Best Online Journal of Computer Science and Technology - IRA-JOURNAL

International Research & Analysis Journal facebook twitter youtube

IRAJ VOLUMES

IRAJ Volume 13 Issue 1, 2017-04-01 To 2017-06-30

  • pages (304-312)

    Reads (30)

    Topic Name: Table based Routing Updates For Source Routing with High Performance

    Author (s) : Shivani Goyal, Prof. Ajay Lala

    Keywords : Wireless Networks, Secured Routing, DSDV, Packet Delivery Ratio, Security, Key Distribution


    Quick abstract

    RESEARCH on security of MANETs remains active, in spite of years of exploration, in both academia and industry. It is partially due to the fact that no mature solution is widely accepted and the growing availability of small, personalized mobile devices with peer to peer communication capability through wireless channels. The characteristics of Mobile Ad-hoc Network (MANET) such as node mobility, dynamic infrastructure, unreliable multi-hop communication channel, resource limitation and physical vulnerability, securing MANET has made more challenging. This work proposes to further enhance the work done by Elhadi et al [1], who have suggested using MRA (Malicious Report Authentication) and digital signature to provide the details of false alerts generated by malicious nodes and key authentication before communication. This work uses CTS and RTS signals to exchange the key and symmetric cipher algorithm to encrypt and decrypt the data. Proposed implementation shall be tested with DSDV routing protocol which can be further enhanced and tested on other routing protocols.


  • pages (313-321)

    Reads (25)

    Topic Name: Hierarchical Access Control & Authentication using Trust Server based Security for Cloud

    Author (s) : Shabista Shaheen, Prof. Nagendra Kumar

    Keywords : Cloud Computing, Access Control, Authentication, Cloud Security, ABS,


    Quick abstract

    Security over cloud has been a great challenge from infancy of the cloud and it is still to be researched further with the enhancement of the technology the challenge is also deepen. Layered architecture has increased convenience for researchers in incorporating the security algorithms over the cloud. Challenges such as security, authentication and access control requires to tackle them with different attacks such as fishing, DOS, non-repudiation etc. Various researchers have made different algorithms and mechanisms to handle security issues over the cloud in past. In this work handling of access control has been focused to increase the availability of the resources to the specific users only adding to the security. The major problem found over cloud is security of the data stored over the cloud and as the trust mechanism is being applied for the Cloud security, storing access control details on the separate server helps in protecting the data and access rules. Porting access control on a different trust server can reduce the issue to a great extent.


  • pages (322-328)

    Reads (8)

    Topic Name: A clustering approach for Sensor Node Energy Conservation of Wireless Sensor Network

    Author (s) : Divya Jain, Prof.Nagendra Kumar

    Keywords : WSN, Design factors, Heterogeneous nodes, multi-hop routing.


    Quick abstract

    In the Wireless Sensor Network (WSN) we used hundreds of sensor node. In wireless sensor network it is important to maintain data aggregation, reliable information delivery with security and integrity for efficient and effective communication between these sensor nodes. Accurate and concise information should deliver to the base station to reduce communication energy which helps to increase the network lifetime. Energy in the sensors is limited and it cannot be replaced. An inefficient use of the available energy of nodes leads to unreliable performance and short life cycle of the wireless sensor network. Our main aim is to design energy efficient routing protocols for wireless sensor network using multi-hop and clustering.


  • pages (329-337)

    Reads (5)

    Topic Name: Key Based Authentication over MANET with High Performance & Security

    Author (s) : Vasudha Rajpoot, Shikha Jat

    Keywords : Wireless Networks, Secured Routing, DSDV, Packet Delivery Ratio, Security, Key Distribution


    Quick abstract

    The characteristics of Mobile Ad-hoc NETwork (MANET) such as node mobility, dynamic infrastructure, unreliable multi-hop communication channel, resource limitation and physical vulnerability, securing MANET has made more challenging. Research on security of MANETs remains active, in spite of years of exploration, in both education sector and industry. It is partially due to the fact that no mature solution is widely accepted and the growing availability of small, personalized mobile devices with peer to peer communication capability through wireless channels. Since key distribution schemes apply additional loads on the existing network, therefore it is being proposed to apply a new key distribution technique which will not only apply less load on the existing network, but will also use network efficiently and in secured manner. For testing of the proposed scheme, NS-2 protocol shall be used which will be modified for DSDV protocol for testing. Packet Delivery Ratio (PDR), Throughput, End-to-End Delay (ETOE) and Energy Consumption (EC) shall be evaluated for measuring the efficiency of the network.


top