Friday 28 April 2017

UNDERSTANDING THE SKILL LEVEL OF ATTACKERS THROUGH THE DEPLOYMENT OF VIRTUAL HONEYNET

UNDERSTANDING THE SKILL LEVEL OF ATTACKERS THROUGH THE DEPLOYMENT OF VIRTUAL HONEYNET

G.Rajarajan 1, L. Ganesan 2

1 Research Scholar  Faculty of Information and Communication Engg, Anna University   Chennai , Tamil Nadu ,India.
2 Professor&Head Department of Computer Science and Engg ,A.C. College of Engineering & Technology, Karaikudi, TamilNadu ,India.

Malware in the form of computer viruses, worms, trojan horses, rootkits, and spyware acts as a major threat to the security of networks and creates significant security risks to the organizations. In order to protect the networked systems against these kinds of threats and try to find methods to stop at least some part of them, we must learn more about their behavior, and also methods and tactics of the attackers, which attack our networks.This paper makes a practical analysis of observed attacks and exploited vulnerabilities using honeypots in an organization network. Based on this, we study the attackers’ behavior and in particular the skill level of the attackers once they gain access to the honeypot systems. The first part of the work describes: the honeypot architecture as well as implementation details so that we can observe the attackers behavior. The second part presents: the detailed analysis and classification of the attacks and vulnerabilities, which are used by the attackers and the attackers’ skill level based on the exploited vulnerabilities. 
Share:

TRUST THRESHOLD BASED NEIGHBORHOOD TRUST WORTHY NODE CERTIFIED PUBLIC KEY MANAGEMENT IN MANET

TRUST THRESHOLD BASED NEIGHBORHOOD TRUST WORTHY NODE CERTIFIED PUBLIC KEY MANAGEMENT IN MANET

Golden Julie E 1 ,Anitha P 2

1 Assistant  Professsor, Dept Of Computer Science, Regional Centre Of Anna University, Tirunelveli, 
Tamilnadu, India.
2 Department Of Computer Science, Regional Centre of Anna University, Tirunelveli, Tamilnadu, India.

Keys have to be securely handled and maintained and there are various techniques available in MANET for efficient Key generation and distribution. A Composite trust based Public key management (CTPKM) is designed to meet a required level of security as well as to meet performance requirements like service availability and communication overhead without relying on trusted third party such as Certificate Authority (CA). An optimal trust threshold is associated with all the nodes to reduce security vulnerabilities like the public key compromise and key leakage. CTPKM does not support trusted third party hence it finds the most trusted neighbor node which satisfies the trust threshold condition to certify the key generated. In turn, the neighbor node again checks the trust of the requestor node which is requesting to certify the public key. The requesting node and certificate issuer node must exhibit a mutual trust relationship. The proposed trust based scheme is simulated and the performance is evaluated. It is observed that the proposed scheme outperforms other trust based models in terms of availability and security vulnerabili.

Share:

PERFORMANCE EVALUATION OF MODULA AND MONTGOMERY MULTIPLIER IN CRYPTOGRAPHIC APPLICATION

PERFORMANCE EVALUATION OF MODULA AND MONTGOMERY MULTIPLIER IN CRYPTOGRAPHIC APPLICATION

                                                    N.Suriya 1, M.Ayyadurai 2

1 Assistant Professor, Department of EEE, JeppiaarMaamallan Engineering College,Tamilnadu, India.
2 Associate Professor, Department of ECE, JeppiaarMaamallan Engineering College,Tamilnadu, India.    

In digital life there is a growing demand for real time implementation of cryptographic algorithms which are being used in secure communication systems, networks and security systems. In  this research paper a novel reconfigurable processor architecture has been presented for cryptographic applications that bridges the gap of traditional computing techniques and also sustains implementations that can show equal or even better performance results than custom hardware. This work presents an emerging reconfigurable hardware that potentially delivers flexible high performance for cryptographic algorithms. A cryptographic processor with public and private key pair generator and modulo multiplier based both encryptor and decryptor for text message was designed. The hardware design of RSA processor by employing Montgomery multiplier technique to reduce the execution delay time and the thermal power dissipation was compared and proved.

Share:

PERFORMANCE ANALYSIS OF MULTICARRIER MODULATION SCHEMES IN 5G CELLULAR SYSTEMS

PERFORMANCE ANALYSIS OF MULTI CARRIER MODULATION SCHEMES IN 5G CELLULAR SYSTEMS

Naveena A Priyadharsini 1, S. Tamil Selvi 2

1 Assistant Professor, Department of ECE, ACWE, Kanyakumari, Tamilnadu, India.   
2 Professor & Head-PG, Department of ECE, NEC, Kovilpatti, Tamilnadu, India.        

In the existing 4G technology, Orthogonal Frequency Division Multiplexing (OFDM) plays a vital role. As the demand for data traffic in cellular networks increase day by day, the capacity of the system should be increased. The resources available today are inefficient to meet the future needs. So the current techniques must be upgraded. In this paper we concentrate on the requirements of Fifth generation (5G) cellular networks and also the design of its physical layer in downlink. For this purpose a multicarrier methodology Generalized Frequency Division Multiplexing (GFDM) is considered. Here the performance of both the OFDM and GFDM system is compared and analyzed using higher order modulation schemes and linear iterative receiver structure. The simulation results clearly explained that the GFDM system has less symbol error rate (SER) than the OFDM system, which increases the transmission rate.

Share:

MEMS BASED THERMAL MICROACTUATOR

MEMS BASED THERMAL MICROACTUATOR

Dr. M.Saravanan1, G.V.Sunil Kumar2

1,2Department of Electronics and Instrumentation Engineering, SreeVidyanikethan Engineering College, A.Rangampet, Tirupati,India.

Source of energy for the MEMS devices became the unavoidable requirement for any application. Even though many renewable energy sources are available, the optimal utilization of those resources are not attained till now. This paper presents a design and implementation of Passive MEMS based voltage generation using temperature. The design is made with two stages, in the first part the temperature is converted to displacement using Micro actuators and then in the second stage the displacement is converted to pressure and then to voltage using piezoelectric sensors. It is simulated using COMSOL multiphysics software at a temperature of 100o C.

Share:

Thursday 27 April 2017

PERFORMANCE ANALYSIS OF RESOURCE ALLOCATION SCHEMES IN LTE OFDMA SYSTEMS

PERFORMANCE ANALYSIS OF RESOURCE ALLOCATION SCHEMES IN 
LTE OFDMA SYSTEMS  

Kavitha.P 1, Dr.Shanmugavel.S 2

1 PG Student, 2 Professor 
1,2 Department of ECE, National Engineering College (Autonomous), Kovilpatti, Tamilnadu, India.   

This paper deals with the network spectral efficiency/capacity analysis of downlink Long Term Evolution (LTE) Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) system with Nc cells in a network. In a multi-cell cellular communication, the inter-cell interference (ICI) is detrimental in achieving the intended system performance, in particular for the edge user.  To reduce the ICI, Fractional Frequency Reuse (FFR) method is compared in suburban Macro environment. Assuming that each transmitter (i.e) evolved Node B (eNB) is equipped with t antennas and each receiver (i.e) User Equipment (UE)  with r antennas for each subcarrier and each receiver implements single-user detection, in the absence of channel state information at the transmitter (CSIT), the  network spectral efficiency is limited due to equal power into antennas. Further, capacity improvement is possible with stronger CSI assumption. This is achieved through interference suppression by transmit beam forming approach. An expression for spectral efficiency is derived in the absence and presence of perfect CSIT. The simulation shows an improvement with perfect CSIT when the number of transmitting antennas gets increased.

Share:

HIERARCHICAL OVERLAY SYSTEMS: AN ADAPTIVE DETECTION APPROACH

HIERARCHICAL OVERLAY SYSTEMS: AN ADAPTIVE DETECTION APPROACH

R. Sowmiya1 S. Lenty Stuwart 2 S. Tamilselvi 3

1, 2 University College of Engineering Nagercoil, Anna University, Tamilnadu, India.
3 National Engineering College (Autonomous), Kovilpatti, Tamilnadu, India.

In this paper, we introduce a new adaptive loading technique for multiuser code division multiple access (CDMA) system to achieve improved performance in terms of lower bit-error rate (BER) for active micro-cell users present in the coverage area of a macro-cell base station (BS) which provides basic coverage for a large area. Based on the fading scenario, the proposed scheme adjusts the load distribution among the macro-cell BS and the participating micro-cell BSs in the overlay structure to guarantee relatively low BER to the active mobile stations (MS). The scheme also enables the MS to establish link with one base station at a time to avoid the power disparity from the participating BSs. The superiority of the proposed system in multipath Rayleigh fading channel is shown and also the effect of equal-gain combining (EGC) scheme in system performance is analysed for different BS load.

Share:

DIAGNOSIS OF RETINAL DISEASE USING ADAPTIVE NEURO FUZZY INFERENCE SYSTEM

DIAGNOSIS OF RETINAL DISEASE USING ADAPTIVE NEURO FUZZY INFERENCE SYSTEM

C.Vinodhini1, R.Manjula Devi2

1 PG Student, 2 Assistant Professor [SG]
1,2Department of ECE,National Engineering College (Autonomous), Kovilpatti, Tamilnadu, India.

Image processing is a method in order to perform some operations on an image, mainly to get enhanced image. Image segmentation is the process of partitioning a digital image into multiple segments. Retinal images can be viewed using SLO fundus camera which provide detailed views of the different layers inside a human cornea. Some retinal problems and diseases can occur in one or more of the main corneal layers such as the epithelium and endothelium. In this paper, a unique approach to automatically extract the true retinal area from image based on image processing and machine learning approaches is performed.ANN is a parallel distributed information processor made of simple processing units. ANN is not effective to obtain the abnormal image of retina and it provides multilevel performance. Therefore misclassification rate occurs in the system. In order to reduce the error work, feature extraction was performed using texture and then the classification was done. The results obtained with accuracy of 93%.ANFIS provide output linearly. Finally the performance analysis is compared between ANN and ANFIS.

Share:

FACTS BASED OPTIMAL CONTROL OF WIND ENERGY SYSTEMS FOR VILLAGE RENEWABLE ENERGY SOURCES

FACTS BASED OPTIMAL CONTROL OF WIND ENERGY SYSTEMS FOR VILLAGE RENEWABLE ENERGY SOURCES

Hemanand.T

Asst.Prof, Department of EEE, Jeppiaar Maamallan Engineering College, Tamilnadu, India.


In recent years, the main goal of the Renewable energy resources is to provide low cost renewable energy products for the global market especially to suit village budgets. Many R&D companies have tried to provide a cost effective renewable energy product, but the quality of the products are below par. If the companies provide high quality energy resources means, it is not cost effective to suit village budgets. This paper provides a novel approach which compares and provides a Flexible Alternative Current Transmission system – [FACTS] based on Wind Turbine. The performance criterion of the product has two terms, one involving the maximum power capture and the other corresponding to mechanical fatigue load minimization at a low budget.  The comparison Model provides among others, the RST controller based Solution, PI controller based solution and LQG controllers based solution with low cost. 

Share:

ACCIDENT PREVENTION IN GAS STATION USING GSM BASED MICROCONTROLLER

ACCIDENT PREVENTION IN GAS STATION USING GSM BASED MICROCONTROLLER

Rajesh.R1, Revannth.M2, Sivagurunathan.L3, Saravanasastha.M4, Kottaiamalai.R5

1234 UG student- Dpet of ECE – Sree sowdambika College of  Engineering, Aruppukottai, Tamilnadu, India.5 Assistant Professor - Sree sowdambika College of Engineering, Aruppukottai, Tamilnadu, India.


Security and automation is a main concern in our day-to-day life. This style to home and industrial automation and security system design is almost standardized now a days. we have bothered to increase these standards by combining new design techniques and advanced a low cost home and industrial automated alert system. Everyone wants to be as much as safe as possible. The design of simple hardware circuit allows user to use in this system with PIR sensor, Gas sensor, Smoke sensor. The system is fully controlled by the ARDUINO microcontroller. All the sensors and detector are interconnected to microcontroller by using various types of interface circuits. The microcontroller will continuously monitor all the sensors and if it senses any gas leaking problem then the microcontroller will send the SMS and call to the user mobile through GSM modem.

Share:

Monday 27 March 2017

AN EXTENSIVE STUDY ON IRIS RECOGNITION USING IRIS IMAGES

AN EXTENSIVE STUDY ON IRIS RECOGNITION USING IRIS IMAGES
N. BENCY 1, DR.J. JESU VEDHA NAYAHI 2
1PG Student, 2Assistant Professor
1,2Department of CSE, Anna University, Tirunelveli Region, Tamilnadu, India.
                                Biometric systems use unique body and behavioral characteristics of individuals for identification, verification and recognition. Iris has 240 unique features for identification which is five times more than finger printings. The pattern of the human iris differs from person to person, even between monocular twins. The process of iris recognition is split into 4 major steps such as Iris segmentation, normalization, feature extraction, and matching. This survey explains various efficient methods that are used in recognition and compares the features of existing techniques.
Share:

ADAPTIVE VOID RECOVERY MECHANISM USING GEOGRAPHIC ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

ADAPTIVE VOID RECOVERY MECHANISM USING GEOGRAPHIC ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
E.GOLDEN JULIE 1, M.THANGA ARUNA 2
1Assistant..Professor,Department.ofComputeScience&Engg.,AnnaUniversityRegionalCampusTirunelveli.
                                                                                            
2Department of Computer Science &Engg.,Anna University Regional Campus – Tirunelveli

                        Routing is the process of selecting the best path from source to destination. Nowadays routing in three dimension in increasing since sensor nodes are deployed in the three dimensional region. In this routing mechanism, the data packet in the three dimensional region is routed using the geographic routing by constructing a forwarding region. It is assumed that the nodes in network have the same sensing range and same energy. The forwarding region is in the form of a conical region is used to find the next forwarding node in the network towards the sink node. Whenthe data packet is generated from a node it constructs forwarding region to find the next node to forward the packet. Ifany node found then it forwards the packet to the node else it twice the angle and search for the node. The searching process continues until it reaches the maximum angle or it finds the node inside the region. When no nodes found up to maximum angle then the corresponding node is considered as the void node.  If there is no lifetime for the received packet then it can be discarded. For occurrence of the void node the corresponding data packet can be traced back to the sender. So this reduces the void node .problem. in. the..network.
Share:

AUTOMATIC ENERGY METER READINGAND TRANSFORMER OIL LEVEL SENSOR USING WIRELESS COMMUNICATION

AUTOMATIC ENERGY METER READINGAND TRANSFORMER OIL LEVEL SENSOR USING WIRELESS COMMUNICATION

 RAJESH KANNAN.C 1, KODEESWARAN.P 2, KARTHIKEYAN.B 3, P.PAVUNRAJ 4    
          
1 2 3UG student- Department of EEE – Vickram College of Engineering, Enathi Tamilnadu, India.
4Assistant Professor - Department of EEE – Vickram College of Engineering, Enathi Tamilnadu, India.
The main objective of this paper is to reduce EB staff member needed to visit every house and to note down the EB reading. In addition, we have introduced the automation in paralleling of transformers based on the load used by the consumers. Mean while, the transformer oil temperature and oil level are also monitored. Here, we are using digital Energy meter that generates pulses based on the amount of energy consumed. These pulses are given to microcontroller that counts it for calculation of energy consumed. EB bill will be displayed in LCD for every 2 months. For every 10 pulses, microcontroller will send digital data to the microcontroller at the EB station via GSM module.CTs are connected in series with the load. This helps calculating the current drawn by the consumers. Using CT, the total power consumed is calculated.
Share:

ACHIEVING SHORT CHANNEL ZAPPING TIME IN IPTV

ACHIEVING SHORT CHANNEL ZAPPING TIME IN IPTV
 A.BRINDHA 1, S.CAMMILLUS 2

1PG Student, 2Assistant Professor[SG]
1,2Department of ECE,National Engineering College (Autonomous),Kovilpatti, Tamilnadu, India.

                                IP-Based TV systems are mainly used to stream the multimedia content over the internet. The video content for IPTV is streamed in the form of frames and stored in the buffer. Other than the channel being watched, a client also streams an extra combination of adjacent channel which consists of video segments sampled from a group of channels that a client might watch in the near future. Video segments streamed from the internet will be stored in a local buffer. Compared with the ordinary broadcast TV systems, IP-based TV systems suffer from a much longer channel switching delay. One of the most challenging issues in IPTV is the channel zapping time. Due to bandwidth limitations and buffer size at user side, prevents the user from receiving all the channels at the buffer for the same time. When the client issues a channel switching request to a target channel, the client will immediately playback the most recently downloaded frame of the target channel, leading to close-to-zero channel switching time. Thus the buffer shape can be changed in the form of a matrix so that the rearrangement of data is much simpler and the buffer delay is reduced to some extent. The streamed frames of the video will have a large amount of redundant data. The redundant data can be removed by using the fuzzy compression technique. The removal of redundant data will lead to the reduction in the amount of data being streamed from the network and thus the buffer size can also be reduced to a considerable amount.
Share: