International Confernce on Innovation Information in Computing Technologies最新文献

筛选
英文 中文
An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks 无线传感器网络中一种简易的分层黑洞检测算法
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396103
A. Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram
{"title":"An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks","authors":"A. Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram","doi":"10.1109/ICIICT.2015.7396103","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396103","url":null,"abstract":"Due to the specific characteristics, Wireless Sensor Networks (WSN) are severely unsafe and are open to malicious attacks. One of the most malicious threats to WSN is in the form of black hole attack that target the routing protocols. This genre of attacks can have a very serious impact on hierarchical routing protocols. A variety of security solutions have been put forth to safeguard WSNs from black hole attacks. However, a majority of the solutions are cumbersome and vitality inefficient. In this paper an improvised hierarchical vitality efficient intrusion detection system is proposed, to protect sensor Network from black hole attacks. Our proposed approach is simple and is based on exchange of control packets between sensor node and base station. The results show that our proposed algorithm is effective in detecting and preventing efficiently the black hole attacks.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114397940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Animal identification and data management using RFID technology 使用RFID技术进行动物识别和数据管理
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396069
V. Anu, M. Deepika, L. Gladance
{"title":"Animal identification and data management using RFID technology","authors":"V. Anu, M. Deepika, L. Gladance","doi":"10.1109/ICIICT.2015.7396069","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396069","url":null,"abstract":"Efficient identification of tags has been an essential operation for Radio Frequency IDentification (RFID) systems. In this paper, we consider the basic problem of collecting all tags in a large-scale system through a handheld RFID reader. A sensor network which uses wireless technology is proposed for monitoring of farm animals. The major parts of the farm environmental system are monitoring centre, monitoring nodes and base station. Intricate farm animal monitoring is done across intensive area. This paper is contributes and illustrates a new farm environment monitoring system design. Animals in specified range are connected by sending the continuous information to the readers. This system provides the potential support from threats against missing animals from the farm and database security.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Survey of access control models for cloud based real-time applications 基于云的实时应用访问控制模型综述
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396065
B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya
{"title":"Survey of access control models for cloud based real-time applications","authors":"B. Balamurugan, N. G. Shivitha, V. Monisha, V. Saranya","doi":"10.1109/ICIICT.2015.7396065","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396065","url":null,"abstract":"Cloud computing is one of the prominent technologies in this century. Due to its various features and capabilities, it attracted a large population towards it. Cloud is a huge pool of resources which is owned and managed by the third parties collectively called as Cloud Service Provider (CSP). The users enjoy the freedom in using the resources at their ease that has been deployed in the cloud. Irrespective of the place, the computing resources could be accessed by the user via internet services. It also provides the advantage of using the cloud services as per end user's demand. As each coin has two faces, the cloud computing strategy also has an evil face. The major drawback lies in securing the sensitive information and preserving the privacy details. To throw light upon this fact and to overcome this, a new terminology has been emerged in the cloud environment called \"Access Control\". This Access Control has travelled a long way in recent times. Among many techniques of access control, DAC, MAC, RBAC and ABAC prove to clear the security issues prevailed in cloud storage environment. Today's business market is totally depends on real-time applications and E-shopping applications as the country's major economy is derived from it. Many eminent researches have been carried out by the scientists to apply the access control in application scenario. In this paper, we have analysed the major business applications, the security issues currently faced by them and we have suggested which of the access control models would be efficient to make them more secure and enjoyable to use.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy preserved mobicast routing prorocol with static node for underwater acoustic sensor network 基于静态节点的水声传感器网络保能移动广播路由协议
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396098
R. Gomathi, J. Manickam, T. Madhukumar
{"title":"Energy preserved mobicast routing prorocol with static node for underwater acoustic sensor network","authors":"R. Gomathi, J. Manickam, T. Madhukumar","doi":"10.1109/ICIICT.2015.7396098","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396098","url":null,"abstract":"In this paper, the proposed approach efficiently reduces the energy consumption in Mobicast routing protocol for 3D underwater sensor networks (USN). Many numbers of sensor nodes exist in the 3-D USN, which are deployed in the 3-D environment and sensor nodes be buoyant at dissimilar profound to monitor a specific phenomenon. The autonomous underwater vehicle (AUV) travels along a path which is defined by the user to fetch the sensing data from an underwater sensor node. The Mobicast routing protocol for underwater sensor networks is used to afford a spatiotemporal solution for the underwater sensor networks and also it provides an efficient data collection and an energy saving routing protocol for the USN. The proposed approaches use a static sensor node which collects the gathered data from other nodes in its region and send these collected data to AUV when it enters 3-D ZOR, thereby reducing the energy used for transmission. The performance is analyzed and simulation result of new Mobicast protocol shows that the sufficient data delivery rate and low energy consumption.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125655212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A survey on vulnerable attacks in online social networks 在线社交网络中易受攻击的调查
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396102
G. Nalinipriya, M. Asswini
{"title":"A survey on vulnerable attacks in online social networks","authors":"G. Nalinipriya, M. Asswini","doi":"10.1109/ICIICT.2015.7396102","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396102","url":null,"abstract":"An online social network(OSN) also referred to as a virtual community is a website on the Internet that serves as an ultimate location for people from different geometric locations to talk, share photos, ideas and interests, or make new friends. With the rapid increase in popularity and large number of user base, the online social networks also face an alarming rate of increase in security treats. The online social networking providers destine to secure their users; but the intruders and attackers are able to outsmart the security measures by exploiting user's privacy, identity and confidentiality using several techniques. Most of the users in social networking sites might be unaware of the existence of these critical threats. This paper highlights the major security issues concerning the online social networks. Also provides an overview of existing models that focus on ensuring security of user data.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130812302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Secure mobile grid environment defeating wormhole attacks and scam users 安全的移动网格环境击败虫洞攻击和诈骗用户
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396085
S. Vimala, T. Sasikala
{"title":"Secure mobile grid environment defeating wormhole attacks and scam users","authors":"S. Vimala, T. Sasikala","doi":"10.1109/ICIICT.2015.7396085","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396085","url":null,"abstract":"The mobile Grid emerging as a successful technology in Grid Computing incorporates Laptops, PDAs and sensor devices into their network. As the technology develops the number of mobile-grid users tends to increase. The existing security work in Grid Computing is primarily focused on authentication and authorization of Grid service. It lacks to concentrate on malicious attacks that ensue during communication between resources. In this paper, we provide security considering various wormhole attacks and scam users in mobile grid environment. This method adopts group key management system for authentication and provides an efficient detection and prevention method for malicious Wormhole attacks. This security system presents an exceptional security to the data as well as the resources that participate in the grid.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"118 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple network blasts — Malicious catching and defect node retrieval system 多重网络爆炸-恶意捕获和缺陷节点检索系统
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396062
Rajalakshmi., Umamaheswari
{"title":"Multiple network blasts — Malicious catching and defect node retrieval system","authors":"Rajalakshmi., Umamaheswari","doi":"10.1109/ICIICT.2015.7396062","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396062","url":null,"abstract":"Wireless multiple blasts like sybil blast, worm hole blast, black hole blast, Internet Protocols address faking blast and Mac address faking blast are easy to launch and can significantly impact the performance of networks. Although the identity and security of a node can be verified through various security mechanisms are not always suitable to improve the wireless network performance and fault node cannot be easily recover from the blasts. In this paper, I propose to use distributed detection algorithm to efficiently measure the performance of networks and handle those blasts in accurate and separate manner. In extension to distributed detection algorithm a three separate intrusion detection system is proposed to detect these types of blasts efficiently with good accuracy. Local monitoring algorithm is proposed to detect the multiple blasts. After detecting these blasts the blaster nodes are eliminated. The simulation result shows better performance of our proposed system. I evaluated our techniques through two test beds in two different networks. Our experimental results show that our proposed methods can achieve over 96 percent Hit Rate and Precision when determining the sybil blast, worm hole blast, black hole blast, Internet Protocols address faking blast and medium access control address faking blast.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134640432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Excluding compromised node by tracing false data injected messages in Wireless Sensor Network 在无线传感器网络中,通过跟踪假数据注入消息来排除受损节点
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396096
S. Geedhabhanu, P. Latha
{"title":"Excluding compromised node by tracing false data injected messages in Wireless Sensor Network","authors":"S. Geedhabhanu, P. Latha","doi":"10.1109/ICIICT.2015.7396096","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396096","url":null,"abstract":"Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. They help in supervising all the mission critical applications instead of depending on humans in monitoring cynical areas. Sensor nodes play a important role in alerting us any distinct changes that occur in the sited area and is prone to innumerous attacks. These attacks damage trust with the received data from a sensor node. One such type of attack is the false data injection attack. The message is forged by the adversary, not detected by the forwarding nodes as false information. Compromised node is the origin of false data to be injected in to the WSN. The proposed work discards the false data injected message from the network. This issue of compromised node is handled by the detection and elimination of it from causing further damage to the network by incorporating Elliptical Curve Cryptography (ECC) technique for data authentication to any message received. A node involved in sensing requires a high range of sensing power. But sensor nodes have limited energy and this is a battle for all technicians in creating any inventions that suits this constraint. The proposed scheme provides safety and reliability over the received data and offers less power consumption and memory utilization of the sensor node.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A closed-loop rate adaptive scheme for IEEE 802.11 multi-rate wireless networks IEEE 802.11多速率无线网络的闭环速率自适应方案
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396076
A. Anupriya, P. Kumar
{"title":"A closed-loop rate adaptive scheme for IEEE 802.11 multi-rate wireless networks","authors":"A. Anupriya, P. Kumar","doi":"10.1109/ICIICT.2015.7396076","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396076","url":null,"abstract":"Closed-loop rate adaptive scheme is mutually considered both the rate and CW values. CRAS is a receiver-assisted rate adaptation protocol. It also considers the loss of frames due to collisions. The information about atmosphere energy level of a sender is carried via the DATA packet with one extra byte. It introduces a rate suggestion (RS) chart, that received via continuously observing the atmosphere energy level and obtaining performance. The RS chart is used to guide the receiver to select the most excellent proper rate for the sender. CRAS algorithm maintains high throughput comparable to other adaptation techniques.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information centric network for secure data transmission in DTN DTN中安全数据传输的信息中心网络
International Confernce on Innovation Information in Computing Technologies Pub Date : 2015-02-01 DOI: 10.1109/ICIICT.2015.7396101
V. Priya, B. Sakthisaravanan
{"title":"Information centric network for secure data transmission in DTN","authors":"V. Priya, B. Sakthisaravanan","doi":"10.1109/ICIICT.2015.7396101","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396101","url":null,"abstract":"Delay Tolerant Network (DTN) is characterized by mobile nodes and dynamic network topology. There are some selfish / malicious nodes (termed as misbehaving) present in the network resulting in the packet loss. Currently these are identified only after data transmission. The core idea of this paper is to ensure secure data transmission in DTN in the presence of misbehaving nodes. This is achieved by means of ICN (Information Centric Network) which supports node mobility and interactivity. Here ICN is used along with DTN. ICN intimates about misbehaving nodes in the path so that alternative path is chosen. The packets reaches the destination safely. This paper will be implemented in two parts. In the first part the misbehaving nodes are identified. In the second part alternative path is chosen for the packets so that further transmission by misbehaving nodes is prevented. Thus the proposed system ensures secure data transmission in the network.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信