Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
Whitepaper - Software Defined Networking for the Telco Industry
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
Sbvlc secure barcode based visible light communication for smartphones
This document summarizes a research paper that proposes SBVLC, a secure system for barcode-based visible light communication between smartphones. It analyzes the security of transmitting barcode streams between device screens and cameras. Three secure data exchange schemes are developed to encode information in barcode streams. The system achieves high security and throughput comparable to NFC. It can enable private information sharing, secure device pairing and contactless payments. Rigorous geometric models were used to examine the system's security, making it the first work to formally study security of VLC and barcode communication between smartphones.
This document discusses network security and cryptography. It begins by introducing network security concepts like secrecy, authentication, nonrepudiation, and integrity. It then discusses cryptography topics such as symmetric and public key encryption. Specific algorithms like RSA are explained. The document also discusses security issues at different layers of the network and summarizes techniques used at each layer.
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
This document summarizes a research paper on enhancing RFID security and privacy through location sensing. It discusses how location awareness can be used by RFID tags and backend servers to defend against unauthorized reading and relay attacks. On tags, a location-aware selective unlocking mechanism is designed to allow tags to selectively respond based on location rather than always responding. On servers, a location-aware secure transaction verification scheme is proposed to allow servers to approve or deny transactions based on comparing the reported locations of the tag and reader. The goal is to detect relay attacks involving malicious readers. Unlike prior work, the defenses do not rely on auxiliary devices and require no explicit user involvement.
Instant Messenger (IM) becomes one of the most popular applications in mobile technology and
communication. A lot of users around the world installed it for daily activities. Current IM found security
lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient
method in authentication and encryption process, conventional security methods and client-server
architecture system have to risk too many users for attacking server such as compromising, cracking
password or PINs by Unauthorized people. Common IM services lack native encryption to protect
information being transmitted over the public network and still used high computation in the mobile
environment, this problem needs efficient security methods. Then, in public IM also found various
messages with fake users, it occurs because public IM carry out the separate system in authentication and
encryption process, strong authentication need to solve this issue in messenger environment. The
tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes
a new efficient method for securing message both in encryption and authentication within the end-to-end
model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in
Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method
produces efficient time in authentication and encryption process while applying in a mobile environment.
Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and
resources.
Ransomware protection in loT using software defined networking IJECEIAES
- The document proposes a ransomware protection method for IoT devices using software defined networking (SDN). It first discusses the growth of ransomware attacks and types of ransomware that have emerged. It then highlights how ransomware poses a threat to IoT due to IoT's limited resources and connectivity of devices.
- The proposed method uses an SDN gateway to monitor incoming IoT traffic. It employs policies defined in the SDN controller to detect and mitigate ransomware in the IoT environment. The performance of the proposed system is evaluated and compared to relevant existing methods. Enhancements to the solution are also discussed.
- The key contribution is a SDN-based ransomware detection and prevention solution tailored for
Efficient Data Security for Mobile Instant MessengerPutra Wanda
This document proposes an efficient security method for mobile instant messengers. It suggests using elliptic curve cryptography algorithms for authentication and encryption in a peer-to-peer architecture rather than a client-server model. The proposed method generates key pairs for each communication session to sign and encrypt messages efficiently. It is designed to be compatible with mobile devices and improve upon existing methods that lack encryption or have high computational requirements. The document outlines the security model and describes algorithms for encryption, decryption, signing and verifying messages that could provide secure communication for mobile instant messaging applications.
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
Sbvlc secure barcode based visible light communication for smartphones
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
This document proposes an architecture called a pervasive public key infrastructure (pervasive-PKI) to provide authentication and authorization for mobile users across heterogeneous networks. The pervasive-PKI allows credential validation when centralized PKI services are unavailable due to disconnection or limited device capabilities. It includes three software components installed on user devices: 1) a Pervasive Trust Management component that handles trust information and certificate validation, 2) a Privilege Verifier that validates attribute certificates, and 3) an Access Control Engine that makes access decisions based on the other components. These components allow credential validation, authentication, and authorization to occur even when global connectivity and centralized services are lost.
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
This document summarizes a research paper that proposes SBVLC, a secure system for barcode-based visible light communication between smartphones. It analyzes the security of transmitting barcode streams between device screens and cameras. Three secure data exchange schemes are developed to encode information in barcode streams. The system achieves high security and throughput comparable to NFC. It can enable private information sharing, secure device pairing and contactless payments. Rigorous geometric models were used to examine the system's security, making it the first work to formally study security of VLC and barcode communication between smartphones.
This document discusses network security and cryptography. It begins by introducing network security concepts like secrecy, authentication, nonrepudiation, and integrity. It then discusses cryptography topics such as symmetric and public key encryption. Specific algorithms like RSA are explained. The document also discusses security issues at different layers of the network and summarizes techniques used at each layer.
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...pharmaindexing
This document summarizes a research paper on enhancing RFID security and privacy through location sensing. It discusses how location awareness can be used by RFID tags and backend servers to defend against unauthorized reading and relay attacks. On tags, a location-aware selective unlocking mechanism is designed to allow tags to selectively respond based on location rather than always responding. On servers, a location-aware secure transaction verification scheme is proposed to allow servers to approve or deny transactions based on comparing the reported locations of the tag and reader. The goal is to detect relay attacks involving malicious readers. Unlike prior work, the defenses do not rely on auxiliary devices and require no explicit user involvement.
Qualitative Assessment on Effectiveness of Security Approaches towards Safegu...IJECEIAES
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between userexperience and security demands exists. The Near Field Communication or NFC is one such communication trend which is effectively adopted by the user worldwide to make touchless operation using their mobile device. Although, it is claimed that NFC incorporates some of the standard encryption but existing researchers fails to prove that their electromagnetic signals are snot so difficult to compromise to result in collateral damage to user's resources. Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency. This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
As a high
-
speed internet foundation is being developed and people are informationized, most
of the tasks are engaged in internet field so there is
a risk that any private data like personal information or
applications for managing money can be wiretapped or eavesdropped. The consolidation of One Time
Passwords (OTPs) and Hash encryption algorithms are used to evolve a more secured password
-
protected
web sites and data storage systems. The new outlined scheme had higher security, small system overhead
and is easy to implement.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
Recently secure device pairing has had significant attention from a wide community of academic as well as industrial researchers and a plethora of schemes and protocols have been proposed, which use various forms of out-of-band exchange to form an association between two unassociated devices. These protocols and schemes have different strengths and weaknesses – often in hardware requirements, strength against various attacks or usability in particular scenarios. From ordinary user’s point of view, the problem then becomes which to choose or which is the best possible scheme in a particular scenario. We advocate that in a world of modern heterogeneous devices and requirements, there is a need for mechanisms that allow automated selection of the best protocols without requiring the user to have an in-depth knowledge of the minutiae of the underlying technologies. Towards this, the main argument forming the basis of this research work is that the integration of a discovery mechanism and several pairing schemes into a single system is more efficient from a usability point of view as well as security point of view in terms of dynamic choice of pairing schemes. In pursuit of this, we have proposed a generic system for secure device pairing by demonstration of physical proximity. The contributions presented in this paper include the design and prototype implementation of the proposed framework along with a novel Co-Location protocol.
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKijesajournal
This document compares and evaluates digital signature schemes used in Named Data Networking (NDN). It discusses RSA and ECDSA signature algorithms, which are commonly used in NDN to ensure data integrity. RSA uses integer factorization while ECDSA uses elliptic curve cryptography. ECDSA typically requires smaller key sizes than RSA to achieve the same security level, making it more suitable for devices with limited resources. The document analyzes the key generation, signing, and verification procedures of RSA and ECDSA digital signature schemes and suggests ECDSA may be a better option for constrained environments like smartphones.
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
2014 2015 ieee android project titles,2014 - 2015 ieee project list for free...Papitha Velumani
To get more details about projects contact us at
Contact: PAPITHA VELUMANI.
Mobile: (0)9095395333
No 165, 5th Street Cross cut Road,
Gandhipuram, Coimbatore – 641 012
Web: www.lansainformatics.com | Blog: www.lansastudentscdc.blogspot.com
Email: lansa.projects@gmail.com
1 importance of light weight authentication in iotChintan Patel
1. The document summarizes key concepts related to Internet of Things (IoT) including definitions of IoT, the layered architecture of IoT, and security challenges in IoT.
2. It discusses IoT authentication approaches including device-to-device and global authentication as well as lightweight cryptography algorithms used for authentication and encryption in resource-constrained IoT devices.
3. The document also covers elliptic curve cryptography and its role in IoT security.
Unauthorized Access Detection in IoT using Canary Token AlgorithmIJSRED
- The document discusses a proposed algorithm called Canary Token Algorithm that can detect unauthorized access in Internet of Things (IoT) systems.
- Canary tokens act as an intrusion detection system and work by being deployed directly on user systems. Even if the server is compromised, canary tokens on user systems can still detect the compromise and warn users.
- The proposed model uses canary tokens that are integrated with an IoT login service. The canary tokens track login requests and trigger warnings to users if any unauthorized access is detected, even if the actual login fails. This provides an additional layer of security and detection when servers may be compromised.
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
This document discusses security challenges related to mobile and wireless devices. It covers the proliferation of these devices and trends in mobility. Some key security issues addressed include malware attacks on mobile networks, credit card fraud, and technical challenges like managing registry settings, authentication, cryptography, and securing APIs. The document emphasizes that properly configuring baseline security is important to address many mobile security issues.
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
Abstract Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging
technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a
new mobile payment system using long term evolution direct and its features. A sensitive mobile payment system would require
high security requirements in order to be trusted by the users and the businesses. These requirements are taken into account in
our proposed system design and solutions to security considerations are provided. The system’s security and usability features are
designed for implementation from physical to application layer to address the identified issues. Within the scope of this work, we
provided the conceptual design solutions to allow the system to be as solid and secure as possible while they are convenient
enough not to degrade user’s experience when using the system.
Keywords: LTE Direct, Mobile Payment, Internet of Things, Device-To-Device Networking
The document discusses the challenges of securing the growing Internet of Things (IoT) landscape. As more devices connect to networks, traditional security methods like public key infrastructure (PKI) are struggling to keep up. The IoT incorporates a wide variety of devices with differing capabilities, requiring tailored security solutions. Omlis' technology is presented as uniquely suited to provide encryption, authentication, and key management on resource-constrained devices through its software-defined, mobile-first approach. This enables more robust security for remote updates, mobile access, and data transmission in sectors like automotive, healthcare, and industrial applications.
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
The document discusses the challenges of securing the growing Internet of Things (IoT) landscape. As more devices connect to networks, traditional security methods like public key infrastructure (PKI) are struggling to keep up. The IoT incorporates a wide variety of devices with differing capabilities, requiring tailored security solutions. Omlis' technology is presented as uniquely suited to provide encryption, authentication, and key management on resource-constrained devices through its software-defined, mobile-first approach. This enables more robust security for remote updates, mobile access, and data transmission in sectors like automotive, healthcare, and industrial applications.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
KEY GENERATION FRAMEWORK FOR MULTIPLE WIRELESS DEVICES USING MULTIPATH ROUTINGecij
This document summarizes a research paper on generating secret keys for multiple wireless devices using multipath routing. It proposes a framework that uses AES encryption to generate unique 128-bit keys for each device pair, overcoming issues of limited signal range and centralized networks. The methodology observes devices to compare RSS signals and encrypts keys using AES. Performance analysis shows AES key generation is faster than DES and provides stronger security due to longer, randomly generated keys.
This document discusses the definition, characteristics, architecture, enabling technologies, applications and future challenges of the Internet of Things (IoT). It provides definitions of IoT, describing it as a network that connects physical objects through sensors and allows them to communicate and share data. It outlines the key enabling technologies that make IoT applications possible, such as wireless technologies, microcontrollers, cloud computing and wireless sensor networks. It also discusses some common applications of IoT and future challenges in areas like scalability, interoperability and security.
This document discusses the advantages and disadvantages of e-commerce security. It begins by defining e-commerce security as protecting e-commerce assets from unauthorized access, modification, or deletion according to the CIA model of information security. While e-commerce provides benefits, the growth in its use also increases potential for security exploits and white collar crimes. Some key advantages discussed include flexibility of online payments and convenience for customers. However, fraud is a major risk that companies spend billions to mitigate. The document recommends several security best practices like using antivirus software, shopping at secure websites, using strong unique passwords, and reviewing orders carefully to reduce risks of e-commerce.
A survey study of title security and privacy in mobile systemsKavita Rastogi
This document summarizes security and privacy issues related to mobile systems. It discusses how mobile systems originally focused on securing phone calls but now must address additional challenges due to lost/stolen devices and user expectations of flexibility. The document then examines authentication techniques, security across different network domains, and technologies like encryption, digital rights management, and trusted computing platforms that aim to enhance mobile security. It concludes that secure information transmission will become increasingly important as mobile technologies continue advancing.
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
This document proposes a local security enhancement and intrusion prevention system for Android devices. It summarizes existing host-based intrusion detection systems and behavior-based intrusion prevention systems for Android smartphones. The proposed system uses net flow based clustering to identify anomalies and correlates with host-based features to detect malware intrusions. The goal is to provide versatile security for Android smartphones by detecting a wide range of attacks, including denial of service attacks and probing. The system aims to detect new attacks as well.
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
This document proposes using multifactor authentication and encryption to improve security for IoT devices and cloud storage in smart banking. It discusses challenges with IoT and cloud security and proposes a solution that uses multifactor authentication through a mobile app to access IoT devices and encrypted cloud storage. The multifactor authentication would include passwords, one-time passwords by SMS, and fingerprint biometrics. Data transmitted from IoT devices to the cloud would be encrypted using AES encryption. This approach aims to securely authenticate users and protect sensitive banking and transaction data.
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
This document discusses security challenges in ubiquitous computing environments. It begins by defining ubiquitous computing as involving the integration of computing technology into everyday objects and environments. This allows information access from any device at any time, but also increases security risks. The document then outlines some common ubiquitous applications like smart homes. It identifies key security issues like lack of authentication, unauthorized access, and privacy concerns. Finally, it discusses challenges in ubiquitous security including how the expanded computing environment impacts traditional security methods and introduces new privacy and trust issues.
The document provides an overview of BlackBerry Playbook forensics, including:
1. It discusses the differences between BlackBerry smartphone and Playbook forensics techniques due to the Playbook running on the QNX OS instead of the BlackBerry OS.
2. It describes the Playbook architecture including features like the BlackBerry Bridge and support for Adobe Flash, AIR, and Android apps.
3. It provides details on the QNX Neutrino microkernel and how it supports threads, messaging, and memory protection to improve robustness.
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
The world of smart devices talking to each other—and to us—is well
underway and here to stay. To connect to the Internet of Things
opportunity, it’s key to design and build networking infrastructures that can handle massive amounts of new data.
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the smart devices helps the users in utilize maximized level of comfort for the objective of improving life quality. As the user and smart devices communicate through an insecure channel, the smart home environment is prone to security and privacy problems. A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments. Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication and increases the possibility of lunching the attacks of session key disclosure, impersonation and stolen smart device. In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security. The formal analysis of the proposed SSL-SHAF confirmed better resistance against session key disclosure, impersonation and stolen smart device attacks. The results of SSL-SHAF confirmed minimized computational costs and security compared to the baseline protocols considered for investigation.
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the smart devices helps the users in utilize maximized level of comfort for the objective of improving life quality. As the user and smart devices communicate through an insecure channel, the smart home environment is prone to security and privacy problems. A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments. Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication and increases the possibility of lunching the attacks of session key disclosure, impersonation and stolen smart device. In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security. The formal analysis of the proposed SSL-SHAF confirmed better resistance against session key disclosure, impersonation and stolen smart device attacks. The results of SSL-SHAF confirmed minimized computational costs and security compared to the baseline protocols considered for investigation.
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the smart devices helps the users in utilize maximized level of comfort for the objective of improving life quality. As the user and smart devices communicate through an insecure channel, the smart home environment is prone to security and privacy problems. A secure authentication protocol needs to be established between the smart devices and the user, such that a situation for device authentication can be made feasible in smart home environments. Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication and increases the possibility of lunching the attacks of session key disclosure, impersonation and stolen smart device. In this paper, Secure Supervised Learning-based Smart Home Authentication Framework (SSL-SHAF) is proposed as are liable mutual authentication that can be contextually imposed for better security. The formal analysis of the proposed SSL-SHAF confirmed better resistance against session key disclosure, impersonation and stolen smart device attacks. The results of SSL-SHAF confirmed minimized computational costs and security compared to the baseline protocols considered for investigation.
Demystifying Gateway Devices: The Backbone of Modern NetworkingInfyiot Solutions
In the vast landscape of modern networking, there are numerous devices working behind the scenes to ensure seamless communication between various networks. Among these, Gateway device holds a pivotal position as the backbone of modern networking infrastructure.
Similar to SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE (20)
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
Coins are important part of our life. We use coins in a places like stores, banks, buses, trains
etc. So it becomes a basic need that coins can be sorted, counted automatically. For this, there is
necessary that the coins can be recognized automatically. Automated Coin Recognition System for the
Indian Coins of Rs. 1, 2, 5 and 10 with the rotation invariance. We have taken images from the both
sides of coin. So this system is capable to recognizing coins from both sides. Features are taken from the
images using techniques as a Hough Transformation, Pattern Averaging etc.
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
This document reviews several studies that analyzed the performance of VoIP traffic over WiMAX networks using different VoIP codecs and WiMAX service classes. It summarizes the findings of various papers on how QoS parameters like throughput, delay, jitter compared for codecs like G.711, G.723, G.729 when using the UGS, rtPS, nrtPS and BE service classes. Most studies found that UGS generally performed best for VoIP due to its ability to guarantee bandwidth and minimize jitter and delay, while G.711 typically provided the best voice quality. The document aims to compare the results across different service classes and codecs.
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
The cloud backup is used for the personal storage of the people in terms of reducing the
mainlining process and managing the structure and storage space managing process. The challenging
process is the deduplication process in both the local and global backup de-duplications. In the prior
work they only provide the local storage de-duplication or vice versa global storage de-duplication in
terms of improving the storage capacity and the processing time. In this paper, the proposed system
is called as the ALG- Dedupe. It means the Application aware Local-Global Source De-duplication
proposed system to provide the efficient de-duplication process. It can provide the efficient deduplication process with the low system load, shortened backup window, and increased power
efficiency in the user’s personal storage. In the proposed system the large data is partitioned into
smaller part which is called as chunks of data. Here the data may contain the redundancy it will be
avoided before storing into the storage area.
Aging protocols that could incapacitate the InternetEditor IJMTER
The biggest threat to the Internet is the fact that it was never really designed. For e.g., the
BGP protocol is used by Internet routers to exchange information about changes to the Internet's
network topologies. However, it also is among the most fundamentally broken; as Internet routing
information can be poisoned with bogus routing information. Instead, it evolved in fits and start,
thanks to various protocols that have been cobbled together to fulfill the needs of the moment. Few
of protocols from them were designed with security in mind. or if they were sported no more than
was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging
protocols susceptible to exploit on an Internet scale. Here are six Internet protocols that could stand
to be replaced sooner rather than later or are (mercifully) on the way out.
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
1. The document proposes a design for using wireless sensor networks and cloud computing together for agricultural applications. It describes how sensor nodes can collect environmental data and send it to the cloud for storage, analysis and decision making.
2. The proposed system has three main components - a sensing cluster with various sensors to collect data, a cloud service cluster to process and analyze the data, and a mechanism cluster with actuator nodes that can take actions based on the cloud's decisions.
3. Some potential applications discussed are image processing of unhealthy plants, predicting crop diseases based on sensor readings, and automatically controlling the cultivation environment through actuators. The system is aimed to help farmers optimize resources and increase productivity.
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
Carpooling (also car-sharing, ride-sharing, lift-sharing), is the sharing of car journeys so
that more than one person travels in a car. It helps to resolve a variety of problems that continue to
plague urban areas, ranging from energy demands and traffic congestion to environmental pollution.
Most of the existing method used stochastic disturbances arising from variations in vehicle travel
times for carpooling. However it doesn’t deal with the unmet demand with uncertain demand of the
vehicle for car pooling. To deal with this the proposed system uses Chance constrained
formulation/Programming (CCP) approach of the problem with stochastic demand and travel time
parameters, under mild assumptions on the distribution of stochastic parameters; and relates it with a
robust optimization approach. Since real problem sizes can be large, it could be difficult to find
optimal solutions within a reasonable period of time. Therefore solution algorithm using tabu
heuristic solution approach is developed to solve the model. Therefore, we constructed a stochastic
carpooling model that considers the in- fluence of stochastic travel times. The model is formulated as
an integer multiple commodity network flow problem. Since real problem sizes can be large, it could
be difficult to find optimal solutions within a reasonable period of time.
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
This document discusses the use of foam concrete as a sustainable building material. Foam concrete is produced using cement, fine sand, water, and aluminium powder, which reacts to produce hydrogen gas bubbles that lighten the concrete. It has benefits like lower carbon dioxide emissions in production than traditional concrete, good thermal and sound insulation, fire resistance, and cost-effectiveness. The document reports on tests showing that foam concrete made with quarry dust has higher compressive strength than that made with sand. Strength generally decreases as aluminium powder content increases. Foam concrete is proposed as a sustainable alternative building material.
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
A good education system is required for overall prosperity of a nation. A tremendous
growth in the education sector had made the administration of education institutions complex. Any
researches reveal that the integration of ICT helps to reduce the complexity and enhance the overall
administration of education. This study has been undertaken to identify the various functional areas
to which ICT is deployed for information administration in education institutions and to find the
current extent of usage of ICT in all these functional areas pertaining to information administration.
The various factors that contribute to these functional areas were identified. A theoretical model was
derived and validated.
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
Data partitioning methods are used to partition the data values with similarity. Similarity
measures are used to estimate transaction relationships. Hierarchical clustering model produces tree
structured results. Partitioned clustering produces results in grid format. Text documents are
unstructured data values with high dimensional attributes. Document clustering group ups unlabeled text
documents into meaningful clusters. Traditional clustering methods require cluster count (K) for the
document grouping process. Clustering accuracy degrades drastically with reference to the unsuitable
cluster count.
Textual data elements are divided into two types’ discriminative words and nondiscriminative
words. Only discriminative words are useful for grouping documents. The involvement of
nondiscriminative words confuses the clustering process and leads to poor clustering solution in return.
A variation inference algorithm is used to infer the document collection structure and partition of
document words at the same time. Dirichlet Process Mixture (DPM) model is used to partition
documents. DPM clustering model uses both the data likelihood and the clustering property of the
Dirichlet Process (DP). Dirichlet Process Mixture Model for Feature Partition (DPMFP) is used to
discover the latent cluster structure based on the DPM model. DPMFP clustering is performed without
requiring the number of clusters as input.
Document labels are used to estimate the discriminative word identification process. Concept
relationships are analyzed with Ontology support. Semantic weight model is used for the document
similarity analysis. The system improves the scalability with the support of labels and concept relations
for dimensionality reduction process.
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
There are many algorithms we found for matrices multiplication. Until now it has been
found that complexity of matrix multiplication is O(n3). Though Further research found that this
complexity can be decreased. This paper focus on the algorithm and its complexity of matrices
multiplication methods.
Malware is a worldwide pandemic. It is designed to damage computer systems without
the knowledge of the owner using the system. Software‟s from reputable vendors also contain
malicious code that affects the system or leaks information‟s to remote servers. Malware‟s includes
computer viruses, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware detectors are
the primary tools in defense against malware. The quality of such a detector is determined by the
techniques it uses. It is therefore imperative that we study malware detection techniques and
understand their strengths and limitations. This survey examines different types of Malware and
malware detection methods.
GLAUCOMA is a chronic eye disease that can damage optic nerve. According to WHO It
is the second leading cause of blindness, and is predicted to affect around 80 million people by 2020.
Development of the disease leads to loss of vision, which occurs increasingly over a long period of
time. As the symptoms only occur when the disease is quite advanced so that glaucoma is called the
silent thief of sight. Glaucoma cannot be cured, but its development can be slowed down by
treatment. Therefore, detecting glaucoma in time is critical. However, many glaucoma patients are
unaware of the disease until it has reached its advanced stage. In this paper, some manual and
automatic methods are discussed to detect glaucoma. Manual analysis of the eye is time consuming
and the accuracy of the parameter measurements also varies with different clinicians. To overcome
these problems with manual analysis, the objective of this survey is to introduce a method to
automatically analyze the ultrasound images of the eye. Automatic analysis of this disease is much
more effective than manual analysis.
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
This paper is devoted to the Quasi Z source network based DC Drive. The cascaded
(two-stage) Quasi Z Source network could be derived by the adding of one diode, one inductor,
and two capacitors to the traditional quasi-Z-source inverter The proposed cascaded qZSI inherits all
the advantages of the traditional solution (voltage boost and buck functions in a single stage,
continuous input current, and improved reliability). Moreover, as compared to the conventional qZSI,
the proposed solution reduces the shoot-through duty cycle by over 30% at the same voltage boost
factor. Theoretical analysis of the two-stage qZSI in the shoot-through and non-shoot-through
operating modes is described. The proposed and traditional qZSI-networks are compared. A
prototype of a Quasi Z Source network based DC Drive was built to verify the theoretical
assumptions. The experimental results are presented and analyzed.
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
The paper reflects the spiritual philosophy of Aurobindo Ghosh which is helpful in today’s
education. In 19th century he wrote about spirituality, in accordance with that it is a core and vital part
of today’s education. It is very much essential for today’s kid. Here I propose the overview of that
philosophy.At the utmost regeneration of those values in today’s generation is the great deal with
education system. To develop the values and spiritual education in the youngers is the great moto of
mine. It is the materialistic world and without value redefinition among them is the harder task but not
difficult.
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
The software test coverage is used measure the safety measures. The safety critical analysis is
carried out for the source code designed in Java language. Testing provides a primary means for
assuring software in safety-critical systems. To demonstrate, particularly to a certification authority, that
sufficient testing has been performed, it is necessary to achieve the test coverage levels recommended or
mandated by safety standards and industry guidelines. Mutation testing provides an alternative or
complementary method of measuring test sufficiency, but has not been widely adopted in the safetycritical industry. The system provides an empirical evaluation of the application of mutation testing to
airborne software systems which have already satisfied the coverage requirements for certification.
The system mutation testing to safety-critical software developed using high-integrity subsets of
C and Ada, identify the most effective mutant types and analyze the root causes of failures in test cases.
Mutation testing could be effective where traditional structural coverage analysis and manual peer
review have failed. They also show that several testing issues have origins beyond the test activity and
this suggests improvements to the requirements definition and coding process. The system also
examines the relationship between program characteristics and mutation survival and considers how
program size can provide a means for targeting test areas most likely to have dormant faults. Industry
feedback is also provided, particularly on how mutation testing can be integrated into a typical
verification life cycle of airborne software. The system also covers the safety and criticality levels of
Java source code.
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
The software defect factors are used to measure the quality of the software. The software
effort estimation is used to measure the effort required for the software development process. The defect
factor makes an impact on the software development effort. Software development and cost factors are
also decided with reference to the defect and effort factors. The software defects are predicted with
reference to the module information. Module link information are used in the effort estimation process.
Data mining techniques are used in the software analysis process. Clustering techniques are used
in the property grouping process. Rule mining methods are used to learn rules from clustered data
values. The “WHERE” clustering scheme and “WHICH” rule mining scheme are used in the defect
prediction and effort estimation process. The system uses the module information for the defect
prediction and effort estimation process.
The proposed system is designed to improve the defect prediction and effort estimation process.
The Single Objective Genetic Algorithm (SOGA) is used in the clustering process. The rule learning
operations are carried out sing the Apriori algorithm. The system improves the cluster accuracy levels.
The defect prediction and effort estimation accuracy is also improved by the system. The system is
developed using the Java language and Oracle relation database environment.
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
Software cost estimation is an important task in the software design and development process.
Planning and budgeting tasks are carried out with reference to the software cost values. A variety of
software properties are used in the cost estimation process. Hardware, products, technology and
methodology factors are used in the cost estimation process. The software cost estimation quality is
measured with reference to the accuracy levels.
Software cost estimation is carried out using three types of techniques. They are regression based
model, anology based model and machine learning model. Each model has a set of technique for the
software cost estimation process. 11 cost estimation techniques fewer than 3 different categories are
used in the system. The Attribute Relational File Format (ARFF) is used maintain the software product
property values. The ARFF file is used as the main input for the system.
The proposed system is designed to perform the clustering and ranking of software cost
estimation methods. Non overlapped clustering technique is enhanced with optimal centroid estimation
mechanism. The system improves the clustering and ranking process accuracy. The system produces
efficient ranking results on software cost estimation methods.
Single Phase Thirteen-Level Inverter using Seven Switches for Photovoltaic sy...Editor IJMTER
This paper proposes a single-phase thirteen-level inverter using seven switches, with a
novel pulse width-modulated (PWM) control scheme. The Proposed multilevel inverter output
voltage level increasing by using less number of switches driven by the multicarrier modulation
techniques. The inverter is capable of producing thirteen levels of output-voltage (Vdc, 5/6Vdc,
4/6Vdc, 3/6Vdc, 2/6Vdc, 1/6Vdc, 0, -5/6Vdc, -4/6Vdc, -3/6Vdc, -2/6Vdc, -1/6Vdc,-Vdc) from the
dc supply voltage. A digital multi carrier PWM algorithm was implemented in a Spartan 3E FPGA.
The proposed system was verified through simulation and implemented in a prototype.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
LeetCode Database problems solved using PySpark.pdf
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
1. Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 720
e-ISSN: 2349-9745
p-ISSN: 2393-8161
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION
FOR MOBILE DEVICE
P.Sindhuja1
, S.Uma2
, D.Deepachandra3
, M.Poovizhi3
1,2,3,4
Computer Science and Engineering, Hindustan Institute of Technology
Abstract- Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Keywords- Bluetooth, Authentication, Seeing-is- Believing (SiB), Quick Response Code, Discrete
logarithm problem.
I. INTRODUCTION
1.1 ANDROID
Android is a mobile operating system developed by Google. It is used by several smart phones, such
as the Motorola Droid, the Samsung Galaxy, and Google's own Nexus One. The Android operating
system (OS) is based on the open Linux kernel. Unlike the phone OS, Android is open source,
meaning developers can modify and customize the OS for each phone. Therefore, different Android-
based phones may have different graphical user interfaces GUIs even though they use the same OS.
Android phones typically come with several built-in applications and also support third-party
programs. Developers can create programs for Android using the free Android SDK (Software
Developer Kit). Android programs are written in Java and run through Google's "Davlik" virtual
machine, which is optimized for mobile devices. Users can download Android "apps" from the
online Android Market. Since several manufacturers make Android-based phones, it is not always
easy to tell if a phone is running the Android operating system. If you are unsure what operating
system a phone uses, you can often find the system information by selecting g "About" in the
Settings menu. The name "Android" comes from the term android, which refers to a robot designed
to look and act like a human.
2. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 721`
II. LITERATURE SURVEY
Two entities, who only share a password, and who are communicating over an insecure network,
want to authenticate each other and agree on a large session key to be used for protecting their
subsequent communication. This is called the password-authenticated key exchange problem. If one
of the entities is a user and the other is a server, then this can be seen as a problem in the area of
remote user access. Many solutions for remote user access rely on cryptographically secure keys,
and consequently have to deal with issues like key management, public-key infrastructure, or secure
hardware. Many solutions that are password-based, like telnet or Kerberos, have problems that range
from being totally insecure (telnet sends passwords in the clear) to being susceptible to certain types
of attacks (Kerberos is vulnerable to o®-line dictionary attacks.
A new password-authenticated key exchange protocol called PAK (Password Authenticated Key
exchange) is presented which provides perfect forward secrecy and is proven to be as secure as
Decision Diffie-Hellman in the random oracle model. Compared to the protocol of, PAK (1) does
not require the RSA assumption, (2) has fewer rounds, and (3) is conceptually simpler, with a
simpler proof. Compared to the protocol, PAK does not require an ideal block cipher assumption for
security, but has a more complicated proof.
In the full work, also show how the security of PAK can be related to the Computational Diffie-
Hellman problem. In addition to PAK, also show a more efficient 2 round protocol called PPK
(Password-Protected Key exchange) that is provably secure in the implicit- authentication model.
Then extend PAK to a protocol called PAK-X, in which one side (the client) stores a plaintext
version of the password, while the other side (the server) only stores a verifier for the password.
Formally prove security of PAK-X, even when the server is compromised. Security in this case
refers to an attacker not being able to pose as a client after compromising the server; naturally, it
would be trivial to pose as the server. Limitations are consider as high complexity and highly
expensive. Entity authentication and authenticated key establishment are of fundamental importance
in establishing secure communications between a pair of communicating parties.
Entity authentication is normally provided when a communications link is established and, if an
authenticated key is established simultaneously, this can be used to protect subsequently exchanged
data. The purpose of this work is to examine how these services might best be achieved for personal
wireless-enabled devices. Manual authentication techniques have been designed to enable wireless
devices to authenticate one another via an insecure wireless channel with the aid of a manual transfer
of data between the devices. Manual transfer refers to the human operator of the devices performing
one of the following procedures: copying data output from one device into the other device,
comparing the output of the two devices, or entering the same data into both devices.
Techniques currently being standardized are described which achieve this, and which require only
small amounts of data to be transferred between the two devices. This makes the mechanisms
particularly attractive for non-expert use, as required for ubiquitous mobile wireless devices.
Limitations are consider as High storage is required and less secure. Security in wireless network is
becoming more and more important while the using of mobile equipment’s such as cellular phones
or laptops is tremendously increasing. Due to the unique characteristic of wireless network, unlike
wire line networks, to achieve this goal is never a trivial challenge. Mobile ad hoc networks
(MANETs) is a special wireless network which does not rely on any fixed infrastructure but depends
on the cooperation between each node like a cellular phone in the network. In this essay discuss the
possible attacks in MANETs and briefly discuss the solutions aimed to these problems.
3. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 722`
Address the problem of secure communication and authentication in ad-hoc wireless networks. This
is a difficult problem, as it involves bootstrapping trust between strangers. A user-friendly solution is
presented which provides secure authentication using almost any established public-key-based key
exchange protocol, as well as inexpensive hash-based alternatives. In this approach, devices
exchange a limited amount of public information over a privileged side channel, which will then
allow them to complete an authenticated key exchange protocol over the wireless link. This solution
does not require a public key infrastructure, is secure against passive attacks on the privileged side
channel and all attacks on the wireless link, and directly captures users’ intuitions that they want to
talk to a particular previously unknown device in their physical proximity limitations are consider as
High complexity and Communication cost is high.
Obtaining authenticated values from devices in ways that are easily understandable by non-expert
users is currently an open problem. The Seeing-Is-Believing is analyzed which is a system that
utilizes 2D barcodes and camera phones to implement a visual channel for authentication and
demonstrative identification of devices. As camera-equipped mobile phones rapidly approach
ubiquity, these devices become a naturally convenient platform for security applications that can be
deployed quickly and easily to millions of users. Today's mobile phones increasingly feature Internet
access and come equipped with cameras, high-quality displays, and short range Bluetooth wireless
radios.
They are powerful enough to perform secure public key cryptographic operations in fewer than one
second. Propose to use the camera on a mobile phone as a new visual channel to achieve
demonstrative identification of communicating devices formerly unattainable in an intuitive way.
This approach is termed as Seeing-Is-Believing (SiB). In SiB, one device uses its camera to take a
snapshot of a barcode encoding cryptographic material identifying, e.g., the public key of another
device. This is called as a visual channel. Barcodes can be pre-configured and printed on labels
attached to devices, or they can be generated on-demand and shown on a device's display.
Apply this visual channel to several problems in computer security. SiB can be used to bootstrap
authenticated key exchange between devices that share no prior context, including such devices as
mobile phones, wireless access points, and public printers. The SiB is used to aid in the
establishment of a trusted path for configuration of a TCG-compliant1 computing platform, and to
provide the user with assurance in the integrity of an application running on a TCG-compliant
computing platform. Also use SiB to secure device configuration in the context of a smart home.
Limitations are consider as Unaware of any attacks feasible today which result in anything but noise
from the camera under attack.
III. EXISTING WORK
Practical requirements for securely demonstrating identities between two handheld devices are often
omitted by theoretical protocol designers. Existing system, a scheme is developed named Seeing-is-
Believing (SiB) which uses the display of a mobile phone to demonstrate its identity to a handheld
device equipped with a screen.
The idea of their scheme is that a handheld device generates a temporal public key and sends it to
another handheld device through the wireless channel, like Bluetooth. This device also creates a
commitment of the public key in the form of a visual code, and displays the code as a digital image
on its display. The other handheld device photographs this code using its screen and verifies the
public key using this public key commitment. This public key allows the receiver to authenticate the
4. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 723`
sender after executing some simple confirmation steps. Yet, there are also some disadvantages in Sib
the first problem is scalability. Sib protocol supports secure authentication for two handheld devices.
Adopting transitive authentication may solve the scalability problem. If the devices owners trust
each other in the way that each participant would not intentionally eavesdrop other parties’
communication and damage the protocol, it is possible to simplify the protocol. The idea of
transitive authentication says that a device can authenticate other strange devices through another
broker.
Solve the second problem, attempt to propose a method that only requires one photo-taking. To
observe that most mobile phones and PDAs have their cameras located at the back of the devices.
When the devices are taking photo of each other screens, it is very likely that a device’s monitor will
be covered by another device. It means that the visual code displayed on the device cannot be easily
obtained by hidden adversary.
The adversary may utilize a highly sophisticated telescope to capture the screen of the user’s device.
Fortunately, this can be prevented with a privacy protection filter on the mobile device’s display. As
a result, it is reasonable to believe that short range photo taking provides not only data integrity but
also data confidentiality. In that case, it is possible for us to devise a system that takes only one
photo during the authentication protocol.
3.1.1 Limitations of the Existing System
The Existing System has the limitations which are related to the knowledge about the different
attributes and the other is about the algorithm used in existing system and the last is that which deals
with the performance of the system. Some of the Limitations of the existing system are given below;
Insider attack is not detected
Less efficient
Less security.
IV. PROPOSED WORK
Trust score based method is introduced which computes the trust values for the nodes and provide
the security. Trust is an important aspect of mobile devices. It enables entities to cope with
uncertainty and uncontrollability caused by the free will of others. Trust computations and
management are highly challenging issues in mobile devices due to computational complexity
constraints, and the independent movement of component nodes. This prevents the direct application
of techniques suited for other networks.
QR code (abbreviated from Quick Response Code). The QR Code system has become popular
outside the automotive industry due to its fast readability and greater storage capacity compared to
standard UPC barcodes. Applications include product tracking, item identification, time tracking,
document management, general marketing. A QR code consists of black modules (square dots)
arranged in a square grid on a white background, which can be read by an imaging device (such as a
camera) and processed using Reed–Solomon error correction until the image can be appropriately
interpreted. The required data are then extracted from patterns present in both horizontal and vertical
components of the image.
Reputation based Trust Score Calculation for mobile devices have been proposed. This architecture
is for establishment of the trust for a newly entering node in the mobile devices. Method the
behavior of the node will be monitored periodically and its trust value is also updated .So depending
on the behavior of the node in the network trust relation will be established between two nodes.
5. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 724`
4.1 MODULE DESCRIPTION
Pairing of Bluetooth devices Module
Initialization process Module
Bipartite Authentication Protocol Module
Tripartite Authentication Protocol Module
1.1.1 Pairing of Bluetooth devices Module
The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH
PERMISSION in order to perform any Bluetooth communication, such as requesting a connection,
accepting a connection and transferring the data. After that, Device discovery is a scanning
procedure and searches the local area for Bluetooth enabled devices. If the Bluetooth device is
currently enabled to be discoverable then only it will respond to the discovery request. If the device
is discoverable then it will respond by sharing some information such as device name, class and its
unique MAC address. First time connection request automatically presented to the user. The
information can be read using the Bluetooth APIs.
4.1.2 Pairing of Bluetooth devices Module
The two devices are connected to transmit the data. Firstly, Request the BLUETOOTH
PERMISSION in order to perform any Bluetooth communication, such as requesting a connection,
accepting a connection and transferring the data. After that, Device discovery is a scanning
procedure and searches the local area for Bluetooth enabled devices.
If the Bluetooth device is currently enabled to be discoverable then only it will respond to the
discovery request. If the device is discoverable then it will respond by sharing some information
such as device name, class and its unique MAC address. First time connection request automatically
presented to the user. The information can be read using the Bluetooth APIs.
4.1.3 Initialization process Module
Bilinear pairing is a main component in constructing our tripartite protocol. Firstly briefly review
some basic facts of bilinear pairing. Let be an additive group with order q and be a
multiplicative group. Given P is a generator of assume discrete logarithm problem (DLP) is hard
in i.e., given the instance p, it is difficult to calculate a. To say a mapping function e is
bilinear if satisfies the following properties:
Bilinearity: ( ) ( ) for all and . Also for (
) ( ) ( ) and ( ) ( ) ( )
Non-degeneracy: ( ) is the generator of if P is the generator of . In other
words, ( )
Computable: There exist an efficient algorithm to compute ( )
Next, state some famous hard problems related to bilinear pairings and elliptic curves.
Computational Diffie-Hellman Problem (CDH): The CDH problem states that given two elements
and a generator P in as inputs where output abP. An algorithm
has advantage in solving CDH if
* ( ) +
Where the probability is over the random choice of generator the random choice of
and the random bits consumed by .CDH assumption: To say that the ( ) assumption
6. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 725`
holds in if no t-time algorithm has an advantage more than ϵin solving CDH problem
in .Bilinear Diffie-Hellman Problem (BDH): The BDH problem states that given three
elements , a generator P in and a bilinear pairing function
as inputs, where output ( ) . An algorithm has advantage in solving
BDH if
( ( ) ( ) +
Where the probability is over the random choice of generator the random choice of
and the random bits consumed by .
BDH assumption: To say that the ( ) holds in to if no algorithm has an
advantage more than in solving BDH problem using bilinear map .
4.1.4 Bipartite Authentication Protocol Module
Present the bipartite authentication protocol using encryptions E and MACs M. Assume there are
two handheld devices A and B want to authenticate each other such that A is equipped with a high
resolution display and B is equipped with a camera. A initiates the protocol by randomly selecting an
integer calculating and generating two k-bits long random keys and . Then,
A calculates and sends the following tuples to B.
( ) ( ( ) ( ) )
At the same time, it encodes and into a visual code and displays it on screen. Note that is
encrypted; thus, the adversary cannot forge valid MAC value and further launch MITM attack.
After receiving the tuples above, B takes a photograph of the visual code with its screen to obtain the
key ̂ and ̂ . Then, it verifies the tuples using ̂ and decrypts using ̂ to obtain ̂ . If the
message is authenticated, B will consider A is a trusted device. Otherwise, it will terminate the
process.
B also selects a random integer and calculates After that, it computes
( ̂ ). Finally, it prepares the following tuples and sends them to A.
( ) ( ) )
After receiving the tuples from B,A computes ̂ ( ). Then, A verifies if
̂ ( ) If it does, A will authenticate B as a trusted device. Each of them will utilize a l-bit key
( ̂ ) ( ̂ ) as their session key for further communication. The completeness of the
protocol is asserted by assuming there is no adversary in the environment. Notice that
( ̂ ) ( ̂ ). Therefore A and B will be mutually authenticated if the tuples they send are
unaltered.
4.2 Advantages of the Proposed System
Insider attack is detected
High efficient
High secure
7. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 726`
Fig 2.1 System Architecture Diagram
V. CONCLUSION
Agreeing key in ad-hoc environment securely is an important topic. Most of the previous schemes
only focus on two parties’ case and are overcomplicated. In this work the efficient key agreement
protocols are developed for two and three handheld devices over temporal confidential and
authenticated channels.
Create the tuples
by one device
Generate the
random keys
Encodes the keys into visual
codes and displays on the
screen
Scalable
authentication
protocol
Trust score based
method
Receives the tuples by
another device
Verify the tuples
Bipartite
authentication
Multipartite
authenticatio
n
Tripartite
authentication
Compute the
trust score for
the nodes
Update the trust
values
Detect the attacks
Analyze the
behavior
Performance comparison
Mobile
8. International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 02, Issue 01, [January - 2015] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 727`
They simplify previous unnecessary complications and reduce the bottleneck of running time –
human’s involvements. This system enjoys several nice properties including efficient, human error
proof, and secure. By satisfying the above practical requirements, these protocols have improved
previous scheme significantly. But the insider attacks are not detected in this method.
REFERENCES
[1] Apkun S.C, Hubaux .J, and Buttya´n .C, “Mobility helps security in ad hoc networks,” in Proc. of the 4th ACM
Symposium on Mobile ad hoc Networking & Computing, 2011, pp. 46–56.
[2] Barua .R, Dutta .R, and Sarkar .P, “Extending Joux’s protocol to multi party key agreement,” in Progress in
Cryptology–INDOCRYPT, 2003, pp. 205–217.
[3] Balfanz .D, Smetters .D, Stewart .P, and Wong .H, “Talking to strangers: Authentication in ad-hoc wireless
networks,” in Proc. of the 9th Symposium on Network and Distributed System Security Symposium
[4] Blake-Wilson .S and Menezes .A,“Entity authentication and authenticated key transport protocols employing
asymmetric techniques,” Security Protocols Workshop, vol. 97, 1997.
[5] Bellare .M and Rogaway .P, “Entity authentication and key distribution,” in Proc. of the Advances in Cryptology-
CRYPTO, vol. 773, 1993, pp. 232–249.
[6] Boyko .V, MacKenzie .P, and Patel .S, “Provably Secure Password- Authenticated Key Exchange Using Diffie-
Heilman,” Proceedings of the Advances in Cryptology-Eurocrypt, 2009
[7] Bellovin S.M, and Merritt.M, “Augmented encrypted key exchange: a password-based protocol secure against
dictionary attacks and password file compromise,” in Proc. 1st ACM conf. on Computer and Communications
Security, pp. 244–250.
[8] Gehrmann .C, Mitchell .C, and Nyberg .K, “Manual authentication for wireless devices,” RSA Cryptobytes, vol. 7,
no. 1, pp. 29–37, 2004
[9] Bluetooth .S, “The official Bluetooth wireless info site,” 2011.
[10] Chen et al., “GAnGS: Gather, authenticate ’n group securely,” in Proc. of the 4th ACM Inter. Conf. on Mobile
Computing and Networking. ACM New York, NY, USA, pp. 92–103.