2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)最新文献

筛选
英文 中文
Implementation of digital lock-in and concentration measurement for Wavelength Modulation Spectroscopy (WMS) based sensors using MATLAB 利用MATLAB实现波长调制光谱(WMS)传感器的数字锁定和浓度测量
Manish Chandra, Aditi Sharma, Amrit Roy, A. Venkatesh, S. S. Kamble, J. K. Radhakrishnan, U. K. Singh
{"title":"Implementation of digital lock-in and concentration measurement for Wavelength Modulation Spectroscopy (WMS) based sensors using MATLAB","authors":"Manish Chandra, Aditi Sharma, Amrit Roy, A. Venkatesh, S. S. Kamble, J. K. Radhakrishnan, U. K. Singh","doi":"10.1109/SSPS.2017.8071619","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071619","url":null,"abstract":"Wavelength Modulation Spectroscopy (WMS) using tunable diode laser is a versatile method for determination of concentration, temperature and velocity of absorbing gaseous molecules. This technique finds major application in industrial and scientific areas. An important component of sensors/systems based on these techniques is the phase sensitive detection for demodulation, in the form of hardware or software based lock-in amplifier. This paper presents the details of (a) a MATLAB based Digital Lock-in amplifier technique for extraction of harmonics (1f & 2f), from the wavelength modulated optical absorption signal, and (b) a MATLAB based program for calculating the oxygen concentration from 1f and 2f harmonics. The oxygen concentration has been measured using MATLAB implemented digital lock-in-amplifier and concentration computation formula. The deviation in the measured Oxygen concentration from the actual Oxygen concentration supplied through the mass flow controllers is less than 1%. The oxygen concentration measured using digital Lock-in amplifier has a deviation within 0.2% as compared to measurement from hardware measuring device.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127449697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle network security testing 车辆网络安全测试
Jihas Khan
{"title":"Vehicle network security testing","authors":"Jihas Khan","doi":"10.1109/SSPS.2017.8071577","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071577","url":null,"abstract":"In-vehicle networks like Controller Area Network, FlexRay, Ethernet are now subjected to huge security threats where unauthorized entities can take control of the whole vehicle. This can pose very serious threats including accidents. Security features like encryption, message authentication are getting implemented in vehicle networks to counteract these issues. This paper is proposing a set of novel validation techniques to ensure that vehicle network security is fool proof. Security validation against requirements, security validation using white box approach, black box approach and grey box approaches are put forward. Test system architecture, validation of message authentication, decoding the patterns from vehicle network data, using diagnostics as a security loophole, V2V V2X loopholes, gateway module security testing are considered in detail. Aim of this research paper is to put forward a set of tools and methods for finding and reporting any security loopholes in the in-vehicle network security implementation.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125848998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Mutual authentication for IoT smart environment using certificate-less public key cryptography 使用无证书公钥加密的物联网智能环境相互认证
Dania Qara Bala, Soumyadev Maity, S. K. Jena
{"title":"Mutual authentication for IoT smart environment using certificate-less public key cryptography","authors":"Dania Qara Bala, Soumyadev Maity, S. K. Jena","doi":"10.1109/SSPS.2017.8071559","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071559","url":null,"abstract":"Key management and authentication play an important role in ensuring secure communication in Internet of Things (IoT). Traditional key management protocols cannot be used in IoT because of its discriminating characteristics. Mutual authentication between a resource constrained sensor node inside a smart environment and a remote end-user is a challenging task in IoT authentication. In this paper, we propose a novel protocol for this purpose which eliminates the use of certificate management by making use of the certificate-less public-key cryptography (CL-PKC) technique. Moreover, we do not require the resource constrained sensor nodes to execute public key cryptography. Our proposed protocol is secure against node impersonation attack and replay attack.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Jellyfish attack detection and prevention in MANET MANET中水母攻击的检测与预防
B. Pooja, M. Manish, B. P. Megha
{"title":"Jellyfish attack detection and prevention in MANET","authors":"B. Pooja, M. Manish, B. P. Megha","doi":"10.1109/SSPS.2017.8071564","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071564","url":null,"abstract":"Jellyfish attack is type of DoS attack which is difficult to detect and prevent. Jellyfish attack is categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. JF attack delay data packets for some amount of time before forwarding and after reception which results high end-to-end delay in the network. JF Attack disrupts whole functionality of transmission and reduces the performance of network. In this paper difference of receive time and sending time greater than threshold value then delay occur due to congestion or availability of JF nodes that confirm by checking load of network. This way detect and prevent jellyfish attack.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigation on dielectric resonator antennas 介质谐振器天线的研究
Surendra Kota, N. Gunavathi
{"title":"Investigation on dielectric resonator antennas","authors":"Surendra Kota, N. Gunavathi","doi":"10.1109/SSPS.2017.8071558","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071558","url":null,"abstract":"The area of wireless communications has been increased from last decade. The success of the second-generation(2G) motivates the development of wideband 3G, 4G, cellular phones and other wireless products and services, including WLAN, local multi-point distributed networks(LMDS), home RF, Bluetooth etc. The crucial component of wireless network is the antenna. Even though our cities flooded with antenna of different kinds of shapes, maximum we prefer safety, low return loss, low power, multifunctional and multi band devices. All the above demands will be fulfilled by the development of highly efficient, small-size, low-profile antennas like micro strip and dielectric resonant antennas (DRAs) in wireless domain. The dielectric resonant antennas are highly preferred when compare to other antennas because of its negligible metallic losses at higher frequencies. In this paper i analyze how to increase impedance bandwidth in Hemispherical DRAs especially for Wi-Fi applications and i compare HDRA characteristics for different layers and with rectangular DRA.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129653368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure three-party authentication protocol for wireless body area networks 无线体域网络的安全三方认证协议
Rahul Vishwakarma, R. Mohapatra
{"title":"A secure three-party authentication protocol for wireless body area networks","authors":"Rahul Vishwakarma, R. Mohapatra","doi":"10.1109/SSPS.2017.8071573","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071573","url":null,"abstract":"Wireless Body Area Network (WBAN) is one of the most rapidly growing technologies in the field of healthcare. However, providing a secure communication system over WBAN is a challenging task due to the sensitive data exchanged in resource-constrained WBAN. In this paper, we propose an efficient three-party authentication protocol for WBAN using Elliptic Curve Cryptography (ECC). We are using two-hop star network topology based on WBAN standard. The analysis results of BAN Logic and AVIS PA tool provide the security proofs of the proposed protocol. Moreover, the implementation results prove the efficiency of our proposed protocol.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129751496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis of supervised machine learning techniques for sentiment analysis 情感分析中监督式机器学习技术的性能分析
Biswaranjan Samal, Anil Behera, M. Panda
{"title":"Performance analysis of supervised machine learning techniques for sentiment analysis","authors":"Biswaranjan Samal, Anil Behera, M. Panda","doi":"10.1109/SSPS.2017.8071579","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071579","url":null,"abstract":"Wide use of internet and web applications like, feedback collection systems are now making peoples smarter. In these applications, peoples used to give their feedback about the movies, products, services, etc through which they have gone, and this feedback are publicly available for future references. It is a tedious task for the machines to identify the feedback types, i:e positive or negative. And here Machine Learning Techniques plays vital roles to train the machine and make it intelligent so that the machine will be able to identify the feedback type which may give more benefits and features for those web applications and the users. There are many supervised machine learning techniques are available so it is a difficult task to choose the best one. In this paper, we have collected the movie review datasets of different sizes and have selected some of the widely used and popular supervised machine learning algorithms, for training the model. So that the model will be able to categorize the review. Python's NLTK package along with the WinPython and Spyder are used for processing the movie reviews. Then Python's sklearn package is used for training the model and finding the accuracy of the model.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Energy efficient routing in mobile Ad-hoc network 移动Ad-hoc网络中的节能路由
K. Rinku, M. Manish, B. P. Megha
{"title":"Energy efficient routing in mobile Ad-hoc network","authors":"K. Rinku, M. Manish, B. P. Megha","doi":"10.1109/SSPS.2017.8071563","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071563","url":null,"abstract":"MANET is kind of mobile ad hoc network. MANETs are having self organizing and self configuring network and there is no centralized base station. In routing forwarding the data packets on one node to another node is core problem in the networks. Overcome to this problem to build up challenging task an efficient routing algorithm in MANET. Here we proposed method energy for routing in MANET and based on signal strength. Received Signal Strength (RSS) measured distance between two nodes. If value of RSS is greater than Th_RSS than intermediate node compare value of RSS and Th_RSS then accepted RREQ packet otherwise drop the packet and send to the next node it calculate node energy. If value of RSS is greater than Th_RSS than intermediate node will compare the value of residual energy RE with Energy_ threshold and value of queue length QLen with threshold of squeue length Th_QLen, then send RREQ packet next node otherwise drop the packet. This method is increases in network lifetime.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Low voltage low power sub-threshold operational amplifier in 180nm CMOS 180nm CMOS低电压低功率亚阈值运算放大器
C. Yadav, Sunita Prasad
{"title":"Low voltage low power sub-threshold operational amplifier in 180nm CMOS","authors":"C. Yadav, Sunita Prasad","doi":"10.1109/SSPS.2017.8071560","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071560","url":null,"abstract":"A two-stage operational amplifier for biomedical applications is presented in this paper. In the Op-Amp design, all transistors have been operated in sub-threshold region for low voltage low power application. The proposed Op-Amp has been designed based on TSMC foundry 180nm process and simulated in Cadence analog design environment. The proposed circuit generates a 40dB gain, 114 KHz UGBW, 72 deg phase margin & total power consumption is just 112nW with 0.8V battery.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Smart industry pollution monitoring and controlling using LabVIEW based IoT 基于LabVIEW的物联网智能工业污染监测与控制
Kunjabihari Swain, G. Santamanyu, Amiya Ranjan Senapati
{"title":"Smart industry pollution monitoring and controlling using LabVIEW based IoT","authors":"Kunjabihari Swain, G. Santamanyu, Amiya Ranjan Senapati","doi":"10.1109/SSPS.2017.8071568","DOIUrl":"https://doi.org/10.1109/SSPS.2017.8071568","url":null,"abstract":"With the advent of IoT based technologies; the overall industrial sector is amenable to undergo a fundamental and essential change alike to the industrial revolution. Online Monitoring solutions of environmental polluting parameter using Internet Of Things (IoT) techniques help us to gather the parameter values such as pH, temperature, humidity and concentration of carbon monoxide gas, etc. Using sensors and enables to have a keen control on the environmental pollution caused by the industries. This paper introduces a LabVIEW based online pollution monitoring of industries for the control over pollution caused by untreated disposal of waste. This paper proposes the use of an AT-mega 2560 Arduino board which collects the temperature and humidity parameter from the DHT-11 sensor, carbon dioxide concentration using MG-811 and update it into the online database using MYSQL. For monitoring and controlling, a website is designed and hosted which will give a real essence of IoT. To increase the reliability and flexibility an android application is also developed.","PeriodicalId":382353,"journal":{"name":"2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115810990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信