{"title":"Creating a Double Lock with the Help of Sound Programming and Image Programming for the Security of Data for Remote Location Treatment in Body Area Network","authors":"P. Kumar, Anand Sharma","doi":"10.1109/SYSMART.2018.8746970","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746970","url":null,"abstract":"Body area network is creating engineering with medical science, and internet technology will take over in facilitating medical services to offer treatment at the remote destination. Advances in wireless technologies are perfectly allowing secure data communication. It allows for quality through mobile to mobile standardization and creating analyses for marketing and development specifically for medical applications. Market profit for Wireless Body area network is also taking concerns from different governments as to enhance remote medical facilities. Secure data transfer is also a prime concern of body area network technology, so cryptographic algorithms are required. This paper will propose an algorithm for authentication with the optimization process, using image data, sound data for cryptographic key management and a genetic algorithm for treating a patient through body area network technique. IEEE standards are allowing these technologies for this development are like ZigBee. Bluetooth etc. are the technologies of prime concern for body area networks. This paper will also demonstrate very possibility of sound that can be used as a key. Sound programming is the purest area for the utility of human culture. This paper is establishing more thoughts in the sound engineering area. Strings from image and sound can use as a double lock.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dishant Grover, Shivangi Kochhar, Ananya Sharma, Ashima Mittal, P. Nagrath
{"title":"An Efficient Lightweight Game Theory Based Intelligent Routing Protocol in Sparsely Connected Opportunistic Networks","authors":"Dishant Grover, Shivangi Kochhar, Ananya Sharma, Ashima Mittal, P. Nagrath","doi":"10.1109/SYSMART.2018.8746965","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746965","url":null,"abstract":"Delay or disruption tolerant network (DTN) is a kind of an ad hoc networking i.e. where no infrastructure is available and no end to end connectivity is present. Nodes in DTN use Store and Forward technology (SFT) while communicating with each other and forwarding messages. There are limited resources in DTN. Sometimes a node misbehaves or act selfish by dropping the messages received by it, thus saving their resources (buffer and power). It lowers the delivery ratio and increases the overhead. To overcome this problem we used the concept of Game Theory which is a systematic and analytical study of tactical and complex interactions among entities or rational individuals having limited network resources (power/ bandwidth) present in the system in a challenged environment. Game theory helps in increasing the understanding of participants to behave rationally in the system. In this paper, the game theory is implemented in DTN environment and also focused its relationship with energy of the system and answered the question whether it makes the system energy efficient.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115701027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Privacy in IoT based E-Business and Retail","authors":"Keshav Kaushik, Susheela Dahiya","doi":"10.1109/SYSMART.2018.8746961","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746961","url":null,"abstract":"Interconnection of various \"things\" are resulting into many issues related to security and privacy of IoT platform. With the advancement in technology, many e-businesses and retail stores are using IoT based solutions for their sale, marketing, productivity and promotions. These IoT based solutions are much helpful in providing various benefits to owner and customers. However, these solutions are vulnerable to many security and privacy based concerns. This paper addressed the rise of cyber threats in IoT, Enterprise view of IoT for E-Business & Retail Security, advancements in e-business and retail because of IoT, flow of threat agents related to security and privacy concerns in e-business and retail.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART 2018 Track V Signal Image & Communicational Technology [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746944","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746944","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node Clustering in Wireless Sensor Networks using Fuzzy Logic: Survey","authors":"Richa Sharma, Vasudha Vashisht, Umang Singh","doi":"10.1109/SYSMART.2018.8746977","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746977","url":null,"abstract":"Selecting a deserving node as a cluster head (CH) has a symbolic impact on the energy efficient working of Wireless Sensor Networks (WSNs). With the reduction in network’s energy utilization, its lifetime can be increased up to a great extent. Clustering is a mechanism that helps in addressing both these issues efficiently. However, clustering also faces few challenges like making adequate decision during cluster head selection. This challenge arises due to the uncertain and dynamic nature of WSNs originated because of the random deployment of the sensor nodes in them. This paper tries to illustrate the potential of one of the soft computing paradigms i.e. fuzzy logic in overwhelming these issues in clustering WSNs. Since, Fuzzy Logic (FL) has the capability of simulating the mental process of human mind to observe, learn and understand things in the presence of uncertainty. So, this paper presents a systematic review of different fuzzy and hybrid fuzzy based approaches for handling clustering in WSNs.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART 2018 Track II IOT & Wireless Communication [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746973","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746973","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Biometric Method for Authentication of User in Internet of Things","authors":"J. Kaur, J. Sengupta","doi":"10.1109/SYSMART.2018.8746952","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746952","url":null,"abstract":"In near future, the world will be completely associated and the quantity of smart gadgets will develop to an extensive number, we can state ten times the human populace. IoT shall bring plethora of advantages and ease in our habitual life. But what about all the data including personal information, location monitoring, daily routine etc. be shared and stored over internet. In direction to maintain privacy of a user, we designed a hybrid biometric validation scheme for users access to a smart object. Our proposed system is the combination of users fingerprint and speech and it shows feasible results and guaranteed privacy of a user. In other words, our system will help building trust among the user who will be using intellectual body and making them feel secure on going away from the objects as only the validated user will be able to access the object.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART 2018 Track IV Communication and Network Broadcast [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746969","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746969","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124060005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART 2018 Track III Digital India Initiative [breaker page]","authors":"","doi":"10.1109/sysmart.2018.8746844","DOIUrl":"https://doi.org/10.1109/sysmart.2018.8746844","url":null,"abstract":"","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124296559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maksimova Elena, Zaikina Yuliya, V. Ekaterina, Ozhiganova Marina, T. Lily, Babenko Alexey
{"title":"The Model of Data Protection in the Geographic Information System of Housing and Communal Services","authors":"Maksimova Elena, Zaikina Yuliya, V. Ekaterina, Ozhiganova Marina, T. Lily, Babenko Alexey","doi":"10.1109/SYSMART.2018.8746933","DOIUrl":"https://doi.org/10.1109/SYSMART.2018.8746933","url":null,"abstract":"At present, the technologies of geoinformation systems are rapidly developing and cover more and more fields of application, one of which is the housing and communal services. However, certain cartographic data used in the geoinformation system of housing and communal services (hereinafter referred to as \" GeoIS HCS \") belong to information classified as state secret. This restriction requires the fulfillment of strict requirements for the protection of information and imposes a responsibility on users of information. In this regard, the article examines the problem of ensuring the safe storage, transmission and processing of information in all segments of the GeoIS HCS. To solve this problem, we analyzed: legislation in the field of cartographic data; types of data used in GeoIS HCS, methods of transformation of cartographic data and threats to GeoIS HCS.For the discussion, a model of data protection for GeoIS HCS is proposed, for which the software implementation has been carried out. The results of experimental studies on modeling situations for the implementation of threats to information security of cartographic data are presented.The effectiveness of the developed model was compared with the current model of the functioning of the GeoIS HCS. The model has a number of advantages and is able to ensure the safe transformation and transfer of cartographic data to the GeoIS HCS.","PeriodicalId":123657,"journal":{"name":"2018 International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"24 26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}