Traditional Authentication protocols, that run between a prover and a verifier, enable the verifier to decide whether a prover is fraud or authenticate by using technique like password, smart card, but location based attacks cannot be prevent using these techniques. Networks like Real Time Location System (RTLS), Wireless, Mobile Adhoc Network (MANet) suffer location based attacks. Location based attacks categories in distance fraud, mafia fraud, and terrorist fraud. Distance bounding technique is use for secure neighbor detection in RTLS that cryptographically measure an upper bound for the physical distance between two network devices. In this paper propose architecture for physical proximity or location verification of devices, for all types of attacks and prevention technique to these location based attacks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
Ad hoc networks are vulnerable to attacks due to mobility of nodes in a dynamic network where nodes can its position at any point of time. In MANeT, a lot of attacks can be initiated but most of them are comparatively easy to detect because of their property of dramatically changing the network data. It is very vital when considering security issues of MANET to consider wormhole attack, which is complex to detect & can spoil important data by directing to illegal nodes. It consists of two malicious nodes and a tunnel among them through which an attacker tunnel the data. In the route discovery process, a wormhole can relay route request and response messages between far-away nodes, creating the manifestation of shorter path to destination.
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Attacks and counterattacks on wireless sensor networksijasuc
WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats.
Child Activity Recognition Using Accelerometer and RFID ReaderIJRES Journal
This paper presents a child activity recognition using a accelerometer and RFID reader. Usually children start walking between 8 months to 16 months and they are more dangerous during this age. So we place accelerometer and RFID on the body of child to prevent child accidents such as falling or any injuries at home. In this paper we determine the activity of child such as sitting down, standing still, walking, toddling, crawling, rolling, and wiggling. The accelerometer and RFID are placed on waist of babies which gives every movement of child. That determine whether the child is falling or in safe mode. The accuracy of each child activity recognition was 98% using accelerometer and RFID reader. The temperature at home and fire at home can be determined by smoke sensor and temperature sensor for safety of child. To recognize daily activities, mean, standard deviation, and slope of time-domain features are calculated over sliding windows.
Investigations on Milling Tool: - A Literature ReviewIJRES Journal
Milling machines are tools designed to machine metal, wood, and other solid materials. Often automated, milling machines can be positioned in either vertical or horizontal orientation to carve out materials based on a pre-existing design. The main aim of this paper is to focus on the study of effects of cutting tools on various materials while the parameters are kept constant and also by varying the parameters. A literature review was conducted to find the effects of different cutting tools on milling of different materials. It was found out that most of the work was done using single tool and single material and results were recorded. The literature review gives us idea to use more than one material and subject it to the single tool. And then a comparison can be made on the results that are recorded.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
Abstract Wireless Sensor network (WSN) are broadly used today in various fields such as environmental control, surveillance task, object tracking, military applications etc. As WSN is an ad-hoc network which is deployed in such an environment which is physically insecure, intrusion detection has been one of the major area of research in WSN. Inorder to achieve an appropriate level of security in WSNs we cannot depend on cryptographic techniques as these techniques fall prey to insider attacks. This paper discusses on watchdog mechanism, one of the intrusion detection techniques in Wireless Sensor Network. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. The main area of focus in this paper is being made to the problems in existing watchdog technique for malicious node detection. Index Terms: Wireless Sensor Network, Security Intrusion Detection, Watchdog.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
Abstract: In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using
wireless link where each node may behave like both as a host and router. MANET encounters number of
security threats because of its open entrusted environment, with little security arrangement, security over
MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of
the prominent security threats wormhole attack is considered to be a very serious security threat over MANET.
In wormhole two selfish node which is geographically very far away to each other makes tunnel between each
other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to
make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and
its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the
brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to
detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count
method.
Keywords: Mobile Ad hoc Network, Selfish node, Malicious node, AODV
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...IAEME Publication
Ad hoc networks are vulnerable to attacks due to mobility of nodes in a dynamic network where nodes can its position at any point of time. In MANeT, a lot of attacks can be initiated but most of them are comparatively easy to detect because of their property of dramatically changing the network data. It is very vital when considering security issues of MANET to consider wormhole attack, which is complex to detect & can spoil important data by directing to illegal nodes. It consists of two malicious nodes and a tunnel among them through which an attacker tunnel the data. In the route discovery process, a wormhole can relay route request and response messages between far-away nodes, creating the manifestation of shorter path to destination.
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...IJMTST Journal
Privacy of data is one of the most important concept in wireless sensor networks. Wireless sensor networks are used in many areas likewise in tracking and monitoring of some events. Each sensor node has one private key and an assigned id. We are providing data confidentiality between the sensor nodes in wireless sensor network using bilinear pairing (diffie-hellman algorithm). Sharing of data between those neighbouring nodes is also secured with the concept of shared secret key(symmetric key cryptography). Content privacy and context privacy can be obtained and the threats regarding to it can be overcomed. Data is encrypted between the nodes using those shared secret keys. We are providing security for the data between the neighbouring nodes in wireless sensor networks.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
Attacks and counterattacks on wireless sensor networksijasuc
WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats.
Child Activity Recognition Using Accelerometer and RFID ReaderIJRES Journal
This paper presents a child activity recognition using a accelerometer and RFID reader. Usually children start walking between 8 months to 16 months and they are more dangerous during this age. So we place accelerometer and RFID on the body of child to prevent child accidents such as falling or any injuries at home. In this paper we determine the activity of child such as sitting down, standing still, walking, toddling, crawling, rolling, and wiggling. The accelerometer and RFID are placed on waist of babies which gives every movement of child. That determine whether the child is falling or in safe mode. The accuracy of each child activity recognition was 98% using accelerometer and RFID reader. The temperature at home and fire at home can be determined by smoke sensor and temperature sensor for safety of child. To recognize daily activities, mean, standard deviation, and slope of time-domain features are calculated over sliding windows.
Investigations on Milling Tool: - A Literature ReviewIJRES Journal
Milling machines are tools designed to machine metal, wood, and other solid materials. Often automated, milling machines can be positioned in either vertical or horizontal orientation to carve out materials based on a pre-existing design. The main aim of this paper is to focus on the study of effects of cutting tools on various materials while the parameters are kept constant and also by varying the parameters. A literature review was conducted to find the effects of different cutting tools on milling of different materials. It was found out that most of the work was done using single tool and single material and results were recorded. The literature review gives us idea to use more than one material and subject it to the single tool. And then a comparison can be made on the results that are recorded.
Study the effect of Mn2+ ions on the ac electrical properties of some iron do...IJRES Journal
Oxide glasses doped with transition metal ions are of high interest because of their variant applications in both science and technology fields. However, the normal melt quench method have used to prepared some iron doped phosphate glasses according the following molecular formula: (65-x) mol% P2O5 - 20 mol% Na2O - 15 mol% Fe2O3 - x mol% MnO, Where x= 0, 5,10, 20, 25. The room temperature Mössbauer Effect ME Spectra used to characterized the glassy state homogeneity of these glasses. ME spectra show, for all glasses, no magnetic field participate which mean good glassy state formation. The ac electrical transport properties were also measured, as function of temperature up to 500k. It was found that the ac conductivity increased with the gradual increase of Mn2+ cations, while the electrical activation energy decreased.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
A Two-DOF Parallel Mechanism Analysis Based on Position and Orientation Chara...IJRES Journal
This paper proposed a comprehensive analysis of a two-DOF parallel mechanism based on Position and Orientation Characteristics Theory(POC). According to the POC theory analysis, the topological structure of the parallel mechanism was given, the POC equation for the parallel mechanism was instituted. Compile the math model of parallel mechanism in Maple, obtained three dimensional surface of the positive position solutions and space trajectories of three dimensional surface.
The interaction with season collection of cuttings, Indol Butyric Acid (IBA) ...IJRES Journal
Differences in the root ability of olive cuttings in the juvenile and mature form are reported. The root ability of cuttings from juvenile and mature olive shoots together with the influence of season stem collection and different concentrations of IBA has been studied. Shoot proliferation and rooting of the olive explants were improved with editing to the nutrient media of 20 mg/l and 50 mg/l crude extract from olive ovule, respectively. Also, it is found that the extract of olive ovule has high content of IAA That means that shoots coming from the olive ovule located at the base of the tree have juvenility factors. Leafy stem cuttings of olive cultivar “Kalinjot” were obtained from 1-year-old olive shoots sampled on March 25th, April 15th, August 1st and September 1st during the 2013 growing season. The shoots were collected from the olive ovule located at the base of the tree (juvenile form) and on the crown of the tree (mature form) To improve the rooting of olive cuttings, different concentrations of IBA , (0,2000,4000,dhe 6000 ppm) After treatments, the stem cuttings, equipped with an automatic mist system, were planted in the greenhouse. 60 days after the beginning of rooting treatments, cuttings were scored for the presence of callus, percentage of rooted cuttings, root number per cutting and root length. In all the seasons and all the concentrations of IBA the juvenility modified significantly higher rooting of cuttings.
Solar drying is one of the application of solar energy. Drying means moisture removal from the product. Drying is helpful in preserving food product for long time; it prevent product from contamination. Direct solar drying, indirect solar drying, and mixed mode solar drying these are different solar drying methods. Primarily open to the sun or direct sun drying technique is used. However, it has some disadvantages. These disadvantages can be eliminated by indirect type of dryer which is used for drying products as application of solar energy. In this paper, we studied the different technique of drying and various modes of solar drying
AVTS Approach To Digital CMOS Circuits For Diminishing Complete Power Expendi...IJRES Journal
Power utilization of present Digital integrated circuits escalating with each generation which becomes a serious design issue. This paper wished-for a generalized power tracking algorithm that reduces power directly by forceful control of supply voltage and body bias. The AVTS algorithm-(Active Voltage and Threshold Scaling algorithm) save the outflow power for the period of Active mode of the circuit. Total Active power can be diminishing by adjusting Vdd and Vth based on circuit operating environment such as hotness, operation load, and circuit structural design. The power saving method of AVTS is similar to that of the Active Voltage Scaling (AVS) scheme, which adaptively changes the supply voltage depending on the current function of the system. For the circuits, and it is possible to trade off active and sub threshold outflow power by balancing between Vdd and Vth to maintain performance
Natural Chili (Capsicum frutescens L.) Cultivation to Mitigate Chili Leaf Cur...IJRES Journal
Farmers in North Sulawesi have experienced trauma in chili cultivation because epidemic of chili leaf curl complex (CLCC) have been occurred since 1982. This study aimed to determine the natural chili cultivation is more resistant to invasion of CLCC than monoculture chili cultivation. Experimental farms located in the village of Esandom, East Tombatu Subdistrict, Southeast Minahasa District, North Sulawesi. The trees that grow in the land fallow thinned, then made planting holes with a distance of about 2.5 meters and around the planting hole is cleaned. Monoculture of chilli cultivation in marshland. The number of sample units for sampling CLCC as much as 20% of the number of plants per farm. Population density monitoring of the insect predators and parasitoids that fly during the day performed using traps yellow sticky card and hand collection method, nocturnal insects were collected using pitfall traps. Density of other predators such as spiders, lizards, or garden-lizards calculated at five sample points on the diagonal sampling pattern. Species of plants in the natural farm identified and analyzed. CLCC severity on natural farming and monoculture, 0% and 100%, respectively. CLCC severity on natural farming systems is very low due to concentrations of sources were low and natural enemies have existed in the experimental farm.
Relation between Energy Saving and Economic Indices of CompanyIJRES Journal
Owing to the application of energy, tangible products made of raw materials take on those properties that determine their market demand. Raw materials acquire these properties and qualities during a process that is referred to as the energotechnological process. In general there are two definitions of a technological process. According to the first definition, the technological process is a sequence and combination of operations, and according to the second definition, which is more concise and derived from the content of the term itself, technology is a science about material treatment methods that allow this effect to be optimised. The first definition relates mainly to the organisation and structure of production. The priority of the second definition is obvious when creating new production, making advanced improvements to the existing production and ensuring the pre-eminence of the products in market competition. Obviously the second definition is more universal and preferable, and it is clear that practical utility of this definition is based on science about the energy impact on various material media. Thus energy shall be considered as one of two major factors of production efficiency (along with the material component). The considered methods of calculation of separate aspects of the problem of energy saving represent a complete logically bracketed approach and allow for proceeding to form a common methodology of energy saving in the company as well as in territorial and production groups.
According to the principles of bionic theory, this paper provided a nursing bed. which can be used help user to turn over the body comfortably, exercise legs and back automatically, especially during turning over the body, the three roll-over board like three hands that can help the user to turn over the body, after turning over the body, one of the three boards can be driven back that left the other two boards supporting the body. At that moment, the place of user’s back besides the place that supported by the other two roll-over board can be cleaned, in this way, it is very convenient to wash the user’s back and help avoid skin ulcer. In addition, the bed can be used to exercise the user’s back and legs and to promote recovery of those who are paralyzed. This paper focus on the mechanical design of the roll-over body function, moreover, considering how to design a mechanical to drive two roll-over boards just by one motor.
A High Speed Transposed Form FIR Filter Using Floating Point Dadda MultiplierIJRES Journal
There is a huge demand in high speed area efficient parallel FIR filter using floating point dadda algorithm, due to increase performance of processing units. Area and spped are usually confictiong constraints so that improving speed results mostly in large areas. In our research we will try to determine the best solution to this problem by comparing the results of different multipliers. Different sized of two algorithm for high speed hardware multipliers were studied and implemented ie.dadda and booth multipliers. The working of these two multipliers were studied and implementing each of them separately in VHDL. The results of this research will help us to choose the better option between multipliers for floating point multiplier for fabricating different system.
An Investigation into the Delays in Road Projects in BahrainIJRES Journal
This research investigated the delays in road projects in Bahrain. It studied frequency and severity of delay’s causes, as well as frequency of delay’s effects in such projects. Forty seven causes were identified and classified by responsibility into six groups. A field survey was conducted through a questionnaire including 36 contractors, 24 consultants and 84 engineers working at Ministry of Works (MOW). The researcher concluded that there are many causes of delay related to contractors such as the improper planning and scheduling. One of the major causes related to the owner, i.e. MOW is delay in decision making. The main problems related to consultants are due to lack of experience. Moreover, cost and time overruns were two of the most frequent effects of delay.
Risk governance for traffic accidents by Geostatistical Analyst methodsIJRES Journal
Geographical Information Systems (GIS) are indispensable tool for administrating big datasets based on location of measured point. The values related to space may vary with both time and location. GIS-supported Geostatistical Analyst (GA) can evaluate datasets by analysing the locations of points. Maps produced using probability and prediction methods must be the base products for city planning. This study develops methods to obtain maps to determine traffic hot zones in Konya, Turkey, by applying GA supported by GIS. By applying GA, this study differs from previous studies which have determined the hot spots using linear analysis. In this study, unlike preceding studies, the aim is to determine new safe routes and zones with the help of GA.
Another, different aim is to map and determine graduated hot or safe zones using number of mortalities criterion (AC1), number of injured people criterion (AC2), number of accidents with damage only criterion (AC3), and total number of accidents criterion (AC4).
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
The sole reason to go with this project is to increase the security for the people using ATM. Once the card and password related to it is stolen it might be a huge loss to the card holder, so to rectify this problem we are implementing this project. Now a day’s using the ATM (Automated Teller Machine) which provide customers with the convenient banknote trading is very common. In the recent times the cases regarding the illegal transactions has shown a considerable increase. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. In recent years, the algorithm of fingerprint recognition has been continuously updated, which has offered new verification means for us. The original password authentication method combined with the biometric identification technology verify the clients’ identity better and achieve the purpose that use of ATM machines improve the safety effectively.
Correlation Coefficients Between Kernel Yield And Other Characters Of Groundn...IJRES Journal
Field Trial was conducted in 1999 and 2000 at Samaru in the northern Guinea Savanna zone of Nigeria to assess the performance of 36 groundnut (Arachis hypogaea L) genotypes to Alectra vogelii (Benth). The trial was undertaken in a field that was naturally infested with Alectra. It was laid out in a randomized complete block design (RCBD) with three replications. The combined data of the two years showed that kernel yield exhibited significantly positive correlation with crop vigour at 9 weeks after sowing (WAS). Crop vigour 12 WAS, Alectra shoots population 9 WAS, Alectra shoots population 12 WAS, number of mature pods, shelling percentage, haulm yield and 100 – kernel weight (r = 0.168*, 0.197**, 0.227**, 0.253**, 0.695**, 0.332**, 0.399** and 0.537** respectively). Plant vigour 12 WAS related strongly positive to number of mature pods and shelling percentage (r = 0.199**m 0.150* respectively). Also kernel weight correlated significantly positive with Alectra shoots population at 12WAS, shelling percentage and haulm yield (r = 0.351**, 0.254**, 0.567** respectively).
Car’s Aerodynamic Characteristics at High Speed Influenced by Rear SpoilerIJRES Journal
The factors affect the rear spoiler’s aerodynamics characteristics are cross-sectional shape, chord length and angle of attack. By changing the three factors that can change the state of the car flow field. Determine the main body size, build models by Solidworks . Use Hypermesh to mesh, increase the number of grid near the body especially at the rear spoiler. Use Fluent for fluid analysis to get the values of aerodynamic lift coefficient CL (at 120km / h) based on orthogonal experiments. After calculating, obtain significance order of factors can obtain the best rear spoiler shape, helping to optimize the automotive styling quickly, improve the car's power and economy, ease the new car quickly seize the market.
Experimental Investigation and Analysis A Mechanical Properties of Hybrid Pol...IJRES Journal
The hybrids composite has emerged and have the potential reinforcement material for composites and thus gain attraction by many researchers. This is mainly due to their applicable benefits have they offer low density, low cost, renewable, biodegradability and environmentally harmless and also comparable mechanical properties with synthetic fiber composites. In the project natural fiber and glass hybrid composites were fabricated by using epoxy resin combination of hand lay-up method and cold press method. Specimen was cut from the fabricated laminate according to the ASTM standard for different experiments for tensile test, flexural text, and impact test. A significant improvement in tensile strength was indicated by the woven fiber glass hybrid composites. In this hybrid composite laminates banana-glass-banana (BGB) and glass-banana-glass (GBG) exhibit higher mechanical properties due to chemical treatment to natural fibers. So, the hybrid composite material shows the highest mechanical properties. This High performance hybrid composite material has extensive engineering applications such as transport industry, aeronautics, naval, automotive industries.
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Keywords: Wifi, Spoofing, Wireless, RSS, MAX, WEP, WPA, ISP
A Study on Security in Wireless Sensor Networksijtsrd
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical surveillance applications such as military surveillance, healthcare (elderly, home monitoring) applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. Shabnam Kumari | Sumit Dalal | Rashmi"A Study on Security in Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12931.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/12931/a-study-on-security-in-wireless-sensor-networks/shabnam-kumari
Secure Disclosure of Trespassing Mechanisms using Digital Signature Algorithmijcnes
The migration to wireless network from wired network has been a global trend in the past few decades. The mobility and scalability brought by wireless network made it possible in many applications. Among all the contemporary wireless networks, Mobile Ad hoc NETwork (MOBILE ADHOC NETWORK) is one of the most important and unique applications. On the contrary to traditional network architecture, MOBILE AD-HOC NETWORK does not require a fixed network infrastructure; every single node works as both a transmitter and a receiver. Nodes communicate directly with each other when they are both within the same communication range. It is crucial to develop efficient intrusion-detection mechanisms to protect MOBILE AD-HOC NETWORK from attacks. With the improvements of the technology and cut in hardware costs, we are witnessing a current trend of expanding MOBILE AD-HOC NETWORKs into industrial application
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Detection of Spoofing attackers in wireless networkAM Publications
Spoofing attacks effectively damage the networks performance and easy to launch by many tools available
in market. The previous security approach to address spoofing attacks is to apply cryptographic authentication.
However authentication method requires more infrastructures overhead. In this paper I propose the system of
detecting spoofing attackers in wireless network by using spatial information associated with each node hard to falsify
and not based on cryptography. This methodology can detect the attacks by spatial correlation received signal strength
(RSS), inherited from multiple wireless node. To determine multiple spoofing attackers cluster based mechanisms are
developed. I explore using the Support Vector Machines (SVM) method to further improve the accuracy of
determining the number of attackers. In addition, I developed an integrated detection and localization system that can
localize the positions of multiple attackers. The proposed methodology will obtain a reliable outcome that could be
helpful in identifying and eliminating certain attacks.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
Security in Wireless Sensor Networks Using BroadcastingIJMER
Wireless sensor networks as one of the growing technology in the coming decades has posed various unique challenges to researchers. A WSN typically consists of several base stations and thousands of sensor nodes, which are resource limited devices with low processing, energy, and storage capabilities.While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. As today’s world is growing more towards the Wireless technology, our aim must be towards providing the best security features to Wireless Sensor Network( WSN).We propose some of the security requirements for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications. We propose an efficient broadcast authentication scheme for wireless sensor networks in this paper.
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearson’s correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
A two-phase model is proposed for describing the dynamics of a fluidized bed reactor used for
polypropylene production. In the proposed model, the fluidized bed is divided into an emulsion and bubble
phase where the flow of gas is considered to be plug flow through the bubbles and perfectly mixed through the
emulsion phase. Similar previous models, consider the reaction in the emulsion phase only. In this work the
contribution of reaction in the bubble phase is considered and its effect on the overall polypropylene production
is investigated the kinetic model is combined with hydrodynamic model in order to develop a comprehensive
model for gas-phase propylene copolymerization reactor. Simulation profiles of the proposed model were
compared with those of well mixed model for the emulsion phase temperature. The simulated temperature
profile showed a lower rate of change compared to the previously reported models due to lower polymerization
rate. Model simulation showed that about 13% of the produced polymer comes from the bubble phase and this
considerable amount of polymerization in the bubbles should not be neglected in any modeling attempt.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39°C-42°C and the boiling point is in
the range 70 °C - 533 °C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Positioning error is a widely problem exists in mechanism, the important factors affecting machining
precision. In order to reduce the error caused by positioning problem processing, based on the differential
workbench as the research object, using the method of theoretical analysis and experimental verification, the
analysis of positioning error mechanism and source of complete differential precision workbench error
compensation, improve the accuracy of the device, provides a method for the application of modern machine
tools. table.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15℃ and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63℃ The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
In the process of oil and gas exploitation of mudstone-fractured reservoir in Daqing oilfield, the
permeability of fracture is easily affected by the influence of stress change, which is shown by the sensitivity of
the permeability to the stress. With the extension of time mining in the fractured mudstone reservoir, fracture
stress sensitivity is obvious in vast decline of production and great influence on reduced yields. In order to
reasonably determine the way of developing method, working system and the exploitation rate of the reservoir,
correspondingly protecting reservoir productivity, improve ultimate recovery. On the basis of the previous
research on the stress sensitivity of fractured mudstone, this essay studied the critical closing pressure of the
simulated underground fractured mudstone under the laboratory condition.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40℃ to 125℃, experimental
results implemented with SMIC 0.18μm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/℃ and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/℃.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNT’s whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
Real-Time Location Systems Security using Distance Bounding
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 5 ǁ May. 2014 ǁ PP.44-48
www.ijres.org 44 | Page
Real-Time Location Systems Security using Distance Bounding
Srikanth S P1
, Sunita Tiwari2
1
(Computer Science, MVJCE/VTU, Bangalore, India)
2
(Computer Science, MVJCE/VTU, Bangalore, India)
ABSTRACT: Traditional Authentication protocols, that run between a prover and a verifier, enable the
verifier to decide whether a prover is fraud or authenticate by using technique like password, smart card, but
location based attacks cannot be prevent using these techniques. Networks like Real Time Location System
(RTLS), Wireless, Mobile Adhoc Network (MANet) suffer location based attacks. Location based attacks
categories in distance fraud, mafia fraud, and terrorist fraud. Distance bounding technique is use for secure
neighbor detection in RTLS that cryptographically measure an upper bound for the physical distance between
two network devices. In this paper propose architecture for physical proximity or location verification of
devices, for all types of attacks and prevention technique to these location based attacks
Keywords – Distance bounding protocol, secure neighbor detection, RTLS
I. INTRODUCTION
An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover.
Distance-bounding is an authentication protocol prevent all three type of attacks, First is man -in -the- middle
attack (MITM) or relay attacks, where an adversary forwards information between the prover and verifier such
that neither honest party is aware of the attack[4]. Second, In distance attacks, a dishonest prover placed far
from the verifier and Third terrorist attacks, where dishonest prover provides some limited help to the adversary,
such that the adversary is able to authenticate to the honest verifier. However the prover should not forward any
information that allows the adversary to authenticate without the prover's help.
For secure Neighbor detection, a node in a network determines the secure neighbor detection and
identifies other nodes in its entire trusted network area. It is used various protocols for secure neighbor detection
including localization, directional antennas, RF fingerprinting, centralized system, location-based system. In
Real Time Location System (RTLS), neighbors are usually defined as nodes that lie within radio range of each
other [3]. In wireless communication, it is always assumed that devices are within the communication range and
that communication range is location limited, which implicitly proves physical proximity. Distance bounding
protocol properties is used with RFID tags. The most common RF tags is the ISO 14443 standard, which
describes two types of tags which operate at a frequency of 13.56 MHz The ISO 14443 standard describes HF
(high frequency) cards[4]. These cards operate at proximity, i.e., at around 10cm. Distance-bounding protocols
are not applicable for high frequency tags, but only implementable in systems with low-latency channels.
II. SCOPE OF PAPER
The scope of the paper is to detecting attacks such as man-in-the- middle attack, terrorist attack and
distance fraud. If an intruder comes in secure network and impose as a trusted entity, using the distance
bounding protocol we can discover fraud entity. So that the data transmitted by the prover can be receive only
by authenticated verifier not by the attacker who masquerades as the same identity of original node and to
eliminate the attack.
Communication involves two parties, a prover and a verifier, and provides the verifier with
cryptographic proof as to the maximum physical distance to the prover. The verifier relies exclusively on
information gained from executing the protocol with the prover. As the verifier requires a reliable and secure
estimate of the distance to the prover, distance-bounding protocols should be integrated into the underlying
communication channel. The security of the protocol therefore not only depends on the cryptographic
mechanisms but also on the physical attributes of the communication channel that are used to measure
proximity.
III. EXISTING SYSTEM
In conventional networks, authentication is often based upon password, secret key, and smart card or
biometric. A prover convincing a verifier of some assertion is a frequently recurring element in many
applications. The assertion is often the identity of the prover, but it can also be more general. Use GPS
coordinates in a location verification scheme, but this method cannot be used indoor [1]. Location information
does not always have to be so detailed; sometimes we are interested in the orientation. A lot of solutions can be
2. Real-Time Location Systems Security using Distance Bounding
www.ijres.org 45 | Page
found in the location verification scheme. There are however some drawbacks to this method. For example, it
cannot be used indoor. Location information does not always have to be so detailed in the distance, the
environment. Combining these pieces of information will enable to determine the exact position of the other
party.
The scenario of existing system has been practically demonstrated against real-world RFID systems.
The secure verification of a devices location relative to another device, so-called secure neighbor detection, is
therefore crucial to the secure and reliable operation of industrial real-time location applications.
IV. PROPOSED SYSTEM
In the proposed system, attackers attacks the system and find the IP address of nodes, initial location to
all the nodes and change the position of nodes by moves left and right. As our goal is not only to monitor real-
time locations, but also to retrieve history location proof information when needed, a location proof server is
necessary for storing the history records of the location proofs.
Figure-1: Architecture of Proposed System
It communicates directly with the prover nodes who submit their location proofs. As the source
identities of the location proofs are stored as pseudonyms, the location proof server is entrusted in the sense that
even though it is compromised and monitored by attackers, it is impossible for the attacker to reveal the real
source of the location proof .The node who needs to collect location proofs from its neighboring nodes. When a
location proof is needed at time, the prover will broadcast a location proof request to its neighboring nodes
through network. If no positive response is received, the prover will generate a dummy location proof and
submit it to the location proof server. A third-party user or an application who is authorized to verify a prover’s
location within a specific time period. The verifier usually has close relationship with the prover, for example
friends or colleagues, to be trusted enough to gain authorization.
The propagation speed of sound is much slower than that of radio waves. As a result, an attacker can
intercept the ultra sound communication and forward it over a faster radio or optical communication medium to
an accomplice closer to the verifier or prover, thereby reducing the time measurement and decreasing the
distance estimate. Radio Frequency (RF) channels are proposed as the channel for implementing distance
bounding systems [3]. A challenge-response authentication protocol is used in tight time-out constraint. As a
result, characteristics like attack resistance, resource requirements and execution time varies for each protocol.
The setup and verification stages can be transmitted via robust communication channels.
V. DISTANCE BOUNDING PROTOCOL
A Distance-bounding protocol determines an upper bound for the physical distance between two
communicating parties based on the Round-Trip-Time (RTT) of cryptographic challenge response pairs [1].
Verifying the physical location of a device using authentication protocol is an important security mechanism.
Distance bounding protocol aim to prove the proximity of two devices relative to each other. Brands and Chaum
proposed a distance bounding protocol that could be used to verify a device’s proximity cryptographically. This
design based on a channel where the prover can reply instantaneously to each single binary digit received from
the verifier. The number of challenge–response interactions is being determined by a chosen security parameter.
Distance bounding protocol not only in the one-to-one proximity identification context but also as building
blocks for secure location systems [3]. After correct execution of the distance bounding protocol, the verifier
3. Real-Time Location Systems Security using Distance Bounding
www.ijres.org 46 | Page
knows that an entity having data is in the trusted network.
Distance bounding protocol can be divided in three phase: the Commitment phase, the fast bit
Exchange phase and signing phase.
Figure-2: Distance Bounding Protocol (Brands and Chaum’s protocol s)[3]
VI. ATTACKS IN DISTANCE BOUNDING
Generally Three types of attacks that are discussed under Distance-Bounding: relay attack, terrorist attack
and distance attack.
A. Relay Attacks
Relay or Mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-
in-the-middle (MITM) between the reader and an honest tag located outside the neighbor.
Figure-3: Relay Fraud [2]
B. Terrorist Attacks
A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-
the-middle (MITM) between the reader and a dishonest tag located outside of the neighborhood, such that the
latter actively helps the adversary to maximize her attack success probability, without giving to her any
advantage for future attacks.
Figure-4: Terrorist Fraud [3]
C. Distance Attacks
A distance fraud is an attack where a dishonest and lonely prover supports to be in the neighborhood of
the verifier network.
Figure-5: Distance Fraud [3]
VerifierProver
VerifierProver
Fraud
Prover
Fraud
Verifier
VerifierProver Intruder
4. Real-Time Location Systems Security using Distance Bounding
www.ijres.org 47 | Page
VII. GENERALIZE SECURE NEIGHBOUR DETECTION MODEL
Following are the models for Secure Neighbor Detection
A. Directional Antenna
Directional antenna is an antenna which radiates in one or more directions allowing for increased
performance on transmit and receive and reduced interference from unwanted sources. Directional antennas
triangulate position using angle-of-arrival (AoA), which requires static reference nodes with antenna arrays
providing fixed reference directions. These nodes must also have synchronized clocks to ensure that a
transmission was made to multiple reference nodes at the same time [3].
B. Centralized Approaches
In Centralized approach we assume that there are many entities that contribute data on centralized
system, from where system can check for suspicious node presence by creating and analyzing system-wide
entity model [2]. This model work effectively when numbers of entities are many in numbers, not for networks
like that use point-to-point RFID link or device localization using RTLS with only three reference nodes.
C. RF Fingerprinting
Radio fingerprinting is a process that identifies a physical communication channel by the unique
fingerprint that characterizes its signal transmission. Each device needs to be characterized and, if nodes are
mobile and subject to varying multi-path and path-loss effects, the fingerprint might need to be revised many
time[4]. Thus method is prominently use in RFID devices like logistics, public transport.
VIII. PREVENTION TECHNIQUE OF ATTACKS
There are different methods are used for prevention of these attacks. In the distance fraud the location
will not be sufficient because the verifier does not trust the prover. He wants to prevent a fraud prover claiming
to be closer. Different type’s location mechanisms that prevent these attacks are:
A. Measure the signal strength
Node can calculate distance from other node by sending it a message and see how long it takes to
return. If response authenticated, fraud node can lie about being further away than it is, but not closer.
Sender includes strength of transmitted message in message; Receiver compares received strength to
transmitted strength to compute distance. Not secure, but can be useful when combined with other mechanisms.
B. Measure the round trip time
Another solutions measures the round trip time. The round trip time is the time required for exchange a
packet from a specific source to a specific destination and back again. In this protocol the verifier sends out a
challenge and starts a timer. After receiving the challenge, the prover does some very elementary computations
to construct the response. The response is sent back to the verifier and the timer is stopped. Multiplying this
time with the propagation speed of the signal gives the distance [6].
IX. PREVENTION OF ATTACKS
A. Prevention of Mafia fraud
Measuring the time of flight of an electromagnetic signal in the distance bounding protocol assures
that an attacker cannot be further away than (s) he pretends to be. Using this principle, not only we prevent
distance fraud attacks but also mafia fraud attacks. It is a relay-type attack where the adversary is modeled as a
fraudulent prover and verifier cooperating together. The fraudulent verifier interacts with the honest prover and
the fraudulent prover interacts with the honest verifier.
B. Prevention of Terrorist fraud
In the terrorist fraud, the adversary does not know the secret key of the prover. Now we will
demonstrate how the terrorist fraud attack can be applied to the distance bounding protocol of Brands and
Chaum. Roughly distance bounding protocol can be divided in three parts: the commitment phase, the fast bit
exchange phase and the signing phase (commitment). There is however no strong (cryptographic) relation
between these 3 phases.
There are two extended methods to prevent terrorist fraud attack in distance bounding protocol [1].
5. Real-Time Location Systems Security using Distance Bounding
www.ijres.org 48 | Page
Fast bit exchange using the secret key: This method uses three phases
1. Commitment phase where signals send.
2. In second phase challenge –response single bit interaction occurs.
3. And third phase, the prover uses zero knowledge prove to convince the verifier that he knows the secret
key.
Using trusted hardware: In this method we stabilize relationship in signing phase and bit exchange phase using
trusted hardware. In this phase attacker cannot get value from trusted hardware or cannot change the protocol
direct it has to perform [2].
X. ANALYSIS OF SECURE NEGHIBOUR DETECTION
A. Computation
In each phase calculations should be simple, otherwise they increase the round trip time. It should
consider that the computation-time for each round trip is non variant.
B. Storage
RFID distance-bounding protocol must require less storage.
C. Bandwidth
Time measurements are very fragile when the parties send other messages than bits [4]. The reason is
that on the one hand, fresh noise is introduced in the communication, and on the other hand, the unreliability of
the transmission increases with the size of the transmitted message.
D. Reliability
Industrial applications are required to be reliable [5]. In communication environments, communication
during the setup and verification stages can be transmitted via robust communication channels. However, it is
likely that bit errors will occur during the exchange stage. Without sufficient error-handling the protocol will
fail, and it will either require that the protocol executes again or cause the disruption of subsequent services.
XI. CONCLUSION
The security of industrial applications is important and physical location verification is one of the
serious concerns in RTLS applications. Distance bounding protocol will prevent attacks by computing the
distance between the prover and the verifier. We will measure round trip time to calculate the distance between
two nodes for secure authentication. The analysis demonstrates the security of the protocol against a variety of
attacks. Proposed system is reliable and applicable in real time system. In this paper, we have presented the
basic conceptual architecture of distance bounding protocol and prevention techniques of attacks.
REFERENCES
[1] R. Stoleru, H. Wu, H. Chenji, "Secure Neighbor Discovery in Mobile Ad Hoc Networks", Department of Computer Science and
Engineering, Texas A&M University in 2011 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
[2] Dave Singelee, Bart Preneel ESAT-COSIC, K.U. Leuven, Belgium. "Location Verification using Secure Distance Bounding
Protocols".
[3] Adnan Abu-Mahfouz, Member, IEEE, and Gerhard P. Hancke, Senior Member, IEEE "Distance Bounding: A Practical Security
Solution for Real-Time Location Systems".IEEE transactions on industrial informatics, vol. 9, no. 1, February 2013
[4] Chong Hee Kim and Gildas Avoine "RFID distance bounding protocol with mixed challenges to prevent relay attacks"
Universit´e Catholique de Louvain Louvain-la-Neuve, B-1348, Belgium
[5] Vom Fachbereich Informatik der Technischen Universitat Darmstadt genehmigte "Security Aspects of Distance-Bounding
Protocols" Tag der Einreichung: 20. June 2012 Tag der mundlichen Prufung: 04 July 2012
[6] Samer S. Saab, Senior Member, IEEE, and Zahi S. Nakad, Member, IEEE "A Standalone RFID Indoor Positioning System Using
Passive Tags". IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 58, NO. 5, MAY 2011