Association of Computer Electronics and Electrical Engineers

Displaying 1-40 of 55 results

  • White Papers // Aug 2014

    Anomaly Based Intrusion Detection-A Review

    The primary purpose of intrusion detection system is to detect attacks against information systems in general. Anomaly detection is an active problem that has been studied within diverse research area and the application domain. First with the introduction to anomaly-based intrusion detection systems, different approaches and techniques have been proposed...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2014

    Enhanced Level of Security Using DNA Computing Technique With Hyperelliptic Curve Cryptography

    Hyper Elliptic Curve Cryptography (HECC) is a public key cryptographic technique which is required for secure transmission. HECC is better than the existing public key cryptography technique such as RSA, DSA, AES and ECC in terms of smaller key size. DNA cryptography is a next generation security mechanism, storing almost...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2014

    Generation of Anonymous Signature and Message Using Identity Based Group Blind Signature

    The essential functionality of any digital transaction system is the protection of the anonymity of user and the message. Group signature allows any valid group member to sign any number of messages on behalf of the group without revealing the member identity. A blind signature is a cryptographic scheme produces...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Enhancing Data Storage Security in Cloud Computing Through Steganography

    In cloud computing data storage is a significant issue because the entire data reside over a set of interconnected resource pools that enables the data to be accessed through virtual machines. It moves the application software's and databases to the large data centers where the management of data is actually...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Cloud Security and Data Integrity with Client Accountability Framework

    The cloud based services provide much efficient and seamless ways for data sharing across the cloud. The fact that the data owners no longer possess data makes it very difficult to assure data confidentiality and to enable secure data sharing in the cloud. Despite of all its advantages this will...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Priority based K-Erlang Distribution Method in Cloud Computing

    In this paper, the authors have proposed a priority based service time distribution method using Erlang Distribution for K-phases. The process of entering into the cloud is typically based on the priority of the service and form a queue. Each user needs to wait until the current user is being...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Trust Assessment Policy Manager in Cloud Computing - Cloud Service Provider's Perspective

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Reliability in compute cloud is an important aspect in Quality of Service (QoS) which needs to be addressed in order to foster the adoption of compute cloud. In today's integrated environment...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    A Fuzzy Algorithm for Mining High Utility Rare Itemsets - FHURI

    Classical frequent itemset mining identifies frequent itemsets in transaction databases using only frequency of item occurrences, without considering utility of items. In many real world situations, utility of itemsets are based upon user's perspective such as cost, profit or revenue and are of significant importance. Utility mining considers using utility...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Synchronization of the GPS Coordinates Between Mobile Device and Oracle Database System

    In this paper, the authors describe an architecture and implementation of module for acquiring a synchronization of GPS data between mobile device and central database system. The process of data exchange is inspired by SAMD algorithm. The paper sequentially presents a solution of individual system components. Special attention is paid...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Responsive Parameter Based an AntiWorm Approach to Prevent Wormhole Attack in Ad Hoc Networks

    The recent advancements in the wireless technology and their wide-spread deployment have made remarkable enhancements in efficiency in the corporate and industrial and military sectors The increasing popularity and usage of wireless technology is creating a need for more secure wireless ad hoc networks. This paper aims researched and developed...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Low Energy Routing for WSN's

    The main tasks of a Wireless Sensor Network (WSN) are data collection from its nodes and communication of this data to the Base Station (BS). The protocols used for communication among the WSN nodes and between the WSN and the BS, must consider the resource constraints of nodes, battery energy,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Permutation of Pixels within the Shares of Visual Cryptography using KBRP for Enhanced Security

    The security of authentication of internet based co-banking services should not be susceptible to high risks. The passwords are highly vulnerable to virus attacks due to the lack of high end embedding of security methods. In order for the passwords to be more secure, people are generally compelled to select...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile Computing

    In this paper, the authors attempt to base on auctions which present a frame work for the secure multi-party decision protocols. In addition to the implementations which are very light weighted, the main focus is on synchronizing security features for avoiding agreements manipulations and reducing the user traffic. Through this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2013

    Design and Implementation of Low-Power Cache Memory for Mission-Critical Embedded Systems

    Caches are mainly used to optimize the performance gap between the processor and main memory however accessing the cache more frequently causes the additional burden of increased power consumption by the embedded system. In many mission - critical embedded systems the power consumption is mainly due to memory access, based...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobile Networks

    Routing has a significant impact on the performance of mobile networks. Routing in mobile networks is a multiobjective optimization problem. The problem needs to consider multiple objectives simultaneously such as Quality of Service (QoS) parameters, delay and cost. This paper uses the NSGA-II multiobjectve genetic algorithm to solve the dynamic...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Data Accuracy Models Under Spatio - Temporal Correlation With Adaptive Strategies in Wireless Sensor Networks

    Recent progress in real time distributed system has made a drastic improvement for monitoring continuous data over wireless sensor networks. Such continuous monitoring of real data applications permits to observe in both time and space. In wireless sensor network, sensor nodes are deployed both in time and space to monitor...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis

    The development of internet protocols are greatly needed as the network security becomes one of the most important issues. This brings the need to develop IPv4 into IPv6 in order to proceed towards increasing the network capacity. Now Intruders are considered as one of the most serious threats to the...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Novel Algorithm for Encryption:Hybrid of Transposition and Substitution Method

    Since last one decade, it's a big challenge to send confidential data or information from one system to another system. There is a massive growth in internet and communication technologies in last decade that makes it difficult to send data securely. This paper presents an algorithm which is hybrib of...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Congestion Control Through Load Balancing Technique for Mobile Networks: A Cluster Based Approach

    Allocation of resources and optimization of its usage are the major concerns in the field of mobile networking due to the viral increase of mobile phone usage. Sometimes calls have to be blocked or dropped due to unavailability of resources. The Optimal Routing Path (ORP) for mobile cellular networks is...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Efficient ECC encryption for WSN's

    Elliptic Curve Cryptography (ECC) provides a secure means of key exchange between communicating nodes using the Diffie-Hellman (DH) key exchange algorithm. This paper presents an ECC encryption implementation using of the DH key exchange algorithm. Both encryption and decryption of text messages using this algorithm have been attempted. In ECC,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2013

    Applicability of Network Logs for Securing Computer Systems

    Logging the events occurring on the network has become very essential and thus playing a major role in monitoring the events in order to keep check over them so that they doesn't harm any resources of the system or the system itself. The analysis of network logs are becoming the...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Nov 2012

    Towards Practical Homomorphic Encryption With Efficient Public Key Generation

    With the advent of cloud computing several security and privacy challenges are put forth. To deal with many of these privacy issues, 'Processing the encrypted data' has been identified as a potential solution, which requires a Fully Homomorphic Encryption (FHE) scheme. After the breakthrough work of Craig gentry in devising...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Nov 2012

    ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) applications include target tracking in battle field and environmental monitoring etc. Sensor networks face many security challenges because of their inherent limitations in their energy, computation and communication capabilities. WSNs consist of sensor nodes that are capable of sensing the information and maintaining security. In this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Oct 2012

    A Probabilistic Approach Towards the Prevention of Error Propagation Effect of AES and Realization Thereof

    Error propagation effect of Advanced Encryption Standard (AES) is a great research challenge. AES suffers from a major limitation of error propagation effect. In literature, several studies have been made on this issue and several techniques are suggested to tackle the effect. To tackle this limitation, two methods are available....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Oct 2012

    Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks

    Networks of wireless micro-sensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources and an ad hoc operational environment. This paper is a study of the communication...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Optimization of Quality of Service in 4G Wireless Networks

    4G radio access technologies should be able to provide different types of IP services. These services rang from narrow-band to broadband, from non-real-time to real-time, and from unicast to multicast broadcast applications. When the need arises for different levels of user mobility the access systems are required with advanced capabilities...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Adaptive Handoff Initiation Scheme in Heterogeneous Network

    In wireless heterogeneous network, nodes are mobile equipment and can move freely from one area to another. A group of users with a large range of mobility can access around in the overall network cause high traffic. In these heterogeneous networks, resources are shared among all users and the amount...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Handover Behaviour of Transparent Relay in WiMAX Networks

    The knowledge on handover behavior in WiMAX network is essential for network management and planning in order to achieve optimum system throughput. In this paper, the authors have analyzed the handover behavior of transparent relay in several configurations for the IEEE 802.16j Mobile Multihop Relay (MMR) WiMAX network. The simulation...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarchical Mobile IPv6

    Hierarchical Mobile IPv6 (HMIPv6) was designed to support IP micro-mobility management in the next generation Internet Protocol v6 (IPv6) and the Next Generation Networks (NGN) framework. The general idea behind this protocol is the usage of Mobility Anchor Point (MAP) located at any level router of network to support hierarchical...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), data fusion should be energy efficient. But, determining the optimal number of aggregators in an energy efficient manner is a challenging task. Moreover, the existing data fusion techniques mostly use the same path for transmitting aggregated data to the sink which reduces the nodes lifetime....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol

    With the widespread use of wireless networks, securing data transmission becomes a basic requirement. The IEEE 802.11 standard which defines wireless networks communication, has proposed in its second version, IEEE 802.11b, a new protocol to offer some wired-like security services, such as: data privacy, data integrity, and authentication. In this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Analysis of GPSR and Its Relevant Attacks in Wireless Sensor Networks

    Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing protocols for wireless sensor networks...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls

    Hierarchical Cellular Networks (HCN) provides an enhanced use of the indoor networks. These two lower layers called picocell and femtocell consist both high and low speed users. To prevent the dropping and blocking probabilities of ongoing calls in a network, cells are spitted into the small sizes. Although, many effective...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Detection of suspected nodes in MANET

    Mobile Ad hoc NETwork (MANETs) is an emerging area with practical applications. One such field concerns MANET in which mobile nodes organize themselves in a network without the help of any predefined infrastructure. Securing MANETs is an important part of deploying and utilizing them, since them are often used in...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Networks

    In a Wireless Sensor Network (WSN) having a single sink, information is given to the distant nodes from beacons by overhearing. Since it is out of the communication range, information is not sent directly to the Static Sink (SS). If a distant node is not able to communicate directly, then...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Evaluation of Performance Characteristics of Polynomial Based and Lattice Based NRTU Cryptosystem

    In order to achieve the security for the e-business application, generally, the organizations follow the cryptographic methods. The two widely accepted and used cryptographic methods are symmetric and asymmetric. The DES ideally belongs to the category of symmetric key cryptosystem and RSA, NTRU belongs to the category of asymmetric key...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    A Secure Account-Based Mobile Payment Protocol With Public Key Cryptography

    The way people do the business and transactions are changing drastically with the advent of information technology. The customer wants to access information, goods and services any time and in any place on his mobile device. Receiving financial data, trade on stock exchanges, accessing balances, paying bills and transfer funds...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    On-Line Fault Diagnosis of Arbitrary Connected Networks

    In this paper, the authors propose an on-line two phase fault diagnosis algorithm for arbitrary connected networks. The algorithm addresses a realistic fault model considering crash and value faults in the nodes. Fault diagnosis is achieved by comparing the heartbeat message generated by neighboring nodes and dissemination of decision made...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2011

    A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

    Fingerprint Identification is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Communication by Whispers Paradigm for Short Range Communication in Cognitive Radio Networks Using Interference Based MAC Sensing for Opportunity Discovery

    With ever increasing demand for efficiency and increased throughput over the wireless domain, the authors have now reached a point where in a method for efficient utilization of the electromagnetic spectrum is in demand. Cognitive radio provides one with a way in which this demand could be catered, it does...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Modified EPC Global Network Architecture of Internet of Things for High Load RFID Systems

    This paper proposes a flexible and novel architecture of Internet Of Things (IOT) in a high density and mobility environment. The authors' proposed architecture solves the problem of over-loading on the network by monitoring the total number of changed objects changing global location crossing the fringe boundaries rather than the...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Context-Aware Intrusion Detection and Tolerance in MANETs

    Mobile Ad-hoc NETwork (MANET) is a decentralized network where each node will forward the data to other nodes. The major challenge in handling security in MANETs is that the network is not constant and thereby it is difficult to set a constant algorithm for detecting the intrusion. In this work,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Clouds Using the Concept of Application Metadata

    Cloud computing is an emerging computing paradigm. It aims to share data, resources and services transparently among users of a massive grid. Although the industry has started selling cloud-computing products, research challenges in various areas, such as architectural design, task decomposition, task distribution, load distribution, load scheduling, task coordination, etc....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    FTTCP: Fault Tolerant Two-Level Clustering Protocol for WSN

    In this paper, the authors propose an agreement-based fault detection and recovery protocol for Cluster Head (CH) in Wireless Sensor Networks (WSNs) of two level cluster hierarchy. The aim of protocol is to accurately detect CH failure to avoid unnecessary energy consumption caused by a mistaken detection process. For this,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks

    A collision-free centralized scheduling algorithm for IEEE 802.16 WiMAX provides a mechanism for creations multi-hop mesh and high-quality wireless multimedia services which can be developed as a high speed broad band wireless network. In centralized scheduling for IEEE 802.16 mesh networks, all packets should be transported through the BS (Base...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Communication by Whispers Paradigm for Short Range Communication in Cognitive Radio Networks Using Interference Based MAC Sensing for Opportunity Discovery

    With ever increasing demand for efficiency and increased throughput over the wireless domain, the authors have now reached a point where in a method for efficient utilization of the electromagnetic spectrum is in demand. Cognitive radio provides one with a way in which this demand could be catered, it does...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks

    The mobile network that supports network mobility is an emerging technology. It is also referred as NEMO (NEtwork MObility). It is more appropriate for mobile platforms such as car, bus, train, air plane, etc. It is a great challenge to provide Quality of Service (QoS) in NEMO. QoS is a...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Optimize Flooding in Wireless Mesh Cloud

    The Wireless Mesh Network (WMN) is an emerging multi hop, heterogeneous, scalable, low cost, with easy maintenance robust network providing reliable service coverage. The architecture of WMNs is a connectionless - oriented, and consists of mesh routers and mesh clients. In this architecture, static mesh routers form the wireless backbone,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2011

    A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

    Fingerprint Identification is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Enhancing Data Storage Security in Cloud Computing Through Steganography

    In cloud computing data storage is a significant issue because the entire data reside over a set of interconnected resource pools that enables the data to be accessed through virtual machines. It moves the application software's and databases to the large data centers where the management of data is actually...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Cloud Security and Data Integrity with Client Accountability Framework

    The cloud based services provide much efficient and seamless ways for data sharing across the cloud. The fact that the data owners no longer possess data makes it very difficult to assure data confidentiality and to enable secure data sharing in the cloud. Despite of all its advantages this will...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Priority based K-Erlang Distribution Method in Cloud Computing

    In this paper, the authors have proposed a priority based service time distribution method using Erlang Distribution for K-phases. The process of entering into the cloud is typically based on the priority of the service and form a queue. Each user needs to wait until the current user is being...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Trust Assessment Policy Manager in Cloud Computing - Cloud Service Provider's Perspective

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Reliability in compute cloud is an important aspect in Quality of Service (QoS) which needs to be addressed in order to foster the adoption of compute cloud. In today's integrated environment...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    A Fuzzy Algorithm for Mining High Utility Rare Itemsets - FHURI

    Classical frequent itemset mining identifies frequent itemsets in transaction databases using only frequency of item occurrences, without considering utility of items. In many real world situations, utility of itemsets are based upon user's perspective such as cost, profit or revenue and are of significant importance. Utility mining considers using utility...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Synchronization of the GPS Coordinates Between Mobile Device and Oracle Database System

    In this paper, the authors describe an architecture and implementation of module for acquiring a synchronization of GPS data between mobile device and central database system. The process of data exchange is inspired by SAMD algorithm. The paper sequentially presents a solution of individual system components. Special attention is paid...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Responsive Parameter Based an AntiWorm Approach to Prevent Wormhole Attack in Ad Hoc Networks

    The recent advancements in the wireless technology and their wide-spread deployment have made remarkable enhancements in efficiency in the corporate and industrial and military sectors The increasing popularity and usage of wireless technology is creating a need for more secure wireless ad hoc networks. This paper aims researched and developed...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Low Energy Routing for WSN's

    The main tasks of a Wireless Sensor Network (WSN) are data collection from its nodes and communication of this data to the Base Station (BS). The protocols used for communication among the WSN nodes and between the WSN and the BS, must consider the resource constraints of nodes, battery energy,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Permutation of Pixels within the Shares of Visual Cryptography using KBRP for Enhanced Security

    The security of authentication of internet based co-banking services should not be susceptible to high risks. The passwords are highly vulnerable to virus attacks due to the lack of high end embedding of security methods. In order for the passwords to be more secure, people are generally compelled to select...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile Computing

    In this paper, the authors attempt to base on auctions which present a frame work for the secure multi-party decision protocols. In addition to the implementations which are very light weighted, the main focus is on synchronizing security features for avoiding agreements manipulations and reducing the user traffic. Through this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Nov 2012

    Towards Practical Homomorphic Encryption With Efficient Public Key Generation

    With the advent of cloud computing several security and privacy challenges are put forth. To deal with many of these privacy issues, 'Processing the encrypted data' has been identified as a potential solution, which requires a Fully Homomorphic Encryption (FHE) scheme. After the breakthrough work of Craig gentry in devising...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Nov 2012

    ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) applications include target tracking in battle field and environmental monitoring etc. Sensor networks face many security challenges because of their inherent limitations in their energy, computation and communication capabilities. WSNs consist of sensor nodes that are capable of sensing the information and maintaining security. In this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Secure Trust Management Model for Peer-to-Peer File Sharing System

    In a Peer-To-Peer (P2P) file sharing system, peer communicates directly with each other to exchange information and share files. File sharing refers to the providing and receiving of file over the network, a central server that operates a centralized data repository search engine within a P2P network performs authentication and...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    An Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography

    At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Wireless Vision Based Real Time Object Tracking System Using Template Matching

    In the present work the concepts of template matching through Normalized Cross Correlation (NCC) has been used to implement a robust real time object tracking system. In this implementation a wireless surveillance pinhole camera has been used to grab the video frames from the non ideal environment. Once the object...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Mobility and Node Density Based Performance Analysis of AODV Protocol for Adhoc Network using ns-2

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes, which communicate over radio. These networks have an important advantage; they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a price: communication is...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    A Fault-tolerant Switch for Next Generation Computer Networks

    In this paper, the authors explain about the architecture of a multi-plane Parallel Deflection-Routed Circular Banyan (PDCB) network based switching fabric is introduced. The PDCB network has a cyclic, regular, self-routing, simple architecture and fairly good performance. Its Performance is improved due to reduction in blocking by two-dimensional path-multiplicity of...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    A Novel Approach for Detection of Routes With Misbehaving Nodes in MANETs

    Network nodes in Mobile Ad-hoc NETwork's (MANET's) are free to move randomly. Therefore, the network topology may change rapidly. Routing protocol for MANET's are used for delivery of data packets from source to the desired destination, routing protocols are also designed based on the assumption that all the participating nodes...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Cancellation of Zigbee Interference in OFDM Based WLAN for Multipath Channel

    Zigbee is one of the major sources of interference in 2.4GHz band for Wireless LANs (WLANs). It is seen whenever any Zigbee system is operating near to the WLAN system and transmitting signal at same frequency, time as of WLAN's, the later ones performance detoriate severely. So in this paper,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Design of an Ameliorated Methodology for the Abstraction of Usable Components of Object Oriented Paradigm from the Software Requirement Specification (SRS)

    The object oriented design requires that the view element required for the design is to be abstracted from the Software Requirement Specification (SRS). So it is required to transform the requirements into object oriented paradigm and then proceed for the development. The authors are intending in their ensued project, to...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Analysis of GPSR and Its Relevant Attacks in Wireless Sensor Networks

    Most of the routing protocols proposed for ad-hoc networks and sensor networks are not designed with security as a goal. Hence, many routing protocols are vulnerable to an attack by an adversary who can disrupt the network or harness valuable information from the network. Routing protocols for wireless sensor networks...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Performance Measures of Hierarchical Cellular Networks on Queuing Handoff Calls

    Hierarchical Cellular Networks (HCN) provides an enhanced use of the indoor networks. These two lower layers called picocell and femtocell consist both high and low speed users. To prevent the dropping and blocking probabilities of ongoing calls in a network, cells are spitted into the small sizes. Although, many effective...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Detection of suspected nodes in MANET

    Mobile Ad hoc NETwork (MANETs) is an emerging area with practical applications. One such field concerns MANET in which mobile nodes organize themselves in a network without the help of any predefined infrastructure. Securing MANETs is an important part of deploying and utilizing them, since them are often used in...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2012

    Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Networks

    In a Wireless Sensor Network (WSN) having a single sink, information is given to the distant nodes from beacons by overhearing. Since it is out of the communication range, information is not sent directly to the Static Sink (SS). If a distant node is not able to communicate directly, then...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Optimization of Quality of Service in 4G Wireless Networks

    4G radio access technologies should be able to provide different types of IP services. These services rang from narrow-band to broadband, from non-real-time to real-time, and from unicast to multicast broadcast applications. When the need arises for different levels of user mobility the access systems are required with advanced capabilities...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Adaptive Handoff Initiation Scheme in Heterogeneous Network

    In wireless heterogeneous network, nodes are mobile equipment and can move freely from one area to another. A group of users with a large range of mobility can access around in the overall network cause high traffic. In these heterogeneous networks, resources are shared among all users and the amount...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Handover Behaviour of Transparent Relay in WiMAX Networks

    The knowledge on handover behavior in WiMAX network is essential for network management and planning in order to achieve optimum system throughput. In this paper, the authors have analyzed the handover behavior of transparent relay in several configurations for the IEEE 802.16j Mobile Multihop Relay (MMR) WiMAX network. The simulation...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Experimental Framework for Mobility Anchor Point Selection Scheme in Hierarchical Mobile IPv6

    Hierarchical Mobile IPv6 (HMIPv6) was designed to support IP micro-mobility management in the next generation Internet Protocol v6 (IPv6) and the Next Generation Networks (NGN) framework. The general idea behind this protocol is the usage of Mobility Anchor Point (MAP) located at any level router of network to support hierarchical...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), data fusion should be energy efficient. But, determining the optimal number of aggregators in an energy efficient manner is a challenging task. Moreover, the existing data fusion techniques mostly use the same path for transmitting aggregated data to the sink which reduces the nodes lifetime....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Apr 2012

    Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol

    With the widespread use of wireless networks, securing data transmission becomes a basic requirement. The IEEE 802.11 standard which defines wireless networks communication, has proposed in its second version, IEEE 802.11b, a new protocol to offer some wired-like security services, such as: data privacy, data integrity, and authentication. In this...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Oct 2012

    A Probabilistic Approach Towards the Prevention of Error Propagation Effect of AES and Realization Thereof

    Error propagation effect of Advanced Encryption Standard (AES) is a great research challenge. AES suffers from a major limitation of error propagation effect. In literature, several studies have been made on this issue and several techniques are suggested to tackle the effect. To tackle this limitation, two methods are available....

    Provided By Association of Computer Electronics and Electrical Engineers