bringing the world locally
About us
Subscription
Review Committee
Conferences
Publications
FAQ
Contact
 
Members Login
    You are not logged in.
Username


Password



CiiT International Journal of Networking and Communication Engineering
Print: ISSN 0974 – 9713 & Online: ISSN 0974 – 9616

20082009 2010 2011 20122013
   January February March April May June July August September November December

Issue: August 2013
DOI: NCE082013001
Title: Fault Forbearance Methods for Randomized Intrusion Tolerance
Authors: R. Vikkram, M. Sathya Prasath and R. Vidhyalakshmi
Keywords: Randomized Protocols
Abstract:
    The main objective of this project is to provide services and randomize the intrusion tolerance in both LAN and WAN networks. Intrusion into a part of the system should give access only to non-significant information, intrusion-tolerant spread systems, there is an necessary predicament: consent Existing Protocols only Behavior-based (or anomaly detection) systems Knowledge-based (or misuse detection) systems. This paper describes the implementation of a stack of randomized intrusion-tolerant protocols and evaluates their performance under different fault masses .One of the main purposes is to explain that randomization can be efficient and should be regarded as a valid solution for practical intrusion tolerant distributed systems. The paper has two main contributions: (1) it presents the design and implementation of a stack of randomized intrusion tolerant protocols, discussing several optimizations – to the best of our knowledge, the achievement of a stack with the four structural properties above is novel; (2) it provides a detailed evaluation of RITAS in both LAN and WAN settings, showing that it has motivating latency and throughput values. Randomization is only one of the techniques that can be used to circumvent the FLP impracticality result. Other techniques include malfunction detectors, unfinished synchrony and circulated wormholes. Some of these techniques have been employed in the past to build other intrusion-tolerant protocol suites.

Full PDF


Issue: August 2013
DOI: NCE082013002
Title: Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation
Authors:Sanjay Chaudhari and Dr. Deepak Dembla
Keywords: B-B Equation, Chaos, Cryptography, Image Encryption, Image Decryption
Abstract:
   In today’s era advanced digital technologies have made multimedia data widely available. Recently, multimedia applications become common in practice and thus security of multimedia data has become main concern. The basic issues pertaining to the problem of encryption has been discussed and also a detailed analysis on image encryption techniques based on chaotic schemes has been dealt in the present communication. The chaotic image encryption can be developed by using properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform. Generally chaotic based cryptography is not suitable for practical application. It does not secure algorithm due to dependency of initial condition [1][3], which can be easily broken. This Algorithm is optimizing by B.B equation. Modern cryptography provides a theoretical foundation based on which one can understand what exactly these problems are, how to evaluate algorithm that purport to solve them and how to build algorithm in whose security one can have confidence. This concept leads to techniques that can simultaneously provide security functions and an overall visual check, which might be suitable in some applications. The performance is analyzed against different encryption algorithm such as A.E.S, D.E.S AND X-OR, a regular well-behaved DSR network is used as a reference. The experimental results are being studied under DVPB-HD is a rapid development platform based on TITMS320DM6467 DaVinci™ Technology. Simulation experiments have been carried out in order to evaluate performance of proposed algorithm under different input images in (k.b)
This algorithm proved secure against brute-force and plain-text attack resolve in [10].

Full PDF


Issue: August 2013
DOI: NCE082013003
Title: Implementation of EESCP Protocol in Mobile Adhoc Networks.
Authors: P. Paruthi Ilam Vazhuthi, S. Parthiban and V. Thiyagarajan.
Keywords: Security; Leader Election; EESCP; Mobile Adhoc Networks.
Abstract:
     Recent year a rapid development and widespread application of mobile ad hoc networks suffer from security attacks and privacy issues which dramatically impede their applications. To cope with the attacks, a large variety of intrusion detection techniques such as authentication, authorization, cryptographic protocols and key management schemes have been developed. Clustering methods allow fast connection, better routing and topology management of mobile ad hoc networks (MANET). This paper, we have introduced new mechanism called Energy Efficiency and Secure Communication Protocol (EESCP) is to divide the MANET into a set of 2-hop clusters where each node belongs to at least one cluster. The nodes in each cluster elect a leader node (cluster head) to serve as the IDS for the entire cluster. To balance the resource consumption weight based leader election model is used, which elected an optimal collection of leaders to minimize the overall resource consumption and obtaining secure communication using diffie- Hellman key exchange protocol.

Full PDF


Issue: August 2013
DOI: NCE082013004
Title: Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity
Authors: G. Sankareeswari and C. Jeganathan
Keywords: Authenticity, Dynamic, Ranked search, Searchable Encryption, Order-Preserve Mapping
Abstract:
    Sensitive clouds data have to be encrypted before outsourced to the commercial cloud environment, which makes effective data utilization, service a very challenging task. In this paper, define and solve the problem of secure ranked keyword search over encrypted cloud data. Enhance system usability by enabling search result relevance ranking instead of sending undifferentiated results and further ensures the file retrieval accuracy through Ranked search. Specifically, The statistical measure approach explore, i.e., relevance score, from information retrieval to build a secure searchable index, develop a one-to-many order-preserving mapping technique to properly protect those sensitive score information. Hence, supporting the score dynamics in the searchable index for an RSSE system, the corresponding file collection updates reflected thus of practical importance. Thus, enabling a search result authentication mechanism that can detect such unexpected behaviours of cloud server is also of practical interest and worth further investigation. The resultant design is able to facilitate efficient server-side ranking without losing keyword privacy.

Full PDF


Issue: August 2013
DOI: NCE082013005
Title: Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility
Authors: Tarun Dhar Diwan, Shikha Mishra and Shubhra Tiwari
Keywords: Vibration Monitoring, Dynamic Control, Measuring Motion, Acceleration, Inclination, Graphical User Interface
Abstract:
      In This Paper As it is known that Railways are the second fastest means of transport in the country and therefore it demands great security and safety. The main aim or objective is to prevent all the passengers from any sudden accidents due to rail crack that can leads to derailment. In this particular report the combination of nadal’s theory and the lateral and vertical vibrations of ride comfort have been calculated. On the basis of this information, the frequency of vibrations can be analyzed and efforts can be made to cease any sort of accidents. As it is closely associated with passenger and cargo transportation, it owns high risk in terms of human lives and cost of assets. New technologies and better safety standards are constantly introduced but still accidents do occur. There will always be some risk associated with derailments and collisions but it can be reduced by detailed research of the root causes, Indian Railway transport is one of the major modes of transportation, so it must offer high comfort level for the passengers and the staff. However, the comfort that passengers experience is a highly complex and individual phenomenon. In several researches, noise and vibration have been identified as the most important factors for high comfort. The main sources of vibration in a train are track defects, that causes wheel flange climb or rail rollover. The nature of vibration itself is random and covers a wide frequency range. The improvement of passenger comfort while travelling has been the subject of intense interest for many train manufacturers, researchers and companies all over the world. Although new techniques in manufacturing and design ensure better ride quality in railway carriages, it is sometimes impossible to completely eliminate track defects or various ground irregularities.

Full PDF


Issue: August 2013
DOI: NCE082013006
Title: Dynamic Job and Resource Grouping-based Scheduling in Grid Computing
Authors: P. Ashok
Keywords: Grid Computing; Resource Grouping; Job Grouping; RBGA Algorithm
Abstract:
     Grid computing is a group of clusters connected over high-speed networks that involves coordinating and sharing computational power, data storage and network resources operating across dynamic and geographically dispersed locations. However, scheduling in grid is confronted with many challenges, because resources are heterogeneous, geographically dispersed and dynamic in nature. In this paper, a new resource grouping algorithm called Resource Based Grouping Algorithm (RBGA), is proposed. that performs job grouping activity at runtime and the simulation results shows significant improvement in the processing time of jobs and resource utilization as compared to others.

Full PDF


Issue: August 2013
DOI: NCE082013007
Title: Methods of Reducing False Alerts by Intrusion Detection System
Authors: PrajaktaSandeepJadhav
Keywords: Intrusions, Firewalls, Types of IDS, Misuse Detection and Anomaly Detection
Abstract:
     To accommodate the information security growth and hacker's improved strategies and tools, intrusion detection systems (IDSs) are required to be allocated across the network. Organizations require security systems that are flexible and adaptable in order to combat increasing threats from software vulnerabilities, virus attacks and other malicious code, in addition to internal attacks. To meet organizational objectives and requirements the intrusion detection systems must be effective. This paper gives an overview of Intrusion Detection Systems ability to detect the intrusions in computer systems after a thorough comparative theoretical study. Different security threats are made on the networks and are caused by the intruders who either misuse the assigned privileges or access the systems via internet. Paper also highlights the mechanism of data recovery from corrupted processes, which can be incorporated in any Intrusion detection system.

Full PDF


Issue: August 2013
DOI: NCE082013008
Title: FPGA Implementation of Reconfigurable Low Complexity Variable Filter for Future Audio Processing Applications
Authors: P. Ragulbabu, T. Kanagaraj and R. Gowrishankar
Keywords: Coefficient Decimation, Variable Digital Filter (VDF), Warped Filter
Abstract:
      The paper is an efficient implementation of highly reconfigurable digital filter with variable low-pass, high-pass, band-pass, and band-stop responses is presented. The variable filters, obtained by replacing each unit delay of a digital filter with an all-pass filter, are widely used for various audio processing applications. Existing method warped filters require first-order all-pass transformation to obtain variable low-pass or high-pass responses, and second-order all-pass transformation to obtain variable band pass or band stop responses. To overcome this drawback, the proposed method replaces warped filters due to variable filters the advantage is to design single lowpass filter which will used for various such as high pass, band pass and band stop filters and so on. The proposed architecture provides variable low-pass or high-pass responses with fine control over cut-off frequency and variable bandwidth band-pass or band-stop responses at an arbitrary center frequency without updating the filter coefficients or filter structure. The design example shows that the proposed variable digital filter is simple to design and offers substantial savings in gate counts and power consumption over other approache.

Full PDF