{"title":"Implementation of IPSec Protocol","authors":"H. Dhall, D. Dhall, S. Batra, P. Rani","doi":"10.1109/ACCT.2012.64","DOIUrl":"https://doi.org/10.1109/ACCT.2012.64","url":null,"abstract":"The aim of this paper is to present the implementation of IPSec Protocol. IPSec protocol provides an end user to end user traffic with ensuring authenticity and confidentiality of data packet. IP sec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Administration (NSA). IPSec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comments addressing various components and extensions, including the official capitalization style of the term. IPSec defines encryption, authentication and key management routines for ensuring the privacy, integrity and authenticity of data in a VPN as the information traverses public IP networks. Because IPSec requires each end of the tunnel to have a unique address, special care must be taken when implementing IPSec VPNs in environments using private IP addressing based on network address translation. Fortunately, several vendors offer solutions to this problem. However, they add more management complexity.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of Violation of IEEE Publication PrinciplesModified Integer Factorization Algorithm Using V-Factor Method","authors":"Prashant Sharma, Amit Kumar Gupta, Ashish Vijay","doi":"10.1109/ACCT.2012.73","DOIUrl":"https://doi.org/10.1109/ACCT.2012.73","url":null,"abstract":"RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large number (modulus). Integer Factorization is an important problem mainly due to its connection with RSA algorihm of Public key cryptography. We present a new special purpose algorithm (VFactor) for factoring. We compare this algorithm with Fermat's Factorization algorithm (FFM) and trial division algorithm (TDM) and we show that VFactor's runtime depends on the difference of factors and is independent of size of the modulus. So it's effective whenever factors are close to each other. In that case VFactor outperforms FFM and TDM. Keywords: Integer factorization, RSA algorithm, Fermat's Method of Factorization, Public key cryptography, TDM.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129268345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Clustering Techniques for Software Quality Prediction","authors":"Deepak Kumar Gupta, Vinay Goyal, H. Mittal","doi":"10.1109/ACCT.2012.27","DOIUrl":"https://doi.org/10.1109/ACCT.2012.27","url":null,"abstract":"Clustering is the unsupervised classification of patterns into groups. A clustering algorithm partitions a data set into several groups such that similarity within a group is larger than among groups The clustering problem has been addressed in many contexts and by researchers in many disciplines, this reflects its broad appeal and usefulness as one of the steps in exploratory data analysis. There is need to develop some methods to build the software fault prediction model based on unsupervised learning which can help to predict the fault -- proneness of a program modules when fault labels for modules are not present. One of the such method is use of clustering techniques. This paper presents a case study of different clustering techniques and analyzes their performance.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121178456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path Discovery in Vehicular Ad Hoc Networks","authors":"A. Dahiya, M. Madhu, N. Bansal","doi":"10.1109/ACCT.2012.83","DOIUrl":"https://doi.org/10.1109/ACCT.2012.83","url":null,"abstract":"Vehicular Network is one of the most growing type of wireless network. In such system lot work is being done. There are number of issues with Vanet like the security, congestion, intelligent system etc. We are also taking one of such problem of vanet called the intelligent system. In vehicular network the complete automation is always the main problem. While working with vanet the working geographical area selection is also a problem. It can be a city, mountain area etc. We are trying to represent the solution for the same problem. We have proposed the system in a city area. In this system we have selected a 4x4 road area with 2 lane system. Automated traffic lights are present on each turn. We are providing the system to perform a vehicular traffic formation without any collision. Both the vehicle and light system is automated here. We have defined all path routing network in which instead of working on whole network at one time we divide the network in sub stages or sub networks. We defined the destination for each network and for each network the path selection is performed. As we are using a smaller network work there is no problem like broken link or low connectivity level.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DoS Attacks in Mobile Ad Hoc Networks: A Survey","authors":"R. Jhaveri, Sankita J. Patel, D. Jinwala","doi":"10.1109/ACCT.2012.48","DOIUrl":"https://doi.org/10.1109/ACCT.2012.48","url":null,"abstract":"MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns. In this paper, we will present survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs. We will also discuss some proposed solutions to detect and prevent these attacks. As MANETs are widely used in many vital applications, lots of research work has to be done to find efficient solutions against these DoS attacks that can work for different routing protocols.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Communication in Biomedical Sensors","authors":"Poonam A. Yadav","doi":"10.1109/ACCT.2012.121","DOIUrl":"https://doi.org/10.1109/ACCT.2012.121","url":null,"abstract":"Advances in the semiconductor technologies and the development of the wireless sensor network technology it became possible to build miniature and reliable biomedical sensors. The rapid growth in wireless communication, low power circuits and biomedical sensors has enabled new generation of wireless sensor network. These networks are often termed as Body Area Network. A mesh of such biosensors can be used for health monitoring by implanting them in human body. Wireless biosensors are used to collect the real time and continuous medical data from the various parts of the human body. By this millions of patients gets benefited by continuous monitoring of physiological signals anywhere and anytime. It also improves the life quality. This paper discusses the wireless biosensors, wireless communication for biosensors and future trends in biomedical sensing devices.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"464 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122497752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible Discrete Software Reliability Growth Model for Distributed Environment Incorporating Two Types of Imperfect Debugging","authors":"S. Khatri, P. K. Kapur, P. Johri","doi":"10.1109/ACCT.2012.54","DOIUrl":"https://doi.org/10.1109/ACCT.2012.54","url":null,"abstract":"In literature we have several software reliability growth models developed to monitor the reliability growth during the testing phase of the software development. These models typically use the calendar / execution time and hence are known as continuous time SRGM. However, very little seems to have been done in the literature to develop discrete SRGM. Discrete SRGM uses test cases in computer test runs as a unit of testing. Debugging process is usually imperfect because during testing all software faults are not completely removed as they are difficult to locate or new faults might be introduced. In real software development environment, the number of failures observed need not be same as the number of errors removed. If the number of failures observed is more than the number of faults removed then we have the case of imperfect debugging. Due to the complexity of the software system and the incomplete understanding of the software requirements, specifications and structure, the testing team may not be able to remove the fault perfectly on detection of the failure and the original fault may remain or get replaced by another fault. In this paper, we discuss a discrete software reliability growth model for distributed system considering imperfect debugging that faults are not always corrected/removed when they are detected and fault generation. The proposed model assumes that the software system consists of a finite number of reused and newly developed sub-systems. The reused sub-systems do not involve the effect of severity of the faults on the software reliability growth phenomenon because they stabilize over a period of time i.e. the growth is uniform whereas, the newly developed subsystem does involve. For newly developed component, it is assumed that removal process follows logistic growth curve due to the fact that learning of removal team grows as testing progresses. The fault removal phenomena for reused and newly developed sub-systems have been modeled separately and are summed to obtain the total fault removal phenomenon of the software system. The model has been validated on two software data sets and it is shown that the proposed model fairs comparatively better than the existing one.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Black-Hole Node Attack in MANET","authors":"Nidhi Sharma, Alok Sharma","doi":"10.1109/ACCT.2012.112","DOIUrl":"https://doi.org/10.1109/ACCT.2012.112","url":null,"abstract":"The black hole problem is one of the security attacks that occur in mobile ad hoc networks (MANETs). We present two possible solutions. The first is to find more than one route to the destination. The second is to exploit the packet sequence number included in any packet header. Computer simulation shows that in comparison to the original ad hoc on demand distance vector (AODV) routing scheme, the second solution can verify 75% to 98% of the route to the destination depending on the pause time at a minimum cost of the delay in the networks. The main objective of this paper is to analyze black hole attack in MANET and its solutions.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115168220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation of 7T SRAM Cell at Various Process Corners at 45 nm Process Technology","authors":"K. Mishra, S. Akashe","doi":"10.1109/ACCT.2012.71","DOIUrl":"https://doi.org/10.1109/ACCT.2012.71","url":null,"abstract":"Designing static random access memory cell (SRAM), low power and leakage current using nano-scale technology ranges, Low power supply voltage is an effective technique for low power reduction in memory design, however traditional memory cell design fails to operate at ultra low voltage regime, then a new cell structure need to operate cell in low voltage regime. Therefore a single ended input output 7 transistor SRAM cell for using 45nm cmos technology and it is suitable for low voltage regime. Schmitt trigger based SRAM is proposed which provide better read stability, write ability and process variation tolerance compared to standard 6 transistor SRAM cell. This technology reduces power as well leakage current and improves signal noise margin (SNM).","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133180100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nanoism in New Era","authors":"M. Gupta, S. Gupta","doi":"10.1109/ACCT.2012.76","DOIUrl":"https://doi.org/10.1109/ACCT.2012.76","url":null,"abstract":"Nanotechnology covers a wide range of materials and techniques With the development of semiconductors, bringing computers down to palm-size, scientists, telecommunication, medicine, biotechnology environmental energy, and universe security of which the risks and unknowns vary greatly. Nano material may pass easily into the bloodstream when inhaled or swallowed, and possibly when applied to the skin. Once inside the body, they seem to have access to most or all tissues and organs, including the brain. It is unknown whether nano materials can pass from a pregnant woman's blood circulation to the fetal circulation or through breast milk to a nursing infant. These data demonstrate that inhalation of nano-size chemical pollutants is associated with asthma attacks, heart disease, strokes, and respiratory disease. At this stage it is useful to present the arguments of the enthusiasts who project the revolutionary potential of nano science and nanotechnology and those of the skeptics who seem to question the revolutionary potential Paper describes that how nano is everywhere.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}