This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses security issues in wireless cellular networks. It covers 4 generations of cellular networks and outlines limitations of wireless networks compared to wired networks. Some key security issues addressed include authentication, integrity, confidentiality, and various types of attacks such as unauthorized access, eavesdropping, and man-in-the-middle attacks. The document also notes that 3G networks provide features to enhance security but that continued research is needed to address new issues and further improve security as cellular technologies advance.
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
Internet of Things (IoT) is undoubtedly a well-known research area. Security on IoT communication services is the major challenge with advanced technology and devices. This paper mainly focusing on Perceptron layer based attacks and counter measures based on Effective Authentication System (EAS). This paper is ordered as outlining IoT Architecture, Types of Threats ,Perceptron Layer based attacks, sensor based communication services ,RFID mechanism ,Tag identify and verification by back end server and Hash based Effective Authentication System (EAS) to avoid pseudonym attacks .This paper proposes EAS as security measure by preventing privacy attack, pseudonym attack, location tracking and asynchronous attack.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
This document summarizes a survey on identifying security vulnerabilities in wireless sensor networks. It begins with an introduction to wireless sensor networks and their importance for enabling the internet of things. It then discusses key challenges for wireless sensor networks related to constraints on memory, power, communication reliability and security. The document reviews common communication protocols for wireless sensor networks like IEEE 802.15.4 and ZigBee. It also discusses hierarchical routing approaches. Finally, it categorizes major vulnerabilities for wireless sensor networks related to node compromise and denial of service attacks that can occur due to weaknesses in the open wireless medium.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
This document discusses the risks and security standards of two wireless local area network technologies: Bluetooth and Wi-Fi. It provides an overview of how each technology works and its vulnerabilities. Both Bluetooth and Wi-Fi are susceptible to attacks like eavesdropping, man-in-the-middle attacks, and denial of service attacks. The document outlines security protocols and standards developed for each technology, including WEP, WPA, WPA2, and Bluetooth's pairing and encryption processes. It also describes different types of attacks targeting each technology like bluejacking, bluesnarfing, and WAPkitting. The goal of the document is to educate about the risks of these wireless technologies and how security standards aim to address vulnerabilities.
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
The document discusses security attacks on wireless sensor networks, describing various types of attacks like jamming, impersonation, replay attacks, and denial of service attacks that can occur at different layers of the network. It analyzes key security objectives for wireless sensor networks like availability, authentication, integrity, and confidentiality. The document also outlines the architecture of wireless sensor networks, including the five layers of the OSI model and three cross-layer planes, and components of sensor nodes.
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
This document summarizes a research paper that classifies different types of networks and discusses their associated security issues. It categorizes networks based on size (LAN, MAN, WAN), design (peer-to-peer, client-server, standalone), layering (layered, non-layered), and provides examples such as Ethernet, Wi-Fi, VPNs. It also discusses common security threats for different network types like viruses, denial of service attacks, and evaluates security measures including encryption, firewalls, access control. The paper aims to provide a comprehensive classification of networks and analyze how security needs vary depending on the network and software development stages.
The VLR is a database that contains temporary information about subscribers that are visiting its
serving area. The VLR is associated with one or more MSCs. When a subscriber enters a new MSC area, the
VLR associated with that MSC requests data about the subscriber from the HLR. This data is stored in the VLR
as long as the subscriber remains in the MSC area.
4.1.8 Equipment Identity Register (EIR): The EIR is a database that contains a list of all valid mobile
equipment on the network in the form of their International Mobile Equipment Identities (IMEI). The EIR is
consulted by the VLR to check if a particular mobile is allowed to be used
In the past decade, internet of things IoT has been a focus of research. It makes more intelligent to core element of modern world such as hospitals, cities, organizations, and buildings. Usually, IoT has four major components including sensing, information processing, applications and services, heterogeneous access and additional components e.g. Security and privacy. In this paper, we are presenting security perspective from the perspective of layers that comprises IoT. In this we focus on the overview of IoT security perspective. Sunilkumar Malge | Pallavi Singh ""Internet of Things (IoT): Security Perspective"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24010.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/24010/internet-of-things-iot-security-perspective/sunilkumar-malge
Secured Intrusion Protection System through EAACK in MANETSijtsrd
Achieving reliable routing has always been a major issue in the design of communication networks, due to the absence of fixed infrastructure among which mobile ad hoc networks MANETs that can take control of the most adversarial networking environment, and the dynamic network topology the nature of open transmission media. In the MANETs these characteristics also more challenging to make the design of routing protocols. The network topology varies so to determining feasible routing paths for distributing messages in a decentralized is a difficult job. Factors such as the extensive distribution of nodes and open medium, variable wireless link quality topological changes, and propagation path loss become pertinent issues and make MANET unprotected to instructions. Thus, it becomes central to develop a systematic intrusion detection scheme to secure Mobile Ad Hoc networks from intruders. In this project, we put forward and applied an efficient IDS mechanism based on Enhanced Adaptive Acknowledgment EAACK especially made for MANETs which performs better than the earlier techniques such as AACK, TWOACK and Watchdog. Mr. Ravishankar Kandasamy | M. Ajith Kumar | M. Ajith Kumar | G. Arun Kumar "Secured Intrusion Protection System through EAACK in MANETS" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30457.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30457/secured-intrusion-protection-system-through-eaack-in-manets/mr-ravishankar-kandasamy
Security threats analysis in bluetooth enabled mobile devicesIJNSA Journal
Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such as Surveillance, Obfuscation, Sniffing, Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle
Attack (MITM). To perform the testbed, several devices are used such as mobile phones, laptops,
notebooks, wireless headsets, etc. and all the tests are carried out by pen-testing software like hcittml, braudit, spoafiooph, hridump, bluesnarfer, bluebugger and carwhisperer.
NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY: A SURVEY IJCI JOURNAL
Near Field Communication, NFC- is one of the latest
short range wireless communication technologies.
NFC provides safe communication between electronic
gadgets. NFC-enabled devices can just be pointed or
touched by the users of their devices to other NFC-
enabled devices to communicate with them. With NFC
technology, communication is established when an NF
C-compatible device is brought within a few
centimetres of another i.e. around 20 cm theoretica
lly (4cm is practical). The immense benefit of the
short
transmission range is that it prevents eavesdroppin
g on NFC-enabled dealings. NFC technology enables
several innovative usage scenarios for mobile devic
es. NFC technology works on the basis of RFID
technology which uses magnetic field induction to c
ommence communication between electronic devices in
close vicinity. NFC operates at 13.56MHz and has 42
4kbps maximum data transfer rate. NFC is
complementary to Bluetooth and 802.11 with their lo
ng distance capabilities. In card emulation mode NF
C
devices can offer contactless/wireless smart card s
tandard. This technology enables smart phones to
replace traditional plastic cards for the purpose o
f ticketing, payment, etc. Sharing (share files bet
ween
phones), service discovery i.e. get information by
touching smart phones etc. are other possible
applications of NFC using smart phones. This paper
provides an overview of NFC technology in a detaile
d
manner including working principle, transmission de
tails, protocols and standards, application scenari
os,
future market, security standards and vendor’s chip
sets which are available for this standard. This
comprehensive survey should serve as a useful guide
for students, researchers and academicians who are
interested in NFC Technology and its applications [
1].
FFF Global Trade is a Portuguese export and distribution company established in 2000 that specializes in marketing Portuguese products abroad, especially in the Middle East. They develop penetration plans for specific markets tailored to local customs and regulations. FFF Global Trade then uses its contacts to connect clients with importers and handles orders, payments, and shipping. Their goal is to meet each client's needs with quality and ethical services.
El documento resume los conceptos fundamentales relacionados con el pensamiento humano, incluyendo cómo opera a través de la percepción, representación mental y memoria. Explica las emociones, actitudes, creencias, hábitos y costumbres como tipos de pensamiento. Finalmente, discute la inteligencia humana y emocional, así como la plasticidad de la mente.
Biobanks collect human biological samples and related health data to study genetic diseases. They provide insights into the genetic components of disease and enable personalized healthcare approaches. Biobanks study genes related to cancer, cardiovascular disease, diabetes, and other genetic conditions. Their research promises to find relationships between diseases and help develop new treatments. Governments invest in biobanks to advance scientific understanding and improve public health outcomes. Individual participation in biobanks through informed consent supports important genetic research.
Haiku Deck is a presentation tool that allows users to create Haiku style slideshows. The tool encourages users to get started making their own Haiku Deck presentations which can be shared on SlideShare. In just one sentence, it promotes creating Haiku Deck presentations.
The future of food: the sustainable production & consumption of fish
Elspeth Probyn
Department of Gender & Cultural Studies
The University of Sydney, Australia
Unity je nástroj pro tvorbu her. Umožňuje psaní jednoho kódu a exportu na velké množství platforem, od Windows, přes PlayStation Vita nebo iPhone až po Nintendo Wii. Pro spuštění hry v prohlížeči již není nutné instalovat plugin, protože Unity má podporu pro export do WebGL. V Unity můžete psát shadery nezávisle na cílové platformě, dále má zabudovanou podporu pro networking, tedy hru více hráčů.
This document provides an analysis for the design of an instructional plan to train staff at a summer camp on using a wiki space (WikiManual) as an online staff orientation, training, and resource manual. The camp currently uses printed manuals and in-person training for staff orientation. The needs analysis identified that some subject matter experts cannot attend in-person training and valuable knowledge is being lost. The goal is to empower camp managers, experts, and alumni to update and expand resources online for staff access. Sample materials and lessons will demonstrate the wiki space capabilities. The target audience is 30 summer staff trainees who are young adults and college students, mostly with mobile technology experience. The plan will follow the ADDIE instructional design model of
Approccio ad una infrastruttura per MicroserviceDaniele Mondello
Preentazione effettuata al Cnu Linux Meeting 2016 nel quale vine descritto un "approccio ad una infrastruttura per Microservices".Vengono descritte diverse tecnologie a supporto come RabbitMQ, Jenkins, Doickers.
CSS 3 při��lo s novým pracování s kontejnery obsahu. Novému pozicování se říká flexbox.Tento modul je speciálně určený pro rozvržení layoutu na webové stránce.
A fair survey on Internet of Things(IoT)Gokulnath J
The document presents an overview of the Internet of Things (IoT), including enabling technologies like RFID, sensors, and smart technologies. It discusses IoT applications in various domains like education, retail, logistics, and pharmaceuticals. It also covers middleware for IoT, which facilitates communication between connected objects and applications. Finally, it discusses future directions for IoT, such as improved telecommunication technologies and addressing security and privacy issues.
We did not predict the Internet, the Web, social networking, Facebook, Twitter, millions of apps for smart-phones, etc. New research problems arise due to the large scale of devices, the connection of the physical and cyber worlds, the openness of the systems of systems, and continuing problems of privacy and security. It is hoped that there is more cooperation between the research communities in order to solve the myriad of problems sooner as well as to avoid re-inventing the wheel when a particular community solves a problem.
High level overview of CoAP or Constrained Application Protocol. CoAP is a HTTP like protocol suitable for constrained environment like IoT. CoAP uses HTTP like request response model, status code etc.
Marketingová strategie: Michal Krutiš: APEK 2016Michal Krutiš
Marketingová strategie pro digitální marketing je složitý proces složený z tisíce kousků. Patří sem nejen cílové skupiny, brand, STDC, ale i KPI, atribuce, automatizace, zákaznická analytika, lidi a hodinovky.
Helpful survey for researchers and students who are intended to investigate in the Internet of things field in term of security and privacy side. This survey has general overview in security issues with the solutions addressed these issues.
The document discusses security issues and requirements for privacy and security in Internet of Things (IoT) architectures. It describes various viewpoints on IoT security issues such as lightweight encryption needs for sensor nodes, authentication challenges, and privacy leaks. It also outlines solutions proposed by different researchers, including identity authentication mechanisms, data encryption, intrusion detection systems, and security protocols tailored for resource-constrained IoT devices and networks.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using LEACH protocol.
This document summarizes security issues and attacks in wireless sensor networks. It discusses various security requirements like confidentiality, integrity, authentication, availability, and freshness. It describes different types of attacks like jamming, tampering, exhaustion, collision, routing attacks, selective forwarding, sinkhole attacks, Sybil attack, wormhole attack, hello flood attack, flooding, black hole attack, and denial of service attack. It also discusses countermeasures like modifications to the link layer, cluster-based techniques, detecting mobile malicious nodes in static networks, dual-weighted trust evaluation, and using threshold-based detection and LEACH protocol.
A Review on Wireless Sensor Network Securityijtsrd
Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar
This document provides a review of the Internet of Things (IoT). It defines IoT as connecting physical objects to the internet through sensors that allow the objects to communicate and exchange data. The review discusses the history and key elements of IoT, including sensing, communication, data analytics, and delivery of information to users. It also outlines the layers of IoT architecture, enabling technologies like RFID and wireless sensor networks, and both advantages and security threats of the IoT approach. The goal is to provide a generalized overview of the widely known IoT technology.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes an article from the International Journal of Computer Engineering and Technology about enhancing power-aware hybrid intrusion detection architecture in an ad-hoc network using mobile agents. It discusses designing and implementing an energy-efficient anomaly-based cooperative intrusion detection system that applies mobile agent technology to minimize network load, conserve bandwidth, and improve reactivity. It also aims to minimize energy consumption of monitoring nodes using the Back-Propagation algorithm. The paper then presents a new approach to intrusion detection system architecture in ad-hoc networks using mobile agents to determine which network events need monitoring and where.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
NEAR FIELD COMMUNICATION, IT’S VULNERABILITY AND COUNTER MEASURESIRJET Journal
This document discusses Near Field Communication (NFC) technology, including its vulnerabilities and potential countermeasures. It provides an overview of NFC, describing its operating modes and applications. It then examines various types of attacks on NFC systems, such as those affecting integrity, confidentiality, and availability. Experimental analysis was conducted to evaluate vulnerabilities. The document also proposes countermeasures like encrypting data and authenticating NFC devices to enhance security. Specific measures for data corruption and denial of service attacks include detecting abnormal data transmissions and establishing secure channels.
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSIJCNCJournal
Devices are becoming increasingly interconnected; linked with each other and with humans. The internet
of things(IoT) concept is currently used in machine to machine (M2M) applications like power, gas, and oil
utilities transmission and transport. The most profound challenge that IoT faces is how to connect several
very different devices into a network of things. In this regard, the standard for sending information between
devices supporting IoT is called ZigBee, also known as the IEEE 802.15.4-2006 standard: ZigBee is
indispensable to the functioning of the IoT. In this paper, OPNET has been used to simulate two quite
differently scaled Wireless Sensor Network environments. The two environments had quite different ZigBee
topologies; thus, an analysis of the performance in regard to each topology could be made. We
propose,ZigBee as optional addressing method for smart-things making up the smart world which
facilitates the transmission and analysis of data automatically.
IRJET- Identification of Vampire Assault in Wireless Sensor NetworksIRJET Journal
The document discusses the vampire attack in wireless sensor networks. The vampire attack is a type of denial of service attack that slowly drains the battery power of sensor nodes over a long period of time. This is done by transmitting small messages that require little data but consume significant energy. As a result, the entire network's availability can be disabled without immediately disrupting operations. The paper proposes a method to detect and prevent vampire attacks by establishing thresholds for normal message broadcasting and labeling nodes as suspicious if they exceed the thresholds. These suspicious nodes are then isolated from communication to improve the network's security and performance.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
This document summarizes security and privacy issues in the Internet of Things (IoT) environment. It discusses how IoT systems have layers - the perception layer containing sensors, the gateway layer for communication, and the cloud layer providing user services. Each layer faces different security threats like denial of service attacks, session hijacking, and data breaches. The document also provides an example of the Mirai malware infecting IoT devices and using them to launch large-scale cyberattacks. To improve IoT security, the document recommends implementing authentication, authorization, encryption for confidentiality and integrity checks using hashing to protect against various attacks on IoT systems.
Similar to Survey of Security and Privacy Issues of Internet of Things (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
This document discusses clickjacking attacks, which hijack users' clicks to perform unintended actions. It provides an overview of clickjacking, describes different types of attacks, and analyzes vulnerabilities that make websites susceptible. Experiments are conducted on a sample social networking site, applying various clickjacking techniques. Potential defenses are tested, including X-Frame-Options headers and frame busting code. A proposed solution detects transparent iframes to warn users and check for hidden mouse pointers to mitigate cursorjacking. Analysis of top Jammu and Kashmir websites found most were vulnerable, while browser behavior studies showed varying support for defenses.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Implementations of Fused Deposition Modeling in real worldEmerging Tech
The presentation showcases the diverse real-world applications of Fused Deposition Modeling (FDM) across multiple industries:
1. **Manufacturing**: FDM is utilized in manufacturing for rapid prototyping, creating custom tools and fixtures, and producing functional end-use parts. Companies leverage its cost-effectiveness and flexibility to streamline production processes.
2. **Medical**: In the medical field, FDM is used to create patient-specific anatomical models, surgical guides, and prosthetics. Its ability to produce precise and biocompatible parts supports advancements in personalized healthcare solutions.
3. **Education**: FDM plays a crucial role in education by enabling students to learn about design and engineering through hands-on 3D printing projects. It promotes innovation and practical skill development in STEM disciplines.
4. **Science**: Researchers use FDM to prototype equipment for scientific experiments, build custom laboratory tools, and create models for visualization and testing purposes. It facilitates rapid iteration and customization in scientific endeavors.
5. **Automotive**: Automotive manufacturers employ FDM for prototyping vehicle components, tooling for assembly lines, and customized parts. It speeds up the design validation process and enhances efficiency in automotive engineering.
6. **Consumer Electronics**: FDM is utilized in consumer electronics for designing and prototyping product enclosures, casings, and internal components. It enables rapid iteration and customization to meet evolving consumer demands.
7. **Robotics**: Robotics engineers leverage FDM to prototype robot parts, create lightweight and durable components, and customize robot designs for specific applications. It supports innovation and optimization in robotic systems.
8. **Aerospace**: In aerospace, FDM is used to manufacture lightweight parts, complex geometries, and prototypes of aircraft components. It contributes to cost reduction, faster production cycles, and weight savings in aerospace engineering.
9. **Architecture**: Architects utilize FDM for creating detailed architectural models, prototypes of building components, and intricate designs. It aids in visualizing concepts, testing structural integrity, and communicating design ideas effectively.
Each industry example demonstrates how FDM enhances innovation, accelerates product development, and addresses specific challenges through advanced manufacturing capabilities.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
The DealBook is our annual overview of the Ukrainian tech investment industry. This edition comprehensively covers the full year 2023 and the first deals of 2024.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
How RPA Help in the Transportation and Logistics Industry.pptx
Survey of Security and Privacy Issues of Internet of Things
1. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290
2372
Survey of Security and Privacy Issues of
Internet of Things
*
TuhinBorgohain
Department of Instrumentation Engineering, Assam Engineering College, Guwahati-13
Email: borgohain.tuhin@gmail.com
Uday Kumar
Delivery Manager, Tech Mahindra Limited, India
Email: udaykumar@techmahindra.com
Sugata Sanyal
Corporate Technology Office, Tata Consultancy Services, Mumbai, India
Email: sugata.sanyal@tcs.com
* Corresponding author
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis
of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is
focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No
countermeasure to the security drawbacks has been analyzed in the paper.
Keywords –Denial of Service, RFID, WSN, Internet of Things, DDoS Attack
-----------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: January 10, 2015 Date of Acceptance: January 19, 2015
-----------------------------------------------------------------------------------------------------------------------------------------------------
1. Introduction
Building upon the concept of Device to Device (D2D)
communication technology of Bill Joy [1], Internet of
Things (IoT) embodies the concept of free flow of
information amongst the various embedded computing
devices using the internet as the mode of
intercommunication. The term “Internet of Things” was first
proposed by Kevin Ashton in the year 1982 [2]. With the
aim of providing advanced mode of communication between
the various systems and devices as well as facilitating the
interaction of humans with the virtual environment, IoT
finds its application in almost anyfield. But as with all things
using the internet infrastructure for information exchange,
IoT to is susceptible to various security issues and has some
major privacy concerns for the end users. As such IoT, even
with all its advanced capabilities in the information
exchange area, is a flawed concept from the security
viewpoint and proper steps has to be taken in the initial
phase itself before going for further development of IoT for
an effective and widely accepted adoption.
2. OVERVIEW
In section 3 of this paper we discuss the various
communication technologies using theInternet infrastructure
for the exchange of information. In section 4, we do a
survey of all the security issues plaguing the Internet of
Things as well as the pervading privacy issues faced by the
end users of technologies utilizing the advanced information
sharing architecture of IoT. In section 5, we conclude our
paper with a proposal for the necessary steps to be taken for
addressing all the security issues of IoT.
3. CONNECTIVITYTECHNOLOGIES AND
INTERACTION AMONGST VARIOUS
INTERNET OF THINGS (IoT) DEVICES
The automatic exchange of information between two
systems or two devices without any manual input is the
main objective of the Internet of Things. This automated
information exchange between two devices takes place
through some specific communication technologies, which
are described below.
3.1 Wireless Sensor Networks (WSN)
As described in [3], WSN are compositions of
independent nodes whose wireless communication takes
place over limited frequency and bandwidth. The
communicating nodes of a typical wireless sensor network
consist of the following parts:
i. Sensor
ii. Microcontroller
iii. Memory
iv. Radio Transceiver
v. Battery
Due to the limited communication range of each sensor
node of a WSN, multi-hop relay of information take place
between the source and the base station. The required data is
collected by the wireless sensors through collaboration
amongst the various nodes, which is then sent to the sink
node for directed routing towards the base station. The
communication network formed dynamically by the use of
wireless radio transceivers facilitates data transmission
between nodes. Multi-hop transmission of data demands
different nodes to take diverse traffic loads [2].
3.2 Radio Frequency Identification (RFID)
In context to the Internet of Things (IoT), RFID
technology is mainly used in information tags interacting
with each other automatically.RFID tags use radio
2. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290
2373
frequency waves for interacting and exchanging information
between one another with no requirement for alignment in
the same line of sight or physical contact. It uses the
wireless technology of Automatic Identification and Data
Capture (AIDC) [23]. A RFID is made up of the following
two components [2]:
3.2.1 RFID tags (Transponders)
In a RFID tag, an antenna is embedded in a microchip.
The RFID tag also consists of memory units, which houses a
unique identifier known as Electronic Product Code (EPC).
The function of the EPC in each tag is to provide a universal
numerical data by which a particular tag is recognized
universally.
As per the classification in [2], thetypes of RFID tags are:
i.Active tag: This type of tag houses a battery internally,
which facilitates the interaction of its unique EPC with its
surrounding EPCs remotely from a limited distance.
ii. Passive tag: In this type of tag, the information relay
of its EPC occurs only by its activation by a transceiver
from a pre-defined range of the tag. The lack of an internal
battery in the passive tags is substituted by its utilization of
the electromagnetic signal emitted by a tag reader through
inductive coupling as a source of energy. (For details about
the utilization of external sources of energy in a passive tag,
readers can refer to [4]).
A RFID tag operates in conjunction with a tag reader,
the EPC of the former being the identifying signature of a
particular tag under the scan of the latter.
3.2.2 RFID readers (Transceivers)
The RFID reader functions as the identification detector
of each tag by its interaction with the EPC of the tag under
its scan.
More information on the working technologies behind
RFID can be found in [6].
4. SECURITY ISSUES AND PRIVACYCONCERNS
Despite the immense potential of IoT in the various
spheres, the whole communication infrastructure of the IoT
is flawed from the security standpoint and is susceptible to
loss of privacy for the end users. Some of the most
prominent security issues plaguing the entire developing IoT
system arise out of the security issues present in the
technologies used in IoT for information relay from one
device to another. As such some of the prominent security
issues stemming out from the communication technology
are the following:
4.1 Security issues in the wireless sensor networks (WSNs):
The hierarchical relationship of the various security issues
plaguing the wireless sensor network is shown in Figure 1.
The oppressive operations that can be performed in a
wireless sensor network can be categorized under three
categories [7]:
i. Attacks on secrecy and authentication
ii. Silent attacks on service integrity
iii.Attacks on network availability: The denial of
service (DoS) ([16], [17]) attack falls under this category.
This prevention of accessibility of information to legitimate
users by unknown third party intruders can take place on
different layers of a network [8],[14],[15]:
4.2 DoS attack on the physical layer:
The physical layer of a wireless sensor network carries out
the function of selection and generation of carrier frequency,
modulation and demodulation, encryption and decryption,
transmission and reception of data [19]. This layer of the
wireless sensor network is attacked mainly through
i. Jamming: In this type of DoS attack occupies the
communication channel between the nodes thus
preventing them from communicating with each other.
ii. Node tampering: Physical tampering of the node to
extract sensitive information is known as node tampering.
4.3 DoS attack on the link layer:
The link layer of WSN multiplexes the various data streams,
provides detection of data frame, MAC and error control.
Moreover the link layer ensures point-point or point-
multipoint reliability [20]. The DoS attacks taking place in
this layer are:
i. Collision: This type of DoS attack can be initiated when
two nodes simultaneously transmit packets of data on the
same frequency channel. The collision of data packets
results in small changes in the packet results in
identification of the packet as a mismatch at the receiving
end. This leads to discard of the affected data packet for
re-transmission [22].
ii. Unfairness: As described in [22], unfairness is a
repeated collision based attack. It can also be referred to
as exhaustion based attacks.
iii. Battery Exhaustion: This type of DoS attack causes
unusually high traffic in a channel making its accessibility
very limited to the nodes. Such a disruption in the channel
is caused by a large number of requests (Request To
Send) and transmissions over the channel.
4.4 DoS attack on the network layer:
The main function of the network layer of WSN is routing.
The specific DoS attacks taking place in this layer are:
i. Spoofing, replaying and misdirection of traffic.
ii. Hello flood attack: This attack causes high traffic in
channels by congesting the channel with an unusually
high number of useless messages. Here a single malicious
node sends a useless message which is then replayed by
the attacker to create a high traffic.
iii. Homing: In case of homing attack, a search is made in
the traffic for cluster heads and key managers which have
the capability to shut down the entire network.
iv. Selective forwarding: As the name suggests, in
selective forwarding, a compromised node only sends a
selected few nodes instead of all the nodes. This selection
of the nodes is done on the basis of the requirement of the
attacker to achieve his malicious objective and thus such
nodes does not forward packets of data.
v. Sybil: In a Sybil attack, the attacker replicates a single
node and presents it with multiple identities to the other
nodes.
vi. Wormhole: This DoS attack causes relocation of bits
of data from its original position in the network.This
relocation of data packet is carried out through tunnelling
of bits of data over a link of low latency.
vii. Acknowledgement flooding: Acknowledgements are
required at times in sensor networks when routing
algorithms are used. In this DoS attack, a malicious node
spoofs the Acknowledgements providing false
information to the destined neighboring nodes
3. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015
Figure 1 - Hierarchical
Figure 2 - Types of Denial o
s
5) ISSN: 0975-0290
diagram of security issues in Wireless Sensor Network
of Attack in Wireless Sensor Network
2374
k
4. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290
2375
4.4 DoS attack on the transport layer:
This layer of the WSN architecture provides reliability of
data transmission and avoids congestion resulting from high
traffic in the routers. The DoS attacks in this layer are:
i. Flooding: It refers to deliberate congestion of
communication channels through relay of unnecessary
messages and high traffic.
ii. De-synchronization: In de-synchronization attack, fake
messages are created at one or both endpoints requesting
retransmissions for correction of non-existent error. This
results in loss of energy in one or both the end-points in
carrying out the spoofed instructions.
4.5 DoS attack on the application layer:
The application layer of WSN carries out the responsibility
of traffic management. It also acts as the provider of
software for different applications which carries out the
translation of data into a comprehensible form or helps in
collection of information by sending queries [20]. In this
layer, a path-based DoS attack is initiated by stimulating the
sensor nodes to create a huge traffic in the route towards the
base station [21], [22].
Figure 2 shows all the above mentioned DoS attacks
in the different layers of a wireless sensor network.
Some additional DoS attacks are as follows [7], [14],
[15], [36]:
i. Neglect and Greed Attack
ii. Interrogation
iii. Black Holes
iv. Node Subversion
v. Node malfunction
vi. Node Outage
vii. Passive Information Gathering
viii. False Node
ix. Message Corruption
Some of the other security and privacy issues in a WSN
are [7], [9], [10]:
i. Data Confidentiality
ii. Data Integrity
iii. Data Authentication
iv. Data Freshness
v. Availability
vi. Self-Organization
vii. Time Synchronization
viii. Secure Localization
ix. Flexibility
x. Robustness and Survivability
According to [26], the threats looming over WSN can
further be classified as follows:
i. External versus internal attacks
ii. Passive versus active attacks
iii. Mote-class versus laptop-class attacks
According to [12], the attacks on WSN can be classified
as:
i. Interruption
ii. Interception
iii. Modification
iv. Fabrication
The attacks on WSN can further be classified as:
i. Host-based attacks
ii. Network-based attacks
4.6 Security issues in RFID technology
In context to IoT, RFID technology is mainly used as
RFID tags for automated exchange of information without
any manual involvement. But the RFID tags are prone to
various attacks from outside due to the flawed security
status of the RFID technology. The four most common types
of attacks and security issues of RFID tags ([25], [35]) are
shown in Figure 3 which are as follows:
i. Unauthorized tag disabling (Attack on authenticity):
The DoS attacks in the RFID technology leads to
incapacitation of the RFID tags temporarily or
permanently. Such attacks render a RFID tag to
malfunction and misbehave under the scan of a tag reader,
its EPC giving misinformation against the unique
numerical combination identity assigned to it. These DoS
attacks can be done remotely, allowing the attacker to
manipulate the tag behavior from a distance.
ii. Unauthorized tag cloning (Attack on integrity): The
capturing of the identification information (like its EPC)
esp. through the manipulation of the tags by rogue readers
falls under this category. Once the identification
information of a tag is compromised, replication of the
tag (cloning) is made possible which can be used to
bypass counterfeit security measures as well as
introducing new vulnerabilities in any industry using
RFID tags automatic verification steps [35].
iii. Unauthorized tag tracking (Attack on
confidentiality): A tag can be traced through rogue
readers, which may result in giving up of sensitive
information like a person’s address. Thus from a
consumer’s viewpoint, buying a product having an RFID
tag guarantees them no confidentiality regarding the
purchase of their chase and infact endangers their privacy.
iv. Replay attacks (Attack on availability): In this type
of impersonation attacks the attacker uses a tag’s response
to a rogue reader’s challenge to impersonate the tag [25].
In replay attacks, the communicating signal between the
reader and the tag is intercepted, recorded and replayed
upon the receipt of any query from the reader at a later
time, thus faking the availability of the tag.
Besides this category, some prominent security
vulnerabilities of RFID technologies are [35]:
i. Reverse Engineering
ii. Power Analysis
iii. Eavesdropping
iv. Man-in-the-middle attack
v. Denial of Service (DoS)
vi. Spoofing
vii. Viruses
viii. Tracking
ix. Killing Tag Approach
5. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015
4.7 Security issues in health-related tec
upon the concept of IoT:
Advances and convergence of engineerin
has paved the way for wearable health mon
which can constantly stream and share the inf
the sensor of the health monitor with othe
social network over the internet (The impl
social connectivity with the sensor data can be
[30] and [31]). The implementation of automa
of data by the sensors and uploading it to the
networks through a web server introduce
vulnerability in the whole data transmission
the monitor to the Internet. On the basis of it
(FITBIT), the authors of ([27], [32]) have r
following as the main security vulnerability
monitoring devices working in synchroniza
Internet:
i. Clear text login information: During
account linked with the health monitorin
authenticated password of the user is registe
server in clear text which is then recorded in
gives way to loss of secured login by making
available easily through the log files.
ii. Clear text HTTP data processing: The
sent to the web servers as plain HTTP instru
additional security or encryption. Such unpr
instructions can be easily intercepted for gai
various functions of a user account linked
monitoring device.
From the above mentioned vulnerabili
that the security measures implemented in the
technologies which are socially connected ov
lack the proper measures to address all the pr
of the end users and puts the users at ris
valuable information about their health
personnel with malicious intents.
Based on the above-mentioned security flaw
security and privacy issues present themselves
Internet of Things. A few of themare:
i. Theft of sensitive information like ba
ii. Easy accessibility to personal details
address, contact number etc.
iii. It may lead to open access to
information like financial status of an i
iv. An attack on any one device may co
integrity of all the other connected dev
interconnectivity has a huge drawback
s
5) ISSN: 0975-0290
hnologies built
g with biology
itoring devices
formation from
er devices and
lementation of
e found in [28],
atic collection
e various social
es some high
n process from
ts target device
recognized the
in such health
ation with the
g login to the
ng device, the
red in the web
n log files. This
g the password
e sensor data is
uctions with no
rotected HTTP
ining access to
to the health-
ties it is clear
e health-related
ver the internet
rivacy concerns
sk of exposing
to unknown
ws, many other
s in the field of
ank password
s likes contact
o confidential
institution
ompromise the
vices. Thus the
as a single
security failure can disrupt a
devices.
v. The reliance on the Internet m
architecture susceptible to virus
and most of the other security
with any Internet connected com
5. CONCLUSION
In this paper we have surveyed a
existing in the Internet of Things that
detrimental in the development and im
in the different fields. So adoptio
measures ([18], [24], [29], [34]) c
detailed security flawas well as imple
intrusion detection systems ([11], [33
stenographic security measures ([5]
exchange process and using of e
communication ([13]) will result in a m
IoT infrastructure. In conclusion, we
that more effort on development of sec
existing IoT infrastructure before
development of new implementation
daily life would prove to be a more f
method.
REFERENCES
[1] Jason Pontin: “ETC: Bill Joy's
Technology Review, 29 Septemb
November 2013.
[2] Shen, Guicheng, and Bingwu
technologies, applications and
Internet of Things." E-Business
(ICEE), 2011 International Confe
[3] Akyildiz, I.F. ; Georgia Inst. of T
USA ; Weilian Su ; Sankarasubra
E"A survey on sensor netwo
magazine, IEEE 40.8 (2002): 102
[4] Z.G. Prodanoff, Optimal frame si
slotted ALOHA based RFID
Communications (2009),
1016/j.comcom.2009.11.007.
[5] Dey, Sandipan, Ajith Abraham
"An LSB Data Hiding Tech
Numbers." Information Assuranc
IAS 2007. Third International
2007.
[6] Rolf Clauberg. RFID and Sen
Sensor/Actuator to Business
Workshop, University of St.
September 27, 2004.
Figure 3 – Security Issues in RFID
2376
an entire network of
makes the entire IoT
s attack, worm attack
drawbacks that comes
mputing device etc.
all the security flaws
may prove to be very
mplementation of IoT
n of sound security
countering the above
ementation of various
3]), cryptographic and
) in the information
fficient methods for
more secure and robust
would like to suggest
cured measures for the
going for further
n methods of IoT in
fruitful and systematic
Six Webs”. In: MIT
er 2005. Retrieved 17
Liu. "The visions,
d security issues of
s and E-Government
ference on.IEEE, 2011.
Technol., Atlanta, GA,
amaniam, Y. ; Cayirci,
orks." Communications
2-114.
ize analysis for framed
networks, Computer
doi: 10.
, and Sugata Sanyal.
hnique Using Prime
ce and Security, 2007.
Symposium on.IEEE,
nsor Networks: From
Application, RFID
Gallen, Switzerland,
6. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290
2377
[7] AashimaSingla, RatikaSachdeva, “Review on Security
Issues and Attacks in Wireless Sensor Networks”
International Journal of Advanced Research in
Computer Science and Software Engineering
<www.ijarcsse.com>. Volume 3, Issue 4, April 2013
ISSN: 2277 128X.
[8] Sen, Jaydip. "Security and privacy challenges in
cognitive wireless sensor networks." arXiv preprint
arXiv: 1302.2253 (2013).
[9] G. Bianchi, “A comparative study of the various
security approaches used in wireless sensor networks,”
International Journal of Advanced Science and
Technology, vol. 17, (2010)April, pp. 31-44.
[10] T. A. Zia, “A Security Framework for Wireless Sensor
Networks”,http://ses.library.usyd.edu.au/bitstream/212
3/2258/4/02whole.pdf, (2008).
[11] Bhattasali, Tapalina, Rituparna Chaki, and Sugata
Sanyal. "Sleep Deprivation Attack Detection in
Wireless Sensor Network." arXiv preprint arXiv:
1203.0231(2012).
[12] Xiangqian Chen, Kia Makki, Kang Yen, NikiPissinou,
“Sensor network security: a survey” IEEE
Communications Surveys and Tutorials 01/2009;
11:52-73. DOI: 10.1109/SURV.2009.090205
[13] Roy, Bibhash, Suman Banik, Parthi Dey, Sugata Sanyal
and Nabendu Chaki, "Ant colony based routing for
mobile ad-hoc networks towards improved quality of
services." Journal of Emerging Trends in Computing
and Information Sciences 3.1 (2012): 10-14.
[14] M. Saxena,“Security in Wireless Sensor Networks-A
Layer based classification”, Technical Report, Center
for Education and Research in Information Assurance
&Security-CERIAS, Purdue University.
pages.cs.wisc.edu/~msaxena/papers/2007-04-
cerias.pdf, (2007).
[15] J. Sen, “A Survey on Wireless Sensor network
Security”, International Journal of Communications
Network and Information Security, vol. 1, no. 2, (2009)
August, pp. 59-82.
[16] M. Sharifnejad, M. Shari, M. Ghiasabadi and S.
Beheshti, “A Survey on Wireless Sensor Networks
Security”, SETIT, (2007).
[17] B. T. Wang and H. Schulzrinne, “An IP traceback
mechanism for reflective DoS attacks”, Canadian
Conference on Electrical and Computer Engineering,
vol. 2, (2004)May 2-5, pp. 901-904.
[18] VipulGoyal, Virendra Kumar, Mayank Singh, Ajith
Abraham and Sugata Sanyal: A New Protocol to
Counter Online Dictionary Attacks, Computers and
Security, Volume 25, Issue 2, pp. 114-120, Elsevier
Science, March, 2006. This paper is now listed in the
top 25 articles of the COMPUTER SCIENCE
(Computer and Security)
[19]http://sensors-and-networks.blogspot.in/2011/08
/physical-layer-for-wireless-sensor.html
[20]Ahmad Abed AlhameedAlkhatib, and Gurvinder Singh
Baicher. "Wireless sensor network
architecture." International conference on computer
networks and communication systems (CNCS 2012)
IPCSIT.Vol. 35. 2012, pp. 11-15.
[21] Al-Sakib Khan Pathan, "Denial of Service in Wireless
Sensor Networks: Issues and Challenges", Advances in
Communications and Media Research, Vol. 6 (Edited
by Anthony V. Stavros), ISBN: 978-1-60876-576-8,
Nova Science Publishers, Inc., USA, 2010.
[22] Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta,
Neha Garg, "Analysis of Denial of Service (DoS)
Attacks in Wireless Sensor Networks" IJRET:
International Journal of Research in Engineering and
Technology;eISSN: 2319-1163 | pISSN: 2321-7308
[23] Khoo, Benjamin. "RFID as an enabler of the internet of
things: issues of security and privacy." Internet of
Things (iThings/CPSCom), 2011 International
Conference on and 4th International Conference on
Cyber, Physical and Social Computing. IEEE, 2011.
[24] VipulGoyal, Ajith Abraham, Sugata Sanyal and Sang
Yong Han, “The N/R One Time Password System.”
Information Assurance and Security Track (IAS'05),
IEEE International Conference on Information
Technology: Coding and Computing (ITCC'05), USA,
April, 2005. pp 733-738, IEEE Computer Society.
[25] Burmester, Mike, and Breno De Medeiros. "RFID
security: attacks, countermeasures and
challenges." The 5th RFID Academic Convocation,
The RFID Journal Conference. 2007.
[26] C. Karlof and D. Wagner, “Secure Routing in Sensor
Networks: Attacks and Countermeasures”,
Elsevier’sAdHoc Networks Journal, Special Issue on
Sensor Network (SNPA), (2003)September, pp. 293-
315.
[27] Zhou, Wei, and Selwyn Piramuthu. "Security/privacy
of wearable fitness tracking IoT devices." Information
Systems and Technologies (CISTI), 2014 9th Iberian
Conference on. IEEE, 2014.
[28] Aggarwal, Charu C., and TarekAbdelzaher.
"Integrating sensors and social networks." Social
Network Data Analytics.Springer US, 2011. 379-412.
[29] VipulGoyal, Virendra Kumar, Mayank Singh, Ajith
Abraham and Sugata Sanyal, CompChall: Addressing
Password Guessing Attacks Information Assurance
and Security Track (IAS'05), IEEE International
Conference on Information Technology: Coding and
Computing (ITCC'05), USA. April 2005, pp 739-744,
IEEE Computer Society.
[30] W. Drira, Renault, E., Zeghlache, D. “Towards a
Secure Social Sensor Network.” Proceedings of the
IEEE International Conference on Bioinformatics and
Biomedicine, pp. 24-29, 2013.
[31] N. Eagle, Pentland, A., and Lazer, D. “Inferring Social
Network Structure using Mobile Phone Data.”
Proceedings of the National Academy of Sciences
(PNAS), 2009. vol. 106 no. 36 Nathan Eagle, 15274–
15278, doi: 10.1073/pnas.0900282106
[32] M. Rahman, Carbunar, B., Banik, M. 2013. “Fit and
Vulnerable: Attacks and Defenses for a Health
Monitoring Device.” 34th IEEE Symposium on
Security and Privacy (IEEE S&P), 2013
[33] Animesh Kr Trivedi, Rishi Kapoor, Rajan Arora, Sudip
Sanyal and Sugata Sanyal, “RISM - Reputation Based
Intrusion Detection System for Mobile Ad hoc
Networks”, Third International Conference on
Computers and Devices for Communications,
CODEC-06, pp. 234-237. Institute of Radio Physics
and Electronics, University of Calcutta, December 18-
20, 2006, Kolkata, India
7. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2372-2378 (2015
[34]R. A. Vasudevan, A. Abraham, S. San
Agrawal, “Jigsaw-based Secure Data
Computer Networks,” IEEE Internation
on Information Technology: Coding an
2004. (ITCC ’04), Proceedings of ITCC
pp 2-6, April, 2004, Las Vegas, Nevada.
[35] Xiao, Qinghan, Thomas Gibbons, and
"RFID Technology, Security Vulner
Countermeasures." Supply Chain the
Organization, Publisher-Intech (2009): 3
[36] G. Padmavathi, and D. Shanmugapriya
attacks, security mechanisms and
wireless sensor networks." arXiv pr
0909.0576(2009).
Authors Biography
Tuhin Borgohain is a 3rd
Ye
Assam Engineering College, G
presently pursuing his
Engineering degree in the
Instrumentation Engineering.
Uday Kumar is working
Manager at Tech Mahindra L
has 17 years of experience
large complex software system
like Citibank, FIFA, Apple C
AT&T. He has developed p
performance testing, compilers. And have su
projects in finance, content management an
domain. He has participated in many ca
program and conducted workshop on soft
skills improvement for industrial strength
evangelizing tools and methodology for secur
programming.
Sugata Sanyal is presently
Research Advisor to th
Technology Office, Tata
Services, India. He was w
Institute of Fundamental Rese
2012. Prof. Sanyal is a
Scientific Consultant to the International Re
Study of Intelligence of Biological and Artif
System, Bucharest, Romania;Member, "Bra
advisory group to faculty members at t
Computing and Informatics, University of
Lafayette's Ray P. Authement College of Scie
honorary professor in IIT Guwahati and Me
Indian Institute of Guwahati, India. Prof
published many research papers in internation
in International Conferences worldwide: topic
network security to intrusion detection system
s
5) ISSN: 0975-0290
nyal and D. P.
Transfer over
nal Conference
nd Computing,
C 2004, Vol. 1,
Hervé Lebrun.
rabilities, and
Way to Flat
357-382.
. "A survey of
challenges in
reprint arXiv:
ear student of
Guwahati. He is
Bachelor of
department of
as Delivery
Ltd, India. He
in engineering
m for customers
Computers and
roducts in BI,
uccessfully led
nd ecommerce
ampus connect
tware security,
programming,
re and high end
acting as a
he Corporate
Consultancy
with the Tata
earch till July,
a:Distinguished
esearch Group:
ficial Complex
ain Trust," an
the School of
f Louisiana at
ences, USA; an
ember, Senate,
f. Sanyal has
nal journals and
cs ranging from
m and more.
2378