Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKIJNSA Journal
It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node
illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these
routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we
illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of
communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.
Security for Future Networks: A Prospective Study of AAIsidescitation
The future Internet will rely heavily on virtualization and Cloud networking.
The project Security for Future Networks (SecFuNet)1 proposes the design of a framework
providing secure identification and authentication, secure data transfer and secure
virtualized infrastructure.
In this paper, we present some of the most important ones currently available and we
present a comparative study should examine some models and frameworks of Identity
Management. Initially, we had identified OpenID, Higgins and Shibboleth frameworks as
those providing facilities that are the closest to our proposals and our requirements.
However, with the literature prospection more frameworks have being included in our
study, which has allowed to expand our state of the art on IdM. In our study, some features
are highlighted and related with our objectives.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKIJNSA Journal
It is quite a challenging task to achieve security in a mobile ad hoc network because of its open nature, dynamically changing topology, lack of infrastructure and central management. A particular harmful attack that takes the advantage of these characteristics is the Sybil attack, in which a malicious node
illegitimately claims multiple identities. This attack can exceedingly disrupt various operations of the mobile ad hoc networks such as data aggregation, voting, fair resource allocation scheme, misbehavior detection and routing mechanisms etc. Two routing mechanisms known to be vulnerable to the Sybil attack in the mobile ad hoc networks are multi-path routing and geographic routing. In addition to these
routing protocols, we show in this paper that the Sybil attack can also disrupt the head selection mechanism of the lowest ID cluster-based routing protocol. To the best of our knowledge, this is for the first time that a Sybil attack is shown to disrupt this cluster based routing protocol. To achieve this, we
illustrate to have introduced a category of Sybil attack in which the malicious node varies its transmission power to create a number of virtual illegitimate nodes called Sybil nodes, for the purpose of
communication with legitimate nodes of the Mobile Ad Hoc Network. The variation in the transmission power makes the Sybil attack more deadly and difficult to be detected.
Security for Future Networks: A Prospective Study of AAIsidescitation
The future Internet will rely heavily on virtualization and Cloud networking.
The project Security for Future Networks (SecFuNet)1 proposes the design of a framework
providing secure identification and authentication, secure data transfer and secure
virtualized infrastructure.
In this paper, we present some of the most important ones currently available and we
present a comparative study should examine some models and frameworks of Identity
Management. Initially, we had identified OpenID, Higgins and Shibboleth frameworks as
those providing facilities that are the closest to our proposals and our requirements.
However, with the literature prospection more frameworks have being included in our
study, which has allowed to expand our state of the art on IdM. In our study, some features
are highlighted and related with our objectives.
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile
devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.
Android Based Total Security for System AuthenticationIJERA Editor
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsGokul Alex
Presentation Session by Gokul Alex for Tamil Nadu Science Foundation on the Collection of Cryptographic Techniques for COVID-19 Contact Tracing in the framework of Privacy Preserving Proximity Protocols. This is a research report compiled in collaboration with EPIC Knowledge Society, RedTeam Hacker Academy, Beyond Identity, Semiot Protocols, Cyanaura Maps.
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
A computer implemented method and computer program
products to prevent attacks against authorization systems
The computer implemented method comprising controlling
the access to different resources and actions de?ned for a user
by a ?rst server, reducing the exposure time at Which such
operations are available and establishing a dual channel verification through the use of a second server.
The computer programs implement the method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
Mobile communication plays a vital role in every human’s life. The basic requirement to initiate this communication is a mobile signal. A mobile signal, which is also known as reception, is the signal strength received by a mobile phone from a cellular network. This signal is detected by the SIM (Subscriber Identity Module) card that is inserted into the phone and helps to send and receive calls/text messages. Various network (signal) providers include Airtel, Vodafone and BSNL etc, whose primary goal is to facilitate their customers with their best reception. But, at the situations where the signal vanishes, the network subscribers (users) become helpless.
In this paper, we suggest a method which helps the subscribers to gain signal from other network providers, in case of emergency situations, when their own network provider has failed. This is implemented by making changes in the ICCID (Integrated Circuit Card ID) of the SIM. By implementing this concept, we can also provide signal to those subscribers in the dead zones of a particular network, where a dead zone is defined as an area in which mobile phones cannot transmit to a nearby tower or a base station.
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
Technicall report created by Gartner analyst in which they explore Telefonica & Eleven Paths technologies to provide Authentication & Authorization as a Service. In it they analyse Mobile Connect, Latch, SealSign and SmartID
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...ijsrd.com
The present study aimed at assessment of the drinking water quality of commercial areas of shivamogga town using NSF-WQI. The physico-chemical parameters such as pH, Temp, EC, Ca, Mg, TDS, Cl, Sulphate, Nitrate, Phosphate, Iron, DO, BOD, COD, Total hardness, Alkalinity, Turbidity values used to assess water quality. Few parameters pH, TDS, phosphate, nitrates, DO, BOD & turbidity were considered to compute water quality index based on national sanitation foundation (NSF-WQI). WQI is an excellent management & general administrative tool in communicating water quality information. NSF-WQI online calculator is used to calculate the water quality index. According to NSF-WQI ranking, water quality is good & suitable for drinking purpose.
Optimization of Machining Parameters for Turned Parts Through Taguchi’...ijsrd.com
The objective of the study is to achieve minimum requirement of radial force during machining of turned parts. This analysis presents the influence of process parameters (nose radius, cutting speed, feed rate and depth of cut) on the radial force as a response variable. For experimentation, an L18 Orthogonal Array (OA) of Taguchi design of experiment is used. EN-16 steel alloy is used as work material because this material has a wide range of applications in automotive industries etc. Carbide cutting inserts are used during experimentations. Furthermore, the analysis of variance (ANOVA) is also applied to find out the most considerable factor. The entire analysis work is carried out using Minitab-16 software. The optimal setting of parameters is: 3rd level of cutting speed, 1st level of feed rate and 1st level of depth of cut. Depth of cut is most significant factor and nose radius is insignificant factor. Finally confirmation experiments are done to verify the optimal results.
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machinesijsrd.com
this paper describes how the Parametric Programming is applicable in CNC machining. Parametric programming has the potential to increase efficiency of CNC operations but still it is less frequently utilized features of CNC machines. Feature based parametric programming are beneficial to companies with manufacture of GT (group technology) where the parts with similar design undergoes in a machine cell. The advantages of blending the concept of group technology and parametric programming for CNC machining operations are illustrated with the help of a part family.
Quality of work life is the degree to which individuals are able to satisfy their important personal needs while employed by the firm. Quality satisfaction, motivation, involvement and commitment individuals experience with respect to their lives at work Quality of work life is a process in organizations, which enables its members at all levels to participate actively and effectively in shaping the organization environment, methods, and outcomes. The objective of the study is to help the organization to know the level of satisfaction of the workers and executives at various hierarchical levels, towards the facilities and welfare amenities provided by them and also to find out the challenges and difficulties faced by the management in providing better quality of Work life to the employees. Most of the employees covered under my study have not been found to be feeling any stress in their jobs and related working environment. It has been an interesting revelation that there is no employee in ORGANISATION, is working here just for the sake of the job and most of the employees are not only comfortable with ORGANISATION, but also feeling proud of being in the company There should be no communication gap between the team leader and group members. The communication flow must be improved to make it smooth to maintain cordial inter personal relations in the organization. The training and development programs have to be more effectively planned and implemented.
A Review on Design of a Fixture for Rear Coverijsrd.com
In fixtures which are used for machining process, minimizing work piece deformation due to clamping and cutting forces is necessary due to which machining accuracy can be maintained. The different methodologies used for clamping operation in different application by various authors are discussed in this paper. Fixtures are required in different industries according to specific application. Rear Cover is important part in agriculture tractor. The fixture set up for Rear Cover is done manually, which leads to machining defects, poor quality, increase in rejection rate, more cycle time and more hectic to operator. So, there is need to develop system which can help in achieve quality, increase productivity, elimination of human error, reduction in cycle time.
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile
devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.
Android Based Total Security for System AuthenticationIJERA Editor
In this Paper [5], A highly severe menace to any computing device is the impersonation of an authenticate user. The most frequent computer authentication scheme is to use alphanumerical usernames and passwords. But the textual passwords are prone to dictionary attacks, eves dropping, shoulder surfing and social engineering. As such, graphical passwords have been introduced as an alternative to the traditional authentication process. Though the graphical password schemes provide a way of making more user friendly passwords, while increasing the level of security, they are vulnerable to shoulder surfing. To address this problem, text can be used in combination with the colors and images to generate the session passwords, thereby making a stronger authentication means. In general, session passwords are those that can be used only once and for every new session, a new password is engendered. This paper [7] describes a method of implementing two factor authentication using mobile phones. The proposed method guarantees that authenticating to services, such as online banking or ATM machines, is done in a very secure manner. The proposed system involves using a mobile phone as a software token for One Time Password generation. The generated One Time Password is valid for only a short user defined period of time and is generated by factors that are unique to both, the user and the mobile device itself. Additionally, an SMS-based mechanism is implemented as both a backup mechanism for retrieving the password and as a possible mean of synchronization. The proposed method has been implemented and tested. Initial results show the success of the proposed method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsGokul Alex
Presentation Session by Gokul Alex for Tamil Nadu Science Foundation on the Collection of Cryptographic Techniques for COVID-19 Contact Tracing in the framework of Privacy Preserving Proximity Protocols. This is a research report compiled in collaboration with EPIC Knowledge Society, RedTeam Hacker Academy, Beyond Identity, Semiot Protocols, Cyanaura Maps.
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...Telefónica
A computer implemented method and computer program
products to prevent attacks against authorization systems
The computer implemented method comprising controlling
the access to different resources and actions de?ned for a user
by a ?rst server, reducing the exposure time at Which such
operations are available and establishing a dual channel verification through the use of a second server.
The computer programs implement the method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
The usage of sensitive online services and applications such as online banking, e-commerce etc is increasing day by day. These technologies have tremendously improved making our daily life easier. However, these developments have been accompanied by E-piracy where attackers try to get access to services illegally. As sensitive information flow through Internet, they need support for security properties such as authentication, authorization, data confidentiality. Perhaps static password (User ID & password) is the most common and widely accepted authentication method. Online applications need strong password such as a combination of alphanumeric with special characters. In general, having one password for a single service may be easy to remember, but controlling many passwords for different services poses a tedious task on users online applications . Usually users try to use same password for different services or make slight changes in the password which can be easy for attacker to guess adding increased security threat. In order to overcome this, stronger authentication solutions need to be suggested and adapted for services based network.
Mobile communication plays a vital role in every human’s life. The basic requirement to initiate this communication is a mobile signal. A mobile signal, which is also known as reception, is the signal strength received by a mobile phone from a cellular network. This signal is detected by the SIM (Subscriber Identity Module) card that is inserted into the phone and helps to send and receive calls/text messages. Various network (signal) providers include Airtel, Vodafone and BSNL etc, whose primary goal is to facilitate their customers with their best reception. But, at the situations where the signal vanishes, the network subscribers (users) become helpless.
In this paper, we suggest a method which helps the subscribers to gain signal from other network providers, in case of emergency situations, when their own network provider has failed. This is implemented by making changes in the ICCID (Integrated Circuit Card ID) of the SIM. By implementing this concept, we can also provide signal to those subscribers in the dead zones of a particular network, where a dead zone is defined as an area in which mobile phones cannot transmit to a nearby tower or a base station.
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...Chema Alonso
Technicall report created by Gartner analyst in which they explore Telefonica & Eleven Paths technologies to provide Authentication & Authorization as a Service. In it they analyse Mobile Connect, Latch, SealSign and SmartID
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...ijsrd.com
The present study aimed at assessment of the drinking water quality of commercial areas of shivamogga town using NSF-WQI. The physico-chemical parameters such as pH, Temp, EC, Ca, Mg, TDS, Cl, Sulphate, Nitrate, Phosphate, Iron, DO, BOD, COD, Total hardness, Alkalinity, Turbidity values used to assess water quality. Few parameters pH, TDS, phosphate, nitrates, DO, BOD & turbidity were considered to compute water quality index based on national sanitation foundation (NSF-WQI). WQI is an excellent management & general administrative tool in communicating water quality information. NSF-WQI online calculator is used to calculate the water quality index. According to NSF-WQI ranking, water quality is good & suitable for drinking purpose.
Optimization of Machining Parameters for Turned Parts Through Taguchi’...ijsrd.com
The objective of the study is to achieve minimum requirement of radial force during machining of turned parts. This analysis presents the influence of process parameters (nose radius, cutting speed, feed rate and depth of cut) on the radial force as a response variable. For experimentation, an L18 Orthogonal Array (OA) of Taguchi design of experiment is used. EN-16 steel alloy is used as work material because this material has a wide range of applications in automotive industries etc. Carbide cutting inserts are used during experimentations. Furthermore, the analysis of variance (ANOVA) is also applied to find out the most considerable factor. The entire analysis work is carried out using Minitab-16 software. The optimal setting of parameters is: 3rd level of cutting speed, 1st level of feed rate and 1st level of depth of cut. Depth of cut is most significant factor and nose radius is insignificant factor. Finally confirmation experiments are done to verify the optimal results.
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machinesijsrd.com
this paper describes how the Parametric Programming is applicable in CNC machining. Parametric programming has the potential to increase efficiency of CNC operations but still it is less frequently utilized features of CNC machines. Feature based parametric programming are beneficial to companies with manufacture of GT (group technology) where the parts with similar design undergoes in a machine cell. The advantages of blending the concept of group technology and parametric programming for CNC machining operations are illustrated with the help of a part family.
Quality of work life is the degree to which individuals are able to satisfy their important personal needs while employed by the firm. Quality satisfaction, motivation, involvement and commitment individuals experience with respect to their lives at work Quality of work life is a process in organizations, which enables its members at all levels to participate actively and effectively in shaping the organization environment, methods, and outcomes. The objective of the study is to help the organization to know the level of satisfaction of the workers and executives at various hierarchical levels, towards the facilities and welfare amenities provided by them and also to find out the challenges and difficulties faced by the management in providing better quality of Work life to the employees. Most of the employees covered under my study have not been found to be feeling any stress in their jobs and related working environment. It has been an interesting revelation that there is no employee in ORGANISATION, is working here just for the sake of the job and most of the employees are not only comfortable with ORGANISATION, but also feeling proud of being in the company There should be no communication gap between the team leader and group members. The communication flow must be improved to make it smooth to maintain cordial inter personal relations in the organization. The training and development programs have to be more effectively planned and implemented.
A Review on Design of a Fixture for Rear Coverijsrd.com
In fixtures which are used for machining process, minimizing work piece deformation due to clamping and cutting forces is necessary due to which machining accuracy can be maintained. The different methodologies used for clamping operation in different application by various authors are discussed in this paper. Fixtures are required in different industries according to specific application. Rear Cover is important part in agriculture tractor. The fixture set up for Rear Cover is done manually, which leads to machining defects, poor quality, increase in rejection rate, more cycle time and more hectic to operator. So, there is need to develop system which can help in achieve quality, increase productivity, elimination of human error, reduction in cycle time.
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...ijsrd.com
Concrete is one of the most widely used construction material in the world. Destruction of concrete structure due to natural calamities like earthquake, tsunami or by the bombardment, it has became a major problem in finding place for dumping the concrete debris particularly in urban areas. This paper deals with the study of strength of concrete incorporating Recycled Aggregate concrete. The main objectives of this investigation is to find out up to what percentage the Natural Coarse Aggregate (N.C.A) can be replaced by R.C.A in the concrete mix and to find out the extra quantity of cement to be added for each percentage replacement by R.C.A to achieve its target mean strength A series of test were carried out to determine the compressive strength, split tensile strength, flexural strength with and without recycled aggregates. Natural coarse aggregates in concrete were replaced with 0%, 20%, 40%, 60%, 80% and 100% of crushed concrete coarse aggregate. For the strength characteristics, the result showed a gradual decrease in compressive strength, split tensile strength, flexural and modulus of elasticity as the percentage of recycled aggregate is increased.
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
Using advanced wireless local area network technologies, vehicular ad hoc networks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc., currently, geographic routing protocols are widely adopted for VANETs as they do not require route construction and route maintenance phases. Again, with connectivity awareness, they perform well in terms of reliable delivery. Further, in the case of sparse and void regions, frequent use of the recovery strategy elevates hop count. Some geographic routing protocols adopt the minimum weighted algorithm based on distance or connectivity to select intermediate intersections. However, the shortest path or the path with higher connectivity may include numerous intermediate intersections. As a result, these protocols yield routing paths with higher hop count. In this paper, we propose a hop greedy routing scheme that yields a routing path with the minimum number of intermediate intersection nodes while taking connectivity into consideration. Moreover, we introduce back-bone nodes that play a key role in providing connectivity status around an intersection. Apart from this, by tracking the movement of source as well as destination, the back-bone nodes enable a packet to be forwarded in the changed direction. Simulation results signify the benefits of the proposed routing strategy in terms of high packet delivery ratio and shorter end-to-end delay.
Involute Spline Profile Generation using Wire EDM Processijsrd.com
Today’s Mechanical Engineering field is growing rapidly in designing techniques to manufacture Splines and Gears. Over the decades, numerous methods and manufacturing processes have been used in making the various kinds of Splines based on various criteria, including applications, reliability, life time, processing time and manufacturing cost. This work is also carried out with the same notion of reviewing of manufacturing an External Involute Spline cutting tool using Wire Electrical Discharge Machining process and Vertical Milling Machine. Wire electrical discharge machining (WEDM) is an extremely accurate type of manufacturing process. This technique was commercially developed in the 1970s. Spline is a long flexible strip of metal/plastic/wood used to produce the curve through the known set of data points. The curved shape of strip is obtained by pulling it into the transverse direction using the lead weights or pegs.
Review of Implementation of lean manufacturing in cement industryijsrd.com
Implementation of lean helps many organizations to improve their productivity and efficiency; on the other hand number of organizations has failed to benefit from lean philosophy. The case of not achieving the expected results of implementing lean is not because of limitation of lean to specific organizations type; but it is the misconception of lean philosophy. The lean thinking was first implied in the automobile companies and it widely spreads within the all types of industries; however the today's challenge is to implement the lean philosophy within continuous manufacturing industries and different organizations regardless to the type and size of the organization. This has motivated me to apply lean philosophy to the continuous industry i.e. cement industry. The cement industry is an example of the continuous industry sector and it will be used to convey that the lean philosophy is applicable to all deferent organization types. There are many problems the cement industry facing in today's cut throat competition; one of the major challenges is the capability of the cement industry to adopt techniques by which the overall improvement can be achieved. The need for improving the productivity of the cement production line is to reduce the downtime rates, and satisfy high demands of consumers. This research has aimed that the lean philosophy is beneficial to cement industry once the organization aims, and objectives are clarified and communicated through all levels of the organization. Furthermore barriers and obstacles should be removed by changing the organizational culture, and empowering the people to be involved in identifying and problem solving process.
Case–Based Reasoning is a problem solving paradigm that in many respects is fundamentally different from other major AI approaches. Instead of relying solely on general knowledge of a problem domain, or making associations along generalized relationships between problem descriptors and conclusions, CBR is able to utilize the specific knowledge of previously experienced, concrete problem situations (cases). A new problem is solved by finding a similar past case, and reusing it in the new problem situation. A second important difference is that CBR also is an approach to incremental, sustained learning, since a new experience is retained each time a problem has been solved, making it immediately available for future problems. The CBR field has grown rapidly over the last few years, as seen by its increased share of papers at major conferences, available commercial tools, and successful applications in daily use. A CBR tool should support the four main processes of CBR: retrieval, reuse, revision and retention.
Real World Application of Big Data In Data Mining Toolsijsrd.com
The main aim of this paper is to make a study on the notion Big data and its application in data mining tools like R, Weka, Rapidminer, Knime,Mahout and etc. We are awash in a flood of data today. In a broad range of application areas, data is being collected at unmatched scale. Decisions that previously were based on surmise, or on painstakingly constructed models of reality, can now be made based on the data itself. Such Big Data analysis now drives nearly every aspect of our modern society, including mobile services, retail, manufacturing, financial services, life sciences, and physical sciences. The paper mainly focuses different types of data mining tools and its usage in big data in knowledge discovery.
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23ijsrd.com
The most specific of solar cycle 23, sun enters a period of intermediate and weak solar activity in terms of sunspot number. Based on the observation from Omniweb data centre for solar- interplanetary data, geomagnetic activity and monthly mean count rate of cosmic ray intensity (CRI) variation data taken from neutron monitors during solar activity period 23/24. The phase of minimum solar activity began in May 2005 and lasted for 4.5 years the unprecedented duration of the relative sunspot numbers falls. It is observed that the strength of the interplanetary magnetic field has been falling off to new low levels, and reduces the GCR entering inner- heliosphere and it is also found that SSN positive correlated with Kp and Ap and sunspot number, 10.7 cm solar radio flux, were inverse correlated with monthly mean count rate of cosmic ray intensity.
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cellijsrd.com
The application of microbial fuel cell (MFC) for electricity generation has been developing recently. This research explores the application of single chamber MFC in generating electricity using paper wastewater .The different concentration of wastewater has been performed. The maximum current, voltage, BOD, COD, pH and TDS obtained with respect to time. MFC of paper mill wastewater showed removal efficiency 68.1% COD, 67.3% BOD and 56.6% TDS with different feed concentration. The current, voltage and power generation in the reactor is 1.40mA, 1.24 V and 0.46 watts/m2 respectively.
Parallel Key Value Pattern Matching Modelijsrd.com
Mining frequent itemsets from the huge transactional database is an important task in data mining. To find frequent itemsets in databases involves big decision in data mining for the purpose of extracting association rules. Association rule mining is used to find relationships among large datasets. Many algorithms were developed to find those frequent itemsets. This work presents a summarization and new model of parallel key value pattern matching model which shards a large-scale mining task into independent, parallel tasks. It produces a frequent pattern showing their capabilities and efficiency in terms of time consumption. It also avoids the high computational cost. It discovers the frequent item set from the database.
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...ijsrd.com
With rapid advancement of technology and unlimited quest in the intricate fields of science led man to confront nano tubes. It consists of C60 Fullerenes with tube like structures capped at both ends delivering extraordinary mechanical and electrical properties. It is hard to stress as extremely low turn on for fields and has high current densities. It is also the best emission field emitter for future field emission displays. Can be extensively used for fuel cells and field emission display. We throw a light on the research on nano tubes and it's general applications. In this paper we are focusing and questioning the field of research to ponder for the betterment off life to nano tube.
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICijsrd.com
Brushless DC (BLDC) motor drives are becoming more popular in industrial and traction applications. Hence the control of BLDC motor in four quadrants is very vital. The flexibility of the drive system is increased using digital controller. In this paper the PWM signals for driving the power inverter bridge for BLDC motor have been successfully implemented using a dsPIC controller and the motor can be controlled in all the four quadrants without any loss of power .Energy is conserved during regenerative braking period. The digital controller dsPIC, is advantageous over other controller, as it combines the calculation capability of digital signal processor and controlling capability of PIC microcontroller to achieve a precise control. Simulation of the proposed model is done by using MATLAB/Simulink.
Reality based mobility model Analyzed over reactive and proactive routing pro...ijsrd.com
In MANET a mobility model of the mobile nodes is an important and unique feature that differentiates this network with other wired and wireless networks. Network topology changes dynamically due to high mobility. Therefore to analyze any routing protocol performance in the realistic scenarios mobility models plays an influential role. In our paper the impact of reality based mobility models on reactive routing protocols (AODV, DSR) and proactive routing protocol (DSDV) are analyzed in the natural disaster scenarios. Performance matrices which analyze the performance of routing protocols are end to end delay, Throughput, Packet delivery Ratio. Mobility model scenarios are generated in bonnmotion and get implemented on NS2 network simulator. Our research work recommended to understand better use of routing protocols, reality based mobility models in real world application such as rescue and relief operation, tracking and surveillance operation in disaster areas.
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELijsrd.com
The objective of this paper deals on analysis and implementation of single phase and four phase boost converter. The input ripple current and output ripple voltage, steady state capacitor current are observed using MATLAB Simulink.
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDijsrd.com
The present study is to determine flow field in the three-dimensional scramjet engine combustor with coupled implicit NS equations, the standard k-ε turbulence model are used and the finite-rate/eddy-dissipation reaction model has to be applied to simulate numerically for the flow field of the hydrogen, diesel and methane fueled scramjet combustor with a planer strut flame holder under two different working conditions, the working condition include the cold flow and engine ignition. ANSYS Fluent software is used to solve the analysis, with hot and cold inlet velocities, the mach number for air and fluids are 2 and 1 respectively, inflow fluids are varied as hydrogen, diesel and methane. Due to combustion the recirculation region behind the wedge becomes larger as compared to mixing case and it acts as a flame holder for the methane (CH4), hydrogen (H2) and diesel (C10H22) diffusion. It is also evident from the simulation studies; the combustion affects the flow field significantly. The leading edge shock reflected off the upper and lower combustor walls facilitates on setting of combustion when it hits the wake in a region where large portions of the injected fuel have been mixed up with the air. The pressure, velocity and temperature distributions along the geometry are estimated and discussed.
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networksrahulmonikasharma
If a user wants to connect to a server has to provide his credentials where as some of the user (avoids to enter their original credentials) connect through anonymizing network such tor browser. Internet services can be accessed privately through anonymizing networks like Tor. A set of routers are used to achieve this in order to hide the identity of client from server. The advent of anonymizing networks assured that users could access internet services with complete privacy avoiding any possible hindrance. IP was being shown everywhere, To advertisers and other places, even from SPAM who compromised users identity. Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server.
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
The emerging trend of using mobile agents for mobile adhoc network (MANET) applications intensifies the need for protecting them. Here we propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents may get killed or rerouted by visiting hosts. The best way to defend against this situation is to prevent both the hosts and agents from communicating with the malicious ones. In this regard this paper develops a distributed reputation model of MANET using concepts from DempsterShafer theory. The agents (deployed for some purposes like ervice discovery) while roaming in the networkwork collaboratively with the hosts they visit to form a consistent trust view of MANET. An agent may exchange information about suspected nodes with a visiting host. To speed up convergence, information about an unknown node can be solicited from trusted neighborhood. Thus an inactive node, without deploying agents may also get a partial view of the network. The agents can use combination of encryption and digital signature to provide privacy and authentication services. Node mobility and the effect of environmental noise are considered. The results show the robustness of our proposed scheme even in bigger networks.
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users
of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has
become an important concern in online social networks. Users are unaware of the privacy risks involved
when they share their sensitive information in the network.[1] One of the fundamental challenging issues is
measurement of privacy .It is hard for social networking sites and users to make and adjust privacy settings
to protect privacy without practical and effective way to quantify , measure and evaluate privacy. In this
paper, we discussed Privacy Index (PIDX) which is used to measure a user’s privacy exposure in a social
network. We have also described and calculated the Privacy Quotient (PQ) i.e. a metric to measure the
privacy of the user’s profile using the naive approach. [2] The users should be aware of their privacy
quotient and should know where they stand in the privacy measuring scale. At last we have proposed a
model that will ensure privacy in the unstructured data. It will utilize the Item Response Theory model to
measure the privacy leaks in the messages and text that is being posted by the users of the online social
networking sites.
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
Business delivery value added more via security services to the service providers and service users. Organization system developing various models to achieve the security system according to the modern development and technology; which they requires for their own operations and for their interactions within departments, customers and partners. Business securities pattern will be aid to establish a powerful methodology to identify and understand these relationships to maximize the value of security system. This paper presents a study of important business patterns in Roles Right Definition Model Use Cases linking to Object oriented Analysis and Design approach for Secured Internet Information access.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
International Journal on Web Service Computing (IJWSC)ijwscjournal
Web Service is a reusable component which has set of related functionalities that service requesters can
programmatically access from the service provider and manipulate through the Web. One of the main
security issue is to secure web services from the malicious requesters. Since trust plays an important role in
many kinds of human communication, it allows people to work under insecurity and with the risk of
negative cost, many researchers have proposed different trust based web services access control model to
prevent malicious requesters. In this literature review, various existing trust based web services access
control model have been studied also investigated how the concept of a trust level is used in the access
control policy of a service provider to allow service requester to access the web services
A Literature Review on Trust Management in Web Services Access Controlijwscjournal
Web Service is a reusable component which has set of related functionalities that service requesters can
programmatically access from the service provider and manipulate through the Web. One of the main
security issue is to secure web services from the malicious requesters. Since trust plays an important role in
many kinds of human communication, it allows people to work under insecurity and with the risk of
negative cost, many researchers have proposed different trust based web services access control model to
prevent malicious requesters. In this literature review, various existing trust based web services access
control model have been studied also investigated how the concept of a trust level is used in the access
control policy of a service provider to allow service requester to access the web services.
A Literature Review on Trust Management in Web Services Access Controlijwscjournal
Web Service is a reusable component which has set of related functionalities that service requesters can programmatically access from the service provider and manipulate through the Web. One of the main security issue is to secure web services from the malicious requesters. Since trust plays an important role in many kinds of human communication, it allows people to work under insecurity and with the risk of negative cost, many researchers have proposed different trust based web services access control model to prevent malicious requesters. In this literature review, various existing trust based web services access control model have been studied also investigated how the concept of a trust level is used in the access control policy of a service provider to allow service requester to access the web services.
Trust based video management framework for social multimedia networksVenkat Projects
Trust based video management framework for social multimedia networks
Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Trustworthy Service Enhancement in Mobile Social Network
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 75
Trustworthy Service Enhancement in Mobile Social Network
Ms. Deepa Bagde1
Prof. Sulabha Patil2
1
M. Tech Student 2
Assistant Professor
1,2
Department of Computer Science and Engineering
1,2
Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur, India
Abstract— Mobile Social Network is network which allows
mobile users to discover and interact with existing and
potential friends. A Trustworthy Service Evaluation (TSE)
system is a system that enables users to share service
reviews in Service oriented mobile social networks (S-
MSNs). Each service provider should independently
maintain a TSE for itself that collects and stores users’
reviews about its services without requiring any third trusted
authority. These service reviews can be made available to
interested users to make service selection decisions. In this
three unique service review attacks are identified, i.e., link
ability, rejection, and modification attacks, and then develop
security mechanisms for the TSE to deal with these attacks.
In this we extend the bTSE(basic TSE) to a Sybil-resisted
TSE (SrTSE) which enable the detection of two typical sybil
attacks. In SrTSE if a user generates multiple reviews
toward a vendor in a predefined time slot with different
pseudonyms, the real identity of that user will be revealed.
Hence a Trustworthy Service in Mobile Social Network is
introduces so that users can access services securely.
Key words: Mobile social networks trust evaluation, Sybil
attack, and distributed system.
I. INTRODUCTION
Trustworthy service evaluation (TSE) systems [7] enable the
service providers or any third authority to receive user
feedback, such as service reviews or simply reviews, as
compliments and complaints about their services. By using
the TSE, the service providers come to know the service
experiences of the users and are able to improve the service
strategy in time. The collected reviews can then be made
available to the public, which enhances service advertising
and assists the users in making wise service selections. The
TSE is maintained by a third trusted authority that is trusted
to host authentic reviews. Popular TSE can found in web
based social networks such as Facebook and eBay. They are
important marketing tools for service providers who target
the global market. In this paper, we move the TSE into the
S-MSN settings. We require service providers to maintain
the TSE by themselves. In the meantime, we consider the
users participate in the TSE in a cooperative manner.
In the S-MSNs, service providers offer location
based services to local users and attract the users by various
advertising approaches, for example, sending e-flyers to the
nearby passengers via wireless connections. With a higher
reputation, a service provider is likely to be chosen by the
users. However, the S-MSNs are autonomous and
distributed networks where no third trusted authority needed
for bootstrapping the trust relations. Therefore, for the users
in the S-MSNs, enable the trust evaluation of the service
providers that is a challenging problem. Location-based
services now emerge as an imperative need of mobile users.
It can be integrated into various types of networks to obtain
promising applications while their implementation has many
outstanding and independent research issues.
In the design of the TSE for the S-MSN, security
mechanisms must be included for these attacks. Notorious
Sybil attacks [5], [6], [7], [8] cause damage to the
effectiveness of the TSE. The multiple pseudonym
techniques [9] are adopted in many distributed networking
systems for privacy preservation and locations of users. On
the one hand, users are able to frequently change their
pseudonyms to prevent the linkage of their behaviors at
different time/location. Their behavior cannot be tracked as
well as their personal information cannot be disclosed. As a
result, they are more willing to use mobile applications.
We consider S-MSN composed of static vendors
and mobile users that. Each vendor should equip with a
wireless communication device that is having a large storage
space [4]. In the TSE, vendor stores and disseminates
service information to the users. Without in-network third
authorities in the SMSN, vendor is required to manage
reviews for themselves. These requirements bring unique
security problems to the review submission process. For
example, vendors can reject or delete negative reviews and
insert forged positive ones, and the malicious users may
leave false negative reviews or drop reviews from others to
decrease reputation of some particular vendors. In design of
the TSE for S-MSN, security mechanisms are included to
resist these attacks. In the design of TSE for the S-MSN,
security is present to deal with these attacks. Under Sybil
attacks, the bTSE cannot work as expected because single
user can abuse pseudonyms to generate multiple unlikable
false reviews in a short time.
II. LITERATURE SURVEY
Mobile social networks extend social networks in the by
allowing mobile users to discover and interact with existing
and potential friends. Despite their promise to enable
exciting applications, serious security and privacy concerns
have hindered wide adoption of these networks [1].
A. Secure Friend Discovery
An important capability offered by mobile social networks
is that to allow mobile users to discover and interact with
friends. Suppose you are waiting for your flight in an airport
and your mobile phone discovers your friend’s friend is in
the next aisle and you can talk with face-to-face. Or you
visit a new place and your mobile phone finds someone in
your vicinity shares similar attributes as you so that you can
interact with. Suppose you are waiting for your flight in an
airport and your mobile phone discovers your friend’s friend
is in the next aisle and you can talk with face-to-face. Or
you visit a new place and your mobile phone finds someone
in your vicinity shares similar attributes as you so that you
can interact with.
One way to address the privacy and security issues
is to take advantage of a trusted central server, which
collects information from individual users, computes and
disseminates the proximity results on demand. Server-based
2. Trustworthy Service Enhancement in Mobile Social Network
(IJSRD/Vol. 2/Issue 08/2014/019)
All rights reserved by www.ijsrd.com 76
solution is not suitable for mobile social networks for the
following reasons. First, users in a mobile social network
may not have direct access to a computer or the Internet.
B. Dynamic Privacy-Preserving Key Management
For vehicle user’s privacy preservation to improve key
update efficiency of location based services (LBSs) in
vehicular ad -hoc networks (VANETs), we propose a
dynamic privacy-preserving key management scheme,
called DIKE. We divide session into several time slots so t
each time slot holds a different key, when no vehicle user
departs from the service session. In this also integrate a
novel dynamic threshold technique in traditional V-2-V and
V-2-I communications to achieve session key’s backward-
secrecy. Performance evaluations for extensive simulations
demonstrate the efficiency and effectiveness of the proposed
DIKE scheme for low key update delay and fast key update
ratio.
In this paper, we achieve vehicle user’s privacy
Preservation and to improve the key update efficiency. In
this a Dynamic privacy-preserving Key management
scheme, called DIKE, for the LBSs in VANETs. With this
scheme, each user can use a pseudo-id to conceal its real
identity during a service session. First, introduce a privacy-
preserving authentication (PPA) mechanism, which can
derive from an efficient group Signature.
However, each vehicle user can hold multiple
pseudonyms; so cannot prevent a compromised but
unrevoked vehicle user to do double registration in the same
session. That’s why we divide a session into several time
slots, and each time slot can hold a different session key.
When no vehicle departs from the service session, each
joined user use forward-secrecy technique to autonomously
update new session key to reduce key update delay. To
achieve backward-secrecy, we integrate a novel dynamic
threshold technique in traditional V-2-V and V-2-I
communications.
C. The Sybil Attack
The Sybil attack was first introduced by Douceur in the
context of peer-to-peer networks. In this, we investigate the
Sybil attack, which is a harmful attack in sensor networks.
In Sybil attack, a malicious node behaves like it was a larger
number of nodes, like by impersonating other nodes or
simply by claiming false identities. We propose novel
techniques to defend against Sybil attack, and analyze their
effectiveness properly. In this paper, we examine how the
Sybil attack can used to attack several protocols in wireless
sensor network. So first consider attacks on distributed
storage an algorithm, similar to the Douceur describes in the
peer-to-peer environment.
To defend the Sybil attack, we can value that each
node identity is an identity presented by the corresponding
physical node. There are two types to validate an identity we
define the Sybil attack and establish taxonomy of that attack
by distinguishing different attack types. The definition and
taxonomy are important in understanding and analyzing the
threat that defenses of Sybil attack. We present several
novel methods by which a node can be verified whether
other identities are Sybil identities.
A Sybil attack is like computer hacker attack on a
peer-to-peer (P2P) network. It is named by the novel Sybil,
which recounts medical treatment of a woman with extreme
dissociative identity disorder. The attack target only
reputation system of the P2P program and also allows the
hacker to have an unfair advantage in influencing the
reputation and the score of files stored on the P2P network.
Several factors determine that how a Sybil attack can be
equally affects the reputation system and how easy it is to
make an entity; finally whether the program accepts non-
trusted entities and their input. Validating accounts can be
the best way for administrators to prevent these kinds of
attacks, but this sacrifices the anonymity of users.
III. PROPOSED SYSTEM
In the proposed system, we are requiring service providers
that will maintain the TSE by themselves. In this, we
consider the users that participate in the TSE in a
cooperative manner. So we are going to study possible
malicious behaviors that are conducted by the service
providers and users.
Due to the proposed system, there are advantages
that offer the user of the services, it identifies three unique
review attacks, i.e., review link ability attack, review
rejection attack, and review modification attack in the bTSE
each user should firstly register in the social network and
then they can use the services provided by the service
provider. Similarly each service provider should also
provide their credentials to register in a social network.
After using the services the user should also
provide reviews for every service. So that the users who
wanted to use that services should get the idea about that
service.
As the system is trustworthy so each service
provider and user should provide valid credentials. The
system uses the Ranking technique for making the ranking
easy. Using the TSE, service providers learn that the service
experiences of the users and that are able to improve their
service strategy in time. The collected reviews can then
make available to the public, which are enhances service
advertising and helpful the users in making wise service
selections. They are important tools for service providers
who target the global market. In this, we move the TSE into
the S-MSN settings. Each user should firstly register in the
social network and then they can use the services provided
by the service provider. Similarly each service provider
should also provide their credentials to register in a social
network. We develop security mechanisms for the TSE to
deal with the attacks that are arise during mobile social
network. The basic TSE (bTSE) is enables users to
distribute and cooperatively should submit their reviews in
an integrated chain form by using hierarchical and aggregate
signature techniques. It restricts the service providers to
reject, modify, or delete the reviews. Thus, the integrity and
authenticity of reviews are improved. Further, we extend the
bTSE to a Sybil-resisted TSE (SrTSE) to enable the
detection of two types of Sybil attacks. In the SrTSE, if a
user generates multiple reviews toward a vendor in a time
slot with different pseudonyms, the real identity of the user
will be revealed. Through security analysis and numerical
results, we show that the bTSE and the SrTSE effectively
resist the service review attacks and the SrTSE additionally
detects the Sybil attacks in an efficient manner.
Through performance evaluation, we show that the
bTSE achieves better performance in terms of submission
3. Trustworthy Service Enhancement in Mobile Social Network
(IJSRD/Vol. 2/Issue 08/2014/019)
All rights reserved by www.ijsrd.com 77
rate and delay than a service review system that does not
adopt user cooperation. First, users in a mobile social
network cannot have direct Access to service providers or
any third trusted authority to receive user feedback that is
service reviews or simply reviews, such as compliments and
complaints about their services or products.
IV. CONCLUSIONS
In this paper, we proposed a TSE system for S-MSNs. The
system uses hierarchical signature and aggregate signature
techniques to transform independent reviews into structured
review chains. This transformation includes distributed user
cooperation, which improves review integrity and
significantly reduces vendors’ modification capability. We
have presented three review attacks which shows that the
bTSE can effectively resist review attacks without relying
on a third trusted authority. Construction of pseudonyms and
the secret keys in the bTSE, and obtained a SrTSE system.
REFERENCES
[1] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure
Friend Discovery in Mobile Social Networks,” Proc.
IEEE INFOCOM, pp. 1647-1655, 2011.
[2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A
Secure and Efficient Service Review System for
Service-Oriented Mobile Social Networks,” Proc.
IEEE 32nd Int’l Conf. Distributed Computing
Systems (ICDCS), pp. 647-656, 2012.
[3] X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen,
“Morality- Driven Data Forwarding with Privacy
Preservation in Mobile Social Networks,” IEEE
Trans. Vehicular Technology, vol. 61, no. 7, pp.
3209-3222, Sept. 2012.
[4] T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai,
“VTube: Towards the Media Rich City Life with
Autonomous Vehicular Content Distribution,” Proc.
IEEE CS Eighth Ann. Conf. Sensor, Mesh and Ad
Hoc Comm. Networks (SECON), pp. 359-367, 2011.
[5] J.R. Douceur, “The Sybil Attack,” Proc. Revised
Papers First Int’l Workshop Peer-to-Peer Systems
(IPTPS), pp. 251-260, 2002.
[6] Newsome, E. Shi, D.X. Song, and A. Perrig, “The
Sybil Attack in Sensor Networks: Analysis &
Defenses,” Proc. Third Int’l Symp. Information
Processing in Sensor Networks (IPSN), pp. 259-268,
2004.
[7] Quercia and S. Hailes, “Sybil Attacks Against Mobile
Users: Friends and Foes to the Rescue,” Proc. IEEE
INFOCOM, pp. 336- 340, 2010.
[8] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic
Privacy- Preserving Key Management Scheme for
Location-Based Services in VANETs,” IEEE Trans.
Intelligent Transportation Systems, vol. 13, no. 1, pp.
127-139, Mar. 2012.
[9] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen,
“Pseudonym Changing at Social Spots: An Effective
Strategy for Location Privacy in VANETs,” IEEE
Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-
96, Jan. 2012.
[10] X. Boyen and B. Waters, “Full-Domain Subgroup
Hiding and Constant-Size Group Signatures,” Proc.
10th Int’l Conf. Practice and Theory Public Key
Cryptography, pp. 1-15, 2007.