Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993153
Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju
This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.
{"title":"AWGN and impulsive noise removal by turbo audio enhancement technique","authors":"Rohini S. Hallikar, Shweta Kulkarni, M. Uttarakumari, K. Padmaraju","doi":"10.1109/ICCICCT.2014.6993153","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993153","url":null,"abstract":"This paper gives a performance comparison of turbo method of audio signal enhancement with Dual Resonance Non Linear (DRNL) and Signal Dependent Rank Order Mean(SD-ROM). The salient feature of the work is to explore the usage of turbo method for enhancement of signals like vowels and consonants which was not done earlier for this method. Vowels and consonants being the basics of any language, give a different dimension to this work. From the comparison it can be decided which audio signal enhancement technique can be most useful for the signal processing part of the cochlear implant. Due to the iterative nature of turbo method, it gives better signal enhancement. The results have been compiled for sounds corrupted by different noises namely AWGN and impulsive noise. Enhancement is evaluated based on the correlation coefficient, Log Spectral Distortion (LSD), Segmental Signal to Noise Ratio (SSNR) and Mean Square Error (MSE) between the clean signal and the processed signal. Simulation results confirm that, turbo helps in better enhancement for signals corrupted by AWGN. Turbo method provides signal enhancement for impulsive noise but SD-ROM performs better for impulsive noise. DRNL contributes in signal enhancement not as a standalone filter but when used in combination to form turbo.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"45 1","pages":"1254-1259"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88101209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992956
I. Rohit, M. Dev Anand, D. Jackson
This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.
{"title":"Design, conceptual analysis and implementation of coordinated multipurpose robotic system with smart sensors","authors":"I. Rohit, M. Dev Anand, D. Jackson","doi":"10.1109/ICCICCT.2014.6992956","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992956","url":null,"abstract":"This paper attempts to the overview of design, conceptual analysis and implementation of coordinated multipurpose robot system with smart sensors. The aim of this paper is to show how to design and integrate various sensors in a single module and create a data retrieval system which can be used as a black box and an investigation device.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"8 1","pages":"195-201"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82887419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993060
Michael J. Mathew, Rachit Sapra, S. Majumder
Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.
机器人系统的性能取决于机器人软件中编程的数学模型。通常机器人的数学模型是由设计者计算出来的,并在运行过程中重新校准。机器人模型是机器人软件进行智能操作的基础。赋予机器人自我建模的能力,可以帮助机器人在操作过程中发生轻微损伤时重新修正模型并自我修复。这也避免了重新校准的需要,因为模型通过更多的迭代得到了改进。这项工作试图制造一个机器人系统,其中机器人试图通过利用一些基本的先验信息来建立自己的模型,并通过视觉观察其对环境的行为结果来获得所需的其余信息。本文讨论的方法适用于机械臂,并通过使用Invenscience ARM 2.0和Point Grey立体摄像机进行实验验证。
{"title":"A learning based approach to self modeling robots","authors":"Michael J. Mathew, Rachit Sapra, S. Majumder","doi":"10.1109/ICCICCT.2014.6993060","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993060","url":null,"abstract":"Performance of a robotic system depends o n the mathematical model that is programmed within the software of the robot. Usually the mathematical model of a robot is calculated by the designer and is re-calibrated during the time of operation. Model of the robot is essential for its software to take intelligent actions. Equipping the robot with the capability to self model will help itself to re-correct the model and recover itself in case of minor damages during operation. This also avoids the need of re-calibration since the model gets refined with more number of iterations. This work tries to make a robotic system, where the robot attempts to model itself by making use of some basic prior information and deriving the rest of the required information by visually observing the result of its actions on the environment. The approach discussed in this paper is for robotic manipulators and is validated through an experiment using an Invenscience ARM 2.0 using a Point Grey stereo camera.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2016 1","pages":"758-762"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86633030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993058
G. Kamatam, P. Srinivas, K. C. Sekharaiah
Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.
{"title":"Self congestion prediction algorithm for efficient routing in Mobile Ad-Hoc Network","authors":"G. Kamatam, P. Srinivas, K. C. Sekharaiah","doi":"10.1109/ICCICCT.2014.6993058","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993058","url":null,"abstract":"Congestion control in Mobile Ad-Hoc Network (MANET) is relatively different from that of traditional networks. The standard TCP congestion control approach is not adapted properly in the dynamic properties of MANET, which creates lot of challenges in routing, due to resources and bandwidth limits. In this paper, we proposed a self congestion prediction (SCP) algorithm for congestion prediction and modified AODV with SCP to propose a novel A-SCP protocol for alleviating congestion and efficient routing. The objective of the algorithm is to minimize network overhead and improvise the throughput without deteriorating the network. To evaluate the proposal we simulate in different random mobility and scalable network environment which shows an improvisation in packet delivery and decline in control overhead and end-to-end delay.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"141 1","pages":"745-750"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86742860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992931
Krishnendu Dhar
This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.
本文利用混合阈值电压(MVT)方法的概念,提出了一种低功耗、高速度、高能效的45纳米技术3个晶体管的异或门的设计。与传统CMOS晶体管、传输门和互补通管逻辑(CPL)相比,所提出的设计在平均功耗(Pavg)、峰值功耗(Ppeak)、延迟时间、功率延迟积(PDP)和能量延迟积(EDP)方面分别显示出大量的衰减。已经发现,Pavg最小为6.72×10-11 W,而Ppeak最小为1.11×10-6 W。进一步计算发现,延迟时间低至1.05皮秒,因此在0.9伏电源下,PDP小至7.07×10-23焦耳,而EDP小至7.45×10-35 j。除此之外,由于晶体管数量的减少,表面积也显著减少。所提出的设计已在Tanner S PICE中进行了仿真,并在Microwind中调制了布局。
{"title":"Design of a low power, high speed and energy efficient 3 transistor XOR gate in 45nm technology using the conception of MVT methodology","authors":"Krishnendu Dhar","doi":"10.1109/ICCICCT.2014.6992931","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992931","url":null,"abstract":"This paper puts forward the design of a low power, high speed and energy efficient XOR gate comprising only 3 transistors in 45nm technology using the conception of Mixed Threshold Voltage (MVT) methodology. On comparison with the conventional CMOS transistors, transmission gates and Complementary Pass-Transistor Logic (CPL), the proposed design showed a substantial amount of depreciation in Average Power consumption (Pavg), Peak Power consumption (Ppeak), delay time, Power Delay Product (PDP) and Energy Delay Product (EDP), respectively. It has been found that Pavg is as small as 6.72×10-11 W while Ppeak is as small as 1.11×10-6 W. On further computation, it has been found that delay time is as low as 1.05pico second and hence PDP is as small as 7.07×10-23 Joule whereas EDP is as less as 7.45×10-35 Js for 0.9 volt power supply. In addition to this, due to reduced transistor count, surface area is also remarkably reduced. The simulation for the proposed design has been carried out in Tanner S PICE and the layout has been concocted in Microwind.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"48 1","pages":"66-70"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993164
G. Sumathy, A. Renjith
This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.
{"title":"A survey of vision and speech stimulation for cerebral palsy rehabilitation","authors":"G. Sumathy, A. Renjith","doi":"10.1109/ICCICCT.2014.6993164","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993164","url":null,"abstract":"This survey summarizes many theories and methods applied for vision and speech improvement for cerebral palsy babies. Some research team focus on vision and speech stimulation for cerebral palsy with different techniques using computer aided system and electrical devices. Electrical electrode devices are complexity to use and reliability are inadequate for providing vision and speech stimulation which lead to recover partial output. The material of the survey is divided into four section. 1) Overview of vision development 2) vision stimulation techniques. 3) low vision 4) overview of speech stimulation and techniques. The survey taken from the research field of computer science, neural networks, electrical engineering and psychology. It contains useful guidelines for the construction of new vision and speech stimulation tool which support for young and visually inattentive children.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"21 1","pages":"1315-1319"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993048
K. Joy, B. Mathew
Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.
{"title":"Implementation of a FIR filter model using reversible Fredkin Gate","authors":"K. Joy, B. Mathew","doi":"10.1109/ICCICCT.2014.6993048","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993048","url":null,"abstract":"Man has achieved wonders in his race from the stone age to the supersonic age. These wonders can be understood from the modern technologies. Technological advancements are becoming a part and parcel of this world. More and more technologies with lot of features and advantages are arising. Reversible logic is one such emerging concept. One of the main characteristics of reversible circuits is their less power consumption. As the technology improves, the number of components and hence the number of transistors packed on to the chip also increases. This causes increase in power consumption. Hence reduced power consumption argued by the reversible logic concept has adequate importance in the present scenario. Reversible logic has a wide application in low power VLSI circuits. This paper aims at promoting the concept of reversible logic by implementing a model of a FIR filter using the reversible Fredkin gate.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"2 1","pages":"690-694"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89946678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993040
D. S. Solanki, S. Shiwani
The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.
{"title":"A model to secure e-commerce transaction using hybrid encryption","authors":"D. S. Solanki, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993040","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993040","url":null,"abstract":"The essential part of e-commerce is its data in the database. The issues associated with the security in the database of traditional e-commerce on the basis of analysis on the process of users registration and retrieving password are explained. Security of e-commerce system by single encryption technique is difficult to ensure. The technologies like asymmetrical encryption and symmetrical encryption were introduced to forward the combining thought to produce a hybrid encryption. The method so developed is used to modify the e-commerce process by which the e-commerce database security is enhanced.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"642-645"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89962290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6992923
Abhishek Ekhare, U. Chaskar
The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.
{"title":"Design and development of multi-parameter patient monitoring system with wireless communication to PC","authors":"Abhishek Ekhare, U. Chaskar","doi":"10.1109/ICCICCT.2014.6992923","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6992923","url":null,"abstract":"The fusion of biomedical technology and wireless communication has imparted enormous comfort to both doctor and patient. Using wireless technology, vital patient parameters can be transmitted at remote locations. Also, the alternative to regular home check-ups of patients is remote patient monitoring. This paper presents the design and development of a wireless multiple vital-parameter patient monitoring system. The patient monitoring module transmits the acquired vital signs through a wireless communication module to multiple personal computers. The patient monitoring module incorporates a reconfigurable hardware, and a few selected parameters like electrocardiogram (ECG), heart rate (HR), blood oxygen saturation level (SpO2), non-invasive blood pressure (NIBP) and body temperature are transmitted using wireless technology for remote patient monitoring. The system has been evaluated by technical verification, clinical test, and user survey. The system was tested in the R&D laboratory of Medion Healthcare Pvt. Ltd. The results obtained from these tests are presented in this paper.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"1 1","pages":"21-25"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89728131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-07-10DOI: 10.1109/ICCICCT.2014.6993036
Shubhika Chauhan, S. Shiwani
Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.
{"title":"A honeypots based anti-phishing framework","authors":"Shubhika Chauhan, S. Shiwani","doi":"10.1109/ICCICCT.2014.6993036","DOIUrl":"https://doi.org/10.1109/ICCICCT.2014.6993036","url":null,"abstract":"Honeypots have been extensively used, as a very powerful anti-phishing tool, by IT security experts and financial institutions to gather spurious mails of phishing kind. This has helped the security service providers to detect new phishing sites and quickly shut them down. Honeypots are also deployed to collect critical information about activities of people involved in phishing, helping in generation of statistical data to later aid in security research and forensic investigations. More recently, active feeding of phishers with honeytokens is also proposed as a proactive security mechanism, in line with the “taking the war to their home” approach. In this research paper, we elaborate certain problems of anti-phishing solutions based on honeypots being used currently. We propose to minimize or overcome these limitations/problems by performing the makeover of real online banking system into a large honeypot armed with honeytokens. This large honeypot will be supported by some additional honeypots, to make it more powerful. A phishing attempt detection algorithm, called PhishDetekt, is used to automatically sense dubious phishers' bids of stealing money from victims' bank accounts. The system asks for the potential victim's reconfirmation for the transaction under suspicion. This results in development of a new honeypot-based anti-phishing framework. As a vital component of the proposed framework, we also propose to use virtual honeypots-emulating agents to mimic behavior of real users to access the Online banking system regularly. The main objective of such agents will be to submit honeytokens to phishing malware and to take the fight against phishers to their own territory.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"32 1","pages":"618-625"},"PeriodicalIF":0.0,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87185877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}