272 research outputs found

    Efficient privacy preserving communication protocol for IOT applications

    Get PDF
    The proliferation of Internet of Things (IoT) devices has led to an unprecedented increase in data generation and communication, raising concerns about the security and privacy of transmitted information. This paper presents a novel Message Authentication Protocol (MAP) specifically designed for IoT devices, addressing the dual challenges of ensuring data integrity and preserving user privacy. The proposed protocol employs advanced cryptographic techniques to authenticate messages securely while incorporating privacy-preserving mechanisms to safeguard sensitive user information.The protocol utilizes a hybrid approach, combining symmetric and asymmetric cryptographic primitives to achieve efficient and robust message authentication. Symmetric key algorithms are employed for fast and lightweight authentication, ensuring minimal computational overhead for resource-constrained IoT devices. Additionally, asymmetric key techniques are integrated to facilitate secure key exchange and protect against key compromise.Privacy preservation is a paramount concern in IoT ecosystems, where devices often handle sensitive data. The protocol incorporates anonymization and differential privacy techniques to conceal the identity of users and the specific content of transmitted messages. This ensures that even if an adversary intercepts communication, extracting meaningful information about the users or their data remains a formidable challenge.To evaluate the effectiveness of the proposed protocol, we conducted comprehensive simulations and real-world experiments. The results demonstrate that the protocol achieves a balance between security, efficiency, and privacy preservation. It outperforms existing solutions in terms of computational efficiency and provides a robust defence against various common attacks, such as replay attacks and message tampering.In conclusion, the presented Secure and Efficient Message Authentication Protocol for IoT Devices with Privacy Preservation offers a viable solution to the evolving security and privacy challenges in IoT environments. By leveraging cryptographic techniques and privacy-preserving mechanisms, the protocol provides a strong foundation for safeguarding sensitive information while ensuring the integrity of communication in the vast and interconnected landscape of IoT devices

    Transient Laminar MHD Free Convective Flow past a Vertical Cone with Non-Uniform Surface Heat Flux

    Get PDF
    Numerical solution of unsteady laminar free convection from an incompressible viscous fluid flow past a vertical cone with non-uniform surface heat flux qw(x) = axm varying as a power function of the distance from the apex of the cone (x = 0) in the presence of a transverse magnetic field applied normal to the surface is considered. The dimensionless governing coupled partial differential boundary layer equations are formulated and solved numerically using an efficient and unconditionally stable finite-difference scheme of the Crank-Nicolson type. The numerical results are validated by comparisons with previously published work and are found to be in excellent agreement. The velocity and temperature fields have been studied for various combinations of physical parameters (Prandtl number Pr, exponent and magnetic parameter M). The local as well as the average skin-friction parameter and the Nusselt number are also presented and analyzed graphically

    Traditional Uses of Some Medicinal Plants by tribals of Gangaraju Madugula Mandal of Visakhapatnam District, Andhra Pradesh

    Get PDF
    During the years 2007-2008 several field trips were conducted to document the ethnomedicinal remedies for 47 diseases with 90 plant species of Angiosperms from three major tribes viz: Bagatas, Konda Doras and Valmikis who have been residing in Gangaraju Madugula Mandal of Visakhapatnam district. The plants were deposited as herbarium specimens in Andhra University, Visakhapatnam, India

    Unsteady Laminar Free Convection from a Vertical Cone with Uniform Surface Heat Flux

    Get PDF
    Numerical solutions of, unsteady laminar free convection from an incompressible viscous fluid past a vertical cone with uniform surface heat flux is presented in this paper. The dimensionless governing equations of the flow that are unsteady, coupled and non-linear partial differential equations are solved by an efficient, accurate and unconditionally stable finite difference scheme of Crank-Nicolson type. The velocity and temperature fields have been studied for various parameters Prandtl number and semi vertical angle. The local as well as average skin-friction and Nusselt number are also presented and analyzed graphically. The present results are compared with available results in literature and are found to be in good agreement

    Numerical Analysis of Orifice-Type Aerostatic Thrust Bearing

    Get PDF
    This thesis provides the study about an analysis of aerostatic thrust bearing. In a very high-speed machine, regular bearing cannot be used. At very high speed about 300000 rpm to 600000 rpm, typical bearing gets high friction and wear. Because of this reason thrust bearings are used. In the analysis part, Reynolds equation for aerostatic thrust bearing have been solved by using FDM (Finite Difference Method).The Finite difference method is a numerical method to solve a nonlinear differential equation that is in non-dimensional form. By the principle of discretization with using MATLAB (Matrix Laboratory) software solutions have been found based on convergence condition. After solving the Reynold’s equation, pressure variation over-bearing has been found. Once the pressure distribution was calculated, load carrying capacity, and mass flow rate was calculated

    Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System

    Get PDF
    The rapid development of computer networks and mostly of the Internet has created many stability and security problems such as intrusions on computer and network systems. Further the dependency of companies and government agencies is increasing on their computer networks and the significance of protecting these systems from attacks is serious because a single intrusion can cause a heavy loss or the consistency of network becomes insecure. During recent years number of intrusions has dramatically increased. Therefore it is very important to prevent such intrusions. The hindrance of such intrusions is entirely dependent on their detection that is a key part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. Hence accurate detection of network attack is imperative. A variety of intrusion detection approaches are available but the main problem is their performance, which can be enhanced by increasing the detection rates and reducing false positives. Keywords: IDS, Soft Computing, ANN, Genetic Algorith

    A rare case of pancreatic injury with transection of main pancreatic duct managed conservatively

    Get PDF
    An isolated injury to the pancreas is uncommon and the management remains controversial. The integrity of the main pancreatic duct is considered the most important determinant for prognosis. Physical signs and laboratory parameters are often inaccurate, and missing the diagnosis can cause serious clinical problems. We report a case of a 20-year-old man with blunt abdominal trauma. Pancreatic injuries although uncommon should be considered in the differential diagnosis in case of blunt abdominal trauma. Furthermore, the clinician should be aware that when pancreatic injuries are managed conservatively, the clinical, radiological, and laboratory parameters need to be monitored until resolution

    An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)

    Get PDF
    The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. The trust based security protocol based on a cross-layer approach attains confidentiality and authentication of packets in both routing and link layers of MANETs but it doesn’t address few attacks like Bad Mouthing Attack, On-off Attack, and Conflicting Behavior Attack, Sybil Attack and Newcomer Attack. In this paper we present DAS, a protocol for reducing of the corruptive/malicious influences of Sybil attacks. Malicious users in general may create multiple identities with few trust relationships. Hence there is a disproportionately small gap in the graph between the Sybil nodes and the honest nodes. DAS exploits this property so as to bind the number of identities a malicious user can create. We simulate the effectiveness of DAS both analytically and experimentally. Keywords: MANETs, Security Protocol, DAS, Malicious nodes, Cross Layer, Authenticatio
    corecore