An adhoc network is a collection of autonomous nodes with dynamically changing infrastructure. Multicast is a good mechanism for group communication. It can be used in the group oriented applications like video/audio conference, interactive group games, video on demand etc. The security problems obstruct the large deployment of the multicast communication model. Multicast data origin authentication is the main component in the security architecture. The authentication schemes should scalable and efficient against packet loss. In this article we discuss varies authentication scheme for multicast data origin with their advantage and disadvantage
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
Abstract The aim of this paper is to protect the wireless network against the blackhole attack. Blackhole attack, as the name suggest, drops all the packets forwarded to it. In this paper, we have proposed an intrusion detection system (IDS) scheme to detect the malicious node (blackhole node) and to nullify its effect in the network. The proposed IDS scheme in the presence of blackhole attack gives approximately similar result as that of in the absence of attack. The network comprises for the three modules (i) Default AODV, (ii) AODV in the presence of blackhole attack and (iii) IDS scheme in the presence of attack by considering some parameters such as end to end delay, throughput, packet delivery ratio, normalized routing load etc. The proposed algorithm has been simulated on Network Simulator version-2 (NS-2). Key Words: AODV, Blackhole attack, DSN, IDS scheme, routing misbehavior, security
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
Group communication emphasis an important security criterion in the design of a distributed network. All the members of the group must agree to a common session key. The management of this session key refers to the group key management which is based on some group key agreement protocol. In this paper we propose a group key management method for secure group communication in a distributed network. Frequent change in group membership, and managing the key distribution for new members are the two main problems to be faced in group communication that too with minimal computation and communication overhead. Our system uses the concept of Elliptic curve Cryptography that provide same level of security as that of other cryptosysytems with reduced key size. This results in less re-keying and re-distribution operations, thus reducing computation and communication overheads respectively
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
Group communication implies a many-to-many communication and it goes beyond both one-to-one
communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user
authentication protocols that authenticate a single user each time, we propose a new type of authentication,
called group authentication, that authenticates all users in a group at once. The group authentication
protocol is specially designed to support group communications. There is a group manager who is
responsible to manage the group communication. During registration, each user of a group obtains an
unique token from the group manager. Users present their tokens to determine whether they all belong to
the same group or not. The group authentication protocol allows users to reuse their tokens without
compromising the security of tokens. In addition, the group authentication can protect the identity of each
user.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
Abstract The aim of this paper is to protect the wireless network against the blackhole attack. Blackhole attack, as the name suggest, drops all the packets forwarded to it. In this paper, we have proposed an intrusion detection system (IDS) scheme to detect the malicious node (blackhole node) and to nullify its effect in the network. The proposed IDS scheme in the presence of blackhole attack gives approximately similar result as that of in the absence of attack. The network comprises for the three modules (i) Default AODV, (ii) AODV in the presence of blackhole attack and (iii) IDS scheme in the presence of attack by considering some parameters such as end to end delay, throughput, packet delivery ratio, normalized routing load etc. The proposed algorithm has been simulated on Network Simulator version-2 (NS-2). Key Words: AODV, Blackhole attack, DSN, IDS scheme, routing misbehavior, security
Elliptic Curve for Secure Group Key Management in Distributed Networkijceronline
Group communication emphasis an important security criterion in the design of a distributed network. All the members of the group must agree to a common session key. The management of this session key refers to the group key management which is based on some group key agreement protocol. In this paper we propose a group key management method for secure group communication in a distributed network. Frequent change in group membership, and managing the key distribution for new members are the two main problems to be faced in group communication that too with minimal computation and communication overhead. Our system uses the concept of Elliptic curve Cryptography that provide same level of security as that of other cryptosysytems with reduced key size. This results in less re-keying and re-distribution operations, thus reducing computation and communication overheads respectively
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONSIJNSA Journal
Group communication implies a many-to-many communication and it goes beyond both one-to-one
communication (i.e., unicast) and one-to-many communication (i.e., multicast). Unlike most user
authentication protocols that authenticate a single user each time, we propose a new type of authentication,
called group authentication, that authenticates all users in a group at once. The group authentication
protocol is specially designed to support group communications. There is a group manager who is
responsible to manage the group communication. During registration, each user of a group obtains an
unique token from the group manager. Users present their tokens to determine whether they all belong to
the same group or not. The group authentication protocol allows users to reuse their tokens without
compromising the security of tokens. In addition, the group authentication can protect the identity of each
user.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Secured Source Anonymous Message Authentication Using Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the wellestablished
point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This nonconvex
max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Extracting and Reducing the Semantic Information Content of Web Documents to ...ijsrd.com
Ranking and optimization of web service compositions represent challenging areas of research with significant implication for realization of the "Web of Services" vision. The semantic web, where the semantics information is indicated using machine-process able language such as the Web Ontology Language (OWL) "Semantic web service" use formal semantic description of web service functionality and enable automated reasoning over web service compositions. These semantic web services can then be automatically discovered, composed into more complex services, and executed. Automating web service composition through the use of semantic technologies calculating the semantic similarities between outputs and inputs of connected constituent services, and aggregate these values into a measure of semantics quality for the composition. It propose a novel and extensible model balancing the new dimensions of semantic quality ( as a functional quality metric) with QoS metric, and using them together as a ranking and optimization criteria. It also demonstrates the utility of Genetic Algorithms to allow optimization within the context of a large number of services foreseen by the "Web of Service" vision. To reduce the semantics of the web documents then to support semantic document retrieval by using Network Ontology Language (NOL) and to improve QoS as a ranking and optimization.
Microcontroller Based Sign Language Gloveijsrd.com
The people who are speech impaired and paralyzed patients those have difficulty in communication. So that patients cannot speak and hear properly and they have problem in communication to other people who don't understand sign languages. So at that time electronic hand glove is used for communication and for that one hand is used for making position of different fingers using flex sensors. The objective of my project is to develop a electronic device for the people who suffer from speech impairment and paralyzed patients. In this, Flex sensor glove is used and Indian sign language's alphabets make using different position of fingers and thumb and their output are shown in the LCD.
Novel Database-Centric Framework for Incremental Information Extractionijsrd.com
Information extraction (IE) has been an active research area that seeks techniques to uncover information from a large collection of text. IE is the task of automatically extracting structured information from unstructured and/or semi structured machine-readable documents. In most of the cases this activity concerns processing human language texts by means of natural language processing (NLP). Recent activities in document processing like automatic annotation and content extraction could be seen as information extraction. Many applications call for methods to enable automatic extraction of structured information from unstructured natural language text. Due to the inherent challenges of natural language processing, most of the existing methods for information extraction from text tend to be domain specific. In this project a new paradigm for information extraction. In this extraction framework, intermediate output of each text processing component is stored so that only the improved component has to be deployed to the entire corpus. Extraction is then performed on both the previously processed data from the unchanged components as well as the updated data generated by the improved component. Performing such kind of incremental extraction can result in a tremendous reduction of processing time and there is a mechanism to generate extraction queries from both labeled and unlabeled data. Query generation is critical so that casual users can specify their information needs without learning the query language.
Fingerprinting Based Indoor Positioning System using RSSI Bluetoothijsrd.com
Positioning is basis for providing location information to mobile users, however, with the growth of wireless and mobile communications technologies. Mobile phones are equipped with several radio frequency technologies for driving the positioning information like GSM, Wi-Fi or Bluetooth etc. In this way, the objective of this thesis was to implement an indoor positioning system relying on Bluetooth Received Signal Strength (RSS) technology and it integrates into the Global Positioning Module (GPM) to provide precise information inside the building. In this project, we propose indoor positioning system based on RSS fingerprint and footprint architecture that smart phone users can get their position through the assistance collections of Bluetooth signals, confining RSSs by directions, and filtering burst noises that can overcome the server signal fluctuation problem inside the building. Meanwhile, this scheme can raise more accuracy in finding the position inside the building.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
Simulation Of Interline Power Flow Controller in Power Transmission Systemijsrd.com
The interline power flow controller (IPFC) is one of the latest generation flexible AC transmission systems (FACTS) controller used to control power flows of multiple transmission lines. The IPFC is the multifunction device, such as power flow control, voltage control, oscillation damping. This paper presents an overview and study and mathematical model of Interline Power Flow Control. The simulations of a simple power system of 500kV/230kV in MATLAB and simulation results are carried out on it. The results without and with IPFC are compared in terms of voltages, active and reactive power flows to demonstrate the performance of the IPFC model.
Development of Adaptive Neuro Fuzzy Inference System for Estimation of Evapot...ijsrd.com
The accuracy of an adaptive neurofuzzy computing technique in estimation of reference evapotranspiration (ETo) is investigated in this paper. The model is based on Adaptive Neurofuzzy Inference System (ANFIS) and uses commonly available weather information such as the daily climatic data, Maximum and Minimum Air Temperature, Relative Humidity, Wind Speed and Sunshine hours from station, Karjan (Latitude - 22°03'10.95"N, Longitude - 73°07'24.65"E), in Vadodara (Gujarat), are used as inputs to the neurofuzzy model to estimate ETo obtained using the FAO-56 Penman.Monteith equation. The daily meteorological data of two years from 2009 and 2010 at Karjan Takuka, Vadodara, are used to train the model, and the data in 2011 is used to predict the ETo in that year and to validate the model. The ETo in training period (Train- ETo) and the predicted results (Test-ETo) are compared with the ETo computed by Penman-Monteith method (PM-ETo) using "gDailyET" Software. The results indicate that the PM-ETo values are closely and linearly correlated with Train- ETo and Test- ETo with Root Mean Squared Error (RMSE) and showed the higher significances of the Train- ETo and Test- ETo. The results indict the feasibility of using the convenient model to resolve the problems of agriculture irrigation with intelligent algorithm, and more accurate weather forecast, appropriate membership function and suitable fuzzy rules.
Transient Stability of Power System using Facts Device-UPFCijsrd.com
This paper is based on Occurrence of a fault in a power system causes transients. To stabilize the system, The Flexible Alternating Current Transmission (FACTS) devices such as UPFC are becoming important in suppressing power system oscillations and improving system damping. The UPFC is a solid-state device, which can be used to control the active and reactive power.. By using a UPFC the oscillation introduced by the faults, the rotor angle and speed deviations can be damped out quickly than a system without a UPFC. The effectiveness of UPFC in suppressing power system oscillation is investigated by analyzing their oscillation in rotor angle and change in speed occurred in the two machine system considered in this work. A proportional integral (PI) controller has been employed for the UPFC. It is also shown that a UPFC can control independently the real and reactive power flow in a transmission line. A MATLAB simulation has been carried out to demonstrate the performance of the UPFC in achieving transient stability of the two-machine five-bus system.
Quality Evaluation Technique For Phyllanthus Emblica(Gooseberry) Using Comput...ijsrd.com
This paper proposes quality assessment method to classify a phyllanthus emblica (gooseberry) using computer vision by surface and geometric features. India is one of the most important gooseberry producers in North Asia, than Germany, Poland, U.K, Russia etc., but fruit sorting in some area is still done by hand which is tedious and inaccurate. Thus, the need exists for improvement of efficiency and accuracy of this fruit quality assessment that can meet the demands of international markets. Low-cost and non-destructive technologies capable of sorting gooseberry according to their properties would help to promote the gooseberry export industries. This paper propose the method of colorization and extracting value parameters, by this parameters the detection of browning or affected part and identification of the uniform shape and size. This differentiates the quality of gooseberries processed as well as fresh. For classification the decision tree is used.
Secured Source Anonymous Message Authentication Using Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A group key generation algorithm investigates group secret key generation problems for
different types of wireless networks, by exploiting physical layer characteristics of wireless channels. A
new group key generation strategy with low complexity is proposed, which combines the wellestablished
point-to-point pair wise key generation technique, the multisegment scheme, and the onetime
pad. In particular, this group key generation process is studied for three types of communication
networks: 1) A three-node network; 2) A multi node ring network; and 3) A multi node mesh network.
Three group key generation algorithms are developed for these communication networks, respectively.
The analysis8 shows that the first two algorithms yield optimal group key rates, whereas the third
algorithm achieves the optimal multiplexing gain. Next, for the first two types of networks, we address
the time allocation problem in the channel estimation step to maximize the group key rates. This nonconvex
max – min time allocation problem is first reformulated into a series of geometric programming,
and then, a single-condensation method based iterative algorithm is proposed. Numerical results are also
provided to validate the performance of the proposed key generation algorithms and the time allocation
algorithm.
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present.
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Wireless Sensor Networks is an infrastructure less, self-configured, reprogrammable, energy-aware network used
in various applications. Many networks works on security of data including mainly ASCII values but not the non English end users. BDNA cryptography describes how to encrypt non English patterns but which leads to propagation of more bits transmitted means indirectly consumes more energy in WSN. In this we propose new steps to reduce the transmission of more bytes in the network. This gives high propagation speed in the network with minimum hash overhead.
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
Extracting and Reducing the Semantic Information Content of Web Documents to ...ijsrd.com
Ranking and optimization of web service compositions represent challenging areas of research with significant implication for realization of the "Web of Services" vision. The semantic web, where the semantics information is indicated using machine-process able language such as the Web Ontology Language (OWL) "Semantic web service" use formal semantic description of web service functionality and enable automated reasoning over web service compositions. These semantic web services can then be automatically discovered, composed into more complex services, and executed. Automating web service composition through the use of semantic technologies calculating the semantic similarities between outputs and inputs of connected constituent services, and aggregate these values into a measure of semantics quality for the composition. It propose a novel and extensible model balancing the new dimensions of semantic quality ( as a functional quality metric) with QoS metric, and using them together as a ranking and optimization criteria. It also demonstrates the utility of Genetic Algorithms to allow optimization within the context of a large number of services foreseen by the "Web of Service" vision. To reduce the semantics of the web documents then to support semantic document retrieval by using Network Ontology Language (NOL) and to improve QoS as a ranking and optimization.
Microcontroller Based Sign Language Gloveijsrd.com
The people who are speech impaired and paralyzed patients those have difficulty in communication. So that patients cannot speak and hear properly and they have problem in communication to other people who don't understand sign languages. So at that time electronic hand glove is used for communication and for that one hand is used for making position of different fingers using flex sensors. The objective of my project is to develop a electronic device for the people who suffer from speech impairment and paralyzed patients. In this, Flex sensor glove is used and Indian sign language's alphabets make using different position of fingers and thumb and their output are shown in the LCD.
Novel Database-Centric Framework for Incremental Information Extractionijsrd.com
Information extraction (IE) has been an active research area that seeks techniques to uncover information from a large collection of text. IE is the task of automatically extracting structured information from unstructured and/or semi structured machine-readable documents. In most of the cases this activity concerns processing human language texts by means of natural language processing (NLP). Recent activities in document processing like automatic annotation and content extraction could be seen as information extraction. Many applications call for methods to enable automatic extraction of structured information from unstructured natural language text. Due to the inherent challenges of natural language processing, most of the existing methods for information extraction from text tend to be domain specific. In this project a new paradigm for information extraction. In this extraction framework, intermediate output of each text processing component is stored so that only the improved component has to be deployed to the entire corpus. Extraction is then performed on both the previously processed data from the unchanged components as well as the updated data generated by the improved component. Performing such kind of incremental extraction can result in a tremendous reduction of processing time and there is a mechanism to generate extraction queries from both labeled and unlabeled data. Query generation is critical so that casual users can specify their information needs without learning the query language.
Fingerprinting Based Indoor Positioning System using RSSI Bluetoothijsrd.com
Positioning is basis for providing location information to mobile users, however, with the growth of wireless and mobile communications technologies. Mobile phones are equipped with several radio frequency technologies for driving the positioning information like GSM, Wi-Fi or Bluetooth etc. In this way, the objective of this thesis was to implement an indoor positioning system relying on Bluetooth Received Signal Strength (RSS) technology and it integrates into the Global Positioning Module (GPM) to provide precise information inside the building. In this project, we propose indoor positioning system based on RSS fingerprint and footprint architecture that smart phone users can get their position through the assistance collections of Bluetooth signals, confining RSSs by directions, and filtering burst noises that can overcome the server signal fluctuation problem inside the building. Meanwhile, this scheme can raise more accuracy in finding the position inside the building.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
Simulation Of Interline Power Flow Controller in Power Transmission Systemijsrd.com
The interline power flow controller (IPFC) is one of the latest generation flexible AC transmission systems (FACTS) controller used to control power flows of multiple transmission lines. The IPFC is the multifunction device, such as power flow control, voltage control, oscillation damping. This paper presents an overview and study and mathematical model of Interline Power Flow Control. The simulations of a simple power system of 500kV/230kV in MATLAB and simulation results are carried out on it. The results without and with IPFC are compared in terms of voltages, active and reactive power flows to demonstrate the performance of the IPFC model.
Development of Adaptive Neuro Fuzzy Inference System for Estimation of Evapot...ijsrd.com
The accuracy of an adaptive neurofuzzy computing technique in estimation of reference evapotranspiration (ETo) is investigated in this paper. The model is based on Adaptive Neurofuzzy Inference System (ANFIS) and uses commonly available weather information such as the daily climatic data, Maximum and Minimum Air Temperature, Relative Humidity, Wind Speed and Sunshine hours from station, Karjan (Latitude - 22°03'10.95"N, Longitude - 73°07'24.65"E), in Vadodara (Gujarat), are used as inputs to the neurofuzzy model to estimate ETo obtained using the FAO-56 Penman.Monteith equation. The daily meteorological data of two years from 2009 and 2010 at Karjan Takuka, Vadodara, are used to train the model, and the data in 2011 is used to predict the ETo in that year and to validate the model. The ETo in training period (Train- ETo) and the predicted results (Test-ETo) are compared with the ETo computed by Penman-Monteith method (PM-ETo) using "gDailyET" Software. The results indicate that the PM-ETo values are closely and linearly correlated with Train- ETo and Test- ETo with Root Mean Squared Error (RMSE) and showed the higher significances of the Train- ETo and Test- ETo. The results indict the feasibility of using the convenient model to resolve the problems of agriculture irrigation with intelligent algorithm, and more accurate weather forecast, appropriate membership function and suitable fuzzy rules.
Transient Stability of Power System using Facts Device-UPFCijsrd.com
This paper is based on Occurrence of a fault in a power system causes transients. To stabilize the system, The Flexible Alternating Current Transmission (FACTS) devices such as UPFC are becoming important in suppressing power system oscillations and improving system damping. The UPFC is a solid-state device, which can be used to control the active and reactive power.. By using a UPFC the oscillation introduced by the faults, the rotor angle and speed deviations can be damped out quickly than a system without a UPFC. The effectiveness of UPFC in suppressing power system oscillation is investigated by analyzing their oscillation in rotor angle and change in speed occurred in the two machine system considered in this work. A proportional integral (PI) controller has been employed for the UPFC. It is also shown that a UPFC can control independently the real and reactive power flow in a transmission line. A MATLAB simulation has been carried out to demonstrate the performance of the UPFC in achieving transient stability of the two-machine five-bus system.
Quality Evaluation Technique For Phyllanthus Emblica(Gooseberry) Using Comput...ijsrd.com
This paper proposes quality assessment method to classify a phyllanthus emblica (gooseberry) using computer vision by surface and geometric features. India is one of the most important gooseberry producers in North Asia, than Germany, Poland, U.K, Russia etc., but fruit sorting in some area is still done by hand which is tedious and inaccurate. Thus, the need exists for improvement of efficiency and accuracy of this fruit quality assessment that can meet the demands of international markets. Low-cost and non-destructive technologies capable of sorting gooseberry according to their properties would help to promote the gooseberry export industries. This paper propose the method of colorization and extracting value parameters, by this parameters the detection of browning or affected part and identification of the uniform shape and size. This differentiates the quality of gooseberries processed as well as fresh. For classification the decision tree is used.
Modeling and Simulation of Base Plate of Friction Stir Welding-Advanced Weldi...ijsrd.com
Friction stir processing is an emerging technique based on the principles of friction stir welding (FSW). It is a solid-state joining method that is energy efficient, environmentally friendly, and versatile. It is considered by many to be the most significant development in metal joining in a decade. The basic concept of friction stir processing is remarkably simple. A rotating tool with pin and shoulder is inserted in the material to be joined, and traversed along the line of interest. The heating is localized, and is generated by friction between the tool and the work piece, with additional adiabatic heating from metal deformation. A processed zone is produced by movement of material from the front of the pin to the back of the pin.
In this paper we attempt to give a networking solution by applying VLSI architecture techniques to router design for networking systems to provide intelligent control over the network. Networking routers to have limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the latency and security concerns. Other techniques we explore include the use of multiple protocols. We attempt to overcome the security and latency issues with protocol switching technique embedded in the router engine itself. The approach is based on hardware coding to reduce the impact of latency issues as the hardware itself is designed according to the need. We attempt to provide a multipurpose networking router by means of Verilog code, thus we can maintain the same switching speed with more security we embed the packet storage buffer on chip and generate the code as self-independent VLSI based router. Our main focus is the implementation of hardware IP .router. The approach enables the router to process multiple incoming IP packets with different versions of protocols simultaneously, e.g. for IPv4 and IPv6. The approach will results in increased switching speed of routing per packet for both current trend protocols, which we believe would result inconsiderable enhancement in networking systems.
Packed Bed Reactor for Catalytic Cracking of Plasma Pyrolyzed Gasijsrd.com
Packed bed reactors play vital role in chemical industries for obtaining valuable product, like steam reforming of natural gas, ammonia synthesis, sulphuric acid production, methanol synthesis, methanol oxidation, butadiene production, styrene production. It is not only used for production but also used in separation process like adsorption, distillation and stripping section. Packed bed reactors are work horse of the chemical and petroleum industries. Its low cost, and simplicity makes it first choice to any chemical processes. In our experimental work vacuum residue is used as a feed which is pyrolyzed in the primary chamber with the help of plasma into hydrogen and hydrocarbon gases which is feed stream to the Ni catalyst containing packed bed reactor called catalytic cracker. Ni loading in the catalyst about 70 % is used to crack or decompose lower molecular hydrocarbon in to hydrogen to maximize the energy content per mass flow of gas steam and also to minimize the carbon dioxide equivalent gases at outlet of the reactor. Since cracking is surface phenomena so the catalyst play important role in designing of reactor shape. Parallel Catalytic packed bed with regeneration and deactivation can be used for commercial production of clean fuel.
A Two Tiered Data Origin Authentication Scheme for Adhoc Networkijsrd.com
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. Therefore, authenticating the source and ensuring the integrity of the message traffic become a fundamental requirement for the operation and management of the network. Since we are using small system in the adhoc network application, memory usage is also an important issue. Here we are presenting a system which reduces the memory attacks and control the memory usage of the devices in the adhoc network. By clustering the adhoc network we also achieve high scalability. One way hash function and MACs are used for the authentication purpose. The simulation demonstrates the advantage of this system to existing system in terms of throughput, memory, delay, etc.
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...cscpconf
Providing security in group communication is more essential in this new network environment. Authentication and Confidentiality are the major concerns in secure group
communication. Our proposed approach uses an authenticated group key transfer protocol that relies on trusted key generation center (KGC). KGC computes group pair for each
individual and transport the pair of values to all group members in a secured manner. Password based authentication mechanism is used to avoid the illegal member access in a
group Also, the proposed approach facilitates efficient key computation technique such that only authorized group members will be able to computer and retrieve the secret key and unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the pair generated for the computation of key is also very strong since the cryptographic techniques are used which provides efficient computation.
A secure key computation protocol for secure group communication with passwor...csandit
Providing security in group communication is more essential in this new network
environment. Authentication and Confidentiality are the major concerns in secure group
communication. Our proposed approach uses an authenticated group key transfer protocol
that relies on trusted key generation center (KGC). KGC computes group pair for each
individual and transport the pair of values to all group members in a secured manner.
Password based authentication mechanism is used to avoid the illegal member access in a
group Also, the proposed approach facilitates efficient key computation technique such that
only authorized group members will be able to computer and retrieve the secret key and
unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and
relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the
pair generated for the computation of key is also very strong since the cryptographic
techniques are used which provides efficient computation.
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
Security in mobile adhoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. The major difficulty in adhoc network occurs when a new node join network but not having any trusts relation with other node of network. We have proposed a new mechanism that provides trust conscious and secure data communication between the nodes. In this mechanism we will dynamically increase the trust from (Low to High) between the mobile nodes using proxy node. When mobile node needs secure data communication, it will generate a dynamic secret session key with the desired destination mobile node directly or via proxy mobile node. These dynamic secret session keys are generated using message digest and Diffie-Hellmann protocol.
Similar to A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network (20)
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 4, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1022
A Survey of Source Authentication Schemes for Multicast transfer in
Adhoc Network
Tibin Thomas1
Jyothish K John2
1
M. Tech 2
Assistant Professor
1, 2
Department of Computer Science and Engineering
1, 2
Federal Institute of Science and Technology (FISAT), Angamaly, India
Abstract—An adhoc network is a collection of autonomous
nodes with dynamically changing infrastructure. Multicast
is a good mechanism for group communication. It can be
used in the group oriented applications like video/audio
conference, interactive group games, video on demand
etc. The security problems obstruct the large deployment of
the multicast communication model. Multicast data origin
authentication is the main component in the security
architecture. The authentication schemes should scalable
and efficient against packet loss. In this article we discuss
varies authentication scheme for multicast data origin with
their advantage and disadvantage
Keywords: Digital Signature, Elliptic curves, Hashes,
Message Authentication code, UMAC function
I. INTRODUCTION
An adhoc network is a collection of autonomous nodes with
dynamically changing infrastructure. Nodes in the
network can communicate each other either directly or by
using multi-hop communication. One of the main
advantages in adhoc network is multicast communication.
Multicast communication provides large scale content
distribution through many-to-many or one-to-many data
transferring schemes
A. MulticastCommunication
Multicast is the best communication mechanism for team
oriented application like conferences, video games, video
on demand etc. For sending the data in multicast
communication uses a multicast tree that covers all the
nodes in the network, and thus saves the bandwidth.
The three main properties of multicast communication
are:
Open group communication: It allows the group
membership is transparent to the source.
All members in the group have same multicast address:
This provides the data sent to a multicast address will
delivers to all members in that group.
Open access to send packet to the group: Any host in the
group can send multicast data, and the data will delivered to
all members in the group.
One of the main challenges in multicast data transfer is
source authentication. Source authentication enables
receiver to verify the authenticity of received packet. Other
issues in multicast communication are nonrepudiation, data
integrity and data confidentiality. Non-repudiation allows
the receiver to prove which host send a particular message.
Data integrity makes the receiver to check whether the data
has not been modified Data confidentiality allows the
information is not made disclosed to the unauthenticated
receivers.
B. Authentication in group communication
Authentication in group communication remains a
challenging problem in the terms of efficiency, scalability
and performance. Even though there are technologies like
hashes [16-18], MACs [19], and digital signature [20, 21]
provides integrity, authentication and non-repudiation for
data, they are designed for point-to-point communication.
This problem is mainly due to the presence of multiple
members in the group. There are two types of
authentication in group communication
1) Group communication: For assuring that received
multicast data is from a valid group member.
2) Data origin authentication: For assuring that received
multicast data from group members originate from a
source having valid identity.
To provide the group authentication, the members in the
group use a shared key. By creating a MAC with this
group key assures that source (group member) of the data is
valid, since only valid group member have the shared key.
Using a single shared key is not a secure solution for the
data origin authentication in multicast communication
because this key is known to all group members cannot be
used to identify a specific members. Below we are
describes the various data origin authentication schemes.
The schemes can be classified into two levels. In the first
level includes the data origin authentication schemes
having nonrepudiation. The second level includes s data
origin authentication schemes without nonrepudiation
The remaining of this paper is organized as
follows. In section 2 describes multicast data origin
authentication with non-repudiation schemes are
discussed with their advantage and disadvantage. In
section 3 describes multicast data origin authentication
without non- repudiation schemes are discussed with
their advantage and disadvantage. Section 4 compares
different authentication schemes. We also propose a
modified scheme in section 5.
II. MULTICAST DATA ORIGIN
AUTHENTICATION WITH NON-REPUDIATION
To assure authentication and non-repudiation the sender
has to sign the message. For signing the sender has to use a
private key. Hence, a possible solution to guarantee non
repudiation would be to sign each multicast message and
2. A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
(IJSRD/Vol. 1/Issue 4/2013/0050)
All rights reserved by www.ijsrd.com 1023
then send the signature along with the message. Upon
receiving the data, the receiver can verify the signature
using the public key of the sender. The figure 1 shows a
general procedure of creating and verifying a signature
Fig. 1: A general method of assuring non-repudiation using
digital signature
A. Latif-Aslan-Ramly Multi-cast Authentication Protocol
The authentication protocol described in [6] uses both
public key signature and UMAC function. It uses eraser
code function to resist the packet loss and a counter value to
resist reply attack. The use symmetric encryption system
like AES provides confidentiality. At last sender sends
the data packet with counter, the UMAC output, and
output of the encryption algorithm. The protocols have
lowest computation and communication and the protocol
doesn’t require time synchronization, and have more
resistance against the packet loss.
B. MABS
This Zhou et al. [7] protocol named MABS which uses
batch signature to authenticate an arbitrary number of data
packets simultaneously. The basic scheme called MABS- B
provides batch signatures. The author’s propose two
batch scheme based on BLS and DSA signature scheme.
The author’s also extends the MABS-B with packet
filtering named as MABS-E, which can alleviate the DOS
impact. The scheme eliminates correlation among the
packets and also has small latency and communication
overhead .The main advantage of the scheme is, even if
attacker forged some packet we can verify the received
packet. This advantage is actually cause problem, because it
gives provision for the sender to deny the ownership of sent
packet.
C. Amortized scheme
Abuein et al [8] propose a multicast stream authentication
scheme which amortizes a single signature over a group of
packets. The scheme uses a multiple connected chain
model, in which each chain connects some packets
together. In this the message is first divided into many
blocks, where each block contain many packets. For strong
loss resistance hash of each packet is append to other
packets. For a specific number of packets, source finds
the hash Then appends all the hash and sign them using
the key Then sends this signature packet at the end of the
block to achieve non-repudiation. By increasing the
numbers of appended hashe s to ot her pac ket
the sche me ac hie ve higher authentication probability
and strong loss resistance against burst packet loss. Since
signature packet is sending at end of the block, no
immediate authentication is possible
D. Hybrid scheme
Aslan proposed [9] a hybrid scheme for authentication
over lossy networks. The method can be used for
authenticating real time data applications. The scheme is
based on the work done by Gennaro and Rohatgi [10]
with an enhancement using the Golle and Modadugo [11]
method. In this the stream is divided into m packets. Then
hash of each packet is appended into preceding packet
and to another place in the stream. At last the first packet is
signed. The scheme requires only less buffer space and low
delay at the sender and receiver side. It can resist packet
loss and the packets are joinable at any time
E. Tree chaining
Wong and Lam [12] proposed tree chaining, a technique
that partitions the stream of data packets into blocks and
forms a tree structure to perform authentication. In the
proposed method a single signature can be used to
authenticate each block of n messages. Each leaf node is a
Message digest of a data packet. Then the parent nodes
are the message digest of two children. At last the root
node become the message digest of the entire block,
which is signed and send with message. The receiver
recomputes digest and compared it to the signed
received digest. The scheme improved the signing and
verification rates. Packet signature is small and they are
individually verifiable. The data packets are associated
between each other, so they are sensitive to packet loss.
F. ECDSA
The Elliptic Curve Digital Signature Algorithm (ECDSA) is
a mathematically derived form of Digital Signature
Algorithm (DSA). It has been accepted by ANSI, ISO and
IEEE. Johnson et al. gave a complete account of ECDSA in
[13]. It uses a public key and a private key. The public key
is a random multiple of the base point, while the
private key is the integer used to generate the multiple.
The key pair is associated with a particular set of Elliptic
Curve domain parameters. Since we are using the elliptic
curve, the strength per bit is high. After the authentication of
information this scheme provides fast and secure
distribution of information. Even after providing high
security level, this scheme is vulnerable to the attack on
Elliptic Curve Discrete Logarithmic Problem and Attacks on
the hash function.
III. MULTICAST DATA ORIGIN AUTHENTICATION
WITHOUT NON-REPUDIATION
The best solution to make multicast data origin
authentication is to make the parties in the group to use a
shared key. For sending a message sender finds the MAC of
the message using the shared key and send the MAC along
with the message. On receiving the message with the
MAC, the receiver verify the authentication by verifying
the received MAC. Figure 2 shows a general
The above solution creates security problems in multicast
communication, since all the members are using same
shared key. So the chance of impersonation as the valid
3. A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
(IJSRD/Vol. 1/Issue 4/2013/0050)
All rights reserved by www.ijsrd.com 1024
user becomes high. This problem can be solved by
making authentication information as asymmetric.
Asymmetric means, receivers can only verify the
authentication information but cannot forge an
authentication information.
There are three major approaches to introduce
asymmetry in authentication data.
Fig 2: A general method for assuring data origin
Authentication using MACs
Secret Information Asymmetry: Here each sender have a
set of secret keys. Each receiver have a share of these
keys. In this strategy for creating an authentication
information requires the knowledge of all keys. So the
receivers cannot forge an authentication information.
1) Time asymmetry: In this scheme the time
asymmetry is achieved by changing the shared key
periodically. Also sender guarantees that, the message
will be delivered to all members before disclosing the
key that is used in the corresponding interval. This
prevents the attacker for forging the message using that
key.
2) Hybrid asymmetry: This is the combination of both
time and secret information asymmetry. It avoided
the disadvantage of both approaches. In the following
subsections we describe the each categories with
their advantage and drawbacks.
A. SECRET INFORMATION ASYMMETRY
1) Canetti et al. Protocol
The Canetti et al. protocol [1] assures the authentication by
appending MACs to the message. Sender calculates the
MACs using k different keys. Each receiver holds a share of
secret keys among k keys and verifies the authenticity of
the received massage using that shared keys. For an
attacker to create a message requires k keys from a
coalition of m receivers. The main challenge of this
solution is that, sender must share the keys such that no
coalition of m bad creates all the holds by a good member.
Since this scheme depends on the MACs, which is
very efficient to generate and verify this proposed
scheme allows an efficient generation and verification of
authentication data. Since each packet contain the
authentication data, each packets are individually
verifiable at any time and also tolerant to packet loss. The
main disadvantage of this scheme is that, it cannot
overcome the vulnerability that caused by collusion of
bad members.
2) Desmedt et al. Protocol
Desmedt et al. Protocol [2] is a polynomial based
scheme.This scheme can assure a k out of n multicast
authentication. In this scheme each sender creates a
polynomial of degree l using the message that is to be
send. Then the sender sends a share of the polynomial to
each receiver. The source sends the share in such a way
that, at least l share of polynomial is required to forge an
authenticator. Since the scheme allows a maximum of l-1
members to collude, the security of the system holds. The
main advantage of this method is the authenticator of each
packet is small in size. This scheme is also tolerant to
packet loss, since all packet contain the authentication
information. Thus each packet can be verified
independently from other packet at any time. The main
drawback is that, this method is not practical for most of the
steaming application, because the source needs to
generate the polynomial and shares them to each receiver for
each message.
B. TIME ASYMMETRY
1) TESLA
The TESLA (Timed Efficient Stream Loss-tolerant
Authentication) protocol proposed by Perrig et al.[3] uses
one way key chain to create the MAC for a message. The
sender first generate one way key chain to use as the
MAC keys. From that a secret MAC key used to generate
the MAC for a particular message in a time interval. Then
the message with the corresponding MAC is send to the
receiver. The key that is used to authenticate the message is
kept secret for a time interval, and discloses the key to the
receiver after the interval. This prevent the attacker to
receive the key before the message. Upon receiving the
key the receiver can verify the authenticity of the
previously received packet. For each time interval, this
scheme used new MAC key from the one way key chain.
Each key is valid only for a time interval. The message
that contain the MAC with expired key will be discarded.
The main advantage is the reduced size of the
authentication information. The generation and
verification are efficient and the packets are tolerant
against the packet loss. The requirement of time
synchronization is the main overhead of this scheme. This
scheme is also vulnerable to memory based DoS attack
2) µTESLA
Perrig et.al proposed a modification [4] for removing
some disadvantage of the TESLA protocol. By modifying
authentication information, the receiver can immediately
authenticate the received packet. This scheme also
improve the scalability properties of TESLA protocol.
µTESLA is more useful in adhoc network with resource
constrained environment.
C. HYBRID SCHEME
1) BiBA
Perrig [5] proposed a hybrid asymmetric authentication
scheme called BiBa which provides one time signature
and broadcast authentication protocol. The BiBa signature
exploits the birthday paradox of a hash function on some
pseudo random number called SEALS to achieve
efficiency and security. SEAL values are the values which
4. A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
(IJSRD/Vol. 1/Issue 4/2013/0050)
All rights reserved by www.ijsrd.com 1025
can be verified by the public key of the sender. Sender
sends the message with the signature which consist of the
subset of SEALS that shows birthday paradox and can be
verified at receiver side. This way it achieve the secret
information asymmetry. Signing the consecutive
messages of the stream, receiver would know all SEALS
held by the sender. To avoid this problem BiBa use time
asymmetric approach by using different set of SEAL
values after a time period. Since BiBa append the
signature with each packet, the scheme is tolerant to
packet loss. Biba is not vulnerable to collusion of bad
receivers because of the time asymmetry feature. The
disadvantages of the system are 1) public key size is
larger and 2) the sender and receiver must be time
synchronized so that receiver know which SEALs to be
used for verifying the signature.
D. TAM
Althouse et al. proposed a hybrid two tiered scheme that
exploits network clustering to reduce overhead and
increase scalability. In this method, the entire adhoc
network is divided as clusters, where the inter cluster
authentication is done using time asymmetric approach
while the intra cluster authentication is done using
TESLA protocol (discussed in the previous section).
Cluster head is created for each cluster for communicating
in inter cluster multicasting. Less communication
overhead and scalability are the main advantages. The
main disadvantage of this scheme is memory DoS attack.
Delayed authentication and time synchronization are the
other challenges of this method.
IV. COMPARISON OF DIFFERENT
AUTHENTICATION
Latency: Due to the delay in creation/verification of
signature latency may occur at sender/receiver sideTime
synchronization: Since keys for time asymmetry schemes
are valid only for a period, time synchronization may be
required. Resist the packet loss: A good authentication
scheme must handle the authentication of packets even
if some packet lost.
SCHEMES
The authentication schemes can be analysed mainly based
on some features like latency of sending or receiving the
data, need of time synchronization, the ability to resist the
packet loss etc.
V. PROPOSED SYSTEM
The above discussed hybrid scheme TAM uses the
protocol TESLA. The main disadvantage of TESLA
protocol is memory DoS attack. Perrig et al. [15]describes
about this problem in detail and provides the solution. He
proposes a modification to TESLA protocol and create a
new protocol called TESLA++. In this protocol the MAC of
packet send to the destination with the index of the key
before sending the data. The MAC is stored in a
compressed form to reduce the memory requirement at
the receiver side. Then sends the message and the key.
Only message having a corresponding MAC, already
received will be accepted, otherwise rejected. This way
flooding of invalid message can be reduced and thus
receiver can gain memory. So to avoid the shortcoming of
TAM, we propose to use TESLA++ instead of TESLA.
VI. CONCLUSION
In this article we first show the problems that are related to
the data source authentication. Then we presented
protocols that falls in different classes. This survey gives us
many conclusions regarding the authentication. First, the
5. A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Network
(IJSRD/Vol. 1/Issue 4/2013/0050)
All rights reserved by www.ijsrd.com 1026
data source authentication is an important part ingroup
communication. However many problems like, the number
of members in the group and volume of data used by the
multicast application need scalability. Since the receivers
may have less amount of resources the schemes that we
discussed cannot assume high availability of resources.
So these type of problems must be solved to allow a
larger deployment of multicast applications.
REFERENCES
[1] R. Canetti et al., “Multicast security: a taxonomy and
efficient constructions,” in Proc. 1999 IEEE
INFOCOM
[2] Y. Desmedt, Y. Frankel, and M. Yung, “Multi-
receiver/Multisender Network Security: Efficient
authenticated Multicast/Feedback,” IEEE
INFOCOM’92, 1992, pp. 2045–54
[3] A. Perrig, R. Canetti, D. Song, and D. Tygar,
“Efficient authentication and signing of multicast
streams over lossy channels,” in Proc. 2000 IEEE
Symposium Security Privacy.
[4] A. Perrig et al., “Efficient and Secure Source
Authentication for Multicast,” 8th Annual Internet
Society Symp. Network and Distributed System
Security, 2001.
[5] A. Perrig, “The BiBa one-time signature and
broadcast authentication protocol,” in Proc. 2001
ACM Conf. Computer Commun. Security.
[6] R.Abdellatif, H.K. Aslan, and S.H.Elramly “New
Real Time Multicast Authentication Protocol”,
International Journal of Network ecurity, Vol.12,
No.1, PP.13-20, Jan. 2011.
[7] Y.Zhou, X. Zhu, and Y.Fang”MABS: Multicast
Authentication Based on Batch Signature” IEEE
Trans. On Mobile Computing, vol. 9, no. 7, pp. 982-
993 July 2010.
[8] Q. Abuein and S. Shibusawa, “A Graph-based new
amortization scheme for multicast streams
authentication”, Journal of Advanced Modelling and
Optimization, Vol. 7, No. 2, pp.238-261, 2005.
[9] H. K. Aslan “A hybrid scheme for multicast
authentication over lossy networks” Elsevier,
Computer & security, Vol. 23 pp 705 -713, 2004.
[10] Gennaro R, Rohatgi P. How to sign digital streams. In:
Proceedings of CRYPTO’97. California, USA; August
1997. p. 180e97.
[11] Golle P, Modadugo N. Streamed authentication in the
presence of random packet loss. In: Proceedings of
the ISOC network and distributed system security
symposium. California, USA; February 2001. p.
13e22.
[12] C. Wong and S. Lam, “Digital Signatures for
Flows and Multicasts,” IEEE/ACM Trans. On
Networking , vol. 7, Aug ,2004.
[13] Don Johnson, Alfred Menezes and Scott Vanstone.
“The Elliptic Curve Digital Signature Algorithm
(ECDSA)”. Published in International Journal of
Information Security, Vol. 1 (2001) pp. 36-63
[14] Mohamed Younis, Osama Farrag, and Bryan
Althouse.“TAM: A Tiered Authentication ofMulticast
Protocol for Ad-Hoc Networks” IEEE Trans. On
Network and Service management, vol 9, March 2012
[15] A. Studer, F. Bai, B. Bellur & A. Perrig “Flexible,
Extensible, and Efficient VANET Authentication”
IEEE Journal of Communications and Networks ,
vol. 11, no. 6, Dec. 2009
[16] D. Eastlake and P. Jones, US Secure Hash
Algorithm 1 (SHA1), Sept. 2001, RFC 3174.
[17] B. Kaliski, “The MD2 Message-Digest Algorithm,”
Apr. 1992,RFC 1319.
[18] R. Rivest, “The MD5 Message-Digest Algorithm,” Apr.
1992,RFC 1321.
[19] H. Krawczyk, M. Bellare, and R. Canetti, “HMAC:
Keyed-Hashing for Message Authentication,” Feb.
1997, RFC 2104.
[20] Federal Information Processing Standards
Publication, Digital Signature Standard (DSS), May
1994, FIPS PUB 186.
[21] R. L. Rivest, A. Shamir, and L. M. Adelman, “A
Method for Obtaining Digital Signatures and Public-
Key Cryptosystems,” Commun. ACM, vol. 21, no. 2,
1978, pp. 120–26.