

Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique |
Pages: 210-215 (6) | [Full Text] PDF (644 KB) |
Dr. M.Hassan Islam and Misbah Zareen |
Center of Advance Studies in Engineering, Department of Computer Engineering, U.E.T Taxila Pakistan |
Abstract - Mobile Ad Hoc Networks (MANETS) are vulnerable to malicious node attacks because they spoil the integrity of network by consuming network resources, dropping packets and false routing. Routing misbehavior can be avoided by following trusted path for data transmission. Existing Trust based mechanisms for secure routing increase overhead and complexity w.r.t processing and architecture. We compare multiple trust based secure routing techniques. The primary focus of this paper is to present an ad-on technique named ‘Explicit No’ with reduced complexity, for evaluating trust worthiness of a neighboring node. This scheme helps in mitigating the effect of malicious nodes by correct identification. Results are presented through simulation in NS2. |
Index Terms - MANETS, Trust, Malicious nodes, AODV, Network Simulator (NS2), Security |
The Network Architecture Designed for an Adaptable IoT-based Smart Office Solution |
Pages: 216-224 (9) | [Full Text] PDF (0.99 MB) |
Karol FURDIK, Gabriel LUKAC, Tomas SABOL, Peter KOSTELNIK |
InterSoft, a.s., Florianska 19, SK-040 01, SlovakiaDepartment of Cybernetics and Artificial Intelligence, Faculty of Electrical Engineering and Informatics, Technical University of Kosice, Letna 9, SK-042 00, SlovakiaDepartment of Banking and Investment, Faculty of Economics, Technical University of Kosice, B. Nemcovej 32, SK-040 01, Slovakia |
Abstract - The paper presents a prototype of the Smart Office system, which was developed as one of pilot applications of the FP7 EU project ELLIOT, http://www.elliot-project.eu. The described solution is based on the LinkSmart semantic middleware, http://sourceforge.net/ projects/linksmart/, an open source technology enabling a construction of distributed enterprise Internet of Things applications. LinkSmart was enhanced on features of seamless networking and interoperability of connected devices within the another FP7 EU project EBBITS, http://www.ebbits-project.eu. Principles of the system architecture and service-based networking are discussed and demonstrated on the Smart Office solution, employing the approach of user experience monitoring and continuous evaluation for adjusting the application to desired knowledge, social, and business parameters. |
Index Terms - Internet of Things, Semantic Middleware, Peer-to-peer Networking, Smart Office, User Experience Evaluation |
Decisive Factors of False Detection on Spectrum Sensing in Cognitive Radio |
Pages: 225-231 (7) | [Full Text] PDF (615 KB) |
Lailun Nahar, Sameha Zaman Ruthi, Fakir Mashuque Alamgir and Anwarul Azim |
East West University, Department of Electrical & Electronic Engineering, Dhaka, Bangladesh |
Abstract - The increasing demand of wireless communication introduces efficient spectrum utilization challenges. Cognitive radio has emerged as the key technology to address this challenge which enables opportunistic access to the spectrum. Cooperative spectrum sensing improves the probability of detection by collaborating to detect primary users signal in cognitive radio (CR) system as well. The goal of this thesis is to cooperate the cognitive users to increase the detection probability for a given probability of false alarm and find out the better condition of sensing spectrum among three rules: AND, Majority, OR. It is observed that under the AWGN the detection probability for a given value of false alarm has been significantly achieved by optimal value of detection probability in the AND rule as the number of the user increases. Finally we have observed that due to fading condition, AND rule gives better performance in detection probability among three rules.. |
Index Terms - Cooperative Sensing, Probability of False Alarm, Probability of Miss Detection, AWGN Channel, Fading Condition |
Design and Implementation of Geographic Information Systems of Poor Households on Web Based in Ketapang Regency |
Pages: 232-236 (5) | [Full Text] PDF (554 KB) |
Muhammad Azhar Irwansyah and Hendro |
Department of Engineering, the University of Tanjungpura, Pontianak, Indonesia |
Abstract - Poverty is a complex phenomenon and multidimensional issue. Ketapang regency breadth and characteristics of different poverty require different strategies to handle another kind of poverty. The poverty areas in Ketapang District, which generally are in rural and isolated areas with limited accessibility. The decreasing of poverty strategies which has been done is more sectoral approach and does not provide optimal results, while the action on the field tend to be less in favor and unusual according to the ability of the main citizen. Poverty alleviation programs will run properly, if a local government has datas on poor households those are accurate and up-to-date, so that is necessary for Geographic Information System Web-Based Poor Households in Ketapang that the program will be given to poor households to be right on target. |
Index Terms - Poverty, Poverty Alleviation, Geographic Information Systems, Web |
Data Privacy: An End-User Perspective |
Pages: 237-250 (14) | [Full Text] PDF (292 KB) |
Esma Aïmeur, Gilles Brassard, Jonathan Rioux |
Département d’informatique et de recherche opérationnelle, Université de Montréal, Canada |
Abstract - Online privacy has become a raising concern for digital citizens within the past few years. As users of the Internet, we are in an uncomfortable situation regarding the protection of our online data. We share, tweet, like and follow at an ever-increasing rate, while at the same time getting more aware of the possible dangers of privacy breach or identity theft. Is it possible to navigate on the web while being sure we’re not being spied on? This paper highlights the main data collection fields, taking a user’s view on the risks and tradeoffs regarding online data collection and privacy. |
Index Terms - Privacy, User Experience, Data Collection, Social Media, Identity Theft |
A New Unicast Routing Algorithm for Load Balancing in Multi-Gateway Wireless Mesh Networks |
Pages: 251-256 (6) | [Full Text] PDF (427 KB) |
Mohammad Karim Jafaryan, Mohammad Ali Jabraeil Jamali, Shahin Akbarpour |
Faculty of Engineering, Department of Computer ,East Azarbaijan Science and Research Branch, Islamic Azad university, Tabriz, IranDepartment of Computer, Shabestar Branch, Islamic Azad University, Shabestar, Iran |
Abstract - Gateways are a very important element of wireless mesh networks. They provide the connection between the whole network and the outside world, including the Internet. Since all of input and output traffic in the network go through gateways, these points are simply prone to congestion. Despite having multiple gateways in the network, in the absence of load balancing in the network, some of these gateways are still in danger of congestion that causes traffic aggregation in gateways, and hence, degrading of network throughput. In this paper we propose a method named LBMGW for selecting appropriate gateways that aims load balancing in gateways and increasing network performance. LBMG is the measure for selecting a gateway which is a combination of measures such as negative percent hop, time, and internal load in each gateway. Furthermore, some conditions have been considered to prevent control overhead inside the network. GloMoSim has been used for simulations. Then the results are compared with other available methods that show improvement in throughput of wireless mesh networks with the proposed method. |
Index Terms - Wireless Mesh Network, Gateway load Balancing, Negative Percent Algorithms |
The Security of Information in Financial Transactions via Mobile: Algorithms |
Pages: 257-263 (7) | [Full Text] PDF (238 KB) |
ASSIS. PROF. DR. ELHAM FARIBORZI, ENG. HODA ANVARI KAZEMABAD |
Faculty member, Department of Educational Studies, Islamic Azad University-Mashhad Branch, Mashhad, IranIslamic Azad University-Mashhad Branch, Mashhad, Iran |
Abstract - Today, mobile commerce or m-commerce has been considered by many companies, business, and organizations. In mobile commerce, information security of financial transactions is very important. It is due to account information which exchanged including account number, password, credit accounts, etc. and the disclosure of this information will cause a lot of financial and moral losses. For this reason, it should be used algorithms for them to make and increase secure transactions. Among these algorithms, WAP, J2ME, Toolkit SIM applications are identified and described in this article based on a systematic review. In addition, there are some recommendations regarding to suit different situations to implement a particular algorithm for this issue. More results are subsequently explained in this paper. |
Index Terms - Algorithms, security, mobile, mobile device |
Implementation of a New Concept of Conduct of the Electric Network Based on the Control of Topology |
Pages: 264-271 (8) | [Full Text] PDF (1.16 MB) |
Mr. Najd BELAGUIDE, Mr. Abdelaziz BELFQIH, Mr. Abdellah SAAD |
Energy and Power Systems Team, National Higher School of Electricity and Mechanics (ENSEM) Hassan II Ain Chok University, PO Box 8118, Oasis, Casablanca, Morocco |
Abstract - The conduct of the electrical networks has known in recent year’s major changes induced mainly by the technological development of power electronics as well as the information systems and communication (Smart Grid), added to this is the integration of intermittent sources of production and competitive requirements advocating the power quality and the continuity of service as major objectives. That said it is understood that the electrical networks serve a set of vulnerabilities due to the intrinsic parameters including the' topology' of the network which requires the distribution of power that can migrate to unstable states face particular hazards. Before foregoing the present work is a participation in the development of a new concept of regulation of power systems based on the control of the topology provided to develop the network stability by a new field control which is not supported in patterns regulatory body. |
Index Terms - Load Flow, Smart Grid, FACTS |
An Effectual Identification and Prevention OF DDOS Attacks in Web Using Divide-And-Conquer Algorithm |
Pages: 272-277 (6) | [Full Text] PDF (375 KB) |
T.R KAVITHA, G. VELMAYIL |
Department of Computer Science, Quaid-e-Millath College for women, Tamilnadu, India |
Abstract - In this modern computerized world, large number of new technologies has been emerging. With the tremendous growth of internet services, websites are becoming indispensable. Websites are the common source through which they are made accessible to all. The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, In other words, DDoS attacks also are growing in equal proportion. Websites become accessible to large number of users, it may sometimes lead to overload of the server due to the maximum utilization. The result is server performance goes down and the processing time becomes slow. Sharing of information is being carried out by means of server and client. The client requests for the data from the server and the server provides the response for the client-request. Here the client can violate the server performance by sending continuous or anomaly requests. The result is the server performance becomes degraded. This paper discusses how best the degradation of the performance can be identified and prevented using some algorithm proposed in the methodology. In this work the blocking and preventing is done using a different mechanism based on the category of the client. |
Index Terms - Server, Client, Response, Request, Degradation, Blocking, Category |
DiffServ over WiMAX network simulation testbed |
Pages: 278-283 (6) | [Full Text] PDF (689 KB) |
Oumarou HALIDOU and Radouane MRABET |
Mohammed V University – Souissi, National High School for Computer Sciences and Systems Analysis, Rabat, Morocco |
Abstract - The broadband wireless IEEE 802.16 technology, known as WiMax transmission, is one of the first systems designed as multi service integrating QoS management from the beginning. Its wide deployment through the Internet has attracted great interest from researchers and industrialists. WiMAX has defined five classes of service as well as their requirements. However, the standard has not specified the different scheduling and queue management algorithms to use. In this paper, we are presenting simulations of a WiMAX network with several scenarios that we have defined under the NS simulator, involving different data flow to measure the quality of the service offered. |
Index Terms - WiMAX, DiffServ QoS, scheduling, queue, NS |