{"title":"Energy efficient fault-tolerant clustering algorithm for wireless sensor networks","authors":"K. Nitesh, M. Azharuddin, P. K. Jana","doi":"10.1109/ICGCIOT.2015.7380464","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380464","url":null,"abstract":"Energy utilization and fault tolerance are the two major issues in the development of a large scale wireless sensor networks (WSNs). In this paper, we propose a distributed algorithm to design an energy efficient cluster base WSN. We also propose a local recovery mechanism for the orphan sensor nodes, which are generated due to the failure of any cluster head. The proposed algorithm is based on cost function which is formulated with several parameters such as residual energy, distance and cluster cardinality. The algorithm is simulated rigorously over several performance metrics and the results acquired are compared with some existing algorithms to demonstrate its effectiveness.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134177520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spherule diagrams: A matrix-based set visualization compared with Euler diagrams","authors":"Mithileysh Sathiyanarayanan, Donato Pirozzi","doi":"10.1109/ICGCIOT.2015.7380712","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380712","url":null,"abstract":"The explosive growth of the internet, the overall computerization of the engineering, medical, business and defense sectors have created a widespread need of visualization techniques to explore large and complex datasets. As the data keeps growing in complexity, users find it difficult to navigate and understand the relationships between the sets. There are limitations such as scalability and sub-optimal layouts being produced with the state-of-the-art visualization methods such as Euler diagrams, Treemap diagrams and ConSets. So, an effective visual method is in great need to produce an optimal layout and identify set properties with ease. This motivated us to develop a novel visual method called “Spherule diagrams” to improve the analysis of set relationships effectively. Then a small-scale user preference study was conducted to compare Euler diagrams with Spherule diagrams, where 80% participants preferred Spherule diagrams for its simplicity, navigation, better layout and set ordering characteristics. The other results based on error rate and rating, Spherule diagrams outperformed Euler diagrams. Thus, we provide evidence that Spherule diagrams are preferred over Euler diagrams for visualizing set relations.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Log analytics on cloud using pattern recognition a practical perspective to cloud based approach","authors":"A. Bhole, B. Adinarayana, Sanath S. Shenoy","doi":"10.1109/ICGCIOT.2015.7380553","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380553","url":null,"abstract":"Every application nowadays produces huge amounts of log data which can give critical insights if properly monitored. The biggest problem in monitoring such large amounts of log data by using the existing techniques is that they are compute intensive, and require a lot of effort. And also usually log data is unformatted and may contain some redundant data as well that needs to be removed. This critical information is more valuable, a potential predictive analytics improves the proactive control of the application. Data analytics paradigm shows new ways of handing this critical information by providing various technologies to handle this in an effective way. Visualization is used to convey the findings from data analytics in an easily understandable way. Due to the huge size of data that has to be analyzed, a highly scalable approach is required which provides additional optimization. In this paper an approach for data analytics with the combination of cloud computing is proposed and demonstrated.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Few location based routing protocols in Wireless Sensor Network","authors":"Shruti, U. Kumari","doi":"10.1109/ICGCIOT.2015.7380562","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380562","url":null,"abstract":"Wireless Sensor Networks (WSN) consists of many small compact devices equipped with sensors. It is a very popular area for exploration. The nodes are movable and set themselves into a network. However in larger networks, geographical routing protocol is required. Geographical routing uses location information to send the packets to the target region. In this paper, some of major geographic routing protocols for WSNs are presented.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting and overcoming blackhole attack in mobile Adhoc Network","authors":"Sakshi Jain, A. Khuteta","doi":"10.1109/ICGCIOT.2015.7380462","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380462","url":null,"abstract":"A mobile Adhoc Network (MANET) is a huddle of autonomous mobile nodes which dynamically forms a temporary multi-hoped radio network, without any use of previous infrastructure. Due to its characteristics like limited resources, changing topology and lack of centralized administration, MANET is exposed to various network layer attacks. Ad-hoc On Demand Distance Vector (AODV) is a self starting routing protocol for MANETs whose security is compromised with the particular type of attack called “BlackHole” attack. In this malicious node advertise itself as having the best path to destination during the route discovery process and thus interrupt the real communication and degrade network performance. In the proposed scheme we deploy the base node in the network that increases the probability of detecting multiple malicious nodes in network and further isolate them from taking part in any communication.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122970842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization and comparison of Distributed Denial of Service attack tools","authors":"Harjeet Kaur, Sunny Behal, Krishan Kumar","doi":"10.1109/ICGCIOT.2015.7380634","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380634","url":null,"abstract":"Distributed Denial of Service (DDoS) attack is a prime threat for the extensively used Internet based services like e-commerce, banking, medicine, education etc. Hackers launch DDoS attacks by compromising the vulnerable systems (called bots) in order to degrade or sometimes completely disrupt these services. In recent years, DDoS attacks have been increased in strength, frequency and sophistication. Though many solutions have been proposed in literature to combat against such attacks but still defending from a DDoS attack is a challenging issue. Hackers are continuously upgrading their skills to launch diversified attacks and are developing new means to circumvent these countermeasures. The purpose of this paper is to characterize and compare the popular DDoS attack tools used by the attackers in recent times, their modus operandi and types of attacks, they launch. This would help the researcher community to handpick the appropriate DDoS attack tool for their experimentation purpose.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lakhita, Surendra Yadav, Brahmdutt Bohra, M. Tech Scholar, Asst Prof
{"title":"A review on recent phishing attacks in Internet","authors":"Lakhita, Surendra Yadav, Brahmdutt Bohra, M. Tech Scholar, Asst Prof","doi":"10.1109/ICGCIOT.2015.7380669","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380669","url":null,"abstract":"The development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform is socially engineered messages. Lexically analyzing the URLs can enhance the performance and help to differentiate between the original email and the phishing URL. As assessed in this study, in addition to textual analysis of phishing URL, email classification is successful and results in a highly precise anti phishing.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122652688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Five staged pipelined processor with self clocking mechanism","authors":"Anish Gupta, Vinayak Kini, Prathik Shetty, Chirag Bafna","doi":"10.1109/ICGCIOT.2015.7380684","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380684","url":null,"abstract":"With the advent of synchronous systems we have come across various difficulties and problems associated with them, mainly like clock skew, power consumption, etc. The idea of making systems clockless has been proposed numerous times and has been explored in great detail. Although we see that even those systems are not free from their own disadvantages like false triggering, handshaking hardware requirement, etc. Since both systems, synchronous and asynchronous show their own set of advantages and disadvantages the logical step is to find a mix of each of them in an overall system. This paper proposes an idea of a five stage pipelined processor with both synchronous and asynchronous blocks combined together to take the best of both ideologies. We intend to mix both these systems together by making use of the handshake signals from the asynchronous systems to generate a clock for the synchronous systems. This makes the processor give output with an average time delay lesser than the worst case delay of the synchronous processor, yet keeping the benefits from the synchronous system intact and adding various other benefits also.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case study of Internet of Things in area of Agriculture, ‘AGCO's Fuse Technology's’ ‘Connected Farm Services’","authors":"Rashi Chaudhary, Jalaj Ranjan Pandey, Prakhar Pandey, Pulkit Chaudhary","doi":"10.1109/ICGCIOT.2015.7380447","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380447","url":null,"abstract":"Embedded with Internet of Things, Smart Agriculture vision is analyzed in this case study. Smart Farming techniques offered by leading Agriculture Company AGCO's Fuse Technology's `Connected Farm Services' is under study. Study presents a future projection of smart connected agriculture objects and processes and the scope of the internet driven applications in agriculture field. SWOT analysis has been used to analyze the issue under study. Case has been explained in majorly five portions, introduction, Smart farming operational Fundamentals, Smart Agriculture by AGCO, SWOT Analysis, Conclusion.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster based route discovery technique for routing protocol in MANET","authors":"Poonam Thakur, Anita Ganpati","doi":"10.1109/ICGCIOT.2015.7380539","DOIUrl":"https://doi.org/10.1109/ICGCIOT.2015.7380539","url":null,"abstract":"Mobile Ad hoc Networks (MANETs) as the name signifies is a network formed by collection of mobile ad hoc devices (nodes). It is a kind of infrastructure less wireless network which is autonomous decentralized where each node is free to move anywhere at any time. Due to the mobility of nodes routing is main issue of research, since the wired network's routing protocols cannot be used here. Routing in MANETs is mainly of two types proactive and reactive. A proactive routing protocol(DSDV, WRP, CGSR) maintains the route between all pairs of nodes in the network all the times whereas a reactive routing protocol (AODV, DSR, TORA) is an on demand routing protocol where route is found only when required which has great advantage over proactive protocols. In this paper a new cluster based route discovery algorithm for reactive routing protocol i.e. Ad hoc On Demand Distance Vector (AODV) is proposed, since for the existing algorithms control overhead is very high which consumes a lot of available bandwidth. In the future performance evaluation of the proposed technique can be done and the results thus obtained can be compared with the existing algorithms. We hope that control packet overhead will be less in case of proposed algorithm.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124505016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}