In today’s world every user need to transfer data with one-other irrespective to individual’s geographic location. Hence a Mobile Ad-hoc Network (MANET) has become a vital part of modern communication over wireless network. MANET helps to... more
In today’s world every user need to transfer data with one-other irrespective to individual’s geographic location. Hence a Mobile Ad-hoc Network (MANET) has become a vital part of modern communication over wireless network. MANET helps to transfer data without fixed infrastructure and many autonomous nodes vigorously can become part of ongoing communication. Due to this, MANET gets attacked by malicious nodes very easily. Hence secure routing of data packet in MANET is essential task. There are number of attacks we have seen in MANET like Denial of Service attack, Jellyfish attack, Warm-Hole attack etc. In this paper we are concentrating on Black Hole attack in AODV i.e. Ad-hoc On Demand Distance Vector Routing. We are proposing authentication techniques based on Authenticated Node, Authentication on Path, Authentication Key Packet and Data Routing Information table (DRI) on each node. By using authentication techniques we are trying to detect black hole in network so that we can tr...
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud... more
Cloud defines a new age of computing solution that provides services to customers with its unique features of agility and multi-tenancy. As the critical resources are hosted at cloud provider’s end, security is a big challenge in cloud computing. If the cloud environment is compromised and attackers get the access of core data centers, the availability of the critical resources becomes a big concern for the service consumers. Denial of Service and Distributed Denial of Service kind of attacks are launched towards cloud environment to make the resources unavailable for legitimate users. In this paper we propose a fuzzy logic based defense mechanism that can be set with predefined rules by which it can detect the malicious packets and takes proper counter measures to mitigate the DDoS attack. Also a detailed study of different kind of DDoS attack and existing defense strategies has been carried out. Keywords: DoS, DDoS, fuzzy logic, anomaly
Abstract: Locating relevant Information in Peer-to-Peer (P2P) system is a challenging problem. Conventional approaches use flooding to locate the content. It is no longer applicable due to massive information available upfront in the P2P... more
Abstract: Locating relevant Information in Peer-to-Peer (P2P) system is a challenging problem. Conventional approaches use flooding to locate the content. It is no longer applicable due to massive information available upfront in the P2P systems. Sometime, it may not be even possible to return small percent of relevant content for a search if it is an unpopular content. In this paper, we present Adaptive Semantic P2P Content Indexed System. Content Indices are generated using topical semantics of documents derived using WordNet Ontology. Similarities between document hierarchies are computed using information theoretic approach. It enables locating and retrieval of contents with minimum document movement, search space and nodes to be searched. Results illustrate that our work can achieve results better than Content Addressable Network (CAN) semantic P2P Information Retrieval system. Contrary to CAN semantic P2P IR system, we have used content aware and node aware bootstrapping instead of random bootstrapping of search process.
Cloud computing focus on utility of virtualised network with infrastructure and application services through data centres. Currently, maintenance of patient’s medical records and reports are through centralised system without sharing... more
Cloud computing focus on utility of virtualised network with infrastructure and application services through data centres. Currently, maintenance of patient’s medical records and reports are through centralised system without sharing facility with other health centres. There is no freedom to the patients to obtain their medical information like treatment reports, discharge summary, etc., via mobile devices. A model proposed in our work where the medical information and reports will be stored in an ecosystem with synchronisation, so that they can be shared through different healthcare clouds and can be accessible to the patients’ mobile devices. Randomised alphanumeric cipher (RAC) algorithm used to enhance security for keeping medical reports of patients in cloud with availability and interoperability.
Abstract− The optimized fertilizer usage for better yield of rice cultivation is influenced by key factors like soil fertility, crop variety, duration, season, nutrient content of the fertilizer, time of application etc., It is observed... more
Abstract− The optimized fertilizer usage for better yield of rice cultivation is influenced by key factors like soil fertility, crop variety, duration, season, nutrient content of the fertilizer, time of application etc., It is observed that 60 percent of yield gap in tamilnadu is due to farmers lack of knowledge on key factors and informal sources of information by pesticide dealers. In this study the major contributing factors for fertilizer requirement and optimum crop yield were analyzed based on rough set theory. In data analytics perspective the nutrient plan is sort of multiple attribute decision-making processes. To reduce the complexity of decision making, key factors that are indiscernible to conclusion are eliminated. Our rough set based approach improved the quality of agricultural data through removal of missing and redundant attributes. After pretreatment the data formed as target information, then attribute reduction algorithm was used to derive rules. The generated rules were used to structure the nutrition management decision-making. The precision was above 88% and experiments proved the feasibility of the developed decision support system for nutrient management.
To create a system that provides a comparison of multiple algorithms that may be tested in the Prisoner's Dilemma decision problem using two subjects in a dual agent environment. As an addition to understanding the effects of various... more
To create a system that provides a comparison of multiple algorithms that may be tested in the Prisoner's Dilemma decision problem using two subjects in a dual agent environment. As an addition to understanding the effects of various algorithms and logic that helps influence a single agent's decision, our system aims at analysing the performance of the same algorithms in iterative and multi agent systems. The results are obtained by using concepts of Swarm Intelligence, Multiple Agent Systems and Super Agents within the testing system. The results of the research are to expose the advantages and disadvantages of each schema to help plan investments, predict outcomes and for real world application of the Prisoner's Dilemma in fields of Environmental Sciences, Psychology, Economics and many more such fields.