Intrusion Prevention System (IPS) countering DDOS attack in internetworks
Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. Here, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of Intrusion Prevention Systems (IPSs) located at the Internet Service Providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of FireCol using extensive simulations and a real dataset is presented, showing FireCol effectiveness and low overhead, as well as its support for incremental deployment in real network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A novel approach of drunk drive and face detection with automatic turning signals
The main aim of this project is to design an embedded system for implementing an efficient alcohol and face detection system that will be useful to avoid accidents. Drunk driving face detection with car ignition locking and drowsy driving alert by using raspberrypi aims to change that with automated, transparent , noninvasive alcohol safety check in vehicles. Raspberry pi with dc motor to demonstrate as vehicle engine. If driver is drunk, the processor instantly stops the system ignition by stopping the motor. If alcohol sensor is not giving high alcohol intensity signals, the system lets engine run normally.in additional of this project, automatic turning indication by using gps location tracking and predefined path.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Secure Extended Visual Cryptography Scheme based on Steganography
In steganography, a message is hidden in such a way that no one apart from the intended recipient knows of the existence of the message. It is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. In reversible Steganography, information is disguised within a digital image in such a way that the cover image can be taken to its original state after extracting the hidden information. Visual cryptography is a technique of secret sharing in which images are distributed as shares in such a way that, when these shares are superimposed, a message hidden secretly in the image is revealed. In this study, the concepts of steganography as well as visual cryptography are combined to have benefits of both techniques which will provide improved security for the confidential information being exchanged.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of bio-implantable acoustic power transmitter using comsol 3. 5
Acoustic power transmi-tter was introduced using comsol multiphysics. They can provide electronic energy to other implanted devices by receiving an external acoustic wave generated from the skin surface of the subcutaneous tissue. Piezoelectric ceramics make the internal devices of the receiver, and they are directly charged, converting pressure into an extractable electrical energy. Moreover, the less weight material such as aluminium is used to design the internal devices. Additionally, the designs of transducer which can efficiently absorb the generated charges were also designed using comsol. The actuator which can efficiently generate the required acoustic waves are analysed. The shear bender model generates the required acoustic waves, they were used here to generate the required charges .The material properties for different elements were chosen to maximize the output power .The output power developed is analysed for the different tissue properties such as fatty tissue or muscular tissue .The charge developed is maximum at the top surface of transducer which are easy to extract it to other devices.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure grouping data transmission scheme for multiple applications in wireless sensor network
Data aggregation system is the majority sensible technique for wireless sensor networks. It reduce a large amount of communication. To screen announcement during aggregation homomorphism encryptions have been practical in previous be taught. So the enciphered data can be aggregated algebraically without decryption. Although data aggregation could considerably reduce broadcast, it is defenseless to some attacks. However, these schemes failed to satisfy multi-application surroundings. The main drawback of these scheme is that, it become insecure in case a number of sensor nodes are compromised. Also, these scheme do not provide secure counting. Thus, it is suffer due to unauthorized aggregation attacks. An alternative move toward for this problem is to collective encrypted messages in a straight line from SN, thereby avoid the forgery of aggregate result. To end these drawbacks, we propose a new hidden data aggregation system called CDAMA, provide CDA connecting multiple groups. It is extensive from homomorphism community encryption system. There are three contributions in the proposed system. First, it is intended a multi-application surroundings. Next, it mitigates the crash of compromising attack in single request environments. Compared with conservative schemes, CDAMA mitigates the collision of compromise SN from beginning to end the construction of manifold groups. It reduces the damage from illegal aggregations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
QR Code based Passport Smart Card using an Advanced Encryption Standard (AES) Algorithm
The implementation of QR code based smart card has been becoming an ever increasing popularity in the traceability of products. This QR code smart card contains the Passport details, Pan card details, Aadhar card details.QR code helpful to store and process the information through black and white dots on the QR scanner which transmit by the reader. The QR reader reads the data present in the passport and sends the data by using QR Scanner through wireless network. As soon as the card shown, using QR reader, the details of the person appear on the computer screen and verify it using the data present in the system and if it matches then the details of the passport holder is displayed. It reduces the burden of documentation which thereby reduces the time consumption. This makes the system centralized by increasing the security.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on Intrusion Detection Techniques and Sceneraio for Intrsuion Mechanism
Security has become the greatest problem within and outside the organizations. User ID, passwords and firewalls are the common steps that organizations take to secure their computers. However, these are not so effective mediums in current context of unsecure eon. Intruders and attackers are so advanced that they access the computer and manipulate it, so they cannot be traced easily. Through this contribution objective is to find out & present existing intrusion detection system (IDS) with their pros and cons that will be helpful to select the best one and provide the secure environment so that system will be protected from instrusion and attacks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Canceling donor interference in heart transplantation using adaptive signal processing techniques
Heart Attack and other cardiac diseases have shooted up the death rate in the world in recent years. So they have to be given more importance. Though the Heart transplantation techniques has originated in 1960’s it gained popularity only in 1980’s, after the invention of Anti Rejection Medicine. Now the advancement is such that, the patient’s old heart ECG can alone be monitored by suppressing the interference arising from the new heart, which ease the job of the surgeon, which can be achieved using Adaptive Noise Cancellation Technique. The algorithms such as LMS and RLS were implemented using MATLAB 6.5 and simulated and synthesized using Modelsim and Leonardo spectrum VLSI tools. In future the design will be fused into a chip and dedicated to mankind.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure Data Sharing Model for Cloud Systems
Secure Data Sharing Model for Cloud Computing (SSCC) is a new cryptosystem model that aims to store user's data files in a secure manner to keep it away from the unauthorized access. We have developed a new cryptosystem model that based on the Original Hill cipher algorithm using matrices manipulation and symmetric key cryptography. It gave a good impression by comparing it with previous ways where the comparing results between SSCC and Hill Cipher 6.86% improvement in the encryption time. While when we compare SSCC and Advance Encryption Standard (AES) the difference was 3.94% for AES which means that the proposed model has a chance to compete with AES model. Another comparison is done to cover the two cases: SSCC1 and SSCC2, the SSCC1 with and without compression decreasing the encryption time in a percentage of 96.287%.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
In this paper, we propose a novel joint data-hiding and compression scheme for digital images using side match vector quantization (SMVQ) and image inpainting. The two functions of data hiding and image compression can be integrated into one single module seamlessly. On the sender side, except for the blocks in the leftmost and topmost of the image, each of the other residual blocks in raster-scanning order can be embedded with secret data and compressed simultaneously by SMVQ or image inpainting adaptively according to the current embedding bit. Vector quantization is also utilized for some complex blocks to control the visual distortion and error diffusion caused by the progressive compression. After segmenting the image compressed codes into a series of sections by the indicator bits, the receiver can achieve the extraction of secret bits and image decompression successfully according to the index values in the segmented sections. Experimental results demonstrate the effectiveness of the proposed scheme.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]