This document summarizes and evaluates techniques for identifying adversary attacks in wireless sensor networks. It begins by describing common types of attacks and issues with cryptographic identification methods. It then evaluates existing localization techniques like Received Signal Strength (RSS) and spatial correlation analysis. Specifically, it proposes the Generalized Model for Attack Detection (GMFAD) which uses Partitioning Around Medoids (PaM) clustering on RSS readings to detect multiple attackers. It also presents the Coherent Detection and Localization Model (CDAL-M) which integrates PaM with localization algorithms like RADAR and Bayesian networks to determine attacker locations. The document analyzes these techniques' effectiveness at detecting and localizing multiple adversary attackers in wireless sensor networks.
Security Technique and Congestion Avoidance in Mesh Network
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
The document proposes a new system called PhishDect and Mitigator to detect and mitigate phishing attacks using software-defined networking (SDN). It uses deep packet inspection techniques and a convolutional neural network (CNN) to classify phishing signatures. Traffic is directed through either a "store and forward" or "forward and inspect" mode. In store and forward mode, packets are stored and inspected before forwarding. In forward and inspect mode, packets are forwarded first and then a copy is inspected. The system aims to overcome limitations of existing phishing detection methods.
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...
MANET (Wireless Mobile Ad-hoc Network) is a technology which are used in society in daily life an
activities such as in traffic surveillance, in building construction or it’s application is used in battlefield also. In
MANET there is no control of any node here is no centralized controller that’s why each node has its own
routing capability. And each node act as device and its change its connection to other devices.
The main problem of today’s MANET is a security, because there is no any centralized controller. Our main aim
is that we protect them from DDOS attack in terms of flooding through messages, packet drop, end to end delay
and energy dropping etc. For that we are applying many techniques for saving energy of nodes and identifying
malicious node and types of DDOS attack and in this paper we are discussing this technique.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...IJNSA Journal
Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting activities such as exfiltration of data, theft of credentials, blocking of services and other nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets and this implies that the defensive suite either impersonates the requestor, or has access to the private cryptographic keysof the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly and no other entity has access to the content unless that content is provided to them. There are many new processes that require end-to-end encrypted communication, including distributed computing, endpoint architectures, and zero trust architectures and enterprise level security. In an end-to-end paradigm, the keys used for authentication, confidentiality, and integrity reside only with the endpoints. This paper examines a formulation that allows unbroken communication, while meeting the inspection and reporting requirements of a network defense. This work is part of a broader security architecture termed Enterprise Level Security (ELS)framework.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
The document proposes a new system called PhishDect and Mitigator to detect and mitigate phishing attacks using software-defined networking (SDN). It uses deep packet inspection techniques and a convolutional neural network (CNN) to classify phishing signatures. Traffic is directed through either a "store and forward" or "forward and inspect" mode. In store and forward mode, packets are stored and inspected before forwarding. In forward and inspect mode, packets are forwarded first and then a copy is inspected. The system aims to overcome limitations of existing phishing detection methods.
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
MANET (Wireless Mobile Ad-hoc Network) is a technology which are used in society in daily life an
activities such as in traffic surveillance, in building construction or it’s application is used in battlefield also. In
MANET there is no control of any node here is no centralized controller that’s why each node has its own
routing capability. And each node act as device and its change its connection to other devices.
The main problem of today’s MANET is a security, because there is no any centralized controller. Our main aim
is that we protect them from DDOS attack in terms of flooding through messages, packet drop, end to end delay
and energy dropping etc. For that we are applying many techniques for saving energy of nodes and identifying
malicious node and types of DDOS attack and in this paper we are discussing this technique.
This document summarizes an article about intrusion detection systems (IDS) for secure mobile ad hoc networks (MANETs). It discusses the distributed and cooperative architecture of IDS for MANETs, where each node runs an IDS agent to detect intrusions locally and cooperate with other nodes. It describes several IDS approaches for MANETs including the Watchdog technique to detect misbehaving nodes, the Pathrater technique to find routes without those nodes, and the CORE technique which uses a collaborative reputation system. The document concludes that considering these IDS techniques can help make MANETs more secure.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
Vehicular communications play a substantial role in providing safety transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. The purpose of this paper present a method based on a fixed key infrastructure for detection impersonation attack, in other words, Sybil attack, in the vehicular ad hoc network. This attack, puts a great impact on performance of the network. The proposed method, using an cryptography mechanism to detection Sybil attack. Finally, using Mat lab simulator the results of this approach are reviewed, This method it has low delay for detection Sybil attack, because most operations are done in Certification Authority, so this proposed schema is a efficient method for detection Sybil attack.
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
Nowadays Wireless local area networks (WLANs) are growing very rapidly. Due to the popularity of 802.11 networks, possibilities of various attacks to the wireless network have also increased. In this paper, a special type of attack De-Authentication/disassociation attack has been investigated. In a normal scenario, a wireless client or user sends a de-authentication frame when it wants to terminate the connection. These frames are in plain text and are not encrypted. These are not authenticated by the access point. Attackers take advantage of this, and spoof these packets and disable the communication between the connected client and access point. In this paper, an algorithm based on radio-tap header information is suggested to identify whether there is a De-Authentication attack on the client or not.
Detection of Rogue Access Point in WLAN using Hopfield Neural Network IJECEIAES
The serious issue in the field of wireless communication is the security and how an organization implements the steps against security breach. The major attack on any organization is Man in the Middle attack which is difficult to manage. This attack leads to number of unauthorized access points, called rogue access points which are not detected easily. In this paper, we proposed a Hopfield Neural Network approach for an automatic detection of these rogue access points in wireless networking. Here, we store the passwords of the authentic devices in the weight matrix format and match the patterns at the time of login. Simulation experiment shows that this method is more secure than the traditional one in WLAN.
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
This document discusses security threats and attacks in wireless ad hoc networks. It begins by introducing ad hoc networks and some of the challenges in providing security in these networks due to their dynamic nature and lack of centralized authority. It then categorizes attacks as either passive or active, with passive attacks including eavesdropping and traffic analysis, and active attacks including masquerading, replay attacks, message modification, and denial-of-service attacks. The document reviews several security requirements and proposes hashing techniques as a potential solution to help secure routing protocols against various attacks. Specifically, it suggests using hash functions and hash chains to authenticate routing information and detect unauthorized modifications. The goal is to develop an efficient security approach that addresses issues like authentication, integrity
Wireless Security Needs For Enterprisesshrutisreddy
This document discusses improving wireless security for enterprise/corporate users compared to home users. It analyzes security threats like encryption attacks and outlines techniques like WEP, WPA, and WPA2. The key points are:
1) Wireless networks are vulnerable to attacks using tools like AirSnort but techniques like WPA2 with AES encryption provide stronger security.
2) Corporate networks require robust security as they contain sensitive customer data, while basic techniques like WEP may suffice for home networks.
3) The document recommends home users enable security settings and use WPA-PSK encryption to protect their wireless networks.
Privacy & Security Aspects in Mobile NetworksDefCamp
This document summarizes a presentation on privacy and security aspects in mobile networks from 1G to 5G. It discusses how mobile network architectures and security have evolved with each generation, from basic access control and authentication in 2G to longer encryption keys, mutual authentication, and new key hierarchies in 4G and 5G. It provides examples of past attacks on mobile networks and how they have become easier to carry out as tools have become more widely available. Specifically, it discusses how subscriber identification methods have changed from sending IMSI in cleartext in 2G to concealed SUPI in 5G. The presentation emphasizes that securing systems is difficult and that we must learn from past mistakes as new technologies are developed.
This document summarizes security issues in mobile ad hoc networks (MANETs). It discusses that MANETs rely on wireless communication, which is more vulnerable to security attacks than wired networks. Key characteristics of MANETs like lack of infrastructure, open connectivity, and dynamic topology make them susceptible targets. The document provides taxonomy of network attacks and analyzes attacks at different layers. It proposes solutions to address MANET security challenges according to criteria like availability, integrity, and confidentiality.
This document provides summaries of 7 IEEE papers from 2012 related to software projects in various domains such as Java, J2ME, J2EE, .NET, MATLAB and NS2. The papers discuss topics such as password security, data provenance, trust-aware routing in wireless sensor networks, content distribution via network coding, detecting insider threats, secure message passing interfaces, and the security of an anonymity system with traceability.
Modeling and experimental analysis of variable speed three phase squirrel 2IAEME Publication
This document summarizes a research paper that proposes a novel three-phase squirrel cage induction generator configuration called two-series-connected-and-one isolated (TSCAOI) that can generate single-phase electricity at constant frequency from variable rotor speeds without an intermediate converter. It presents the generator system, which uses a three-phase induction machine with one isolated winding for excitation and the other two windings connected in series as the power winding. An experimental analysis and mathematical model are also developed to accurately predict the generator's behavior.
Mr. Akshay Ratnakar Pawar has been working at Siddhivinayak Agency, an authorized Exide Care dealer, for the past 3 months. During this time, he has demonstrated excellent experience and skills in accounting. The letter certifies that Mr. Pawar handled accounting duties honestly and sincerely at the car shop.
Ansh Kamal Bhandari is seeking a job and provides his resume. He includes his contact information, date of birth, scholastic achievements including academic awards. He has experience with technical seminars and projects including a wall climbing robot seminar and engineering final year projects. He has work experience interning at BL Chains & Spares where he studied equipment and processes. He also lists social responsibilities and hobbies like sports and movies. He provides details of his software skills and languages known. Finally, he includes his educational qualifications starting from SSC through diploma and bachelor's degrees in mechanical engineering.
Google X is a secretive division of Google dedicated to developing major technological advancements. It is located in Mountain View, CA and oversees projects such as self-driving cars, solar-powered drones, Google Glass, smart contact lenses that monitor glucose levels, Project Loon which provides internet access via high-altitude balloons, and Project Tango smartphones that can map 3D environments. The life sciences division of Google X also conducts research on life sciences topics.
A comprehensive study of different image super resolution reconstruction algo...IAEME Publication
This document discusses various algorithms for super-resolution image reconstruction. It begins by introducing the topic and defining super-resolution as producing a high-resolution image from multiple low-resolution images. It then presents a mathematical model to describe the super-resolution problem and shows how existing single-image restoration algorithms like maximum likelihood (ML), maximum a posteriori (MAP), and projection onto convex sets (POCS) can be applied to the super-resolution problem. Finally, it proposes a hybrid algorithm combining POCS and ML to improve performance and ensure convergence for super-resolution image reconstruction.
Smart Fire Detection System using Image ProcessingIJSRD
Fire is greatest genuine interruption which prompts monetary and natural misfortunes. The determination of flame edges is the procedure of a distinguishing limit between the range where thermo-chemical response and those without. It is an ancestor to picture based fire observing, when fire discovery, fire assessment, and the determination of fire and fire parameters. A few conventional edge-discovery techniques have been tried to discover fire edges, yet the outcomes accomplished has baffling. Some examination works identified with fire and fire edge recognition were accounted for distinctive applications; then again, the systems don't underscore the progression and clarity of the fire and fire edges. In this manner, to conquer these issues, applicant fire locales are initially recognized utilizing a foundation model and shading model of flame. The proposed framework was effectively connected to different errands in true situations and successfully recognized fire from flame hued objects. Exploratory results will show that the proposed strategy beats different routines in both of flame target upgrade and foundation point of interest.
The document discusses the history and growth of internet usage worldwide. It notes that in 1995 less than 1% of the world's population had internet access, while today around 40% do. The number of internet users increased tenfold from 1999 to 2013. The first billion internet users was reached in 2005, the second billion in 2010, and the third billion in 2014. The project aims to continue expanding internet access to more parts of the world through the use of high-altitude balloons as part of Google's Project Loon.
Project Loon is a network of balloons travelling in the stratosphere and designed by Google to provide internet connectivity worldwide. The balloons float 20 km above the Earth's surface, where winds are steady at 5-20 mph, and each balloon can rise or descend to different wind layers to be steered in desired directions. The balloons are composed of polyethylene envelopes that are inflated to 15m x 12m sizes, solar panels that provide up to 100W of power, and electronic equipment boxes. Users on the ground connect to the balloon network using special antennas that bounce signals between balloons and then down to the global internet. Google aims to use this technology to connect the two-thirds of the world's population that currently
Your presentation will summarize a business plan for launching an Internet service using Google's Project Loon balloons. The proposed business model involves households subscribing to the Internet service. The primary targeted market is rural areas lacking traditional broadband infrastructure. Specifically, you will launch in a region of South America to test reliability and cost-effectiveness over varied terrain. Pricing will be competitive with other rural Internet options. Your analysis finds that Loon can exploit new markets and potentially capture shares in underserved areas. You will recommend leveraging Google's financial and technical resources to foster Loon's development and penetration of additional markets over time through continuous technological and service improvements.
Project Loon is a Google X project that aims to provide internet access to rural and remote areas using high-altitude balloons placed in the stratosphere. The balloons float in the stratosphere and are maneuvered to different wind layers to remain over desired locations. People in remote areas can connect to the balloon network using special antennas. The signal hops between balloons and then connects to the global internet via base stations. The technology is still in development but could help bring affordable internet access to more parts of the world.
Project Loon is a Google project that aims to provide internet access to rural and remote areas using high-altitude balloons placed in the stratosphere. The balloons create an aerial wireless network with speeds of up to 3G. They are manoeuvred by adjusting their altitude to float on wind currents identified using NOAA wind data. Users connect to the balloon network using a special antenna, and the signal travels between balloons and to ground stations connected to ISPs. If successful, this technology could provide internet access without expensive fiber cable infrastructure.
This document discusses micelles and critical micelle concentration (CMC). It defines micelles as aggregates of surfactant molecules that form in solution above the CMC. The CMC is the minimum concentration of surfactant needed for spontaneous micelle formation. Above the CMC, additional surfactant molecules do not affect properties but may change micelle size or shape. The document outlines factors that influence the CMC like temperature, electrolytes, and hydrocarbon chain length. Micelles can solubilize hydrophobic compounds in their cores and increase drug solubility. The formation of micelles allows modification of drug release profiles and improved drug stability.
Google's Project Loon aims to provide internet access to rural and remote areas using high-altitude balloons. Balloons float in the stratosphere, carrying communications equipment and solar panels. They are moved using winds at different altitudes to position them over desired locations. People on the ground connect to the balloon network using special antennas. Signals hop between balloons and back to the ground, providing internet speeds comparable to 3G. The balloons are designed to operate autonomously for months at a time in the stratosphere's harsh conditions.
Project Loon is a network of balloons traveling in the stratosphere designed to connect people in rural areas. An experimental pilot launched 30 balloons over New Zealand in 2013 to test the technology. The balloons float 20 miles above the Earth, using software to ride wind currents to positions that form a communications network. Each balloon provides internet coverage to an area of about 40 square kilometers using solar power and bouncing signals between balloons. The goal is to increase internet access for remote areas around the world.
Project Loon is Google's initiative to provide internet access to rural and remote areas using high-altitude balloons. The balloons float in the stratosphere and work together to connect people on the ground. In 2013, Google launched a pilot test involving 30 balloons over New Zealand that successfully provided internet access to 50 test users. Project Loon aims to continue expanding its pilot program to create continuous connectivity around the 40th parallel south latitude using balloons and renewable energy sources.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
This document summarizes an article from the International Journal of Computer Engineering and Technology about enhancing power-aware hybrid intrusion detection architecture in an ad-hoc network using mobile agents. It discusses designing and implementing an energy-efficient anomaly-based cooperative intrusion detection system that applies mobile agent technology to minimize network load, conserve bandwidth, and improve reactivity. It also aims to minimize energy consumption of monitoring nodes using the Back-Propagation algorithm. The paper then presents a new approach to intrusion detection system architecture in ad-hoc networks using mobile agents to determine which network events need monitoring and where.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
This document summarizes a research paper that proposes techniques to detect and localize multiple spoofing attackers in wireless networks using received signal strength (RSS). It begins by introducing the problem of spoofing attacks and outlines three goals: detecting attacks, determining the number of attackers, and localizing multiple adversaries. It then reviews related work on secure routing protocols and key management schemes. An overview of the proposed techniques is provided, including a generalized attack detection model, determining the number of attackers as a multiclass detection problem, and an integrated detection and localization framework (IDOL). Several localization algorithms are also summarized. Experimental results showed the proposed methods can achieve over 90% accuracy in determining the number of attackers.
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
A method and a system for the detection of an intrusion in a computer network compare the network traffic of the computer network at multiple different points in the network. In an uncompromised network the network traffic monitored at these two different points in the network should be identical. A network intrusion detection system is mostly place at strategic points in a network, so that it can monitor the traffic traveling to or from different devices on that network. The existing Software Defined Network SDN proposes the separation of forward and control planes by introducing a new independent plane called network controller. Machine learning is an artificial intelligence approach that focuses on acquiring knowledge from raw data and, based at least in part on the identified flow, selectively causing the packet, or a packet descriptor associated with the packet. The performance is evaluated using the network analysis metrics such as key generation delay, key sharing delay and the hash code generation time for both SDN and the proposed machine learning SDN. Prof P. Damodharan | K. Veena | Dr N. Suguna "Optimized Intrusion Detection System using Deep Learning Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21447.pdf
Paper URL: https://www.ijtsrd.com/engineering/other/21447/optimized-intrusion-detection-system-using-deep-learning-algorithm/prof-p-damodharan
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
Abstract: Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, as the basis for (1) detecting spoofing attacks; (2) determining the number of attackers when multiple adversaries masquerading as a same node identity; and (3) localizing multiple adversaries. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. We then formulate the problem of determining the number of attackers as a multi-class detection problem. Cluster-based mechanisms are developed to determine the number of attackers. When the training data is available, we explore using Support Vector Machines (SVM) method to further improve the accuracy of determining the number of attackers. In addition, we developed an integrated detection and localization system that can localize the positions of multiple attackers. We evaluated our techniques through two testbeds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Our experimental results show that our proposed methods can achieve over 90% Hit Rate and Precision when determining the number of attackers. Our localization results using a representative set of algorithms provide strong evidence of high accuracy of localizing multiple adversaries.
Keywords: Wifi, Spoofing, Wireless, RSS, MAX, WEP, WPA, ISP
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
IRJET- Detection of Spoofing and Jamming Attacks in Wireless Smart Grid Netwo...IRJET Journal
This document discusses detecting spoofing and jamming attacks in wireless smart grid networks using RSS (Received Signal Strength) algorithms. It proposes a traffic analysis method using RSS to infer contextual information from jamming and spoofing attacks. The method relies only on packet transmission times and eavesdropper locations. It is intended as a baseline for evaluating protection mechanisms with different assumptions. RSS values are correlated with physical location and widely used in localization algorithms. The proposed system aims to reduce communication overhead and delay compared to existing approaches by limiting injected dummy traffic through constructing minimum connected dominating sets and shortest path trees.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
This paper analysis vulnerability of known attacks on WLAN cipher suite, authentication mechanisms and credentials using common vulnerability scoring system (CVSS).
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
This document summarizes a research paper that proposes a new method for identifying denial of service (DoS) attacks using multivariate correlation analysis (MCA). The method involves three main steps: 1) generating basic features from network traffic, 2) using MCA to extract correlations between features and generate triangle area maps, and 3) using an anomaly-based detection mechanism to distinguish attacks from normal traffic based on differences from pre-generated normal profiles. The researchers evaluate their method on the KDD Cup 99 dataset and achieve moderate detection performance. However, they identify issues related to differences in feature scales that reduce detection of some attacks. They propose using statistical normalization to address this.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
1- Mobile ad hoc networks are formed dynamically by an
autonomous system of mobile nodes that are connected
via wireless links.
2- Multihop communication- node communicate with the
help of two or more node from source to destination.
3- No existing fixed infrastructure or centralized administration –No base station.
4- Mobile nodes are free to move randomly-Network topology changes frequently
5- May Operate as standalone fashion or also can be connected to the larger internet.
6- Each node work as router
Primary Goals of Security in MANET
To assure a reliable data transfer over the communication networks and to protect the system resources a number of security services are classified in five categories:-
1-Authentication:- The process of identifying an individual , usually based on a username and password.
2- Confidentially:- Confidentiality aims at protecting the data from disclosure to unauthorized person.
Network attacks against confidentiality
* Packet capturing
Password attack
Port scanning
Dumpster Diving
Wiretapping
Phishing and Pharming
2-Non repudiation:- Integrity guarantees that a message being transferred is never corrupted.
3- Integrity:- Integrity guarantees that a message being transferred is never corrupted.
network attack against integrity
Salami attack
trust relationship attacks
Man in the middle attack
Session hijacking attacks
4- Availability:- Its ensure that data ,network resources or network services are available to legitimate user when required.
network attack against availability
Denial of services attacks
Distributed denial of services attack
SYN flood attacks and ICMP flood attacks
Electrical power attacks
Server Room environment attacks
Key management
The security in networking is in many cases dependent on proper key management.
Key management consists of various services, of which each is vital for the security
of the networking systems
* Trust model:-Its must determine how much different element in the network can trust each other.
* Cryptosystem:- Public and symmetric key mechanism can be applied .
* Key creation:- It must determine which parties are allowed to generate key to themselves.
* Key storage :- In adhoc network any network element may have to store its own key and possibly key of other element as well.
* Key distribution:- The key management service must ensure that the generated keys are securely distributed to their owners.
Investigation of detection & prevention sinkhole attack in manetijctet
This document discusses sinkhole attacks in mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs). It provides background on sinkhole attacks, where a compromised node advertises a high quality route to attract network traffic. This can disrupt data transmission to the base station. The document reviews several existing detection techniques for sinkhole attacks, including algorithms using hop counting and mobile agents. It then proposes a new lightweight algorithm to detect sinkhole attacks in MANETs using network flow information collected by the base station and analysis of routing patterns to identify the intruder. The algorithm aims to provide secure and efficient sinkhole detection with low overhead.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...IJCNCJournal
Addressing real-time network security issues is paramount due to the rapidly expanding IoT jargon. The erratic rise in usage of inadequately secured IoT- based sensory devices like wearables of mobile users, autonomous vehicles, smartphones and appliances by a larger user community is fuelling the need for a trustable, super-performant security framework. An efficient anomaly detection system would aim to address the anomaly detection problem by devising a competent attack detection model. This paper delves into the Deep Deterministic Policy Gradient (DDPG) approach, a promising Reinforcement Learning platform to combat noisy sensor samples which are instigated by alarming network attacks. The authors propose an enhanced DDPG approach based on trust metrics and belief networks, referred to as Deep Deterministic Policy Gradient Belief Network (DDPG-BN). This deep-learning-based approach is projected as an algorithm to provide “Deep-Defense” to the plethora of network attacks. Confidence interval is chosen as the trust metric to decide on the termination of sensor sample collection. Once an enlisted attack is detected, the collection of samples from the particular sensor will automatically cease. The evaluations and results of the experiments highlight a better detection accuracy of 98.37% compared to its counterpart conventional DDPG implementation of 97.46%. The paper also covers the work based on a contemporary Deep Reinforcement Learning (DRL) algorithm, the Actor Critic (AC). The proposed deep learning binary classification model is validated using the NSL-KDD dataset and the performance is compared to a few deep learning implementations as well.
Trust Metric-Based Anomaly Detection Via Deep Deterministic Policy Gradient R...IJCNCJournal
Addressing real-time network security issues is paramount due to the rapidly expanding IoT jargon. The erratic rise in usage of inadequately secured IoT- based sensory devices like wearables of mobile users, autonomous vehicles, smartphones and appliances by a larger user community is fuelling the need for a trustable, super-performant security framework. An efficient anomaly detection system would aim to address the anomaly detection problem by devising a competent attack detection model. This paper delves into the Deep Deterministic Policy Gradient (DDPG) approach, a promising Reinforcement Learning platform to combat noisy sensor samples which are instigated by alarming network attacks. The authors propose an enhanced DDPG approach based on trust metrics and belief networks, referred to as Deep Deterministic Policy Gradient Belief Network (DDPG-BN). This deep-learning-based approach is projected as an algorithm to provide “Deep-Defense” to the plethora of network attacks. Confidence interval is chosen as the trust metric to decide on the termination of sensor sample collection. Once an enlisted attack is detected, the collection of samples from the particular sensor will automatically cease. The evaluations and results of the experiments highlight a better detection accuracy of 98.37% compared to its counterpart conventional DDPG implementation of 97.46%. The paper also covers the work based on a contemporary Deep Reinforcement Learning (DRL) algorithm, the Actor Critic (AC). The proposed deep learning binary classification model is validated using the NSL-KDD dataset and the performance is compared to a few deep learning implementations as well.
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to
rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus
or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection
System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data
created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for
anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack
signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with
the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System
called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in
detecting abnormal content in the traffic data during information passing from one node to another and
also detects known attack signature and unknown attack. This approach is tested by running the artificial
network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
Intrusion in a network or a system is a problem today as the trend of successful network attacks continue to rise. Intruders can explore vulnerabilities of a network system to gain access in order to deploy some virus or malware such as Denial of Service (DOS) attack. In this work, a frequency-based Intrusion Detection System (IDS) is proposed to detect DOS attack. The frequency data is extracted from the time-series data created by the traffic flow using Discrete Fourier Transform (DFT). An algorithm is developed for anomaly-based intrusion detection with fewer false alarms which further detect known and unknown attack signature in a network. The frequency of the traffic data of the virus or malware would be inconsistent with the frequency of the legitimate traffic data. A Centralized Traffic Analyzer Intrusion Detection System called CTA-IDS is introduced to further detect inside attackers in a network. The strategy is effective in detecting abnormal content in the traffic data during information passing from one node to another and also detects known attack signature and unknown attack. This approach is tested by running the artificial network intrusion data in simulated networks using the Network Simulator2 (NS2) software.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
2. Mr. Santosh S. Doifode and Prof. D. C. Mehetre
http://www.iaeme.com/IJCET/index.asp 2 editor@iaeme.com
1. INTRODUCTION
As more wireless sensor networks are deployed, they will increasingly become
tempting targets for malicious attacks. Due to the openness of wireless and sensor
networks, they are especially vulnerable to adversary attacks where an attacker forges
its identity to masquerade as another device, or even creates multiple illegitimate
identities. Adversary attacks are a serious threat as they represent a form of identity
compromise and can facilitate a variety of traffic injection attacks. It is thus desirable
to detect the presence of adversary attackers and eliminate them from the network.
Most researchers focus on secure routing between sensors and the between base
stations. Attacks in sensor networks can be classified into the following types Figure 1
indicate the types of attacks. Outsider Vs. insider attacks: Outsider attacks are
attacks from nodes which do not belong to a WSN. Insider attacks occur when
legitimate nodes of a WSN behave in unintended or unauthorized ways.
Figure 1 Different types of Attacks
Vs. active attacks: Passive attacks include eavesdropping on or monitoring packets
exchanged with in a WSN. Active attacks involve some modifications of the data
stream or the creation of a false stream.
Mote-class Vs. Laptop-class attacks: An adversary attacks a WSN by using a few
nodes with similar capabilities to the network nodes in mote-class attacks. Mote class
attackers can jam the radio link in it’s immediate vicinity.
Further, these attackers can easily purchase low-cost wireless devices and use
these commonly available platforms to launch a variety of attacks with little effort.
Among various types of attacks, identity-based spoofing attacks are especially easy to
launch and can cause significant damage to network.
Cryptographic methods are susceptible to node compromise, which is a serious
concern as most wireless nodes are easily accessible, allowing their memory to be
easily scanned. for these reason the non-cryptographic technique such as location
based received signal strength is useful for identification of adversary attacks. Figure
2 shows the different non-cryptographic techniques.
This paper proposes to use RSS-based spatial correlation, a physical property
associated with each wireless node that is hard to falsify and not reliant on
cryptography as the basis for detecting adversary attacks. Since the concern attackers
who have different locations than legitimate wireless nodes, utilizing spatial
information to address spoofing attacks has the unique power to not only identify the
presence of these attacks but also localize adversaries. An added advantage of
3. Survey of Identification Techniques of Adversary Attacks in Wireless Sensor Network
http://www.iaeme.com/IJCET/index.asp 3 editor@iaeme.com
employing spatial correlation to detect adversary attacks is that it will not require any
additional cost or modification to the wireless devices themselves.
Adversary attacks can further facilitate a variety of traffic injection attacks such as
attacks on access control lists, rogue access point attacks, and eventually Denial of-
Service attacks [1, 2]. In computing, a denial-of service attack (DoS attack) or
distributed denial-of-service attack is an attempt to make network resource
unavailable to its planned users. Although the means to bring to a successful issue,
producing physical for, and objects of a Denial of service attack may vary, its
commonly composed of efforts to limited periods or indefinitely interrupt or suspend
services of a host connected to the Internet. Therefore it is important to detecting,
determining and eliminate the number of attackers.
Figure 2 Different types of Non-cryptographic technique
2. LITERATURE SURVEY
The existing systems makes use of cryptographic technique of Symmetric algorithm
like Advanced encryption standard. The standard cryptographic technique are often
too costly for the sensor network domain. The distribution of shared secret keys poses
another host of problems. This algorithm includes key distribution and management
technique of overhead. Such cryptographic algorithms require a lot of efforts for
reliable key management; further cryptography considers the Public Key Interface
which can decrease the overhead of key management to some extent.
Cryptographic schemes requires reliable key distribution, management, and
maintenance mechanisms also infrastructural, computational, and management
4. Mr. Santosh S. Doifode and Prof. D. C. Mehetre
http://www.iaeme.com/IJCET/index.asp 4 editor@iaeme.com
overhead. These methods are susceptible to node compromise easily accessible and
allowing their memory to be easily scanned.
Some of the following important papers in literature survey describes the
identification techniques for adversary attacks.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions In
this paper focuses on the threats posed by denial-of-service (DoS) attacks against
802.11’s MAC protocol. Such attacks, which prevent original users from accessing
the network, are a vexing problem in all networks, but they are particularly
threatening in the wireless context. Without a physical infrastructure, an attacker is
afforded considerable flexibility in deciding where and when to attack, as well as
enhanced anonymity due to the difficulty in locating the source of individual wireless
transmissions. Moreover, the relative immaturity of 802.11-based network
management tools makes it unlikely that a well-planned attack will be quickly
diagnosed. Vulnerabilities in the 802.11 MAC protocol allow an attacker to
selectively or completely disrupt service to the network using relatively few packets
and low power consumption [1].
Access points vulnerabilities to DoS attacks in 802.11 networks. Paper describe
possible denial of service attacks to access points in infrastructure wireless networks
using the 802.11b protocol. To carry out such attacks, only commodity hardware and
software components are required. The experimental results obtained on a large set of
different access points show that serious vulnerabilities exist in any device we tested
and that a single malicious station can easily hinder any legitimate communication
within a basic service set [2].
Detecting Identity Based Attacks in Wireless Networks Using Signal prints. In
this paper describe the identity-based attacks in which a malicious device uses forged
MAC addresses to masquerade as a specific client or to create multiple illegitimate
identities. Several link-layer services in IEEE 802.11 networks have been shown to be
vulnerable to such attacks even when 802.11 and other security mechanisms are
deployed. A transmitting device can be robustly identified by its signal print, a tuple
of signal strength values reported by access points acting as sensors [5].
Secure and Efficient Key Management in Mobile Ad hoc Networks. In mobile ad
hoc networks, due to unreliable wireless media, host mobility and lack of
infrastructure, providing secure communications is a big challenge [10].
Cryptographic techniques are used for secure communications in wired and wireless
networks. Symmetric and asymmetric cryptography have their advantages and
disadvantages. A secure and efficient key management framework for mobile ad hoc
networks builds a public key infrastructure by applying a secret sharing scheme and
using an underlying multi-cast server groups. In SEKM, each server group creates a
view of the certificate authority and provides certificate update service for all nodes,
including the servers themselves. A ticket scheme is introduced for efficient
certificate service. In addition, an efficient server group updating scheme is proposed.
The performance of SEKM is evaluated through simulation [18].
Sequence Number-Based MAC Address Spoof Detection The exponential growth
in the deployment of IEEE 802.11-based wireless LAN (WLAN) in enterprises and
homes takes WLAN an attractive target for attackers. Attacks that exploit
vulnerabilities at the IP layer or above can be readily addressed by intrusion detection
systems designed for wired networks. However, attacks exploiting link layer protocol
vulnerabilities require a different set of intrusion detection mechanism. Most link-
layer attacks in WLANs are denial of service attacks and work by spoofing either
5. Survey of Identification Techniques of Adversary Attacks in Wireless Sensor Network
http://www.iaeme.com/IJCET/index.asp 5 editor@iaeme.com
access points (APs) or wireless stations. Spoofing is possible because the IEEE
802.11 standard does not provide per-frame source authentication, but can be
effectively prevented if a proper authentication is added into the standard.
Unfortunately, it is unlikely that commercial WLANs will support link-layer source
authentication that covers both management and control frames in the near future.
Even if it is available in next-generation WLANs equipments, it cannot protect the
large installed base of legacy WLAN [11].
3. GENERALIZED MODEL FOR ATTACK DETECTION
(GMFAD)
The challenge in adversary attack detection is to devise strategies that use the
uniqueness of spatial information, but not using location directly as the attackers’
positions are unknown The detailed survey of attacks can be found in [7].
The Received signal strength, a property closely correlated with location in
physical space and is readily available in the existing wireless sensor networks [13].
Although affected by random noise, environmental bias, and multipath effects, the
Received signal strength measured at a set of landmarks (i.e., reference points with
known locations) is closely related to the transmitter’s physical location and is
governed by the distance to the landmarks [16]. The Received signal strength readings
at the same physical location are similar, whereas the Received signal strength
readings at different locations in physical space are distinctive [6]. Thus, the Received
signal strength readings present strong spatial correlation characteristics.
The Received signal strength value vector as s = {S1, S2, . . . Sn} where n is the
number of landmarks/access points that are monitoring the Received signal strength
of the wireless nodes and know their locations.
Basically this particular model mainly focuses on Detection of Identity based
adversaries Attack for that purpose it consists of the new advanced technique is
Partitioning around Medoids (PaM). As the adversaries attack detection could be
performed by RSS-based spatial co-relation from wireless sensor nodes. It also
showed that the RSS readings from a wireless sensor node may fluctuate and should
cluster together. The observation suggests that we may conduct cluster analysis on top
of RSS-based spatial correlation so as to find out the distance in signal space and
further identified the presence of Adversaries attackers in physical space [14, 15]. In
this work, the Partitioning around Medoids Method to perform clustering analysis in
RSS.
3.1. Partitioning around Medoids
The according to Partitioning Around Medoids Method to perform clustering analysis
in Received signal strength. The PAM Method is a popular clustering algorithm.
Compared to the others method, the PAM method is more robust in the presence of
noise and outliers. Thus, the PAM method is more suitable in determining clusters
from RSS streams, which can be unreliable and fluctuating over time due to random
noise and environmental bias [8].
According to PaM technique first partition the RSS vectors from the same node
identity into two or more clusters no matter how many attackers are using this
identity, since our objective in this phase is to detect the presence of attacks. Then
choose the distance between two Medoids Dm as the test statistic T in our
significance testing for adversary detection, Dm =||Ma−Mb||, where Ma and Mb are
the Medoids of two clusters. Under normal conditions, the test statistic Dm should be
6. Mr. Santosh S. Doifode and Prof. D. C. Mehetre
http://www.iaeme.com/IJCET/index.asp 6 editor@iaeme.com
small since there is basically only one cluster from a single physical location.
However, under a adversary attack, there is more than one node at different physical
locations claiming the same node identity. As a result, more than one clusters will be
formed in the signal space and Dm will be large as the medoids are derived from the
different RSS clusters associated with different locations in physical space.
Figure 3 Distance between mediods.
3. 2. System Evaluation
This technique is basically used for identified actual number of attackers in the
wireless system. This method uses Twin-Cluster Model [9]. It means this indicate that
Twin-Cluster Model includes two closest clusters (e.g. clusters a and b) between K
Potential clusters of a data set. Energy computation done by using twin cluster model.
Mathematical model involve 2 types of energies—
1. Partition Energy (Ep (K))
2. Merging Energy (Em(K))
The Partition Energy denotes the border distance between the twin clusters,
whereas the Merging Energy is determined as the average distance between elements
in the border region of the twin clusters. Here the border region includes a number of
sample points chosen from clusters a and b that are nearest to its twin cluster than any
other points within its own cluster. Then further equations of partition energy and
merging energy denote. Where the value of K gives the actual number of Adversaries
attackers in the system.
4. COHERENT DETECTION AND LOCALIZATION MODEL
(CDAL-M).
In this section, we present our integrated system that can use localize adversaries
attackers. The experimental results are presented to evaluate the effectiveness of our
approach, especially when attackers using different transmission power levels.
The conventional localization methods are based on averaged Received Signal
Strength from each node identity inputs to estimate the position of a node. However,
in wireless adversary attacks, the Received Signal Strength stream of a node identity
may be mixed with Received Signal Strength readings of both the original node as
well as attack nodes from different physical locations. The traditional method of
averaging RSS readings cannot differentiate RSS readings from different locations
and thus is not feasible for localizing adversaries [3].
7. Survey of Identification Techniques of Adversary Attacks in Wireless Sensor Network
http://www.iaeme.com/IJCET/index.asp 7 editor@iaeme.com
Different from conventional localization approaches, our coherent detection and
localization system utilizes the Received Signal Strength medoids as inputs to
localization algorithms to estimate the positions of adversaries [4]. The available
positions from our system includes the location estimate of the original node and the
attackers in the physical space.
Here we use RADAR algorithm.
4.1. Radar Algorithm
The Radar-Gridded algorithm is expanded from scene-matching localization
algorithm [12]. Here the proposed Radar-Gridded makes use of an interpolated signal
map, which is built from a set of averaged RSS readings with known (X, Y) locations.
From the observed RSS reading with an unknown location, Radar returns the x, y of
the nearest neighbor in the signal map to the one to localize, where “nearest” is
defined as the Euclidean distance of received signal strength points in an N-
dimensional signal space, where N is the number of landmarks.
Further it makes use of Euclidean’s distance formula to obtain actual position (X,
Y) co-ordinates of location. So gives the exact location of adversary attackers.
4.2. Bayesian networks
Bayesian Network localization is a multilateration algorithm. It encodes the signal-to-
distance propagation model into the Bayesian Graphical Model for localization [17].
Figure 4 shows the basic Bayesian Network. The vertices X and Y represent location
and the vertex si is the received signal strength reading from the ith landmark. The
vertex Di represents the Euclidean distance between the location described by X and Y
and the ith landmark. The value of si observe a signal propagation model si = b0i + b1i
log Di, where b0i, b1i are the parameters specific to the ith landmark.
The distance depends on the location (X, Y) of the measured signal and the
coordinates (xi, yi) of the ith landmark. The network models noise and described by
modeling the si as a Gaussian distribution around the above propagation model.
Figure 4 Bayesian graphical model
5. DETECTION OF DENIAL OF SERVICE ATTACK
A denial-of-service (DoS) attack is an attempt to make a machine or network resource
unavailable to its intended users. DoS attacks typically target sites or services hosted
8. Mr. Santosh S. Doifode and Prof. D. C. Mehetre
http://www.iaeme.com/IJCET/index.asp 8 editor@iaeme.com
on high-profile web servers such as banks, credit card payment gateways, and even
root name servers. Denial-of-service attacks are also common in business and
responsible for website attacks.
In general terms, DoS attacks are implemented by either forcing the targeted
computer to consuming its resources so that it can no longer provide its original
service or obstructing the communication media between the intended users and the
victim so that they can no longer communicate adequately.
A denial-of-service attack may involve sending forged requests of some type to a
very large number of nodes that will reply to the requests. Using Internet Protocol
address attacks, the source address is set to that of the targeted victim, which means
all the replies will go to the target.
6. CONCLUSION
Here identification techniques using Received signal strength (RSS) instead of
previous approaches like Cryptography, so as to detect Identity-based Adversaries
attacks and in advancement the Denial-of-Service attacks more effectively as
compared to the existing one. Received signal strength it’s a physical property
associated with each node, which is hard to falsify and also not reliant on
cryptography. Here the Partition around medoids technique useful for Adversaries
attack detection, Twin-cluster model are use to obtain the exact number of adversaries
attackers in the system (i.e. Generalized Model For Attack Detection) and also
Coherent Detection and Localization Mode to localize Adversaries attackers in the
network. Also with Received signal strength new algorithm to detect Denial-of-
Service attack. Experimental results shows that all these techniques are more efficient
and effective than existing ones. Also that acceptably reduces the overhead
requirements of existing approaches, as those proposed techniques don’t require any
additional implementations.
REFERENCES
[1] Bellardo, J. and Savage, S. 802.11 Denial-of-Service Attacks: Real
Vulnerabilities and Solutions. Proc. USENIX Security Symp., 2003, pp. 15–28.
[2] Ferreri, F., Bernaschi, M. and Valcamonici, L. Access Points Vulnerabilities to
Dos Attacks in 802.11 Networks. Proc. IEEE Wireless Comm. and Networking
Conf., 2004.
[3] Yang, J., Chen, Y., Trappe, W. and Cheng, J. Detection and Localization of
Multiple Spoofing Attackers in Wireless Networks. IEEE Transactions on
parallel and distributed systems, 24(1), Jan 2013.
[4] Chen, Y., Yang, J., Trappe, W. and Martin, R. P. Detecting and Localizing
Identity-Based Attacks in Wireless and Sensor Networks. IEEE Transactions on
vehicular technology, 59(5), June 2010.
[5] Faria, D. and Cheriton, D. Detecting Identity-Based Attacks in Wireless
Networks Using Signalprints. Proc. ACM Workshop Wireless Security (WiSe),
Sept. 2006.
[6] Sheng, Y., Tan, K., Chen, G., Kotz, D. and Campbell, A. Detecting 802.11 MAC
Layer Spoofing Using Received Signal Strength. Proc. IEEE INFOCOM, Apr.
2008.
[7] Li, Q. and Trappe, W. Relationship-Based Detection of Spoofing-Related
Anomalous Traffic in Ad Hoc Networks. Proc. Ann. IEEE Comm. Soc. on IEEE
and Sensor and Ad Hoc Comm. and Networks (SECON), 2006.
9. Survey of Identification Techniques of Adversary Attacks in Wireless Sensor Network
http://www.iaeme.com/IJCET/index.asp 9 editor@iaeme.com
[8] Zhou, G., He, T., Krishnamurthy, S. and Stankovic, J. A. Models and Solutions
for Radio Irregularity in Wireless Sensor Networks. ACM Trans. Sensor
Networks, 2, 2006, pp. 221–262.
[9] Kaufman, L. and Rousseeuw, P. J. Finding Groups in Data: An Introduction to
Cluster Analysis. Wiley Series in Probability and Statistics, 1990.
[10] Guo, F. and Chiueh, T. Sequence Number-Based MAC Address Spoof Detection.
Proc. Eighth Int’l Conf. Recent Advances in Intrusion Detection, 2006, pp. 309–
329.
[11] Bahl, P. and Padmanabhan, V. N. RADAR: An in-Building RF Based User
Location and Tracking System. Proc. IEEE INFOCOM, 2000.
[12] Sarkar, T., Ji, Z., Kim, K., Medouri, A. and Salazar-Palma, M. A Survey of
Various Propagation Models for Mobile Communication. IEEE Antennas and
Propagation Magazine, 45(3), June 2003, pp. 51–82.
[13] Wang, K. Estimating the Number of Clusters via System Evolution for Cluster
Analysis of Gene Expression Data. Technical Report NO. 2007-258, Computer
Science Dept., Xidian Univ, P. R. China, 2007.
[14] Chen, Y., Francisco, J., Trappe, W. and Martin, R. P. A Practical Approach to
Landmark Deployment for Indoor Localization. Proc. IEEE Int’l Conf. Sensor
and Ad Hoc Comm. and Networks (SECON), Sept. 2006.
[15] Madigan, D., Elnahrawy, E., Martin, R., Ju, W., Krishnan, P. and Krishnakumar,
A. S. Bayesian Indoor Positioning Systems. Proc. IEEE INFOCOM, Mar. 2005,
pp. 324–331.
[16] Wu, B., Wu, J., Fernandez, E. and Magliveras, S. Secure and efficient key
management in mobile ad hoc networks. In Proc. IEEE IPDPS, 2005
[17] Anurag. Hierarchical Intrusion Detection System In Cluster Based Wireless
Sensor Network Using Multiple Mobile Base Stations. International Journal of
Computer Engineering & Technology (IJCET), 5(6), 2014, pp. 82–87.
[18] Mr. Mehta, O. and Prof. Raval, G. 3-D Localization In Wireless Sensor Network.
International Journal of Computer Engineering & Technology (IJCET), 5(3),
2014, pp. 9–22.