolution from early Machine-to-Machine (M2M) solutions to today's IoT. The document outlines a common IoT architecture consisting of device, network, application support, application and management layers. It describes the capabilities of each layer. Finally, it provides an example of an IoT protocol.
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...Irissolution
IRIS SOLUTIONS A Leading R&D Company. Providing Latest IEEE Projects ,
Software & Embedded Courses.
FINAL YEAR STUDENT PROJECTS/ MINI PROJECTS/ INPLANT TRAINING REAL TIME PROJECT ASSISTANCE
EMBEDDED SYSTEM PROJECTS:
.WIRELESS BASED EMBEDDED SYSTEM PROJECT.ZIGBEE BASED WIRELESS SENSOR NETWORKS . IEEE SOLVED PAPERS PROJECT.RFID, SMART CARD AND FINGER PRINT PROJECT.GSM/GPRS/GPS.ROBOTICS PROJECT. ELECTRICAL BASED EMBEDDED SYSTEM PROJECT.POWER ELECTRONICS PROJECT. MATLAB PROJECT.IMAGE PROCESSING PROJECT*POWER ELECTRONIC ALL IEEE PAPARS…VLSI& MATLAB.
SAFTWARE PROJECTS:
. JAVA/J2EE/J2ME PROJECTS. .Net PROJECTS,VB,C#. IMAGE PROCESSING PROJECTSFINAL YEAR PROJECTS FOR FOLLOWING DEGREES:
Research Papers
M.E /M.TECH, MCA, M.ScB.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)
HIGH QUALITY TRAINING AT AFFORDABLE COSTINVENTIVE IEEE 2011 BASED PROJECTS DETAILS & KEYTO EMERGE AS A INNOVATIVE EXPERTISE IN DIFFERENT FIELDSQUALIFIED INDUSTRIAL EXPERT FOR training FOR THE STUDENTSJOB SUPPORT FOR QUALIFIED CANDIDATES
Training For:
M.E /M.TECH, MCA, M.Sc(CSE, IT)B.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)BCA, B.Sc (CSE, IT)
With Regards,
Iris Solutions.
The document discusses recent trends and research areas related to the Internet of Things (IoT). It begins with an introduction to IoT, describing it as enabling connections between devices anytime, anywhere through any media. It then covers IoT architecture and applications, challenges including interoperability and security, and potential research directions such as developing energy efficient and secure algorithms for edge devices. The document also discusses IoT user growth ratios, platforms for IoT development, and potential future innovations. It concludes that IoT will play a major role in monitoring the environment and that further research is still needed in areas like applications, edge/fog/cloud systems, and addressing security and privacy concerns.
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
Wearable Technology also called wearable gadget, is acategory of technology devices with low processing
capabilities that can be worn by a user with the aim to provide information and ease of access to the master
devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable
technology becomes significant when people start their invention in wearable computing, where their
mobile devices become one of the computation sources. However, wearable technology is not mature yet in
term of device security and privacy acceptance of the public. There exists some security weakness that
prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is
authentication issue. The low processing due to less computing power of wearable device causethe
developer's inability to equip some complicated security mechanisms and algorithm on the device.In this
study, an overview of security and privacy vulnerabilities on wearable devices is presented.
The document discusses technologies related to the Internet of Things (IoT) and presents a diagram of an example smart city architecture. The architecture shows different zones and infrastructures within a city and examples of entities within each, connected through various technologies to create an IoT network enabling data collection and sharing.
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
A Survey on Mobile Commerce Security Issues and Applicationstheijes
Electronic saving money and Mobile managing an account are seen as one of the best business-to-buyer applications in electronic trade and versatile business. The utilization of e-saving money and m- managing an account particularly in created nations has become quickly. Low charges, time investment funds and opportunity from time and spot have been observed to be generally imperative components of e-managing an account and m-saving money. These administrations are simple to utilize helpful and good with way of life , pace of administration conveyance is quick. There are two sorts of administrations offered in e-keeping money and m-keeping money, i.e. A) Notifications and alarms and B) Data, in which the bank sends messages containing data or notice required by the client. In this paper shows another system for using so as to enhance security of these messages steganography and cryptography system together.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
This document provides an overview of the Internet of Things (IoT). It discusses the history and concept of IoT, how IoT systems work, applications of IoT, the current state and future prospects. It also outlines key research areas like artificial intelligence and machine learning in IoT. The document details the typical architecture layers in an IoT system and new wireless technologies used in IoT like ZigBee, SigFox, and LTE-M. Finally, it discusses some criticisms, problems and controversies with IoT including issues around security, platform fragmentation, privacy and data storage.
The document discusses several limitations of IoT-enabled automation solutions:
1. Cybersecurity and privacy concerns are significant as more devices are connected and hackers can more easily access building functions by exploiting vulnerabilities.
2. Lack of integration and interoperability standards means buildings use multiple incompatible protocols, increasing costs.
3. Data capturing and processing has limitations due to the expense of comprehensive sensor deployment and expert analysis needed to derive value from data.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
The document is a curriculum vitae for Ma. Dolor Y. Escarpe, who has 8 years of experience in special education, content services, and business process outsourcing. She has a Bachelor's degree in Elementary Education with a focus on Special Education from the University of San Carlos. Her career includes positions as an online writer, ESL teacher, elementary teacher, customer service representative, and special education shadow teacher. She is seeking a new position where she can utilize her skills in areas like teaching, writing, and administration.
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B SinghEduexcellence
This document outlines various strategies for increasing parental involvement in schools. It discusses pre-requisites like creating a welcoming environment and training staff and students. Over 50 unique strategies are proposed, such as different types of parent-teacher meetings, involving parents in school activities and committees, skill-building classes for parents, and community outreach programs. Implementing these strategies is expected to result in benefits like improved student attendance, grades, self-esteem, and the development of lifelong learning habits and good citizenship. Schools are encouraged to select strategies to immediately implement, discuss further, or plan for future sessions. A parental involvement pledge is also presented.
El escudo de la UAS representa la identidad de la universidad y sus valores fundamentales. Simboliza la unión de la ciencia y la técnica al servicio de la sociedad mediante la inclusión de la palabra "Tecnológico" y la representación gráfica de una antorcha. El escudo es el símbolo oficial que representa a la UAS ante la sociedad.
Dokumen tersebut membahas tiga topik utama tentang iklim komunikasi dalam hubungan. Pertama, beberapa perilaku komunikasi yang cenderung menciptakan iklim defensif seperti mengevaluasi, mengendalikan, dan menunjukkan keunggulan. Kedua, dinamika ketergantungan dan ketidaktergantungan yang sering terjadi dalam hubungan seperti antara anak dan orang tua. Ketiga, spiral kemajuan dan kemunduran dalam hubungan tergant
El documento define las profesiones como actividades que requieren estudios y por las cuales se recibe un salario, mientras que los oficios son actividades que se aprenden a través de la observación y la práctica. Luego lista algunas profesiones y oficios comunes como arquitecto, maestro, médico, zapatero, panadero y cartero.
Enfoque del curriculo de Educación Inicialskatiuska
El documento describe el enfoque del currículo de Educación Inicial, el cual se centra en el desarrollo integral de los niños estimulando la exploración en ambientes ricos y diversos. El currículo también promueve el bienestar de los niños a través de la satisfacción de sus necesidades básicas y la construcción de una trayectoria saludable de desarrollo. Además, reconoce la diversidad cultural y la necesidad de adaptarse a los diferentes estilos y ritmos de aprendizaje de cada niño.
The document summarizes the evolution of connectivity from the 1990s to the present and potential future developments. It discusses how connectivity has evolved from fixed terminals for internet access, to social networks enabling relational connections, to always-on mobile connectivity through smartphones, to context-based connectivity through IoT. It provides examples of current IoT applications and benefits like smart cities and predictive maintenance. It also speculates on future possibilities like an "electronic skin" covering the planet through ubiquitous sensors and an interactive, contextual internet.
La presentación trata de un trastorno de la articulación de los fonemas, es una incapacidad para pronunciar correctamente ciertos fonemas o grupos de fonemas.
Automotive PCB market is the biggest highlight. Global automotive PCB market size was USD5.28 billion in 2015 and is expected to grow by 8.3% to USD5.72 billion in 2016 and by 8.2% to USD6.19 billion in 2017, primarily because of impetus of millimeter-wave radar to RF board, of connected vehicle to multi-layer board, and of chassis electronization to metal substrate.
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
This document presents a new mobile cloud infrastructure that combines mobile devices and cloud services to provide virtual mobile instances through cloud computing. It discusses possible security threats in this new infrastructure and proposes an architecture to detect abnormal behavior. Machine learning techniques like random forest algorithms are used to test the methodology. The system aims to address challenges in existing systems and provide end-to-end security and abnormal behavior detection in the mobile cloud without requiring specific software installation on user devices.
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
I want you to Read intensively papers and give me a summary for every paper and the linghth for
each paper is 2 pages or more. In the summary, you need to provide some of your own ideas.
Research Interests: Privacy-Aware Computing,Wireless and Mobile Security,Fog
Computing,Mobile Health and Safety, Cognitive Radio Networking,Algorithm Design and
Analysis.
You should select papers from the following conferences:
IEEE INFOCOM, IEEE Symposium on security and privacy, ACM CCS, USENIX Security.
Solution
PRIVACY AWARE COMPUTING
Introduction
With the increasing public concerns of security and personal data privacy worldwide, security
and privacy become an important research area. This research area is very broad and covers
many application domains.
The security and privacy aware computing research group actually focuses on
(1) privacy-preserved computing,
(2) Video surveillance, and
(3) secure biometric system.
Now let us briefly discuss the above three groups.
Privacy-preserved Computing
Concerns on the data privacy have been increasing worldwide. For example, Apple was
reportedly fined by South Korea’s telecommunications regulator for allegedly collecting and
storing private location data of iPhone users. The privacy concerns raised by both end-users and
government authorities have been hindering the deployment of many valuable IT services, such
as data mining and analysis, data outsourcing, and mobile location-aware computing.
soo, in response to the growing necessity of protecting data privacy, our research group has been
focusing on developing innovative solutions towards information services --- to support these
services while preserving users’ personal privacy.
Video Surveillance
With the growing installation of surveillance video cameras in both private and public areas, the
closed-circuit TV (CCTV) has been evolved from a single camera system to a multiple camera
system; and has recently been extended to a large-scale network of cameras.
One of the objectives of a camera network is to monitor and understand security issues in the
area under surveillance. While the camera network hardware is generally well-designed and
roundly installed, the development of intelligent video analysis software lags far behind. As
such, our group has been focusing on developing video surveillance algorithms such as face
tracking, person re-identification, human action recognition.
Our goal is to develop an intelligent video surveillance system.
Secure Biometric System
With the growing use of biometrics, there is a rising concern about the security and privacy of
the biometric data. Recent studies show that simple attacks on a biometric system, such as hill
climbing, are able to recover the raw biometric data from stolen biometric template. Moreover,
the attacker may be able to make use of the stolen face template to access the system or cross-
match across databases. Our group has been working on face template protection, multimodality
template protection, and .
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...pharmaindexing
This document summarizes a research paper on enhancing RFID security and privacy through location sensing. It discusses how location awareness can be used by RFID tags and backend servers to defend against unauthorized reading and relay attacks. On tags, a location-aware selective unlocking mechanism is designed to allow tags to selectively respond based on location rather than always responding. On servers, a location-aware secure transaction verification scheme is proposed to allow servers to approve or deny transactions based on comparing the reported locations of the tag and reader. The goal is to detect relay attacks involving malicious readers. Unlike prior work, the defenses do not rely on auxiliary devices and require no explicit user involvement.
This document provides an overview of a seminar presentation on fog computing given by Mahantesh Hiremath at Jain College of Engineering. The presentation covered introductions to fog computing and existing cloud systems, advantages of a proposed fog computing system including low latency and location awareness, security issues in cloud systems that fog computing aims to address through techniques like user behavior profiling and decoy systems, examples of fog computing applications in connected vehicles and smart grids, privacy issues in smart grids, and conclusions on how fog computing provides unprecedented security in cloud systems and social networks.
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
This document proposes a dynamic and privacy-preserving reputation management scheme for blockchain-based mobile crowd sensing (BC-MCS). It aims to overcome security issues with centralized servers in traditional MCS systems. The proposed BC-MCS system utilizes blockchain and edge computing to provide an open and supervised crowd sensing platform. It also presents a practical privacy-preserving reputation management scheme to defend against malicious users while preserving user privacy. Key aspects of the scheme include a two-stage reputation update process using additive secret sharing, and a delegation protocol to handle user dynamics. The prototype system implemented on Hyperledger Sawtooth showed the scheme can achieve higher security and utility than previous centralized reputation management approaches.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
1. The document describes a proposed object detection bot that uses a Raspberry Pi, camera modules, and cloud services from AWS to accurately detect objects like plastic bottles, metal cans, and abandoned baggage.
2. The system uses a hybrid approach with both edge computing on the Raspberry Pi using SSD object detection models, as well as AWS cloud services for storage, analytics, and notifications. Video feeds are ingested into AWS Kinesis and objects detected on the edge are sent to AWS SNS for notifications.
3. An evaluation showed the system could reliably detect objects and send notifications within seconds, demonstrating the feasibility of combining local edge computing and cloud services for object detection on resource-constrained devices.
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...John Britto
Iris Solutions is a Leading ISO Certified R&D Company. We Providing Professional Courses & Final Year Projects with Innovative training Methods. All classes are Handling By Well Qualified Staffs.Also Provide Job support for qualified candidates. Projects in Java, J2ee, Vb, C#, .Net, Embedded, VLSI & Matlab. domain Using Networking, Network security, Mobile computing, Image Processing,etc......Eligibility:M.E /M.TECH, MCA, M.Sc(CSE, IT)B.E/ B.TECH (ECE, EEE, E&I, ICE, CSE, IT)DIPLOMA (ECE, E&I, EEE, CSE, IT, ROBOTICS)BCA, B.Sc (CSE, IT)
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...AM Publications
In the current scenarios, there was a huge demand for the wearable devices due to the development of clouds and cloudlet technology. So there has been wide essential to offer a better medical care to the people. For processing the patient medical information from one system to another includes various phases such as data collection, data storage, data sharing, etc. In the case of traditional healthcare system, it needs medical data transformation to cloud which includes user’s sensitive data and further cause’s communication energy consumption. Basically, medical data sharing referred as a most challenging issue. So, this research provides an apt solution to the medical data sharing. Here, a novel healthcare system is being developed by making use of flexibility of cloudlet. The cloudlet mainly functions to provide privacy protection, data sharing and intrusion detection. NTRU (Number Theory Research Unit) method is being initially used here to encrypt the user’s information that is being gathered through wearable devices. This information will be further transmitted to the nearest cloudlet in an energy efficient way. Apart from this method, this research also proposes a new trust model to assist the users to choose trustable partners whoever wishes to share the information stored in cloudlet. This model mainly helps the patients who are suffering from some health problems by communicating with each other. The user’s medical information which is being stored in remote cloud of hospital is classified into three parts and further secures them. For securing the healthcare system from malicious attacks this research developed a novel collaborative IDS (Intrusion Detection System) method through cloudlet mesh. As this can secure the remote healthcare big data cloud from various attacks. Finally, NTRU and AES-Rijndael algorithm are being used in order to attain more robust functionality. For implementation, Java technologies have been used to prove that proposed scheme remains effective.
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
The document describes a proposed smart surveillance system using the LBPH algorithm and structural similarity index measure (SSIM). The system uses LBPH for face recognition as an authentication procedure when an unknown face is detected. It also uses SSIM to detect differences between frames and identify objects that have been removed from the surveillance area. The system aims to provide intelligent CCTV that can not only record video but also process video in real-time to detect unwanted persons entering the surveillance area. It discusses the algorithms used, including LBPH, SSIM, and a literature review of related work on smart surveillance systems.
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
- The document proposes a new user authentication mechanism for mobile cloud computing using fingerprint recognition captured by a mobile phone camera.
- It describes designing and implementing a solution where fingerprint images are taken, preprocessed on the mobile device, and matched against stored templates in a cloud database to authenticate users for mobile cloud access.
- Experimental results on different mobile devices found average processing times between 0.4-0.8 seconds, meeting usability standards, demonstrating the feasibility of the proposed fingerprint-based authentication system for enhancing mobile cloud security.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
This document provides an overview of mobile cloud computing. It discusses how mobile cloud computing combines mobile computing and cloud computing to address the limited resources of mobile devices. The document outlines three approaches to mobile cloud applications, including extending cloud services to mobile devices and using cloud resources to augment mobile applications. It then describes the architecture of mobile cloud computing and security issues related to confidentiality, integrity, availability, authentication, and accountability. Finally, it discusses some open issues for implementing cloud computing on mobile devices related to limited resources and networking challenges.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
This document proposes and evaluates a context-based access control (CBAC) mechanism for Android systems. The CBAC mechanism allows users to set configuration policies over applications' usage of device resources and services based on the user's context. The proposed system uses context sensing and machine learning to classify contexts and then dynamically grants or revokes application privileges. Experiments show the CBAC mechanism incurs negligible energy overhead compared to the stock Android system. The CBAC framework provides improved privacy and security over existing location-based policy systems.
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value. This enables the person to request for accessing the data in the desk computer. When the person requests the access to the authorized user through Bluetooth in mobile, the Authorized user sends the permit access through fingerprint secret code. Finally this fingerprint is verified with the database in the Desk computer. If it is matched, then the computer can be accessed by the requested person.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
1. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
ADRIT SOLUTIONS
Ph: 7676768124 ; 9886878569 Email: adritsolutions@gmail.com
ANDROID APPLICATIONS IEEE TITLES - 2016-17
1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World
Constraints
Abstract: According to the growth of mobile devices equipped with a GPS receiver, a
variety of location-based services (LBSs) have been launched. Since location
information may reveal private information, preserving location privacy has become a
significant issue. Previous studies proposed methods to preserve a users' privacy;
however, most of them do not take physical constraints into consideration. In this
paper, we focus on such constraints and propose a location privacy preservation
method that can be applicable to a real environment. In particular, our method
anonymizes the user's location by generating dummies which we simulate to behave
like real human. It also considers traceability of the user's locations to quickly recover
from an accidental reveal of the user's location. We conduct an experiment using five
users' real GPS trajectories and compared our method with previous studies. The
results show that our method ensures to anonymize the user's location within a pre-
determined range. It also avoids fixing the relative positions of the user and dummies,
which may give a hint for an LBS provider to identify the real user. In addition, we
conducted a user experiment with 22 participants to evaluate the robustness of our
method against humans. We asked participants to observe movements of a user and
dummies and try to and the real user. As a result, we conformed that our method can
anonymize the users' locations even against human's observation.
2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for
Smartphones
2. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: 2D barcodes have enjoyed a significant penetration rate in mobile
applications. This is largely due to the extremely low barrier to adoption—almost every
camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC
technology, 2D barcodes have been increasingly used for security-sensitive mobile
applications including mobile payments and personal identification. However, the
security of barcode-based communication in mobile applications has not been
systematically studied. Due to the visual nature, 2D barcodes are subject to
eavesdropping when they are displayed on the smartphone screens. On the other hand,
the fundamental design principles of 2D barcodes make it difficult to add security
features. In this paper, we propose SBVLC—a secure system for barcode-based visible
light communication (VLC) between smartphones. We formally analyze the security of
SBVLC based on geometric models and propose physical security enhancement
mechanisms for barcode communication by manipulating screen view angles and
leveraging user-induced motions. We then develop three secure data exchange schemes
that encode information in barcode streams. These schemes are useful in many
security-sensitive mobile applications including private information sharing, secure
device pairing, and contactless payment. SBVLC is evaluated through extensive
experiments on both Android and iOS smartphones.
3. IEEE 2016: Mobile attendance using Near Field Communication and One-Time
Password
3. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper introduces a Near Field Communication (NFC) supported College
M-Attendance system for University Students. Near Field Communication (NFC)
is one of the latest technologies in radio communications and being a subset of RFID
technology, it is growing at an enormous pace. NFC technology provides the fastest way
to communicate between two devices and it happens within a fraction of a second. It
has several applications in Mobile Communications and transactions. An NFC-
supported College M-Attendance system for University Students is discussed
as one potential use of this technology. The proposed framework replaces manual roll
calls and hence, making it resilient to forgery. It gives parents and professors
information about the students' attendance. The marking of attendance is quick,
unsupervised, and makes use of a One Time Password (OTP) to enhance the security of
the system and takes away the possibility of proxy attendance. This paper discusses
NFC as a technology that is more secure and convenient than the prevalent technology
of Bluetooth, and also elaborates on the proposed framework of the M-
Attendance system that makes use of this advantage that NFC has over other
technologies.
4. IEEE 2016: Context-Aware Mobile Cloud Computing and Its Challenges
Abstract: Cloud computing is gaining popularity due to virtually unlimited resources,
low capital cost, ease of adoption, flexible resource provisioning, and high scalability.
Considering these benefits, researchers envision the usage
of cloud computing for mobile devices to overcome the ever-increasing computational
and energy demands of smartphone applications. However, this requires specialized
context-ware application development models that can facilitate the development
of cloud-enabled applications capable of making context-aware computation offloading
decisions. This article provides an overview of mobile cloud computing technology,
focusing on its context-awareness aspects and challenges.
5. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile
Users
4. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Location-based services are quickly becoming immensely popular. In
addition to services based on users' current location, many potential services rely
on users' location history, or their spatial-temporal provenance. Malicious users may lie
about their spatial-temporal provenance without a carefully designed security system
for users to prove their past locations. In this paper, we present the Spatial-Temporal
provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-
hoc mobile users generating location proofs for each other in a distributed setting.
However, it can easily accommodate trusted mobile users and wireless access
points. STAMP ensures the integrity and non-transferability of the location proofs and
protects users' privacy. A semi-trusted Certification Authority is used to distribute
cryptographic keys as well as guard users against collusion by a light-weight entropy-
based trust evaluation approach. Our prototype implementation on the Android
platform shows that STAMP is low-cost in terms of computational and storage
resources. Extensive simulation experiments show that our entropy-based trust model
is able to achieve high collusion detection accuracy.
6. IEEE 2016: PRISM: PRivacy-aware Interest Sharing and Matching in Mobile
Social Networks
5. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In a profile matchmaking application of mobile social networks, users need to
reveal their interests to each other in order to find the common interests. A malicious
user may harm a user by knowing his personal information. Therefore, mutual interests
need to be found in a privacy preserving manner. In this paper, we propose an efficient
privacy protection and interests sharing protocol referred to as PRivacy-aware Interest
Sharing and Matching (PRISM). PRISM enables users to discover mutual interests
without revealing their interests. Unlike existing approaches, PRISM does not require
revealing the interests to a trusted server. Moreover, the protocol considers attacking
scenarios that have not been addressed previously and provides an efficient solution.
The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also
proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM
against both passive and active attacks. Through implementation, we also present a
detailed analysis of the performance of PRISM and compare it with existing approaches.
The results show the effectiveness of PRISM without any significant performance
degradation.
7. IEEE 2015: Just-in-Time Code Offloading for Wearable Computing
6. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Wearable computing becomes an emerging computing paradigm for various
recently developed wearable devices, such as Google Glass and the Samsung Galaxy
Smart watch, which have significantly changed our daily life with new functions. To
magnify the applications on wearable devices with limited computational capability,
storage, and battery capacity, in this paper, we propose a novel three-layer architecture
consisting of wearable devices, mobile devices, and a remote cloud for code offloading.
In particular, we offload a portion of computation tasks from wearable devices to local
mobile devices or remote cloud such that even applications with a heavy computation
load can still be upheld on wearable devices. Furthermore, considering the special
characteristics and the requirements of wearable devices, we investigate
a code offloading strategy with a novel just-in-time objective, i.e., maximizing the
number of tasks that should be executed on wearable devices with guaranteed delay
requirements. Because of the NP-hardness of this problem as we prove, we propose a
fast heuristic algorithm based on the genetic algorithm to solve it. Finally, extensive
simulations are conducted to show that our proposed algorithm significantly
outperforms the other three offloading strategies.
8. IEEE 2015: Energy Cost Models of Smartphones for Task Offloading to the
Cloud
7. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Task offloading from smartphones to the cloud is a promising
strategy to enhance the computing capability of smartphones and prolong their battery
life. However, task offloading introduces a communication cost for those devices.
Therefore, the consideration of the communication cost is crucial for the effectiveness
of task offloading. To make task offloading beneficial, one of the challenges
is to estimate the energy consumed in communication activities of task offloading.
Accurate energy estimation models will enable these devices to make the right
decisions as to whether or not to perform task offloading, based on the energy cost of
the communication activities. Simply put, if the offloading process consumes
less energy than processing the task on the device itself, then the task is offloaded
to the cloud. To design an energy-aware offloading strategy, we
develop energy models of the WLAN, third-generation, and fourth-generation interfaces
of smartphones. These models make smartphone scapable of accurately estimating
the energy cost of task offloading. We validate the models by conducting an extensive
set of experiments on five smartphones from different vendors. The experimental
results show that our estimation models accurately estimate
the energy required to offload tasks.
9. IEEE 2015: Context-Based Access Control Systems for Mobile Devices
8. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Mobile Android applications often have access to sensitive data and
resources on the user device. Misuse of this data by malicious applications may result in
privacy breaches and sensitive data leakage. An example would be a malicious
application surreptitiously recording a confidential business conversation. The problem
arises from the fact that Android users do not have control over the application
capabilities once the applications have been granted the requested privileges upon
installation. In many cases, however, whether an application may get a privilege
depends on the specific user context and thus we need a context-
based access control mechanism by which privileges can be dynamically granted or
revoked to applications based on the specific context of the user. In this paper we
propose such an access control mechanism. Our implementation
of context differentiates between closely located sub-areas within the same location.
We have modified the Android operating system so that context-
based access control restrictions can be specified and enforced. We have performed
several experiments to assess the efficiency of our access control mechanism and the
accuracy of context detection.
10. IEEE 2015: Avatar: Mobile Distributed Computing in the Cloud
9. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Avatar is a system that leverages cloud resources to support fast, scalable,
reliable, and energy efficient distributed computing over mobile devices. An avatar is a
per-user software entity in the cloud that runs apps on behalf of the
user's mobile devices. The avatars are instantiated as virtual machines in the cloud that
run the same operating system with the mobile devices. In this way, avatars provide
resource isolation and execute unmodified app components, which simplifies
technology adoption. Avatar apps execute over distributed and synchronized
(mobile device, avatar) pairs to achieve a global goal. The three main challenges that
must be overcome by the Avatar system are: creating a high-level programming model
and a middleware that enable effective execution of distributed applications on a
combination of mobile devices and avatars, re-designing the cloud architecture and
protocols to support billions of mobile users and mobile apps with very different
characteristics from the current cloud work loads, and explore new approaches that
balance privacy guarantees with app efficiency/usability. We have built a
basic Avatar prototype on Android devices and Android x86 virtual machines. An
application that searches for a lost child by analyzing the photos taken by people at a
crowded public event runs on top of this prototype.
11.IEEE 2015: Developing an efficient digital image watermarking for
smartphones
10. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In recent years, Smartphone usage has been increasing rapidly to the point
where it surpassed all other electronic devices. Multimedia sharing and Image/Video
capturing are amongst the most utilized functionalities of smartphones. Smartphones
and Internet availability made the capture, transmission and storage of digital data very
easy and convenient. The simplicity, connectivity, and strong capabilities of such
devices make it very hard to protect the privacy and Intellectual Property (IP) of digital
multimedia. While all types of digital multimedia are at risk, digital images are severely
affected. Editing and converting digital images can be done quite easily, and hence
protecting them becomes even harder. Digital image watermarking is a technique used
to authenticate and protect the IP of digital images. In this paper we propose
an efficient and flexible digital watermarking system that runs on Android devices. The
system uses RAW images (a feature of the most recent Android software, called
Lollipop) to embed a watermark at an early stage before any modification and
conversion of the image. The system incorporates public-key cryptography for
increased protection. A simple and robust water marking technique is utilized for
efficiency. Other watermarking techniques are offered for flexibility. Finally, the system
uses the inherent features of the Android operating system to run in parallel and be
available to other applications.
12.IEEE 2015: Sesame: a secure and convenient mobile solution for passwords
11. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Passwords are the main and most common method of remote authentication.
However, they have their own frustrating challenges. Users tend to
forget passwords that are chosen to be hard to guess .Password managers are an
approach to keeping our passwords safe. However, they mainly rely on one
master password to secure all of our passwords. If this master password is
compromised then all other passwords can be recovered. In this work, we
introduce Sesame: a secure yet convenient mobile-based, voice-
activated password manager. It combines all different methods of user authentication
to create a more robust digital vault for personal data. Each password is encrypted with
a new fresh key on the user's mobile device for maximum security. The keys are stored
in our servers in a protected format. The user has the option of backing up the
encrypted passwords in any cloud service. To view a password, the user only needs to
utter the name of a web service, and speaker and speech recognition are applied for
authentication. Only the key for that service is sent to the mobile application and the
password is decrypted and displayed. The biggest advantage of Sesame is that the user
need not assume any trust to neither our servers nor any cloud storage. Also, there is no
need to enter a master password every time since speaker recognition is used.
However, as an alternative to voice, users can view their passwords using a
master password in case voice is not available. We provide a brief analysis of the
security of our solution that has been implemented on Android platform and freely
available on Google Play. Sesame is an ideal and
practical solution for mobile password managers.
13.IEEE 2014: NFC based applications for visually impaired people - A review
12. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Recent technological developments provide technical assistance that enables
supporting people with visual disabilities in their everyday tasks and improve their
quality of life. Considering that about 90% of the world visually impaired people live in
developing countries, particularly in the local context, in Saudi Arabia, there is a lack of
assistive tools and adapted environment supporting people with visual disabilities. To
overcome this problem, a wide variety of relatively inexpensive applications adapt Near
Field Communications (NFC) tagging technology in the development of assistive tools
for people with visual disabilities. In this article, we will systematically review the
current adaptation of NFC technology for visually disabled people and
introduce NFC practical applications to help them overcome challenging tasks that they
may encounter every day.
14.IEEE 2014: NFC based secure mobile healthcare system
13. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the recent increase in usage of mobile devices especially in developing
countries, they can be used for an efficient healthcare management. In this work, we
have proposed a novel architecture for improving healthcare system with the help of
Android based mobile devices with NFC [1] and Bluetooth interfaces, smartcard
technology on tamper resistant secure element (SE) for storing credentials and
secure data, and a Health Secure service on a hybrid cloud for security and health
record management. The main contribution of this paper is proposal of applications for
i) Secure Medical Tags for reducing medical errors and ii) Secure Health card for storing
Electronic Health Record (EHR) based on Secure NFC Tags, mobile device
using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic
security framework requirement for the applications. Since NFC NDEF format is prone
to security attacks [2], we have utilized low level APIs on Android based mobile devices,
to securely access NFC tags such as MIFARE Classic tags with NFC-A (ISO 1443-3A)
properties. Simple touch of NFC enabled mobile devices can benefit both the patient as
well as the medical doctors by providing a robust and secure health flow. It can also
provide portability of devices and usability for health management in emergency
situation, overpopulated hospitals and remote locations.
15.IEEE 2014: Anti-theft application for android based devices
14. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper presents a technique to improve anti-
theft for android based mobile phones by using different services like MMS instead of
SMS. As the use of smartphones, tablets, phablets based on android operating system is
increasing, many scenarios related with anti-theft have already been proposed and
many software based on anti-theft have also been developed, but most of these
software are not freely available and it's difficult to identify the thief by using these
software's e.g. GPS Tracking. We put forward a new scheme, which enhances the
present scenario, based on new technologies like Multimedia Messages. The scenario
proposed in this work is totally dependent on the hardware of your smartphone like
camera (front & back) and support for multimedia messages. Once this software is
installed, it will work in the background, stores the current SIM number in a variable
and keeps checking continuously for SIM change, whenever SIM gets changed from
mobile, it will take snapshots and record a video in the background i.e., without taking
user permission and then it will send an MMS, and number of snap shots, to an alternate
mobile number and an email id, which was provided during installation. The enviable
advantage of this software is that it is very easy to configure and it keeps running in the
background without interrupting the user. To some extent it helps the owner to identify
the thief.
16.IEEE 2014: Privacy-Preserving Optimal Meeting Location Determination on
Mobile Devices
15. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Equipped with state-of-the-art smartphones and mobile devices, today's
highly interconnected urban population is increasingly dependent on these gadgets to
organize and plan their daily lives. These applications often rely on current (or
preferred) locations of individual users or a group of users to provide the desired
service, which jeopardizes their privacy; users do not necessarily want to reveal their
current (or preferred) locations to the service provider or to other, possibly untrusted,
users. In this paper, we propose privacy-preserving algorithms for determining
an optimal meeting location for a group of users. We perform a
thorough privacy evaluation by formally quantifying privacy-loss of the proposed
approaches. In order to study the performance of our algorithms in a real deployment,
we implement and test their execution efficiency on Nokia smartphones. By means of a
targeted user-study, we attempt to get an insight into the privacy-awareness of users
in location-based services and the usability of the proposed solutions.
17. IEEE 2014: How Long to Wait? Predicting Bus Arrival Time With Mobile Phone
Based Participatory Sensing
16. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: The bus arrival time is primary information to most city transport travelers.
Excessively long waiting time at bus stops often discourages the travelers and makes
them reluctant to take buses. In this paper, we present a bus arrival time prediction
system based on bus passengers' participatory sensing. With
commodity mobile phones, the bus passengers' surrounding environmental context is
effectively collected and utilized to estimate the bus traveling routes
and predict bus arrival time at various bus stops. The proposed system solely relies on
the collaborative effort of the participating users and is independent from
the bus operating companies, so it can be easily adopted to support universal bus
service systems without requesting support from particular bus operating companies.
Instead of referring to GPS-enabled location information, we resort to more generally
available and energy efficient sensing resources, including cell tower signals, movement
statuses, audio recordings, etc., which bring less burden to the participatory party and
encourage their participation. We develop a prototype system with different types of
Android-based mobile phones and comprehensively experiment with the NTU campus
shuttle buses as well as Singapore public buses over a 7-week period. The evaluation
results suggest that the proposed system achieves outstanding prediction accuracy
compared with those bus operator initiated and GPS supported solutions. We further
adopt our system and conduct quick trial experiments with London bus system for 4
days, which suggests the easy deployment of our system and promising system
performance across cities. At the same time, the proposed solution is more generally
available and energy friendly.
18.IEEE 2013: SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
17. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the pervasiveness of smart phones and the advance of wireless body
sensor networks (BSNs),mobile Healthcare (m-Healthcare), which extends the
operation of Healthcare provider into a pervasive environment for better health
monitoring, has attracted considerable interest recently. However, the flourish of m-
Healthcare still faces many challenges including information security and privacy
preservation. In this paper, we propose a secure and privacy-
preserving opportunistic computingframework, called SPOC, for m-
Healthcare emergency. With SPOC, smart phone resources including computing power
and energy can be opportunistically gathered to process the computing-intensive
personal health information (PHI) during m-Healthcare emergency with
minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the
high reliability of PHI process and transmission in m-Healthcare emergency, we
introduce an efficient user-centric privacy access control in SPOC framework, which is
based on an attribute-based access control and a new privacy-preserving scalar product
computation (PPSPC) technique, and allows a medical user to decide who can
participate in the opportunistic computing to assist in processing his overwhelming PHI
data. Detailed security analysis shows that the proposed SPOC framework can
efficiently achieve user-centric privacy access control in m-Healthcare emergency. In
addition, performance evaluations via extensive simulations demonstrate the SPOC's
effectiveness in term of providing high-reliable-PHI process and transmission while
minimizing the privacy disclosure during m-Healthcare emergency.
19.IEEE 2013: Wireless sensor networks using Android Virtual Devices and Near
Field Communication peer-to-peer emulation
18. Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Several new Android smartphones support Near Field Communication (NFC).
The Android SDK provides an NFC API that can be used to develop NFC applications
that conduct peer-to-peer (P2P) data exchange. The Android emulator does not support
P2P communication between instances of the Android Virtual Device (AVD). In
addition to this constraint, P2P experimentation on actual smartphones is difficult
due to limited NFC support. To fill the gap created by this minimal support, we propose
the Java Mail NFC API (JNFC). JNFC uses the Java Mail API to emulate the functionality of
the Android NFC P2P API. To evaluate the performance of JNFC, we created the
DroidWSN Wireless Sensor Network (WSN) model and implemented it as
an Android application. We design and conduct an experiment for our DroidWSN
model to measure the execution time of our Android application WSN on AVDs. We
compare our simulation results against those from a similar experiment that measured
the execution time of a WSN composed of Sun SPOT wireless devices. While the
execution time of our DroidWSN model is slower, we assert that our design is more
simple and flexible than that of our comparison study. We conclude that this benefit and
the factors of JNFC cost (it is open source), the quality and quantity
of Android smartphone sensors, and imminent Android smartphone support for NFC
P2P, combine to make JNFC and the Android AVD a platform for NFC and WSN research.
Our study also emphasizes the need for Google to create Android NFC P2P
and sensor emulation APIs.