Manet Security and Attacks Issues, Challenges & Solutions
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.433-437, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.433437
Abstract
The mobile ad hoc network, security has been active research topic but due to self-configuring characteristics of mobile ad hoc network there are numerous like shared wireless medium with open network design, limited resources, dynamic network topology and many more that hinder to maintain the security of the wireless network. Because of MANET’s properties like infrastructure-less and self-configuring, there are more risks for trusted nodes to be compromised and start attack on networks. It is hard to recognize between stale routing and faked routing data on account of node mobility system. In node mobility mechanism it authorizes frequent networking reconfiguration which makes more risks for attacks. Due to limited power consumption and computation capability mobile devices are helpless against the blackhole and grey hole attack as they are inadequate to run security algorithms which require high computations like public key algorithms. In this problem consider as a propose system the power and delay optimization protocol may be integrated to improve the performance of the network. The delay aware hash-based message authentication code (D-HMAC) used to secure the packet sending between source to destination without greyhole and blackhole attacks. The experimental result using NS2 simulation the proposed algorithm achieves better performance and attack detection accuracy than the existing trust level methods.
Key-Words / Index Term
Mobile Ad-hoc Network, Security Issues, Routing Protocols, Attacks
References
[1] Weimin Wen,et al., "EAPC: Energy-Aware Path Construction for Data Collection Using Mobile Sink in Wireless Sensor Networks" IEEE SENSORS JOURNAL, VOL. 18, NO. 2, JANUARY 15, 2018
[2] Ying Liu et al., "Secure Distributed Estimation over Wireless Sensor Networks under Attacks" IEEE Transactions on Aerospace and Electronic Systems ( Volume: 54 , Issue: 4 , Aug. 2018 )
[3] Shoubai Xiao "Security Analysis and Application of Common Dynamic Routing Protocol", 7th International Conference on Education, Management, Computer and Society (EMCS 2017)
[4] Mandeep Kaur Gulati "Stable Energy efficient QoS based Congestion and Delay aware Routing (SEQCDR) Protocol forMANETs" 2015 International Conference on Communications and Signal Processing (ICCSP) 2-4 April 2015
[5] Shiva Shankar "Importance of on-demand modified power aware dynamic source routing protocol in mobile ad-hoc networks" IET Microwaves, Antennas & Propagation ( Volume: 8 , Issue: 7 , May 14 2014 )
[6] Shivashankar "Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks", IET Networks ( Volume: 3 , Issue: 2 , June 2014 )
[7] Mueen Uddin "Energy Efficient Multipath Routing Protocol for Mobile ad-hoc Network Using the Fitness Function" IEEE Access ( Volume: 5 ) 24 May 2017.
[8] A.Siddiqua, S.Kotari, and AAKhan Mohammed. “Preventing black hole attacks in MANETs using secure knowledge algorithm”, Signal Processing and Communication Engineering Systems (SPACES), 2015 International Conferenceon. IEEE, 2015.
[9] N.Choudhary and L.Tharani. “Preventing black Hole attack in AODV using timer-based detection mechanism”, Signal processing and communication engineering systems (SPACES), 015 international conferenceon. IEEE,2015.
[10] AK Jain and V Tokekar. “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile adhoc Networks”, Pervasive computing (ICPC), 2015 international conference on. IEEE, 2015
Citation
K. Sumathi, D. Vimal Kumar, "Manet Security and Attacks Issues, Challenges & Solutions," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.433-437, 2019.
Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.438-448, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.438448
Abstract
The Internet of Things (IoT) revolution has also impacted Wireless Sensor Networks (WSNs), and due to which, the WSNs are being increasingly coupled with IP network. The security issues which are prevalent in the IP network have to be addressed by these IoT based WSNs. Recently, in the literature, encryption of data packets through 3 Data Encryption Standard (3DES) technique was presented to cater data packet encryption requirements in IoT based WSNs. However, this encryption technique is impractical for WSNs because the sensor nodes operate with limited energy reserves, and 3DES technique is computationally expensive technique. The main open issue is to perform 3DES data packet encryption by incurring limited energy expenditure. To address this open issue, in this paper, a new 3DES data packet encryption scheme denoted as Neighbor Node Cooperation (NNC) scheme is presented. In the NNC scheme, the encryption load of the source node is distributed among its neighbor nodes. Selection of the most suitable neighbor nodes for the NNC scheme is modeled as an optimization problem, which is shown to have non-polynomial complexity. Hence, this optimization problem is approximately solved using randomized algorithm. The formal performance bounds of the randomized algorithm are outlined. The proposed encryption scheme is simulated and compared against the contemporary technique presented in the literature. In the outlined simulation study, the proposed encryption technique significantly outperforms the contemporary technique WRT incurred energy expenditure for data packet encryption.
Key-Words / Index Term
WSN, 3DES, Encryption, IoT
References
[1] J. A. Stankovic, “Research directions for the Internet of Things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014.
[2] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor networks: A survey on recent developments and potential synergies,” J. Supercomput., vol. 68, no. 1, pp. 1–48, 2014.
[3] R. Rajkumar, I. Lee, L. Sha, and J. Stankovic, “Cyber-physical systems: The next computing revolution,” in Proc. 47th Design Autom. Conf., Anaheim, CA, USA, 2010, pp. 731–736.
[4] F. Mattern and C. Floerkemeier, “From the Internet of computers to the Internet of Things,” in From Active Data Management to Event-Based Systems and More. Berlin, Germany: Springer, 2010, pp. 242–259.
[5] Y. Mo et al., “Cyber-physical security of a smart grid infrastructure,” Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012.
[6] S. Ali et al., “Network challenges for cyber physical systems with tiny wireless devices: A case study on reliable pipeline condition monitoring,” Sensors, vol. 15, no. 4, pp. 7172–7205, 2015.
[7] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of security issues, challenges, and open problems in the Internet of Things,” in Proc. IEEE World Congr. Services, New York, NY, USA, 2015, pp. 21–28.
[8] S. Sicari, A. Rizzardia, L. A. Griecob, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Netw.,vol. 76, pp. 146–164, Jan. 2015.
[9] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 8, no. 2, pp. 2–23, 2nd Quart., 2006.
[10] C. M. Medaglia and A. Serbanati, “An overview of privacy and security issues in the Internet of Things,” in The Internet of Things. New York, NY, USA: Springer, 2010.
[11] J. S. Kumar and D. R. Patel, “A survey on Internet of Things: Security and privacy issues,” Int. J. Comput. Appl., vol. 90, no. 11, pp. 20–26, 2014.
[12] J. Lin et al., “A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications,” IEEE Internet Things J., to be published, doi: 10.1109/JIOT.2017.2683200.
[13] J. Granjal, E. Monteiro, and J. S. Silva, “Security for the Internet of Things: A survey of existing protocols and open research issues,” IEEE Commun. Surveys Tuts., vol. 17, no. 3, pp. 1294–1312, 3rd Quart., 2015.
[14] A. Bröring et al., “New generation sensor Web enablement,” Sensors, vol. 11, no. 3, pp. 2652–2699, 2011.
[15] K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie, “Protocols for self organization of a wireless sensor network,” IEEE Pers. Commun., vol. 7, no. 5, pp. 16–27, Oct. 2000.
[16] “International electrotechnical commission, Internet of Things: Wireless sensor networks,” White Paper, 2014.
[17] G. S. Prathamesh, G. D. Sanket, K. D. Yogeshwar, and N. K. Aniket, “Secure Data Transmission in WSN using 3DES with Honey Encryption”, IJARIIE, vol. 1, pp. 455-461, 2015.
[18] C. P. O’Flynn, “Message denial and alteration on IEEE 802.15.4 low power radio networks,” in Proc. 4th IFIP Int. Conf. New Technol.Mobility Security, Paris, France, 2011, pp. 1–5.
[19] Y. Xiao, S. Sethi, H.-H. Chen, and B. Sun, “Security services and enhancements in the IEEE 802.15.4 wireless sensor networks,” in Proc. IEEE Glob. Telecommun. Conf., St. Louis, MO, USA, 2005, pp. 1976–1980.
[20] Y. W. Law et al., “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols,” ACM Trans. Sensor Netw.,vol. 5, no. 1, 2009, Art. no. 6.
[21] D. R. Raymond, R. C. Marchany, M. I. Brownfield, and S. F. Midkiff, “Effects of denial-of-sleep attacks on wireless sensor network MAC protocols,” IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 367–380, Jan. 2009.
[22] H. Kim, “Protection against packet fragmentation attacks at 6LoWPAN adaptation layer,” in Proc. Int. Conf. Converg. Hybrid Inf. Technol., Daejeon, South Korea, 2008, pp. 796–801.
[23] R. Hummen et al., “6LoWPAN fragmentation attacks and mitigation mechanisms,” in Proc. 6th ACM Conf. Security Privacy Wireless Mobile Netw., Budapest, Hungary, 2013, pp. 55–66.
[24] L. M. L. Oliveira, J. J. P. C. Rodrigues, A. F. de Sousa, and J. Lloret, “A network access control framework for 6LoWPAN networks,” Sensors, vol. 13, no. 1, pp. 1210–1230, 2013.
[25] E. J. Cho, J. H. Kim, and C. S. Hong, “Attack model and detection scheme for botnet on 6LoWPAN,” in Proc. 12th Asia–Pac. Netw. Oper.Manag. Conf., Jeju-do, South Korea, 2009, pp. 515–518.
[26] L. Wallgren, S. Raza, and T. Voigt, “Routing attacks and countermeasures in the RPL-based Internet of Things,” Int. J. Distrib. Sensor Netw., vol. 9, no. 8, pp. 1–11, 2013.
[27] K. Heurtefeux, O. Erdene-Ochir, N. Mohsin, and H. Menouar, “Enhancing RPL resilience against routing layer insider attacks,” in Proc. IEEE 29th Int. Conf. Adv. Inf. Netw. Appl., Gwangju, South Korea, 2015, pp. 802–807.
[28] S. Raza, L. Wallgren, and T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Netw., vol. 11, no. 8, pp. 2661–2674, 2013.
[29] F. I. Khan, T. Shon, T. Lee, and K. Kim, “Wormhole attack prevention mechanism for RPL based LLN network,” in Proc. 5th Int. Conf.Ubiquitous Future Netw., 2013, pp. 149–154.
[30] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach,” in Proc. IEEE Wireless Commun. Netw. Conf., vol. 2. New Orleans, LA, USA, 2005, pp. 1193–1199.
[31] E. C. H. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in Proc. IEEE Int. Conf.Commun., Istanbul, Turkey, 2006, pp. 3383–3389.
[32] K. Weekly and K. Pister, “Evaluating sinkhole defense techniques in RPL networks,” in Proc. 20th IEEE Int. Conf. Netw. Protocols, Austin, TX, USA, 2012, pp. 1–6.
[33] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis & defenses,” in Proc. 3rd Int. Symp. Inf. Process.Sensor Netw., Berkeley, CA, USA, 2004, pp. 259–268.
[34] J. Hui and J. P. Vasseur, “The routing protocol for low-power and lossy networks (RPL) option for carrying RPL information in data-plane datagrams,” Internet Eng. Task Force, Fremont, CA, USA, RFC 6553, 2012. [Online]. Available: https://tools.ietf.org/html/rfc6553
[35] A. Sehgal, A. Mayzaud, R. Badonnel, I. Chrisment, and J. Schönwälder, “Addressing DODAG inconsistency attacks in RPL networks,” in Proc.Glob. Inf. Infrastruct. Netw. Symp., Montreal, QC, Canada, 2014, pp. 1–8.
[36] A. Mayzaud, A. Sehgal, R. Badonnel, I. Chrisment, and J. Schönwälder, “Mitigation of topological inconsistency attacks in RPL-based lowpower lossy networks,” Int. J. Netw. Manag., vol. 25, no. 5, pp. 320–339, 2015.
[37] A. Dvir, T. Holczer, and L. Buttyan, “VeRA—Version number and rank authentication in RPL,” in Proc. IEEE 8th Int. Conf. Mobile Ad Hoc Sensor Syst., Valencia, Spain, 2011, pp. 709–714.
[38] M. Landsmann, M. Wahlisch, and T. C. Schmidt, “Topology authentication in RPL,” in Proc. IEEE Conf. Comput. Commun. Workshops, Turin, Italy, 2013, pp. 73–74.
[39] R. Venkataraman, S. Moeller, B. Krishnamachari, and T. R. Rao, “Trustbased backpressure routing in wireless sensor networks,” Int. J. Sensor Netw., vol. 17, no. 1, pp. 27–39, 2015.
[40] Z. Lu, Y. E. Sagduyu, and J. H. Li, “Securing the backpressure algorithm for wireless networks,” IEEE Trans. Mobile Comput., vol. 16, no. 4, pp. 1136–1148, Apr. 2017.
[41] F.-J. Shang, C. Li, and J.-L. Qin, “Improvement of approach to detect sinkhole attacks in wireless sensor networks,” in Computer, Intelligent Computing and Education Technology. Boca Raton, FL, USA: CRC Press, 2014, pp. 695–698.
[42] P. Pecho, P. Hanacek, and J. Nagy, “Simulation and evaluation of CTP and secure-CTP protocols,” Radioengineering, vol. 19, no. 1, pp. 89–99, 2010.
[43] S. Sultana, D. Midi, and E. Bertino, “Kinesis: A security incident response and prevention system for wireless sensor networks,” in Proc. 12th ACM Conf. Embedded Netw. Sensor Syst., Memphis, TN, USA, 2014, pp. 148–162.
Citation
V.Gayathri, Y.S. Kumarswamy, "Energy Efficient Encryption Scheme for Integrating Wireless Sensor Networks with Internet," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.438-448, 2019.
A pilot study on image processing methods for segmentation of striations in fired bullets
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.449-455, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.449455
Abstract
The rise in crimes and the use of firearms necessitate ballistic and forensic science laboratories worldwide to come up with quick and accurate solutions. The identification process of firearms is a complex yet very sensitive and vital step in evidence examination in the process of crime investigation. The use of modern techniques like image processing and pattern recognition can contribute to increase the accuracy as well as reduce the time in the process of identification. Manually, many features of a spent bullet of a firearm are investigated for this purpose, striations being an important one of them. The aim of the study is to automatically segment out the striations present in a fired bullet through image processing and segmentation techniques, which is a real challenge as these marks are very fine. For the study, images of two fired bullets of .22 in. caliber rimfire cartridge, fired from one and the same firearm (semi-automatic pistol) were considered for the preliminary study. Experimental results show that proposed techniques can be efficiently used for firearm identification through digitizing and analyzing the fired bullets specimens. The visual comparison reveals that the Fuzzy C Means technique gives the clearest segmented result of the striations. This could be of great use in the future as it is a time-saving process. This can be of great help in feature identification, vis-à-vis manual searching of the feature under a comparison microscope for identification of the firearm.
Key-Words / Index Term
Ballistic, Firearm identification, Striations, Segmentation
References
[1] Li, D. G., “Image processing for the positive identification of forensic ballistics specimens”, In Proceedings of Sixth International Conference of Information Fusion, Australia, pp. 1494-1498, 2003.
[2] Nigam, R. K., Waghmare N.P., Gupta A. K., “Evaluation and analysis of different type of edge detection techniques on cartridge case image”, International Journal on Recent and Innovation Trends in Computing and Communication, Vol. 2, pp, 3258–3261, 2014.
[3] Nigam, R. K., Waghmare N.P., Gupta A. K., “Digital Enhancement of Bullet Striation Mark by Image Processing Techniques”, International Journal of Advance Research in Computer Science and Management Studies. Vol. 2(12), 340-345, 2014.
[4] Suresh, R., “A simple method to compare firing pin marks using stereomicroscope and Microsoft office (Windows 8) tools”, Forensic Science International, Vol. 277, pp. e1-e10, 2017.
[5] Smith, C.L., “An intelligent imaging approach to the identification of forensic ballistics specimens”, In Proceedings ICII, Beijing International Conferences. Vol. 3, pp. 390–396, 2002.
[6] Ingale, P. M., "The importance of Digital Image Processing and its applications", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.1, pp.31-32, 2018.
[7] Umorya, P., and Singh, R., "A Comparative Based Review on Image Segmentation of Medical Image and its Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.71-76, 2017.
[8] Bijhold, J. and Geradts, Z., “Overview of Pattern recognition and image processing in forensic science”, Anil Aggrawal’s Internet Journal of Forensic Medicine and Toxicology, Vol. 1, 2000.
[9] Geradts, Z., Bijhold, J. and Hermsen, R., “Image matching algorithms for breech face marks and firing pins in a database of spent cartridge cases of firearms”, Forensic Science International, Vol. 119, pp. 97-106, 2001.
[10] Rosiak, J., “Automated Systems of Ballistic Identification”, In 13th INTERPOL Forensic Science Symposium, Lyon, France, 2000.
[11] Mazumdar, D., Mitra, S. and Kar, A., “An Automatic Bullet Cartridge Identification System”, In The 5th Asian Conference on Computer Vision, Melbourne, Australia, pp. 1-6, 2002.
[12] Li, D., “Ballistics Image Processing and Analysis for Firearm Identification”, Image processing, IEEE Transactions on, Vol. 15, pp. 2857 – 2865, 2006.
[13] Xie. F., Xiao, S., Blunt, L., Zeng, W., Jiang, X., “Automated bullet-identification system based on surface topography techniques”, Wear, 266, pp. 518–522, 2009.
[14] Gerules, G., Bhatia, S. K., Jackson, D. E., “A survey of image processing techniques and statistics for ballistic specimens in forensic science”, Science and Justice, 53, pp. 236–250, 2013.
[15] Geradts, Z., Bijhold, J. and Hermsen, R., “Use of Correlation algorithms in a database of spent cartridge cases of firearms”, In 13th Interpol Forensic Science Symposium, Lyon, France, 1998.
[16] Saferstein, “Firearms, Tool Marks, and Other Impressions, Forensic Science: An Introduction”, Prentice Hall, Chapter 15 1995.
[17] Gonzalez, R. C., Woods, R. E., “Digital Image Processing”, 2nd Edition., Publishing House of Electronics Industry, 2007.
[18] Madasu, V. K., and Yarlagadda, P., “An in-depth comparison of four texture segmentation methods”, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007), Glenelg, Australia, pp. 366-372, 2007.
[19] Chankong, T., Theera-Umpon, N., Auephanwiriyakul, S., “Automatic cervical cell segmentation and classification in Pap smears”, Computer methods and programs in biomedicine, Vol. 113, pp. 539–556, 2014.
[20] A. Banno, T. Masuda, K. Ikeuchi, Forensic Retrieval of Striations on Fired Bullets by using 3D Geometric Data, MVA2005 IAPR Conference on Machine Vision Applications, Tsukuba Science City, Japan, (2005) 214-217.
Citation
Lipi B Mahanta, Kangkana Bora, Rahul Kumar, Shauvik Purkayastha, R Suresh, "A pilot study on image processing methods for segmentation of striations in fired bullets," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.449-455, 2019.
Accident Prevention and Detection System Using Image Processing and IoT
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.456-460, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.456460
Abstract
Drivers United Nations agency don`t take regular breaks once driving long distances run a high risk of turning into drowsy a state that they usually fail to acknowledge early enough according to the experts. Both driver somnolence and distraction, however, might need identical effects, i.e., shriveled driving performance, longer response time, associated a redoubled risk of crash involvement. Driving may be a complicated task wherever the motive force is accountable of observance the road, taking the correct decision on time and finally responding to other driver`s actions and different road conditions. A Studies show that around one quarter of all serious motorway accidents is attributable to sleepy drivers in need of a rest, meaning that drowsiness causes more road accidents than drink-driving. Attention assist will warn of inattentiveness associated somnolence in an extended speed vary and apprize drivers of their current state of fatigue.
Key-Words / Index Term
Face Detection, Mouth Detection and Yawning Detection
References
[1] Abhi R. Varma. Pravara, Loni Seema V. Arote. Pravara Bharti
“Accident Prevention Using Eye Blinking and Head Movement”
[2] Ankita Shah, Ankita Kumari,SonakaKukreja, Pooja Shinde
“Yawning Detection of Driver Drowsiness”
[3] Arturo de la Escalera, José María Armingol, Marco Javier Flores
“Real-Time Drowsiness Detection System for an Intelligent Vehicle”
[4] ArunSahayadhas, Kenneth Sundaraj, Murugappan. ”Detecting Driver Drowsiness based on Sensors: A Review.” In: Al-rehab research group, University Malaysia Perlis,
Malaysia,2012
[5] Arturo de la Escalera ,Marco Javier Flores, José María Armingol
“Real-Time Drowsiness Detection System for an Intelligent Vehicle”
[6] Durgaa Chandrakala E, Fathima Nazlunsithara R,
Saraswathi
“Proactive Integrated Detection of Eye Blinking & Yawning to identify Sleepy Driver and Alert based Auto-Braking System for Speed Control”
[7] Eddie E. Galarza, Fabricio D. Egas, Franklin M. Silva,
Paola M. Velasco, Eddie D. Galarza
“Real Time Driver Drowsiness Detection Based on Driver’s Face Image Behavior Using a System of Human Computer Interaction Implemented in a Smartphone”
[8] "Face Recognition Applications". Animetrics. Retrieved 2008-06-04.
[9] Garima Turan, Sheifali Gupta
“Road Accidents Prevention system using Driver’s Drowsiness Detection”
[10] Dr.JeegarA,Pankti P. Bhatt, Trivedi
“Various Methods for Driver Drowsiness Detection : An Overview”
[11] Jesus Nuevo, Luis M. Bergasa ,Miguel A. Sotelo Manuel Vhzquez
“Weal-Time System for Monitoring Driver Vigilance June 14-17,2004”
[12] Manimaran.S,Kuthalingam.R, Dr.Kartheeban.K “Accident Prevention System Using Face Recognition”
[13] poorani.k.,Sharmila.A., Sujithra.G.,Swetha.P“Iot-based- live-streaming-of-vehicle-position-accident-prevention-and- detection- system”
Citation
A. Mohanapriya, N. Saranya , S.P. Kavya , R. Deepak , M. Mahitha ,G. Gobi, "Accident Prevention and Detection System Using Image Processing and IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.456-460, 2019.
An XML Based Framework For ABAC As A Service Based On Policy Machine Architecture
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.461-469, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.461469
Abstract
The cloud based systems offer Software as a Service (SaaS). This provides users a standard, robust, scalable & affordable software which they can access anytime from anywhere. The whole software may be composed of many small services which can be provided by different collaborating cloud service providers. The Service represents a software component that has the potential of reuse. In secured systems, Access Control Mechanism is very frequently used to restrict information flow to unauthorized users. Access Control Mechanism can be provided as a service so that it can be integrated with Software as a Service application. An Attribute Based Access Control (ABAC) mechanism is fine-grained, dynamic & scalable method to control access of the resources. A comprehensive policy can be deployed to specify access control rules. Policy Machine architecture can be used for policy specification and enforcement. Here we present an XML based framework to provide ABAC mechanism as a service based on Policy Machine architecture.
Key-Words / Index Term
Access Control, Attribute Based Access Control, Service, Service Oriented Architecture, Policy Machine, XML
References
[1] V.C. Hu et al., “Guide to Attribute Based Access Control (ABAC) Definition and Considerations”, NIST Special Publication 800-162, USA, pp.4-14, 2014.
[2] D. Ferraiolo, V. Atluri, S. Gavrila, “The Policy Machine: a Novel Architecture and Framework for Access Control Policy Specification and Enforcement”, Journal of Systems Architecture, Vol.57, No.4, pp.412-424, 2011.
[3] D.R. Kuhn, E.J. Coyne, T.R. Weil, “Adding Attributes to Role Based Access Control”, IEEE Computer, Vol.43, No.6, pp.79-81, 2010.
[4] J. Park, R. Sandhu, “The UCONabc usage control model”, ACMTransactions on Information and System Security, Vol.5, No.6, pp.128-174, 2007.
[5] E. Damiani ; S.D.C. di Vimercati ; P. Samarati, “New paradigms for access control in open environments”, In The Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2005), Athens, Greece, pp.540-545, 2005.
[6] P. Bonatti, P. Samarati, “Regulating service access and information release on the web”, In The Proceedings of the 7th ACM conference on Computer and communications security (CCS 2000), Athens, Greece, pp.134-143, 2000.
[7] P. Bonatti, P. Samarati, “A uniform framework for regulating service access and information release on the web”, Journal of Computer Security, Vol.10, No.3, pp.241-271, 2002.
[8] T. Yu, X. Ma, M. Winslett, “Prunes: an efficient and complete strategy for automated trust negotiation over the internet”, In The Proceedings of the 7th ACM conference on Computer and communications security (CCS 2000), Athens, Greece, pp.210-219, 2000.
[9] T. Yu, M. Winslett, K.E. Seamons, “Interoperable strategies in automated trust negotiation”, In The Proceedings of the 8th ACM conference on Computer and communications security (CCS 2001), Philadelphia, USA, pp.146-155, 2001.
[10] T. Yu, M. Winslett, K.E. Seamons, “Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation”, Journal of ACM Transactions on Information and System Security (TISSEC), Vol.6, No.1, pp.1-42, 2003.
[11] L. Wang, D. Wijesekera, S. Jajodia, “A logic based framework for attribute based access control”, In The Proceedings of the 2004 ACM workshop on Formal methods in security engineering (FMSE 2004), Washington DC, USA, pp.45-55, 2004.
[12] E. Yuan, J. Tong, “Attributed based access control (ABAC) for web services”, In The Proceedings of the IEEE International Conference on Web Services (ICWS 2005), Washington DC, USA, pp.561-569, 2005.
[13] I. F. Cruz, R. Gjomemo, P. Lin, M. Orsini, “A location aware role and attribute based access control system”, In The Proceedings of the 16th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS 2008), California, USA, pp.527-528, 2008.
[14] X. Jin, R. Krishnan, R. Sandhu, “A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC”, N. Cuppens-Boulahia et al. (Eds.): DBSec 2012, LNCS 7371, Frankfurt, Germany, pp.41-55, 2012.
[15] M. Gudgin et al., “SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)”, W3C Recommendation, USA, pp. 1-10, 2007.
[16] M. Gudgin, N. Mendelsohn, M. Nottingham, H. Ruellan, “SOAP Message Transmission Optimization Mechanism”, W3C Recommendation, USA, pp. 1-5, 2005.
[17] S. Graham, D. Hull, B. Murray, “Web Services Base Notification 1.3”, OASIS Standard, USA, pp. 1-68, 2006.
[18] R. Chinnici, J. Moreau, A. Ryman, S. Weerawarana, “Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language”, W3C Recommendation, USA, pp. 1-17, 2007.
[19] R. Chinnici, H. Haas, A. A. Lewis, J. Moreau, D. Orchard, S. Weerawarana, “Web Services Description Language (WSDL) Version 2.0 Part 2: Adjuncts”, W3C Recommendation, USA, pp. 1-22, 2007.
[20] T. Agarwal, N. Sharma, “Efficient Load Balancing Using Restful Web Services in Cloud Computing: A Review”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.6, No.3, pp.67-70, 2018.
[21] A. A. Ekre, N. M. Nimbarte, S.V. Balamwar, “An Empirical Proposition to Load Balancing Effectuate on AWS Hybrid Cloud”, International Journal of Scientific Research in Computer Sciences and Engineering, Vol.6, No.4, pp.9-17, 2018.
[22] R. Bhavani, K. S. Suganya, D.Y. Priyanka, “Autonomous PHR Sharing: A Patient Centric Scalable and Flexible e-Healthcare Framework”, International Journal of Scientific Research in Network Security and Communication, Vol.6, No.2, pp.11-14, 2018.
[23] P. Devi, “Attacks on Cloud Data: A Big Security Issue”, International Journal of Scientific Research in Network Security and Communication, Vol.6, No.2, pp.15-18, 2018.
Citation
Vibha Bhardwaj, Sushil Sharma, "An XML Based Framework For ABAC As A Service Based On Policy Machine Architecture," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.461-469, 2019.
Unified Modelling Language (UML) Model for Compressed Message Exchange
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.470-475, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.470475
Abstract
Web Services is a software function that client-server model uses to exchange information. SOAP is a protocol in Web Services for exchanging information based on XML format. It sends information in form of XML messages from the server as the producer to the client that consumes the message via HTTP. But parsing XML verbose format message always cost processing time in the memory and lacks bandwidth utilization and this incurs latency in the communication. UML notations were used to model the interactions among the objects and the elements of the Web services. Data compression process is introduced into the model to depict the compression/decompression of the SOAP messages at the endpoints. The modelling utilized use-case, activity and sequence diagrams for the analysis, while class and component diagrams were used for the design. The modelling of this compressed messaging for SOAP exchange will be useful to researchers and developers of data-centric application in distributed system environment.
Key-Words / Index Term
Distributed systems, Unified Modeling, Client-server, Web services, XML, HTTP, SOAP, Data compression
References
[1] R.S. Chowhan, P. Dayya, "Itinerary and Mobile Code Patterns for Emerging Mobile Agent Systems in Large Scale Distributed Environments", International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1133-1141, 2018.
[2] Chatti Subbalakshmi, Rishi Sayal, H. S. Saini, "S-REST: A design of Secured Protocol for Implementation of RESTful Webservices", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.687-692, 2019.
[3] Shien-Chiang Yu, Ruey-Shun Chen, “Web Services: XML-based system integrated techniques”, The Electronic Library, Vol.21, Issue.4, pp.258-366, 2003.
[4] Mutange Senagi, Okeyo George, Cheruiyot Wilson, Sati Arthur, Kalunda Jades, “A Review of SOAP Performance Optimization Techniques to Improve Communication in Web Services in Loosely Coupled Systems”, International Journal of Computer Science Issues, Vol.11, Issues.1, pp.142-158, 2014.
[5] Ricardo Perez-Castillo, Ignacio Garcia-Rodriguez de Guzman, Ismael Caballero, Mario Piattini, “Software modernization by recovering Web services from legacy databases”, Journal of Software-Evolution and Process,Vol. 25, Issue. 5, pp. 507-533, 2013.
[6] P. Rathee, S.K. Malik, "Proposed UML Approach for Ontology Design and Representation: A Banking System Case Study", International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.491-499, 2018.
[7] James Rumbaugh, Ivar Jacobson, Grady Booch, “The Unified Modeling Language Reference Manual”, Addison Wesley Longman Publishing Co., Inc, 1998.
[8] Shailaja Uke, Ravindra Thool, “UML Based Modeling for Data Aggregation in Secured Wireless Sensor Network”, Procedia Computer Science, Vol. 78, pp.706-713, 2018.
[9] S. Kumari and S.K. Rath. “Performance comparison of SOAP and REST based Web Services for Enterprise Application Integration”. Advances in Computing conference, Communications and Informatics, pp.456-502. 2015.
[10] Ali B. Dauda, Zerdoumi Saber, Faiz Alotaibi, Muhammad A. Mustapha, Muhamad T. Abdullah “Effect of serialized messaging on Web services performance”, International Conference on Computing Networking and Informatics, pp. 1-4 2017.
[11] Ali B. Dauda, Abubakar A. Idris, Peter Yohanna Mshelia, Abdulaziz.I. Ibrahim, Suleman Umar, "Architecture for Integrating Learning Platforms Using Adapter", International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.934-938, 2018.
[12] Konstantinos Vandikas, Raphael Quinet, Roman Levenshteyn, Jorg Niemoller, “Scalable service Composition execution by means of an asynchronous paradigm”, Intelligence in Next Generation Networks, pp.157-162, 2011.
[13] Ezin C. Eugene, Laleye A. Frejus, “Asynchronous Message Exchange System between Servers based
on Java Message Service API”, IEEE letters, Vol. 35, Issue.3, pp.534-542, 2012.
[14] Darren Pearce, Alexandra Poulovassilis, “The conceptual and architectural design of a system supporting exploratory learning of mathematics generalisation”, European Conference on Technology Enhanced Learning, pp.22-36, 2009.
[15] Khalid Sayoo, “Lossless compression handbook”, Elsevier, 2002.
[16] Hong, Y., Zhang, S., Wang, R. Y., Li, Z., & Liu, D. X., “Text Compression and Decompression”, US20160197621A1, EMC Corp: Google Patents, 2016.
[17] Holger Kruse, Amar Mukherjee, “Data compression using text encryption”, Data Compression
Conference, pp.447-455, 1997.
[18] Deepa Raj, “UML Modeling for the Compression of An Image File”, International Journal of Advanced Networking and Applications, Vol.4, Issue. 1, pp.1481-1485, 2012.
[19] Jesus M. Almendros-Jiménez, Luiss Iribarne, “UML modeling of user and database interaction”, The Computer Journal, Vol.52, Issue.3, pp348-367, 2009.
[20] Saoussen Rekhis, Nadia Bouassida, Rafik Bouaziz, Claude Duvallet, Bruno Sadeg, “Modeling Real-Time design patterns with UML-RTDP profile”, Book entitled: Domain Engineering: Product Lines, Languages, and Conceptual Models, 2013.
[21] Marouane Hela, Claude Duvallet, Achraf Makni, Rafik Bouaziz, Bruno Sadeg. "An UML profile for representing real-time design patterns", Journal of King Saud University-Computer and Information Sciences, vol.30, Issue.4, pp.478-497, 2018.
[22] Eric Newcomer, Greg Lomow, “Understanding SOA with Web services. Addison-Wesley”, Using WSDL Generator and SOAP with Cloud Computing for Enterprise Architectures, 2005.
[23] He, W., & Da Xu, L. “Integration of distributed enterprise applications: A survey”. IEEE Transactions on Industrial Informatics, vol.10 issue.1, pp.35-42, 2014.
[24] Iris Reinhartz-Berger, Arnon Sturm, “Utilizing domain models for application design and validation”, Information and Software Technology, Vol.51, Issue. 8 pp. 1275-1289, 2009.
[25] Keen N. Loo, Sai P. Lee, Thaim K. Chiew, “UML extension for defining the interaction variants of design patterns”, Vol. 29, Issue. 5, pp.64-72, 2012.
[26] David A. Robles-Ramirez, Ponciano J. Escamilla-Ambrosio, Theo Tryfonas, “IoTsec: UML Extension for Internet of Things Systems Security Modeling”, International Conference on Mechatronics, Electronics and Automotive Engineering, pp. 151-156, 2017.
[27] Ludovic Apvrille, Jean-Pierre Courtiat, Christophe Lohr, Pierre de Saqui-Sannes, “TURTLE: A real-time UML profile supported by a formal validation toolkit”, Vol. 30, Issue. 7, pp.473-487, 2004.
[28] Jing Dong, Sheng Yang,Kang Zhang, “Visualizing design patterns in their applications and compositions”, IEEE Transactions on Software Engineering,Vol.33, Issue.7, pp.433-453, 2007.
[29] Che-Chern Lin, Shen-Chien Chen, “Implementation of a modified PCX image compression using java”, WSEAS Transactions on Computers, Vol.7, Issue. 6, pp.670-679, 2008.
[30] Tusha garwal, Neeta Sharma, "Efficient Load Balancing Using Restful Web Services in Cloud Computing: A Review", International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.67-70, 2018.
[31] Fengyuan Ren, Jiao Zhang, Yongwei Wum Tao He, Congfeng Chen, Chuang Lin, “Attribute-Aware Data aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks”, IEEE Transactions on Parallel and Distributed Systems, Vol.24, Issue.5, pp.881-892, 2013.
[32] James Rumbaugh, Ivar Jacobson, Grady Booch, “Unified modeling language reference manual, the”, Pearson Higher Education, 2004.
[33] Read, M., Andrews, P. S., Timmis, J., & Kumar, V. (2014). Modelling biological behaviours with the unified modelling language: an immunological case study and critique. Journal of the Royal Society Interface, 11(99), 20140704.
[34] Ferrante, S., Bonacina, S., & Pinciroli, F. (2013). Modeling stroke rehabilitation processes using the Unified Modeling Language (UML). Computers in biology and medicine, 43(10), 1390-1401.
Citation
Ali B. Dauda, Baba S. Ahmed, Abubakar A. Idris, Audu M. Mabu, Iliyas I. Iliyas, "Unified Modelling Language (UML) Model for Compressed Message Exchange," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.470-475, 2019.
Measuring The Accuracy of The Facial Images Using Convolutional Neural Networks in Deep Learning
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.476-480, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.476480
Abstract
Deep learning methods are good in achieving success while dealing with the computer vision and face recognition problems. In deep learning, convolutional neural network is a step head while comparing with other methods. Till now face recognition has done with large dataset to learn face representations, which has low efficiency because of the large dataset. The proposed convolutional neural networks fringe deep learning neural networks to learn face representations from small data set. This system consists of four layers convolution, ReLu, pooling and fully connected layers. Here the training set has to be synthesized and augmented then make the data set double in size for efficient power of generalizing the data with convolutional neural network.
Key-Words / Index Term
Deep learning, face recognition, small dataset, small training dataset, augmented dataset, synthesized data, convolution neural networks
References
[1] V.P. Vishwakarma, “Illumination normalization using Fuzzy Filter in DCT Domain for Face Recognition,” International Journal Of Machine Learning and Cybernetics, Vol. 6(1), pp. 17-34, February 2015.
[2] V. P. Vishwakarma, “Deterministic learning machine for face recognition with multi-model feature extraction,” Ninth International Conference on Contemporary Computing (IC3), Noida, 2016, pp. 1-6, 2016.
[3] G. Hu, X. Peng, Y. Yang, T. Hospidales, and J. Verbeek. “Frankenstein: Learning Deep Face Representations using Small Data,” arXiv:1603.06470v2, 2016.
[4] M. Jaderberg, K. Simonyan, A. Vedaldi, and A. Zisserman. “Synthetic data and artificial neural networks for natural scene text recognition,” arXiv:1406.2227, 2014.
[5] K. Simonyan and A. Zisserman. “Very deep convolutional networks for large-scale image recognition,” In ICLR, 2015.
[6] Zur, Richard M. et al. “Noise Injection for Training Artificial Neural Networks: A Comparison with Weight Decay and Early Stopping.” Medical Physics 36.10 (2009): 4810–4818. PMC. Web. 15 Apr. 2017.
[7] J. Papon and M. Schoeler. “Semantic pose using deep networks trained on synthetic rgb-d,” arXiv:1508.00835, 2015.
[8] G. Hu, Y. Yang, D. Yi, J. Kittler, W. J. Christmas, S. Z. Li, and T. M. Hospedales, “When face recognition meets with deep learning: an evaluation of convolutional neural networks for face recognition,” CoRR, abs/1504.02351, 2015.
[9] Umme Aiman, Virendra P. Vishwakarma “Face Recognition using Modified Deep Learning Neural Network,” 8th International Conference on Computing Communication and Networking Technologies, pp. 3-5, July 2017.
Citation
Kuppili Rakesh, Marepalli Kamala Kumari, "Measuring The Accuracy of The Facial Images Using Convolutional Neural Networks in Deep Learning," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.476-480, 2019.
Load Harmonization Using Media Parameters in Massive Clusters of Learning Grids
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.481-485, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.481485
Abstract
E-Content generally requires media components like Graphics/Video in addition to Texts. Independent Learning objects of different sizes having different media components may be alternatives to traditional single large e-content file. The main objective of this paper work is to optimize the load harmonization using media parameters based on grid process running time. This Proposed work is classified into four categories such as estimating grid process running time, harmonization while loading, clustering the media parameters based on instructional and media parameters and processing to optimize the load balancing. The main goal is to load the same shareable media object for the massive user on a particular time using harmonization and clustering. This proposed work produces less grid process running time for the same media object even if the number of the user is larger at the same time.
Key-Words / Index Term
Harmonization, Victimization, Clustering, Optimization
References
[1] Ng WaiKeat, Ang Tan Fong, Ling Teck Chaw and LiewChee Sun “Scheduling Framework for Bandwidth-Aware Job Grouping-Based Scheduling in Grid computing”, Malaysian Journal of Computer Science, Vol.19 No.2, pp. 117-126, 2006.
[2] Thanasis G. Papaioannou and George D. Stamoulis, “ Reputation-based estimation of individual performance in collaborative and competitive grids”, Future Generation Computer Systems, Vol.26, Issue 8, pp. 1327-1335, 2010.
[3] RajkumarBuyya, David Abramson, Jonathan Giddy and Heinz Stockinger, “Economic models for resource management and scheduling in Grid Computing”, Concurrency and Computation: Practice and Experience, Vol. 14, pp. 1507-1542, DOI: 10.1002/cpe.690. 2002.
[4] Yunnan Zhang, Wei Sun and YasushiInoguchi, “CPU Load Predictions on the Computational Grids”, Proceedings of Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID 2006). Singapore, May16-19.DOI.ieeecomputersociety.org/10.1109/CCGRID.2006.27, 2006.
[5] DeeptiMalhotra and Devanand, “Framework for Job Scheduling in Grid Environment”, International Journal of Computer Applications, Volume 38, Number 7, pp. 42-44, DOI- 10.5120/4703-6861,2012.
[6] ShaikNaseera, and Madhu Murthy K.V, “Trust-Based Load Distribution in a Data Grid Environment”, International Journal on Computer Science and Engineering, Vol. 02, No.01S, pp. 24-29, 2010.
[7] Wen-Chung Shih, Chao-Tung Yang,andShian-Shyong Tseng,“Ontology-based Content Organization and Retrieval for SCORM-compliant Teaching Materials in Data Grids”, Future Generation Computer Systems, No. 25, pp. 687-694,2009.
[8] Hsin-Chuan Ho, Chao-Tung Yang,and Chi-Chung Chang, “Building an E-Learning Platform by Access Grid and Data Grid Technologies”, Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service, Taipei, Taiwan, 2004, pp:452-455,2004.
[9] A.D. Mahajan1*, S. Chaudhary2-"Hybrid Features For Content Based Image Retrieval System", IJCSE, ,pp 11-15, Vol.-6, Issue-10, Oct 2018 E-ISSN: 2347-2693.
[10] S. Rana, "Analysis of Regular-Frequent Patterns in Large Transactional Databases", IJCSE pp 1-5, Vol.-6, Issue-7, July 2018 E-ISSN: 2347-2693 [11] Merrill M.D., “First Principles of Instruction”, Englewood Cliffs, NJ: Educational Technology Publications,2002
[12] Ani Brown Mary, N and Saravanan K, “Performance Factors of Cloud Computing Data Centres Using M/G/1/GD Model Queuing Systems”, International Journal of Grid Computing & Applications (IJGCA) Vol. 4, No. 1, March 2013.
[13]Selvi, K,“An Enhanced GridwayMetascheduler for Heterogeneous Grid Using Trust and Reputation”, Ph.D. dissertation, Anna University, Chennai, India, 2012.
[15] Kaladevi, “Load Balance Optimization in Learning Grids Through Semantic Matching for E-Contents”, Ph.D. dissertation, Anna University, Chennai, India, 2013.
[16] Jagadeesan,B,“Domain Dependent Vertical Scalability for Development Efforts on E-Contents”, Ph.D. dissertation, Anna University, Chennai, India, 2014.
Citation
G. Manoharan, K. Nirmala, "Load Harmonization Using Media Parameters in Massive Clusters of Learning Grids," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.481-485, 2019.
A Survey on E-Commerce Log Analysis Using Hadoop
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.486-489, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.486489
Abstract
today web mining is a testing assignment in association. Each association produced immense measure of information from different source. Log documents are kept up by the web server. The testing undertaking for E-trade organizations is to know their client conduct to enhance the business by breaking down web log records. Internet business site can produce several peta bytes of date in their web log documents. The investigation of log documents is utilized for learning the client conduct in E-trade framework. The examination of such substantial web log documents requires parallel handling and dependable information stockpiling framework. The Hadoop structure gives solid stockpiling by Hadoop Distributed File System and parallel handling framework for huge database utilizing MapReduce programming model. These components help to process log information in parallel way and figures results productively.
Key-Words / Index Term
Hadoop, MapReduce, Web Log, E-trade, frequent item set mining
References
[1] Malhotra, Dheeraj, and O. P. Rishi. "An intelligent approach to design of E-Commerce metasearch and ranking system using next-generation big data analytics." Journal of King Saud University-Computer and Information Sciences (2018).
[2] Chavan, Reshma, and Debajyoti Mukhopadhyay. "A comparative study of recommendation algorithms in e-commerce." I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017 International Conference on. IEEE, 2017.
[3] Prasad, HR Manjunath. "Revamped Market-Basket Analysis using In-Memory Computation framework." Intelligent Systems and Control (ISCO), 2017 11th International Conference on. IEEE, 2017.
[4] Suguna, S., M. Vithya, and JI Christy Eunaicy. "Big data analysis in e-commerce system using HadoopMapReduce." Inventive Computation Technologies (ICICT), International Conference on. Vol. 2. IEEE, 2016.
[5] Apache Hadoop : ht!p:/lhadoop.apache.org
[6] R.Agrawal and R.Shrikant.Fast Algorithms for mining association rules in large database. In Proc. VLDB, pages 487-499, 1994.
[7] Malhotra, D., Malhotra, M., Rishi, O.P., 2017. An Innovative Approach of Web Page Ranking Using Hadoop- and Map Reduce-Based Cloud Framework. In: Proceedings of Advances in Intelligent Systems and Computing, Vol. 654, CSI, Springer, pp. 421–427.
[8] Malhotra, D., Rishi, O.P., 2017. IMSS: A Novel Approach to Design of Adaptive Search System Using Second Generation Big data Analytics. In: Proceedings of International Conference on Communication and Networks, Springer, pp. 189–196.
[9] Verma, N., Singh, J., 2017. An intelligent approach to Big Data analytics for sustainable retail environment using Apriori-MapReduce framework. Ind. Manage. Data Syst. 117(7), Emerald, 1503–1520..
[10] Verma, N., Singh, J., 2017. A comprehensive review from sequential association computing to Hadoop MapReduce parallel computing in a retail scenario. J. Manage. Analytics, Taylor and Francis. doi:10.1080/23270012.2017.1373261
[11] Wang, H., Wong, K., 2014. Personalized search: An interactive and iterative approach. In Services (SERVICES), 2014 IEEE World Congres, IEEE, pp. 3–10.
[12] Gole, Sheela, and Bharat Tidke. "Frequent itemset mining for Big Data in social media using ClustBigFIM algorithm", 2015 International Conference on Pervasive Computing (ICPC), 2015.
[13] Jiawei Han. 2005. Data Mining: Concepts and Techniques. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
[14] M.Santhanakumar and C.Christopher Columbus, “Web Usage Analysis of Web pages UsingRapidminer”, WSEAS Transactions on computers, EISSN: 2224-2872, vol.3, May 2015.
Citation
Sapna Bhavsar, Pooja Shah, Tushar Trambadiya, "A Survey on E-Commerce Log Analysis Using Hadoop," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.486-489, 2019.
Analysing Collective Effect of Metrics on MANET Routing Protocols
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.490-494, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.490494
Abstract
Analysis of Protocol is of prime importance in order to optimize its performance. Performance metrics are useful parameters for analyzing the performance of any routing protocol in Mobile Ad hoc Networks (MANETs). It is generally observed during the simulation of protocols in MANETs that one protocol may performs better with respect to one performance metric as compared to another protocol but its performance may weaken with respect to another performance metric when compared with same protocol. Hence there is a need to evaluate a protocol using a cumulative performance value. This cumulative value for a protocol can be calculated by providing due weightage to different factors based on its performance in various metrics. In this paper a cumulative metric has been proposed. Based on the value of this metric, the overall performance of a protocol can be analyzed and can also be compared to the other protocols.
Key-Words / Index Term
Protocol, MANET, Metric, Uni-path, Multipath, Simulation
References
[1]IETF MANET Charter. [Online]. http://www.ietf.org/
[2]David A. Maltz, Josh Broch, Jorjeta Jetcheva, and David B. Johnson, "The Effects of On-Demand Behavior in Routing Protocols for Multihop Wireless Ad Hoc Networks," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, vol. 17, no. 8, pp. 1439-1453, August 1999.
[3]C.E. Perkins and E. M. Royer, "Ad hoc on-demand distance vector routing," in Proceedings of the 2nd IEEE Workshop on, February 1999, pp. 90-100.
[4]C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance vector Routing (DSDV) for mobile computers," in Proceedings of the Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM ’94), London, United Kingdom, August–September 1994, pp. 234-244.
[5]M.K. Marina and S.R. Das, "On-demand multipath distance vector routing in ad hoc networks," in Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), 2001, pp. 14-23.
[6]Ha Duyen Trung, Watit Benjapolakul, and Phan Minh Duc, "Performance evaluation and comparison of different ad hoc routing protocols," in Computer Communication 30, 2007, pp. 2478–2496.
[7]C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks," IEEE Personal Communications, vol. 8, no. 1, pp. 16-28, February 2001.
[8]J. Broch, D. B. Johnson, and D. A. Maltz, "The dynamic source routing protocol for mobile ad hoc networks," Internet-Draft, draft-ietf-manet-dsr-01.txt 1998.
[9]A. A. Chavan, Prof. D. S. Kurule, and Prof. P. U. Dere, "Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack," in Procedia Computer Science, 2016, pp. 835 – 844.
[10]S Gowrishankar, Subir Kumar Sarkar, and T.G. Basavaraju, "Performance Analysis of AODV, AODVUU, AOMDV and RAODV over IEEE 802.15.4 in Wireless Sensor Networks," in 2nd IEEE International Conference on Computer Science and Information Technology, 2009, pp. 59-63.
Citation
Jaideep Atri, Shuchita Upadhyaya, "Analysing Collective Effect of Metrics on MANET Routing Protocols," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.490-494, 2019.