首页 > 最新文献

2013 International Conference on Recent Trends in Information Technology (ICRTIT)最新文献

英文 中文
Efficient malicious detection for AODV in mobile ad-hoc network 移动ad-hoc网络中AODV的高效恶意检测
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844214
M. Amaresh, G. Usha
A Mobile Ad-hoc Network (MANET) is a self-organized system comprised of mobile wireless nodes. It does not have centralized administration. So MANETs in open environment, easily attacked by malicious nodes because any node can join at any time in the network. AODV is a most traditional routing protocol used for MANET, which selects the shortest path for routing and it affects the data communication if any malicious node present in the shortest path. Proposed model uses the combination of trust and energy value based routing protocol called Energy and Trust Based AODV routing protocol (ET-AODV) to establish a most trusted routes by providing modification to AODV protocol. In proposed technique each node estimates its neighbor's trust value and energy value that is one node has for another node during communication dynamically. Adding trust value and energy value new root value is calculated and maintained in every neighbor table. Using root value trusted routes are established by two methods that are single value routing and multiple value routing and isolate the malicious nodes from the network. This technique only considers the black hole attack which can easily interrupt the communication path. Experimental results shows that the ET-AODV routing protocol is able to achieve an improvement in packet delivery ratios rather than AODV.
移动自组织网络(MANET)是由移动无线节点组成的自组织系统。它没有集中管理。由于网络中任何节点都可以在任何时间加入,因此在开放环境下的manet很容易受到恶意节点的攻击。AODV是用于MANET的最传统的路由协议,它选择最短路径进行路由,如果最短路径上存在恶意节点,则会影响数据通信。该模型采用基于信任和能量值的路由协议组合,称为基于能量和信任的AODV路由协议(ET-AODV),通过对AODV协议进行修改,建立最可信的路由。在该技术中,每个节点在通信过程中动态估计其邻居的信任值和一个节点对另一个节点的能量值。增加信任值和能量值,计算并维护每个邻居表中的新根值。利用根值,通过单值路由和多值路由两种方式建立信任路由,将恶意节点与网络隔离开来。该技术只考虑了容易中断通信路径的黑洞攻击。实验结果表明,与AODV相比,ET-AODV路由协议能够实现更高的分组投递率。
{"title":"Efficient malicious detection for AODV in mobile ad-hoc network","authors":"M. Amaresh, G. Usha","doi":"10.1109/ICRTIT.2013.6844214","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844214","url":null,"abstract":"A Mobile Ad-hoc Network (MANET) is a self-organized system comprised of mobile wireless nodes. It does not have centralized administration. So MANETs in open environment, easily attacked by malicious nodes because any node can join at any time in the network. AODV is a most traditional routing protocol used for MANET, which selects the shortest path for routing and it affects the data communication if any malicious node present in the shortest path. Proposed model uses the combination of trust and energy value based routing protocol called Energy and Trust Based AODV routing protocol (ET-AODV) to establish a most trusted routes by providing modification to AODV protocol. In proposed technique each node estimates its neighbor's trust value and energy value that is one node has for another node during communication dynamically. Adding trust value and energy value new root value is calculated and maintained in every neighbor table. Using root value trusted routes are established by two methods that are single value routing and multiple value routing and isolate the malicious nodes from the network. This technique only considers the black hole attack which can easily interrupt the communication path. Experimental results shows that the ET-AODV routing protocol is able to achieve an improvement in packet delivery ratios rather than AODV.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126335174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GA based dynamic spectrum allocation in UHF-ISM band of 902–928MHz with RADAR as primary user for cognitive radio 基于遗传算法的902-928MHz UHF-ISM波段认知无线电动态频谱分配
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844202
G. Kalaichelvi, Dhananjay Kumar, Aarti Mandal, A. Karthikeyan
A novel integrated approach to Cognitive Radio environment with Radar signals of type linear frequency modulation (LFM) as Primary User (PU) is suggested in this paper. The approach consists of spectrum sensing of Radar signals through Wigner-Hough transformation process integrated with the learning and adaptation using Multi-Objective Genetic Algorithm (MOGA) for dynamic spectrum allocation. The objective of minimizing the interference in the presence of radar signal and maximizing the spectral efficiency when radar signal is not detected are considered. In addition, the objective of minimizing the power consumption is also considered. The functionality of the process considers the operation of NI-USRP® device as SU and radar as PU over ISM-UHF band of 902-928MHz for attaining the fitness's of the SU parameters as desired. For validation, existing method for co-existence of SU with radar is compared for data-rate with the proposed method.
提出了一种以线性调频雷达信号为主用户(PU)的认知无线电环境集成方法。该方法采用Wigner-Hough变换过程对雷达信号进行频谱感知,并结合多目标遗传算法(MOGA)进行动态频谱分配。考虑了在雷达信号存在时干扰最小和在未检测到雷达信号时频谱效率最大化的目标。此外,还考虑了最小化功耗的目标。该工艺的功能考虑了NI-USRP®设备作为SU和雷达作为PU在ISM-UHF 902-928MHz频段上的操作,以达到所需SU参数的适应度。为了验证现有的SU与雷达共存方法,将其数据速率与本文提出的方法进行了比较。
{"title":"GA based dynamic spectrum allocation in UHF-ISM band of 902–928MHz with RADAR as primary user for cognitive radio","authors":"G. Kalaichelvi, Dhananjay Kumar, Aarti Mandal, A. Karthikeyan","doi":"10.1109/ICRTIT.2013.6844202","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844202","url":null,"abstract":"A novel integrated approach to Cognitive Radio environment with Radar signals of type linear frequency modulation (LFM) as Primary User (PU) is suggested in this paper. The approach consists of spectrum sensing of Radar signals through Wigner-Hough transformation process integrated with the learning and adaptation using Multi-Objective Genetic Algorithm (MOGA) for dynamic spectrum allocation. The objective of minimizing the interference in the presence of radar signal and maximizing the spectral efficiency when radar signal is not detected are considered. In addition, the objective of minimizing the power consumption is also considered. The functionality of the process considers the operation of NI-USRP® device as SU and radar as PU over ISM-UHF band of 902-928MHz for attaining the fitness's of the SU parameters as desired. For validation, existing method for co-existence of SU with radar is compared for data-rate with the proposed method.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Video compression with an effective block matching algorithm and RDOT 视频压缩具有有效的块匹配算法和RDOT
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844206
Dhananjay Kumar, V. Subbulakshmi
The storage requirement for digital video is growing day-by-day due to increase in video quality. In order to reduce the file size while maintaining the required quality, a novel compression algorithm is needed. In this paper, an Adaptive Rood Pattern Search (ARPS) is used as the Motion Estimation (ME) and Motion Compensation (MC) technique and ARPS is integrated with the proposed Rate Distortion Optimized Transform (RDOT) to reduce the computational complexity without losing the quality of the video. In this ME technique, Mean Absolute Difference (MAD) is considered as the matching criteria. ARPS technique is compared with the Diamond Search (DS) and Three Step Search (TSS) algorithms and it outperforms with respect to execution time and PSNR. Finally the combination of ARPS with RDOT achieves a high compression ratio.
由于视频质量的提高,对数字视频的存储需求日益增长。为了在保持所需质量的同时减小文件大小,需要一种新的压缩算法。本文采用自适应道路模式搜索(ARPS)作为运动估计(ME)和运动补偿(MC)技术,并将ARPS与所提出的率失真优化变换(RDOT)相结合,在不损失视频质量的前提下降低了计算复杂度。在这种方法中,平均绝对差(MAD)被认为是匹配标准。将ARPS技术与钻石搜索(DS)和三步搜索(TSS)算法进行比较,在执行时间和PSNR方面都优于ARPS算法。最后,ARPS与RDOT的结合获得了较高的压缩比。
{"title":"Video compression with an effective block matching algorithm and RDOT","authors":"Dhananjay Kumar, V. Subbulakshmi","doi":"10.1109/ICRTIT.2013.6844206","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844206","url":null,"abstract":"The storage requirement for digital video is growing day-by-day due to increase in video quality. In order to reduce the file size while maintaining the required quality, a novel compression algorithm is needed. In this paper, an Adaptive Rood Pattern Search (ARPS) is used as the Motion Estimation (ME) and Motion Compensation (MC) technique and ARPS is integrated with the proposed Rate Distortion Optimized Transform (RDOT) to reduce the computational complexity without losing the quality of the video. In this ME technique, Mean Absolute Difference (MAD) is considered as the matching criteria. ARPS technique is compared with the Diamond Search (DS) and Three Step Search (TSS) algorithms and it outperforms with respect to execution time and PSNR. Finally the combination of ARPS with RDOT achieves a high compression ratio.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memory efficacious pattern matching intrusion detection system 内存高效模式匹配入侵检测系统
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844277
S. Dhivya, D. Dhakchianandan, A. Gowtham, P. Sujatha, A. Kannan
In today's web-enabled world, the communications happening over the network is intensifying at a capacious rate. Not all communications are credible and malpractice can arise anywhere, anytime. If the normal traffic is slightly modified to delude the intrusion detection system, then the traditional systems might not be able to discern the same effectively. Thus, a system that could detect and ferret out the novel attacks has been proposed. Since any number of users can use a web page, maintaining the availability of the resources and allocating them to the active users as per their need is very essential. The multi-thread concept is used to share the resources that each client can use. Attribute Selection Algorithm is used as the feature extraction algorithm in weka, to yield those relevant features pertaining to the user's request and helps in achieving a more accurate result. Memory efficiency is brought in with the cascading binary search tree. The patterns are efficiently stored and hence the search for the presence of an attack is accomplished effectively. An Intrusion Detection System which is memory efficient and effective enough in detecting attacks and reducing the false positives is thus proposed.
在当今网络化的世界中,通过网络进行的通信正在以惊人的速度加强。并非所有的沟通都是可信的,任何地方、任何时间都可能出现不当行为。如果对正常流量进行轻微的修改以欺骗入侵检测系统,那么传统系统可能无法有效识别。在此基础上,提出了一种新型攻击检测系统。由于任意数量的用户都可以使用一个网页,因此维护资源的可用性并根据他们的需要将它们分配给活动用户是非常必要的。多线程概念用于共享每个客户端可以使用的资源。属性选择算法(Attribute Selection Algorithm)是weka中的特征提取算法,用于生成与用户请求相关的特征,有助于获得更准确的结果。级联二叉搜索树提高了内存效率。有效地存储模式,从而有效地完成对攻击存在的搜索。在此基础上,提出了一种内存利用率高、检测攻击和降低误报率的入侵检测系统。
{"title":"Memory efficacious pattern matching intrusion detection system","authors":"S. Dhivya, D. Dhakchianandan, A. Gowtham, P. Sujatha, A. Kannan","doi":"10.1109/ICRTIT.2013.6844277","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844277","url":null,"abstract":"In today's web-enabled world, the communications happening over the network is intensifying at a capacious rate. Not all communications are credible and malpractice can arise anywhere, anytime. If the normal traffic is slightly modified to delude the intrusion detection system, then the traditional systems might not be able to discern the same effectively. Thus, a system that could detect and ferret out the novel attacks has been proposed. Since any number of users can use a web page, maintaining the availability of the resources and allocating them to the active users as per their need is very essential. The multi-thread concept is used to share the resources that each client can use. Attribute Selection Algorithm is used as the feature extraction algorithm in weka, to yield those relevant features pertaining to the user's request and helps in achieving a more accurate result. Memory efficiency is brought in with the cascading binary search tree. The patterns are efficiently stored and hence the search for the presence of an attack is accomplished effectively. An Intrusion Detection System which is memory efficient and effective enough in detecting attacks and reducing the false positives is thus proposed.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122474729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cross-layered implementation of multilayered coded video streaming 多层编码视频流的跨层实现
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844282
Dhananjay Kumar, S. Srinivas, P. Hariharan, R. A. Kumar
Video streaming over wireless network is challenging because of its quality of service (QOS) requirement. It needs to adapt with respect to the available bandwidth of network connection which is unpredictable in most occasions. In order to maintain a continuous flow of video without any disconnection or large buffering at the receiver, a new algorithm called the Multi-Layered Coding with Cross Layer Adaptation (MLC-CLA) algorithm is proposed. The input video is coded at different level stored at the sender constituting multilayer approach. The MLC-CLA judicially selects one of these layer based on the feedback from the receiver and stream them, thereby adapting to the changing environment of the network. The simulated result of the MLC-CLA algorithm shows a better Peak-Signal to Noise Ratio (PSNR) for a given sample video. We also compared the performance of the proposed algorithm with non-cross layer approach.
无线网络视频流由于其服务质量(QOS)的要求而具有挑战性。它需要根据网络连接的可用带宽进行调整,而网络连接的可用带宽在大多数情况下是不可预测的。为了保证视频流的连续性,避免接收端出现断线或大的缓冲,提出了一种多层交叉层自适应编码(MLC-CLA)算法。将输入视频按不同级别编码存储在发送端,构成多层方法。MLC-CLA根据接收端的反馈,从这些层中选择一个进行流式传输,从而适应不断变化的网络环境。仿真结果表明,对于给定的视频样本,MLC-CLA算法具有较好的峰值信噪比(PSNR)。我们还比较了该算法与非交叉层方法的性能。
{"title":"Cross-layered implementation of multilayered coded video streaming","authors":"Dhananjay Kumar, S. Srinivas, P. Hariharan, R. A. Kumar","doi":"10.1109/ICRTIT.2013.6844282","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844282","url":null,"abstract":"Video streaming over wireless network is challenging because of its quality of service (QOS) requirement. It needs to adapt with respect to the available bandwidth of network connection which is unpredictable in most occasions. In order to maintain a continuous flow of video without any disconnection or large buffering at the receiver, a new algorithm called the Multi-Layered Coding with Cross Layer Adaptation (MLC-CLA) algorithm is proposed. The input video is coded at different level stored at the sender constituting multilayer approach. The MLC-CLA judicially selects one of these layer based on the feedback from the receiver and stream them, thereby adapting to the changing environment of the network. The simulated result of the MLC-CLA algorithm shows a better Peak-Signal to Noise Ratio (PSNR) for a given sample video. We also compared the performance of the proposed algorithm with non-cross layer approach.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116626841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Latency aware scheduling policy for tasks in IaaS cloud IaaS云中的任务延迟感知调度策略
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844290
T. M. A. Teresa, Niyas Ibrahim, K. R. R. Babu
In Infrastructure as a Service cloud computational resources of different clouds within its federation can be used in the form of leases. This may result in tasks getting completed in other clouds that have more computational power or currently have free resources to service the request. In this paper a new task scheduling approach has been considered that not only considers the effective finish time of clouds as parameters similar to list scheduling, but also takes into account the latency of networks involved in the federation. This consideration is due to the fact that the estimated finish time may differ from actual finish time of tasks when there is a communication delay between clouds in the federation. When dependency among tasks are considered it becomes necessary that a dependent task can start execution only if its predecessors have completed. So if the predecessor task has been scheduled in a different cloud the calculation of estimated finish time with communication delay will help in finding the proper cloud to schedule the task. This would not be possible if the communication delay is not considered as a parameter in estimating the finish time of task. By this approach make-span time of an application which is a set of tasks can be considerably reduced. The experimental results show that the proposed method outperforms the existing list scheduling algorithm.
在基础设施即服务云中,可以以租赁的形式使用其联盟内不同云的计算资源。这可能导致任务在具有更多计算能力或当前有空闲资源来服务请求的其他云中完成。本文提出了一种新的任务调度方法,该方法不仅将云的有效完成时间作为类似于列表调度的参数,而且考虑了联合网络的延迟。这种考虑是由于这样一个事实,即当联合中的云之间存在通信延迟时,估计的完成时间可能与任务的实际完成时间不同。当考虑任务之间的依赖关系时,依赖任务必须只有在其前一个任务完成后才能开始执行。因此,如果先前的任务被安排在不同的云中,那么计算带有通信延迟的估计完成时间将有助于找到合适的云来安排任务。如果在估计任务完成时间时不把通信延迟作为一个参数来考虑,这是不可能的。通过这种方法,应用程序(一组任务)的make-span时间可以大大减少。实验结果表明,该方法优于现有的列表调度算法。
{"title":"Latency aware scheduling policy for tasks in IaaS cloud","authors":"T. M. A. Teresa, Niyas Ibrahim, K. R. R. Babu","doi":"10.1109/ICRTIT.2013.6844290","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844290","url":null,"abstract":"In Infrastructure as a Service cloud computational resources of different clouds within its federation can be used in the form of leases. This may result in tasks getting completed in other clouds that have more computational power or currently have free resources to service the request. In this paper a new task scheduling approach has been considered that not only considers the effective finish time of clouds as parameters similar to list scheduling, but also takes into account the latency of networks involved in the federation. This consideration is due to the fact that the estimated finish time may differ from actual finish time of tasks when there is a communication delay between clouds in the federation. When dependency among tasks are considered it becomes necessary that a dependent task can start execution only if its predecessors have completed. So if the predecessor task has been scheduled in a different cloud the calculation of estimated finish time with communication delay will help in finding the proper cloud to schedule the task. This would not be possible if the communication delay is not considered as a parameter in estimating the finish time of task. By this approach make-span time of an application which is a set of tasks can be considerably reduced. The experimental results show that the proposed method outperforms the existing list scheduling algorithm.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120962691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured data storage and error tolerant design in cloud computing 云计算中的安全数据存储和容错设计
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844220
M. Sumalatha, C. Selvakumar, G. Rathnam
Enormous amount of data are being stored and transferred between various heterogeneous databases across the globe. Data stored in the databases are vulnerable to threats and attacks. Data loss during transmission and corruption are also inevitable. In order to provide a sustainable storage environment handling such limitations, systems should be reliable and fault tolerant. In this research work, an innovative mechanism which provides secure data storage with recovery mechanisms during faults is developed. Distributed data storage security is rendered by data partitioning technique and the failed processes are handled by self diagnosis and recovery oriented computing provides error tolerance. The experimental analysis shows that this method gives improved security when compared with existing system.
大量的数据在全球不同的异构数据库之间存储和传输。存储在数据库中的数据容易受到威胁和攻击。传输过程中的数据丢失和损坏也是不可避免的。为了提供一个可持续的存储环境来处理这些限制,系统应该是可靠的和容错的。在本研究中,提出了一种具有故障恢复机制的数据安全存储机制。分布式数据存储安全性采用数据分区技术,故障处理采用自诊断处理,面向恢复的计算提供容错能力。实验分析表明,与现有系统相比,该方法具有更高的安全性。
{"title":"Secured data storage and error tolerant design in cloud computing","authors":"M. Sumalatha, C. Selvakumar, G. Rathnam","doi":"10.1109/ICRTIT.2013.6844220","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844220","url":null,"abstract":"Enormous amount of data are being stored and transferred between various heterogeneous databases across the globe. Data stored in the databases are vulnerable to threats and attacks. Data loss during transmission and corruption are also inevitable. In order to provide a sustainable storage environment handling such limitations, systems should be reliable and fault tolerant. In this research work, an innovative mechanism which provides secure data storage with recovery mechanisms during faults is developed. Distributed data storage security is rendered by data partitioning technique and the failed processes are handled by self diagnosis and recovery oriented computing provides error tolerance. The experimental analysis shows that this method gives improved security when compared with existing system.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121209823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualization of healthcare sensors in cloud 云中的医疗保健传感器虚拟化
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844279
M. Harini, K. Bhairavi, R. Gopicharan, K. Ganapathy, V. Vaidehi
Web enablement of sensors is found to improve healthcare applications. However usage of too many physical sensors are limiting the mobility of the patients and has serious drawbacks like huge power consumption, heavy weight, health hazards and high degree of discomfort. To overcome these problems, this paper proposed a virtual sensor that computes the blood pressure of patients using a limited number of physical sensors. The sensor data are ported to cloud for achieving scalability, elasticity, on-demand service provision and availability. The developed virtual sensor has shown an accuracy of about 95% when tested on patients with normal vital sign parameters.
发现传感器的Web启用可以改进医疗保健应用程序。然而,过多的物理传感器的使用限制了患者的活动能力,并且具有功耗大、重量大、危害健康和高度不适等严重缺点。为了克服这些问题,本文提出了一种虚拟传感器,使用有限数量的物理传感器计算患者的血压。传感器数据被移植到云端,以实现可伸缩性、弹性、按需服务提供和可用性。当对生命体征参数正常的患者进行测试时,开发的虚拟传感器显示出约95%的准确性。
{"title":"Virtualization of healthcare sensors in cloud","authors":"M. Harini, K. Bhairavi, R. Gopicharan, K. Ganapathy, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844279","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844279","url":null,"abstract":"Web enablement of sensors is found to improve healthcare applications. However usage of too many physical sensors are limiting the mobility of the patients and has serious drawbacks like huge power consumption, heavy weight, health hazards and high degree of discomfort. To overcome these problems, this paper proposed a virtual sensor that computes the blood pressure of patients using a limited number of physical sensors. The sensor data are ported to cloud for achieving scalability, elasticity, on-demand service provision and availability. The developed virtual sensor has shown an accuracy of about 95% when tested on patients with normal vital sign parameters.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121359626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EPSSHIC-enabling privacy and security of smart health care system in cloud epsshic实现云端智能医疗系统的隐私和安全
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844184
S. R. Satheesh, D. Sangeetha, V. Vaidehi
Cloud computing is a key computing platform for sharing resources that includes IaaS, Saas, PaaS and business process. This provides many benefits for the users to create and store health care data on the cloud thereby utilizing fewer resources in the client system. The proposed system mainly focuses on health care data security. To reduce the increase in cost of hospitalization, researchers are building Smart Health care environment where medical data are continuously monitored by health experts. Some of the major imports that still need to be discussed before these devices get a wide acceptance include the security and privacy of medical data collected by these devices. Enhanced RSA is a technique which uses random integer as an additional technique in traditional RSA. Enhanced RSA based storage security method uses encryption and decryption technique of the remote data by improving existing RSA based encryption and decryption. The encrypted data will be stored in the cloud using provable data possession scheme. To improve the privacy and security, the primal based privacy technique is used in securing the health care data. The proposed technique provides better security. Using this proposed method, the correctness of health care data is assured and identification of file block existence in the cloud is performed. This method also supports insertion, modification and deletion of the data and tries to reduce the calculation time of the server. The attacks are made with encrypted data and the results shows that the proposed scheme outperforms with improved security in data storage when compared to the existing methods.
云计算是资源共享的关键计算平台,包括IaaS、Saas、PaaS和业务流程。这为用户在云中创建和存储医疗保健数据提供了许多好处,从而减少了客户端系统中的资源。该系统主要关注医疗数据安全。为了减少住院费用的增加,研究人员正在构建智能医疗环境,由健康专家持续监控医疗数据。在这些设备得到广泛接受之前,仍需要讨论的一些主要问题包括这些设备收集的医疗数据的安全性和隐私性。增强型RSA是在传统RSA基础上增加随机整数的一种技术。增强的基于RSA的存储安全方法是对现有的基于RSA的加解密技术进行改进,采用对远程数据进行加解密的技术。加密后的数据将使用可证明的数据占有方案存储在云中。为了提高医疗数据的隐私性和安全性,采用基于原始的隐私技术对医疗数据进行保护。所提出的技术提供了更好的安全性。使用该方法,可以保证医疗保健数据的正确性,并对云中存在的文件块进行识别。该方法还支持数据的插入、修改和删除,并尽量减少服务器的计算时间。对加密的数据进行攻击,结果表明,与现有方法相比,该方案在数据存储方面具有更高的安全性。
{"title":"EPSSHIC-enabling privacy and security of smart health care system in cloud","authors":"S. R. Satheesh, D. Sangeetha, V. Vaidehi","doi":"10.1109/ICRTIT.2013.6844184","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844184","url":null,"abstract":"Cloud computing is a key computing platform for sharing resources that includes IaaS, Saas, PaaS and business process. This provides many benefits for the users to create and store health care data on the cloud thereby utilizing fewer resources in the client system. The proposed system mainly focuses on health care data security. To reduce the increase in cost of hospitalization, researchers are building Smart Health care environment where medical data are continuously monitored by health experts. Some of the major imports that still need to be discussed before these devices get a wide acceptance include the security and privacy of medical data collected by these devices. Enhanced RSA is a technique which uses random integer as an additional technique in traditional RSA. Enhanced RSA based storage security method uses encryption and decryption technique of the remote data by improving existing RSA based encryption and decryption. The encrypted data will be stored in the cloud using provable data possession scheme. To improve the privacy and security, the primal based privacy technique is used in securing the health care data. The proposed technique provides better security. Using this proposed method, the correctness of health care data is assured and identification of file block existence in the cloud is performed. This method also supports insertion, modification and deletion of the data and tries to reduce the calculation time of the server. The attacks are made with encrypted data and the results shows that the proposed scheme outperforms with improved security in data storage when compared to the existing methods.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure AODV to combat black hole attack in MANET 锁定AODV以对抗黑洞攻击
Pub Date : 2013-07-25 DOI: 10.1109/ICRTIT.2013.6844245
S. S. Narayanan, S. Radhakrishnan
A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network without relying on any standard network infrastructure. Most of the routing protocols for MANETs were developed without any security measures and are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing protocol. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. In this paper, a defense mechanism is presented against these black hole attacks in a MANET. This method makes use of the MAC address of the destination to validate each node in its path thereby providing a direct negotiation for secure route. The simulation is carried out on the proposed scheme to demonstrate the effectiveness of the mechanism in mitigation of the attack while maintaining a reasonable level of throughput, packet delivery ratio and end to end delay in the network.
移动自组织网络(MANET)是一个自治节点的集合,这些节点通过形成一个多跳无线网络相互通信,而不依赖于任何标准的网络基础设施。大多数用于manet的路由协议在开发时没有任何安全措施,因此容易受到各种类型的攻击。自组织按需距离矢量路由(AODV)是一种非常流行的路由协议。然而,它很容易受到众所周知的黑洞攻击,即恶意节点在路由发现过程中错误地向目标节点发布良好路径。本文提出了一种针对无线局域网中黑洞攻击的防御机制。该方法利用目的地的MAC地址验证其路径上的每个节点,从而为安全路由提供直接协商。仿真结果表明,该机制在保持网络中合理的吞吐量、数据包传送率和端到端延迟水平的同时,能够有效地缓解攻击。
{"title":"Secure AODV to combat black hole attack in MANET","authors":"S. S. Narayanan, S. Radhakrishnan","doi":"10.1109/ICRTIT.2013.6844245","DOIUrl":"https://doi.org/10.1109/ICRTIT.2013.6844245","url":null,"abstract":"A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network without relying on any standard network infrastructure. Most of the routing protocols for MANETs were developed without any security measures and are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing protocol. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. In this paper, a defense mechanism is presented against these black hole attacks in a MANET. This method makes use of the MAC address of the destination to validate each node in its path thereby providing a direct negotiation for secure route. The simulation is carried out on the proposed scheme to demonstrate the effectiveness of the mechanism in mitigation of the attack while maintaining a reasonable level of throughput, packet delivery ratio and end to end delay in the network.","PeriodicalId":113531,"journal":{"name":"2013 International Conference on Recent Trends in Information Technology (ICRTIT)","volume":"17 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113963176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2013 International Conference on Recent Trends in Information Technology (ICRTIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1