D. Sharma, Shubham Kumaram, Samarth Chugh, Saarthak Singh
{"title":"The Effect Of Acknowledgements On Performance Of Opportunistic Routing Protocols","authors":"D. Sharma, Shubham Kumaram, Samarth Chugh, Saarthak Singh","doi":"10.1109/PDGC.2018.8745876","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745876","url":null,"abstract":"Opportunistic Network (OppNets) is one of the latest evolution of mobile ad-hoc networks, which consists of highly mobile nodes prone to frequent disconnections. These networks have little to no infrastructure and are generally sparse. As such, no end-to-end path may exist between the source and the destination. These networks use the above mentioned characteristics as means of data transfer as opposed to a hindrance, and therefore routing in OppNets is a paradigm shift from that in traditional wireless networks. Many of the proposed routing protocols for OppNets rely on some kind of flooding, but since the nodes in OppNets have limited resources, it is imperative that the flooding must be controlled. This paper observes the effects of adding an acknowledgment system to various proposed routing protocols in order to prevent already delivered messages from persisting in the network, thus reducing the total network congestion.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-aware Virtual Machine Selection and Allocation Strategies in Cloud Data Centers","authors":"Harvinder Singh, S. Tyagi, Pardeep Kumar","doi":"10.1109/PDGC.2018.8745764","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745764","url":null,"abstract":"These days, information technologies are expanding exponentially so the need for high-speed processors and huge storage space are developing quickly. As a result of increasing requests, more resources are required to satisfy the client's necessities. Thus, in a cloud environment, the large number of resources consumes a lot of energy during their operation, which is turned into a key issue nowadays and demands a critical discussion in the present scenario. This research paper investigates and explores the literature on the assignment of virtual machines to hosts in a data center according to variable workload requests of different cloud consumers application executing on the virtual machines. The choice of ideal virtual machines and their placement on host prompts to limit the energy utilization. This paper proposes an algorithm for improving virtual machine selection and allocation strategies in cloud data centers. The proposed algorithm is then compared with existing algorithms on the basis of performance metrics like energy consumption and VM migrations using different threshold values. As a result, the proposed algorithm emerged to be the optimized one in enhancing the use of cloud resources by lessening the energy utilization of datacenter.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117206945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Loss Packet Percentage for Asymmetric Key Cryptography in VANET","authors":"R. Nirala, Mohd Dilshad Ansari","doi":"10.1109/PDGC.2018.8745798","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745798","url":null,"abstract":"Vehicular technology & communication systems provides road safety and driving comfort. This work is concerned with the security required in VANETs. Vehicle to infrastructure communication (V2I) is the communication between the vehicles and road side infrastructure. In this paper, we have evaluated the performance of non-grouping vehicles in V2I communication using asymmetric keys. As asymmetric keys are used, non-repudiation is achieved by the properties of asymmetric key cryptography. The simulations have been carried out to analyze the performance as Loss packet percentage (LPG). The obtained results clearly shows that the new improvements has been suggested in this research domain.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117247420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric Authentication using Soft Biometric Traits","authors":"Rishabh Garg, Anisha Arora, Saurabh Singh, Shipra Saraswat","doi":"10.1109/PDGC.2018.8745766","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745766","url":null,"abstract":"For secure computing and networking systems in the modern day, passwords and physical tokens alone do not serve a major purpose in a user's authentication. Traditional systems of security including the biometric systems, authenticate individuals at the time of login only and no further identification or verification is performed during the activity session of the user. This results for a compromised system of security resulting in the need for a system with greater robustness. This survey paper focuses on the need for a continuous authentication through soft biometrics and explores the alternatives for various systems applying soft biometrics and also considers a multimodal approach of biometrics, towards the user and system usability and security. This survey is intended for further researches and practice in the domain of biometrics.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125069718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trace Driven Simulation Study of VM Consolidation Algorithms in Cloud Computing","authors":"Nagma, Jaiteg Singh, J. Sidhu","doi":"10.1109/PDGC.2018.8745828","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745828","url":null,"abstract":"Virtual machine consolidation is a prominent method for decreasing consumption of energy in cloud computing. Tremendous amount of work is found in literature for development of techniques for hosts underload, overload detection, virtual machine selection and placement to perform consolidation. The major data set used for testing the performance of these algorithms is publicly accessible Planet lab workload trace. It is essential to know the behavior of standard algorithms for virtual machine consolidation on different workload traces. This paper evaluates the performance of these algorithms on Bitbrains and Google cluster trace. The simulations are planned and performed on CloudSim platform. Results of execution of algorithms on Bitbrains trace are compared with Google workload trace. Results indicate that energy consumption, number of virtual machine migrations, number of hosts and service level agreement violation time per active host of best algorithms differ by 50.2%, 13.6%, 73.9% and 57.1% respectively. Results of objectively comparing these algorithms can contribute in formation of future research strategy in VM consolidation.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"82 Suppl 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123273011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIW based Leaky wave antenna with Semi C-shaped slots and its Modeling, Design and parametric considerations for different materials of Dielectric","authors":"Manvinder Sharma, Harjinder Singh","doi":"10.1109/PDGC.2018.8745966","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745966","url":null,"abstract":"Although waveguide structures are having advantages of carrying high power capacity with high quality factor, but also had disadvantages as they were bulky, this lead to SIW which is promising technology which features both high power capacity and compact in size. leaky wave Antenna is Travelling Wave Antenna which can be made easily on this Substrate Integrated Waveguide (SIW) structure. In this paper, Modeling of SIW based Leaky Wave Antenna (LWA) with Semi C- Shaped Slots has been designed and analyzed to investigate the effects of different dielectric materials on its operating parameters of electric field, transmission gain, return losses and polar far field. Silicon(Si), Printed Circuit Board (PCB), polymethyl methacrylate (PMMA), Mica and fused silica (quartz) are used as different dielectric materials to evaluate the results in frequency domain for 9.5 GHz. Design steps for modeling LWA were orderly pursued also optimized with various equations followed by finite element method based modeling. The result obtained after simulation had showed maximum electric field is observed for PMMA and return loss is −47 dB at frequency of 9.5 GHz directivity gain of antenna 1.2dB and half power beamwidth is 27°.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vora, Darshan Vekaria, S. Tanwar, Sudhanshu Tyagi
{"title":"Machine Learning-based Voltage Dip Measurement of Smart Energy Meter","authors":"J. Vora, Darshan Vekaria, S. Tanwar, Sudhanshu Tyagi","doi":"10.1109/PDGC.2018.8745738","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745738","url":null,"abstract":"In recent times, a huge amount of data is generated often termed as big data. Specifically, from the viewpoint of the smart grid paradigm, which contains information about various features in the grid. Motivated from the aforementioned points, in this paper, we introduce a novel concepts of big data and extend it to highlight its influence on the smart grid system. This study is focused on implementing existing approaches to analyse the data available, using the deep learning algorithms. An implementation is undertaken with its results analysed and thoroughly discussed to convey the effectiveness of the approaches. The space phasor model displays substantial information about the voltage dips and allows us to create a smart energy meter. The meter allows to have a minimalistic turn around time for analysis.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126605681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Static Web Vulnerability Analysis Tools","authors":"Shobha Tyagi, Krishan Kumar","doi":"10.1109/PDGC.2018.8745996","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745996","url":null,"abstract":"In the recent years many web applications of different kinds has grown significanlty all over the world. Unfortunately on the other hand, there is an increase in the number of attacks on these applications. Hence, security against web application vulnerabilities become necessary. However, checking all web vulnerabilities manually is tedious and needs much effort and skills. So the use of web application vulnerability scanners becomes necessary. Many static and dynamic, open source and commercial vulnerability analysis tools are available. In this paper, we evaluate two open source, static web application vulnerability analyses tools, OWASP WAP and RIPS using the deliberately vulnerable web application. These are Damn Vulnerable Web Application (DVWA) and A Buggy Web Application (bWAPP). OWASP WAP and RIPS tools are selected as they are open source static tools WAP is recommended by OWASP and RIPS provide commercial versions as well. We used deliberately vulnerable web applications so that the vulnerabilities detected could be easily analyzed whether they are true positive or false positive. We found that OWASP WAP give better results over RIPS in our experimental scenario.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116019621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Analytics: Performance Evaluation for High Availability and Fault Tolerance using MapReduce Framework with HDFS","authors":"J. P. Verma, Sapan H. Mankad, Sanjay Garg","doi":"10.1109/PDGC.2018.8745770","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745770","url":null,"abstract":"Big data analytics helps in analyzing structured data transaction and analytics programs that contain semi-structured and unstructured data. Internet clickstream data, mobile-phone call details, server logs are examples of big data. Relational database-oriented dataset doesn't fit in traditional data warehouse since big data set is updated frequently and large amount of data are generated in real time. Many open source solutions are available for handling this large scale data. The Hadoop Distributed File System (HDFS) is one of the solutions which helps in storing, managing, and analyzing big data. Hadoop has become a standard for distributed storage and computing in Big Data Analytic applications. It has the capability to manage distributed nodes for data storage and processing in distributed manner. Hadoop architecture is also known as Store everything now and decide how to process later. Challenges and issues of multi-node Hadoop cluster setup and configuration are discussed in this paper. The troubleshooting for high availability of nodes in different scenarios for Hadoop cluster failure are experimented with different sizes of datasets. Experimental analysis carried out in this paper helps to improve uses of Hadoop cluster effectively for research and analysis. It also provides suggestions for selecting size of Hadoop cluster as per data size and generation speed.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122388622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on IoT: Model, Communication Protocols, Security Hazards & Countermeasures","authors":"Manju Bagga, Prateek Thakral, Tarun Bagga","doi":"10.1109/PDGC.2018.8745984","DOIUrl":"https://doi.org/10.1109/PDGC.2018.8745984","url":null,"abstract":"IoT is an extreme speed technology comprises of smart things or objects that communicate with one another and ease the job of our daily life. The most common applications of IoT are smart homes, wearables, connected cars, smart cities, smart retail, agriculture, healthcare etc. It is a big revolution in the history of the Internet. Things that connect to the Internet have a lot of chances of potential risks. The IoT applications use sensitive data that is more susceptible to attacks, so we have to compromise the security. Beginning with introducing the IoT model and communication protocols, this paper surveys several security attacks at each layer of IoT model and corresponding countermeasures to protect such a huge heterogeneous network.","PeriodicalId":303401,"journal":{"name":"2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122946095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}