International Journal of Computer Networks and Communications Security

Volume 6, Issue 1, January 2018

 

 

A Literature Survey on Smart Home Automation Security
 

A Literature Survey on Smart Home Automation Security

Pages: 1-8 (8) | [Full Text] PDF (379 KB)
RS Ragmahale
Dept. of Comp., Dr. D.Y.Patil Collage of Engineering, Ambi, , Pune University, India

Abstract -
This paper presents a detailed description about different technologies and home automation systems from a security point of view. This paper highlights various security flaws in existing home automation systems and how the concept of security and the meaning of the word “intruder” have evolved over time. We studied the challenges in home automation security from point of view of home owner and security provider. This work considers home automation systems like central controller based home automation systems, context-aware home automation systems, Bluetooth-based home automation systems, Short Messaging Service-based home automation systems, Global System for Mobile communication or mobile-based home automation systems, and Internet based home automation systems. The work is concluded by giving future directions home automation Security Research.
 
Index Terms - Access Control, Data Security, Smart homes, Intrusion Detection

Citation - RS Ragmahale. "A Literature Survey on Smart Home Automation Security." International Journal of Computer Networks and Communications Security 6, no. 1 (2018): 1-8.

Novel Chaotic System for Color Image Encryption Using Random Permutation
 

Novel Chaotic System for Color Image Encryption Using Random Permutation

Pages: 9-16 (8) | [Full Text] PDF (746 KB)
SN Lagmiri, N Elalami, J Elalami
Information and Production System, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco
LAII, Mohammadia School Engineering, Mohamed V University in Rabat, Morocco
LASTIMI, Higher School of Technology of Sale, Mohamed V University in Rabat, Morocco

Abstract -
The recent researches of image encryption algorithms have been more and more interested to combine the encryption methods and the complex behavior of chaotic signals, in order to reach higher security performance. A digital image can be represented by two dimensional arrays which have numeric value called pixel, and can be encrypted by various combination of those pixels. There are various encryption methods to secure image from unauthorized parties. This paper is an implementation of a color image encryption algorithm based on a novel three dimensional chaotic system using a random permutation technique.
 
Index Terms - Encryption, Decryption, Chaotic System, Permutation, Histogram, Correlation Coefficient

Citation - SN Lagmiri, N Elalami, J Elalami. "Novel Chaotic System for Color Image Encryption Using Random Permutation." International Journal of Computer Networks and Communications Security 6, no. 1 (2018): 9-16.

Wildlife Monitoring using AODV Routing Protocol in Wireless Sensor Network
 

Wildlife Monitoring using AODV Routing Protocol in Wireless Sensor Network

Pages: 17-32 (7) | [Full Text] PDF (1.07 MB)
MNB Anwar, S Chowdhury, UM Haque, SNMS Khan
Faculty of Computer Science, American International University- Bangladesh, Dhaka, Bangladesh
Graduated from Computer Science, American International University- Bangladesh, Dhaka, Bangladesh

Abstract -
Wireless Sensor Networks (WSN) is one of the most popular research areas for sensing, measuring and gathering data from environment. The sensed data is sent to the user easily with it which depends on some local decision process. But it has limitation in battery power consumption and transmission range. In applications like wildlife monitoring, tracking animals movement and behavior, reliable communication between sink node and the sensing nodes is very crucial where the routing protocols play vital role for WSN. But for such kind of application, the performance of WSN routing protocols has not been analyzed under any research work so far. In this paper, we have analyzed the performance of a WSN routing protocol known as Ad hoc On-Demand Distance Vector (AODV) for wildlife monitoring application. To achieve the goal, different performance metrics have been analyzed such as throughput, packet delivery ratio (PDR), loss packet ratio (LPR) and end to end delay (End to End) by varying packet interval time, packet size and number of nodes through network simulator NS3 for wireless sensor network with a practical wildlife scenario.
 
Index Terms - Wireless Sensor Network, AODV, Wildlife Monitoring, Throughput, End To End Delay, Packet Delivery Ratio (PDR), Loss Packet Ratio (LPR), IEEE 802.15.4

Citation - MNB Anwar, S Chowdhury, UM Haque, SNMS Khan. "Wildlife Monitoring using AODV Routing Protocol in Wireless Sensor Network." International Journal of Computer Networks and Communications Security 6, no. 1 (2018): 17-32.