H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan
{"title":"Secure Access Control to Cloud Resources using Blockchain","authors":"H. Spoorti, R. Sneha, V. Soujanya, K. Heena, S. Pooja, D. Narayan","doi":"10.1109/DISCOVER52564.2021.9663647","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663647","url":null,"abstract":"With the steady increase in complexity of cloud computing and other technologies, there has been a significant concern for providing privacy and data security. For secure access of cloud resources, protection of sensitive data is essential. The critical data that relates to resource provisioning in cloud environment includes key pairs and IP addresses. The user needs this critical data to access the resources which has been provisioned. In conventional systems, this data is directly provided to the user. This technique results in local storage and opens up a vulnerability of snooping by a malicious intruder. Furthermore, the user needs to repeatedly remember the key pairs and other information of all the created resources. Recently, Blockchain, with its decentralized and immutable features is being explored in the design access control mechanism. In this work, we design blockchain based access control mechanism to access cloud resources. We use OpenStack cloud to provision the resources, store the critical data of resources in Ethereum blockchain and use secure access control to cloud resources. We also carry out the scalability and performance analysis of the blockchain based system using Ethereum platform.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma
{"title":"An Efficient Triple-Layered and Double Secured Cryptography Technique in Wireless Sensor Networks","authors":"K. Vivek, M. R. Kale, Venkata Sai Krishna Thotakura, K. Sushma","doi":"10.1109/DISCOVER52564.2021.9663674","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663674","url":null,"abstract":"When implemented in a complex environment, wireless network security is the main factor, and it is the sensor networks’ primary concern. Cryptology is a vital component in wireless sensor networks to accomplish this. Many existing cryptographic techniques had not shown good and better results till now. An efficient, strong, triple phased, double secured, and integrated cryptographic approach has been introduced in this study that utilizes both secret-key and public-key methods. Rijndael Encryption Approach (REA), Horst Feistel’s Encryption Approach (HFEA), and enhanced Rivest-Shamir-Adleman (e- RSA) are employed in the propounded technique in various stages of the algorithm since secret-key based system offers a significant level of protection and enable key management through publickey based techniques. REA was used in stage 1 of the algorithm; REA+HFEA was used in stage 2, and REA+HFEA+e-RSA was used in the last stage, and all three stages were performed in parallel. Parameters like execution time and decryption time were taken into account for measuring the performance levels of the propounded approach. The propounded algorithm is differentiated from existing techniques using a single evaluation parameter i.e computation time. It is found that propounded approach gave a good performance in terms of computation time with an Average Encryption Time (AET) and Average Decryption Time (ADT) of 1.12 and 1.26 on text sizes of 6, 25, 35, 61, and 184MegaBytes (MB) respectively. The proposed hybrid model is 1.36 times faster than ECC+RSA+MD-5,3.25 times faster than AES+ECC, 2.7 times faster than AES+RSA, and 3.24 times faster than AES+ECC+RSA+MD5.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Panduranga Vittal, Sayantan Bhanja, Abhijit Keshri
{"title":"Comparative Study of PI, PID controller for Buck-Boost Converter tuned by Bio-Inspired Optimization Techniques","authors":"K. Panduranga Vittal, Sayantan Bhanja, Abhijit Keshri","doi":"10.1109/DISCOVER52564.2021.9663591","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663591","url":null,"abstract":"In this paper the Buck-Boost converter was modelled using state-space averaging approach and simulated in MATLAB/Simulink. Buck-Boost converter with closed loop control, operated with PI and also with PID controller for good voltage regulation. Bio-inspired optimization techniques e.g. GreyWolves optimization Technique (GWO), Genetic Algorithm(GA), Particle Swarm optimization (PSO), Ant-Lion optimization (ALO), Whale optimization Algorithm (WOA) were used for tuning PI and also PID controller based Buck-Boost Converter. In order to find out the performances of PI and PID in the Buck-Boost converter, comparison between optimal values of PI parameters $(text{K}_{text{p}}, text{K}_{text{i}})$ and PID parameters $(text{K}_{text{p}}, text{K}_{text{i}}, text{K}_{text{d}})$ obtained by all the above mentioned optimization techniques were performed. The transient behaviour for each optimal values of PI and PID controller was investigated when the system subjected to a load disturbance. Also, for each optimal PI and PID controller error performance indices e.g. Integral Squared Error and Integral Absolute Error were evaluated. The comparison proved that the PID is most suitable controller for Buck-Boost Converter as it is damping out the oscillations caused due to load disturbance 87.56% faster than PI controller. Moreover, based on the evaluated values of error performance indices and dynamic behaviour, it has also been proven that GA is best optimization technique among others for tuning PID in a Buck-Boost Converter.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121450539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trend in SDN Architecture for DDoS Detection- A Comparative Study","authors":"Josy Elsa Varghese, Balachandra Muniyal","doi":"10.1109/DISCOVER52564.2021.9663589","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663589","url":null,"abstract":"Security demands are increasing in this tech era. The existence of Software Defined Networks (SDN) in the security field encourages the network architecture to meet the dynamic security issues of modern technology by providing programmability, flexibility, scalability, and interoperability. Since Distributed Denial of Service (DDoS) attacks have caused major cybercrime for a few decades, the solutions to DDoS detection in the SDN architecture bring adaptable solutions for changing network scenarios. This paper deals with the trend in the SDN architectural solution for DDoS attacks by surveying various methodologies used for DDoS detection in SDN. The pros and cons of each SDN architectural design for DDoS detection were discussed in this comparative study of various SDN frameworks for DDoS detection.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125386059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Modeling and Analysis of Demand Response using Distributed Algorithm in Distribution Power System","authors":"Krishna D, Hima Bindu E, S. M","doi":"10.1109/DISCOVER52564.2021.9663598","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663598","url":null,"abstract":"In recent time, Demand Response(D.R) has become a vigorous research area. Most of the work, only reflects the balance among the combined load, the supply as well as the summaries that went to the primary energy grid. In this work, radial distribution network for demand response analysis has been acquired, expressing it as an OPF problem that maximizes the collective profits of the user and minimizes the cost of supply and power losses of line and also focuses toward power flow restrictions and operational restrictions. Here, completely distributed algorithm is proposed, so that the customer can manage their response assessment to ask all through the nearest contact among their neighbors to reach the most optimal. The arithmetical results of IEEE-30 bus system by ETAP [Electrical Transient analyzer Program] are helpful to complete arithmetical analysis.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ramya, D. Lingaraja, G. Ram, S. Kumar, T. Aravind
{"title":"Microfluidic Circulating Tumour Cell Sorter Using Deterministic Lateral Displacement","authors":"S. Ramya, D. Lingaraja, G. Ram, S. Kumar, T. Aravind","doi":"10.1109/DISCOVER52564.2021.9663577","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663577","url":null,"abstract":"This paper presents the separation of rare circulating tumour cells (CTCs) in the range of $15-30mu text{m}$ by designing the novel microfluidic channel to prognose the level of cancer. Prognosing the level of CTCs in a patient's blood sample will greatly reduce the mortality rate. The developed microchannel structure utilizes the concept of deterministic lateral lateral displacement. Inclusion of arrays of triangular posts with critical diameter of $42mu text{m}$ improves the separation efficiency. The optimistic microchannel’s efficiency is analyzed by validating critical diameter. Further particle tracing is employed and improved the device throughput.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Thirumala Akash, K. Samvrudhi, R. S. Upendra, M. R. Ahmed
{"title":"Biosensors for the Detection of Toxic Contaminants from Water Reservoirs Essential for Potable and Agriculture Needs: A Review","authors":"K. Thirumala Akash, K. Samvrudhi, R. S. Upendra, M. R. Ahmed","doi":"10.1109/DISCOVER52564.2021.9663693","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663693","url":null,"abstract":"Water is an essential element for the existence of life on the earth. All the living beings including plants and animals were depends on water for their survival. Human should intake at least 3-4 litters of water every day for proper body functions. Agriculture productivity is also solely depending on the availability of fresh and cultivable water resources. Most of the fresh and cultivable water reservoirs on the globe were contaminated due to the vigorous anthropometric activities and due to the continuous release of industrial effluent comprising toxic heavy metals such as Lead (Pb), Arsenic (As), Cadmium (Cd), Nickel (Ni), Mercury (Hg), Chromium (Cr) and Zinc (Zn) and other elements i.e, Nitrates (N), Potassium (K) and Phosphorus (P). Though N, P, K is essential for plant growth, but the higher levels in drinking water cause serious health issues. To have good quality of water for potable and agriculture purpose the toxic contaminants of the water reservoirs need to be screened &, measured accurately and further to be removed employing green methods. Sensors are the most advanced technology available today to screen and detect the water contaminants with high sensitivity and accuracies. Present review aimed to discuss the toxic impacts of water contaminants such as Fluoride, heavy metals i.e., Lead, Nickel, Cobalt, and other elements i.e Nitrate, Potassium, Phosphorous, further thrown insightful light on literature pertaining to the various sensors with their advantages and limitation in screening, detecting and real time monitoring of the water contaminants. Existing sensor technology unable to detect multiple water contaminants. There exists the research problem and can be addressed by developing an integrated biosensor employed to detect multiple water contaminant, and to provide scope for real time monitoring of toxic contaminants including the heavy metals.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"8 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M.N Amogha Hegde, Mahendra S. Naik, S. Chaitra, M. Madhavi, A. Ravichandra
{"title":"Prediction and Analysis of Water Requirement in Automated Irrigation System using Artificial Neural Network(ANN) and Lora Technology","authors":"M.N Amogha Hegde, Mahendra S. Naik, S. Chaitra, M. Madhavi, A. Ravichandra","doi":"10.1109/DISCOVER52564.2021.9663706","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663706","url":null,"abstract":"Agriculture is our primary source of food and other raw materials, so it is regarded as a basic human need.70% of farmers and general people depend on agriculture. Regrettably, many farmers continue to use antiquated farming methods. The irrigation system has been practiced in India and other Asian countries from the early times. Due to the scarcity of water in today’s world, smart irrigation methods are becoming increasingly important. An Automated Irrigation system is developed using IoT to overcome the above issue. This project makes use of artificial neural networks (ANN) to optimize water usage in agriculture. Temperature and moisture sensors are used to read the temperature and moisture level of soil in the system. Lora transmitter transmits the sensor data. The data transmitted by the LoRa transmitter is received by the LoRa receiver, which then passes it on to the controller unit. The data is processed and compared to a predetermined threshold value by the controller unit. If the value exceeds the threshold, the motor is activated; otherwise, the motor is turned off. The GSM module is used to convey the motor status to the registered user through SMS. The readings of the sensors and the quantity of water required to reach the threshold value are broadcast to the web once the motor is turned on/off (Thingspeak). Thingspeak is being used to record all sensor data and water consumption for a specific temperature/moisture. ANN analyses the data and determines the amount of water that will be needed in the next few days.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of High Voltage Linear Amplifier and It’s Application to Piezoelectric Actuators","authors":"K. Sushith, Muralidhara, Md. Abdul Raheman","doi":"10.1109/DISCOVER52564.2021.9663592","DOIUrl":"https://doi.org/10.1109/DISCOVER52564.2021.9663592","url":null,"abstract":"High voltage linear amplifiers are required to drive different actuators such as Magnetic actuator, Piezoelectric actuator and different motors. In this paper, High voltage linear amplifier is designed and developed to drive Piezoelectric actuators which are used in positioning, pumping and anti-vibration applications. The High voltage linear amplifier is developed using PA91 high voltage power operational amplifier considering inverting op-amp configuration. The voltage gain of the High voltage linear amplifier is -22. Dual power supply is designed and developed to provide VCC (165V) and VEE (-35V) to the High voltage linear amplifier. The High voltage linear amplifier has a voltage range of is -20V to 150V which is same as that of the Piezoelectric actuator and has a current carrying capacity of 200mA. Simulation of linear voltage amplifier is carried out using Multisim software and current carrying capacity of this amplifier is calculated for different frequency and capacitive loads. The practical result of the High voltage linear amplifier is determined for different piezoelectric actuators with different range of frequencies.","PeriodicalId":413789,"journal":{"name":"2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124139652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}