Manuscripts

Recent Papers

Research Paper

EVI-databse authentication using advanced security standards

The concept of embedded virtual intelligence was to enable database authentication with advanced security standards. Data is the most resourceful asset of any information system the key idea of the paper was to secure data. Evi was designed with a centric algorithm that makes database authentication or access to any other system portal very secure. The functionality of this system is intelligently based on two major security modules are IP Retrieval Module and Automated Kernel Level Execution. IP Retrieval Module is a system package which runs on the background which has a steganographic implementation that retrieves the IP address of the host as soon as false login is attempted and logs I another independent server. Automated Kernel Level Execution Module overrides the system once the IP Retrieval Module is done this system force downloads executable files that run on startup now the executable files are implemented with kernel scripts that automatically retrieves all the network and system related information and packages it to a text file and mails back the details to the desired destination email address along the credentials.All these kernel scripts inside the exe files are encrypted by AES algorithm.

Published by: Vaibhav Muthukumaran

Author: Vaibhav Muthukumaran

Paper ID: V5I3-1355

Paper Status: published

Published: May 13, 2019

Full Details
Research Paper

Reduction of environmental pollution while stone crushing

Stone crushing industry is an important industrial sector in the country engaged in producing crushed stones of various sizes depending upon the requirement which acts as raw material for various construction activities such as the construction of roads highways bridges buildings and canals etc. It is estimated that there are over 12000 stone crushing units in India. The number is expected to grow further keeping in view the future plans for the development of infrastructure for the overall development of the country. This industry is estimated to have an annual turnover of RS.5000 corers. Along with increasing economic benefits, there are some pollution problems that are increasing rapidly. These problems are causing very harmful effects on human health and the surrounding environment and thus needed to be controlled within time. Thus an overall assessment or analysis is performed here.

Published by: Ashutosh D. Kamble, Ritesh K. Dole, Rishikesh H. Gavale, Sanket G. Dey, Pushkar S. Bhamare

Author: Ashutosh D. Kamble

Paper ID: V5I3-1380

Paper Status: published

Published: May 13, 2019

Full Details
Research Paper

Analysis of deficits of highway to propose for better geometry

For the Design of any roadway, there are many governing parameters that affect the total efficiency output as perceived by the driver. The roadway should be designed for perfect Geometric features. This paper involves the analysis or in other words the complete finding the wear-about of the deficits of an existing roadway and to come up with a proposal for the improved Geometric proposal for the roadway using DMRB as the basis for the design. There is much research going on the same deficiency improvement related aspects and still needs a lot of further scope of improvement in order to achieve the complete safety of a proposed roadway. Considering the ongoing research on the geometric improvements on the existing roadways the optimistic user as well as Eco-friendly design is to opted for our site

Published by: Hardik Sharma

Author: Hardik Sharma

Paper ID: V5I3-1277

Paper Status: published

Published: May 13, 2019

Full Details
Research Paper

An efficient intrusion detection system on blackhole attack for Mobile Ad hoc Network

A Mobile Ad hoc Network (MANET), also known as wireless ad hoc network, is a self-configuration and infrastructure-less network of mobile devices connected wirelessly in a continuous manner. They are vulnerable to various kinds of attacks due to their dynamic nature and lack of a central control point. One of the most several network layer routing attacks in Blackhole attack. Among those routing attacks, black hole throws a challenge in interrupting and degrading the performance of data forwarding operation by dropping the data packets that are transferred through it. To ensure secure MANET an Intrusion Detection System (IDS) is being required. So in this research, we proposed an anomaly based IDS to detect black hole attack in MANET in turn computations have been performed using Neighbors Selective Acknowledgement. In the proposed method, all the nodes receiving data packet send an acknowledgment to the node from which it received it. If the source node receives an acknowledgment from a destination within the threshold time, the path is found to be protected against black hole node and originator takes no action. Otherwise, the source starts verifying nodes. Source node unicast verification message to all the nodes whose details it has stored. Our simulation experiment proves that detects black hole nodes efficiently with less false positive rate of detection and false positive rate.

Published by: S. Nivetha

Author: S. Nivetha

Paper ID: V5I3-1325

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Data sharing and privacy preserving on personal healthcare information in cloud

Cloud computing is an Internet-based computing model which provides several resources through the cloud service provider to cloud users on demand based. Cloud computing storage, users are able to access and shared resources offered by cloud services provider at a lower cost. Data protection, reliability, dependency, transparency, data portability are the most important challenges of the various cloud environment. In Healthcare system privacy is the ability to protect the patient’s personal information against unauthorized access. While sharing the healthcare data in the cloud, the clients have handled security and scalable key management. In this proposed work of Merkle hash tree algorithm used to significantly reduce the amount of data that a TPA has to maintain to proof the integrity of the data. CP-ABE perform private verification, delegated verification, and public verification. A privacy-preserving OPOR auditing scheme for shared data in the cloud environment and utilize with signature, to compute verification information on shared data

Published by: A. Aaro, S. Usha

Author: A. Aaro

Paper ID: V5I3-1324

Paper Status: published

Published: May 11, 2019

Full Details
Research Paper

Multi factor AKE protocol and key stroke authentication for secured communication

Authenticated Key Exchange (AKE) protocol permits a user and a server to authenticate each other for the first time. It generates a session key for the successive communications without any authentication. Many AKE protocols had been proposed to obtain person privateness and authentication for the duration of conversation. Other than secured consultation key established order, these AKE protocols offer a few other useful capability like two-thing user authentication and mutual authentication. But they have got few weaknesses along with vulnerability in opposition to loss of smart card, offline dictionary assault, de-synchronization attack, person anonymity or untraceability. Also, AKE scheme the usage of public key conversation doesn’t suite nicely for lightweight computational gadgets. In this work, a novel Multi-Factor AKE protocol is proposed to overcome all the above-mentioned weaknesses. This protocol supports revoked smart card transactions. The password that is available on the USB device will be overwritten once the user used it. Passwords can be updated without centralized storage. The average time to enter a password will be defined. The user has to type the password within the allocated time, failing which he/she has to enter it again. This security model of AKE supports user anonymity and resist a lost card attack. Elliptical Curve Cryptography algorithm is used for encryption and decryption of the session key. The computational cost and the bandwidth cost for this proposed model are low, which makes it useful in pervasive computing applications and mobile communications. The proposed AKE model is much secured when compared to the existing protocols.

Published by: S. Kanimozhi, S. Jayanthi

Author: S. Kanimozhi

Paper ID: V5I3-1321

Paper Status: published

Published: May 11, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X