{"title":"OFDM transceiver design using C","authors":"Indira Bahaddur, C. L. Triveni, P. Srikanth","doi":"10.1109/ICCCNT.2013.6726661","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726661","url":null,"abstract":"The aim of this paper is to design a baseband orthogonal frequency division multiplexing (OFDM) [1]–[2] transceiver including 8 point Fast Fourier Transform (FFT), 8 point Inverse Fast Fourier Transform (IFFT) [3] core processor, DPSK modulator[4], demodulator serial to parallel and parallel to serial converter blocks in C language. The main challenge is to derive the algorithm for Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT). There are many algorithms available that can implement FFT and IFFT.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"66 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72867900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma
{"title":"Performance evaluation of encryption techniques and uploading of encrypted data in cloud","authors":"V. Sreenivas, C. Narasimham, K. Subrahmanyam, P. Yellamma","doi":"10.1109/ICCCNT.2013.6726514","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726514","url":null,"abstract":"Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. Security is a foremost important issue for data in cloud. To look after the data from cloud data storage we store the encrypted data in cloud environment. For encrypting the data we use different types of encryption methods like RSA, SHA1, and MD5. Further we also measure the performance of the different encrypted techniques based on the Key size of each encrypted technique to upload data in to the cloud by providing the best way security to data.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"24 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80862715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active key management scheme to avoid clone attack in wireless sensor network","authors":"P. Sivasankar, M. Ramakrishnan","doi":"10.1109/ICCCNT.2013.6726618","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726618","url":null,"abstract":"In Wireless sensor Network, the sensor nodes transmit critical information over the network; therefore, security services, such as, authentication and pair wise key establishment between sensor nodes and mobile sinks, are important. However, the problem of authentication and pair wise key establishment in sensor networks with MSs is still not solved in the face of mobile sink replication attacks. For the basic probabilistic and q-composite key pre distribution schemes, an attacker can easily obtain a large number of keys by capturing a small fraction of the network sensor nodes, making it possible for the attacker to take control of the entire network by deploying a replicated mobile sink, preloaded with some compromised keys to authenticate and then initiate data communication with any sensor node. To solve this problem, we have developed a general framework that permits the use of any pair wise key pre distribution scheme as its basic component, to provide authentication and pair wise key establishment between sensor nodes and MSs. The new framework requires two separate key pools, one for the mobile sink to access the network, and one for pair wise key establishment between the sensors.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"767 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81072984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A load balancing algorithm for private cloud storage","authors":"B. Prabavathy, K. Priya, C. Babu","doi":"10.1109/ICCCNT.2013.6726585","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726585","url":null,"abstract":"Cloud computing enables on-demand network access to a shared pool of configurable computing resources such as servers, storage and applications. These shared resources can be rapidly provisioned to the consumers on the basis of paying only for whatever they use. Cloud storage refers to the delivery of storage resources to the consumers over the Internet. Private cloud storage is restricted to a particular organization and data security risks are less compared to the public cloud storage. Hence, private cloud storage is built by exploiting the commodity machines within the organization and the important data is stored in it. When the utilization of such private cloud storage increases, there will be an increase in the storage demand. It leads to the expansion of the cloud storage with additional storage nodes. During such expansion, storage nodes in the cloud storage need to be balanced in terms of load. In order to maintain the load across several storage nodes, the data need to be migrated across the storage nodes. This data migration consumes more network bandwidth. The key idea behind this paper is to develop a dynamic load balancing algorithm to balance the load across the storage nodes during the expansion of private cloud storage.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81958833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive study on MANETs network layer attacks","authors":"G. Garg, S. Kaushal, Akashdeep Sharma","doi":"10.1109/ICCCNT.2013.6726853","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726853","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes that forms a temporary network in decentralized manner. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment of MANET which poses a number of nontrivial challenges to security design and these challenges clearly make a case of building multifence security solutions that achieve both broad protection and desirable network performance. This paper presents a review on the various network layer attacks, i.e. wormhole attack, blackhole attack and greyhole attack and existing ways to mitigate them.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81959653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced security algorithm for wireless application using RSA and genetic approach","authors":"G. Prema, S. Natarajan","doi":"10.1109/ICCCNT.2013.6726679","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726679","url":null,"abstract":"Image steganography is an emerging field of research for secure data hiding and transmission over networks. The proposed system provides the best approach for Least Significant Bit (LSB) based steganography using Genetic Algorithm (GA) along with Visual Cryptography (VC). Original message is converted into cipher text by using RSA and then hidden into the LSB of original image. Genetic Algorithm and Visual Cryptography has been used for enhancing the security. Genetic Algorithm is used to modify the pixel location of stego image and the detection of this message is complex. Visual Cryptography is used to encrypt the visual information. It is achieved by breaking the image into two shares based on a threshold. The performance of the proposed system is experimented by performing steganalysis and conducting benchmarking test for analysing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The main aim of this paper is to design the enhanced secure algorithm which uses both steganography using Genetic Algorithm and Visual Cryptography to ensure improved security and reliability.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"89 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78370481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique for detection of cooperative black hole attack in MANET","authors":"G. Wahane, S. Lonare","doi":"10.1109/ICCCNT.2013.6726621","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726621","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks due to their features of open medium, dynamically changing topologies. The black hole attack is a well known security threat in mobile ad hoc networks. However, it spuriously replies for any route request without having any active route to the specified destination. Sometimes the Black Hole Nodes cooperate with each other with the aim of dropping packets these are known as Cooperative Black Hole attack. This research work suggests the modification of Ad Hoc on Demand Distance Vector Routing Protocol. we are going to use a mechanism for detecting as well as defending against a cooperative black hole attack. This work suggest two new concepts, first one is Maintenance of Routing Information Table and second is Reliability checking of a node. This system also decreases the end to end delay and Routing overhead.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"117 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78980494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating MANET routing protocols under multimedia traffic","authors":"Ajinkya D. Kadam, Sharad Wagh","doi":"10.1109/ICCCNT.2013.6726523","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726523","url":null,"abstract":"Mobile ad-hoc network is infrastructure less networks having nodes which can act as a transmitter, router or receiver. MANETs have a dynamic topology where nodes are mobile. To monitor the working of the nodes and nature in which they behave while sending, receiving or forwarding data is classified by a set of rules known as routing protocols. Many routing protocols have been designed to fit the needs of Communication in MANET. These protocols have their own advantages and disadvantages depending in which network they are used. This paper will discuss the evaluation of performances of three routing protocols which include Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Destination Sequenced Distance Vector DSDV. The goal of our work is to study the behavior of above mentioned routing protocols with multimedia traffic source in the network based on the following performance metrics: energy consumption, jitter, packet delivery ratio, and packet drop, control overhead, delay. A simulation model using Network Simulator 2 (NS2) is developed to study the scenario and evaluate them.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"24 4 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79644409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta
{"title":"Security for wireless sensor networks in military operations","authors":"Rajat Gupta, Kaushal Sultania, Pallavi Singh, Archit Gupta","doi":"10.1109/ICCCNT.2013.6726654","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726654","url":null,"abstract":"The communication in military is vital for distribution of commands, logistical information and proper functionality of all units. It is must to have a secure channel through which critical information is exchanged in real time and privacy of information is maintained. Wireless sensor network can be used in military application for monitoring militant activities like tracking enemies and force protection. Wireless sensor network has set of distributes sensors nodes which are connected to each other. These sensor nodes are low powered, low cost, small in size and can do limited amount of computation. But wireless sensor network is vulnerable to various kinds of attacks like node capturing, eavesdropping in communication links and man in the middle or reply to a message. To ensure security, messages from wireless sensor networks must be encrypted. Many key agreement schemes have been proposed to ensure security but most of them are quite complex. In this paper we are proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network. This will improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"14 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78881375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of voice based wheelchair for differently abled","authors":"M. B. Kumaran, A. Renold","doi":"10.1109/ICCCNT.2013.6726647","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726647","url":null,"abstract":"The main objective of this work is to process the voice signal and is implemented to control a wheelchair by the voice signal which is processed earlier. The adopted model is to combine PIC microcontroller and VRbot module with voice recognition system for identifying individual words and is speaker dependent. The command given by the user is taken into VRbot module by microphone which is built within speech recognition module. Once voice command is recognized, the signal is transferred to the controller where stepper motor module is connected. PIC microcontroller capture appropriate signals from speech recognition module and wait for the Ultrasonic Sensor, which is doing the process of obstacle detection in its path. Whenever the conditions, signal to move from VRbot and no obstacle detection from Ultrasonic Sensor is received, the motion of wheelchair is performed.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"74 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76665225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}