首页 > 最新文献

2011 International Conference on Computational Intelligence and Communication Networks最新文献

英文 中文
Performance Evaluation of Face Recognition Based on DWT and DT-CWT Using Multi-matching Classifiers 基于多匹配分类器的DWT和DT-CWT人脸识别性能评价
R. K, K. Raja
Biometrics recognition tool has great emphasis in both research and practical applications. With an increasing requirement on security, automated personal identification and verification based biometrics has been receiving extensive attention over the past decade. In this paper Performance Evaluation of Face Recognition based on DWT and DT-CWT using Multi-matching Classifiers (FRMC) is proposed. The face images captured from the persons differ in size and hence image dimensions are converted into 2n * 2n dimension, for DT-CWT. The two level DWT is applied on face images to generate four sub bands. The DT-CWT is applied on only LL sub band to generate DT-CWT coefficients, which forms features for face images. The features of database and test face are compared using Euclidian Distance, Random Forest and Support Vector Machine matching algorithms. It is observed that correct recognition rate, false acceptance rate and false reject rate are better in the case of proposed method as compared to existing techniques.
生物特征识别工具在研究和实际应用中都得到了极大的重视。随着人们对安全的要求越来越高,基于生物识别技术的个人自动识别和验证在过去的十年中受到了广泛的关注。提出了基于多匹配分类器(FRMC)的小波变换和DT-CWT人脸识别性能评价方法。从人身上捕获的人脸图像大小不同,因此将图像尺寸转换为2n * 2n维,用于DT-CWT。将二级小波变换应用于人脸图像,生成4个子带。仅在LL子带上应用DT-CWT来生成DT-CWT系数,这些系数形成人脸图像的特征。利用欧几里得距离、随机森林和支持向量机匹配算法对数据库和测试人脸的特征进行比较。结果表明,该方法的正确识别率、错误接受率和错误拒绝率均优于现有方法。
{"title":"Performance Evaluation of Face Recognition Based on DWT and DT-CWT Using Multi-matching Classifiers","authors":"R. K, K. Raja","doi":"10.1109/CICN.2011.130","DOIUrl":"https://doi.org/10.1109/CICN.2011.130","url":null,"abstract":"Biometrics recognition tool has great emphasis in both research and practical applications. With an increasing requirement on security, automated personal identification and verification based biometrics has been receiving extensive attention over the past decade. In this paper Performance Evaluation of Face Recognition based on DWT and DT-CWT using Multi-matching Classifiers (FRMC) is proposed. The face images captured from the persons differ in size and hence image dimensions are converted into 2n * 2n dimension, for DT-CWT. The two level DWT is applied on face images to generate four sub bands. The DT-CWT is applied on only LL sub band to generate DT-CWT coefficients, which forms features for face images. The features of database and test face are compared using Euclidian Distance, Random Forest and Support Vector Machine matching algorithms. It is observed that correct recognition rate, false acceptance rate and false reject rate are better in the case of proposed method as compared to existing techniques.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124609317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Symmetric key management and distribution techniques in wireless ad hoc networks 无线自组织网络中的对称密钥管理和分发技术
M. Krishna, M. Doja
In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. This article gives analysis of various key management and symmetric key distribution techniques in wireless ad hoc network. Master key, pair wise key and random key pre-distribution techniques are used in key management. Analytical methods confirm that for a less dense network master key is used and for a large dense network random key is used. In order to minimize the key management complexity in security protocols, symmetric key distribution is used. Key distribution techniques are classified based node attributes as local area, wide area and threshold area conditions. Analysis of various key distribution method concludes that (i) if keys are compromised in a local area, self-healing key management technique is used (ii) if keys are compromised in wide area, distributed Diffie Hellman is used and (iii) if keys are compromised in threshold area conditions, then subset of m keys are distributed in m different locations.
在安全自组织网络中,授权节点通过网络初始化、认证和安全通信来访问网络。身份验证是安全性的核心,节点根据密钥管理交换数据。可信第三方(TPP)或证书颁发机构(CA)作为信任基础设施,使节点能够访问或离开网络。安全协议的主要特性是密钥管理,包括密钥分发和密钥更新。本文分析了无线自组织网络中的各种密钥管理和对称密钥分发技术。密钥管理采用了主密钥、对密钥和随机密钥预分发技术。分析方法证实,对于密度较小的网络使用主密钥,对于密度较大的网络使用随机密钥。为了降低安全协议中密钥管理的复杂性,采用了对称密钥分发。密钥分发技术根据节点属性分为局部、广域和阈值区域条件。通过对各种密钥分发方法的分析得出:(i)如果密钥在局部区域被泄露,则使用自修复密钥管理技术;(ii)如果密钥在广域区域被泄露,则使用分布式Diffie Hellman; (iii)如果密钥在阈值区域条件下被泄露,则m个密钥的子集分布在m个不同的位置。
{"title":"Symmetric key management and distribution techniques in wireless ad hoc networks","authors":"M. Krishna, M. Doja","doi":"10.1109/CICN.2011.158","DOIUrl":"https://doi.org/10.1109/CICN.2011.158","url":null,"abstract":"In secure ad hoc network authorized nodes access the network based on network initialization, authentication and secure communication. Authentication forms the core in security, where nodes exchange data based on key management. Trusted Third Party (TPP) or Certificate Authority (CA) function as trust infrastructure and enable the nodes to access or leave the network. The main feature of security protocols is key management, which includes key distribution and key update. This article gives analysis of various key management and symmetric key distribution techniques in wireless ad hoc network. Master key, pair wise key and random key pre-distribution techniques are used in key management. Analytical methods confirm that for a less dense network master key is used and for a large dense network random key is used. In order to minimize the key management complexity in security protocols, symmetric key distribution is used. Key distribution techniques are classified based node attributes as local area, wide area and threshold area conditions. Analysis of various key distribution method concludes that (i) if keys are compromised in a local area, self-healing key management technique is used (ii) if keys are compromised in wide area, distributed Diffie Hellman is used and (iii) if keys are compromised in threshold area conditions, then subset of m keys are distributed in m different locations.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122008223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Enhancing the MANET Nodes of Hierarchical Architecture for Communication between Mobile Ad Hoc Network and Internet Using Cluster Head Gateway 利用簇头网关增强移动自组网与Internet通信的分层结构MANET节点
A. Bagwari, R. Jee
As we know in Mobile Ad hoc network our Nodes are highly mobile. They move around the Network. Due to this network topology and number of neighboring nodes in each node frequently change. Movement of nodes from one to another network also affect to the communication between them. To connect the wired and wireless networks particularly the Mobile ad hoc Network is very interesting in real world situations due to its popularity and usefulness. As in our paper we given and explained a approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG), in which all the responsibilities of cluster head and gateway will be perform by the CHG and we introduces the prediction table concepts and discusses a mechanism for selecting an alternate route in case if the CHG is unable to forward the packets to the destination, This approach providing Bi-directional connectivity between MANET and wired Nodes. In this paper we are extending the network coverage and the performance measured with other large N/w's. Finally, this paper conducts simulation experiments in the conditions where we connecting MANET nodes to the wired nodes using different networks.
正如我们所知,在移动自组织网络中,我们的节点是高度移动的。他们在网络中移动。由于这种网络拓扑结构和每个节点的相邻节点数量经常变化。节点从一个网络移动到另一个网络也会影响它们之间的通信。连接有线和无线网络,特别是移动自组织网络,由于其普及和有用性,在现实世界的情况下非常有趣。在我们的论文中,我们给出并解释了一种方法,其中簇头和网关相同,该节点被称为簇头网关(CHG),其中簇头和网关的所有职责将由CHG执行,我们介绍了预测表的概念,并讨论了在CHG无法将数据包转发到目的地时选择备用路由的机制。这种方法在MANET和有线节点之间提供双向连接。在本文中,我们扩展了网络覆盖范围,并测量了其他大信噪比的性能。最后,本文在使用不同网络将MANET节点连接到有线节点的情况下进行了仿真实验。
{"title":"Enhancing the MANET Nodes of Hierarchical Architecture for Communication between Mobile Ad Hoc Network and Internet Using Cluster Head Gateway","authors":"A. Bagwari, R. Jee","doi":"10.1109/CICN.2011.71","DOIUrl":"https://doi.org/10.1109/CICN.2011.71","url":null,"abstract":"As we know in Mobile Ad hoc network our Nodes are highly mobile. They move around the Network. Due to this network topology and number of neighboring nodes in each node frequently change. Movement of nodes from one to another network also affect to the communication between them. To connect the wired and wireless networks particularly the Mobile ad hoc Network is very interesting in real world situations due to its popularity and usefulness. As in our paper we given and explained a approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG), in which all the responsibilities of cluster head and gateway will be perform by the CHG and we introduces the prediction table concepts and discusses a mechanism for selecting an alternate route in case if the CHG is unable to forward the packets to the destination, This approach providing Bi-directional connectivity between MANET and wired Nodes. In this paper we are extending the network coverage and the performance measured with other large N/w's. Finally, this paper conducts simulation experiments in the conditions where we connecting MANET nodes to the wired nodes using different networks.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"19 15-16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generalized Grid Quorum Consensus for Replica Control Protocol 副本控制协议的广义网格仲裁一致性
Vinit Kumar, A. Agarwal
In distributed systems it is often necessary to provide coordination among the multiple concurrent processes to tolerate the contention, periods of asynchrony and a number of failures. Quorum systems provide a decentralized approach for such coordination. In this paper, we propose a replica control protocol by using a Generalized-grid quorum consensus, which is the generalization of a Read-one-write-all (ROWA), Grid quorum consensus, D-Space quorum consensus and Multi-dimensional-grid quorum consensus protocols. This protocol provides a very high read availability and read capacity while maintaining the reconfigurable levels of write availability and fault tolerance.
在分布式系统中,通常需要在多个并发进程之间提供协调,以容忍争用、异步周期和大量故障。仲裁制度为这种协调提供了一种分散的方法。本文提出了一种基于广义网格仲裁共识的副本控制协议,该协议是对ROWA (Read-one-write-all)、网格仲裁共识、D-Space仲裁共识和多维网格仲裁共识协议的推广。该协议提供了非常高的读可用性和读容量,同时保持了可重构的写可用性和容错级别。
{"title":"Generalized Grid Quorum Consensus for Replica Control Protocol","authors":"Vinit Kumar, A. Agarwal","doi":"10.1109/CICN.2011.83","DOIUrl":"https://doi.org/10.1109/CICN.2011.83","url":null,"abstract":"In distributed systems it is often necessary to provide coordination among the multiple concurrent processes to tolerate the contention, periods of asynchrony and a number of failures. Quorum systems provide a decentralized approach for such coordination. In this paper, we propose a replica control protocol by using a Generalized-grid quorum consensus, which is the generalization of a Read-one-write-all (ROWA), Grid quorum consensus, D-Space quorum consensus and Multi-dimensional-grid quorum consensus protocols. This protocol provides a very high read availability and read capacity while maintaining the reconfigurable levels of write availability and fault tolerance.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dual Wideband Stacked Patch Antenna for WiMax and WLAN Applications 用于WiMax和WLAN应用的双宽带堆叠贴片天线
V. Singh, Z. Ali, Ashutosh Kumar Singh
This paper presents dual wideband microstrip antenna which is designed using stacking configuration to give a better bandwidth as compared to single layer substrate design. The designed slotted stacked patch antenna can operate in the Wimax, (2.2-3.4 GHz) WLAN (2.40--2.48GHz), and UMTS II (2.50--2.69GHz) frequency band giving a maximum bandwidth of 37.95%. The air is used as a dielectric between the two stacks and a height of 10 mm is kept between the two stacks. The feeding technique used in the design is the coaxial probe feed and the impedance matching and radiation characteristics of the structure are investigated using MOM based IE3D. The simulation result shows that the proposed antenna can offer excellent performance for Wi Max and WLAN application.
本文提出了一种双宽带微带天线,该天线采用叠加结构设计,与单层衬底设计相比,具有更好的带宽。所设计的开槽堆叠贴片天线可以在Wimax (2.2-3.4 GHz)、WLAN (2.40- 2.48GHz)和UMTS II (2.50- 2.69GHz)频段工作,最大带宽为37.95%。空气用作两层之间的电介质,两层之间保持10mm的高度。设计中采用的馈电技术为同轴探头馈电,并利用基于MOM的IE3D对结构的阻抗匹配和辐射特性进行了研究。仿真结果表明,该天线在Wi - Max和WLAN应用中具有良好的性能。
{"title":"Dual Wideband Stacked Patch Antenna for WiMax and WLAN Applications","authors":"V. Singh, Z. Ali, Ashutosh Kumar Singh","doi":"10.1109/CICN.2011.66","DOIUrl":"https://doi.org/10.1109/CICN.2011.66","url":null,"abstract":"This paper presents dual wideband microstrip antenna which is designed using stacking configuration to give a better bandwidth as compared to single layer substrate design. The designed slotted stacked patch antenna can operate in the Wimax, (2.2-3.4 GHz) WLAN (2.40--2.48GHz), and UMTS II (2.50--2.69GHz) frequency band giving a maximum bandwidth of 37.95%. The air is used as a dielectric between the two stacks and a height of 10 mm is kept between the two stacks. The feeding technique used in the design is the coaxial probe feed and the impedance matching and radiation characteristics of the structure are investigated using MOM based IE3D. The simulation result shows that the proposed antenna can offer excellent performance for Wi Max and WLAN application.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Pseudorandom Binary Key Generation from Binary Files 伪随机二进制密钥从二进制文件生成
R. Nallanthighal, V. Rani
This paper presents an algorithm to generate a long pseudorandom binary key using a binary file downloaded from the Internet as seed or input. This file can be of any type i.e. video, audio, text, image etc. The output is a long pseudorandom binary key. The generated key can be used to encrypt any type of data file using a stream cipher encryption algorithm. The key files obtained from the algorithm implementation are successfully tested by the well known NIST and ENT test suites for statistical validation.
本文提出了一种利用从Internet上下载的二进制文件作为种子或输入来生成长伪随机二进制密钥的算法。这个文件可以是任何类型,即视频,音频,文本,图像等。输出是一个长伪随机二进制密钥。生成的密钥可用于使用流密码加密算法加密任何类型的数据文件。从算法实现中获得的密钥文件通过著名的NIST和ENT测试套件进行了成功的测试,以进行统计验证。
{"title":"Pseudorandom Binary Key Generation from Binary Files","authors":"R. Nallanthighal, V. Rani","doi":"10.1109/CICN.2011.137","DOIUrl":"https://doi.org/10.1109/CICN.2011.137","url":null,"abstract":"This paper presents an algorithm to generate a long pseudorandom binary key using a binary file downloaded from the Internet as seed or input. This file can be of any type i.e. video, audio, text, image etc. The output is a long pseudorandom binary key. The generated key can be used to encrypt any type of data file using a stream cipher encryption algorithm. The key files obtained from the algorithm implementation are successfully tested by the well known NIST and ENT test suites for statistical validation.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Small e-Health Care Information System with Agent Technology 基于Agent技术的小型电子医疗信息系统
R. Subalakshmi, Arijit Das, N. Iyengar
Nowadays, health care is one of the most important subjects in our life. Increasing level of patients demand across the world obliges health care services in a more flexible and uniform manner. So that patients can get useful health services in the home environment without going to the health center personally. The e-healthcare is new kinds of health care system and it is very popular at this time. Where patients can exchange their confidential information via internet to the organization and from the organization get the services via internet also. So lots of time will be saved and patient can get services efficiently without unnecessary harassments of travel to the organization. In this system all the transaction of data are processed by Patient Agents (PA), Doctor Agents (DA) and Controller Agent (CA). The user uses the Patient Agent (PA) to connect with the controlling server of the e-health care system. The Controller Agent (CA) is control the demand of the patients as well as activity of the doctors. When the doctor wants to check-up the patient then he/she connects with the Doctor Agent (DA). Using the Doctor Agent (DA), every doctor prescribed some medicine to the patient about the query and if required then refer the patient to another doctor. The Agent computing in a network of workstations is powerful paradigm for building distributed applications. The agent technology is used to enhance the patient's needs which include availability, speedy response time, and efficiency. Agent for e-Health care creates connectivity on an anytime-anywhere-any-device-basis to provide the specific service from the doctor required by the patients.
如今,医疗保健是我们生活中最重要的课题之一。世界各地患者需求的不断增加迫使卫生保健服务以更加灵活和统一的方式提供。这样患者就可以在家庭环境中获得有用的健康服务,而不用亲自去健康中心。电子医疗保健是一种新型的医疗保健系统,在当前非常流行。患者可以通过互联网与组织交换他们的机密信息,组织也可以通过互联网获得服务。这样可以节省大量的时间,患者可以有效地获得服务,而不必去组织出差。在该系统中,所有的数据事务都由患者代理(PA)、医生代理(DA)和控制代理(CA)来处理。用户使用PA (Patient Agent)连接到电子医疗系统的控制服务器。控制代理(Controller Agent, CA)控制着患者的需求和医生的活动。当医生想要检查病人时,他/她会与医生代理(DA)联系。使用医生代理(DA),每个医生就查询给患者开一些药,如果需要,然后将患者转介给另一位医生。工作站网络中的Agent计算是构建分布式应用程序的强大范例。代理技术用于提高患者的需求,包括可用性,快速响应时间和效率。电子医疗保健代理在任何时间、任何地点、任何设备的基础上创建连接,以提供患者所需的医生提供的特定服务。
{"title":"A Small e-Health Care Information System with Agent Technology","authors":"R. Subalakshmi, Arijit Das, N. Iyengar","doi":"10.1109/CICN.2011.14","DOIUrl":"https://doi.org/10.1109/CICN.2011.14","url":null,"abstract":"Nowadays, health care is one of the most important subjects in our life. Increasing level of patients demand across the world obliges health care services in a more flexible and uniform manner. So that patients can get useful health services in the home environment without going to the health center personally. The e-healthcare is new kinds of health care system and it is very popular at this time. Where patients can exchange their confidential information via internet to the organization and from the organization get the services via internet also. So lots of time will be saved and patient can get services efficiently without unnecessary harassments of travel to the organization. In this system all the transaction of data are processed by Patient Agents (PA), Doctor Agents (DA) and Controller Agent (CA). The user uses the Patient Agent (PA) to connect with the controlling server of the e-health care system. The Controller Agent (CA) is control the demand of the patients as well as activity of the doctors. When the doctor wants to check-up the patient then he/she connects with the Doctor Agent (DA). Using the Doctor Agent (DA), every doctor prescribed some medicine to the patient about the query and if required then refer the patient to another doctor. The Agent computing in a network of workstations is powerful paradigm for building distributed applications. The agent technology is used to enhance the patient's needs which include availability, speedy response time, and efficiency. Agent for e-Health care creates connectivity on an anytime-anywhere-any-device-basis to provide the specific service from the doctor required by the patients.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MPG-STAR: Mobile Process Groups Based Secured and Trusted Routing for MANets MPG-STAR:基于移动进程组的无线网络安全可信路由
A. Aakanksha, Punam Bedi
Wireless medium is more prone to security breaches than wired medium. The issue of security becomes critical in Mobile ad-hoc networks (MANets), due to the mobility of nodes. Node mobility causes frequent change in the radio transmission range thus changing the group membership. Members in a group communicate using the group key. Each time the group change, a new group key is to be computed in a secured manner providing backward and forward secrecy. This paper presents a secured and trusted routing algorithm MPG-STAR. The new group key is computed securely for trustworthy nodes of MPG routing protocol based on the ring based co-operation in Group Diffie-Hellman key exchange to avoid malicious or selfish nodes.
无线媒体比有线媒体更容易出现安全漏洞。由于节点的移动性,安全问题在移动自组织网络(manet)中变得至关重要。节点移动导致无线电传输范围频繁变化,从而改变组成员关系。组中的成员使用组密钥进行通信。每次组更改时,将以安全的方式计算一个新的组密钥,提供向后和向前保密。提出了一种安全可信的路由算法MPG-STAR。基于组Diffie-Hellman密钥交换中基于环的合作,对MPG路由协议的可信节点安全地计算新的组密钥,以避免恶意节点或自私节点。
{"title":"MPG-STAR: Mobile Process Groups Based Secured and Trusted Routing for MANets","authors":"A. Aakanksha, Punam Bedi","doi":"10.1109/CICN.2011.118","DOIUrl":"https://doi.org/10.1109/CICN.2011.118","url":null,"abstract":"Wireless medium is more prone to security breaches than wired medium. The issue of security becomes critical in Mobile ad-hoc networks (MANets), due to the mobility of nodes. Node mobility causes frequent change in the radio transmission range thus changing the group membership. Members in a group communicate using the group key. Each time the group change, a new group key is to be computed in a secured manner providing backward and forward secrecy. This paper presents a secured and trusted routing algorithm MPG-STAR. The new group key is computed securely for trustworthy nodes of MPG routing protocol based on the ring based co-operation in Group Diffie-Hellman key exchange to avoid malicious or selfish nodes.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123943068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nano-Power Sensor Applications in VLSI Multi-die Tiny Chip 纳米功率传感器在VLSI多芯片中的应用
S. Binzaid, I. Chowdhury, Md. Shoaibur Rahman, S. M. S. Islam
Semiconductor integration has improved over the years by increasing device switching speed and device density, causing increased power consumption and dissipation, therefore, the issues has been considered and improved here. Previously designed VLSI mirror-amplifier had power dissipation of 8.41 mill watts in CMOS 0.5µm process. Latter the technique was re-applied in this work to completed characterization of each pin signal functions with biasing steps to determine accuracy at the low power response of the IC in order to improve the total power consumption. Signal pin orientation in the simulation and choosing the correct biasing point in two steps proved to be correct procedure to improve. Supply voltage was considered as 3V for the MOSIS process technology. Latest MAGIC layout CAD tools were used for design, and PSPICE was used for simulation and electrical characterization with the help of MAGIC layout extraction tool. Keeping the process and scaling unchanged at 0.5µm as the previous design, the new VLSI design yielded the power dissipation of 4.39 nanowatts in 2nd step by reducing the dynamic loss. The electrical characterizations also confirmed that the chip precisely senses ultra-high-Z signals at inputs for this application. Multi-die chip placement is done for fabrication and also made the final product less expensive by the in-house custom designed pad-frame. This paper presents details of the key research works, results, completed chip layout and applications of the chip.
多年来,半导体集成通过提高器件开关速度和器件密度而得到改进,从而导致功耗和耗散增加,因此,这里已经考虑并改进了这些问题。先前设计的VLSI镜像放大器在CMOS 0.5µm工艺下的功耗为8.41 mw。随后,该技术再次应用于本工作中,通过偏置步骤完成每个引脚信号函数的表征,以确定IC在低功耗响应下的精度,以提高总功耗。在仿真中通过信号引脚定向和选择正确的偏置点两步验证了该方法的正确性。对于MOSIS工艺技术,电源电压考虑为3V。采用最新的MAGIC版图CAD工具进行设计,并借助MAGIC版图提取工具使用PSPICE进行仿真和电学表征。新的VLSI设计在0.5 μ m时保持工艺和尺度不变,通过降低动态损耗,第二步功耗为4.39纳瓦。电气特性也证实了该芯片在该应用的输入处精确地感知超高z信号。多芯片芯片的放置是为了制造,也使最终产品更便宜的内部定制设计的垫框架。本文详细介绍了该芯片的重点研究工作、成果、完成的芯片布局和应用情况。
{"title":"Nano-Power Sensor Applications in VLSI Multi-die Tiny Chip","authors":"S. Binzaid, I. Chowdhury, Md. Shoaibur Rahman, S. M. S. Islam","doi":"10.1109/CICN.2011.119","DOIUrl":"https://doi.org/10.1109/CICN.2011.119","url":null,"abstract":"Semiconductor integration has improved over the years by increasing device switching speed and device density, causing increased power consumption and dissipation, therefore, the issues has been considered and improved here. Previously designed VLSI mirror-amplifier had power dissipation of 8.41 mill watts in CMOS 0.5µm process. Latter the technique was re-applied in this work to completed characterization of each pin signal functions with biasing steps to determine accuracy at the low power response of the IC in order to improve the total power consumption. Signal pin orientation in the simulation and choosing the correct biasing point in two steps proved to be correct procedure to improve. Supply voltage was considered as 3V for the MOSIS process technology. Latest MAGIC layout CAD tools were used for design, and PSPICE was used for simulation and electrical characterization with the help of MAGIC layout extraction tool. Keeping the process and scaling unchanged at 0.5µm as the previous design, the new VLSI design yielded the power dissipation of 4.39 nanowatts in 2nd step by reducing the dynamic loss. The electrical characterizations also confirmed that the chip precisely senses ultra-high-Z signals at inputs for this application. Multi-die chip placement is done for fabrication and also made the final product less expensive by the in-house custom designed pad-frame. This paper presents details of the key research works, results, completed chip layout and applications of the chip.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation and Comparison of AODV and DSR Under Adversarial Environment 对抗环境下AODV与DSR的性能评价与比较
Richa Agrawal, R. Tripathi, S. Tiwari
A mobile ad-hoc network (MANET) can be described as a mobile wireless network, consisting of a collection of communication nodes, which have to interact among themselves without the use of any centralized authority or fixed infrastructure. There are several technical challenges regarding deployment of a MANET, such as network scalability, communication stability, energy consumption, security and quality of services (QoS). Due to vulnerability of wireless links, nodes unstable infrastructure support and highly dynamic network states, MANET security becomes an essential design dimension. initially while designing MANET routing protocols security aspects were not considered, so routing protocols are vulnerable to various types of security attacks such as rushing attack, black hole attack, replay attack, jellyfish attack, wormhole attack, spoofing attack etc. In this paper we have discussed wormhole attack. In this paper, through simulation the effects of wormhole attack on Ad-hoc On Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols have been analyzed and compared.
移动自组织网络(MANET)可以被描述为一个移动无线网络,由一组通信节点组成,这些节点必须在不使用任何集中权威或固定基础设施的情况下相互作用。关于MANET的部署存在几个技术挑战,例如网络可伸缩性、通信稳定性、能耗、安全性和服务质量(QoS)。由于无线链路的脆弱性、节点基础设施支持的不稳定性以及网络状态的高度动态性,使MANET的安全性成为必不可少的设计维度。最初在设计MANET路由协议时没有考虑安全方面的问题,因此路由协议容易受到各种类型的安全攻击,如匆忙攻击、黑洞攻击、重放攻击、水母攻击、虫洞攻击、欺骗攻击等。本文讨论了虫洞攻击。本文通过仿真分析比较了虫洞攻击对Ad-hoc随需应变距离矢量路由(AODV)和动态源路由(DSR)协议的影响。
{"title":"Performance Evaluation and Comparison of AODV and DSR Under Adversarial Environment","authors":"Richa Agrawal, R. Tripathi, S. Tiwari","doi":"10.1109/CICN.2011.129","DOIUrl":"https://doi.org/10.1109/CICN.2011.129","url":null,"abstract":"A mobile ad-hoc network (MANET) can be described as a mobile wireless network, consisting of a collection of communication nodes, which have to interact among themselves without the use of any centralized authority or fixed infrastructure. There are several technical challenges regarding deployment of a MANET, such as network scalability, communication stability, energy consumption, security and quality of services (QoS). Due to vulnerability of wireless links, nodes unstable infrastructure support and highly dynamic network states, MANET security becomes an essential design dimension. initially while designing MANET routing protocols security aspects were not considered, so routing protocols are vulnerable to various types of security attacks such as rushing attack, black hole attack, replay attack, jellyfish attack, wormhole attack, spoofing attack etc. In this paper we have discussed wormhole attack. In this paper, through simulation the effects of wormhole attack on Ad-hoc On Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols have been analyzed and compared.","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2011 International Conference on Computational Intelligence and Communication Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1