Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703325
Pallvi Grover, R. Singh
Cancer is considered as one of the most widely spread disease in today’s world. Many people are suffering from this disease unaware of the facts about cancer. Women are more likely to suffer from breast cancer. Cancer spread in the body when the healthy cells grow out of control and form a mass of cells resulting in tumor. This paper describes an algorithm for automated detection of breast cancer metastases in Whole Slide Images. The current procedure for detecting metastases in a breast lymph node is manual and time-consuming in which an experienced pathologist specializing in detection and characterization of tumor regions spends hours to analyze histological slides. This algorithm leverages the capability of advanced Image Processing and Machine learning to improve the detection accuracy as well as overall time needed to localize tumorous regions in Whole Slide Image.
{"title":"Automated Detection of Breast Cancer Metastases in Whole Slide Images","authors":"Pallvi Grover, R. Singh","doi":"10.1109/ICSCCC.2018.8703325","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703325","url":null,"abstract":"Cancer is considered as one of the most widely spread disease in today’s world. Many people are suffering from this disease unaware of the facts about cancer. Women are more likely to suffer from breast cancer. Cancer spread in the body when the healthy cells grow out of control and form a mass of cells resulting in tumor. This paper describes an algorithm for automated detection of breast cancer metastases in Whole Slide Images. The current procedure for detecting metastases in a breast lymph node is manual and time-consuming in which an experienced pathologist specializing in detection and characterization of tumor regions spends hours to analyze histological slides. This algorithm leverages the capability of advanced Image Processing and Machine learning to improve the detection accuracy as well as overall time needed to localize tumorous regions in Whole Slide Image.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124776541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703308
Sandeep Verma, Satnam Kaur, Gaurav Dhiman, A. Kaur
With the advancements of the wireless sensing technology, the Wireless Nanosensors Networks (WNSNs) have revolutionized every sector which demands to monitor at the nano-scale level. WNSNs comprises of nanosensors that are acquainted with Nanotransceiver and nanoantenna operating at Terahertz frequency band (0.1-10THz). So far, researchers have focused on energy efficiency in WSNs but the energy issue in WNSNs have not been addressed significantly in the existing literature. In this paper, we have addressed the concern of energy efficiency in WNSNs by proposing the energy balanced clustering in the routing mechanism of WNSNs. The simulation analysis is performed in MATLAB Software to empirically investigate the performance of proposed energy balanced clustering incorporating the appropriate Cluster Head (CH) selection. It is found that the proposed routing framework outperforms the state-of-art routing mechanisms in terms of energy consumption and delay. The proposed scheme is highly triggering for various nanoscale applications.
{"title":"Design of a novel energy efficient routing framework for Wireless Nanosensor Networks","authors":"Sandeep Verma, Satnam Kaur, Gaurav Dhiman, A. Kaur","doi":"10.1109/ICSCCC.2018.8703308","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703308","url":null,"abstract":"With the advancements of the wireless sensing technology, the Wireless Nanosensors Networks (WNSNs) have revolutionized every sector which demands to monitor at the nano-scale level. WNSNs comprises of nanosensors that are acquainted with Nanotransceiver and nanoantenna operating at Terahertz frequency band (0.1-10THz). So far, researchers have focused on energy efficiency in WSNs but the energy issue in WNSNs have not been addressed significantly in the existing literature. In this paper, we have addressed the concern of energy efficiency in WNSNs by proposing the energy balanced clustering in the routing mechanism of WNSNs. The simulation analysis is performed in MATLAB Software to empirically investigate the performance of proposed energy balanced clustering incorporating the appropriate Cluster Head (CH) selection. It is found that the proposed routing framework outperforms the state-of-art routing mechanisms in terms of energy consumption and delay. The proposed scheme is highly triggering for various nanoscale applications.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129961758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703304
Saloni, D. Kakkar
Wireless Sensor Networks (WSNs) is developing as a noteworthy innovation due to its various applications. WSNs comprise many Sensor Nodes (SN) to accumulate the data from physical environment. Every SN is powered by a battery and has both computing and communication capabilities. Because of limited resources, mainly insufficient battery power, there is a need to save the energy for prolonging network’s lifetime. Clustering of SN is among the efficacious techniques that are used to overcome the energy consumption problem in WSNs. In the work proposed here, an optimized dual-hop routing protocol with grid clustering mechanism is presented. This is done by dividing the network field into uniform size grids where every grid is considered as a cluster. From each grid, a Grid Head (GH) is being selected depending upon the residual energy of the SNs. The selection of next-hop for dual-hop communication is based on finding out the optimal node among the neighboring GHs using Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. MATLAB is used to perform the simulations. The evaluation of performance of the proposed work is made in terms of energy consumption, lifetime and stability period of the network.
无线传感器网络(WSNs)由于其广泛的应用而成为一项值得关注的创新。无线传感器网络由多个传感器节点(Sensor node, SN)组成,用于从物理环境中积累数据。每个SN由电池供电,具有计算和通信能力。由于资源有限,主要是电池电量不足,因此需要节约能源来延长网络的使用寿命。无线传感器网络的聚类是克服无线传感器网络能耗问题的有效技术之一。本文提出了一种优化的带有网格聚类机制的双跳路由协议。这是通过将网络字段划分为统一大小的网格来实现的,其中每个网格都被视为一个集群。从每个网格中,根据SNs的剩余能量选择网格头(GH)。双跳通信的下一跳选择是基于使用TOPSIS (Order Preference Technique by Similarity to Ideal Solution)方法在相邻GHs中找到最优节点。利用MATLAB进行仿真。从电网的能耗、寿命和稳定周期三个方面对所提工作的性能进行了评价。
{"title":"TOPSIS optimized Dual-Hop Routing Protocol for Homogeneous Wireless Sensor Networks with Grid-Based Clustering","authors":"Saloni, D. Kakkar","doi":"10.1109/ICSCCC.2018.8703304","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703304","url":null,"abstract":"Wireless Sensor Networks (WSNs) is developing as a noteworthy innovation due to its various applications. WSNs comprise many Sensor Nodes (SN) to accumulate the data from physical environment. Every SN is powered by a battery and has both computing and communication capabilities. Because of limited resources, mainly insufficient battery power, there is a need to save the energy for prolonging network’s lifetime. Clustering of SN is among the efficacious techniques that are used to overcome the energy consumption problem in WSNs. In the work proposed here, an optimized dual-hop routing protocol with grid clustering mechanism is presented. This is done by dividing the network field into uniform size grids where every grid is considered as a cluster. From each grid, a Grid Head (GH) is being selected depending upon the residual energy of the SNs. The selection of next-hop for dual-hop communication is based on finding out the optimal node among the neighboring GHs using Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method. MATLAB is used to perform the simulations. The evaluation of performance of the proposed work is made in terms of energy consumption, lifetime and stability period of the network.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703335
A. Dhingra, M. Sachdeva
Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.
{"title":"DDoS detection and discrimination from flash events: a compendious review","authors":"A. Dhingra, M. Sachdeva","doi":"10.1109/ICSCCC.2018.8703335","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703335","url":null,"abstract":"Although there has been an immense advancement in the robustness of IT infrastructure, the organizations still face downtimes, lasting for short periods and even continuing for days. This could be due to malicious requests, deliberately sent to disrupt the services or the volume of legitimate users trying to access the website. Detection of these network traffic anomalies and then categorizing them as DDoS Attack or Flash event, is a challenging task in the front of network security researchers. This paper reviews and summarizes the details and scenarios of these anomalies. It highlights the various features, parameters and metrics used in research till date to detect these anomalies and distinguish the legitimate request from the malicious one. The intent of paper is to guide researchers in selecting efficient parameters in order to obtain accurate results with low false positives. It highlights the list of characteristics to discriminate the two traffic patterns has been proposed for better understanding of the problem. Thus, the paper is expected to help academicians and researchers find effective solution for the above-mentioned anomalous behavior of the network traffic.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127544557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703277
Sandeep Kaur, A. Kushwaha
Now a day’s, digital pictures and video (recordings) hold high signiflcance since they have turned into the fundamental wellspring of data. With video and picture altering tools made it simple to altering of media content The prerequisite of validating the honesty of contents of digital videos ranges from a person to associations, barrier and security setups to law authorization organizations. So, there is need of researching viable video forgery detection procedures. In this paper, there is an outline of forgery detection techniques that have been proposed in the literatura and also there is a comparative studies of surveyed techniques and goes for featuring the difficulties and brings out opportunities in the field of forgery detection.
{"title":"A Comparative study of various Video Tampering detection methods","authors":"Sandeep Kaur, A. Kushwaha","doi":"10.1109/ICSCCC.2018.8703277","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703277","url":null,"abstract":"Now a day’s, digital pictures and video (recordings) hold high signiflcance since they have turned into the fundamental wellspring of data. With video and picture altering tools made it simple to altering of media content The prerequisite of validating the honesty of contents of digital videos ranges from a person to associations, barrier and security setups to law authorization organizations. So, there is need of researching viable video forgery detection procedures. In this paper, there is an outline of forgery detection techniques that have been proposed in the literatura and also there is a comparative studies of surveyed techniques and goes for featuring the difficulties and brings out opportunities in the field of forgery detection.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114720975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703330
M. Ghute, K. Kamble, M. Korde
The system proposed in this paper consists of a single unit, which will monitor the environment in various hazardous conditions and provide live video feedback. Basics of robotics like sensors and actuators, gives an overview on robotic construction. The proposed system is also able to capture real-time videos which are useful for surveillance for a specific person or area. Controlling of Robot is done using a Raspberry Pi3 processor. This robot is more comfortable for military applications such as surveillance of interested area. It will provide tactical advantage during hostage situations or in hostile grounds. It is capable of walking on any surface and providing monitoring over an area. With the help of high quality video transmission the surveillance become more effective. Video quality is improvised in the proposed system. These will prove important in applications like robots for civil use and military robots.
{"title":"Design of Military Surveillance Robot","authors":"M. Ghute, K. Kamble, M. Korde","doi":"10.1109/ICSCCC.2018.8703330","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703330","url":null,"abstract":"The system proposed in this paper consists of a single unit, which will monitor the environment in various hazardous conditions and provide live video feedback. Basics of robotics like sensors and actuators, gives an overview on robotic construction. The proposed system is also able to capture real-time videos which are useful for surveillance for a specific person or area. Controlling of Robot is done using a Raspberry Pi3 processor. This robot is more comfortable for military applications such as surveillance of interested area. It will provide tactical advantage during hostage situations or in hostile grounds. It is capable of walking on any surface and providing monitoring over an area. With the help of high quality video transmission the surveillance become more effective. Video quality is improvised in the proposed system. These will prove important in applications like robots for civil use and military robots.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125034775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703208
Padmini Mishra, Saurabh Jaiswal, N. Agarwal, V. Patel
Due to availability of limited resources such as bandwidth size, memory capacity, battery power etc, high node density and huge amount of traffic convergence make wireless sensor network more prone to congestion and it results in loss of information and more energy dissipation. Because of this, a congestion control mechanism is required which can detect congestion accurately and control it accordingly. In order to achieve this purpose, a fuzzy based congestion detection and alleviation scheme is developed by taking the advantage of some metrics-Buffer occupancy, traffic rate, contenders, number of packets sent by source node, number of packets received by the destination node and level of congestion. These metrics help to estimate congestion status in the sensor network and also minimizes the congestion level by adjusting rest of the other metrics. The performance of the proposed scheme is evaluated and compared with existing schemes such as ESRT, FLCE, CCSFL and FBACC with respect to various quality of service parameters. Finally, it is observed that the proposed model reduces the energy consumption by controlling congestion in the sensor network, minimizes packet loss, extend network lifespan and tries to maintain traffic rate in order to attain better utilization of the network bandwidth.
{"title":"Expanding Lifetime Of Wireless Sensor Network Using Fuzzy Logic","authors":"Padmini Mishra, Saurabh Jaiswal, N. Agarwal, V. Patel","doi":"10.1109/ICSCCC.2018.8703208","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703208","url":null,"abstract":"Due to availability of limited resources such as bandwidth size, memory capacity, battery power etc, high node density and huge amount of traffic convergence make wireless sensor network more prone to congestion and it results in loss of information and more energy dissipation. Because of this, a congestion control mechanism is required which can detect congestion accurately and control it accordingly. In order to achieve this purpose, a fuzzy based congestion detection and alleviation scheme is developed by taking the advantage of some metrics-Buffer occupancy, traffic rate, contenders, number of packets sent by source node, number of packets received by the destination node and level of congestion. These metrics help to estimate congestion status in the sensor network and also minimizes the congestion level by adjusting rest of the other metrics. The performance of the proposed scheme is evaluated and compared with existing schemes such as ESRT, FLCE, CCSFL and FBACC with respect to various quality of service parameters. Finally, it is observed that the proposed model reduces the energy consumption by controlling congestion in the sensor network, minimizes packet loss, extend network lifespan and tries to maintain traffic rate in order to attain better utilization of the network bandwidth.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123400828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703287
A. Thakur, N. Jindal
In this paper, two algorithms are proposed to classify and localize image forgery. In the first algorithm, deep learning based convolution neural network is used to classify spliced and authentic images. In the second algorithm, machine learning based saliency algorithm is used to detect and localize forged images. Input images are preprocessed using color illumination maps with equal size and channels. Saliency algorithm detect unique features such as color illumination, pixel resolution etc. of the image. These unique features depict the forged regions in an image. The results are obtained on CASIA-v1, CASIA-v2, DVMM and BSDS-300 dataset. Simulated results in both algorithm are better as compare to the state of the art method.
{"title":"Machine Learning Based Saliency Algorithm For Image Forgery Classification And Localization","authors":"A. Thakur, N. Jindal","doi":"10.1109/ICSCCC.2018.8703287","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703287","url":null,"abstract":"In this paper, two algorithms are proposed to classify and localize image forgery. In the first algorithm, deep learning based convolution neural network is used to classify spliced and authentic images. In the second algorithm, machine learning based saliency algorithm is used to detect and localize forged images. Input images are preprocessed using color illumination maps with equal size and channels. Saliency algorithm detect unique features such as color illumination, pixel resolution etc. of the image. These unique features depict the forged regions in an image. The results are obtained on CASIA-v1, CASIA-v2, DVMM and BSDS-300 dataset. Simulated results in both algorithm are better as compare to the state of the art method.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129165468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703323
Jagmeet Singh Aidan, Zeenia, Urvashi Garg
In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.
{"title":"Advanced Petya Ransomware and Mitigation Strategies","authors":"Jagmeet Singh Aidan, Zeenia, Urvashi Garg","doi":"10.1109/ICSCCC.2018.8703323","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703323","url":null,"abstract":"In this cyber era, the cyber threats have reached a new level of menace and maturity. One of the major threat in this cyber world nowadays is ransomware attack which had affected millions of computers. Ransomware locks the valuable data with often unbreakable encryption codes making it inaccessible for both organization and consumers, thus demanding heavy ransom to decrypt the data. In this paper, advanced and improved version of the Petya ransomware has been introduced which has a reduced anti-virus detection of 33% which actually was 71% with the original version. System behavior is also monitored during the attack and analysis of this behavior is performed and described. Along with the behavioral analysis two mitigation strategies have also been proposed to defend the systems from the ransomware attack. This multi-layered approach for the security of the system will minimize the rate of infection as cybercriminals continue to refine their tactics, making it difficult for the organization’s complacent development.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129856985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703272
Nishant Sharma, N. Chauhan, N. Chand
with recent advancements in technology, different devices that are used in our day-to-day lives are able to connect to internet, communicate and exchange messages with each other. This new paradigm is called “Internet of Things” and is providing services such as smart hospitals, smart city, home automation etc. “Internet of Things” has changed conventional small scale Vehicular Ad-hoc Network (VANET) to a highly scalable, manageable internet based “Internet of Vehicle” (IoV). IoV is a vehicular network model consisting of vehicles, users and other smart devices connected to network and aims to provide various safety as well as entertainment services. Vehicles in IoV system are equipped with different sensors that collect different types of data and send it to computation unit for computation and analysis, based on which directions and other information is sent to each vehicle. We present a model overview of IoV system in this paper. Security in IoV becomes of paramount importance as any system failure directly affects user safety. In this paper, we discuss security issues, various security attacks and their countermeasures from IoV perspective. We also propose an authentication mechanism for Vehicle-to-Infrastructure (V2I) communication in IoV.
{"title":"Security challenges in Internet of Vehicles (IoV) environment","authors":"Nishant Sharma, N. Chauhan, N. Chand","doi":"10.1109/ICSCCC.2018.8703272","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703272","url":null,"abstract":"with recent advancements in technology, different devices that are used in our day-to-day lives are able to connect to internet, communicate and exchange messages with each other. This new paradigm is called “Internet of Things” and is providing services such as smart hospitals, smart city, home automation etc. “Internet of Things” has changed conventional small scale Vehicular Ad-hoc Network (VANET) to a highly scalable, manageable internet based “Internet of Vehicle” (IoV). IoV is a vehicular network model consisting of vehicles, users and other smart devices connected to network and aims to provide various safety as well as entertainment services. Vehicles in IoV system are equipped with different sensors that collect different types of data and send it to computation unit for computation and analysis, based on which directions and other information is sent to each vehicle. We present a model overview of IoV system in this paper. Security in IoV becomes of paramount importance as any system failure directly affects user safety. In this paper, we discuss security issues, various security attacks and their countermeasures from IoV perspective. We also propose an authentication mechanism for Vehicle-to-Infrastructure (V2I) communication in IoV.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125341108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}