{"title":"SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks","authors":"Balu L. Parne, Shubham Gupta, N. Chaudhari","doi":"10.1109/RAIT.2018.8389062","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389062","url":null,"abstract":"The Universal Mobile Telecommunication System (UMTS) was proposed to avoid the weakness observed in the applications of the Global System for Mobile Communication (GSM) system. The UMTS authentication and key agreement (AKA) protocol was the first protocol proposed to authenticate the communication entities in the UMTS network. The protocol fulfills the security demands such as mutual authentication, integrity and confidentiality. However, the existing UMTS-AKA protocol is susceptible to network vulnerabilities that leads to impersonation, denial of service, man in the middle and identity catching attack on the UMTS network. In view of these congenital vulnerabilities of UMTS-AKA, several AKA protocols were proposed by the researchers but these protocols fail to overcome all the security weakness. Moreover, none of the existing UMTS-AKA protocol overcome the single key exposure problem. To overcome these problems, we introduced the security enhanced and computationally efficient (SEACE) protocol for UMTS networks. The proposed protocol preserves the privacy of the MS, resolves the single key exposure problem and avoids all the identified attacks from the communication network. The security analysis of the SEACE-AKA protocol is carried out using Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The analysis shows that the protocol achieves security goals and secure against various known attacks. The performance analysis of the proposed protocol with existing AKA protocols shows that the SEACE-AKA protocol generates less overhead and fulfills all security requirements of the UMTS network.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New single-phase multilevel inverter using less elements count","authors":"S. Biswas, C. Kumar, T. Maity","doi":"10.1109/RAIT.2018.8389004","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389004","url":null,"abstract":"For the AC drive system, the multilevel inverter arrangement gives very favorable results, when there is requirement of lesser harmonic and high power application. This paper introduces a new multilevel converter topology that has more numbers of steps with lesser power electronics switches. This paper also describes a sinusoidal pulse width modulation technique which is suitable for both single phase and three phase system. This topology results in less number of switches, less number of carrier signals, hence reduction in area of installation and total cost and also has less complexity in the control system which improves the performance. The operation and performance of the proposed multilevel converter has been verified by the simulation results of a single-phase 11-level multilevel converter.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS based cloud service composition with optimal set of services using PSO","authors":"Rashda Khanam, R. Kumar, C. Kumar","doi":"10.1109/RAIT.2018.8389039","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389039","url":null,"abstract":"With the increasing number of cloud services, it becomes very difficult to choose a optimal set of cloud services among the many possible composition available for a complicated task. Due to many functionality equivalent cloud service available, QoS (Quality of Service) parameters play a vital role during the selection of the cloud services. This paper introduce a QoS based modified PSO (Particle Swarm Optimization) approach which reduce the search space for cloud service composition. Here, we propose a modified PSO-based cloud service composition algorithm (MPSO-CSC), which first prune dominated cloud services and then employs PSO to find the set of optimal cloud services. We evaluate the proposed methodology on a real QWS dataset. Through experimental result analysis it has been found that proposed approach converges fast and giving optimized result for QoS based cloud service composition.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankesh Raj, Jitesh Pradhan, Arup Kumar Pal, H. Banka
{"title":"Multi-scale image fusion scheme based on non-sub sampled contourlet transform and four neighborhood Shannon entropy scheme","authors":"Ankesh Raj, Jitesh Pradhan, Arup Kumar Pal, H. Banka","doi":"10.1109/RAIT.2018.8389036","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389036","url":null,"abstract":"Optical lenses have limited depth-of-focus, which makes it impossible to capture all significant objects in focus within single picture. Multi-focus image fusion techniques can be adopted to solve the above issue because this technique precisely selects every focused point from all parent images to create final fused image. So, the final fused image contains significantly more information regarding every salient objects. In this paper, we have proposed a novel image fusion technique for fusion of multi-focused images using non-sub sampled contourlet transform. Here, we have adopted contourlet transform due to its high edge discrimination property which enables us to capture all salient object edges from different parent images. In this approach first we have generated noise free gray scale parent images using non-linear anisotropic diffusion technique. Further, in all noise free images we have employed contourlet transform to discover all salient object edges. Later, we have used 4 neighborhood entropy calculation technique based winner-take-all approach to generate final fused image. We have also used different multi-focused image sets for experimental analysis. The outcomes of all the image fusion experiments show better performance as compared to the current-sate-of-arts.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchy-based cheating detection and cheater identification in secret sharing schemes","authors":"S. Banerjee, D. Gupta, G. P. Biswas","doi":"10.1109/RAIT.2018.8389094","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389094","url":null,"abstract":"Secret sharing scheme holds an important position in the domain of cryptography. Shamir's discovery of secret sharing scheme in 1979 followed a concept where a secret is distributed among a set of entrants, where each of the entrants gets a partial information about the secret, called the share, and pooling a minimum number of shares, called threshold, secret reconstruction is accomplished. Though, the original proposal is elegant enough, Tompa and Wall in 1988 suggested that attack by the participants is viable in Shamirs scheme. Since this finding, many works have been carried out to detect cheating and cheaters using various theories. In our work, we modify Shamir's design with the exclusive objective of detecting cheating/ identifying cheaters. We extend Shamir's threshold secret sharing scheme by adding the concept of hierarchy to achieve the objective of finding conspiracy and conspirator(s). We restrict the dealer to generate more number of shares than participants and distribute these shares based on a hierarchical model. The analysis of our design shows how the objective of cheating detection/identification is achieved with high accuracy and professionalism.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk sensitive estimation using cubature quadrature points for system with unmodeled bias","authors":"Swati","doi":"10.1109/RAIT.2018.8389075","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389075","url":null,"abstract":"In this paper risk sensitive estimation based upon cubature quadrature rule for system with model uncertainty due to unmodeled bias is discussed. The system used here is three dimensional discrete time Lorenz attractor, one of the classic icons in non-linear dynamics. A brief discussion over risk sensitive estimation has been given. Risk sensitive estimation using cubature quadrature rule has been discussed. The improvement in performance of this risk sensitive estimator in comparison to its risk neutral counterpart has been shown for system with unmodeled bias.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shivundu Vats, S. Sahoo, P. Tripathi, Vikas, K. Chatterjee
{"title":"Low voltage ride through enhancement of DFIG based WECS using flux control","authors":"Shivundu Vats, S. Sahoo, P. Tripathi, Vikas, K. Chatterjee","doi":"10.1109/RAIT.2018.8389013","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389013","url":null,"abstract":"Doubly fed induction generator (DFIG) is found to be the most successful wind energy generator in last few decade. The direct coupling of stator makes the generating system affected by the disturbance. Previously generators were allowed to disconnect on the occurrence of a fault. However, disconnection makes the whole grid unstable. Grid code demands the generator to remain connected as well needs to satisfy the operating irregularity such as rotor current, stator current and dc-link voltage. The proposed scheme able to restricts these uncertainties and makes assure of converters, rotor circuit and dc-link capacitor protection. The proposed technique incorporates active control scheme using demagnetizing control and passive control scheme includes the series damping resistor (SDR). The simulation is carried out using MATLAB/Simulink based environment. The simulation results reveal the efficacy of the proposed scheme.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127515419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Dhende, S. Shirbahadurkar, S. Musale, Shridhar K. Galande
{"title":"A survey on black hole attack in mobile ad hoc networks","authors":"S. Dhende, S. Shirbahadurkar, S. Musale, Shridhar K. Galande","doi":"10.1109/RAIT.2018.8389073","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389073","url":null,"abstract":"A MANET consists of a group of wireless mobile nodes. These nodes are arbitrarily moving and communicating one another over wireless links. Due to some unique characteristics such as open medium, changing network topology, distributed cooperation, limited battery power, and limited bandwidth information exchange in the MANET becomes challenging job. In infrastructure less network node needs to cooperate to each other to provide necessary network functionality. AODV routing protocol is most preferably used in MANET. An information exchange is an important task in the security of whole network. In this article we study the routing security problems of MANET and examine “Black hole attack” which can easily be employed against the MANET in detail.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114656205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal biometrie recognition using human ear and profile face","authors":"P. Sarangi, B. P. Mishra, Satchidananda Dehuri","doi":"10.1109/RAIT.2018.8389035","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8389035","url":null,"abstract":"In recent years, many researchers have shown interest in combining features of different biometrie traits to improve recognition performance of the biometrie systems. In this paper, we examine the feature-level fusion of two contactless biometric modalities of the same image i.e. ear and profile face. Initially, two most efficient local feature descriptors such as LDP (Local Directional Patterns) and LPQ (Local Phase Quantisation) are used to represent both biometric modalities. Due to combination of two feature descriptors, dimension of the feature sets are increased and so PCA is separately applied to both modalities before normalization and fusion steps. Finally, to obtain more discriminant nonlinear features the Kernel Dis-criminative Common Vector (KDCV) method is employed after fusion to the combined feature vector. Experimental evaluation on University of Notre Dame (Collection E) side face database clearly reveals the proposed method is more efficient to increase the recognition performance over other existing ear based unimodal and multimodal biometric systems.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128371543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A generalized hybrid multilevel inverter with reduced number of switches","authors":"Madan Kumar Das, A. Sinha, K. Jana","doi":"10.1109/RAIT.2018.8388996","DOIUrl":"https://doi.org/10.1109/RAIT.2018.8388996","url":null,"abstract":"This paper demonstrates about a novel multilevel inverter (MLI) structure designed with reduced number of switches that can be worked in both symmetric as well as asymmetric DC link voltages. Also, the proposed model can be extended to a generalized n level inverter. The carrier based, Level shifted PWM (LS-PWM) technique is used to generate the gate pulses of the proposed inverter. The proposed MLI is simulated using the MATLAB/SIMULINK platform and verified by the experimental results. The simulation results of a specimen seven level symmetrical inverter as well for a nine-level asymmetrical inverter is presented in the paper. The corresponding experimental results are also presented for the different modulation index.","PeriodicalId":219972,"journal":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129365820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}