1) IRAJ is moving to next issue from 16th April 2015.
2) IRAJ Management has issued a thank you note to all the editors for their constant endeavours for enhancement for IRAJ.
3) Chief editor of IRAJ has achieved UGC Net qualification.
|VOLUME 13, ISSUE 1, 1 April, 2017 To 30 June, 2017|
|VOLUME 12, ISSUE 1, 1 January, 2017 To 31 March, 2017|
|VOLUME 11, ISSUE 1, 16 October, 2016 To 31 December, 2016|
|VOLUME 9, ISSUE 1, 15 April, 2016 To 14 June, 2016|
|VOLUME 8, ISSUE 1, 15 January, 2016 To 14 April, 2016|
|VOLUME 7, ISSUE 1, 15 October, 2015 To 14 January, 2016|
|VOLUME 6, ISSUE 1, 15 July, 2015 To 14 October, 2015|
|VOLUME 5, ISSUE 1, 16 April, 2015 To 15 July, 2015|
|VOLUME 4, ISSUE 1, 16 January, 2015 To 15 April, 2015|
|VOLUME 2, ISSUE 1, 16 August, 2014 To 15 November, 2014|
|VOLUME 1, ISSUE 1, 15 June, 2014 To 15 August, 2014|
RESEARCH on security of MANETs remains active, in spite of years of exploration, in both academia and industry. It is partially due to the fact that no mature solution is widely accepted and the growing availability of small, personalized mobile devices with peer to peer communication capability through wireless channels. The characteristics of Mobile Ad-hoc Network (MANET) such as node mobility, dynamic infrastructure, unreliable multi-hop communication channel, resource limitation and physical vulnerability, securing MANET has made more challenging. This work proposes to further enhance the work done by Elhadi et al , who have suggested using MRA (Malicious Report Authentication) and digital signature to provide the details of false alerts generated by malicious nodes and key authentication before communication. This work uses CTS and RTS signals to exchange the key and symmetric cipher algorithm to encrypt and decrypt the data. Proposed implementation shall be tested with DSDV routing protocol which can be further enhanced and tested on other routing protocols.
Security over cloud has been a great challenge from infancy of the cloud and it is still to be researched further with the enhancement of the technology the challenge is also deepen. Layered architecture has increased convenience for researchers in incorporating the security algorithms over the cloud. Challenges such as security, authentication and access control requires to tackle them with different attacks such as fishing, DOS, non-repudiation etc. Various researchers have made different algorithms and mechanisms to handle security issues over the cloud in past. In this work handling of access control has been focused to increase the availability of the resources to the specific users only adding to the security. The major problem found over cloud is security of the data stored over the cloud and as the trust mechanism is being applied for the Cloud security, storing access control details on the separate server helps in protecting the data and access rules. Porting access control on a different trust server can reduce the issue to a great extent.
In the Wireless Sensor Network (WSN) we used hundreds of sensor node. In wireless sensor network it is important to maintain data aggregation, reliable information delivery with security and integrity for efficient and effective communication between these sensor nodes. Accurate and concise information should deliver to the base station to reduce communication energy which helps to increase the network lifetime. Energy in the sensors is limited and it cannot be replaced. An inefficient use of the available energy of nodes leads to unreliable performance and short life cycle of the wireless sensor network. Our main aim is to design energy efficient routing protocols for wireless sensor network using multi-hop and clustering.
The characteristics of Mobile Ad-hoc NETwork (MANET) such as node mobility, dynamic infrastructure, unreliable multi-hop communication channel, resource limitation and physical vulnerability, securing MANET has made more challenging. Research on security of MANETs remains active, in spite of years of exploration, in both education sector and industry. It is partially due to the fact that no mature solution is widely accepted and the growing availability of small, personalized mobile devices with peer to peer communication capability through wireless channels. Since key distribution schemes apply additional loads on the existing network, therefore it is being proposed to apply a new key distribution technique which will not only apply less load on the existing network, but will also use network efficiently and in secured manner. For testing of the proposed scheme, NS-2 protocol shall be used which will be modified for DSDV protocol for testing. Packet Delivery Ratio (PDR), Throughput, End-to-End Delay (ETOE) and Energy Consumption (EC) shall be evaluated for measuring the efficiency of the network.
Confidentiality of huge data for users of the system requires getting collaborative access in data mining. This mechanism of the complete system is then termed as Collaborative Data Mining and Privacy Preserving. Along with the several advantages the application of privacy preserving of data in collaborative environment also faces the problem of slow performance and lower accuracy. It also faces the problem of the security and needs to tackle the same as the data of the users is very crucial. This work provides high performance measures and accuracy based system for collaborative privacy preserving data mining using the characteristics of the data.