Volume 3 Issue 6- June 2013


S.No Title Page
1. Spoofing Attacks in wireless Sensor Networks
V Bharath Srinivas, Dr Syed Umar

Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on  the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our attack detector into a real time indoor localization system, which is also capable of localizing the positions of the attackers. We then show that the positions of the attackers can be localized using either area-based or point-based localization algorithms with the same relative errors as in the normal case
Keywords— Spoofing, filtering, defense, wireless.

Full Text PDF
2. Research of Adaptive Iterative Learning Algorithm for Industrial Manipulator
Qing Liu , Xiaohua Ni,Chong Cheng

A three degree dynamic model of manipulator included a screw-nut auxiliary is introduced. Considering the random disturbance and the  to the manipulator in practical situation , the adaptive iterative learning controller is designed. The simulation was conducted under  MATLAB environment ,the result shows that the controller can efficiently track the trajectory with high accuracy. The result of the change of screw-nut auxiliary’s parameters on the controller’s tracking effect is also analyzed.

Key Words: manipulator; dynamic; adaptive iterative learning; screw-nut auxiliary; simulation

Full Text PDF
3. A Deadlock free Algorithm for NoC based system using Distance Class Approach
Sudeep Ghosh ,Mandira Banik

Similar to the interconnection architectures, deadlock occurs in NoC architectures when a group of packets are unable to make progress because they are waiting on one another to release re­sources. Despite its effectiveness in reducing buffer requirements,wormhole-switching technique is susceptible to deadlock. In wormhole switching, the resources are virtual channel and their corresponding buffers. Here, cyclic dependency on flit buffers occurs among several packets. As a result, the network is clogged with packets without making any progress. To prevent this cata­strophic problem, we mainly adopt deadlock-avoidance policy in NoCsim. The user can provide a deadlock-free algorithm for the network or use our methods of eliminating  cycles in the re­source dependence curve—distance class approach [13]. Distance class approach is particularly useful for the networks for which deterministic algorithms succumb to deadlock.We Implemented it NoC simulator [1].

Keywords-system-on-chip; network-on-chip; buffer depth; odd-even routing algorithm

Full Text PDF
4. Software Protection from Piracy using Elliptic Curve
Dr. Abdul Kareem Murhij Radhi

Due to the rapid growth of Internet users in the last decades and illegal use of software from piracies without granting authorities from legal vendors, besides expensive of software products and draw backs in distribution, this paper offers a suitable technique to protect software from piracy. It relies on elliptic curve cryptography technique achieved via processor ID of the buyer or user. The bought software after downloading will be protected from illegal distribution through mechanism of elliptic curve with ElGamal cryptographic technique. In order to protect server from piracies and latencies causes from network communication, this paper offers software downloading during virtual computer or VMware. Time consuming for encryption and decryption will be shown. This paper concludes that using Elliptic curve offers equal security for small bit size, thereby reducing processing overhead. Software implemented using Matlab V7.14 (R2012a) with processor AMD Turion(tm) X2 Ultra Dual-Core Mobile ZM-85 2.30 GHZ with platform Vista.
Keywords-----Elliptic Curve, ElGamal, Virtual Machine, Matlab, Piracy.

Full Text PDF
5. The Impact of War Driving on Wireless Networks
Ch.Sai Priya, Syed Umar, T Sirisha

Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. It was also known as 'WiLDing' (Wireless LAN Driving).Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from Omni directional to highly directional. Software for wardriving is freely available on the Internet, notably, Nets tumbler for Windows, Kismet for Linux, and KisMac for Macintosh.

Keywords — Wardriving, hacking, wireless, wifi cracking.

Full Text PDF
6. Intrusion Detection System for Malicious Traffic by using PSO-GA Algorithm
K.Pradeep Mohan Kumar

In terms of computing, a malicious attack is an attack that can be used to compromise the system state with the intent of acquiring, destroying, modifying or accessing a user’s data without any permission. Physical attacks typically mean either the theft of hardware storing personal/confidential information or the destruction of said hardware. Electronic attacks (the focus of this presentation) involve unauthorized access or unauthorized modification of the user’s computer. Malicious attacks like Viruses, Worms, Trojan horses, Logic bombs (a.k.a. Time bombs), Trapdoors, Phishing/Spoofing can be accessing victim system resources without getting any permission. Earlier detection system like firewall, access control, encryption methods are failed due to self similarity of new malicious attacks. We propose new Intrusion detection system for malicious traffic by using particle swarm optimization techniques combined with genetic algorithm. The main use of this combined algorithm is that it produces good classification rules. By using these rules, IDS detects the intrusion with very low false alarm rate and High detection Accuracy rate.

Keywords: IDS, PSO, GA, Combination of PSO-GA.

Full Text PDF