686 research outputs found

    Efficiency in MANET Systems using Energy efficient encryption algorithm

    Get PDF
    In this paper, we study Group key agreement means multiple parties want to create a common secret key to be used to exchange information securely. The group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbor and has no information about the existence of other users. Further, he has no information about the network topology. We implement the existing system with more time efficient manner and provide a multicast key generation server which is expected in future scope by current authors. We replace the Diffie Hellman key exchange protocol by a new multicast key exchange protocol that can work with one to one and one to many functionality. We also tend to implement a strong symmetric encryption for improving file security in the s

    A Review of Cluster Heads Selection in WSN

    Get PDF
    In recent years there has been a growing interest in Wireless Sensor Networks (WSN). Recent advancements in the field of sensing, computing and communications have attracted research efforts and huge investments from various quarters in the field of WSN. Also sensing networks will reveal previously unobserved phenomena. Network’s lifetime depends on energy efficiency and load balancing of wireless sensor network. The main aim of clustering is to provide the scalability and reduce energy consumption. Cluster head consume more energy as compare to non cluster head nodes. Proper selection of cluster head increases the network lifetime and energy efficiency. This paper provides an overview of clustering, cluster head election mechanisms and LEACH protocol

    Fusion of Two Images using DWT and PCA Methodology

    Get PDF
    Image fusion is of extraordinary significance in safeguard and data from various images of same scene. The consequence of fusion is another image which is more reasonable for human and machine recognition. Pixel level image fusion utilizing wavelets and essential part investigation has been actualized and illustrated. diverse execution measurements with and without reference image are actualized to assess the execution of mage fusion calculations. It has been reasoned that image fusion utilizing wavelets with larger amount of disintegration indicated better execution in a few measurements and in different measurements PCA demonstrated better execution

    Survey on Security User Data in Local Connectivity Using Multicast Key Agreement

    Get PDF
    In this paper, we study Group key agreement means multiple parties want to create a common secret key to be used to exchange information securely. The group key agreement with an arbitrary connectivity graph, where each user is only aware of his neighbor and has no information about the existence of other users. Further, he has no information about the network topology. We implement the existing system with more time efficient manner and provide a multicast key generation server which is expected in future scope by current authors. We replace the Diffie Hellman key exchange protocol by a new multicast key exchange protocol that can work with one to one and one to many functionality. We also tend to implement a strong symmetric encryption for improving file security in the system

    Ideal Meeting Location According to User privacy

    Get PDF
    Outfitted with cutting edge Smartphone and cell phones, today's exceptionally interconnected urban populace is progressively reliant on these contraptions to sort out and arrangement their everyday lives. These applications frequently depend on current (or favored) areas of individual clients or a gathering of clients to give the sought administration, which imperils their security; clients would prefer essentially not to uncover their current (or preferred) locations to the administration supplier or to other, potentially untrusted, clients. In this paper, we propose protection saving calculations for deciding an ideal meeting area for a gathering of clients. We perform an intensive security assessment by formally measuring protection loss of the proposed methodologies. With a specific end goal to concentrate on the execution of our calculations in a genuine organization, we actualize and test their execution effectiveness. By method for a focused on client study, we endeavor to get an understanding into the protection familiarity with clients in area based administrations and the convenience of the proposed solutions.[1

    Comparative Analysis of Image Fusion using DWT, PCA and BBF

    Get PDF
    Now-a-days, medical image fusion is one of the upcoming fields which helps in easy diagnostics and helps to bring down the time gap between the diagnosis of the disease and the treatment. In Magnetic Resonance Image (MRI), anatomy and soft tissues are visible and it has high spatial resolution. In Computed Tomography (CT) images bony structures appears brighter. Analysis is done to determine the image fusion algorithm which is more suitable for clinical diagnosis. Analysis is also done on image quality assessment parameters of image fusion. Image fusion is of extraordinary significance in safeguard and data from various images of same scene. It has been reasoned that image fusion utilizing wavelets with larger amount of disintegration indicated better execution in a few measurements and in different measurements PCA demonstrated better execution. We also illustrate different results based on all three methodology and compare results based on time and quality of images using PSNR

    A Novel Encryption Scheme for Providing Security and Energy Efficiency in Mobile Ad-Hoc Networks

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel –Ziv – Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application

    Multihead Node Selection Technique for Improving Lifetime and Energy Efficiency of WSN

    Get PDF
    In this paper, a three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-DDU. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The results show that when each cluster has at most two cluster heads, LBC-DDU achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering. This system provides much better efficiency as compared to SISO system

    Targeted Advertising using Location

    Get PDF
    Advertising is the key factor of any social sites. The explosive growth of social networks increases the prolific availability in customer tastes and preferences. This data can be exploited to serve the customers better and offer them the advertisements to the customers. To provide relevant advertisements to consumers, its important to consider the location of the consumer as well. The consumers will be highly contented if the offers shown to them are easily accessible in nearby areas. we propose a model combining the idea of social and spatial data to provide targeted advertisements. Social data is acquired through user's Facebook profile and location of the user is found with the help of Beacons. In these we are also using the concept of GPS (Global Positioning System). GPS helps for providing the service globally, in which we can provide multiple services to multiple users. The GPS system operates independently of any internet reception, though these technologies can enhance the usefulness of the GPS positioning information

    Implementation of Majority Based voting protocol in group based system with re-ranking

    Get PDF
    A Mobile Ad Hoc Network is a decentralized kind of remote system. It doesn't have any altered foundation and the hubs can impart straightforwardly between one another. Because of its open nature issues like security and vitality utilization emerges. This paper presents an in number encryption calculation keeping in mind the end goal to expand dependability and security for MANETs. At the point when huge volume of information is to be sent, information pressure method is a straightforward procedure, with the advantage of diminishing the transmission rate that devours less transfer speed and low power. Lempel �Ziv � Welch (LZW) pressure calculation when connected on coded message assists in furnishing security with low battery utilization. Such a plan composed practically speaking will help in building secure MANET based application
    • …
    corecore