首页 > 最新文献

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
OFDM transceiver design using C OFDM收发器设计使用C
Indira Bahaddur, C. L. Triveni, P. Srikanth
The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.
本文的目的是用C语言设计一个基带正交频分复用(OFDM)[1] -[2]收发器,包括8点快速傅里叶变换(FFT)、8点反快速傅里叶变换(IFFT)[3]核心处理器、DPSK调制器[4]、解调器串并转和并转串行模块。主要的挑战是推导快速傅立叶变换(FFT)和反快速傅立叶变换(IFFT)的算法。有许多可用的算法可以实现FFT和IFFT。
{"title":"OFDM transceiver design using C","authors":"Indira Bahaddur, C. L. Triveni, P. Srikanth","doi":"10.1109/ICCCNT.2013.6726661","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726661","url":null,"abstract":"The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation of encryption techniques and uploading of encrypted data in cloud 加密技术性能评估及云端加密数据上传
V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma
Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.
云计算是当今最令人兴奋的技术之一,因为它能够降低与计算相关的成本,同时提高计算机进程的灵活性和可伸缩性。对于云中的数据来说,安全性是最重要的问题。为了保护来自云数据存储的数据,我们将加密的数据存储在云环境中。为了加密数据,我们使用不同类型的加密方法,如RSA、SHA1和MD5。此外,我们还根据每种加密技术的密钥大小来衡量不同加密技术的性能,从而通过提供最佳的数据安全方式将数据上传到云中。
{"title":"Performance evaluation of encryption techniques and uploading of encrypted data in cloud","authors":"V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma","doi":"10.1109/ICCCNT.2013.6726514","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726514","url":null,"abstract":"Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80862715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Active key management scheme to avoid clone attack in wireless sensor network 防止无线传感器网络克隆攻击的主动密钥管理方案
P. Sivasankar, M. Ramakrishnan
In Wireless sensor Network, the sensor nodes transmit critical information over the network; therefore, security services, such as, authentication and pair wise key establishment between sensor nodes and mobile sinks, are important. However, the problem of authentication and pair wise key establishment in sensor networks with MSs is still not solved in the face of mobile sink replication attacks. For the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node. To solve this problem, we have developed a general framework that permits the use of any pair wise key pre distribution scheme as its basic component, to provide authentication and pair wise key establishment between sensor nodes and MSs. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors.
在无线传感器网络中,传感器节点通过网络传输关键信息;因此,安全服务,如传感器节点和移动接收器之间的身份验证和对智能密钥建立,是很重要的。然而,面对移动接收器复制攻击,具有MSs的传感器网络的身份验证和密钥对建立问题仍然没有得到解决。对于基本概率和q-复合密钥预分发方案,攻击者可以通过捕获一小部分网络传感器节点轻松获得大量密钥,使攻击者有可能通过部署复制的移动接收器来控制整个网络,预先加载一些受损密钥进行身份验证,然后启动与任何传感器节点的数据通信。为了解决这个问题,我们开发了一个通用框架,允许使用任何对智能密钥预分发方案作为其基本组件,在传感器节点和MSs之间提供身份验证和对智能密钥建立。新框架需要两个独立的密钥池,一个用于移动接收器访问网络,另一个用于在传感器之间建立对密钥。
{"title":"Active key management scheme to avoid clone attack in wireless sensor network","authors":"P. Sivasankar, M. Ramakrishnan","doi":"10.1109/ICCCNT.2013.6726618","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726618","url":null,"abstract":"In Wireless sensor Network, the sensor nodes transmit critical information over the network; therefore, security services, such as, authentication and pair wise key establishment between sensor nodes and mobile sinks, are important. However, the problem of authentication and pair wise key establishment in sensor networks with MSs is still not solved in the face of mobile sink replication attacks. For the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node. To solve this problem, we have developed a general framework that permits the use of any pair wise key pre distribution scheme as its basic component, to provide authentication and pair wise key establishment between sensor nodes and MSs. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81072984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A load balancing algorithm for private cloud storage 私有云存储负载均衡算法
B. Prabavathy, K. Priya, C. Babu
Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.
云计算支持按需网络访问可配置计算资源(如服务器、存储和应用程序)的共享池。这些共享资源可以快速供应给消费者,前提是只需为消费者使用的资源付费。云存储是指将存储资源通过互联网交付给消费者。私有云存储仅限于特定的组织,与公共云存储相比,数据安全风险更小。因此,私有云存储是通过利用组织内的商用机器来构建的,重要的数据存储在其中。当此类私有云存储的利用率增加时,存储需求也会随之增加。导致云存储扩容,增加存储节点。在扩容过程中,云存储中存储节点的负载需要均衡。为了维持跨多个存储节点的负载,需要跨存储节点进行数据迁移。数据迁移会占用较多的网络带宽。本文的核心思想是开发一种动态负载均衡算法,在私有云存储扩展过程中实现存储节点间的负载均衡。
{"title":"A load balancing algorithm for private cloud storage","authors":"B. Prabavathy, K. Priya, C. Babu","doi":"10.1109/ICCCNT.2013.6726585","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726585","url":null,"abstract":"Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81958833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comprehensive study on MANETs network layer attacks manet网络层攻击的综合研究
G. Garg, S. Kaushal, Akashdeep Sharma
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security solutions that achieve both broad protection and desirable network performance. This paper presents a review on the various network layer attacks, i.e. wormhole attack, blackhole attack and greyhole attack and existing ways to mitigate them.
移动自组织网络(MANET)是无线移动节点的集合,以分散的方式组成临时网络。为了在MANET的敌对环境中在移动节点之间提供受保护的通信,安全性已经成为主要关注的问题,这对安全设计提出了许多重要的挑战,这些挑战显然需要构建多围栏安全解决方案,以实现广泛的保护和理想的网络性能。本文综述了各种网络层攻击,即虫洞攻击、黑洞攻击和灰洞攻击,以及现有的缓解方法。
{"title":"Comprehensive study on MANETs network layer attacks","authors":"G. Garg, S. Kaushal, Akashdeep Sharma","doi":"10.1109/ICCCNT.2013.6726853","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726853","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security solutions that achieve both broad protection and desirable network performance. This paper presents a review on the various network layer attacks, i.e. wormhole attack, blackhole attack and greyhole attack and existing ways to mitigate them.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81959653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An enhanced security algorithm for wireless application using RSA and genetic approach 利用RSA和遗传方法增强无线应用的安全算法
G. Prema, S. Natarajan
Image steganography is an emerging field of research for secure data hiding and transmission over networks. The proposed system provides the best approach for Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). Original message is converted into cipher text by using RSA and then hidden into the LSB of original image. Genetic Algorithm and Visual Cryptography has been used for enhancing the security. Genetic Algorithm is used to modify the pixel location of stego image and the detection of this message is complex. Visual Cryptography is used to encrypt the visual information. It is achieved by breaking the image into two shares based on a threshold. The performance of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analysing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The main aim of this paper is to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.
图像隐写术是一个新兴的研究领域,用于安全的网络数据隐藏和传输。该系统为基于遗传算法(GA)和视觉密码术(VC)的最低有效位(LSB)隐写提供了最佳方法。利用RSA将原始信息转换为密文,然后隐藏到原始图像的LSB中。遗传算法和视觉密码技术已被用于提高安全性。遗传算法用于修改隐写图像的像素位置,该信息的检测比较复杂。视觉加密是对视觉信息进行加密的方法。它是通过基于阈值将图像分成两个部分来实现的。通过隐写分析和基准测试来测试系统的性能,分析均方误差(MSE)和峰值信噪比(PSNR)等参数。本文的主要目的是设计一种同时使用遗传隐写和视觉密码术的增强安全算法,以确保提高安全性和可靠性。
{"title":"An enhanced security algorithm for wireless application using RSA and genetic approach","authors":"G. Prema, S. Natarajan","doi":"10.1109/ICCCNT.2013.6726679","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726679","url":null,"abstract":"Image steganography is an emerging field of research for secure data hiding and transmission over networks. The proposed system provides the best approach for Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). Original message is converted into cipher text by using RSA and then hidden into the LSB of original image. Genetic Algorithm and Visual Cryptography has been used for enhancing the security. Genetic Algorithm is used to modify the pixel location of stego image and the detection of this message is complex. Visual Cryptography is used to encrypt the visual information. It is achieved by breaking the image into two shares based on a threshold. The performance of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analysing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The main aim of this paper is to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78370481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Technique for detection of cooperative black hole attack in MANET MANET中协同黑洞攻击检测技术
G. Wahane, S. Lonare
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks due to their features of open medium, dynamically changing topologies. The black hole attack is a well known security threat in mobile ad hoc networks. However, it spuriously replies for any route request without having any active route to the specified destination. Sometimes the Black Hole Nodes cooperate with each other with the aim of dropping packets these are known as Cooperative Black Hole attack. This research work suggests the modification of Ad Hoc on Demand Distance Vector Routing Protocol. we are going to use a mechanism for detecting as well as defending against a cooperative black hole attack. This work suggest two new concepts, first one is Maintenance of Routing Information Table and second is Reliability checking of a node. This system also decreases the end to end delay and Routing overhead.
移动自组织网络(MANET)是希望在没有任何固定基础设施和预定可用链路组织的情况下进行通信的通信设备或节点的集合。由于这些网络具有开放介质和动态变化拓扑结构的特点,因此安全性是它们面临的主要挑战。黑洞攻击是移动自组织网络中众所周知的安全威胁。但是,在没有任何到指定目的地的活动路由的情况下,它会虚假地响应任何路由请求。有时,黑洞节点相互合作,目的是丢弃数据包,这些被称为合作黑洞攻击。本研究提出了对Ad Hoc按需距离矢量路由协议的改进。我们将使用一种机制来检测和防御合作黑洞攻击。本文提出了路由信息表维护和节点可靠性检测两个新概念。该系统还减少了端到端延迟和路由开销。
{"title":"Technique for detection of cooperative black hole attack in MANET","authors":"G. Wahane, S. Lonare","doi":"10.1109/ICCCNT.2013.6726621","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726621","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks due to their features of open medium, dynamically changing topologies. The black hole attack is a well known security threat in mobile ad hoc networks. However, it spuriously replies for any route request without having any active route to the specified destination. Sometimes the Black Hole Nodes cooperate with each other with the aim of dropping packets these are known as Cooperative Black Hole attack. This research work suggests the modification of Ad Hoc on Demand Distance Vector Routing Protocol. we are going to use a mechanism for detecting as well as defending against a cooperative black hole attack. This work suggest two new concepts, first one is Maintenance of Routing Information Table and second is Reliability checking of a node. This system also decreases the end to end delay and Routing overhead.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78980494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Evaluating MANET routing protocols under multimedia traffic 评估多媒体流量下的MANET路由协议
Ajinkya D. Kadam, Sharad Wagh
Mobile ad-hoc network is infrastructure less networks having nodes which can act as a transmitter, router or receiver. MANETs have a dynamic topology where nodes are mobile. To monitor the working of the nodes and nature in which they behave while sending, receiving or forwarding data is classified by a set of rules known as routing protocols. Many routing protocols have been designed to fit the needs of Communication in MANET. These protocols have their own advantages and disadvantages depending in which network they are used. This paper will discuss the evaluation of performances of three routing protocols which include Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Destination Sequenced Distance Vector DSDV. The goal of our work is to study the behavior of above mentioned routing protocols with multimedia traffic source in the network based on the following performance metrics: energy consumption, jitter, packet delivery ratio, and packet drop, control overhead, delay. A simulation model using Network Simulator 2 (NS2) is developed to study the scenario and evaluate them.
移动自组织网络是具有节点的基础设施较少的网络,这些节点可以充当发射器,路由器或接收器。manet具有动态拓扑结构,其中节点是移动的。为了监视节点的工作和它们在发送、接收或转发数据时的行为性质,可以通过一组称为路由协议的规则进行分类。为了满足MANET通信的需要,已经设计了许多路由协议。这些协议有自己的优点和缺点,这取决于它们在哪个网络中使用。本文将讨论动态源路由(DSR)、Ad Hoc按需距离矢量(AODV)和目的地顺序距离矢量(DSDV)三种路由协议的性能评估。本文的研究目标是基于以下性能指标:能耗、抖动、包传送率、丢包率、控制开销、时延,研究上述多媒体流量源路由协议在网络中的行为。利用网络模拟器2 (NS2)建立了一个仿真模型来研究和评估这些场景。
{"title":"Evaluating MANET routing protocols under multimedia traffic","authors":"Ajinkya D. Kadam, Sharad Wagh","doi":"10.1109/ICCCNT.2013.6726523","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726523","url":null,"abstract":"Mobile ad-hoc network is infrastructure less networks having nodes which can act as a transmitter, router or receiver. MANETs have a dynamic topology where nodes are mobile. To monitor the working of the nodes and nature in which they behave while sending, receiving or forwarding data is classified by a set of rules known as routing protocols. Many routing protocols have been designed to fit the needs of Communication in MANET. These protocols have their own advantages and disadvantages depending in which network they are used. This paper will discuss the evaluation of performances of three routing protocols which include Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Destination Sequenced Distance Vector DSDV. The goal of our work is to study the behavior of above mentioned routing protocols with multimedia traffic source in the network based on the following performance metrics: energy consumption, jitter, packet delivery ratio, and packet drop, control overhead, delay. A simulation model using Network Simulator 2 (NS2) is developed to study the scenario and evaluate them.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79644409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Security for wireless sensor networks in military operations 军事行动中无线传感器网络的安全性
Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta
The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.
军事通信对于指挥、后勤信息和各单位的正常运作至关重要。必须有一个安全的通道,通过该通道实时交换关键信息,并维护信息的隐私。无线传感器网络可用于军事应用,用于监视军事活动,如跟踪敌人和部队保护。无线传感器网络是一组分布的传感器节点,这些节点之间相互连接。这些传感器节点低功耗,低成本,体积小,可以做有限的计算量。但无线传感器网络容易受到节点捕获、通信链路窃听、中间人或回复消息等各种攻击。为了确保安全,来自无线传感器网络的信息必须加密。为了保证安全,已经提出了许多密钥协议方案,但大多数方案都相当复杂。本文通过在传感器网络的一组节点之间建立安全的密钥排列,提出了军事通信中公钥加密的预密钥分发方案。这将在内存使用、资源消耗、针对节点捕获的弹性、可伸缩性、针对节点复制的抵抗力和信息共享中的安全性方面提高性能。
{"title":"Security for wireless sensor networks in military operations","authors":"Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta","doi":"10.1109/ICCCNT.2013.6726654","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726654","url":null,"abstract":"The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78881375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Implementation of voice based wheelchair for differently abled 实现基于语音的轮椅为不同的残疾
M. B. Kumaran, A. Renold
The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.
本工作的主要目的是对语音信号进行处理,并通过处理后的语音信号实现对轮椅的控制。所采用的模型是将PIC单片机和VRbot模块与语音识别系统相结合,对单个单词进行识别,并且依赖于说话人。用户发出的指令通过内置在语音识别模块内的麦克风传入VRbot模块。识别语音指令后,信号传输到连接步进电机模块的控制器。PIC微控制器从语音识别模块捕获适当的信号,等待超声波传感器在其路径上进行障碍物检测。当VRbot发出移动信号,超声波传感器没有检测到障碍物时,轮椅就开始移动。
{"title":"Implementation of voice based wheelchair for differently abled","authors":"M. B. Kumaran, A. Renold","doi":"10.1109/ICCCNT.2013.6726647","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726647","url":null,"abstract":"The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76665225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1