Wednesday, September 23, 2015

IJSTE : Call for Papers: 2.895 Impact Factor


Most Trusted E-Journal By Engineering Students All Over the world
Impact Factor: 2.895
Mail Id: ijste.editor@gmail.com
www.ijste.org (ISSN : 2349 - 784X)
Indexed In : Google Scholar,DRJI, ISSUU, ACADEMIA, Scridb, Slideshare and Many...
Contact us: 7048326542

_____________________________________________________
Click here....
Our Published Articles for View click below link..

https://www.academia.edu/14168832/DETECTING_TRENDS_IN_PEOPLE_PREFERENCES_FOR_TOURISM

https://scholar.google.co.in/citations?user=luEzzgEAAAAJ&hl=en


https://ijste.wordpress.com

________________________________________________________________

For more information about this Journal : Click here..... www.ijste.org

Friday, September 18, 2015

#IJSTE New Poster September 2015 : 2.895 Impact Factor



Title: IJSTE New Poster September 2015 : 2.895 Impact Factor

About IJSTE

International Journal of Science Technology and Engineering is a peer-reviewed, monthly, online international research journal, which publishes original articles, research articles, review articles from all areas of Engineering and Technology Research and their application including Civil, Mechanical, Computer science, Electrical, Electronics and Communication and many more. Research Scholar in all engineering and technology fields are swayed to help articles focused around late research. 

The Journal is begun with honorable exertion to help the analysts in their work and likewise to impart learning and exploration thoughts. All examination intrigued researchers are given best chance to make world mindful of their work. With exact and expository portrayal of information by our commentators, International Journal of Science Technology and Engineering is giving implemental economy and most recent worldwide transposition to research. 
ISSN (Online):2349-784X
Subject Category:Engineering Science and Technology
Frequency:Monthly, 12 issues per year
Published by:I.J.S.T.E , INDIA


Most Trusted E-Journal By Engineering Students All Over the world
Impact Factor: 2.895
Mail Id: ijste.editor@gmail.com
www.ijste.org (ISSN : 2349 - 784X)
Indexed In : Google Scholar,DRJI, ISSUU, ACADEMIA, Scridb, Slideshare and Many...
Contact us: 7048326542

Click here....
Our Publish Articles click below link:




For more Information about this Journal CLICK HERE

Wednesday, September 16, 2015

A New Security Mechanism for Mitigating Multiple Grayhole Attack In MANETS #IJSTE Journal#


Title: A New Security Mechanism for Mitigating Multiple Gray hole Attack In MANETS

Research Area: Computer Science Engineering.

Abstract: 

             Wireless Ad hoc networks are temporary networks because they are formed to fulfil a special purpose and cease to exist after fulfilling this purpose. Mobile devices might arbitrarily leave or join the network at any time, thus ad hoc networks have a dynamic infrastructure. The number of applications that involve wireless communications among mobile devices is rapidly growing. Many of these applications require the wireless network to be spontaneously formed by the participating mobile devices themselves. In wireless ad hoc networks, mobile nodes communicate with other nodes over wireless links, without the support of pre-existing infrastructures, which is an attractive form of peer communications for certain applications. Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. With the emergence of more heterogeneous devices and diverse networks, it is difficult, if not impossible, to use a one-size-fits-all encryption algorithm that always has the best performance in such a dynamic environment. Network security plays a crucial role in this MANET and the traditional way of protecting the networks through firewalls and encryption software is no longer effective and sufficient. In this paper, We have studied the effect of gray hole attack in the Ad hoc Networks and proposed solution that tries to eliminate the gray hole effect by monitoring scheme to isolate malicious node from the network over AODV routing protocol through simulatuion using ns2 simulator. 

Keywords: 
QoS, AODV, MANETs.

  •  Security Attacks: 
    • Security attacks can be classified in different ways. One way is to divide attacks into four categories according to where the attacker deploys the attack in the flow of information from a source to a destination. 1) Interruption: An asset of the network is destroyed or becomes unavailable or unusable. This is an attack on availability. Examples include silently discarding control or data packets. 2) Interception: An unauthorized node gains access to an asset of the network. This is an attack on confidentiality. Examples include eavesdropping control or data packets in the networks. 3) Modification: An unauthorized node not only gains access to but tampers with an asset. This is an attack on integrity. Examples include modifying control or data packets. 4) Fabrication: An unauthorized node inserts counterfeit objects into the system. This is an attack on authenticity. Examples include inserting false routing messages into the network or impersonating other node. A more useful categorization of these attacks is in terms of passive attacks and active attacks : 5) Passive attacks: A passive attack does not disrupt the operations of a routing protocol, but only attempts to discover valuable information by eavesdropping, or silently discard messages received. Three types of passive attacks are release of message contents, traffic analysis, and message dropping. 6) Active attacks: An active attack involves modification of the contents of messages or creation of false messages. It can be subdivided into four categories masquerade, replay, modification of messages, and denial of service.



CONCLUSION AND FUTURE WORK

In this paper, we simulated the gray hole attack in the Ad-hoc Networks and investigated its affects. Having simulated the grayhole attack, we saw that the performance of AODV is decreased in the ad-hoc network. Although many solutions have been proposed but still these solutions are not perfect in terms of effectiveness and efficiency. If any solution works well in the presence of single malicious node, it cannot be applicable in case of multiple malicious nodes. Our proposed solution tries to eliminate the gray hole effect by monitoring schemeto isolate malicious node from the network. The watchdog does this by listening to all nodes within transmission range promiscuously. If a watchdog detects that a packet is not forwarded within a certain period or is forwarded but altered by its neighbour it deems the neighbour as misbehaving and if any node only accept the node and does not forwarded, watchdog declare that node as a gray hole node and exclude that node from the path of the sending packets.

For More Information About this Article: 




Saturday, September 12, 2015

Analysis on Energy Efficiency in Tracking Multiple Objects Based on Polygon Tracking Method #IJSTE Journal


Title: Analysis on Energy Efficiency in Tracking Multiple Objects Based on Polygon Tracking Method

Research Area:     Computer Science Engineering
Author Name:      Josna Jose, Dr. R. Vijayakumar
College Name:    Mahatma Gandhi University

Recent advances in integrated electronic devices motivated the use of Wireless Sensor Networks in many applications including target detection and tracking. Typically, a Wireless Sensor Network is application-driven and mission-critical. Therefore, the energy efficiency and throughput of target tracking or event detection is critical for the end users, service providers and the system designers. Multi-Target tracking refers to the problem of jointly estimating the number of targets and their states from sensor data. In multi- target tracking the location of multiple targets has to be tracked simultaneously. Tracking multiple mobile targets using sensor networks is a challenging task. This paper proposes a new tracking framework for tracking multiple objects using polygon tracking method. Polygon tracking method achieves better tracking accuracy and energy efficiency by constructing active polygonal shaped regions inside the network. This paper also analysing the average energy consumption in tracking multiple objects based on this framework using NS2 simulations. 

SYSTEM ARCHITECTURE


Fig. Polygon Tracking Framework for Multi-Target Tracking

The main steps used to construct the FaceTrack architecture in [3] is used here to construct the framework for tracking multiple objects. The important steps are shown in Fig 2. The first step is the system initialization, including initial polygon construction in the plane. A node has all of the corresponding polygon’s information after the network planarization. Initially, all nodes in the WSN are in a low-power mode [6] and wake up at a predefined period to carry out the sensing for a short time. Sensor node has three different states of operation, namely, active -when a node is in a vigilant manner and participates in tracking the target, awakening -when a node awakes for a short period of time, and inactive -when a node is in a sleeping state [3].Consider that a sensor should be kept awake so long as its participation is needed for a given task. The framework for energy efficient detection and tracking of multiple objects in wireless sensor networks consist of five modules such as, i) Topology Formation, ii) Data Gathering, iii) Target Detection and Creating Active Local Environment, iv) Polygon Tracking, v) Multi Target Tracking.

CONCLUSION

Targets’ tracking is one of the key applications of wireless sensor networks. The main functionality of a surveillance application of wireless sensor network is to track unauthorized targets in a field. One of the main design issues for a sensor network is conservation of the energy available at each sensor node. The multi-target tracking using polygon tracking method is a better approach to use all the possibilities of each technique. From this approach the target detection and tracking become more accurate and energy efficient. The implementation of new optimum node selection reduces the power consumption of the proposed system. By this method it provides better fast accurate and energy efficient target tracking. It will be well suite in areas such as military, environment, industry, health, agriculture for tracking targets.

For Full length Article visit http://www.ijste.org/articles/IJSTEV2I3001.pdf













Monday, March 30, 2015

#IJSTE #IMPACT FACTOR

Breaking News...!!!
IJSTE Got Impact Factor 2.895
Thanks To all Author For New Milestone of IJSTE
For More Information Visit www.ijste.org

Tuesday, March 3, 2015

IJSTE Journal: CALL FOR RESEARCH PAPERS: New Impact Factor

FOR MORE INFORMATION VISIT US www.ijste.org
Like us on Facebook : https://www.facebook.com/ijsteindia


Call for Papers: IJSTE Journal: 2.895 
Most Trusted E-Journal By Engineering Students All Over the world
Impact Factor: 2.895
Mail Id: ijste.editor@gmail.com
www.ijste.org (ISSN : 2349 - 784X)
Indexed In : Google Scholar,DRJI, ISSUU, ACADEMIA, Scridb, Slideshare and Many...
Contact us: 7048326542

Click here....
Our Published Articles for View click below link..

https://www.academia.edu/14168832/DETECTING_TRENDS_IN_PEOPLE_PREFERENCES_FOR_TOURISM

https://scholar.google.co.in/citations?user=luEzzgEAAAAJ&hl=en

https://ijste.wordpress.com/blog/

Saturday, February 28, 2015

International Journal of Science Technology and Engineering

Call for Papers: IJSTE Journal: 2.895 
Most Trusted E-Journal By Engineering Students All Over the world
Impact Factor: 2.895
Mail Id: ijste.editor@gmail.com
www.ijste.org (ISSN : 2349 - 784X)
Indexed In : Google Scholar,DRJI, ISSUU, ACADEMIA, Scridb, Slideshare and Many...
Contact us: 7048326542


Click here....
Our Published Articles for View click below link..




     
FOR MORE INFORMATION VISIT US www.ijste.org

Like us on Facebookhttps://www.facebook.com/ijsteindia