International Journal of Computer Networks and Communications Security

Volume 2, Issue 4, April 2014




Advanced Entry Level Protection System for Theft

Pages: 125-128 (4) | [Full Text] PDF (212 KB)
Department of Information Technology, Adhiyamaan College of Engineering, Hosur, India

This project is developed with aims to improve security systems available in current market. This project claims to produce a prototype camera and global system for mobile communication (GSM) interfacing system for security surveillance. This system uses sensor, namely passive infrared receiver (PIR). The PIR function is to detect changes in temperature of human in infrared radiation.This project presents a technique for human Face Recognition based on PCA algorithm (i.e., eigenface method). In this project, the microcontroller used is PIC 16, where it sends data to the computer to activate the camera when the microcontroller receives signals from PIR. MAX232 is used as an interface circuit connecting the microcontroller to the computer. To develop software for the control circuits, software MATLAB is used because the software supports microcontroller PIC 16. Once the camera is activated, it will capture images of intruder and the it will be saved and sent to the mobile phone, through commands the alarm and door lock gun will be activated. For the transmission of picture (MMS), the software used is MATLAB because they support the process of sending picture from computer to phone via GSM modem.
Index Terms Face Recognition, Camera, GSM, PIC 16 Microcontroller, Alarm, Door Lock Gun



Implementation of FHMA Communication System using LabView

Pages: 129-136 (8) | [Full Text] PDF (1.05 MB)
Engr. Abdul Rehman, Engr. Zeeshan Yousuf, Engr. Abdul Aziz, Engr. Fasih-ur-Rehman, Engr. Usman Ali Khan
Department of Electronic Engineering, the Islamia University of Bahawalpur, Pakistan-63100

This research was conducted FHMA (Frequency Hopping Multiple Access) standard using Labview. FHMA was developed in Israel in the spectral efficiency. The main objective of this research is to emphasize the performance of the communication system of FHMA paper. FHMA have good radio features that provide full radio capacity, covering the trunking and untargeted mobile phone, with a choice of services including packet mode, short message services and voice. FHMA is compatible with a wide range of additional services, and can be used as for government, emergency services, transportation and military applications. 
Index Terms BER, Labview, SQPSK, TDMA



Probabilistic Splitting Table helps in back pressure based packet by packet adoptive routing in communication network

Pages: 137-141 (5) | [Full Text] PDF (348 KB)
Department of Information Technology, MIT AOE, Alandi (D), Pune

In the literature we have studied each packet is routed along a possibly different path by using Back Pressure based adaptive routing algorithm. So there is poor delay performance and involve high implementation complexity. After studied Back Pressure algorithm with clearly, we have developed a new adaptive routing algorithm. Here we have designed probabilistic routing table that is used to route packets to per destination queue to decouple the routing and scheduling components of the algorithm. In the case of wireless networks the scheduling decisions are made using counters called shadow queues. The results are also extended to the case of networks that employ simple forms of network coding. In that case, our algorithm provides a low-complexity solution to optimally exploit the routing–coding tradeoff. 
Index Terms Back-pressure algorithm, network coding, Routing, Scheduling



Secure Mutual Authentication Protocol

Pages: 142-145 (4) | [Full Text] PDF (232 KB)
Mrs. Seema P. Nakhate, Prof. R. M. Goudar
Department of Computer Engineering, MIT Academy of Engg. Alandi , pune

In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. ECC based mutual authentication protocol is best suited for constrained environments where the resources such as computational power, storage capacity are extremely limited. Devices are such as Mobile phones, PDA’s, palmtops, smart cards. 
Index Terms Double Authentication, Password change, Mutual Authentication, Session key agreement, ECC