

A Combined Localization-Synchronization Method for Underwater Communicatio |
Pages: 414-422 (9) | [Full Text] PDF (409 KB) |
ZAHRA MOUSAVI and REZA JAVIDAN |
Department of Computer Engineering and Information Technology, Shiraz University of Technology |
Abstract - In underwater communication usually localization and time synchronization of nodes are important processes which are treated separately. However in Wireless Sensor Networks (UWSNs) saving energy of nodes is another important factor. To save energy, it is an increasing interest to do these works together. In this paper a new method for combined localization and synchronization for communications in UWSNs is proposed. In this method the attribute of sound wave has been considered and stratification effect is used to compensate the bias in range estimates. This is a main important factor that is not considered in other related researches. In addition, mobility of nodes is considered as another parameter in this solution. Simulation results on prototype data showed the effectiveness of the proposed method. In addition, it is compared with another well-known method and the results show the outperforming results for the proposed method. |
Index Terms - Synchronization, Localization, Stratification effect, Underwater Wireless Sensor Network |
A Survey on key pre-distribution Schemes for security in Wireless Sensor Networks |
Pages: 423-442 (20) | [Full Text] PDF (430 KB) |
Samira Akhbarifar and A. M. Rahmani |
Research and Science University, Tehran, Iran |
Abstract - WSN is the union of set of thousands of small sensor nodes, which have limited the capability of sensing, computing, and channeling the information in the network. Key pre distribution management is the most essential cryptographic in every kind of applications where security is worried. In recent years, there are many schemes proposed for the security, one of the central issues of these schemes is the key pre distribution management. In this paper, we classify the existing solutions and describe the key pre distribution techniques; we distinguish some advantages and disadvantages of those. In addition, we characterized all of the schemes by useful and useless properties of these. In order to categorize them, we draw taxonomy and table charts. |
Index Terms - Wireless Sensor Networks, Key Management, Key Pre Distribution |
Optimization of Energy Consumption in Clustered Nodes of WSN Using the Black Hole Algorithm |
Pages: 443-447 (5) | [Full Text] PDF (422 KB) |
Masoum Farahmandian and Abdolreza Hatamlou |
Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, IranDepartment of Computer Engineering, Khoy Branch, Islamic Azad University, Khoy, Iran |
Abstract - Nowadays due to the low cost and easy communication, Wireless Sensor Networks (WSN) have many uses for supervisory activities in a variety of environments. The limitation of the energy available in the nodes of the networks is the main problem that affects the survival of the network. Studies have shown that with the creation of control on the number and location of the cluster heads on, the efficiency of energy can increase which results in increase of the life of the network. However, due to the dynamic nature of the issue and due to continuous changes in cluster heads in any of the network activity, this issue is not applicable to classical methods of modeling. In this study using black hole algorithm (BHA), we determine the number and location of the cluster heads to the best optimization. Fitting the criterion will be based on the minimum consumed energy of each node in the network in every data transmission operation period that will be led to the creation of a balance in energy consumption of cluster heads and consequently longer life of network. |
Index Terms - Wireless Sensor Networks, BHA, Classification of Clusters, Cluster Heads, Energy Balance, Optimization |
STECEQL: A Spatio-Temporal Constraint Event Query Language for Internet of Vehicles |
Pages: 448-455 (8) | [Full Text] PDF (436 KB) |
HUIYONG LI, YIXIANG CHEN AND YUJING MA |
Software Engineering Institute, East China Normal University, Shanghai, P.R. China |
Abstract - In recent years, the complex event technology has been widely used in the monitoring and real-time querying information of the internet of things. The internet of vehicles is a novel researching area of the intelligent transportation systems, which developed with the technology of internet of things. It is different from the traditional internet of things. There are a large number of moving objects and they will produce large amounts of temporal and spatial information in the internet of vehicles. It becomes the core issue of the complex event technology in the internet of vehicles, how to effectively represent and process these information of the moving objects. We propose a novel temporal and spatial constraint complex event query language STeCEQL for the internet of vehicles. In STeCEQL, we use time interval as temporal model and grid map as spatial models. We give the syntax and operational semantics of STeCEQL based on the temporal and spatial model. Finally, our experiments illustrate the effectiveness of the operational semantics. |
Index Terms - Event Driven Architecture, Event Query Language, Internet of Things, Internet of Vehicles, Grid Map, Mobile Systems |
An Enhanced Data Security with Compression for MANETs |
Pages: 456-461 (6) | [Full Text] PDF (436 KB) |
G.Soma Sekhar and Dr.E.Sreenivasa Reddy |
Research Scholar, Department of CSE, Acharya Nagarjuna University, GunturProfessor, College of Engineering, Acharya Nagarjuna University, Guntur |
Abstract - Ad hoc networking is a wireless networking paradigm for self-organizing networks that until recently has mainly been associated with military battlefield networks. However, with the availability of wireless technologies such as Bluetooth and 802.11 and the development of the next generation networks, civilian applications that exploit the advantages of ad hoc networking are being envisioned. So far most of the research has been carried out to address the routing issues. Whereas other issues such as security, key management and network addressing have received considerably less attention and these issues need to be addressed before any successful applications will appear. In this paper, we propose a novel secured compression algorithm for an ad hoc network in which the packets are encrypted and compressed. The decompression and decryption using the same algorithm happens by a perfect synchronization between the sender and the receiver. It is observed that the proposed security concept may increase the level of confidence in this network. |
Index Terms - Compression, Decompression, Encryption, Decryption, MANETs |
Improved Arithmetic on Elliptic Curves over Prime Field |
Pages: 462-471 (10) | [Full Text] PDF (293 KB) |
NAJLAE FALAH HAMEED AL SAFFAR AND MOHAMAD RUSHDAN MD SAID |
Institute for Mathematical Research, Universiti Putra Malaysia, MalaysiaDepartment of Mathematics, Faculty of Mathematics and Computer Science,Kufa University, IraqInstitute for Mathematical Research, Universiti Putra Malaysia, Malaysia |
Abstract - A fast point doubling and point addition operations on an elliptic curve over prime field are proposed. This occur when we use a special coordinates system (to represent any point on elliptic curve over prime field. Using this system improved the elliptic curve point arithmetic by reducing the computation cost for point doubling and point addition operation. |
Index Terms - Elliptic curve cryptosystem, point arithmetic of elliptic curve, affine coordinates, projective coordinates and Jacobian coordinates |
Comparison of DSR and AODV Routing Ad Hoc Protocols in Robotic Management and Network Communications |
Pages: 472-478 (7) | [Full Text] PDF (648 KB) |
Hanieh Movahedi |
University of Payame Noor, South Center Branch, Tehran, Iran |
Abstract - One of the most important issues in both network and robotic world is controlling and managing their communication with operators and to each other. Ad hoc networks due to their wireless technology without infrastructure has quick trigger and cost slightness which can work efficiently for this matter. Numerous protocols have been used in this field and in the recent study, two famous Ad hoc network protocols have been simulated for 4 km2 work areas with changes of the same elements in types of robots like speed, pause time, number of nodes, and key parameters that show network optimization rate including PDR, Throughput, and End-To-End Delay by using simulation in GloMoSim software. In this research, output has been calculated every time by making the same chance and then, obtained information was investigated statistically for suitable protocols. In total, AODV protocol was recognized that had higher scores than DSR and could be used as an optimum protocol in robotic industries, technically. |
Index Terms - GloMoSim, Ad Hock, AODV, DSR, PDR, MANETs |
An Optimized Approach to Authenticate Users in Kerberos-Based Networks |
Pages: 479-484 (6) | [Full Text] PDF (472 KB) |
Aliakbar Tajari Siahmarzkooh and Milad Shahini |
Ph.D Student, Department of Computer Sciences, University of Tabriz, Tabriz, IranMSc Student, Department of Computer Engineering, University of Mirdamad, Gorgan, Iran |
Abstract - Authentication is a mechanism by which any entity can check whether its partner is one who claims to be in a relationship or is a disrupting that has been replaced by real party. One of the authentication protocols is Kerberos where timestamp is used to avoid sending repeated and unfeigned messages by Trudy. In this article a counter variable is considered for each client that represents number of sent messages from the client to servers. Advantage of this variable that host at ticket granting server is aware of repeated message during send it. Also, at servers we used a binary tree structure to store the messages and searching between them. Simulation results show significant improvement in the face of replay attacks by Trudy and response time to service at Kerberos-Based Network. |
Index Terms - Authentication, Kerberos Protocol, Replay Attack, Ticket Granting Server, Binary Tree |
A survey on Data Mining based Intrusion Detection Systems |
Pages: 485-490 (6) | [Full Text] PDF (229 KB) |
Mala Bharti Lodhi, Vineet Richhariya and Mahesh Parmar |
LNCT, Department of Computer Science Engineering, RGPV University, India |
Abstract - In communication the security is an essential objective. Therefore various security systems are developed for networks, among them the IDS are an essential contribution for security. In this paper IDS technology is investigated in detail. In addition of that recent development on IDS systems is also investigated in this paper. After evaluation of previously developed methodology a new IDS system is proposed for enhancing the performance of the recently developed IDS systems. |
Index Terms - Network Security, IDS, Data Mining, Classification, Review |
Evaluation of security function of Flipora plug-in on browsers |
Pages: 491-495 (5) | [Full Text] PDF (512 KB) |
Mohammad Javad Khazali, Maryam Karimi, Ehsan Sargolzaei and Hassan Ghanbari |
Department of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, IranComputer Engineering Department faculty of Engineering Zabol University, Zabol, IranValayat University of Iranshahr, Iranshahr, Iran |
Abstract - In this research, Flipora plug-in was installed on different browsers. Security evaluation and analysis were performed on the function performance of this plug-in in upon. User traffics that were sent from the browser when during visiting and opening various web pages were evaluated and analyzed. In our simulation, we show that what confidential information will be sent to the intended destination by Flipora plug-in that which was installed on Firefox browser. This information includes the content of visited web pages, the users session, titles and addresses of these websites. Outgoing traffics were on port 80 and http protocol was selected. In the Software security Lab, we show that in addition to the title and URL of visited websites, all contents of the visited pages, along with the users session are sent to the address of the Flipora server. Next furthermore, other plug-ins were studied partially and security suggestions were provided in using the plug-ins installed on the browsers. |
Index Terms - Browsers, Flipora, Plug-in, Data Privacy, Plug-in Security |
Infrared Sensor and FBUS Technology for House Security System Based on Mobile Phone |
Pages: 496-500 (5) | [Full Text] PDF (401 KB) |
YANA HENDRIANA |
Department of Informatic Engineering, Faculty of Industrial Technology, Universitas Ahmad Dahlan Yogyakarta |
Abstract - The growing of technology in this information age is very fast and force us to compete to get more information, that information is power. Computer system and hand phone technology that has grow so fast can be used to get information about anything at any place, include if we aplicate it to house security system.According to the situation that not getting better, but getting worse, people need some protection system that can protect their properties better. This security system exist to answer the need. This security system work based on the ability to receive signal from port LPT1 of printer and the ability to use modem as comunication device. Port LPT1 will detect the signal that sent from infrared receptor through status register. If computer detect any signal then computer will send short messages to the recipient, police or user by phone number that the data taken from data base, so police can immediately come and secure the place. |
Index Terms - Infrared, Modem, Security System, Short Messages |