{"title":"Study of Denial of Service Attack On AODV Routing Protocol in Mobile Ad-hoc Network","authors":"Bhupendra B Patel, Dr. Ritesh Patel","doi":"10.1109/AISC56616.2023.10085132","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085132","url":null,"abstract":"As in the contemporary era, people used to use ad-hoc networks at manifold locations, and they prefer to use them whenever they want, because they are facing situations from attackers or any malicious node/host, while operating Wi-Fi or any other type of ad-hoc network. Security is a major issue of Mobile Ad-hoc Network (MANET), because in MANET it is possible to face many different problems in each layer, which are being created by malicious nodes or intruders. This paper demonstrates briefs about MANET, and the effect of Denial of Service on Mobile Ad-hoc Network using AODV routing protocol while we are using it for data transmission. Furthermore, the various routing protocols, such as proactive and reactive, and out of that explanation, the AODV routing protocol in detail, including their working method, and explore the various possible attacks on MANET will be classified along with specific examples or figures. Moreover, Network simulator 3 (NS3) is popular for implementing various scenarios of MANET, so, considering that, give a brief introduction of NS3.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanjeev Kumar, Madhu Sharma Gaur, Prem Sagar Sharma, V. Sagar
{"title":"Post Pandemic Cyber Attacks Impacts and Countermeasures: A Systematic Review","authors":"Sanjeev Kumar, Madhu Sharma Gaur, Prem Sagar Sharma, V. Sagar","doi":"10.1109/AISC56616.2023.10084978","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084978","url":null,"abstract":"COVID-19 is one of the deadliest pandemics of this century’s that affected the whole world. As the COVID-19 spread the government had to impose lockdown that pushed the people to follow some new lifestyle like social distancing, work from home, hand washing, and the country have to shut down industries, businesses and public transport. At the same time, doctors were occupied in saving life’s and on other side cyber criminals were busy taking this situation as advantage, which creates an another silent pandemic i.e. cyber-security pandemic. During this pandemic with overloaded ICT infrastructure, cyber space was gaining attention of more cyber attacker and number of attacks/threats increased exponentially. This is one of the rapidly growing global challenges for industry as well as for human life. In this paper a systematic surveys and review is done on recent trends of cyber security attacks during and post COVID-19 pandemic and their countermeasures. The relevant information has been collected from different trusted sources and impact landscape discussed with importance of cyber security education and future research challenges highlights.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129109156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kashish Srivastava, Shilpa Choudhary, Abhishek Sharma, A. Mishra
{"title":"Electronics Epidermal Tattoo – An overview","authors":"Kashish Srivastava, Shilpa Choudhary, Abhishek Sharma, A. Mishra","doi":"10.1109/AISC56616.2023.10084950","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084950","url":null,"abstract":"The use of pliable and stretchable biomedical wearable devices has made long-term monitoring of skin sensations during natural body movements possible, leading to early diagnosis and treatment of various diseases. In this proposal, a brief introduction to skin-integrated biomedical electronics will be presented. These devices, also referred to as \"skin-like electronics,\" \"epidermal electronics,\" or \"electronic tattoos,\" are discussed with regard to their material properties, integration methods, and potential applications. The proposal aims to provide a comprehensive overview of the topic to better understand the technology's potential.By using wearable biomedical devices that are pliable and stretchable, it is possible to monitor skin sensations during natural body movements over a prolonged period, enabling the early detection and treatment of various diseases. The technology behind these devices, known as skin-integrated biomedical electronics, has been dubbed with several names such as \"skin-like electronics,\" \"epidermal electronics,\" or \"electronic tattoos.\" These devices are discussed in terms of their material properties, integration methods, and potential applications in this proposal. The proposal's primary objective is to provide an overview of this technology to better comprehend its potential impact.Epidermal sensors, which are becoming increasingly popular due to their slimness and delicacy, are a type of electronic device that conforms to the skin's epidermis to perform various functions. To ensure both conformal contact and user comfort, these devices should have mechanical properties similar to those of the skin's epidermis layer. Our research introduces a new type of sensor made from graphene that can work in multiple modes. It is created using a cost and time-effective \"wet transfer, dry processing\" method that maintains a relationship between the graphene electronic tattoo (GET) and skin interface impedance similar to that of medically-used Ag/AgCl gel electrodes. GET can be placed directly on human skin like a temporary tattoo, and its open loop configuration allows it to remain attached to the skin layer for several minutes without breaking or delaminating. An electronic epidermal tattoo made from graphene can be used to examine ECG, EMG, EEG, and skin hydration modes.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":" 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Node-Aware Dynamic Weighting Methods for Federated Learning on the Blockchain to Improve Performance","authors":"Ankit Punia","doi":"10.1109/AISC56616.2023.10085151","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085151","url":null,"abstract":"In contrast to the traditional centralized learning approach, federated learning (FL) is a decentralized learning strategy. Every device’s local learning progress when the FL interacts with the central server, progressively improving the learning model. Nonetheless, it may cause network congestion because of limited transmission capacity and the participation of a large number of users. The model’s ability to converge quickly, steadily, and with target learning accuracy is one method for reducing the network load. We suggest a scenario for federated learning using blockchain in this study. Every user who participates in learning may be distinguished as a “node” via blockchain, which effectively encourages user participation. Integrity, stability, and other goals can also be pursued. When choosing between the two sorts of weights, the consumer in charge of refreshing the global representation should be consulted. When determining how much each customer matters, we first factor on how well they've learned locally.. Second, we take each client’s involvement frequency into consideration when determining the weight. To compare the effectiveness of our suggested system with that of other schemes, we select two critical performance indicators: learning rate and standard deviation. The simulation results demonstrate that, in comparison to existing schemes, our suggested system delivers greater stability and quick convergence time for the desired accuracy.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130502725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large Screen Wireless Notice Board with P10 Led Matrix Modules using LoRa","authors":"G. Raj, Tanishk Mishra, Tushar Tegwani","doi":"10.1109/AISC56616.2023.10085490","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085490","url":null,"abstract":"The creation of a large-screen, long-range wireless notice board with low operational power is discussed in this study. The suggested configuration employs the LoRa, Arduino Uno, and LoRaWAN protocols as well as the Long Range Spread Spectrum Modulation Technique.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"234 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121087776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Fog Computing: An Integrated Internet of Things (IoT) Fog Cloud Infrastructure for Big Data Analytics and Cyber Security","authors":"Nimesh Raj","doi":"10.1109/AISC56616.2023.10085681","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085681","url":null,"abstract":"The phrase \"internet of things\" (IoT) is used to refer to the proliferation of non-traditional computer devices that can transmit and receive data and instructions through the internet. The spectrum of 'things' that may be considered part of the IoT is enormous: Smart versions of everyday items like refrigerators and light bulbs that connect to the internet; devices that could only prevail in an internet-enabled world, like digital assistants like Amazon's Alexa; and internet-enabled sensors that are revolutionizing production facilities, hospitals, transit systems, warehouses, and farms. For the purpose of efficiently deploying big data analytics and cyber security applications, this article presents a well-organized IoT-Fog-Cloud architecture. It also details the relationships between the three tiers of IoT, Fog, and Cloud. In addition to this, the article explores the factors that lead to security flaws, the solutions that have been implemented for these flaws, and the potential new areas of research for architectural study.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vipul Narayan, Shashank Awasthi, Naushen Fatima, Mohammad Faiz, Swapnita Srivastava
{"title":"Deep Learning Approaches for Human Gait Recognition: A Review","authors":"Vipul Narayan, Shashank Awasthi, Naushen Fatima, Mohammad Faiz, Swapnita Srivastava","doi":"10.1109/AISC56616.2023.10085665","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085665","url":null,"abstract":"Many biometric authentication techniques have been defined over the years; of these techniques, Human Gait recognition has gathered popularity over the years due to its ability to recognize a person from a distance. As the data has grown in size the focus has shifted from basic Machine Learning algorithms to Deep Learning based approaches. This paper aims to review the various deep-learning approaches used in the discipline of gait identification. This review comprises recent trends in these deep learning approaches, Convolutional Neural networks, Capsule Networks, Recurrent Neural Networks, Autoencoders, Deep Belief Networks, and Generative Adversarial Networks.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116540433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chandrasen Pandey, Vaibhav Tiwari, Sambit Pattanaik, Diptendu Sinha Roy
{"title":"A Strategic Metaheuristic Edge Server Placement Scheme for Energy Saving in Smart City","authors":"Chandrasen Pandey, Vaibhav Tiwari, Sambit Pattanaik, Diptendu Sinha Roy","doi":"10.1109/AISC56616.2023.10084941","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084941","url":null,"abstract":"In computing network architecture, the edge server’s candid positioning and server workload are vital in providing quality services, a strategic strategy is necessary to place the edge server in the optimal position. The edge server’s energy consumption and workload balancing can be optimized by the dynamic candid approach based on time constraints. In this work, we place the edge server based on busy and non-busy hours. Shanghai telecom data is used in the research work and shows a strategic plan to save energy consumption by 31.97% during busy and non-busy hours. It also increases the workload balance up to 7.19% of the edge server, and the 16.16 % increases the utilization rate of the edge server by using three different well-known Particle swarm optimization (PSO), Top-First, and Random algorithms.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Administration Cybersecurity using Programmatic Monitoring and Pattern Recognition","authors":"Rahul Thakur","doi":"10.1109/AISC56616.2023.10085587","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085587","url":null,"abstract":"Equipment for the Internet of Things (IoT) are purchased through many different manufacturers & installed in enormous numbers., making them more susceptible to cybersecurity attacks. Because of this, it is becoming important for network providers to exert control over these gadgets. Present networking monitoring technologies examine the information utilizing software-based intensive packet inspections or specialised accelerated on networking devices.; nevertheless, these approaches may be challenging, expensive, inflexible, and unable to scale. In this investigation, we regulate Internet of Things devices based on how the network is being used by integrating the software-defined networking (SDN) paradigm with machine learning. In order to accomplish this goal, we combine the advantages of information algorithms using flowbased monitoring. that have a high degree of adaptability. The following are our new features in their respective order: Based on the congestion traces of 16 actual consumer IoT systems that were collected in our lab over the course of four months, We begin by describing the networking characteristics of several IoT gadget types & associated operating systems. Then, we develop a multi-stage (3) We make predictions and run tests on our algorithms, and we utilize data collected from the actual world","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125645057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Papiya Mukherjee, Abhishek Kesharwani, Jyoti Dua, Sanjay Kr. Pandey
{"title":"Code Reuse and Sustainable Testing-A Comparative Survey and Study","authors":"Papiya Mukherjee, Abhishek Kesharwani, Jyoti Dua, Sanjay Kr. Pandey","doi":"10.1109/AISC56616.2023.10085269","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085269","url":null,"abstract":"This survey aims to provide a summary of the current trends in software testing and code reuse. The goal was to determine how various tools are used by developers today and what tools are they lacking, particularly in the areas of sustainable testing and reusing the existing code. For a more accurate representation of today's developers, the population was drawn from a variety of organizations and areas. We discovered that the majority of developers who took part in the study, did not test the reused code with sustainable testing scripts, and the sustainable testing approaches were not applied. It was discovered that most of testing tool needed to be conducted more automatically in conjunction with code coverage and it consumed more electricity and power to test functional and non-functional requirements.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131408967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}