19 research outputs found

    An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    Full text link
    Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted 'malicious'. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.Comment: 11 pages, 6 figures, accepted and cited in "First International Conference on Computer Science, Engineering and Applications (CCSEA-2011)

    Advance Intelligent Video Surveillance System (AIVSS): A Future Aspect

    Get PDF
    Over the last few decades, remarkable infrastructure growths have been noticed in security-related issues throughout the world. So, with increased demand for Security, Video-based Surveillance has become an important area for the research. An Intelligent Video Surveillance system basically censored the performance, happenings, or changing information usually in terms of human beings, vehicles or any other objects from a distance by means of some electronic equipment (usually digital camera). The scopes like prevention, detection, and intervention which have led to the development of real and consistent video surveillance systems are capable of intelligent video processing competencies. In broad terms, advanced video-based surveillance could be described as an intelligent video processing technique designed to assist security personnel’s by providing reliable real-time alerts and to support efficient video analysis for forensic investigations. This chapter deals with the various requirements for designing a robust and reliable video surveillance system. Also, it is discussed the different types of cameras required in different environmental conditions such as indoor and outdoor surveillance. Different modeling schemes are required for designing of efficient surveillance system under various illumination conditions

    Bulk Disposal of Unserviceable Toxic Cresylic Acid Waste Using Polymerisation Technique

    Get PDF
    A bulk amount of unserviceable toxic cresylic acid waste has been disposed off in a safe and environmentally benign manner. A process to immobilize this waste into non-toxic solid cresol formaldehyde polymer has been developed. Initial study was performed for 1.0 Kg batch size for optimizing the process parameters and conditions, and on the basis of this data, process was scaled-up for bulk disposal (100 Kg / batch). The effect of ratio of reactants, type of catalyst [H2SO4, NaOH and Ca(OH)2], catalyst concentration, reaction temperature and reaction time have been studied in a batch process. Maximum immobilization in the 1.0 Kg batch studies was obtained when cresylic acid and formaldehyde were taken in a molar ratio 1 : 1.5 using NaOH as a catalyst. For bulk polymerization, a ratio of 1.0 : 1.2 (cresylic acid : formaldehyde) with NaOH {0.7 % (wt. / wt. of total charge)} was found optimum. The final polymerized product has been buried as per standard procedure in two brick lined pits and finally, the site has been declared as free from the toxic waste.Defence Science Journal, 2011, 61(5), pp.505-511, DOI:http://dx.doi.org/10.14429/dsj.61.51

    A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks

    Get PDF
    In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-based trust as well as data-based trust. Various metrics such as closeness, honesty, intimacy and frequency of interaction are taken into account to compute behavioral-based trust of beacon nodes. Further, the composite (behavior and data) trust value of each beacon nodes is broadcast to Base Stations (BS) to generate a blockchain of trust values. Subsequently, the management model discards the beacon node with least trust value and that ensures reliability and consistency of localization in WSNs. The simulated results of the proposed algorithm are compared with the existing ones in terms of detection accuracy, False Positive Rate (FPR) and False Negative Rate (FNR) and Average Energy Consumption (AEC)

    A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect

    Get PDF
    Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature of this technology has given the wide acceptance to its range of applications in various sectors. Seeing the prospect of this new technology, we have chosen the field of human resource management as these data needs to be privacy preserving and confidential along with significant research value. Distributed ledger approach is a novel idea in this field of work specifically for the application of human resource records management. We have used a privacy preserving framework that provides a transparent system for human resource record management. Wallets are generated with organization id and outputting with public-private key pair along with anonymity mapping with hash. Keys are used to provide confidentiality, integrity and authentication. Smart contract uses distributed but converged decision with privacy level classification. Performance of the proposed work has been measured based on time, memory consumptions, failure point identification and read-write latencies. The analysis of the results confirms the efficiency of the system

    CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

    Get PDF
    The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources with these huge connections. Therefore, in this paper we present a signcryption framework to address the above problems. The solution highlights the use of aggregate signcryption and certificaless approach based on bilinear pairings. The use of signcryption with aggregation and certificateless authentication reduces the time consumption, overhead and complexity. The solution is also able to solve the key staling problems. Experimental results and comparative analysis based on key parameters, memory utilization and bandwidth utilization have been measured. It confirms that the presented work is efficient for IoT infrastructure

    Decentralized Accessibility of e-commerce Products through Blockchain Technology

    Get PDF
    A distributed and transparent ledger system is considered for various \textit{e}-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This solution, named as ‘PRODCHAIN’, is a generic blockchain framework with lattice-based cryptographic processes for reducing the complexity for tracing the e-commerce products. Moreover, we have introduced a rating based consensus process called Proof of Accomplishment (PoA). The solution has been analyzed and experimental studies are performed on Ethereum network. The results are discussed in terms of latency and throughput which prove the efficiency of PRODCHAIN in \textit{e}-commerce products and services.The presented solution is beneficial for improving the traceability of the products ensuring the social and financial sustainability. This work will help the researchers to gain knowledge about the blockchain implications for supply chain possibilities in future developments for society

    A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption

    Get PDF
    The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a longer time to charge up. Therefore, scheduling of vehicles in charging stations is required. esides, the information of the EVs and its location is also stored by the charging stations and therefore creates a concern of EV privacy. Various researches are going on to solve these problems; however, an efficient privacy-preserving solution is less practiced till date. In this paper, a framework for Electric Vehicle (EV) charging is discussed. The framework uses the concept of Matching Market to identify a charging station and uses the lattice-based cryptography for secure communications. The matching market considers multiple factors to provide the best allocation of charging station and cryptography ensures security and privacy preservation. The use of lattice-based cryptographic hash SWIFFT avoids heavy computation. This usage of matching market and lattice cryptography, more specifically signcryption for EV charging framework are the highlights of the solution and add-ons to the novel features. Overall, the presented framework is efficient in terms of computation and communication cost, satisfaction ratio, slot ratio, charging latency and load balancing index. The performance metrics are compared with recent developments in this field

    A Novel Review on Routing Protocols in MANETs

    Get PDF
    Mobile means moving and ad hoc means temporary without any fixed infrastructure so mobile ad hoc networks are a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration. MANETs are generating lots of interest due to their dynamic topology and decentralized administration. Due to the diverse applications which use MANETs for wireless roaming it is a current research issue. There are different aspects which are taken for research like routing, synchronization, power consumption, bandwidth considerations etc. This paper concentrates on routing techniques which is the most challenging issue due to the dynamic topology of ad hoc networks. There are different strategies proposed for efficient routing which claimed to provide improved performance. There are different routing protocols proposed for MANETs which makes it quite difficult to determine which protocol is suitable for different network conditions as proposed by their Quality of service offerings. This paper provides an overview of different routing protocols proposed in literature and also provides a comparison between them
    corecore