Volume 5 Issue 8- August 2015

 

Page Title Full Text
295-296 Reducing the Impact of DDoS Attack using Rate Limit Algorithm
Sandeep Shinde , Dr. J. W. Bakal
Abstract

Mobile ad-hoc network is collection node which is interconnecting through wireless network. In node in mobile ad-hoc network move randomly in any direction, which self-configured and does not have backbone network. There is lot of security issue in mobile ad-hoc network due to the open nature of network or it support dynamic topology. There are many security threads in mobile ad-hoc network, DDoS is one of them. Distributed denial service attack which is major thread in mobile network. This attack consumes various resources of network due to that network not able to provide service to its authorized user or it will reduce the performance of network.
In this paper we introduce rate limiting algorithm for control DDoS attack which control the bandwidth while in DDoS attack.

Index Term- MANET, DDoS, Network bandwidth

Full Text PDF
297-300 A New Framework for Group Signature Based Upon PAVD Security System
Rakesh Kumar
Abstract

This paper has focus on group based PAVD security system. The three security issues of Privacy, Authentication, and verification of data. The PAVD system use of two different servers’ via. (1) Encryption server (2) storage server. The group signature procedure can be define as the signing scheme planned for groups which benefits by giving power of the member in the team or group to sign instead of his team. In the group signature process the group manger forms the foundation not only because he managers the teams but also for the reason that he is the one who can reveal the identity of anonymized signer. In this paper a method for identity anonymization and secure data with PAVD security system with respect to uploading and downloading time using GDS (Group Digital Signature) is proposed and implemented.

Keywords: PAVD, Cloud Computing, Stakeholders, Security Problem, Data Secrecy, SHA, Group Based Signature, CSP, AES .

Full Text PDF
301-303 Traceback Mechanism for DDoS Attacks Using Local Flow Monitoring in MANET
Sandeep Shinde , Dr. J. W. Bakal
Abstract

Mobile ad-hoc network is integration of node which is scatterd around the network. Every node in mobile ad-hoc netowk is configured by own, it also decentralized and less secure.  Due to mobability properties of mobile ad-hoc network every node in mobile network move around the network. The DDOS attack is the major security in the mobile ad-hoc network. The DDOS attack it generate huge unwanted traffic so that authorized user not able to access service or resource efficiently.  In this paper, we introduce new technique local flow monitoring system based on entropy variable for detecting DDoS attack .

Index Term- MANET, DDoS, Network traffic

Full Text PDF
304-308 A Comparative Analysis of Design Issues of Evolutionary Structures
Kunjal Bharatkumar Mankad
Abstract

Evolutionary computing is ubiquitous in nature. Adaptive nature and evolutionary search capabilities of evolutionary structures produce a more efficient exploration of the state space of possible solutions. Evolutionary computing provides four major structures namely evolutionary programming, genetic programming, genetic algorithm and evolutionary strategy. The uniqueness of evolutionary structure is that they are capable to provide solutions for highly complex mathematical problems very efficiently. The paper explains differences between traditional search and optimization algorithm and evolutionary algorithm along with advantages of evolutionary computing. Evolutionary life cycle and procedural characteristics of each structure are discussed in details. Structural parameters of evolutionary methods such as chromosomal representation, encoding, selection, crossover and mutation are narrated comparatively.The paper concludes by showing justification of design issues of evolutionary structures.

Keywords: Evolutionary Algorithm, Evolutionary Computing, Evolutionary Programming, Evolutionary Strategy, Genetic Algorithm, Genetic Programming.


Full Text PDF
309-311 Implementing the ToF Transformations for Workflows in the Multiple Cloud Environments
N.Navatha Kumari, Dr. A.P.Siva Kumar
Abstract

Due to the wide range use of cloud computing services (SaaS, IaaS and PaaS) in real life utility apps, the performance and monetary cost optimization techniques were leads to open a new research area in cloud computing. In general, the process workloads, cloud offering and user expectations are different from workflow to workflow. In this case, the existing ad-hoc resource optimization techniques were failed to identify the reliable optimization values. To overcome this problem, in this paper it introduced a ToF transformation technology to optimize the workflows in multiple clouds. This approach will consider each workflow as a DAG and executes in a separate thread to determine the possible optimizations with each individual configuration. Experimental result are showing that our approach is assessing the possible optimize values for each dynamic configuration.

Keywords: Cloud Computing, Resource Optimization, DAG's, workflow



Full Text PDF
312-315 Energy Based Cluster Head Selection Algorithm in MANET
Dr.M.Bala Murugan, Kavi Priya.C
Abstract

Clustering is one of the important methods for prolonging the network lifetime in Mobile AD Hoc Networks. Clustering scheme is used here where cluster head node will play the role of transmitting packet from one cluster to the other. It involves grouping of nodes into clusters and electing cluster heads (CHs) for all the clusters. CH’S collect the data from particular cluster’s nodes and forward the aggregated data to main node. A main challenge in MANET is to select appropriate cluster heads. MANET is self created and self organized by a collection of mobile nodes various mobile ad hoc network consists of devices with various characteristics in terms of transmission power, energy, and capacity. The Proposed system is when the new node is entered the cluster in sometimes the new node will be the cluster head. Because the head node can communicate to gateway in every transmission at the time cluster head energy level is decrease. When the cluster head reached in minimum energy level doesn’t to transmit the packets so the new node will become a cluster head. Because the new node have a maximum level of energy. So the proposed algorithm is increased the throughput that is better than the existing algorithm.

Keywords-MANET, Clustering, CBRP.



Full Text PDF
316-320 Maximizing the Network Lifetime using Energy Power Aware Routing Protocol
P.Ezhilarasi,M.Lalli
Abstract

This thesis is to study of MANET consumed by the energy level performance maximizing the network life time of communication networks. We know that MANET is self-configuring network and does not have any infrastructure.The mobile devices connected without wires and to form a various routing path over the communication.The mobile devices operated in energy.so, the energy lifetime of node is very important for MANET.The energy consumption problem is one of the major issue for MANET.In this research to analyzed three routing protocols (DSR,MTPR, and EPAR) performed in energy of power consumption.DSR works as to select the shortest path.The intermediate route address along with source to destination decreasing the throuput.Then it does not support Multicasting.The MTPR isto select the minimum transmission power routing protocol.This approach used for simple energy metric,along with the route of total energy forward the information.It reduced the overall transmission power consumed per packet.This two routing protocols DSR,MTPR not scalable for large networks.Then to increase the mean delay,lack of connectivity,packet loss are the problems of protocols.We propose that a new power aware routing protocolEPAR.It increasing the network lifetime selected the path that largest packet capacity in the smallest residual packet transmission capacity.EPAR handled the high mobility of nodes in network topology.In this paper to analyzed the performance of energy consumption problem for three routing protocols(DSR,MTPR,EPAR).The important objective of EPAR is the remaining energies of all the nodes and prolong the network lifetime.To increasing the network lifetime and to reached the high packet delivery ratio.In high load networks reduced the total energy consumption and decreasing the mean delay.Then to achieving a good packet delivery ratio.

Key Words: Wireless network, MANET DSR, MTPR, EPAR, Energy Consumption.



Full Text PDF

 

 

 

 

 

IJCSET Menu

Downloads