ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of... more ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of data difficult to achieve. In traditional wireless system, if there was any problem such as disconnection between the intermediate nodes or nodes getting drained off because of low energy, then there was high probability of data getting lost. To solve these problems in Delay Tolerant Network(DTN), we propose two new protocols viz. the Licklider Transmission Protocol convergence layer (LTPCL) and a protocol formulated by combination of metaheuristic approaches viz. Genetic Algorithm and Ant Colony Optimization: GAACO to select the shortest path for transmission of the packets from source to destination by consuming less delay, less energy consumption, less number of hops, but at the same time delivering high throughput
Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is ... more Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is known to us in advance and frequent partitioning or disconnection also occurs. In DTN the contact between nodes also occurs opportunistically [6]. In this poster we use the concept of erasure coding based routing in DTN which is the enhancement over simple replication strategy. As transmission of erasure codes is vulnerable to attacks so we provide various mechanism to make the erasure codes more secure. Earlier the erasure codes are insecure and our work focused on providing security to various code blocks that are transmitted through different path of the network. We use Symmetric algorithm (stream as well as block cipher techniques) for providing security to the erasure codes and we also create message digest for each replica of the message that will be sent to the destination node.
The advent of Cloud Computing in 2006, has led to significant changes in computing in general and... more The advent of Cloud Computing in 2006, has led to significant changes in computing in general and working pattern of users in particular. Starting from the definition of cloud computing, elements of cloud computing, cloud services, cloud deployment, cloud computing platforms & technologies and issues & challenges of cloud computing are described in this paper. I. INTRODUCTION The term ‗Cloud' has historically been used in the telecommunication industry as an abstraction of the network in system diagrams. It then became the symbol of the most popular computer network ‗Internet'. The internet plays a fundamental role in cloud computing since it represents either the medium or the platform through which many cloud computing services are delivered and made accessible. Cloud computing refers to both the application delivered as a services over the internet and the hardware and the system software in the data centers that provide those services. Cloud computing enables both, a sin...
Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card... more Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card number verification software using Bluetooth. With the extensive use of mobile devices and proliferation of wireless technology in day-to-day life, the proposed software can be easily adapted at various retail shops and can make credit-card number verification process fast and convenient for users. The basis of the proposed method is KVM, an optimized Virtual Machine for mobile devices limited by memory, power consumption and connectivity, and JSR82 (Java Specification Requests 82: Bluetooth API). A secure client-server relationship is established between two mobile devices. The client side device at the customer end passes the credit card details through Bluetooth to the server side device with the retailer. The server side verifies the details. Sun JavaME Wireless Toolkit 2.5.2 is used to automate tasks related to creation and testing of the proposed software and the results are effec...
International Conference on Computing, Communication & Automation, 2015
ABSTRACT Security is the key concern for every system, network or application. Penetration Testin... more ABSTRACT Security is the key concern for every system, network or application. Penetration Testing in Software engineering and System Security in Computer Networks are key areas in secure development of an application. Many approaches and research techniques have tried to address the issue of secure coding in development phase only. Rigorous approaches have been introduced in the treatment of security aspects in information systems. Penetration testing is one of the approaches for system security. Penetration testing helps to contradict the security aspects of the system. It is technique of deceiving the hypothesis that any system, network or application is secure. Our study reveals that there are hardly any good quality tool(s) that can detect the vulnerable code in Application, so in this paper we propose a Penetration Testing based Java Code Testing Tool (PJCT) to check major security attribute of any given java code. The PJCT can detect the presence or absence of seven attributes, which we introduce for the first time to test the security of the application effectively. In this paper performance analysis of PJCT has been exhibited and also it’s comparison with other tools such as PIC et al. have also been demonstrated.
ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of... more ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of data difficult to achieve. In traditional wireless system, if there was any problem such as disconnection between the intermediate nodes or nodes getting drained off because of low energy, then there was high probability of data getting lost. To solve these problems in Delay Tolerant Network(DTN), we propose two new protocols viz. the Licklider Transmission Protocol convergence layer (LTPCL) and a protocol formulated by combination of metaheuristic approaches viz. Genetic Algorithm and Ant Colony Optimization: GAACO to select the shortest path for transmission of the packets from source to destination by consuming less delay, less energy consumption, less number of hops, but at the same time delivering high throughput
Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is ... more Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is known to us in advance and frequent partitioning or disconnection also occurs. In DTN the contact between nodes also occurs opportunistically [6]. In this poster we use the concept of erasure coding based routing in DTN which is the enhancement over simple replication strategy. As transmission of erasure codes is vulnerable to attacks so we provide various mechanism to make the erasure codes more secure. Earlier the erasure codes are insecure and our work focused on providing security to various code blocks that are transmitted through different path of the network. We use Symmetric algorithm (stream as well as block cipher techniques) for providing security to the erasure codes and we also create message digest for each replica of the message that will be sent to the destination node.
The advent of Cloud Computing in 2006, has led to significant changes in computing in general and... more The advent of Cloud Computing in 2006, has led to significant changes in computing in general and working pattern of users in particular. Starting from the definition of cloud computing, elements of cloud computing, cloud services, cloud deployment, cloud computing platforms & technologies and issues & challenges of cloud computing are described in this paper. I. INTRODUCTION The term ‗Cloud' has historically been used in the telecommunication industry as an abstraction of the network in system diagrams. It then became the symbol of the most popular computer network ‗Internet'. The internet plays a fundamental role in cloud computing since it represents either the medium or the platform through which many cloud computing services are delivered and made accessible. Cloud computing refers to both the application delivered as a services over the internet and the hardware and the system software in the data centers that provide those services. Cloud computing enables both, a sin...
Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card... more Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card number verification software using Bluetooth. With the extensive use of mobile devices and proliferation of wireless technology in day-to-day life, the proposed software can be easily adapted at various retail shops and can make credit-card number verification process fast and convenient for users. The basis of the proposed method is KVM, an optimized Virtual Machine for mobile devices limited by memory, power consumption and connectivity, and JSR82 (Java Specification Requests 82: Bluetooth API). A secure client-server relationship is established between two mobile devices. The client side device at the customer end passes the credit card details through Bluetooth to the server side device with the retailer. The server side verifies the details. Sun JavaME Wireless Toolkit 2.5.2 is used to automate tasks related to creation and testing of the proposed software and the results are effec...
International Conference on Computing, Communication & Automation, 2015
ABSTRACT Security is the key concern for every system, network or application. Penetration Testin... more ABSTRACT Security is the key concern for every system, network or application. Penetration Testing in Software engineering and System Security in Computer Networks are key areas in secure development of an application. Many approaches and research techniques have tried to address the issue of secure coding in development phase only. Rigorous approaches have been introduced in the treatment of security aspects in information systems. Penetration testing is one of the approaches for system security. Penetration testing helps to contradict the security aspects of the system. It is technique of deceiving the hypothesis that any system, network or application is secure. Our study reveals that there are hardly any good quality tool(s) that can detect the vulnerable code in Application, so in this paper we propose a Penetration Testing based Java Code Testing Tool (PJCT) to check major security attribute of any given java code. The PJCT can detect the presence or absence of seven attributes, which we introduce for the first time to test the security of the application effectively. In this paper performance analysis of PJCT has been exhibited and also it’s comparison with other tools such as PIC et al. have also been demonstrated.
Uploads
Papers by Rahul Johari