Volume 3 Issue 6- June 2013
S.No | Title | Page |
---|---|---|
1. | Spoofing Attacks in wireless Sensor Networks V Bharath Srinivas, Dr Syed Umar Abstract
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. In this paper we propose a method for both detecting spoofing attacks, as well as locating the positions of adversaries performing the attacks. We first propose an attack detector for wireless spoofing that utilizes K-means cluster analysis. Next, we describe how we integrated our attack detector into a real time indoor localization system, which is also capable of localizing the positions of the attackers. We then show that the positions of the attackers can be localized using either area-based or point-based localization algorithms with the same relative errors as in the normal case |
201-210 Full Text PDF |
2. | Research of Adaptive Iterative Learning Algorithm for Industrial Manipulator Qing Liu , Xiaohua Ni,Chong Cheng Abstract
A three degree dynamic model of manipulator included a screw-nut auxiliary is introduced. Considering the random disturbance and the to the manipulator in practical situation , the adaptive iterative learning controller is designed. The simulation was conducted under MATLAB environment ,the result shows that the controller can efficiently track the trajectory with high accuracy. The result of the change of screw-nut auxiliary’s parameters on the controller’s tracking effect is also analyzed. Key Words: manipulator; dynamic; adaptive iterative learning; screw-nut auxiliary; simulation |
211-214 Full Text PDF |
3. | A Deadlock free Algorithm for NoC based system using Distance Class Approach Sudeep Ghosh ,Mandira Banik Abstract
Similar to the interconnection architectures, deadlock occurs in NoC architectures when a group of packets are unable to make progress because they are waiting on one another to release resources. Despite its effectiveness in reducing buffer requirements,wormhole-switching technique is susceptible to deadlock. In wormhole switching, the resources are virtual channel and their corresponding buffers. Here, cyclic dependency on flit buffers occurs among several packets. As a result, the network is clogged with packets without making any progress. To prevent this catastrophic problem, we mainly adopt deadlock-avoidance policy in NoCsim. The user can provide a deadlock-free algorithm for the network or use our methods of eliminating cycles in the resource dependence curve—distance class approach [13]. Distance class approach is particularly useful for the networks for which deterministic algorithms succumb to deadlock.We Implemented it NoC simulator [1]. Keywords-system-on-chip; network-on-chip; buffer depth; odd-even routing algorithm |
215-219 Full Text PDF |
4. | Software Protection from Piracy using Elliptic Curve Dr. Abdul Kareem Murhij Radhi Abstract
Due to the rapid growth of Internet users in the last decades and illegal use of software from piracies without granting authorities from legal vendors, besides expensive of software products and draw backs in distribution, this paper offers a suitable technique to protect software from piracy. It relies on elliptic curve cryptography technique achieved via processor ID of the buyer or user. The bought software after downloading will be protected from illegal distribution through mechanism of elliptic curve with ElGamal cryptographic technique. In order to protect server from piracies and latencies causes from network communication, this paper offers software downloading during virtual computer or VMware. Time consuming for encryption and decryption will be shown. This paper concludes that using Elliptic curve offers equal security for small bit size, thereby reducing processing overhead. Software implemented using Matlab V7.14 (R2012a) with processor AMD Turion(tm) X2 Ultra Dual-Core Mobile ZM-85 2.30 GHZ with platform Vista. |
220-229 Full Text PDF |
5. | The Impact of War Driving on Wireless Networks Ch.Sai Priya, Syed Umar, T Sirisha Abstract
Wardriving is searching for Wi-Fi wireless networks by moving vehicle. It involves using a car or truck and a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. It was also known as 'WiLDing' (Wireless LAN Driving).Many wardrivers use GPS devices to measure the location of the network find and log it on a website. For better range, antennas are built or bought, and vary from Omni directional to highly directional. Software for wardriving is freely available on the Internet, notably, Nets tumbler for Windows, Kismet for Linux, and KisMac for Macintosh. Keywords — Wardriving, hacking, wireless, wifi cracking. |
230-235 Full Text PDF |
6. | Intrusion Detection System for Malicious Traffic
by using PSO-GA Algorithm K.Pradeep Mohan Kumar Abstract
In terms of computing, a malicious attack is an attack that can be used to compromise the system state with the intent of acquiring, destroying, modifying or accessing a user’s data without any permission. Physical attacks typically mean either the theft of hardware storing personal/confidential information or the destruction of said hardware. Electronic attacks (the focus of this presentation) involve unauthorized access or unauthorized modification of the user’s computer. Malicious attacks like Viruses, Worms, Trojan horses, Logic bombs (a.k.a. Time bombs), Trapdoors, Phishing/Spoofing can be accessing victim system resources without getting any permission. Earlier detection system like firewall, access control, encryption methods are failed due to self similarity of new malicious attacks. We propose new Intrusion detection system for malicious traffic by using particle swarm optimization techniques combined with genetic algorithm. The main use of this combined algorithm is that it produces good classification rules. By using these rules, IDS detects the intrusion with very low false alarm rate and High detection Accuracy rate. Keywords: IDS, PSO, GA, Combination of PSO-GA. |
236-238 Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net