Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034011
I. Anand, A. Kamaraj
The circuits like Logic gates, Adders, Multipliers are the basic building block of the digital circuits. These combinational circuits can be designed by using the concepts of the reversible logic. The reversible logic is either a physically reversible or logically reversible. In this paper the combinational circuits are logically reversible. One of the applications of the reversible logic is Quantum Cellular Automata (QCA). QCA has attracted feature of extremely small feature size (at the molecular or even atomic scale) and its ultra-low power consumption, making it one candidate for replacing CMOS technology. Thus the design and realization of the Basic Logic gates and Combinational circuits like ripple carry adder, serial adder, multiplexer are done by using the concept of Quantum Cellular Automata. Also, the area and cost of the QCA system is reduced with the help of Coplanar architecture arrangement of cells. The paper is organized as follows; the section one gives the overall introduction about QCA, Clocking of QCA and Wires in QCA. Section two gives information about the basic logic gates. In Section three, design and Simulation of Combinational circuits like half adder, full adder, ripple carry adders and multipliers are discussed. At last the Comparison of Quantum cost of the above designs due to Coplanar architecture was elaborated.
{"title":"Design of combinational logic circuits for low power reversible logic circuits in quantum cellular automata","authors":"I. Anand, A. Kamaraj","doi":"10.1109/ICICES.2014.7034011","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034011","url":null,"abstract":"The circuits like Logic gates, Adders, Multipliers are the basic building block of the digital circuits. These combinational circuits can be designed by using the concepts of the reversible logic. The reversible logic is either a physically reversible or logically reversible. In this paper the combinational circuits are logically reversible. One of the applications of the reversible logic is Quantum Cellular Automata (QCA). QCA has attracted feature of extremely small feature size (at the molecular or even atomic scale) and its ultra-low power consumption, making it one candidate for replacing CMOS technology. Thus the design and realization of the Basic Logic gates and Combinational circuits like ripple carry adder, serial adder, multiplexer are done by using the concept of Quantum Cellular Automata. Also, the area and cost of the QCA system is reduced with the help of Coplanar architecture arrangement of cells. The paper is organized as follows; the section one gives the overall introduction about QCA, Clocking of QCA and Wires in QCA. Section two gives information about the basic logic gates. In Section three, design and Simulation of Combinational circuits like half adder, full adder, ripple carry adders and multipliers are discussed. At last the Comparison of Quantum cost of the above designs due to Coplanar architecture was elaborated.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"51 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88660531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034181
B. Pavithra, A. Asha
Wireless Sensor Networks consists of multi detection stations called sensor nodes, which are small, less weight and portable. They are spatially dispersed for monitoring the environmental conditions and to coordinate the activities systematically. Energy limitation is the fundamental drawback in network lifetime. Here, we propose two routing approaches for transmission of data packets in wireless sensor networks. The data packets are routed either through the established route with the help of relay nodes which act as an intermediate nodes or routed through high energy based clusters to reach the destination. Our work includes fault node recovery mechanisms under both the scenarios. The results obtained with the help of NS-2 simulation software concludes that High energy clusters based routing approach outperforms Relay nodes based routing by taking delivery rate, delay and overhead as parameter metrics into consideration.
{"title":"An optimized routing approach in wireless sensor networks","authors":"B. Pavithra, A. Asha","doi":"10.1109/ICICES.2014.7034181","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034181","url":null,"abstract":"Wireless Sensor Networks consists of multi detection stations called sensor nodes, which are small, less weight and portable. They are spatially dispersed for monitoring the environmental conditions and to coordinate the activities systematically. Energy limitation is the fundamental drawback in network lifetime. Here, we propose two routing approaches for transmission of data packets in wireless sensor networks. The data packets are routed either through the established route with the help of relay nodes which act as an intermediate nodes or routed through high energy based clusters to reach the destination. Our work includes fault node recovery mechanisms under both the scenarios. The results obtained with the help of NS-2 simulation software concludes that High energy clusters based routing approach outperforms Relay nodes based routing by taking delivery rate, delay and overhead as parameter metrics into consideration.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"13 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76004324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034007
H. Suryavanshi, Amit Mishra, S. Sahu, M. Mali
In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second one acts as fragile watermark. As it is blind watermarking technique, there is no need of original image at the time of watermark extraction. The insertion of watermark is based on selection of suitable coefficients which are obtained after applying two-level wavelet decomposition. The result produced by this watermarking scheme is good as compared to conventional watermarking techniques.
{"title":"Wavelet-based watermarking for copy rights protection","authors":"H. Suryavanshi, Amit Mishra, S. Sahu, M. Mali","doi":"10.1109/ICICES.2014.7034007","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034007","url":null,"abstract":"In this paper, a wavelet based scheme for digital image watermarking is presented. This proposed scheme inserts two watermarks in an image which serves two different purposes. The first one is inserted using blind watermarking technique while second one acts as fragile watermark. As it is blind watermarking technique, there is no need of original image at the time of watermark extraction. The insertion of watermark is based on selection of suitable coefficients which are obtained after applying two-level wavelet decomposition. The result produced by this watermarking scheme is good as compared to conventional watermarking techniques.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"142 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78611386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033927
V. Sundarameena, D. Priyatharisini
Underwater wireless sensor network (UWSN) is an important emerging research area in wide range of application, unlike the terrestrial network it uses the acoustic signal which has a unique characteristics like limited bandwidth, high and variable propagation delay, transmit energy, minimum network lifetime and so on. This paper proposes an efficient clustering algorithm having 3D-GRID network architecture and it uses limited control information for data gathering to improve the energy efficiency of the network. The GRID clustering method supports 3D deployment based on geographical location of the sensors which has cluster heads (CH) and non cluster heads (NCH). All the cluster heads are present in the center of the network and all the non-cluster head nodes are in minimum distance to the cluster head. This network structure helps to avoid the control packets for intra communication. For inter communication the CH data packet contains the control packet for route establishment and data transmission. Thus this technique reduce the usage of energy while communication and improve the lifetime of the network.
{"title":"Acquaint based grid clustering algorithm for Underwater wireless sensor network","authors":"V. Sundarameena, D. Priyatharisini","doi":"10.1109/ICICES.2014.7033927","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033927","url":null,"abstract":"Underwater wireless sensor network (UWSN) is an important emerging research area in wide range of application, unlike the terrestrial network it uses the acoustic signal which has a unique characteristics like limited bandwidth, high and variable propagation delay, transmit energy, minimum network lifetime and so on. This paper proposes an efficient clustering algorithm having 3D-GRID network architecture and it uses limited control information for data gathering to improve the energy efficiency of the network. The GRID clustering method supports 3D deployment based on geographical location of the sensors which has cluster heads (CH) and non cluster heads (NCH). All the cluster heads are present in the center of the network and all the non-cluster head nodes are in minimum distance to the cluster head. This network structure helps to avoid the control packets for intra communication. For inter communication the CH data packet contains the control packet for route establishment and data transmission. Thus this technique reduce the usage of energy while communication and improve the lifetime of the network.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"91 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76519906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033885
K. Priya, S. Dhanalakshmi
The supervised web-scale forum crawler is to crawl relevant forum content from the web with minimum overhead. Forum threads contain information content that is the target of forum crawlers, each forums have different layouts or styles and have different forum software packages, they always have similar constant navigation paths connected by specific URL types to direct users from entry pages to thread page, we reduce the web forum crawling problem to a URL-type recognition problem. And shows how to learn accurate and effective regular expression patterns of constant navigation paths from automatically created training sets using aggregated results from weak page type classifiers. Robust page type classifiers can be experienced from as few as five annotated forums and applied to a large set of unseen forums. The results show that Focus achieved over 98 percent effectiveness and 97 percent coverage on a large set of test forums powered by over 150 different forum software packages., The results of applying Focus on more than 100 community, the concept of constant navigation path could apply to other social media site.
{"title":"Crawling the page flipping links","authors":"K. Priya, S. Dhanalakshmi","doi":"10.1109/ICICES.2014.7033885","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033885","url":null,"abstract":"The supervised web-scale forum crawler is to crawl relevant forum content from the web with minimum overhead. Forum threads contain information content that is the target of forum crawlers, each forums have different layouts or styles and have different forum software packages, they always have similar constant navigation paths connected by specific URL types to direct users from entry pages to thread page, we reduce the web forum crawling problem to a URL-type recognition problem. And shows how to learn accurate and effective regular expression patterns of constant navigation paths from automatically created training sets using aggregated results from weak page type classifiers. Robust page type classifiers can be experienced from as few as five annotated forums and applied to a large set of unseen forums. The results show that Focus achieved over 98 percent effectiveness and 97 percent coverage on a large set of test forums powered by over 150 different forum software packages., The results of applying Focus on more than 100 community, the concept of constant navigation path could apply to other social media site.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81254181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033921
R. Sarayu, N. Krishnamoorthy
Grid computing is the form of distributed computing and coordinated resource sharing and problem solving in dynamic virtual organizations. Due to highly dynamic feature dependable workflow scheduling is critical in grid environment. Various scheduling algorithms are posed but hardly consider resource reliability. Current systems mainly consider fault tolerance but resources are not fully utilized. This paper proposes a dependable workflow scheduling system(DGWS) which is based on Markov chain process which increases reliability of workflow scheduling algorithm. The performance evaluation results decreases the length of schedule in workflow and increases the dependability of workflow execution using Fault tolerance technology checkpoint.
{"title":"Enhancing workflow scheduling through promoting resource reliability and fault tolerance in grid environment","authors":"R. Sarayu, N. Krishnamoorthy","doi":"10.1109/ICICES.2014.7033921","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033921","url":null,"abstract":"Grid computing is the form of distributed computing and coordinated resource sharing and problem solving in dynamic virtual organizations. Due to highly dynamic feature dependable workflow scheduling is critical in grid environment. Various scheduling algorithms are posed but hardly consider resource reliability. Current systems mainly consider fault tolerance but resources are not fully utilized. This paper proposes a dependable workflow scheduling system(DGWS) which is based on Markov chain process which increases reliability of workflow scheduling algorithm. The performance evaluation results decreases the length of schedule in workflow and increases the dependability of workflow execution using Fault tolerance technology checkpoint.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"45 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81283217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033801
R. Abirami, G. Premalatha
A wireless sensor network is a group of network nodes which collaborate with each other in a sophisticated fashion. It is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. In WSN, Second layer of the OSI reference layer is a data link layer which has a sub layer of Medium Access Control. The choice of Medium Access Control (MAC) protocol has a direct bearing on the reliability and efficiency of network transmissions due to errors and interferences in wireless communications and to other challenges. They are primarily responsible for regulating access to the shared medium. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is vampire attacks which cause damage in network. Secure level is low; productivity reduces which leads to environmental disasters and cause loss in the information. Routing protocols play an important role in modern wireless communication networks. Hence propose Interior Gateway Routing Protocol (IGRP) where router used it to exchange routing data within an independent system. In WSN routing protocols find the route between nodes and ensure the consistent communication between the nodes in the network.
{"title":"Depletion of vampire attacks in medium access control level using interior gateway routing protocol","authors":"R. Abirami, G. Premalatha","doi":"10.1109/ICICES.2014.7033801","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033801","url":null,"abstract":"A wireless sensor network is a group of network nodes which collaborate with each other in a sophisticated fashion. It is built of nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. In WSN, Second layer of the OSI reference layer is a data link layer which has a sub layer of Medium Access Control. The choice of Medium Access Control (MAC) protocol has a direct bearing on the reliability and efficiency of network transmissions due to errors and interferences in wireless communications and to other challenges. They are primarily responsible for regulating access to the shared medium. There are a lot of protocols developed to protect from DOS attack, but it is not completely possible. One such DOS attack is vampire attacks which cause damage in network. Secure level is low; productivity reduces which leads to environmental disasters and cause loss in the information. Routing protocols play an important role in modern wireless communication networks. Hence propose Interior Gateway Routing Protocol (IGRP) where router used it to exchange routing data within an independent system. In WSN routing protocols find the route between nodes and ensure the consistent communication between the nodes in the network.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"5 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83862451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033942
J. Christi, K. Premkumar
With the rapid growth of web services, maintaining QOS in providing the services is an important issue. QOS faces various factors like scalability, response time, service selection, quality control and so on. In this service selection and predicting for the best service is a challenge over the World Wide Web. Many approaches have been used to perform this task and the current approaches fail to consider the QOS variance according to user's location and lacks in transparency. So a novel collaborative filtering algorithm is designed for large-scale web service recommendations. For better understanding a recommendation visualization technique is used to show how the services are grouped based on user's choices.
{"title":"Survey on recommendation and visualization techniques for QOS-aware web services","authors":"J. Christi, K. Premkumar","doi":"10.1109/ICICES.2014.7033942","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033942","url":null,"abstract":"With the rapid growth of web services, maintaining QOS in providing the services is an important issue. QOS faces various factors like scalability, response time, service selection, quality control and so on. In this service selection and predicting for the best service is a challenge over the World Wide Web. Many approaches have been used to perform this task and the current approaches fail to consider the QOS variance according to user's location and lacks in transparency. So a novel collaborative filtering algorithm is designed for large-scale web service recommendations. For better understanding a recommendation visualization technique is used to show how the services are grouped based on user's choices.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79914893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7034004
T. Gayathri, K. Bavithra
Orthogonal frequency division multiplexing (OFDM) is a modulation technique that is suitable for high data rate communication. But the main drawback of OFDM is its high peak to average power ratio (PAPR), which can lead to nonlinear distortions in the power amplifiers at the transmitter side. Selected mapping (SLM) based schemes effectively reduce the PAPR of OFDM system. However they require side information (SI) transmission, which suffers a loss in the data throughput in addition to the increased system complexity. A novel SI detection method enabling low complexity data decoding is proposed. Simulation results of this proposed SI detection method shows the bit error rate performance comparable to that of the simplified maximum likelihood data decoding scheme while the computational complexity is close to that of the embedded SI based data decoding scheme.
{"title":"Peak to average power ratio reduction of OFDM system","authors":"T. Gayathri, K. Bavithra","doi":"10.1109/ICICES.2014.7034004","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034004","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a modulation technique that is suitable for high data rate communication. But the main drawback of OFDM is its high peak to average power ratio (PAPR), which can lead to nonlinear distortions in the power amplifiers at the transmitter side. Selected mapping (SLM) based schemes effectively reduce the PAPR of OFDM system. However they require side information (SI) transmission, which suffers a loss in the data throughput in addition to the increased system complexity. A novel SI detection method enabling low complexity data decoding is proposed. Simulation results of this proposed SI detection method shows the bit error rate performance comparable to that of the simplified maximum likelihood data decoding scheme while the computational complexity is close to that of the embedded SI based data decoding scheme.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"54 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88419990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-01DOI: 10.1109/ICICES.2014.7033828
K. Geetha, N. Sreenath
This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victim's resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.
本文分析了移动自组网中的一种拒绝服务攻击——SYN泛洪攻击及其对服务参数质量的影响。拒绝服务攻击通常会夺走节点的资源和服务,并拒绝进一步的合法服务。SYN泛洪攻击是指攻击节点向一个节点发送大量带有欺骗源地址的TCP (Transmission Control Protocol) SYN请求。每个请求都使目标节点在可用性之外分配其资源。由于TCP连接是在三次握手之后建立的,因此目的地址向被欺骗的地址发送确认,并等待来自源的第三条消息。但是,源地址是一个欺骗地址,它不会响应一个确认。同时,攻击者发送大量SYN请求。所有受害者的资源被耗尽,因此不能考虑进一步的连接请求,拒绝合法的访问。本文假设从源端到目的端发送的数据为多媒体数据,并在客户端和服务器端之间进行通信。本文对SYN泛洪攻击进行了详细的分析,分析了受SYN泛洪攻击影响的各种参数。检查识别SYN flood攻击的必要条件,即客户端收到的SYN确认数与服务器发送的SYN确认数的比值。使用的协议是选择性的主动路由协议和被动路由协议。这种攻击会影响业务质量参数,如数据包发送比、平均端到端延迟、吞吐量和抖动。
{"title":"SYN flooding attack — Identification and analysis","authors":"K. Geetha, N. Sreenath","doi":"10.1109/ICICES.2014.7033828","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033828","url":null,"abstract":"This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victim's resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"16 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88762708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}