Friday 28 April 2017

UNDERSTANDING THE SKILL LEVEL OF ATTACKERS THROUGH THE DEPLOYMENT OF VIRTUAL HONEYNET

UNDERSTANDING THE SKILL LEVEL OF ATTACKERS THROUGH THE DEPLOYMENT OF VIRTUAL HONEYNET

G.Rajarajan 1, L. Ganesan 2

1 Research Scholar  Faculty of Information and Communication Engg, Anna University   Chennai , Tamil Nadu ,India.
2 Professor&Head Department of Computer Science and Engg ,A.C. College of Engineering & Technology, Karaikudi, TamilNadu ,India.

Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major threat to the security of networks and creates significant security risks to the organizations. In order to protect the networked systems against these kinds of threats and try to find methods to stop at least some part of them, we must learn more about their behavior, and also methods and tactics of the attackers, which attack our networks.This paper makes a practical analysis of observed attacks and exploited vulnerabilities using honeypots in an organization network. Based on this, we study the attackers’ behavior and in particular the skill level of the attackers once they gain access to the honeypot systems. The first part of the work describes: the honeypot architecture as well as implementation details so that we can observe the attackers behavior. The second part presents: the detailed analysis and classification of the attacks and vulnerabilities, which are used by the attackers and the attackers’ skill level based on the exploited vulnerabilities. 
Share:

TRUST THRESHOLD BASED NEIGHBORHOOD TRUST WORTHY NODE CERTIFIED PUBLIC KEY MANAGEMENT IN MANET

TRUST THRESHOLD BASED NEIGHBORHOOD TRUST WORTHY NODE CERTIFIED PUBLIC KEY MANAGEMENT IN MANET

Golden Julie E 1 ,Anitha P 2

1 Assistant  Professsor, Dept Of Computer Science, Regional Centre Of Anna University, Tirunelveli, 
Tamilnadu, India.
2 Department Of Computer Science, Regional Centre of Anna University, Tirunelveli, Tamilnadu, India.

Keys have to be securely handled and maintained and there are various techniques available in MANET for efficient Key generation and distribution. A Composite trust based Public key management (CTPKM) is designed to meet a required level of security as well as to meet performance requirements like service availability and communication overhead without relying on trusted third party such as Certificate Authority (CA). An optimal trust threshold is associated with all the nodes to reduce security vulnerabilities like the public key compromise and key leakage. CTPKM does not support trusted third party hence it finds the most trusted neighbor node which satisfies the trust threshold condition to certify the key generated. In turn, the neighbor node again checks the trust of the requestor node which is requesting to certify the public key. The requesting node and certificate issuer node must exhibit a mutual trust relationship. The proposed trust based scheme is simulated and the performance is evaluated. It is observed that the proposed scheme outperforms other trust based models in terms of availability and security vulnerabili.

Share:

PERFORMANCE EVALUATION OF MODULA AND MONTGOMERY MULTIPLIER IN CRYPTOGRAPHIC APPLICATION

PERFORMANCE EVALUATION OF MODULA AND MONTGOMERY MULTIPLIER IN CRYPTOGRAPHIC APPLICATION

                                                    N.Suriya 1, M.Ayyadurai 2

1 Assistant Professor, Department of EEE, JeppiaarMaamallan Engineering College,Tamilnadu, India.
2 Associate Professor, Department of ECE, JeppiaarMaamallan Engineering College,Tamilnadu, India.    

In digital life there is a growing demand for real time implementation of cryptographic algorithms which are being used in secure communication systems, networks and security systems. In  this research paper a novel reconfigurable processor architecture has been presented for cryptographic applications that bridges the gap of traditional computing techniques and also sustains implementations that can show equal or even better performance results than custom hardware. This work presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. A cryptographic processor with public and private key pair generator and modulo multiplier based both encryptor and decryptor for text message was designed. The hardware design of RSA processor by employing Montgomery multiplier technique to reduce the execution delay time and the thermal power dissipation was compared and proved.

Share:

PERFORMANCE ANALYSIS OF MULTICARRIER MODULATION SCHEMES IN 5G CELLULAR SYSTEMS

PERFORMANCE ANALYSIS OF MULTI CARRIER MODULATION SCHEMES IN 5G CELLULAR SYSTEMS

Naveena A Priyadharsini 1, S. Tamil Selvi 2

1 Assistant Professor, Department of ECE, ACWE, Kanyakumari, Tamilnadu, India.   
2 Professor & Head-PG, Department of ECE, NEC, Kovilpatti, Tamilnadu, India.        

In the existing 4G technology, Orthogonal Frequency Division Multiplexing (OFDM) plays a vital role. As the demand for data traffic in cellular networks increase day by day, the capacity of the system should be increased. The resources available today are inefficient to meet the future needs. So the current techniques must be upgraded. In this paper we concentrate on the requirements of Fifth generation (5G) cellular networks and also the design of its physical layer in downlink. For this purpose a multicarrier methodology Generalized Frequency Division Multiplexing (GFDM) is considered. Here the performance of both the OFDM and GFDM system is compared and analyzed using higher order modulation schemes and linear iterative receiver structure. The simulation results clearly explained that the GFDM system has less symbol error rate (SER) than the OFDM system, which increases the transmission rate.

Share:

MEMS BASED THERMAL MICROACTUATOR

MEMS BASED THERMAL MICROACTUATOR

Dr. M.Saravanan1, G.V.Sunil Kumar2

1,2Department of Electronics and Instrumentation Engineering, SreeVidyanikethan Engineering College, A.Rangampet, Tirupati,India.

Source of energy for the MEMS devices became the unavoidable requirement for any application. Even though many renewable energy sources are available, the optimal utilization of those resources are not attained till now. This paper presents a design and implementation of Passive MEMS based voltage generation using temperature. The design is made with two stages, in the first part the temperature is converted to displacement using Micro actuators and then in the second stage the displacement is converted to pressure and then to voltage using piezoelectric sensors. It is simulated using COMSOL multiphysics software at a temperature of 100o C.

Share:

Thursday 27 April 2017

PERFORMANCE ANALYSIS OF RESOURCE ALLOCATION SCHEMES IN LTE OFDMA SYSTEMS

PERFORMANCE ANALYSIS OF RESOURCE ALLOCATION SCHEMES IN 
LTE OFDMA SYSTEMS  

Kavitha.P 1, Dr.Shanmugavel.S 2

1 PG Student, 2 Professor 
1,2 Department of ECE, National Engineering College (Autonomous), Kovilpatti, Tamilnadu, India.   

This paper deals with the network spectral efficiency/capacity analysis of downlink Long Term Evolution (LTE) Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) system with Nc cells in a network. In a multi-cell cellular communication, the inter-cell interference (ICI) is detrimental in achieving the intended system performance, in particular for the edge user.  To reduce the ICI, Fractional Frequency Reuse (FFR) method is compared in suburban Macro environment. Assuming that each transmitter (i.e) evolved Node B (eNB) is equipped with t antennas and each receiver (i.e) User Equipment (UE)  with r antennas for each subcarrier and each receiver implements single-user detection, in the absence of channel state information at the transmitter (CSIT), the  network spectral efficiency is limited due to equal power into antennas. Further, capacity improvement is possible with stronger CSI assumption. This is achieved through interference suppression by transmit beam forming approach. An expression for spectral efficiency is derived in the absence and presence of perfect CSIT. The simulation shows an improvement with perfect CSIT when the number of transmitting antennas gets increased.

Share:

HIERARCHICAL OVERLAY SYSTEMS: AN ADAPTIVE DETECTION APPROACH

HIERARCHICAL OVERLAY SYSTEMS: AN ADAPTIVE DETECTION APPROACH

R. Sowmiya1 S. Lenty Stuwart 2 S. Tamilselvi 3

1, 2 University College of Engineering Nagercoil, Anna University, Tamilnadu, India.
3 National Engineering College (Autonomous), Kovilpatti, Tamilnadu, India.

In this paper, we introduce a new adaptive loading technique for multiuser code division multiple access (CDMA) system to achieve improved performance in terms of lower bit-error rate (BER) for active micro-cell users present in the coverage area of a macro-cell base station (BS) which provides basic coverage for a large area. Based on the fading scenario, the proposed scheme adjusts the load distribution among the macro-cell BS and the participating micro-cell BSs in the overlay structure to guarantee relatively low BER to the active mobile stations (MS). The scheme also enables the MS to establish link with one base station at a time to avoid the power disparity from the participating BSs. The superiority of the proposed system in multipath Rayleigh fading channel is shown and also the effect of equal-gain combining (EGC) scheme in system performance is analysed for different BS load.

Share: