Volume-4 Issue-1 (January 2016)
Title: A Robust Crypto-Key Management (RoCKeM) Model for Highly Secure 4G/LTE Networks
Authors: Niharika Singh and Mandeep Singh Saini
Abstract: The fourth generation cellular networks are raising trend in the present world. The fourth generation (4G) cellular network is the result of the evolution termed as the long term evolution (LTE), hence also known as the 4G/LTE networks. The 4G/LTE networks offer the amalgamation of the cellular networks with the WiMax network to achieve the extremely high data transfer speeds to handle the heavy loads of data. The high-speed invites hackers and crackers to the networks, who always try to find the vulnerabilities in the existing networks to exploit them. The authentication models have already been proposed and being used over the 4G cellular networks in order to add the authentication level security to ensure the access to the authorized users only. In this paper, we have analyzed the architecture and functionality of the exiting authentication scheme. The existing authentication schemes have been classified as the crypto key management or non-crypto key management schemes. In the performance evaluation of the existing models, we have evaluated that the predictive key management scheme, which is based upon the computational engine is more prone the reversal or guessing attack and can offer the early exposure to the hacking attempts over the key scheme than the non-predictive non-crypto or crypto scheme. In this paper, we have proposed the non-predictive crypto-key management scheme to ensure the security of the 4G/LTE networks. The proposed model has been named as Robust Crypto-Key Management (RoCKeM or RoCKeM) scheme. The RoCKeM scheme has been deeply analyzed against the computational engine (predictive behavior) based crypto-key scheme, and have produced the efficient and better results.
Click Here to Download Pdf
Title: A Robust Data Security Model for the Data Security in the Mobile-WiFi Offloading Architecture
Authors: Gunjan Bhatnagar and Mandeep Singh Saini
Abstract: The mobile-WiFi offloading is the technique where the user data is exchanged between the mobile network (cellular network) and the WiFi networks. The proposed model has been designed as the double layered data encryption model for the data security during the propagation over the communication links between he mobile network and WiFi network. The proposed model has been designed by combining the advance encryption standard (AES) with RSA algorithm for the hardened security. The performance evaluation has been based upon the various performance parameters such as network load, transmission delay (End-to-End delay), packet loss and throughput. The experimental results have proved the efficiency of the proposed model.
Click Here to Download Pdf
Title: Analysis the Impact of Radio Energy Models on Aspects of Power Consumption in Routing Protocols of Wireless Ad hoc Networks using FTP traffic pattern
Authors: Pankaj Kumar Varshney, G.S. Agrawal and Sudhir Kumar Sharma
Abstract: Wireless Ad Hoc Networks are anytime, anywhere, dynamic, self configured, self maintained and multi-hop networks, and no prior knowledge based infrastructure less network. The nodes in Wireless Ad Hoc Networks have limited bandwidth and battery power; therefore need to have energy efficient Routing Protocol. This paper presents the performance comparison of three routing protocols namely Ad hoc On-demand Distance Vector (AODV), DYMO and Zone Routing Protocol (ZRP) in Radio Energy Models i.e generic, mica-motes and micaZ using File Transfer Protocol traffic pattern to send and receive the packets. We are considering three network metrics such as energy consumed in Transmit Mode, Received, and Ideal Modes by the wireless nodes. QualNet 5.0 network simulator is use to evaluate the performance of AODV, DYMO, and ZRP routing protocols with respect to above said metrics. Results shows the ZRP routing protocol perform better than AODV and DYMO in energy consume in transmit and receive mode by the wireless node using generic, mica-motes, and micaZ radio energy models respectively. But other hand DYMO routing protocol perform better than AODV and ZRP in energy consume in idle mode by the wireless nodes using generic, mica-motes, and micaZ radio energy models respectively. On other investigation the mica-motes radio energy model is best as compare to generic and micaZ radio energy model in energy consumed in transmit and receive modes by the wireless network in AODV, DYMO and ZRP routing protocols respectively. But in case of energy consume in idle mode by the wireless nodes, micaZ radio energy model is more suitable than generic and mica-motes radio energy models in AODV, DYMO and ZRP routing protocols respectively.
Click Here to Download Pdf
Title: End to End Packet Delivery against vampire attack to preserve lifetime in Wireless Ad-hoc Sensor Network
Authors: M.Mohana and S.Sujitha
Abstract: A wireless ad hoc sensor network consists of a number of sensors spread across a geographical area. Each sensor capabilities of signal processing and networking of the data.Vampire attack is one of the denial of service which consumes energy that leads to draining battery-life of the nodes in the network. A denial-of-service (DoS) is an attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. So communication between nodes cannot be made properly and also the packet does not reach the destination during transmission. Vampire attack can be done by either extending the path of nodes that commonly named as stretch attack or it may form a loop in packet transmission route that attack named as carousel attack. . In this paper, an algorithm is designed to identify those kinds of malicious nodes and took necessary action to avoid vampire attacks. Onion routing is used to make a encryption and detection thereby ensure the packet information that cannot be changed by intruder and also helps to achieve end to end packet transmission in network.
Click Here to Download Pdf
Title: Optimum Matching of the Stored Pattern and Fingerprint with Alignment Using Particle Swarm Optimization (PSO) Algorithm
Authors: Naser Hosainnezhad and Ali Habiboghli
Abstract: The present study aims at proposing a method for optimum matching of the stored pattern and fingerprint with alignment using particle swarm optimization (PSO). Based on the proposed approach, PSO algorithm was used for matching operation. Initially, the fingerprint minutiae including minutiae type, coordination, and direction are extracted based on the proposed method. Then the minutiae of two fingerprints are aligned for the purpose of matching. This transform function must have minimum fault and maximum similarity rate between two fingerprints. This algorithm is executed to identify the best transform function. With the assistance of the evaluation function which calculates the extent of similarity with existing image in the data base, the optimum function can be identified. The proposed method was implemented and the simulation results on the basis of EER verified the advantage of this method over other methods.
Click Here to Download Pdf
Title: Assessing the Cost and Performance of an Innovative Adaptive Encryption Architecture for Cloud Databases
Authors: Naresh Bhattacharjee DC and V.Mallesi
Abstract: The cloud database adoption requires the solution of information confidentiality difficulties and it cansupport numerous web-based applicationsare defenseless to mugging of penetrating information because the opponents can adventure software bugs to expansion contact to isolated information and postures some security responsibilities. We create a software prototype, through that will estimate the cost and feasibility and performance of the adaptive cloud database. Most of the times the malicious bureaucrats can capture and disclosure information.Additionally, we recommend the evaluation of cloud database services in plain and encrypted instances using the original cost model. During the intermediate time period this will take the tenant workloads, variability and cloud prices. We proposenoveladaptive encryptionarchitecture to the cloud databases that concerns a stimulating subordinate to the balance between the required data confidentiality level and the flexibility of the cloud database arrangements at design time.
Click Here to Download Pdf
Title: Survey on Load Flow Solution Techniques in Distributed Transmission and Generation Electricity Networks
Authors: Jagpreet Singh and Prof. Rajni Bala
Abstract: Many methods have been proposed to solve the problem of load flow in power systems, since the first formulation made in the 1950. Among these methods, the iterative methods are widely used. From these methods, Newton–Raphson load flow method has been used the most and has also become a reference point for calculating load flow due to a fast and efficient convergence. Along with this, Gauss-Seidal and fast decoupled methods are also used for load flow solutions. Fast decoupled is evolved from the Newton Raphson method. In this paper, we have surveyed the basic mechanism of these iterative methods, which are widely used in load flow problems. Firstly a brief review has been given for load flow problem and then the methods have been described in brief in their mathematical form.
Click Here to Download Pdf
Title: LSB & ISB Bit Pattern for Hiding Video Data
Authors: Charandeep Kaur and Pushpinder Singh
Abstract: Steganography is an excellent means of conversing covertly if there are guarantees on the integrity of the channel of communication. The Different encryption format can be agreed by the two persons in such a way that no one can find the information from the video. Each technique can be implemented easily, but if someone tries to find out the tricks after knowing that someone using the stego-video file, then there are good chances of finding out the hidden information. In order to avoid this, the some hybrid system is used, in such a way that even though someone finds out the one technique, it is used only on few frames and other frames contains different kind of steganography and hence total secrete message is not delivered. In Video Steganography data encrypted behind the least significant bits of video frames. Main problem arises because due to embedding behind least significant bits of video frames steganalysis can be one easily on these frames to retrieved data. This does not provide security to secret data. Second issue is that on embedding the data size of data gets increases which are not easy to transmit over the network.
Click Here to Download Pdf
Title: Performance evaluation of routing in MANETs based on QoS parameters
Authors: Sanjeev Kumar Sharma and Sanjay Sharma
Abstract: Mobile ad-hoc networks are very advantageous when there is no networking infrastructure or the infrastructure has been fully or partially destroyed due to some reason. Due to limited resources in MANETs, it becomes very challenging issue to achieve good performance. QoS is challenging and becomes critical issue. Some of very popular protocols in MANET are AODV, OLSR and ZRP etc. Almost all of them select the route based on distance i.e. Minimum no. of hops. These protocols are not pure QoS routing protocols. There are various time dependent services needs specific amount of delay and jitter. This makes it necessary to consider QoS parameters to the routing protocols. This paper evaluates the performance of AODV, OLSR and ZRP to show that these protocols are not suitable for real-time applications. So we need to focus more on QoS based routing rather than traditional routing. Exata/Cyber 1.1 is used as the simulator.
Click Here to Download Pdf
issn
Announcements
IJMCSA  IJMCSA

Submit your Paper Last date 20th November 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-6 & Issue-1 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Submit your Paper Last date 20th March 2018http://www.ijmcsa.com/submit_your_paper

IJMCSA  IJMCSA

Volume-5 & Issue-4 Published http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-3 Published (Acceptance Ratio=33%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-2 Published (Acceptance Ratio=27.27%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-5 & Issue-1 Published (Acceptance Ratio=75%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-6 Published (Acceptance Ratio=32%) http://www.ijmcsa.org/current_issue

IJMCSA  IJMCSA

Volume-4 & Issue-4 Published (Acceptance Ratio=54.02%) http://www.ijmcsa.org/july_issue

IJMCSA  IJMCSA

Volume-4 & Issue-3 Published (Acceptance Ratio=47.22%) http://www.ijmcsa.org/may_issue

IJMCSA  IJMCSA

Volume-4 & Issue-2 Published (Acceptance Ratio=52.17%) http://www.ijmcsa.org/march_issue

IJMCSA  IJMCSA

Volume-4 & Issue-1 Published (Acceptance Ratio=40.90%) http://www.ijmcsa.org/january_issue

IJMCSA  IJMCSA

Volume-3 & Issue-3 Published (Acceptance Ratio=18%) http://www.ijmcsa.org/current_issue

impact factoor
open access
-------------------------------------------------popup-------------------------------------------->