Abstract A Wireless Sensor Network (WSN) comprises of sovereign sensor devices that are used to supervise physical and environmental conditions like temperature and pressure. The WSN is built of hundreds and thousands of recognizing stations called nodes, where each node consists of one or more sensors having a radio transceiver, an internal/external antenna, a microcontroller and a battery. Wireless sensor networks are the systems that are used to communicate by sensing the behavioral changes and the sensing nodes will collect the data and it will get handled. After data handling, the data will be sent to the receiver. The wireless sensor networks have to be fortified from network attacks especially at unfavorable situations because data can easily be obtained by the attackers. There are also some security protocols being implemented in sensor networks. There are some limitations in a wireless sensor network like they have limited storage capacity, limited capability of processing and limited energy to transmit data. These drawbacks can make wireless sensor network different from other networks. The imitation of the attacks are done in the NS2 simulator. By imitating, the performance of the network can be monitored. Keywords: Network Security, Wireless, Sensor, Internet, System Security, Simulator, NS2, Simulation of attacks.
The document discusses security challenges posed by increased use of mobile and wireless devices, including risks of malware, hacking, and data theft. It covers types of mobile devices and attacks like viruses, smishing, and vishing. It also provides recommendations for securing mobile devices like using passwords, encryption, and anti-theft tracking software.
Security models of modern mobile systemsDivya Raval
Mobile security is important to protect smartphones, tablets and other devices. The document discusses the security models of Android, iOS and Windows Phone operating systems. Android uses sandboxing and permissions to isolate apps. iOS focuses on device, data, network and app security using techniques like encryption, code signing and sandboxing. Windows Phone offers a robust security model but needs more work. The document provides best practices for users like enabling encryption and updating software. Overall, iOS is considered the most secure out of the box while Android requires more user decisions.
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy.
Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input. In addition to touchscreen devices, Google has further developed Android TV for televisions, Android Auto for cars, and Android Wear for wrist watches, each with a specialized user interface. Variants of Android are also used on notebooks, game consoles, digital cameras, and other electronics.
Web security involves protecting information transmitted over the internet from attacks like viruses, worms, trojans, ransomware, and keyloggers. Users can help secure themselves by using antivirus software, avoiding phishing scams, and reporting spam. Larger attacks often involve botnets, which are networks of infected computers that can overwhelm websites and services with traffic through distributed denial of service attacks.
The document discusses security challenges posed by increased use of mobile and wireless devices, including risks of malware, hacking, and data theft. It covers types of mobile devices and attacks like viruses, smishing, and vishing. It also provides recommendations for securing mobile devices like using passwords, encryption, and anti-theft tracking software.
Security models of modern mobile systemsDivya Raval
Mobile security is important to protect smartphones, tablets and other devices. The document discusses the security models of Android, iOS and Windows Phone operating systems. Android uses sandboxing and permissions to isolate apps. iOS focuses on device, data, network and app security using techniques like encryption, code signing and sandboxing. Windows Phone offers a robust security model but needs more work. The document provides best practices for users like enabling encryption and updating software. Overall, iOS is considered the most secure out of the box while Android requires more user decisions.
This document discusses mobile ad-hoc networks (MANETs). It defines MANETs as collections of wireless mobile nodes that can dynamically form a network without any centralized administration. The document outlines the characteristics, mechanisms, transmission standards, routing protocols, applications, and future aspects of MANETs. It explains that MANETs are self-configuring, infrastructureless networks suitable for situations where fixed networks are not available or are too expensive to deploy.
Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. Android's user interface is mainly based on direct manipulation, using touch gestures that loosely correspond to real-world actions, such as swiping, tapping and pinching, to manipulate on-screen objects, along with a virtual keyboard for text input. In addition to touchscreen devices, Google has further developed Android TV for televisions, Android Auto for cars, and Android Wear for wrist watches, each with a specialized user interface. Variants of Android are also used on notebooks, game consoles, digital cameras, and other electronics.
Web security involves protecting information transmitted over the internet from attacks like viruses, worms, trojans, ransomware, and keyloggers. Users can help secure themselves by using antivirus software, avoiding phishing scams, and reporting spam. Larger attacks often involve botnets, which are networks of infected computers that can overwhelm websites and services with traffic through distributed denial of service attacks.
The data link layer is responsible for moving data packets between network interfaces. It contains the media access control (MAC) sublayer for sharing a channel and the logical link control (LLC) sublayer which acts as the interface to the network layer. Physical addressing identifies devices on a network using unique MAC addresses which can be unicast, multicast, or broadcast depending on whether they address a single, group, or all devices.
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
This document discusses data communication and computer networks. It defines data communication as the exchange of data between devices via transmission medium. A data communication system has five components: sender, receiver, message, medium, and protocol. Communication can be simplex, half-duplex, or full-duplex. The document also defines networks, explaining that a network allows interconnected devices to communicate and share resources. Local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) are described as the main categories of networks.
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Flow control specifies how much data a sender can transmit before receiving permission to continue. There are two main types of flow control: stop-and-wait and sliding window. Stop-and-wait allows transmission of one frame at a time, while sliding window allows transmitting multiple frames before needing acknowledgement. Sliding window flow control uses variables like window size, last ACK received, and last frame sent to determine how transmission proceeds. It provides more efficiency than stop-and-wait. Automatic repeat request (ARQ) handles retransmission of lost or damaged frames through timeouts, negative acknowledgements, or cumulative acknowledgements depending on the specific ARQ protocol used.
Privacy Enhanced Mail (PEM)-
It is an Internet standard adopted by IAB
(Internet architecture Board) for secure
electronic mail communications over Internet.
Described in four specification documents
which are RFC no. 1421 to 1424.
Security features provided by PEM
Working of PEM:-
Broad steps in PEM are –
1. Canonical conversion
2. Digital signature
3. Encryption
4. Base - 64 - encoding
The document provides an introduction to Internet of Things (IoT). It defines IoT as comprising things that have unique identities and are connected to the Internet. It notes that while many existing devices like mobile phones are already connected, the focus of IoT is on traditionally unconnected devices like thermostats and sensors being networked. Experts forecast that by 2020 there will be 50 billion devices connected to the Internet. The document then discusses various aspects of IoT including the physical and logical design, enabling technologies, communication models, and deployment templates.
The purpose of developing a Mobile-Based Attendance System is to computerized the tradition way of taking attendance. Another purpose for developing this software is to generate the report automatically at the end of the session or in the between of the session
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
This document provides an overview of the Open Systems Interconnection (OSI) model, which defines seven layers of network communication. It describes each layer's functions and responsibilities, including the physical layer for transmitting bits, the data link layer for framing and addressing, the network layer for routing packets, the transport layer for process-to-process delivery, the session layer for dialog control, the presentation layer for data translation, and the application layer for user interfaces and services. The OSI model was designed by ISO in the late 1970s to provide a standard framework for network protocol implementation across different systems.
This document discusses mobile ad hoc networks (MANETs). It defines MANETs as self-configuring networks that do not require a base station and use wireless connections. The document outlines the features of MANETs including autonomous operation, dynamic topology, and multi-hop routing. It then describes how MANETs work and the security challenges they face, such as replay attacks. Finally, it discusses advantages and applications of MANETs in areas like emergency response, military operations, and vehicle-to-vehicle communication.
Here are the key steps to add coding quality management to the news portal project:
1. Implement code reviews. Have another developer review all code additions/changes before merging to main branch. This catches errors and improves code quality.
2. Add unit tests. Write tests to validate all core functionality works as expected. Run tests automatically on commits to catch regressions early.
3. Follow coding standards and conventions. Define standards for code structure, naming, documentation etc. and enforce via linter. This improves readability and maintainability.
4. Implement continuous integration. Automatically build and test code on each commit. Fail builds on errors to prevent broken code from being merged.
5. Use version control best practices
PGP and S/MIME are two standards for securing email. PGP provides encryption and authentication independently of operating systems using symmetric and asymmetric cryptography. S/MIME uses X.509 certificates and defines how to cryptographically sign, encrypt, and combine MIME entities for authentication and confidentiality using algorithms like RSA, DSS, and 3DES. DKIM allows a sending domain to cryptographically sign emails to assert the message's origin and prevent spoofing, while the email architecture standards like RFC 5322 and MIME define message formatting and how attachments are represented.
This document discusses error detection and correction techniques for digital data transmission. It introduces different types of errors that can occur, such as single-bit and burst errors. It describes how redundancy is used to detect and correct errors using block coding techniques. Specific examples are provided to illustrate how block codes are constructed and used to detect and correct errors. Key concepts discussed include linear block codes, Hamming distance, minimum Hamming distance, and how these relate to the error detection and correction capabilities of different coding schemes.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
This document summarizes distributed computing. It discusses the history and origins of distributed computing in the 1960s with concurrent processes communicating through message passing. It describes how distributed computing works by splitting a program into parts that run simultaneously on multiple networked computers. Examples of distributed systems include telecommunication networks, network applications, real-time process control systems, and parallel scientific computing. The advantages of distributed computing include economics, speed, reliability, and scalability while the disadvantages include complexity and network problems.
Comparative study of different mobile operating system- Modern Operation Syst...Neha Jella
Comparative study of different mobile operating system, What is OS?, what is mobile OS?, what is the History of mobile OS?, types of mobile OS, Android OS, Windows OS, iOS, Symbian OS, Market share of Mobile OS, Comparison, Conclusion
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
The data link layer is responsible for moving data packets between network interfaces. It contains the media access control (MAC) sublayer for sharing a channel and the logical link control (LLC) sublayer which acts as the interface to the network layer. Physical addressing identifies devices on a network using unique MAC addresses which can be unicast, multicast, or broadcast depending on whether they address a single, group, or all devices.
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
This document discusses data communication and computer networks. It defines data communication as the exchange of data between devices via transmission medium. A data communication system has five components: sender, receiver, message, medium, and protocol. Communication can be simplex, half-duplex, or full-duplex. The document also defines networks, explaining that a network allows interconnected devices to communicate and share resources. Local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) are described as the main categories of networks.
Unit - I
Mobile Computing – Mobile Computing Vs wireless Networking – Mobile Computing Applications – Characteristics of Mobile computing – Structure of Mobile Computing Application. MAC Protocols – Wireless MAC Issues – Fixed Assignment Schemes – Random Assignment Schemes – Reservation Based Schemes.
Flow control specifies how much data a sender can transmit before receiving permission to continue. There are two main types of flow control: stop-and-wait and sliding window. Stop-and-wait allows transmission of one frame at a time, while sliding window allows transmitting multiple frames before needing acknowledgement. Sliding window flow control uses variables like window size, last ACK received, and last frame sent to determine how transmission proceeds. It provides more efficiency than stop-and-wait. Automatic repeat request (ARQ) handles retransmission of lost or damaged frames through timeouts, negative acknowledgements, or cumulative acknowledgements depending on the specific ARQ protocol used.
Privacy Enhanced Mail (PEM)-
It is an Internet standard adopted by IAB
(Internet architecture Board) for secure
electronic mail communications over Internet.
Described in four specification documents
which are RFC no. 1421 to 1424.
Security features provided by PEM
Working of PEM:-
Broad steps in PEM are –
1. Canonical conversion
2. Digital signature
3. Encryption
4. Base - 64 - encoding
The document provides an introduction to Internet of Things (IoT). It defines IoT as comprising things that have unique identities and are connected to the Internet. It notes that while many existing devices like mobile phones are already connected, the focus of IoT is on traditionally unconnected devices like thermostats and sensors being networked. Experts forecast that by 2020 there will be 50 billion devices connected to the Internet. The document then discusses various aspects of IoT including the physical and logical design, enabling technologies, communication models, and deployment templates.
The purpose of developing a Mobile-Based Attendance System is to computerized the tradition way of taking attendance. Another purpose for developing this software is to generate the report automatically at the end of the session or in the between of the session
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
This document provides an overview of the Open Systems Interconnection (OSI) model, which defines seven layers of network communication. It describes each layer's functions and responsibilities, including the physical layer for transmitting bits, the data link layer for framing and addressing, the network layer for routing packets, the transport layer for process-to-process delivery, the session layer for dialog control, the presentation layer for data translation, and the application layer for user interfaces and services. The OSI model was designed by ISO in the late 1970s to provide a standard framework for network protocol implementation across different systems.
This document discusses mobile ad hoc networks (MANETs). It defines MANETs as self-configuring networks that do not require a base station and use wireless connections. The document outlines the features of MANETs including autonomous operation, dynamic topology, and multi-hop routing. It then describes how MANETs work and the security challenges they face, such as replay attacks. Finally, it discusses advantages and applications of MANETs in areas like emergency response, military operations, and vehicle-to-vehicle communication.
Here are the key steps to add coding quality management to the news portal project:
1. Implement code reviews. Have another developer review all code additions/changes before merging to main branch. This catches errors and improves code quality.
2. Add unit tests. Write tests to validate all core functionality works as expected. Run tests automatically on commits to catch regressions early.
3. Follow coding standards and conventions. Define standards for code structure, naming, documentation etc. and enforce via linter. This improves readability and maintainability.
4. Implement continuous integration. Automatically build and test code on each commit. Fail builds on errors to prevent broken code from being merged.
5. Use version control best practices
PGP and S/MIME are two standards for securing email. PGP provides encryption and authentication independently of operating systems using symmetric and asymmetric cryptography. S/MIME uses X.509 certificates and defines how to cryptographically sign, encrypt, and combine MIME entities for authentication and confidentiality using algorithms like RSA, DSS, and 3DES. DKIM allows a sending domain to cryptographically sign emails to assert the message's origin and prevent spoofing, while the email architecture standards like RFC 5322 and MIME define message formatting and how attachments are represented.
This document discusses error detection and correction techniques for digital data transmission. It introduces different types of errors that can occur, such as single-bit and burst errors. It describes how redundancy is used to detect and correct errors using block coding techniques. Specific examples are provided to illustrate how block codes are constructed and used to detect and correct errors. Key concepts discussed include linear block codes, Hamming distance, minimum Hamming distance, and how these relate to the error detection and correction capabilities of different coding schemes.
The document discusses wireless sensor networks and their applications. It describes wireless sensor networks as consisting of individual nodes that can interact with their environment by sensing or controlling physical parameters. It then discusses several applications of wireless sensor networks, including disaster relief, environment monitoring, intelligent buildings, facility management, machine maintenance, agriculture, healthcare, and logistics. Finally, it outlines some key requirements and mechanisms needed to implement wireless sensor networks, including communication, energy efficiency, self-configuration, collaboration, data-centric operation, and exploiting tradeoffs between different needs.
This document summarizes distributed computing. It discusses the history and origins of distributed computing in the 1960s with concurrent processes communicating through message passing. It describes how distributed computing works by splitting a program into parts that run simultaneously on multiple networked computers. Examples of distributed systems include telecommunication networks, network applications, real-time process control systems, and parallel scientific computing. The advantages of distributed computing include economics, speed, reliability, and scalability while the disadvantages include complexity and network problems.
Comparative study of different mobile operating system- Modern Operation Syst...Neha Jella
Comparative study of different mobile operating system, What is OS?, what is mobile OS?, what is the History of mobile OS?, types of mobile OS, Android OS, Windows OS, iOS, Symbian OS, Market share of Mobile OS, Comparison, Conclusion
This document provides an overview of network layer attacks on cognitive radio networks and discusses potential solutions. It begins by introducing network security and the importance of securing the network layer. The paper then describes several common network layer attacks, including sinkhole attacks and Sybil attacks. For each attack, the document outlines the attack methodology and discusses existing detection techniques and potential countermeasures. Overall, the paper aims to survey current research on network layer threats, detection methods, and solutions to improve the security of cognitive radio networks.
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks. We present a malicious node detection mechanism. In using a monitoring mechanism to detect suspicious behavior, and on the basis of the responses from other monitoring nodes, if the number of suspicious entries concerning a particular node reaches a set threshold, that node is declared malicious. The simulation results show that the time it takes to detect a malicious node is decreased when there are more nodes in the network, and that it provides a fast and efficient way to detect malicious nodes.
This document proposes a Distributed Malicious Node (DMN) algorithm to detect and isolate malicious nodes in a Vehicular Ad-hoc Network (VANET). The algorithm uses a distributed approach where vehicles monitor each other to detect abnormal packet dropping or duplicating behavior. It selects monitoring nodes called "verifiers" based on parameters like workload, trustworthiness, and distance. The verifiers report misbehaving nodes to the cluster head. The cluster head updates distrust values and isolates malicious nodes from the network if their distrust exceeds a threshold. Simulation results show the DMN algorithm improves network performance metrics like throughput, packet delivery ratio, and end-to-end delay compared to no detection.
Directi Case Study Contest 2010- IIMB AspirersDirecti Group
The document outlines various features and marketing strategies for catchme.com, a proposed location-based social network in India, including innovative features like future check-ins, virtual gifts, location-based trivia and games, a travelogue feature, and incentives for users to provide tips and reviews. It also analyzes the scope and target market for location-based social networks in India and provides examples of how catchme.com could generate revenue through various monetization strategies.
SOS transmission through cellular phones to help accident victimsAkhil Kumar
The document discusses the design of a system to identify the position of a victim using a cellular phone. It involves using the phone's transducers and sensors to detect signals and trigger an SMS with the user's ID and position. The base station would then use goniometer and positioning equipment as well as a software robot to triangulate the position and send beacon signals to various users. The software design involves a C program to measure inputs and set flags along with an Oracle mock database and Java frontend. Limitations and conclusions are also mentioned.
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
This document reviews network layer attacks and countermeasures in wireless sensor networks (WSNs). It discusses six major network layer attacks: wormhole attacks, flooding attacks, selective forwarding attacks, sinkhole attacks, Sybil attacks, and replay attacks. For each attack, it examines existing countermeasure approaches proposed in previous research. It also identifies some open research challenges in providing comprehensive security solutions for WSNs given their resource constraints and deployment environments.
Working capital management of maharashtra bankDharmik
This document contains a student's declaration for a project on working capital management at Maharashtra Bank. It includes a declaration by the student Ekta Bid that the information submitted is true and original. It also includes a certificate from the project guide, Professor Nishikant Jha, certifying that Ekta completed the project. Ekta acknowledges and thanks Professor Jha and her friends for their support and guidance during the project.
Accident prevention using wireless communicationrkrkrupesh
This document proposes using wireless communication via Bluetooth to prevent vehicle accidents. It discusses how accidents are often caused by human error and high speeds. A Bluetooth system would allow up to eight nearby vehicles to communicate their speeds and automatically apply brakes if vehicles get too close. The system would use sensors to monitor distance, a pump to control hydraulic brake pressure, and valves to increase pressure and braking force when needed to prevent collisions. Overall, the document argues that Bluetooth-enabled automatic braking could help reduce accidents by addressing human errors related to speed and distance between vehicles.
This document is a mini project report on the operation and maintenance of a 132/33kV substation. It contains 5 chapters that discuss key topics such as the classification of substations, single line diagrams, descriptions of common instruments in a substation like lightning arrestors, circuit breakers and transformers. It also covers protection for equipment like transformers and feeders. The last chapter provides conclusions and references. The overall document provides a comprehensive overview of the components, functions and maintenance of a high voltage substation.
The document summarizes the key aspects of the waterfall model for software development and conventional software management. It discusses the phases of the waterfall model including preliminary investigation, system analysis, software design, coding, and testing. The preliminary investigation phase involves problem identification, feasibility study, and expected benefits. System analysis aims to understand the system components and relationships. Software design develops the system based on analysis. Coding implements the design into a programming language. Testing verifies that the code meets requirements.
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
The document describes Ming-Zher Poh's invention of the Medical Mirror, which allows contactless measurement of heart rate using a webcam and mirror setup. The mirror contains a webcam and LCD monitor behind a two-way mirror. Software analyzes subtle light reflections caused by blood flow to determine heart rate in real-time. This provides a more comfortable alternative to external sensors. Future applications could non-invasively monitor multiple health parameters using the system.
This document provides an overview of green human resource management (HRM) practices. It discusses how the HR function can help drive environmental sustainability within organizations by aligning practices with sustainability goals. Some key green HRM strategies mentioned include implementing environmentally-friendly training programs, encouraging employee participation in environmental initiatives, tying performance evaluations and compensation to environmental metrics, and recognizing employees for environmental achievements. The document concludes with a case study of green HRM practices at ITC Limited, an Indian company.
The document discusses touchless touchscreen technology, including touch walls that use infrared lasers to scan surfaces, touchless UIs that sense finger movements in 3D space without touching the screen, and touchless monitors that detect 3D motion without sensors. It provides examples of touchless technology inspired by Minority Report including eye tracking, gesture recognition, and motion sensing devices. The document concludes that touchless interfaces could transform bodies into virtual input devices in the future.
A touchless touchscreen uses optical pattern recognition and a solid state optical matrix sensor to detect hand movements in front of the screen instead of requiring physical contact. The sensor is made up of a matrix of pixels, each with photodiodes that convert incoming light to electric charge. The sensor generates signals that are processed by a digital image processor to provide output and interpret gestures without the user touching the display. Touchless touchscreens offer advantages like not wearing down the screen surface and allowing control from a distance, though sightline remains a limitation currently. The technology continues developing with potential for full body control of devices in the future.
Touchless technology Seminar PresentationAparna Nk
This document discusses touchless technology that allows users to interact with screens without physically touching them. It describes a touchless monitor developed by TouchKo, White Electronics Designs, and Groupe 3D that uses sensors around the screen to detect 3D motions and interpret them as on-screen interactions. The document also mentions several other touchless technologies like the Touchless SDK, Touch Wall, eye tracking devices, gesture recognition tools, and motion sensors that enable touchless control of devices.
Face recognition technology may help solve problems with identity verification by analyzing facial features instead of passwords or pins. The document outlines the key stages of face recognition systems including data acquisition, input processing, and image classification. It also discusses advantages like convenience and ease of use, as well as limitations such as an inability to distinguish identical twins. Potential applications are identified in government, security, and commercial sectors.
The document discusses marketing mix strategies and the 4Ps - product, price, place, and promotion. It focuses on the product element of the marketing mix. Key points include: 1) Firms must choose products that meet customers' needs and position them properly; 2) Products include physical goods as well as services and branding plays an important role in building loyalty; 3) Packaging, product quality, and customization are important product decisions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
1. The document discusses a secure data dissemination protocol for wireless sensor networks using XOR network coding. It aims to achieve fast, secure, reliable and energy efficient data dissemination.
2. Wireless sensor networks require regular software updates through the wireless medium, which is known as data dissemination or network reprogramming. Existing dissemination protocols have security issues when combined with network coding techniques.
3. The proposed protocol uses simple cryptographic techniques with network coding to prevent pollution and denial of service attacks, while still achieving fast dissemination. It focuses on disseminating small data values securely and efficiently in wireless sensor networks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Refining data security in infrastructurenetworks support of multipath routingeSAT Journals
Abstract An infrastructure network is a self-organizing network with help of Access Point (AP) of wireless links connecting nodes to another. The nodes can communicate without an ad hoc. They form an uninformed topology(BSS/ESS), where the nodes play the role of routers and are free to move randomly. Infrastructure networks proved their efficiency being used in different fields but they are highly vulnerable to security attacks and dealing with this is one of the main challenges of these networks at present.In recent times some clarification are proposed to provide authentication, confidentiality, availability, secure routing and intrusion avoidance in infrastructure networks. Implementing security in such dynamically changing networks is a hard task. Infrastructure network characteristics should be taken into consideration to be clever to design efficient solutions. Here we spotlight on civilizing the flow transmission privacy in infrastructure networks based on multipath routing. Certainly, we take benefit of the being of multiple paths between nodes in an infrastructure network to increase the confidentiality robustness of transmitted data with the help of Access Point. In our approach the original message to secure is split into shares through access point that are encrypted and combined then transmitted along different disjointed existing paths between sender and receiver. Even if an intruderachieve something to get one or more transmitted distribute the likelihood that the unique message will be reconstituted is very squat.
This document summarizes a research paper that proposes a scheme for secure data sharing and fine-grained access control in wireless sensor networks. The scheme uses attribute-based encryption to encrypt sensor data under various attributes. It divides the network lifetime into phases and stages to distribute computation. Sensor nodes encrypt data with symmetric keys derived from a master key, which is itself encrypted under user attributes. This allows only authorized users to decrypt based on their access policy. The scheme aims to provide security against node compromise and colluding users. Formal analysis and experiments show it achieves fine-grained access control while remaining efficient for resource-constrained sensors.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
This document discusses denial-of-service (DoS) attacks in wireless sensor networks and proposes a method to prevent such attacks. It begins with background on wireless sensor networks and discusses how their distributed nature and wireless characteristics make them vulnerable to security attacks. It then focuses on DoS attacks as one of the most dangerous attacks, where malicious nodes overload legitimate nodes with requests, consuming their bandwidth and resources. The proposed method aims to provide some prevention against DoS attacks. Simulation results comparing network performance without and with the proposed prevention method are presented in terms of throughput, packet delivery fraction, and delay.
IRJET- Appraisal of Secure Data Aggregation protocol for Wireless Sensor ...IRJET Journal
This document summarizes research on secure data aggregation protocols for wireless sensor networks. It first introduces wireless sensor networks and discusses how data aggregation can help reduce energy usage by aggregating sensor data as it travels towards a base station. However, data aggregation also presents security risks if sensor data is compromised. The document then reviews different types of attacks against wireless sensor networks, such as denial of service attacks and false data injection attacks. It also discusses security goals like data confidentiality, integrity, and availability. Several existing secure data aggregation protocols are then summarized, including techniques using public/private key cryptography and probabilistic encryption to securely aggregate and transmit sensor data while preventing attacks. The document concludes that security is an important challenge for data aggregation in wireless sensor
This document summarizes a research paper that proposes a rule-based technique using fuzzy logic to detect security attacks in wireless sensor networks. The technique develops a fuzzy rule-based system to calculate the impact of 10 common security attacks on wireless sensor networks. A GUI tool is created in MATLAB to test the system using a mouse dataset. Membership functions are used to represent fuzzy sets for analyzing the level of risk that security attacks pose, from very low to very high. The system provides a way to visualize security attacks and their influence on wireless sensor networks.
This document summarizes a research paper that proposes a rule-based technique using fuzzy logic to detect security attacks in wireless sensor networks. The paper identifies 10 common security attacks in wireless sensor networks including denial of service, eavesdropping, traffic analysis, etc. A fuzzy rule-based system is developed to calculate the impact of these security attacks. The system uses MATLAB tools and mouse dataset to test performance. Case studies are presented to demonstrate how the system can predict the likelihood and impact of security attacks on a wireless sensor network.
Similar to Replication of attacks in a wireless sensor network using ns2 (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Replication of attacks in a wireless sensor network using ns2
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 303
REPLICATION OF ATTACKS IN A WIRELESS SENSOR NETWORK
USING NS2
Tejaswi Singh1
, Aatish Gandotra2
1
Student, Computer Science Engineering, Guru Tegh Bahadur Institute of Technology, Delhi, India
2
Student, Electronics and Communication Engineering, Guru Tegh Bahadur Institute of Technology, Delhi, India
Abstract
A Wireless Sensor Network (WSN) comprises of sovereign sensor devices that are used to supervise physical and environmental
conditions like temperature and pressure. The WSN is built of hundreds and thousands of recognizing stations called nodes, where
each node consists of one or more sensors having a radio transceiver, an internal/external antenna, a microcontroller and a
battery. Wireless sensor networks are the systems that are used to communicate by sensing the behavioral changes and the
sensing nodes will collect the data and it will get handled. After data handling, the data will be sent to the receiver.
The wireless sensor networks have to be fortified from network attacks especially at unfavorable situations because data can
easily be obtained by the attackers. There are also some security protocols being implemented in sensor networks. There are some
limitations in a wireless sensor network like they have limited storage capacity, limited capability of processing and limited
energy to transmit data. These drawbacks can make wireless sensor network different from other networks. The imitation of the
attacks are done in the NS2 simulator. By imitating, the performance of the network can be monitored.
Keywords: Network Security, Wireless, Sensor, Internet, System Security, Simulator, NS2, Simulation of attacks.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION TO WSN
Figure 1.1 represents the architecture of a WSN. The WSN
is built of hundreds and thousands of detection stations
called nodes, where each node connects to sensors
Fig 1.1: Illustration of a WSN
Constructing a wireless sensor network (WSN) has become
important in all places. The sensor nodes collect the data and
direct it to the center station for processing and then it is
directed to the user via a wireless medium. A WSN has
copious applications in many fields. They are employed in
many places. A WSN is used in these applications to
supervise the safeguarding, improving the throughput and
enhance the defense and safety. For wide deployment, it is
required that the sensors should be made smaller and easy
on the pocket. There are also multifarious methods being
proposed to safeguard the network from different manners
of attacks. Figure 1.2 shows the applications of WSN‟s in
copious fields. They are employed in many places and
the sensors have a capability to give warning in tragic
situations.
Fig 1.2: Applications of a WSN
1.1 Existing Systems
There are certain systems proposed earlier that deal with
providing secure data transfer in a wireless sensor network,
but they have their own disadvantages. Present wireless
sensor networks have restricted functionalities, so illicit
users can easily access the WSN and they can easily change
data integrity, introduce a wrong message and destroy the
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 304
network without any user association. [1] For the purpose of
providing a secure data communication over the network,
several cryptographic and other techniques have been
implemented. A WSN is more susceptible to several
attacks/threats. [4] In spite of attaining public key
cryptography, the security level is not proper in WSN. The
data was encrypted and decrypted at the receivers end. The
attackers could even attack the encrypted data. In the
existing systems, the security of the data integrity is fragile.
The attacker can attack all the information in the transitional
nodes which violates data confidentiality.
1.2 Introduction to NS2 Simulator
Using the network simulator NS2, the attacks in the WSN
can be replicated. NS2 makes a replica of a real time
network. It is a time based event driven simulator. The code
can be written in such a way that at a particular time, what
particular event can happen. The data transfer between the
nodes and the attacks can be shown. It has become one of
the most widely used open source simulators. It is a free
simulation tool that can be available online [14] [19]. The
simulator consists of a wide variety of applications,
protocols like TCP, UDP and many network parameters. It
runs on various platforms like UNIX, Mac and windows
platforms. This NS2 tool allows to develop a model design
for wireless sensor network connection between nodes in the
network. Based on the network attacks like denial of service
[4], hello flood attack, sinkhole attacks, Sybil attack the
network security can be tested. These attacks can be created
in the network and the security level of the wireless sensor
network can be tested to ensure secure data transmission
between the nodes in the network.
Figure 1.3 shows the basic architecture of NS2 Simulator
[13]. It is provided with a command „ns‟ to execute the code
written in NS2. The name of the Tcl simulation script is
passed as an input argument. After executing a simulation
trace file is created which can be used to create animation or
to plot graph. NS2 Simulator consists of two languages
namely C++ and OTcl (Object oriented Tool Command
Language). C++ does the internal mechanism i.e. back end
and OTcl deals with the front end [12].
Fig 1.3: Basic Architecture of a NS2 Simulator [13]
The simulation trace file engendered after execution can be
used to create animation in a network animator or to plot a
graph. The information in the network animator can blogged
in data format in namtrace file.
There are many advantages of NS2 Simulator:
It is freely available online. It is cheaper than any other
simulators.
Any multifaceted network can be simulated and used
for testing.
The results can be obtained easily in the form of graph
or in a network animator.
It supports a wide variety of applications and protocols
like TCP, UDP etc. which can be used for interaction
between in the nodes.
It can run on a variety of platforms like Windows,
Linux, Unix etc.
It is most widely used simulators.
1.3 Introduction to Proposed System
A WSN has multifarious applications in many fields. It is
employed in many places. Ensuring the security in a WSN is
of great concern. Because of the constraints in the network,
it is susceptible to many attacks. The major attacks include
denial of service, sinkhole, Sybil and hello flood attack. [4]
These attacks decrease the performance and efficiency of
the network. The attacks are studied in detail and are
replicated in a simulator. The characteristics of the attack
and the nature of the attack can be known. By simulating,
the behavior of the network and the performance can be
scrutinized. The network simulated is closer to real time
network. By understanding the attacks, proper procedures
can be taken in order to detect and prevent them. A
simulator holds good for replicating the real time network.
By understanding all the problems in the design phase itself,
one can be able to construct a more efficient network.
2. PROPOSED SYSTEM DESIGN AND
ARCHITECTURE
Figure 3.1 explains about the basic design of the sensor
network and how all the nodes are connected in the network.
The power generator supplies power to the power unit. The
power unit supplies power to the sensing unit, processing
unit and the transmission unit. Each sensor node is
connected to a base station for communication by which it
can send and receive data. It consists of a position finding
system, mobilizer, sensing unit, processing unit and a
transmission unit. BS indicates the base station.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 305
Fig 3.1: The components of a sensor node [1]
Figure 3.2 describes the details of the different layers in the
wireless network and the communication process between
the nodes and the wireless device. A WSN consists of an
application layer, network layer, MAC and physical layer.
The Sensor operates in the application layer. The packet is
forwarded through a wireless channel from physical layer to
application.
Fig 3.2: Layered architecture [20]
3. SYSTEM IMPLEMENTATION –
CONFIGURING NS
As said earlier WSN‟s are vulnerable to many attacks. Each
attack may lead to a different problem. There are two types
of attacks that are popular with the Wireless Sensor
Networks. They are Physical attacks and logical attacks.
[13] Physical attacks include capturing of the nodes and
tampering the nodes which will lead to loss of data. On the
other hand, Logical attacks include attacks like sinkhole
attack, wormhole attack, hello flood attack, selective
forwarding attack, Sybil attack, Denial of service attack.
These attacks are more common in a Wireless Sensor
Network. These attacks must be detected and must be
avoided in order to increase the performance and security
level in a WSN.
The Simulation of the attacks is being done by using NS2
Simulator. It is an open source free simulator available
online. It stands good for simulation of TCP, UDP and many
other routing protocols. It works on an object oriented
language called Tool Command language (OTcl). With
the help of OTcl language, different network topologies
and the routing protocols can be explained. [14] The
language is very easy to use and is platform independent.
The code can be written for creation of the nodes, showing
the data transfer and introducing the attacks and the
simulation can be shown by running the simulator. The
simulator consists of wide variety of applications, protocols
like TCP, UDP and many other network parameters. The
simulator consists of nodes and the data transfer between the
nodes can be shown. The attacks can be introduced into the
system by making some of the nodes malicious. In our
system the simulation is shown on four attacks mainly Sybil
attack, sinkhole attack, hello flood attack and denial of
service attack.
3.1 Creating and Setting Connection between the
Nodes in the Simulator
The first step is creation of the nodes in the network. Any
number of nodes can be created in the network as per the
user. The nodes can be made dynamic. The user can enter
the source, destination and malicious node as he wishes
when he runs the simulator. Figure 4.1 shows the creation of
the nodes in the network. The movement of the nodes can be
generated and the nodes can be partitioned into zones. After
creating the nodes, a connection must be established
between the nodes in the network. There are several
protocols defined that can be used namely TCP and UDP.
TCP is connection oriented protocol and it provides
acknowledgement from the receiver. The UDP protocol can
be used when there is a lot of traffic in the system which
would be efficient. There is a TCP agent and a TCP sink.
TCP agent is responsible for sending the packets in the
network which can be called as a source node. TCP sink is
the receiver node which receives the packets sent by the
receiver.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 306
Following shows how to create a node in the simulator. nn
represents the number of nodes being initialized. The
looping is done through the number and nodes and each
node is created and assigned a random motion.
Code:
for{set i 0} {$i<$val(nn)} {incr i}
{set node_($i) [$ns node]
$node_($i) random-motion 1}
Following shows how to set up TCP connection between the
nodes. gpsrtace is a file that contains all the tcp connections
in the network in data format. The file is opened in write
mode and the tcp connection is set and the file is attached.
Code:
set gpstrace [open gpstrace.tr w]
set tcp [new Agent/TCP]
$tcp trace rtt_
$tcp trace cwnd_
$tcp attach $gpstrace
Fig 4.1: Creation of nodes in the simulator
The X dimension and the Y dimension of the topography in
the system will be initialized. It represents the area in the
simulator. The initial location of the nodes can be set at a
particular coordinate in the simulator.
Following shows how to set the position of the nodes. The X
coordinate is set to 20, whereas as the Y and Z are set to 0.
Code:
$node_(1) setX_20.000000000000
$node_(1) setY_0.000000000000
$node_(1) setX_0.000000000000
3.2 Generation of Movements
Since it is a WSN, the nodes keep moving in the simulator.
The generation of movements of the nodes in the simulator
can be done. The time at which the node should be moved to
a particular destination can be set. Following shows the
generation of movement of a node. The node 49 at time 0.2
sec moves to the particular destination.
Code:
$ns at 0.2 "$node_(49) setdest 100.78 980.56 3000"
3.3 Zone Partitioning
The nodes created can be partitioned into different zones. A
color code can be assigned to each node. This is just for a
clear view and identifying the nodes from each other.
Following shows the partitioning of the nodes into zones
and assigning a color code to them. The outline of the nodes
38, 74, 81 will be made pink at time 9.3 sec which is
shown in figure 4.2.
Code:
$ns at 9.3 "$node_(38)
add-mark c3 pink circle"
$ns at 9.3 "$node_(74)
add-mark c3 pink circle"
$ns at 9.3 "$node_(81)
add-mark c3 pink circle"
Fig 4.2: Partitioning into zones and assigning color codes.
3.4 Creating Application
The application indicates the type of transmission between
the sender and the receiver. Here, constant bit rate (CBR) is
used as an application in order to generate the traffic. The
other applications that can be used are FTP, Telnet etc. The
parameters for the application like time interval, maximum
packets size etc are set. When the CBR application starts at
a particular time, the packets will be sent from one node to
the other node. Following shows how to set a CBR
application to UDP. The parameters for the CBR application
are initialized and the application is started.
Code:
set cbr_(1)[new Application/Traffic/CBR]
#Scbr_(1) set interval_2.0
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 307
#Scbr_(1) set random_1
#Scbr_(1) set maxpkts_100
#Scbr_(1) attach-agent $udp_(1)
$ns connect $udp_(1) $null_(1)
$ns at 76.0 “Scbr_(1) start”
$ns at 150.0 “Scbr_(1) stop”
3.5 Setting of Malicious Node
Any of the nodes created can be made as a malicious node
to show different kinds of attacks. More than one malicious
node can be created. The following shows how to set a
particular node as malicious:
Code:
$ns at 50.0 "[$node_ (30) set ragent_] malicious"
3.6 Making the Nodes Dynamic
The nodes created can be made dynamic which means the
user can enter his/her own source, destination and malicious
node to see the simulation happening between those nodes.
It will help to make the simulation more interactive.
Following code shows how to make the nodes dynamic
where argv0 entered from the terminal is set to source, argv1
is set to destination and argv2 is set to malicious node.
Code:
set src [lindex $argv 0]
set dest [lindex $argv 1]
set malicious [lindex $argv 2]
The user while running the file in the terminal along with
the filename can give the nodes he wishes. Figure 4.3 shows
the same where the user types ns sinkhole.tcl 0 9 7 which
means that the filename is sinkhole.tcl, the source is 0,the
destination is 9 and the malicious node is 7.
Fig 4.3: User entering the nodes
3.7 Simulation of Cybil Attack
Sybil attack is one of the most harmful and dangerous attack
in WSN. It is the attack in which a node acts as a malicious
node and claims multiple identities. When there are many
systems connected in a network, a single system which is
insecure will act as a malicious system and claims multiple
identities. This can lead to many problems like false
communication and loss of data. This sort of an attack must
be recognized and must be prevented so that the system can
be made secure. Maintaining the identities of the system is
necessary. There are many authorities that help in
maintaining the identity by using certification software‟s
[15]. Sybil attacks are the most common types of attacks.
They tend to challenge the security and safety of the system.
There are many ways to protect a system from Sybil attack.
Trusted authority and proper identity can help prevent a
network from such type of an attack.
The simulation of the Sybil attack is done by using the NS2
Simulator. It can be done by modifying aodv.cc file in
ns2.35 which can be shown by dropping the packets in the
simulator. Figure 4.4 shows the simulation of the Sybil
attack. The attack can be seen by dropping of the packets of
the intermediate node. This attack is one of the well-known
attack in WSN. The attacker nodes may obtain the
legitimates IP Address or Mac Address in order to Steal
and make its own. Then the attacker node can do plenty of
things with new stolen identity. Node 43 acts as source
whereas node 44 is the destination node. The source node
start sending packets to the destination node through the
shortest path that is decided by the routing protocol. The
intermediate node 15 acts as a malicious node and at time 30
sec, it starts dropping the packets coming from the node.
Fig 4.4: Simulation of Sybil attack
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 308
3.8 Simulation of Denial of Service Attack
WSN are concerned with numerous security issues. The
constraint on the resources makes the WSN more vulnerable
to Denial of Service attack because it focusses on the energy
protocols. [16] DoS attack prevents the system or the user to
be legitimate. It can be done by overloading the destination
system with huge number of requests. Due to this attack,
efficiency and the performance of the Wireless Sensor
Network would be reduced. This particular type of attack in
unfriendly situations can be even more harmful. There are
many types of DOS attacks. Among the different types of
DOS Attacks, SYN flood is the most common kind of an
attack. It uses TCP three way handshake mechanism for
communication between the nodes.
Denial of service Attack involves saturating the performance
of the target node with lots of unwanted communication
requests which will create fake traffic. [16] These kinds of
attacks overload the server. Here, DOS attack is
implemented by using UDP protocol and CBR application.
Once its buffer size is full, the target node can be seen
dropping the packets coming from the malicious node as
well as the source. Figure 4.5 shows the simulation of the
denial of service attack. Node 41 is the source and node 50
is the destination. The packets from the source node are sent
to the destination node via the target node 58. After
sometime node 48 acts as a malicious node and starts
sending huge number of packets to the target node. Since the
target node buffer size is limited, it cannot handle all the
packets and at time 23 sec will drop the packets coming
from the malicious node 48 as well as the source node 41.
This will lead to the loss of data and will degrade the service
of the network.
Fig 4.5: Simulation of DOS attack
3.9 Simulation of Sinkhole Attack
A WSN consists of many nodes connected to each other.
These nodes would send the collected data to the base
station for processing. A sinkhole attack is more seen in
cases where there is many to one communication. It is a
serious threat to the sensor networks and proper measures
should be taken in order to detect and prevent it [18]. Here,
a malicious node acts as destination node and looks
attractive to the surrounding nodes. Sinkhole attack is the
selective forwarding attack. The malicious node will be
closer to the destination node in order to attract all
maximum possible traffic of the network. It is one of the
complex attack and detection of the Sinkhole attack is very
difficult. In the simulator, the malicious node is placed
beside the destination node and it attracts all the packets
instead of forwarding to the legitimate node. There are some
routing protocols that could withstand the sinkhole attack at
a certain level but many of the current ones are affected by
the sinkhole attack. Figure 4.6 shows the simulation of
sinkhole attack. In the initial stage, the malicious node gets
all the information about the neighbor nodes. The node that
is closer to the destination acts as a malicious node. The user
can enter the source, destination and the malicious node in
the command prompt when he runs the simulation. Figure
4.12 shows the user entering 0 as source, 9 as destination
and 7 as malicious node.
Fig 4.6: User making the nodes dynamic
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 309
As entered by the user, node 0 becomes the source node,
node 9 becomes the destination node and node 7 is made a
malicious node. The malicious node acts as a legitimate
node and attracts all the maximum possible traffic in the
network. All the packets being sent from the source are sent
to the malicious node instead of the destination node which
can be seen in the figure 4.7.
Fig 4.7: Simulation of sinkhole attack
3.10 Simulation of Hello Flood Attack
Hello Flood attack is also one of the most common attacks
in a WSN. In this type of attack a malicious node keeps
sending hello requests to the legitimate node which will alter
the security of the system. [17] The node which receives
such a message assumes that it has been sent by the sender
which is not the case always. It can occur when there is huge
amount of traffic in the system. Several cryptographic
techniques and methods have been implemented in order to
prevent this attack but each one had its own drawback.
This attack can be simulated by modifying the Aodv.h and
Aodv.cc file in ns2 simulator in order to create hello flood
attack where we can see the target node being flooded by the
packets. These files are the inbuilt files that come along with
the ns2 package when one downloads. They contain all the
code about the routing, providing a path for routing and
information on the packet forwarding. Figure 4.8 shows the
simulation of hello flood attack. A node is made as a target
node and it is flooded with lots of hello messages which will
create a lot of black circles in the simulator. The user can
enter the source and destination as he wishes which is
shown in figure 4.9.Here, the node 0 is made as the source
and the node 9 is made destination. Every node is seen
sending hello messages to every other nodes in the network.
Fig 4.8: User making the nodes dynamic
Fig 4.9: Simulation of hello flood attack
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 310
4. TESTING AND EVALUATION
Using the network simulator NS2, the attacks can be
simulated. It creates a replica of a real time network [12].
NS Simulators are mainly used for network research and
learning. It helps me to create security nodes and establish
the communication between them. This NS2 tool allows to
develop a model design for WSN connection between nodes
in the network. Based on the network attacks like Dos,
wormhole attack, hello flood attack, sinkhole attacks,
Sybil attack, selective forwarding attacks, the network
security can be tested [9]. NS2 tool gives scope in testing, so
the level of network security can easily be tested. The
attacks can be created in the network and the security level
of the wireless sensor network can be tested. Here, for the
given input, what output it is generating are my test cases.
Test Case 1: When the node entered by the user is
greater than the number of nodes:
From the terminal, the user can enter his own source,
destination and malicious node. A fixed number of nodes
will be created. So, if the entered node is greater than the
number of nodes created, the simulation will not start
because it cannot read the node. In the figure 5.1, the
number of nodes created are 10. The user has entered 15 as
destination node. Since it cannot find the node for
communication, it throws an error.
Fig 5.1: Incorrectly entered node
Test Case 2: Overlapping of nodes
It can be tested with sinkhole attack. In sinkhole attack, a
node that is closer to destination node will act as
malicious node. If the user gives the same node for
destination as well as malicious node, the attack will not
happen. It will overlap the transmission and will create a
segmentation fault. Figure 5.2 shows the same.
Fig 5.2: Overlapping of nodes
Test Case 3: Choosing the routing path
In Sybil attack, lot of transmissions between the nodes are
created. Each transmission will have its own routing path.
The routing path will be decided by the AODV file that
comes with the installation of ns2 package. For the Sybil
attack to happen, the malicious node should be one of the
intermediate nodes between the source and destination. If
the malicious node created resides in the path between the
source and destination, then the attack occurs. It can be
shown in figure 5.3.
Fig 5.3: Simulation of Sybil attack
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 311
5. RESULTS
As a part of the proposed system, a graph has been
generated to monitor the network performance. It calculates
the throughput of the network. Throughput indicates overall
number of bytes received in the network. The Throughput in
the network can be affected by various number of factors. It
plays a vital role in analyzing the network performance. The
trace file generated is passed as an input in order to generate
a graph. Using the graph, one can easily understand the
simulation results of the network. The X Axis represents the
time and Y Axis represents the throughput rate. Initially,
when the transmission starts there is huge amount of traffic
in the system, so the throughput will be high. Later it drops
at one point when an attack occurs. Figure 5.4 shows the
graph.
Fig 5.4: Graph for throughput
6. CONCLUSIONS AND FUTURE WORK
WSN‟s are of huge demand. The request for wireless sensor
networks are increasing rapidly, because the growth of using
WSN has increased. There are some limitations in a wireless
sensor network like they have limited storage capacity,
limited capability of processing and limited energy to
transmit data [1]. These drawbacks can make WSN different
from other networks. There are some little concerns that
occur in a WSN. Based on the above mentioned difficulties
in the data integrity, security, there are many solutions that
are available to overcome these dangers. The attacks that are
popular in a WSN like hello flood attack, sinkhole attack,
Sybil attack and denial of service attack have been simulated
in a simulator. On simulation, the performance and the
efficiency of the network can be analyzed. The behavior and
the energy parameters can be examined. A mechanism for
ensuring secure data transfer and preventing the attacks in a
WSN must be proposed. The parameters which determine
the network performance can be calculated from the
simulation. Because of the numerous attacks happening in
the WSN, there is less amount of security.
REFERENCES
[1]. Y. Wang, G. Attebury, et al. "A survey of security
issues in wireless sensor networks." Computer Science
and Engineering. Vol.8, no. 2. 2006.
[2]. E. Shi and A. Perrig, “Designing Secure Sensor
Networks,” Wireless Commun. Mag., vol. 11, no. 6, pp. 38–
43, Dec. 2004.
[3]. N. Gura, A. Patel, et al. "Comparing elliptic curve
cryptography and RSA on 8-bit CPUs." Cryptographic
Hardware and Embedded Systems-CHES 2004, pp 925-943,
2004.
[4]. M. Razzaque., S.Ahmad Salehi. Security and
Privacy in Vehicular Ad- Hoc Networks: Survey and the
Road Ahead. Wireless Networks and Security, Springer:
107-132, 2013.
[5]. A. Perrig et al., “SPINS: Security Protocols for
Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp.
521–34, Sept. 2002.
[6]. H. Du, X. Hu, et al. "Energy efficient routing and
scheduling for realtime data aggregation in WSNs."
Computer communications. Vol.29, no. 17. 3527-3535,
2006.
[7]. X. Hung, et al. “An Energy-Efficient Secure Routing
and Key Management Scheme for Mobile Sinks in Wireless
Sensor Networks Using Deployment Knowledge,” Sensors,
Vol 8. 2008, 7753-7782
[8]. L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu;
"Optimized Data Aggregation in WSNs Using Adaptive
ARMA," Sensor Technologies and Applications
(SENSORCOMM), 2010 Fourth International Conference
on pp.115-120, 18-25 July2010.
[9]. S. Zhu et al., “An Interleaved Hop-by-Hop
Authentication Scheme for Filtering of Injected False Data
in Sensor Networks,” Proc. IEEE Symp. Security and
Privacy, Oakland, CA, pp. 259–71, May 2004.
[10]. J. Ben-Othman, and B. Yahya. "Energy efficient and
QoS based routing protocol for wireless sensor networks."
Journal of Parallel and Distributed Computing 70(8), 849-
857 2010.
[11]. D.W. Carman, P.S. Krus, and B.J. Matt, “Constraints
and approaches for distributed sensor network security”,
Technical Report 00-010, NAI Labs, Network Associates
Inc., Glenwood, MD, 2000.
[12]. Teerawat Issariyakul and Ekram Hossain.
Introduction%20to%20Network%20Simulator%20NS2%20
(1).pdf
[13]. R. E. Shannon, “Introduction to the art and science of
simulation,” in Proc. of the 30th conference on winter
simulation (WSC‟98), 1989 [14]
http://ns2tutor.weebly.com/ns2-in-windows.html
[15]. ttp://www.cs.berkeley.edu/~dawnsong/papers/sybil.pdf
[16].http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumb
er=4431860
[17].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1
.1.403.6592&rep=rep1&type=pdf
[18]. http://ijaiem.org/Volume2Issue2/IJAIEM-2013-02-06-
005.pdf
[19]. http://sourceforge.net/projects/nsnam/files/
[20]. http://www.ipcsit.com/vol35/003-CNCS2012-
N010.pdf
10. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 10 | OCT-2015, Available @ http://www.ijret.org 312
BIOGRAPHIES
Tejaswi Singh, a student of computer
science engineering in his final year with a
knack for network security.
Aatish Gandotra, a student of Electronics
and Communication Engineering in his final
year with deep interest in telecommunication
and networking.