MIT Publications

Displaying 1-16 of 16 results

  • White Papers // Jan 2013

    Use of Artificial Neural Network in the Field of Security

    Today, building a secure channel is one of the most challenging areas of research and development in modern communication. Cryptography enables the two parties to communicate over an insecure channel so that an attacker cannot understand and decrypt the original message. Public key cryptography is available in many forms but...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Authentication and Key Management in Wireless Mesh Network

    A wireless mesh network is a new and emerging wireless technology and it also becomes a popular choice for internet service providers as it allows a fast, easy and inexpensive network deployment. Wireless mesh network does not rely on any fixed infrastructure as most of the wireless networks do. Before...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99

    Security is one of most important issue in network management and detection of intrusion based security attacks play vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Identification of most astute...

    Provided By MIT Publications

  • White Papers // Aug 2012

    A Review of Security Issues in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a multi-hop network, self-organizing, infrastructure less. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this wireless and distributed nature of MANETs poses a number of challenges to system security designers...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Secure Cloud Computing Through IT Auditing

    Cloud computing is an advanced technology that provides resources over the Internet and they act as extremely informative services to those who use the service. In this paper, the authors discuss the origin of cloud computing and framework for providing secure cloud computing through IT auditing. It involves checklists which...

    Provided By MIT Publications

  • White Papers // May 2012

    Interrupt Based Switching for Multi-Cluster FlexRay Systems

    This paper deals with a new straightforward approach to significantly increase the bandwidth usage in FlexRay networks. The authors propose a new hardware component, termed FlexWay that facilitates partitioning the network into multiple clusters. This component provides a switching service that enables the execution of synchronous communications inside each cluster....

    Provided By MIT Publications

  • White Papers // Jan 2012

    Challenges in Integrated WIMAX-WIMESH Network Security

    The term WIMAX refers to Worldwide Interoperability for Microwave AXcess. It is also known as IEEE 802.16 protocol. The term WIMESH is an abbreviation for Wireless Mesh. It is also known as IEEE 802.11s protocol. WIMAX and WIMESH have emerged as promising broadband access solutions for the latest generation of...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Performance Analysis of Routing Protocol in Mobile Ad Hoc Network Using NS-2

    The MANET routing protocols DSDV, DSR and AODV are the most promising routing protocols. The people can be used in MANET to route packets between mobile nodes. The main objective of this paper comparing the performance of DSDV, DSR and AODV routing protocols under different performance metrics like Throughput, Packet...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Impact of Security and Quality Attributes of 3-G Based M-Commerce Systems Based on B2C Operation

    A year ago, everyone was talking about the great opportunities for 3G, and accessing the Internet from one's mobile terminal. Today 3-G network has grown up. Mobile-commerce (m-commerce) systems have been developed at a significant rate in recent years. M-commerce can be viewed as a subset of e-commerce and refers...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Preemptive Multipath - Adhoc on Demand Distance Vector Routing Protocol

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The topology of ad-hoc networks changes rapidly. The Ad hoc On Demand Distance Vector (AODV) routing protocol and other on demand routing protocols suffers with...

    Provided By MIT Publications

  • White Papers // Jan 2011

    E-Security Problems, Policies for Networked Information Systems

    With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organizations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Optimize Handover and Channel Allocation Procedure in Communication Network

    Wireless communication is reveling its fastest growth period in history, due to enabling technologies which allow extensive deployment. Handover is a critical feature in cellular systems and therefore handover algorithms are under extensive research. A handover priority queuing method, which can be used to show rapid handovers with a smaller...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power High Gain CMOS LNA for WLAN and ISM Band Applications

    There is rapid development in the field of wireless communication which makes demand for low-cost, high-performance and high-integration technology. System On a Chip (SOC) implementation is also one of the key areas of development these days. The wide acceptance of wireless products is due to the advancement of device technology,...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Design of a Broadband CPW-Fed Monopole Antenna for WLAN Operations

    In this paper, a novel broadband design of a Co-Planar Waveguide (CPW)-fed planar monopole antenna with double plus shape slots is proposed. The design considerations for achieving broadband operation of the proposed plus sign slot antenna are discussed, and theoretical results are presented. The antenna operates in single wide frequency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power PH Sensor for Wireless Sensor Network Node Agricultural Application

    A Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The measurement of soil pH is arguably the most widely performed test in the chemical laboratory, the use of pH sensitive Field-Effect Transistors (pHFETS) is proposed for remote monitoring of...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Mitigation of Non-Linear Distortion Using PTS With Minimal Control Synthesis Method in OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is a strong candidate for future wireless communication because it is marked by its higher frequency multiplicity and greater immunity to multipath fading. However, the main drawback of OFDM is its high amplitude fluctuations measured by Peak-to-Average Power ratio (PAPR), which leads to power inefficiency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Performance Analysis of Routing Protocol in Mobile Ad Hoc Network Using NS-2

    The MANET routing protocols DSDV, DSR and AODV are the most promising routing protocols. The people can be used in MANET to route packets between mobile nodes. The main objective of this paper comparing the performance of DSDV, DSR and AODV routing protocols under different performance metrics like Throughput, Packet...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Impact of Security and Quality Attributes of 3-G Based M-Commerce Systems Based on B2C Operation

    A year ago, everyone was talking about the great opportunities for 3G, and accessing the Internet from one's mobile terminal. Today 3-G network has grown up. Mobile-commerce (m-commerce) systems have been developed at a significant rate in recent years. M-commerce can be viewed as a subset of e-commerce and refers...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Preemptive Multipath - Adhoc on Demand Distance Vector Routing Protocol

    A Mobile Ad hoc NETwork (MANET) consists of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The topology of ad-hoc networks changes rapidly. The Ad hoc On Demand Distance Vector (AODV) routing protocol and other on demand routing protocols suffers with...

    Provided By MIT Publications

  • White Papers // Jan 2011

    E-Security Problems, Policies for Networked Information Systems

    With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organizations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Optimize Handover and Channel Allocation Procedure in Communication Network

    Wireless communication is reveling its fastest growth period in history, due to enabling technologies which allow extensive deployment. Handover is a critical feature in cellular systems and therefore handover algorithms are under extensive research. A handover priority queuing method, which can be used to show rapid handovers with a smaller...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power High Gain CMOS LNA for WLAN and ISM Band Applications

    There is rapid development in the field of wireless communication which makes demand for low-cost, high-performance and high-integration technology. System On a Chip (SOC) implementation is also one of the key areas of development these days. The wide acceptance of wireless products is due to the advancement of device technology,...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Design of a Broadband CPW-Fed Monopole Antenna for WLAN Operations

    In this paper, a novel broadband design of a Co-Planar Waveguide (CPW)-fed planar monopole antenna with double plus shape slots is proposed. The design considerations for achieving broadband operation of the proposed plus sign slot antenna are discussed, and theoretical results are presented. The antenna operates in single wide frequency...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Low Power PH Sensor for Wireless Sensor Network Node Agricultural Application

    A Wireless Sensor Networks (WSN) is now widely used in precision agriculture applications. Sensors play an important role in WSN. The measurement of soil pH is arguably the most widely performed test in the chemical laboratory, the use of pH sensitive Field-Effect Transistors (pHFETS) is proposed for remote monitoring of...

    Provided By MIT Publications

  • White Papers // Jan 2011

    Mitigation of Non-Linear Distortion Using PTS With Minimal Control Synthesis Method in OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is a strong candidate for future wireless communication because it is marked by its higher frequency multiplicity and greater immunity to multipath fading. However, the main drawback of OFDM is its high amplitude fluctuations measured by Peak-to-Average Power ratio (PAPR), which leads to power inefficiency...

    Provided By MIT Publications

  • White Papers // May 2012

    Interrupt Based Switching for Multi-Cluster FlexRay Systems

    This paper deals with a new straightforward approach to significantly increase the bandwidth usage in FlexRay networks. The authors propose a new hardware component, termed FlexWay that facilitates partitioning the network into multiple clusters. This component provides a switching service that enables the execution of synchronous communications inside each cluster....

    Provided By MIT Publications

  • White Papers // Jan 2012

    Challenges in Integrated WIMAX-WIMESH Network Security

    The term WIMAX refers to Worldwide Interoperability for Microwave AXcess. It is also known as IEEE 802.16 protocol. The term WIMESH is an abbreviation for Wireless Mesh. It is also known as IEEE 802.11s protocol. WIMAX and WIMESH have emerged as promising broadband access solutions for the latest generation of...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Authentication and Key Management in Wireless Mesh Network

    A wireless mesh network is a new and emerging wireless technology and it also becomes a popular choice for internet service providers as it allows a fast, easy and inexpensive network deployment. Wireless mesh network does not rely on any fixed infrastructure as most of the wireless networks do. Before...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99

    Security is one of most important issue in network management and detection of intrusion based security attacks play vital role in it. To have a holistic picture of the network intrusion detection, selection of appropriate feature is very important; it reduces analysis effort and time too. Identification of most astute...

    Provided By MIT Publications

  • White Papers // Jan 2013

    Use of Artificial Neural Network in the Field of Security

    Today, building a secure channel is one of the most challenging areas of research and development in modern communication. Cryptography enables the two parties to communicate over an insecure channel so that an attacker cannot understand and decrypt the original message. Public key cryptography is available in many forms but...

    Provided By MIT Publications

  • White Papers // Aug 2012

    A Review of Security Issues in Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a multi-hop network, self-organizing, infrastructure less. Due to the absence of any fixed infrastructure, it becomes difficult to make use of the existing routing techniques for network services, and this wireless and distributed nature of MANETs poses a number of challenges to system security designers...

    Provided By MIT Publications

  • White Papers // Aug 2012

    Secure Cloud Computing Through IT Auditing

    Cloud computing is an advanced technology that provides resources over the Internet and they act as extremely informative services to those who use the service. In this paper, the authors discuss the origin of cloud computing and framework for providing secure cloud computing through IT auditing. It involves checklists which...

    Provided By MIT Publications