The document discusses a new cell-counting attack against the Tor network and proposes a mechanism to prevent it. The attack allows an attacker to confirm anonymous communication relationships quickly by embedding a secret signal in the variation of cell counts in target traffic. It works by having an attacker at the exit router manipulate cell counts according to a signal, which is then detected by an accomplice at the entry router. The proposed prevention mechanism would aim to prevent this attack from being possible in the Tor network.
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...IOSR Journals
This document describes a proposed framework called Anonymous and Accountable communication topology (AACT) for wireless mesh networks (WMNs). AACT aims to achieve four goals: 1) security through mutual authentication of users and routers, 2) anonymity through anonymous authentication of users and routers, 3) accountability by enabling auditing of network communications, and 4) sophisticated user privacy through minimum disclosure of user information probabilistically while maintaining accountability. The document provides background on the cryptography techniques used in AACT, including onion routing, and outlines the problem formulation and details of the AACT framework.
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
As technology is running on its wheels, networking has turned into one of our basic aspects. In this world along with
networking inimical vulnerabilities are also advancing in a drastic manner, resulting in perilous security threats. This calls for the great
need of network security. ARP spoofing is one of the most common MITM attacks in the LAN. This attack can show critical
implications for internet users especially in stealing sensitive information’s such as passwords. Beyond this it can facilitate other
attacks like denial of service(DOS), session hijacking etc..,. In this paper we are proposing a new method by encrypting MAC address
to shield from ARP cache poisoning
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user’s privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
Mobile ad-hoc networks require anonymous communications in order to thwart new wireless passive attacks; and to protect new
assets of information such as nodes locations, motion patterns, network topology and traffic patterns in addition to conventional identity and
message privacy. The transmitted routing messages and cached active routing entries leave plenty of opportunities for eavesdroppers.
Anonymity and location privacy guarantees for the deployed ad hoc networks are critical in military and real time communication systems,
otherwise the entire mission may be compromised. This poses challenging constraints on MANET routing and data forwarding. To address
the new challenges, several anonymous routing schemes have been proposed recently.
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...IOSR Journals
This document describes a proposed framework called Anonymous and Accountable communication topology (AACT) for wireless mesh networks (WMNs). AACT aims to achieve four goals: 1) security through mutual authentication of users and routers, 2) anonymity through anonymous authentication of users and routers, 3) accountability by enabling auditing of network communications, and 4) sophisticated user privacy through minimum disclosure of user information probabilistically while maintaining accountability. The document provides background on the cryptography techniques used in AACT, including onion routing, and outlines the problem formulation and details of the AACT framework.
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
As technology is running on its wheels, networking has turned into one of our basic aspects. In this world along with
networking inimical vulnerabilities are also advancing in a drastic manner, resulting in perilous security threats. This calls for the great
need of network security. ARP spoofing is one of the most common MITM attacks in the LAN. This attack can show critical
implications for internet users especially in stealing sensitive information’s such as passwords. Beyond this it can facilitate other
attacks like denial of service(DOS), session hijacking etc..,. In this paper we are proposing a new method by encrypting MAC address
to shield from ARP cache poisoning
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Cryptography System for Online Communication Using Polyalphabetic Substitutio...Eswar Publications
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
This document discusses providing security against distributed denial of service (DDOS) attacks in mobile ad hoc networks. It begins by introducing mobile ad hoc networks and some of their security vulnerabilities. It then discusses different types of attacks against MANETs, including black hole attacks, wormhole attacks, denial of service attacks, and distributed denial of service attacks. It proposes using an intrusion detection system to detect attacks and block attacking nodes. Simulation results are discussed to analyze the effectiveness of detection and mitigation techniques against DDOS attacks in terms of network performance metrics. The conclusion is that implementing queue management algorithms in network routers can help protect users during DDOS attacks by guaranteeing a certain level of bandwidth.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
This document proposes a secure method for the Ad Hoc On-Demand Distance Vector (AODV) routing protocol to detect wormhole attacks in mobile ad hoc networks. The proposed method uses nested authentication technique (NMAC) and key pre-distribution to authenticate routing messages and secure packet transmissions. NMAC requires two keys selected based on the hop count value in control packets. At each node, the message digest is recalculated using the new hop count value and compared to the received digest to authenticate the message. The key pre-distribution technique aims to minimize overhead by sharing keys dependent on hop counts. The method aims to efficiently detect and prevent wormhole attacks on AODV routing in MANETs with low processing overhead.
In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
This document summarizes a research paper that proposes improvements to the probabilistic packet marking (PPM) algorithm for detecting the path of distributed denial-of-service attacks. The PPM algorithm allows routers to mark attack packets with identification information based on a predetermined probability. However, its termination condition is not well-defined, which can result in an incorrectly constructed attack path. The paper proposes a modified PPM algorithm called rectified PPM (RPPM) that defines a precise termination condition to guarantee the constructed attack path is correct with a specified level of confidence. An experimental framework is designed to test the RPPM algorithm under different packet marking probabilities and network structures.
This document discusses various network security protocols and techniques. It begins with an introduction to network security and describes common network attacks such as denial of service attacks, spoofing, sniffing, and hijacking. It then discusses protocols for enhancing network security such as Kerberos, RADIUS, TACACS+, IPSec, and virtual private networks (VPNs). The document provides details on how these various protocols provide authentication, authorization, access control, integrity, and confidentiality to secure network communications.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
Automatic transmission gearbox with centrifugal clutcheseSAT Journals
Abstract
The various developments in the automobile field are going on increasing; hence we have also tried to modify the transmission system of light weight vehicles such as motorbikes for simplicity in driving the vehicle in an efficient way. The disclosure herein is concerned with an automatic transmission gearbox with centrifugal clutches which operates automatically as engine speed (RPM) goes on increasing. In this work we have designed and manufactured the automatic gearbox model which consists of gear assembly with three different gear ratios and centrifugal clutches of various spring tensions, which driven by electric motor. This gearbox overcomes disadvantages of Continuous variable Transmission (CVT) system by replacing belt and pulleys with centrifugal clutches and gear assembly, which is more compact and avoids loss of power when operating at high speed. Also it is light in weight, efficient, reliable, less time consuming and economical of manufacturing.
Keywords: Transmission system, Centrifugal clutch, Automatic gearbox, CVT.
Modeling of size reduction, particle size analysis and flow characterisation ...eSAT Journals
Abstract Comparative study using Rosin-Rammler-Sperling-Bennet (RRSB) and Rosin-Rammler model parameters, including particle size analysis and flow characterization helps in identifying whether hammer mill or pin mill is suitable for grinding three selected spices, namely, cinnamon, coriander and turmeric. Model parameters like degree of uniformity in size and statistical average diameter of ground products, mean sizes of ground particles, Bond’s work index, specific energy consumption for grinding, and flow characteristics indicate cinnamon and coriander are suitable for grinding with hammer mill while turmeric is suitable for grinding with pin mill. Keywords: Rosin-Rammler-Sperling-Bennet model, coriander, cinnamon, turmeric, degree of uniformity, statistical average diameter, Bond’s work index, specific energy.
Abstract
The purpose of this review paper is to show the difference between executing the seam carving algorithm using sequential approach on a traditional CPU (central processing unit) and using parallel approach on a modern CUDA (compute unified device architecture) enabled GPU (graphics processing unit). Seam Carving is a content-aware image resizing method proposed by Avidan and Shamir of MERL.[1] It functions by identifying seams, or paths of least importance, through an image. These seams can either be removed or inserted in order to change the size of the image. It is determined that the success of this algorithm depends on a lot of factors: the number of objects in the picture, the size of monotonous background and the energy function. The purpose of the algorithm is to reduce image distortion in applications where images cannot be displayed at their original size. CUDA is a parallel architecture for GPUs, developed in the year 2007 by the Nvidia Corporation. Besides their primary function i.e. rendering of graphics, GPUs can also be used for general purpose computing (GPGPU). CUDA enabled GPU helps its user to harness massive parallelism in regular computations. If an algorithm can be made parallel, the use of GPUs significantly improves the performance and reduces the load of the central processing units (CPUs). The implementation of seam carving uses massive matrix calculations which could be performed in parallel to achieve speed ups in the execution of the algorithm as a whole. The entire algorithm itself cannot be run in parallel, and so some part of the algorithm mandatorily needs a CPU for performing sequential computations.
Keywords: Seam Carving, CUDA, Parallel Processing, GPGPU, CPU, GPU, Parallel Computing.
Real time attendance and estimation of performance using business intelligenceeSAT Journals
Abstract
The new technological concept and innovation and digital communication system should be used in point to point transporting system. Such as railway transport provide hi-tech service to the passenger Today In this present era most of the people travel by the train as it is comfortable for them ,but sometime what happen if the train is let foe some specific hours by some technical reasons then the passengers feel uncomfortable and they feel inconvenience. So to overcome to this issue we have designed such train which gives its own status to the passenger via GSM and TSOP IR module. So in this paper we have described how it can be possible to do so. The passenger without any manual affords or without using any internet link and railway inquiry system will get SMS by the train itself sending self running status about itself. The objective of project is to design Railway information through SMS. The operation of this circuit (project) is based on the prototypical operation. The basic principle based on the operation of photo sensors. The one of the most advantage is it provides auto information by using sensor .The circuit is to simple then other complex circuits used for grade crossing in these circuit operations is automatic. The circuit works in both direction and can be connected to other circuits to fully to provide the time and distance of train . The circuit is designed in such a way that it can be easily installed and it uses widely available and inexpensive components.
Keywords: GSM Module, TSOP, IR Sensor, Monostable Multivibrator and GPRS
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
This document provides an overview of the AODV routing protocol for ad hoc networks and security issues associated with it. It first introduces ad hoc networks and discusses the basic differences between infrastructure and ad hoc networks. It then summarizes several popular routing protocols for ad hoc networks, including DSDV, DSR, TORA, and AODV. The document focuses on explaining the route discovery and maintenance processes of AODV. It also discusses common security attacks against AODV like black hole attacks and wormhole attacks. Finally, it mentions some approaches to secure AODV like using digital signatures, authentication, and intrusion detection systems.
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
This document discusses providing security against distributed denial of service (DDOS) attacks in mobile ad hoc networks. It begins by introducing mobile ad hoc networks and some of their security vulnerabilities. It then discusses different types of attacks against MANETs, including black hole attacks, wormhole attacks, denial of service attacks, and distributed denial of service attacks. It proposes using an intrusion detection system to detect attacks and block attacking nodes. Simulation results are discussed to analyze the effectiveness of detection and mitigation techniques against DDOS attacks in terms of network performance metrics. The conclusion is that implementing queue management algorithms in network routers can help protect users during DDOS attacks by guaranteeing a certain level of bandwidth.
misrouting attack in wireless sensor networks under replication attack. agent based security schemes in Security schemes for wireless sensor networks. International journal paper on wireless sensor networks.
AN ENERGY EFFICIENT COUNTERMEASURE AGAINST MULTIPLE ATTACKS OF THE FALSE DATA...ijcsity
Nodes are easily exposed from generated attacks on various layers because they compose simple functions in sensor networks. The false data injection attack drains finite energy resource in a compromised node,and the false HELLO flood attack threatens constructed routing paths in an adversary node. A localized encryption and authentication protocol (LEAP) was developed to prevent the aforementioned attacks through the use of four keys. However, when these attacks occur simultaneously, LEAP may not prevent damage from spreading rapidly throughout the network. In this paper, we propose a method that addresses these attacks through the use of four types of keys, including two new keys. We also improve energy consumption while maintaining a suitable security level. The effectiveness of the proposed method was evaluated relative to that of LEAP when multiple attacks occur. The experimental results reveal that the proposed method enhances energy saving by up to 12% while maintaining sufficient detection power
Adopting hybrid cryptography technique for reduction of network overhead in m...eSAT Journals
Abstract Mobile Ad Hoc Network is a infrastructure less network it is one of the most important and highly unusual application, which is famous among critical operations like warfare use, emergency recovery because of its self configuring nature of nodes. MANETs does not require any centralized administration, it dynamically forms a temporary network with the changing topology. Due to its open environment and irregular distribution of nodes MANET is vulnerable to malicious attack hence a new intrusion detection system named EAACK is introduced. This scheme demonstrates the complexity of malicious behavior detection rate in certain situations without greatly affecting the network performance. EAACK is a acknowledgment based intrusion detection system it is required to ensure that all the acknowledgment packets are authentic and unattained hence all the packets are signed digitally before they are sent out and till the receiver accepts, due to the usage of both digital signature and acknowledgment packet it causes a great network overhead. This paper proposes and enforces a hybrid cryptography technique in order to minimize the network overhead caused by digital signature. Keywords: EAACK, Hash algorithm, Wi_max 802.16, Caesar cipher, XOR cipher, XTEA.
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
Privacy preserving routing is crucial for some Ad hoc networks that require
stronger privacy protection. A number of schemes have been proposed to protect privacy in
Ad hoc networks. However, none of these schemes offer unobservability property since data
packets and control packets are still linkable and distinguishable in these schemes. In this
paper, we define stronger privacy requirements regarding privacy preserving routing in
mobile ad hoc networks. Then we propose an Unobservable Secure Routing scheme (USOR)
to offer complete unlinkability and content unobservability for all types of packets. USOR is
efficient as it uses a novel combination of group signature and ID-based encryption for route
discovery. Security analysis demonstrates that USOR can well protect user privacy against
both inside and outside attackers. We implement USOR on Network Security (NS2), and
evaluate its performance by comparing with Ad Hoc On demand Distance Vector Routing
(AODV) and MASK. The simulation results show that USOR not only has satisfactory
performance compared to AODV, but also achieves stronger privacy protection than existing
schemes like Mask.
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
A Mobile Ad-Hoc Network is a collection of mobile nodes or a temporary network set up by wireless mobile nodes moving arbitrary in the places that have no network infrastructure in such a manner that the interconnections between nodes are capable of changing on continual basis. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes. Various attacks and one of those attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. Therefore, it is a severe attack that can be easily employed against routing in mobile ad hoc networks. There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. . Virtual Infrastructure achieves reliable transmission in Mobile Ad Hoc Network. Black Hole Attack is the major problem to affect the Virtual Infrastructure. In this paper, approach on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET. Our aim is to ensuring the avoidance against Black hole attack.
Confidentiality & Authentication Mechanism for Biometric Information Transmit...IJNSA Journal
The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information - transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficient and effective mechanism for confidentiality and authentication for biometric information transmitted by using arithmetic encoding representation over low bandwidth and unreliable channel. It enhances the speed of encryption, decryption and authentication process. It uses arithmetic encoding scheme and public key cryptography e.g. modified version of RSA algorithm called RSA-2 algorithm.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETIJERA Editor
Mobile ad hoc network is a kind of wireless network, in this network all nodes are connected through the wireless links and perform cooperative communication.Due to limited radio range of these devices any time can leave or join the network. Therefore the routing techniques are responsible for the network organization and communication flow. Due to this the performance of MANET is low as compared with the traditional wired communication networks. In addition of that network is suffers from the probability of attacks. Thus in this paper MANET routing strategy and their attacks are investigated and learned. In addition of that in order to secure the communication recent approaches of security in MANET also investigated. Finally a new algorithm for prevention of malicious attack in MANET is suggested. Additionally the based on the concluded facts, future extension of the proposed work is also suggested.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...IRJET Journal
This document proposes a secure method for the Ad Hoc On-Demand Distance Vector (AODV) routing protocol to detect wormhole attacks in mobile ad hoc networks. The proposed method uses nested authentication technique (NMAC) and key pre-distribution to authenticate routing messages and secure packet transmissions. NMAC requires two keys selected based on the hop count value in control packets. At each node, the message digest is recalculated using the new hop count value and compared to the received digest to authenticate the message. The key pre-distribution technique aims to minimize overhead by sharing keys dependent on hop counts. The method aims to efficiently detect and prevent wormhole attacks on AODV routing in MANETs with low processing overhead.
In this paper we discuss NEMO-BSP protocol and TOR architecture. NEMO protocol was initially not designed to handle anonymity of TOR architecture. Due to some of the unique feature of TOR architecture, the use of TOR architecture has been rapidly increased these days. TOR architecture provides anonymity which other network architectures failed to provides. When using a TOR a user feels safe and has no issue of tracking and packet tracing. Therefore whenever a NEMO user uses TOR architecture there are much vulnerability in network. In this paper we outline those security issues in details which arise when a NEMO user uses TOR architecture. We hope in future those issues will be solved and implemented in future so that a user not only remains anonymous while using TOR but also remains secure from various types of vulnerabilities.
Mohd. Altamash Sheikh. “Security Issues of Network Mobility (NEMO) with Tor Architecture” United International Journal for Research & Technology (UIJRT) 1.4 (2019): 25-29.
This document summarizes a research paper that proposes improvements to the probabilistic packet marking (PPM) algorithm for detecting the path of distributed denial-of-service attacks. The PPM algorithm allows routers to mark attack packets with identification information based on a predetermined probability. However, its termination condition is not well-defined, which can result in an incorrectly constructed attack path. The paper proposes a modified PPM algorithm called rectified PPM (RPPM) that defines a precise termination condition to guarantee the constructed attack path is correct with a specified level of confidence. An experimental framework is designed to test the RPPM algorithm under different packet marking probabilities and network structures.
This document discusses various network security protocols and techniques. It begins with an introduction to network security and describes common network attacks such as denial of service attacks, spoofing, sniffing, and hijacking. It then discusses protocols for enhancing network security such as Kerberos, RADIUS, TACACS+, IPSec, and virtual private networks (VPNs). The document provides details on how these various protocols provide authentication, authorization, access control, integrity, and confidentiality to secure network communications.
Enhancement in network security with security protocolseSAT Journals
Abstract Network security is a wider term used habitually to be an eternal security medium to the broadcasting environment. Cryptography, Authentication and access control Mechanisms play a vital role in secure communication over the network. The computer network is a collection of network that shares information across wired or wireless technology. In order to transfer data in a protected and confidential manner there are several security measures available. Network security can also be referred to as network safety. Network security is used to prevent the attacks by using protocols during the communication of data. This paper describes the several types of attacks, threats and protocols which attempts the secure communication between client and server. Keywords: - DSA, DDOS, HTTPS, RADIUS, VPN, IPSEC etc…
Automatic transmission gearbox with centrifugal clutcheseSAT Journals
Abstract
The various developments in the automobile field are going on increasing; hence we have also tried to modify the transmission system of light weight vehicles such as motorbikes for simplicity in driving the vehicle in an efficient way. The disclosure herein is concerned with an automatic transmission gearbox with centrifugal clutches which operates automatically as engine speed (RPM) goes on increasing. In this work we have designed and manufactured the automatic gearbox model which consists of gear assembly with three different gear ratios and centrifugal clutches of various spring tensions, which driven by electric motor. This gearbox overcomes disadvantages of Continuous variable Transmission (CVT) system by replacing belt and pulleys with centrifugal clutches and gear assembly, which is more compact and avoids loss of power when operating at high speed. Also it is light in weight, efficient, reliable, less time consuming and economical of manufacturing.
Keywords: Transmission system, Centrifugal clutch, Automatic gearbox, CVT.
Modeling of size reduction, particle size analysis and flow characterisation ...eSAT Journals
Abstract Comparative study using Rosin-Rammler-Sperling-Bennet (RRSB) and Rosin-Rammler model parameters, including particle size analysis and flow characterization helps in identifying whether hammer mill or pin mill is suitable for grinding three selected spices, namely, cinnamon, coriander and turmeric. Model parameters like degree of uniformity in size and statistical average diameter of ground products, mean sizes of ground particles, Bond’s work index, specific energy consumption for grinding, and flow characteristics indicate cinnamon and coriander are suitable for grinding with hammer mill while turmeric is suitable for grinding with pin mill. Keywords: Rosin-Rammler-Sperling-Bennet model, coriander, cinnamon, turmeric, degree of uniformity, statistical average diameter, Bond’s work index, specific energy.
Abstract
The purpose of this review paper is to show the difference between executing the seam carving algorithm using sequential approach on a traditional CPU (central processing unit) and using parallel approach on a modern CUDA (compute unified device architecture) enabled GPU (graphics processing unit). Seam Carving is a content-aware image resizing method proposed by Avidan and Shamir of MERL.[1] It functions by identifying seams, or paths of least importance, through an image. These seams can either be removed or inserted in order to change the size of the image. It is determined that the success of this algorithm depends on a lot of factors: the number of objects in the picture, the size of monotonous background and the energy function. The purpose of the algorithm is to reduce image distortion in applications where images cannot be displayed at their original size. CUDA is a parallel architecture for GPUs, developed in the year 2007 by the Nvidia Corporation. Besides their primary function i.e. rendering of graphics, GPUs can also be used for general purpose computing (GPGPU). CUDA enabled GPU helps its user to harness massive parallelism in regular computations. If an algorithm can be made parallel, the use of GPUs significantly improves the performance and reduces the load of the central processing units (CPUs). The implementation of seam carving uses massive matrix calculations which could be performed in parallel to achieve speed ups in the execution of the algorithm as a whole. The entire algorithm itself cannot be run in parallel, and so some part of the algorithm mandatorily needs a CPU for performing sequential computations.
Keywords: Seam Carving, CUDA, Parallel Processing, GPGPU, CPU, GPU, Parallel Computing.
Real time attendance and estimation of performance using business intelligenceeSAT Journals
Abstract
The new technological concept and innovation and digital communication system should be used in point to point transporting system. Such as railway transport provide hi-tech service to the passenger Today In this present era most of the people travel by the train as it is comfortable for them ,but sometime what happen if the train is let foe some specific hours by some technical reasons then the passengers feel uncomfortable and they feel inconvenience. So to overcome to this issue we have designed such train which gives its own status to the passenger via GSM and TSOP IR module. So in this paper we have described how it can be possible to do so. The passenger without any manual affords or without using any internet link and railway inquiry system will get SMS by the train itself sending self running status about itself. The objective of project is to design Railway information through SMS. The operation of this circuit (project) is based on the prototypical operation. The basic principle based on the operation of photo sensors. The one of the most advantage is it provides auto information by using sensor .The circuit is to simple then other complex circuits used for grade crossing in these circuit operations is automatic. The circuit works in both direction and can be connected to other circuits to fully to provide the time and distance of train . The circuit is designed in such a way that it can be easily installed and it uses widely available and inexpensive components.
Keywords: GSM Module, TSOP, IR Sensor, Monostable Multivibrator and GPRS
An innovative fea methodology for modeling fastenerseSAT Journals
This document presents an innovative finite element analysis (FEA) methodology for modeling fasteners in bolted joints. The methodology models the actual geometry of fasteners as force-controlled rigid surfaces, which is computationally efficient while considering contact between mating parts. The methodology was demonstrated on a clevis bracket bolted to a rigid wall. Results from the FEA model correlated well with analytical calculations, with surface pressure predictions within 13.5% and bending stress predictions within 5.2-8.8%. This innovative methodology provides an efficient and accurate way to model bolted joints in FEA.
Calculation of the construction time systematic management of project uncert...eSAT Journals
Abstract New fast track construction projects worth more than $100 billion are being implemented in Makkah to improve services being rendered to millions of pilgrims who come for Hajj and Umrah. The new development projects in Makkah, including largest expansion of the Grand Mosque. The time factor has become increasingly as an outstanding requirement on this construction projects. In the present work, the question "acceleration of construction projects" is moved in the center. Consequently, innovative structures, procedures and techniques are required for a time-oriented project management; consistently and purposefully focus on the reduction of process time and not to shrink back from entirely new, unfamiliar processes. so recommendations for the efficient management of construction projects always need to be developed taking into account the specific objectives and framework. This article discusses also the deterministic method, the simplified stochastic method and the application of the Monte-Carlo simulation as a stochastic method. With increasing of level of detail of the information content of the project and increases the calculation effort with the result that the range of the construction time decreases, thus the accuracy increases. Based on this range, finally the construction time of the building as well as the part times for the individual construction phases are determined. Keywords – Construction industry, Risk management, Construction Projects, project uncertainties, fast track projects, construction time, project management
Product optimization by scheduling formulation & optimal storage strategy...eSAT Journals
Abstract This contribution involves the formulation that addresses the minimization of both fresh water intake and waste water generation simultaneously. It optimizes the product and reactor utilization. The production optimization for this problem is based on batch product scheduling of MINLP formulation using commercial solver GAMS 24.1.1. The main objective is to enhance the profitability, minimizing waste generation and reducing fresh water intake. This case study shows that the number of batches within the same source of available resources can be increased by 12.24% and the profitability can be increased to 13.36%. On the other hand waste generation is reduced to almost 33% because of recycle and re-use opportunities. This suggests that by optimizing production, fresh water intake and waste water generation in the same scheduling formulation will minimize the operating cost and reduce the environmental impact significantly. The comparative study has been considered whether to have individual tanks of low and high COD nearer to each reactor or to have two centralized tanks, one for each low and high COD. The results of same have shown that the centralized (bigger) tanks occupies significant low space and they are highly economical. The efficacy of the results presented are demonstrated by taking a case study of pharmaceutical industry located in GIDC Vadodara, India. Keywords: Wastewater minimization, Scheduling, Fresh water intake, Holding tank Multiproduct batch plant
Design and characterization of various shapes of microcantilever for human im...eSAT Journals
Abstract The ability to detect pathogenic relevant molecules in the human body with high sensitivity and specificity has a powerful opportunity in early diagnosis and treatment of diseases. This paper presents the design, analysis and simulation of MEMS microcantilevers with various shapes like rectangular, triangular, V-shape and T-shape (Paddle) for one HIV detection with mass 10-18 Kg which produces force of 9.81x 10-18 Newton, To analyze the sensitivity of microcantilever , SiO2 material is used. The simulation of these designs is performed by Comsol Multiphysics. The change in total displacement of a microcantilever with respect to change in its shape for the same applied force is observed. From the analysis performed T-shape (Paddle) cantilever with length 1000μm, width 100 μm, thickness 0.5 μm with paddle length 500 μm, width 100 μm and thickness 0.5 μm produces maximum displacement of 3.24 x10-07 μm. By this obtained deflection, using recent advanced read out systems the disease can be identified easily at early stages. Key Words: Microcantilever, Biosensor, Different shapes, HIV detection
Assessment of groundwater quality for irrigation useeSAT Journals
Abstract The availability of groundwater, namely fresh water is too less. This situation provokes the scientific community to further research in the field groundwater exploration of fresh water and natural recharge estimation, which are the most important components essential to formulate dependable groundwater management strategies in scarcity, affected regions. Hydrochemical studies were conducted in Chinnaeru river basin of Nalgonda District, Andhra Pradesh, India. Water samples from 28 locations were collected from bore wells during May 2011 and analyzed for different physico-chemical parameters. Based on various indices and water quality standards, the water is classified for safe drinking and irrigation uses. The concentration of fluoride in groundwater ranges from 0.4-2.9 mg/l. Piper diagram reflect that the water belong to Ca+2–Mg+2–HCO3- to Na+–HCO3- types. The Wilcox diagram suggests that most of the samples are within the permissible limits which can be used for irrigation. High fluoride content in groundwater can be attributed to the continuous water rock interaction during the process of percolation with fluorite bearing country rocks under arid, low precipitation and high evaporation conditions of the study area. The low calcium content in rocks and soils and the presence of high levels of sodium bicarbonate in soils and waters are important factors favouring high levels of fluoride in waters. The basement rocks provide abundant sources of fluoride in the form of amphibole, biotite, fluorite and apatite. The high fluoride concentration areas are demarcated and de-fluoride plant were installed to treat the water for safe drinking purposes. Index Terms: Groundwater, Bore wells, Wilcox diagram, Piper diagram, Fluoride content.
Abstract A wireless sensor network (WSN) consists of sensors which are densely distributed to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The sensor data is transmitted to network coordinator which is heart of the wireless personal area network. In the modern scenario wireless networks contains sensors as well as actuators. ZigBee is newly developed technology that works on IEEE standard 802.15.4, which can be used in the wireless sensor network (WSN). The low data rates, low power consumption, low cost are main features of ZigBee. WSN is composed of ZigBee coordinator (network coordinator), ZigBee router and ZigBee end device. The sensor nodes information in the network will be sent to the coordinator, the coordinator collects sensor data, stores the data in memory, process the data, and route the data to appropriate node. Index Terms: WSN, ZigBee.
Comparitive analysis of doa and beamforming algorithms for smart antenna systemseSAT Journals
Abstract This paper revolves around the implementation of Direction of arrival and Adaptive beam-forming algorithms for Smart Antenna Systems. This paper also investigates the implementation of algorithms on various planner array geometries viz. circular and rectangular. Music algorithm is primarily finds the possible location of desired user and adaptive beam-forming algorithms such as LMS, RLS and CMA algorithms adapts the weights of the array. DOA estimation gives the maximum peak of spectrum with respect to angle of arrival where the desired user is supposed to exist. After DOA estimation weights of array antenna are changed with the changing received signal. This methodology is called as Spectral estimation, which allows the antenna pattern to steer in desired direction estimated by DOA and simultaneously null out the interfering signals. Rate of convergence is the major criterion for comparison for adaptive beam-forming algorithms. Keywords: DOA, MUSIC, LMS, RLS, CMA, SAS.
Statistical analysis of green energy power genartion using biogas methanation...eSAT Journals
Abstract
The paper promotes the inexperienced energy that is being worldwide supported by many countries. inexperienced energy is that
the type of energy obtained from non-exhaustible resources. Technologies that promote inexperienced energy embody renewable
energy sources, like electricity, alternative energy, wind energy, wave power, heat, bioenergy, periodic event power. The paper
has analyzed utilization of bovine dung and human manure waste for electricity generation through a varied case studies on biomethanation
station. There square measure or so twenty Million bovine and a couple of Million human population within the
within the single district of geographic area. Nearly five hundredth of bovine dung and human manure is being sold-out for
agricultural suggests that and also the remaining is drained off into a close-by drain. The drained off bovine dung and human
manure will be used for power generation supporting inexperienced energy while not touching nature and fewer carbon emission.
The paper has studied the political economy of power generation of Biogas methanation station and has found that it's profitable
to utilize the bovine dung and human manure for electricity generation, the capital investment depends on the capability of the
plant and payback amount being most four to six years. Besides electricity generation the plant additionally provides bio-manure.
It additionally checks pollution and emission of greenhouse gases. The study has urged that such plants ought to be established
not solely all told the districts of geographic area however additionally in whole country to assist in electricity generation. the
massive farmers ought to represent Non Govt. Organization (NGOs), Consultancy’s and aid cluster (SHG) to determine such
plants in their various areas. The central and regime provides the required steering and backing for the institution of such plants.
Key Words: Green energy, Bioenergy, Bio-methanation, Non Govt. Organization (NGOs), Self-Help Group (SHG) etc…
Effect of skew angle on static behaviour of reinforced concrete slab bridge d...eSAT Journals
Abstract
The effect of a skew angle on single-span reinforced concrete bridges is analyzed using the finite-element method and the results are
presented in this paper. Investigations are carried out on RC slab bridge decks with and without edge beams to study the influence of
aspect ratio, skew angle and type of load. The finite-element analysis results for skewed bridges are compared to the reference
straight bridges for dead load, IRC Class A loading and IRC 70R loading for with and without edge beam. A total of 90 bridge models
are analyzed. The variation of maximum deflection, maximum longitudinal sagging bending moment, maximum torsional moment, and
maximum support reaction with skew angle is studied for all 90 bridge deck models. The FEA results of Dead load and Live load
bending moments and deflections decreases with increase in skew angle, where as maximum support reactions increases with increase
in skew angle and the maximum torsional moment increases with skew angle up to 45 degrees and there after decreases. The benefit
of providing edge beam is reflected in significant decrease in deflection, longitudinal bending moment and torsional moment.
Keywords: Bridges, skew angle; Concrete slabs; Finite element method; span length; dead load; IRC Class A loading
and IRC Class 70R loading.
Phytochemical screening of orange peel and pulpeSAT Journals
Abstract The oranges were purchased from the local market of Bela. The orange peel and pulp were subjected to successive extraction with solvents in increasing order of their polarity viz. Acetone, hexane, methanol and distilled water. Orange peel and pulp powder was extracted separately by aqueous extraction. Phytochemical analysis indicated the presence of tannins, saponins etc. Anthraquiones were completely absent in both the citrus peel and pulp. Keywords: orange, alkaloids, anthraquinones, saponins.
Defense mechanism for ddos attack through machine learningeSAT Journals
Abstract
There is a huge advancement in Computer networking in the past decade. But with the advancement, the threats to the computer networks are also increased. Today one of the biggest threats to the computer networks is the Distributed Denial of Service (DDoS) flooding attack. This paper emphasizes the application layer DDoS flooding attacks because these (layer seven) attacks are growing rapidly and becoming more severe problem. Many researchers used machine-learning techniques for intrusion detection, but some shows poor detection and some methods take more training time. From a survey, it is found that Naïve Bayes (NB) algorithm provides faster learning/training speed than other machine learning algorithms. Also it has more accuracy in classification and detection of attack. So we are proposing a network intrusion detection system (IDS) which uses a machine learning approach with the help of NB algorithm.
Keywords: DDoS (Distributed Denial of Service) flooding attack, Machine Learning, Naïve Bayes, Network Intrusion Detection
Effects of coconut fibers on the properties of concreteeSAT Journals
Abstract
The materials chosen for structural up gradation should not pollute the environment and endanger bioreserves. They should be accessible to the ordinary people and be low in monetary cost. Coconut fiber is an abundant, versatile, renewable, cheap, lignocellulosic fiber and more resistant to thermal conductivity. The aim of investigation is to study the possibilities to use the coconut fiber in addition to the other constituents of concrete and to study the strength properties. A literature survey was carried out, which indicates that the detailed investigation of coconut fiber concrete is necessary. In the present study the deformation properties of concrete beams with fibers under static loading condition and the behavior of structural components in terms of compressive strength for plain concrete(PC) and coconut fiber reinforced concrete(CFRC) has been studied.
The testing of various material constituents of concrete was carried out according to the Indian Standard specifications. To identify the effects on workability and mechanical strength properties due to the addition of these coconut fibres, workability tests such slump, vee – bee, compaction factor test, Flow table tests, and the mechanical strength tests on standard specimens such as compressive strength, split tensile strength, modulus of rupture were conducted on the different aspect ratio. The standard cubes, cylinders and beams for conventional concrete and coconut fiber reinforced concrete were prepared and tested under compression testing machine and flexure testing machine respectively. The suitability of CFRC as a structural material is studied, in comparison with conventional concrete.
Keywords: CFRC1, Concrete properties2, Coir3.
Comparative study of rc framed structures using spectra based pushover analysiseSAT Journals
Abstract Spectra based multimodal adaptive pushover analysis considers higher modes of vibration and combines them using SRSS rule and scale factors. Damage index for the structures are calculated to evaluate the degree of damage occurred after a seismic event. For the present study the Spectra based multimodal adaptive pushover analysis is adopted for G+ 4 storeys Symmetric and G+ 4 storeys Asymmetric Reinforced concrete framed structures. The Expended Energy based damage index methods are used to calculate Damage Index for symmetric and asymmetric structures. ETABS 2015 software is utilized for modeling and analysis of Reinforced concrete framed structures. The comparative studies are carried out between the structure considering only 1st mode and considering all modes and compared between 3 methods of damage index. It is observed that the capacity obtained by considering all modes is less than the capacity obtained by considering only 1st mode. The target displacement obtained considering only 1st mode is less than the target displacement obtained considering all modes. And the damage index obtained by considering all modes is more than the damage index obtained by considering only 1st mode. Therefore it is necessary to consider all modes to get accurate results. In asymmetric building the ductility is less, the capacity is less, demand is high, and degree of damage is more when compared with symmetric building. Keywords: pushover analysis, damage index, RC frame, multimodal, symmetric and asymmetric
Review paper on seismic responses of multistored rcc building with mass irreg...eSAT Journals
Abstract
From past earthquakes it is proved that many of structure are totally or partially damaged due to earthquake. So, it is necessary to determine seismic responses of such buildings. There are different techniques of seismic analysis of structure. Time history analysis is one of the important techniques for structural seismic analysis generally the evaluated structural response is non-linear in nature. For such type of analysis, a representative earthquake time history is required. In this project work seismic analysis of RCC buildings with mass irregularity at different floor level are carried out. Here for analysis different time histories have been used. This paper highlights the effect of mass irregularity on different floor in RCC buildings with time history and analysis is done by using ETABS software.
Keywords: Seismic Analysis, Time History Analysis, Base Shear, Storey Shear, Story Displacement.
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
This document summarizes a research paper that proposes a scheme for secure data sharing and fine-grained access control in wireless sensor networks. The scheme uses attribute-based encryption to encrypt sensor data under various attributes. It divides the network lifetime into phases and stages to distribute computation. Sensor nodes encrypt data with symmetric keys derived from a master key, which is itself encrypted under user attributes. This allows only authorized users to decrypt based on their access policy. The scheme aims to provide security against node compromise and colluding users. Formal analysis and experiments show it achieves fine-grained access control while remaining efficient for resource-constrained sensors.
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
Abstract Over the past decade, the wireless world has experienced significant developments. The emergence and proliferation of radio frequency networking products, wireless devices like handheld, wearable and portable computers, Personal Digital Assistants (PDA)s, cellular phone have given rise to a kind of wireless revolution. A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, we present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as Packet Re-Shuffling. In the packet reshuffling attack the malicious node will reorder the packets in its FIFO buffer before forwarding them towards their destination. Due to the out of order delivery the retransmission time out of the packet is triggered and the source TCP and UDP has to retransmit the packet. In this way it also stops the TCP to perform the congestion avoidance technique. A malicious node will always participate in route setup operations. For example, if source routing is employed, malicious nodes always relay Route Request packets in order to have as many routes as possible flowing through themselves; if distance vector routing is employed, malicious nodes will also obey all control-plane protocol specifications. However, once a route is established, attacking nodes will thwart the end-to-end throughput of the flow via above mentioned attacks. The effect of the proposed attack is analyzed with the simulation results generated using the trial version of the simulator known as Exata Cyber 2.0. The simulation results are given in terms of metrics such as data flow throughput, Packet Retransmission, average end-to-end delay and packet delivery ratio. In this paper, we are giving The study on UDP and TCP. Keywords: MANETs; Multimedia Streaming; Routing protocols; QoS; Topology; Node Mobility; Network Scalability;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
This document proposes a novel intrusion detection system (IDS) for mobile ad hoc networks (MANETs) that promotes complete unlinkability and conceals packet contents to add privacy preservation. The proposed scheme uses a combination of group IDs and digital signatures for encrypted route discovery. This allows malicious nodes to be detected during route discovery and avoided for data transmission. Compared to existing approaches, the proposed scheme has lower end-to-end delay and improved packet delivery ratio.
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
The communication should be much secured in Mobile Adhoc Networks in the
protective environment such as Military atmosphere and in a disaster relief. Due to the attackers,
Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets,
Missing Packets, Theft of Nodes, etc. To overcome this problem, We propose a new Symmetric
Token Routing Protocol (STRP) for mobile ad hoc networks provides much security against
MANET. The proposed protocol distributed a secured shared symmetric token for each node to
provide security against hackers and attackers. Simulation results shows the better delivery against
the existing protocol in MANET.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses the detection of black hole attacks in mobile ad hoc networks (MANETs) that use the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. It proposes using authentication techniques including authenticated nodes, authentication on paths, authentication key packets, and a data routing information table on each node to detect black hole nodes. An example network is presented to demonstrate how the proposed techniques would detect a black hole node by analyzing authentication packet responses. The goal is to securely route data packets by detecting malicious nodes using these authentication methods.
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
This document presents a distributed algorithm called DAWN to detect wormhole attacks in wireless network coding systems. The algorithm has two phases: 1) a detection phase where each node uses the expected transmission count (ETX) metric to detect if any attackers exist, and 2) a reporting phase where detected attackers are reported to other nodes. ETX represents the number of transmissions needed for a packet to be received and can reveal the network topology. DAWN examines the order nodes receive packets and their ETX values to identify attackers. It signatures reports to prevent manipulation and distributes the workload of detection across all nodes. The algorithm successfully detects wormhole attacks with high rates while imposing low computation and communication overhead.
Control the tradeoff between performance and anonymity through end to-end t (2)IAEME Publication
This document summarizes a research paper that proposes improvements to the Tor network's existing router bandwidth evaluation and selection algorithms. The paper argues that the current Tor system provides a static tradeoff between performance and anonymity that does not suit all users. It proposes allowing users to select their preferred balance, and implementing more accurate bandwidth measurements. Simulation results show the proposed changes can increase throughput without harming anonymity, or improve anonymity while maintaining performance. Future work may include more detailed simulations and examining other performance aspects like latency.
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
The document describes a proposed wireless intrusion detection system and new attack model. It begins by outlining vulnerabilities in mobile wireless networks like susceptibility to eavesdropping and interfering attacks. It then discusses the need for intrusion detection as prevention measures alone are insufficient. The proposed system uses a matching algorithm to compare observed network behaviors and detect anomalies indicative of intrusions. It analyzes evidence from multiple nodes to identify intruders, multicasts intruder addresses to neighbors, and routes data along paths free of detected intruders.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
This document discusses minimizing the Gray-Hole attack in mobile ad-hoc networks. It proposes a method called Denial Contradictions with Fictitious Node Mechanism (DCFM) which uses internal network knowledge to identify potential malicious nodes trying to falsify routing information without relying on external trusted parties. DCFM works by checking for logical inconsistencies between a node's routing messages and the actual network topology to detect attacks. The paper analyzes how DCFM can help detect Gray-Hole attacks under the Optimized Link State Routing protocol and reduce packet dropping compared to other approaches through early identification of malicious nodes. Simulation experiments demonstrate the effectiveness of DCFM at minimizing the Gray-Hole attack in ad-hoc
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
This document discusses using public-key cryptography for data security in wireless sensor networks. It begins with an abstract that introduces public-key infrastructure for sensor networks to allow services like digital signatures. It then provides background on wireless sensor networks and discusses their limitations, including limited resources and vulnerability of nodes. It reviews different techniques for distributing public keys, including public announcement, publicly available directories, using a public-key authority, and public-key certificates. It analyzes whether a public-key infrastructure is feasible for sensor networks given their constraints. The document concludes by discussing potential public-key schemes that could work for wireless sensor networks.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
This document proposes a new framework to prevent DDoS attacks using multilevel filtering of distributed firewalls. At the primary level, distributed firewalls filter IP addresses from both the internet and intranet. At the secondary level, hop count and TTL based filtering provide additional secure filtration. The framework reduces limitations of previous techniques by combining benefits of distributed firewalls and dual filtering approaches. Distributed firewalls are installed throughout the network and centrally controlled. They filter traffic based on centralized security policies. Additional hop count and TTL filtering of packets further strengthens prevention of spoofed IP addresses and DDoS attacks.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...pharmaindexing
This document discusses a strategy for defending against denial of service (DoS) attacks from internal jammers in wireless sensor networks. The proposed method involves detecting internal compromised nodes based on packet attributes and markings. Packets are transmitted to the destination using dedicated channels and timing without disclosing decryption keys to all nodes. The method detects attacks by checking if packets have marks linking them to preceding and succeeding packets needed to reassemble the message. Packets without these attributes would be considered attack packets. Upon detection, a dynamic routing algorithm selects the least used bandwidth for previous communication and allocates a dedicated channel between the source and destination.
Modeling and prevention of cell counting based attacks on toreSAT Journals
Abstract Many anonymous networks came into existence. For instance Tor allows its users to gain access to services anonymously. This network causes most of the attacks as the adversaries can hide their identity and make attacks successfully from a remote place. By making a new attack on Tor can find the vulnerability of the Tor. Ling et al. presented a new cell counting mechanism for making an attack on Tor. In this paper we implemented a custom simulator that models a Tor and demonstrates the cell counting attack by simulating nodes like sender, receiver, onion router and attacker. The experimental results revealed that the proposed attack mechanism is effective. Keywords: Anonymous network, Tor, attacker model, cell counting
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Prevention against new cell counting attack against tor network (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Prevention against new cell counting attack against tor network
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 981
PREVENTION AGAINST NEW CELL COUNTING ATTACK AGAINST
TOR NETWORK
Gurudas V R
Student, Department of Computer Science and Engineering, Jawaharlal Nehru National College of Engineering,
Shimoga.VTU, Karnataka, India, gurudasvr@gmail.com
Abstract
Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity
service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-
sized cells (e.g., 512 B for Tor, a known real-world, circuit-based, low-latency anonymous communication network). Via extensive
experiments on Tor, authors in [22] found that the size of IP packets in the Tor network can be very dynamic because a cell is an
application concept and the IP layer may repack cells. Based on this finding, they investigated a new cell-counting-based attack
against Tor, which allows the attacker to confirm anonymous communication relationship among users very quickly. In this attack, by
marginally varying the number of cells in the target traffic at the malicious exit onion router, the attacker can embed a secret signal
into the variation of cell counter of the target traffic. The embedded signal will be carried along with the target traffic and arrive at
the malicious entry onion router. Then, an accomplice of the attacker at the malicious entry onion router will detect the embedded
signal based on the received cells and confirm the communication relationship among users. In this paper i propose a mechanism to
prevent from this attack.
Keywords: security; sensor networks, denial of sleep attack
-------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
Concerns about privacy and security have received greater
attention with the rapid growth and public acceptance of the
Internet, which has been used to create our global E-economy.
Anonymity has become a necessary and legitimate aim in many
applications, including anonymous Web browsing, location-
based services (LBSs), and E-voting. In these applications,
encryption alone cannot maintain the anonymity required by
participants [1]–[3]. In the past, researchers have developed
numerous anonymous communication systems. Generally
speaking, mix techniques can be used for either message-based
(high-latency) or flow-based (low-latency) anonymity
applications. E-mail is a typical message-based anonymity
application, which has been thoroughly investigated [4].
Research on flow-based anonymity applications has recently
received great attention in order to preserve anonymity in low-
latency applications, including Web browsing and peer-to-peer
file sharing [5], [6].
To degrade the anonymity service provided by anonymous
communication systems, traffic analysis attacks have been
studied [3], [7]–[14]. Existing traffic analysis attacks can be
categorized into two groups: passive traffic analysis and active
watermarking techniques. Passive traffic analysis technique
will record the traffic passively and identify the similarity
between the sender’s outbound traffic and the receiver’s
inbound traffic based on statistical measures [7]–[9], [15], [16].
Because this type of attack relies on correlating the timings of
messages moving through the anonymous system and does not
change the traffic characteristics, it is also a passive timing
attack. For example, Serjantov et al. [7] proposed a passive
packet-counting scheme to observe the number of packets of a
connection that arrives at a mix node and leaves a node.
However, they did not elaborate how packet counting could be
done. To improve the accuracy of attacks, the active
watermarking technique has recently received much attention.
The idea of this technique is to actively introduce special
signals (or marks) into the sender’s outbound traffic with the
intention of recognizing the embedded signal at the receiver’s
inbound traffic [13], [14], [17].
Figure 1: Tor Network.
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 982
In this paper, focus is on the active watermarking technique,
which has been active in the past few years. For example, Yu et
al. [13] proposed a flow-marking scheme based on the direct
sequence spread spectrum (DSSS) technique by utilizing a
pseudo-noise (PN) code. By interfering with the rate of a
suspect sender’s traffic and marginally changing the traffic rate,
the attacker can embed a secret spread-spectrum signal into the
target traffic. The embedded signal is carried along with the
target traffic from the sender to the receiver, so the investigator
can recognize the corresponding communication relationship,
tracing the messages despite the use of anonymous networks.
However, in order to accurately confirm the anonymous
communication relationship of users, the flow-marking scheme
needs to embed a signal modulated by a relatively long length
of PN code, and also the signal is embedded into the traffic
flow rate variation. Houmansadr et al. [14] proposed a non
blind network flow watermarking scheme called RAINBOW
for stepping stone detection. Their approach records the traffic
timing of the incoming flows and correlates them with the
outgoing flows. This approach also embeds watermarks into the
traffic by actively delaying some packets. The watermark
detection problem was formalized as detecting a known spread-
spectrum signal with noise caused by network dynamics.
Normalized correlation is used as the detection scheme. Their
approach can classify a typical SSH connection as a stepping
stone connection in 3 min. As we can see, it is hard for the
flow-marking technique to deal with the short communication
sessions that may only last for a few seconds.
A successful attack against anonymous communication systems
relies on accuracy, efficiency, and detectability of active
watermarking techniques. Detectability refers to the difficulty
of detecting the embedded signal by anyone other than the
attackers. Efficiency refers to the quickness of confirming
anonymous communication relationships among users.
Authors in [22] proposed a new cell-counting-based attack
against Tor, a real-world, circuit-based low-latency anonymous
communication network. This attack is a novel variation of the
standard timing attack. It can confirm anonymous
communication relationship among users accurately and
quickly and is difficult to detect. In this attack, the attacker at
the malicious exit router detects the data transmitted to a
suspicious destination (e.g., server Bob). The attacker then
determines whether the data is a relay cell or a control cell in
Tor. After excluding the control cells, the attacker manipulates
the number of relay cells in the circuit queue and flushes out all
cells in the circuit queue. In this way, the attacker can embed a
signal (a series of “1” or “0” bits) into the variation of the cell
count during a short period in the target traffic. An accomplice
of the attacker at the entry onion router detects and excludes the
control cells, records the number of relay cells in the circuit
queue, and recovers the embedded signal. The signal embedded
in the target traffic might be distorted because the cells carrying
the different bits (units) of the original signal might be
combined or separated at middle onion routers. To address this
problem, authors developed the recovery algorithms to
accurately recognize the embedded signal.
In this paper, we study the above problem in detail and propose
a solution to prevent this kind of attack in the network.
2. LITERATURE SURVEY
In this section, we first overview the components of Tor. We
then present the procedures of how to create circuits and
transmit data in Tor and process cells at onion routers.
Tor is a popular overlay network for providing anonymous
communication over the Internet. It is an open-source project
and provides anonymity service for TCP applications [20]. As
shown in Fig. 1, there are four basic components in Tor.
1) Alice (i.e., Client): The client runs a local software called
onion proxy (OP) to anonymize the client data into Tor.
2) Bob (i.e., Server): It runs TCP applications such as a Web
service.
3) Onion routers (ORs): Onion routers are special proxies that
relay the application data between Alice and Bob. In Tor,
transport-layer security (TLS) connections are used for the
overlay link encryption between two onion routers. The
application data is packed into equal-sized cells (512 B as
shown in Fig. 2) carried through TLS connections.
4) Directory servers: They hold onion router information such
as public keys for onion routers. Directory authorities hold
authoritative information on onion routers, and directory caches
download directory information of onion routers from
authorities. A list of directory authorities is hard-coded into the
Tor source code for a client to download the information of
onion routers and build circuits through the Tor network.
2(a)
2(b)
2(b)
Figure 2: Cell Format.
Fig. 2 illustrates the cell format used by Tor. All cells have a 3-
B header, which is not encrypted in the onion-like fashion so
that the intermediate Tor routers can see this header. The other
509 B are encrypted in the onion-like fashion. There are two
types of cells: control cell shown in Fig. 2(a) and relay cell
shown in Fig. 2(b). The command field (Command) of a
control cell can be: CELL_PADDING, used for keep alive and
optionally usable for link padding, although not used currently;
CELL_CREATE or CELL_CREATED, used for setting up a
new circuit; and CELL_DESTROY, used for releasing a
circuit. The command field (Command) of a relay cell is
CELL_RELAY. Note that relay cells are used to carry
Circ_id(2B) Command(1B) RelayCommand(1B) Recognized(2B) Steam_id(2B) integrity(4B)
length(2B) Data(49)
Circ_id (2 B) Command(1B) Data(509B)
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 983
TCP stream data from Alice to Bob. The relay cell has an
additional header, namely the relay header. There are numerous
types of relay commands (Relay Command), including
RELAY_COMMAND_BEGIN,
RELAY_COMMAND_DATA,
RELAY_COMMAND_END,
RELAY_COMMAND_SENDME,
RELAY_COMMAND_EXTEND,
RELAY_COMMAND_DROP,
and RELAY_COMMAND_RESOLVE. Note that all these can
be found in or.h in released source code package by Tor. In
Tor, an OR maintains a TLS connection to other ORs or OPs on
demand. The OP uses a way of source routing and chooses
several ORs (preferably ones with high bandwidth and high
uptime) from the locally cached directory, downloaded from
the directory caches. The number of the selected ORs is
referred as the path length. Here there is use the default path
length of three as an example. The OP iteratively establishes
circuits across the Tor network and negotiates a symmetric key
with each OR, one hop at a time, as well as handles the TCP
streams from client applications. The OR on the other side of
the circuit connects to the requested destinations and relays the
data.
Figure 3: Processing of cells.
Fig. 3 illustrates the procedure of processing cells at onion
routers. Note that the cells mentioned below are all
CELL_RELAY_DATA cells, which are used to carry end-to-
end stream data between Alice and Bob. To begin with, the
onion router receives the TCP data from the connection on the
given port A. After the data is processed by TCP and TLS
protocols, the data will be delivered into the TLS buffer of the
connection. When there is pending data in the TLS buffer, the
read event of this connection will be called to read and process
the data. The connection read event will pull the data from the
TLS buffer into the connection input buffer. Each connection
input buffer is implemented as a linked list with small chunks.
The data is fetched from the head of the list and added to the
tail. After the data in the TLS buffer is pulled into the
connection input buffer, the connection read event will process
the cells from the connection input buffer one by one. As stated
earlier, the cell size is 512 B. Thus, 512-B data will be pulled
out from the input buffer every time until the data remaining in
the connection input buffer is smaller than 512 B. Since each
onion router has a routing table that maintains the map from
source connection and circuit ID to destination connection and
circuit ID, the read event can determine that the transmission
direction of the cell is either in the forward or backward
direction. Then, the corresponding symmetric key is used to
decrypt/encrypt the payload of the cell, replace the present
circuit ID with the destination circuit ID, and append the cell to
the destination circuit queue. If it is the first cell added to this
circuit queue, the circuit will be made active by being added
into a double-linked ring of circuits with queued cells waiting
for a room to free up on the output buffer of the destination
connection. Then, if there is no data waiting in the output buffer
for the destination connection, the cell will be written into the
output buffer directly, and then the write event of this circuit is
added to the event queue. Subsequent incoming cells are
queued in the circuit queue. When the write event of the circuit
is called, the data in the output buffer is flushed to the TLS
buffer of the destination connection.
Then, the write event will pull as many cells as possible from
the circuit queue of the currently active circuit to the output
buffer and add the write event of this circuit to the event queue.
The next write event can carry on flushing data to the output
buffer and pull the cells to the output buffer. In other words, the
cells queued in the circuit queue can be delivered to the
network via port B by calling the write event twice.
3. CELL COUNTING ATTACK
As i mentioned before, this attack intends to confirm that Alice
(client) communicates with Bob (server) over Tor. In order to
do so, we assume that the attacker controls a small percentage
of exit and entry onion routers by donating computers to Tor.
This assumption is also used in other studies [3], [10], [18],
[19]. The assumption is valid since Tor is operated in a
voluntary manner [21]. For example, attackers may purchase
Amazon EC2 virtual machines, which can be put into Tor. The
attack can be initiated at either the malicious entry onion router
or exit onion router, up to the interest of the attacker. In the rest
of the paper, we assume that the attack is initiated at an exit
onion router connected to server Bob and intends to confirm
that Alice communicates with a known server Bob.
The basic idea is as follows. An attacker at the exit onion router
first selects the target traffic flow between Alice and Bob. The
attacker then selects a random signal (e.g., a sequence of binary
bits), chooses an appropriate time, and changes the cell count of
target traffic based on the selected random signal. In this way,
the attacker is able to embed a signal into the target traffic from
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 984
Bob. The signal will be carried along with the target traffic to
the entry onion router connecting to Alice. An accomplice of
the attacker at the entry onion router will record the variation of
the received cells and recognize the embedded signal. If the
same pattern of the signal is recognized, the attacker confirms
the communication relationship between Alice and Bob. As
shown in Fig. 4, the workflow of the cell-counting-based attack
is illustrated as follows.
Figure 4: Workflow of Attack.
Step 1: Selecting the Target: At a malicious exit onion router
connected to the server Bob, the attacker will log the
information, including server Bob’s host IP address and port
used for a given circuit, as well as the circuit ID. The attacker
uses CELL_RELAY_DATA cells since those cells transmit the
data stream. According to the description of Tor in Section II,
we know that the attacker is able to obtain the first cell
backward to the client, which is a CELL_CREATED cell and is
used to negotiate a symmetric key with the middle onion router.
The second cell backward to the client will be a
CELL_RELAY_CONNECTED cell. All sequential cells will
be CELL_RELAY_DATA cell, and the attacker starts the
encoding process shown in Step 2.
Step 2: Encoding the Signal: In previous section, there was
introduction of the procedure of processing cells at the onion
routers. The CELL_RELAY_DATA cells will be waiting in the
circuit queue of the onion router until the write event is called.
Then, the cells in the circuit queue are all flushed into the
output buffer. Hence, the attacker can benefit from this and
manipulate the number of cells flushed to the output buffer all
together. In this way the attacker can embed a secret signal (a
sequence of binary bits, i.e., “10101”) into the variation of the
cell count during a short period in the target traffic.
Particularly, in order to encode bit “1,” the attacker flushes
three cells from the circuit queue. In order to encode bit “0,”
the attacker flushes only one cell from the circuit queue. In
order to accurately manipulate the number of the cells to be
flushed, the attacker needs to count the number of cells in the
circuit queue. Once the number of the cells is adequate (i.e,,
three cells for encoding “1” bit of the signal, and one cell for
“0” bit of the signal), the attacker calls the circuit write event
promptly and all the cells are flushed to the output buffer
immediately.
Step 3: Recording Packets: After the signal is embedded in the
target traffic in Step 2, it will be transmitted to the entry onion
router along with the target traffic. An accomplice of the
attacker at the entry onion router will record the received cells
and related information, including Alice’s host IP address and
port used for a given circuit, as well as the circuit ID. Since the
signal is embedded in the variation of the cell count for
CELL_RELAY_DATA cells, an accomplice of the attacker at
the entry onion router needs to determine whether the received
cells are CELL_RELAY_DATA cells. This can be done
through a way similar to the one in Step 1.We know that the
first two cells that arrive at the entry onion router are
CELL_RELAY_EXTENDED cells, and the third one is a
CELL_RELAY_CONNECTED cell. After these three cells, all
cells are a CELL_RELAY_DATA cell. Therefore, starting
from this point, the attacker records the cells arriving at the
circuit queue.
Step 4: Recognizing the Embedded Signal: With recorded
cells, the attacker enters the phase of recognizing the embedded
signal. In order to do so, the attacker uses our developed
recovery mechanisms to decode the embedded signal. Once the
original signal is identified, the entry onion router knows
Alice’s host IP address, and the exit onion router knows Bob’s
host IP address of the TCP stream. Therefore, the attacker can
link the communication relationship between Alice and Bob.
As mentioned earlier, when the signal is transmitted through
Tor, it will be distorted because of network delay and
congestion. For example, when the chunks of three cells for
encoding bit “1” arrive at the middle onion router, the first cell
will be flushed to the output buffer promptly if there is no data
in the output buffer. The subsequent two cells are queued in the
circuit queue. When the write event is called, the first cell is
sent to the network, while the subsequent two cells are flushed
into the output buffer. Therefore, the chunks of the three cells
for carrying bit “1” may be split into two portions. The first
portion contains the first cell, and the second portion contains
the second and third cell together.
4. DETAILS OF PROPOSED ATTACK
PREVENTION METHOD
As we discussed the attack in the previous section, we found
that by variation of cell relay packet processing at exit onion
router, the attacker is able to encode certain signals for each
flow and thereby was able to break the anonymity of the
network. To eliminate this variation, i propose a solution based
on the onion routers in the mid routers in the TOR networks.
The basic of the proposed solution is that onion routers at the
middle layer has to observe the number of RELAY packets
being forwarded for a connection id in the upward direction
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 985
and must maintain the same value for the RELAY packets
arriving from the onion router. This way it ensures that for the
connection arriving from a entry router, there is no variation in
the relay packet forwarding at all. By denying the variations the
attacker at the exit router even though inserts variation by
flushing the relay packet differently, at the middle router uses
the same fixed rate, this makes no variation appear at the entry
router.
The detailed working of the proposed solution is given below
At the mid onion routers following processing occur. A mid
onion router may be catering to packet from different incoming
onion router. For each of them it has to allocate unique
outgoing flow rate.
Onion Router 1
Onion Router 2
Onion Router 2
Mid onion
Router
Exit Router[r1,r2,r3]
Figure 5: processing in Mid Router.
For the flow from different routers, the mid onion router has to
allocate a different outgoing rate of relay packets and it must
maintain the same value for all the connection from that onion
router.
If this procure is followed in all the mid routers, any entry
onion router for all the incoming connections, the same rate of
relay packet is maintained. This makes the entry router not able
to detect any signal.
At the mid onion router, to ensure the rate packet must be
buffered. This will consume extra memory space at the mid
onion routers but to provide anonymity this cost is bearable.
5. PERFORMANCE ANALYSIS
I implement the proposed solution in NS2 and analyze the
performance of the system in terms of average buffer needed at
each mid onion router. I do this for TOR network of size of 20
and i create many TOR connections from 20 to 40 connections
per seconds between the nodes and measure the average
increase in buffer size at each router.
Figure 6: Number of Connections per second versus buffer size
Through performance i check the average buffer size needed
for two connection durations of 1min and 2 min and see that
buffer size needed. This additional buffer size must be
provisioned at the router for providing safety against anonymity
leakage attacks.
CONCLUSIONS
In this paper, i introduced a prevention solution against cell-
counting-based attack against Tor. By disallowing the variation
for shorter period we are able to stop attackers from inserting
signal by using the variation in processing of relay cell. By
denying this variation, we are able to avoid the cell counting
attack and prevent the anonymity in the tor network.
REFERENCES
[1] Q. X. Sun, D. R. Simon, Y. Wang, W. Russell, V. N.
Padmanabhan, and L. L. Qiu, “Statistical identification
of encrypted Web browsing traffic,” in Proc. IEEE S&P,
May 2002, pp. 19–30.
[2] X. Fu,Y. Zhu, B.Graham, R. Bettati, andW. Zhao, “On
flow marking attacks in wireless anonymous
communication networks,” in Proc. IEEE ICDCS, Apr.
2005, pp. 493–503.
[3] L. Øverlier and P. Syverson, “Locating hidden servers,”
in Proc. IEEE S&P, May 2006, pp. 100–114.
[4] G. Danezis, R. Dingledine, and N. Mathewson,
“Mixminion: Design of a type III anonymous remailer
protocol,” in Proc. IEEE S&P, May 2003, pp. 2–15.
[5] R. Dingledine, N. Mathewson, and P. Syverson, “Tor:
The secondgeneration onion router,” in Proc. 13th
USENIX Security Symp., Aug. 2004, p. 21
[6] “Anonymizer, Inc.,” 2009 [Online]. Available:
http://www. anonymizer.com/
6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 06 | Jun-2013, Available @ http://www.ijret.org 986
[7] A. Serjantov and P. Sewell, “Passive attack analysis for
connectionbased anonymity systems,” in Proc.
ESORICS,Oct. 2003, pp. 116–131.
[8] B. N. Levine,M. K. Reiter, C.Wang, andM. Wright,
“Timing attacks in low-latency MIX systems,” in Proc.
FC, Feb. 2004, pp. 251–565.
[9] Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, “On
flow correlation attacks and countermeasures in Mix
networks,” in Proc. PET, May 2004, pp. 735–742.
[10] S. J. Murdoch and G. Danezis, “Low-cost traffic
analysis of Tor,” in Proc. IEEE S&P, May 2006, pp.
183–195.
[11] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D.
Sicker, “Lowresource routing attacks against anonymous
systems,” in Proc. ACM WPES, Oct. 2007, pp. 11–20.
[12] X.Wang, S. Chen, and S. Jajodia, “Network flow
watermarking attack on low-latency anonymous
communication systems,” in Proc. IEEE S&P, May
2007, pp. 116–130.
[13] W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao,
“DSSS-based flow marking technique for invisible
traceback,” in Proc. IEEE S&P, May 2007, pp. 18–32.
[14] N. B. Amir Houmansadr and N. Kiyavash,
“RAINBOW: A robust and invisible non-blind
watermark for network flows,” inProc. 16th NDSS, Feb.
2009, pp. 1–13.
[15] V. Shmatikov and M.-H. Wang, “Timing analysis in
low-latency MIX networks: Attacks and defenses,” in
Proc. ESORICS, 2006, pp. 18–31.
[16] V. Fusenig, E. Staab, U. Sorger, and T. Engel, “Slotted
packet counting attacks on anonymity protocols,” in
Proc. AISC, 2009, pp. 53–60.
[17] X. Wang, S. Chen, and S. Jajodia, “Tracking
anonymous peer-to-peer VoIP calls on the internet,” in
Proc. 12th ACM CCS, Nov. 2005, pp. 81–91.
[18] K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D.
Sicker, “Lowresource routing attacks against anonymous
systems,” Univ. Colorado Boulder, Boulder, CO, Tech.
Rep., Aug. 2007.
[19] X. Fu, Z. Ling, J. Luo, W. Yu,W. Jia, and W. Zhao,
“One cell is enough to break Tor’s anonymity,” in Proc.
Black Hat DC, Feb. 2009 [Online].
[20] Available: http://www.blackhat.com/presentations/bh-
dc-09/Fu/ BlackHat-DC-09-Fu-Break-Tors-
Anonymity.pdf
[21] R. Dingledine, N. Mathewson, and P. Syverson, “Tor:
Anonymity online,” 2008 [Online]. Available:
http://tor.eff.org/index.html.en.
[22] Zheng Ling “A New cell counting based attack against
TOR”.