Implementation of Secured Sensor Nodes Using Cryptographic Algorithms
Application of wireless sensor networks (WSN) to commercial, home environments and military purpose are increased in wide range. As the wireless sensor networks continue to grow, they are vulnerable to attacks and hence need for security mechanisms. Identifying suitable cryptography for WSN is important challenge due to limitation of energy, computation capacity and storage resources of sensor nodes. For this purpose, Cryptography plays a vital role in securing the data in W SN. In this paper we implemented two symmetric cryptographic algorithms algorithms: block cipher AES (Advanced encryption standards) and the Lightweight block cipher PRESENT. Our main aim of implementing the symmetric cryptographic algorithms in sensor nodes to provide secure communication which guarantees the confidentiality, integrity and avoids key exchange via unsecured channel that impose real threats. The experimental results are carried by implementing these algorithms in Atmega 32 bit microcontroller using simple C codes.
Published by: M. Jothimeena, R. Sherin jenny
Author: M. Jothimeena
Paper ID: V3I3-1398
Paper Status: published
Published: May 30, 2017
Experimental Investigation of Mortar Cube with Pumice Powder and Ceramic Tile Powder
An experimental investigation was carried out to evaluate the properties of cement Mortar. In this project study, ordinary Portland cement is replaced partially with pumice powder and fine aggregate is replaced partially with ceramic tile powder. In this research is to study the utilization of ceramic waste as a partial replacement of fine aggregate in a mortar. In this experimental investigation, prepare mortar cube of size 70.7mm x 70.7mm x 70.7mm with mix proportion 1: 3. The aim of this study is to determine the optimum % replacement of pumice powder in mortar cubes. .Cement mortar is made by replacing cement with pumice powder of different percentages like 5%, 10%, 15%, 20% & 25% with curing of 3, 7 & 28 days. The various combinations of pumice powder and ceramic waste powder were added to the mortar. Compressive strength test, splitting tensile strength test, water absorption test and the density test were performed and the results were analyzed. Mortar cube shows light weight behavior by replacing cement with pumice powder. The density of mortar is decreasing by adding pumice powder. The density of mortar cube is increasing by adding pumice powder and ceramic tile powder. Mortar cube shows almost similar strength compare to conventional mortar by adding pumice powder and ceramic tile powder.
Published by: Jitha Mathew .V
Author: Jitha Mathew .V
Paper ID: V3I3-1389
Paper Status: published
Published: May 30, 2017
Implementation of Anonymous and Secure Communication System with Group Signatures
For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC is essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver. The Communication Protocol along with IBE and Group signatures allow secure anonymous authentication. In this way, illegitimate users cannot use anonymous system and cannot effect the communication between source and destination whereas legitimate users access systems without compromising anonymity. In this way the proposed system get secure and anonymous communication over the network. Keywords: Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature.
Published by: Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke
Author: Mr. Vaibhav P. Thakare
Paper ID: V3I3-1370
Paper Status: published
Published: May 30, 2017
Development of Data Mining Model for the Evaluation of Human Skill Placement in the Engineering Sector
Data mining is one of the widespread research areas of present time as it has got wide variety of application to help people of today’s world. It is all about finding interesting hidden patterns in a huge history database. In this research work, data mining is comprehensively applicable to a domain called placement chance prediction, since taking wise career decision is so crucial for all of us for sure. A strategy to predict the overall absorption rate for every branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. From each combination of attributes from the history database of student records, corresponding placement chances is computed and stored in the history data base. From this data, various popular data mining models are built and tested. These model can be used to predict the most suitable branch for a particular new student with one of the above combination of criteria. A strategy to predict the overall absorption rate for various branches as well as the time it takes for all the students of a particular branch to get placed etc. are also proposed. The proposed method is tested on the data set provided by A.I.M.T college Lucknow and data is passes through the various data mining model, namely decision tree ,neural network and navie bayes classifier on area of the application to a domain, development of classifier and future outcomes were also configured on this thesis. At last this research work puts forward the data mining algorithm namely C 4.5 * stat for numeric data sets which has been proved to have competent accuracy over standard benchmarking data sets called UCI datasets. It also proposes to improve the standard C 4.5 algorithm.
Published by: Arun Mishra
Author: Arun Mishra
Paper ID: V3I3-1407
Paper Status: published
Published: May 30, 2017
An IOT Approach to Monitor Water Quality Using MQTT Algorithm
The degradation of water resources has become a common problem. The conventional methods of water quality monitoring involves the manual collection of water sample from different locations. These water samples were tested in the laboratory using the rigorous skills. Such approaches are time consuming and no longer to be considered efficient. Moreover, the current methodologies include analysis of various kinds of parameters of water quality such as physical and chemical. The old method of water quality detection and communication was time consuming, low precision and costly. Therefore, there is a need for continuous monitoring of water quality parameters in real time. By focusing on the above issues, a low cost water quality monitoring system is developed and designed that can monitor water quality in real time using IOT. In the proposed system water quality parameters are measured by the different sensors such as pH, turbidity, dissolved oxygen and temperature for communicating data onto a platform via microcontroller system i.e. Arduino model. So in order to meet all these requirements, other technologies can be used such as MQTT (Message Queuing Telemetry Transport) which allows publishing and subscribing od data between the sensor and end device. Instead of using GSM network or any other technology, MQTT algorithm will be implemented to make the system feasible, modular, scalar and cost-efficient. Not only this , with the help of MQTT algorithm there will be simultaneous flow of data between the sensors and server.
Published by: Mehwish Mir
Author: Mehwish Mir
Paper ID: V3I3-1415
Paper Status: published
Published: May 30, 2017
Improving the Performance for Crime Pattern Analysis Using Data Mining Techniques
As the crimes rates against women is increase day by day, the new problems are faced by the law organisation. Due to which this cause more burdens on the crime against women resources. The law organisation is able to generate such increases or decreases in crime, so it is necessary to find out the most useful method to control and avoid crimes against women. The aim of this paper is to classify clustered crime against women based on occurrence frequency during different years by the process of Data mining. Data mining is used to analysis, investigate and discovery of patterns for occurrence of different crimes against women. We connected a hypothetical model in light of information mining strategies, for example, grouping and characterization to real crime dataset recorded by OGD. The k-means clustering, KNN algorithm, decision tree algorithm and prediction method for future purpose, is used for the classification and clustering of crimes
Published by: Chhaya Yadav
Author: Chhaya Yadav
Paper ID: V3I3-1422
Paper Status: published
Published: May 30, 2017