Refine your search
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mittal, Sumit
- The Influence of Sugar-Phosphate Backbone on the Stacking Interaction in B-DNA Helix Formation
Abstract Views :216 |
PDF Views:83
Authors
Affiliations
1 Indian Institute of Science Education and Research Mohali, Manauli 140 306, IN
2 Department of Chemistry, Indian Institute of Technology Kanpur, Kanpur 208 016, IN
1 Indian Institute of Science Education and Research Mohali, Manauli 140 306, IN
2 Department of Chemistry, Indian Institute of Technology Kanpur, Kanpur 208 016, IN
Source
Current Science, Vol 108, No 6 (2015), Pagination: 1126-1131Abstract
The influence of sugar-phosphate backbone on the stacking interaction in the adenine…thymine base-pair dimer (A…T)2 has been studied using the density functional theoretic method and the dispersion-corrected density functional BLYP-D3 and the triple-zeta quality basis set def2-TZVP. In the absence of the sugar-phosphate backbone, several stacked conform-ers were obtained with a small difference in their stabilization energy values (-20 to -25 kcal/mol). However, the presence of the sugar-phosphate back-bone limits the movement of the two A…T units, and yet the stacking interaction remains significant (-19.4 kcal/mol). Despite the constraints imposed by the backbone, the dimer (A…T)2 is found to retain its favourable geometry. The influence of sodium ions on the geometry and the interaction energy is found to be negligible.Keywords
B-DNA Helix Formation, BLYP-D3, Stacking Interaction, Sugar–Phosphate Backbone.- A Comparative Study of Metaheuristics based Task Scheduling in Distributed Environment
Abstract Views :249 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Guru Nanak College for Girls, Sri Muktsar Sahib –152026, Punjab, IN
2 Maharishi Markandeshwar Institute of Computer Technology and Business Management, Maharishi Markandeshwar University, Mullana, Ambala – 133203, Haryana, IN
3 Department of Computer Science and Engineering, Maharishi Markandeshwar University, Sadopur, Near Omaxe Flats, Ambala-Chandigarh Highway, Ambala – 133001, Haryana, IN
1 Department of Computer Science, Guru Nanak College for Girls, Sri Muktsar Sahib –152026, Punjab, IN
2 Maharishi Markandeshwar Institute of Computer Technology and Business Management, Maharishi Markandeshwar University, Mullana, Ambala – 133203, Haryana, IN
3 Department of Computer Science and Engineering, Maharishi Markandeshwar University, Sadopur, Near Omaxe Flats, Ambala-Chandigarh Highway, Ambala – 133001, Haryana, IN
Source
Indian Journal of Science and Technology, Vol 10, No 26 (2017), Pagination:Abstract
Objectives: To make an extensive survey on various meta-heuristic and hybrid task scheduling along with their classification patterns and to find the scope of improvement in these techniques. Method: This paper carries to the deep study of 99 reputed research papers from Springer, IEEE, Elsevier, Scopus indexed; SCI indexed of well-known renowned journals. These research papers are selected by taking into consideration of relevance to research area. These scheduling algorithms are compared in terms of their performance metrics, environments and results. Findings: This paper described that there are various renowned researchers who have proposed various meta-heuristic task scheduling techniques to achieve the optimum results but after the extensive survey of various scheduling techniques based on genetic, Simulated Annealing (SA), ACO, PSO and hybrid reveals that a lot of dimensions are yet to be explored in terms of datacenter cost, virtual machine migration, energy consumption and Service-Level Agreement etc. Application: It discusses numerous meta-heuristic based task scheduling algorithms with their classification patterns so as to find the gap in the already proposed algorithm and suggest the untouched areas for the further research.Keywords
Cloud Computing, Distributive Environment, Metaheuristics, NP Hard Problems, Task Scheduling.- A Secure and Reliable Handoff Authentication Protocol with Batch Verification for Internet of Things Environment
Abstract Views :276 |
PDF Views:1
Authors
Affiliations
1 M.M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, Haryana, IN
1 M.M. Institute of Computer Technology and Business Management, Maharishi Markandeshwar (Deemed to be University) Mullana, Ambala, Haryana, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 5 (2021), Pagination: 477-489Abstract
Internet is no longer a mere source of information as the concept of interconnectivity has expanded to connect real things or objects like every kind of machines, cars, homes, hospitals, even our bodies through wearable devices. The concept of interconnectivity of billions of objects (mobile or stationary) providing and exchanging real time data is called Internet of Things (IoT). Myriad IoT applications are touching every aspect of our lives and have the latent to develop the basic quality of life for masses. However, prerequisite for successful implementation of any IoT application is uninterrupted and high-quality network connectivity and handling of huge amounts of personal and sensitive user data which gives rise to the questions of security. A handoff authentication protocol with high security and efficiency is required for enabling secure and seamless handoff of mobile nodes between different access points (AP). However, there are number of challenges in designing a secure handoff protocol for IoT systems like limited power of mobile nodes, computational capability, security and vulnerability of open IoT networks. In this paper, we propose a secure and reliable handoff authentication protocol for such IoT devices. Compared with other well-known similar handoff protocols, the protocol proposed here satisfies all relevant security requirements of handoff such as batch verification, mobile node un-traceability, and anonymity and is unaffected by other attacks like replay attacks and also provides mutual authentication. To demonstrate the security strength (against replay attacks) of our protocol, simulation has been done using AVISPA. Thus, protocol proposed by us is more appropriate for IoT environment compared to the alike protocols.Keywords
Batch Verification, Authentication, Security, Reliability, Handoff, IoT, AVISPA.References
- Kevin Asthon, “That ’ Internet of Things ’ Thing,” RFID Journal, p. 4986, 2010.
- Y. Ibrar and Ahmed Ejaz et al, “Internet of Things Architecture : Recent Advances , Taxonomy , Requirements , and Open Challenges,” IEEE Wireless Communication, no. June, pp. 10–16, 2017.
- R. Kaur and S. Mittal, “Enhanced Handoff Decision Making for Application-Aware Environment by Using Blended Approach,” International Journal of Intelligent Engneering Systems, vol. 14, no. 1, pp. 433–443, 2020.
- A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, 2020.
- S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. S. Kwak, “The internet of things for health care: A comprehensive survey,” IEEE Access, vol. 3, pp. 678–708, 2015.
- S. R. Moosavi et al., “SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways,” Procedia Computer Science, vol. 52, no. 1, pp. 452–459, 2015.
- J. L. Hou and K. H. Yeh, “Novel Authentication Schemes for IoT Based Healthcare Systems,” Int. J. Distrib. Sens. Networks, vol. 2015, no. ii, 2015.
- P. K. Dhillon and S. Kalra, “A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services,” Journal of Ambient Intelligent Smart Environment, vol. 11, pp. 149–164, 2019.
- S. A. Medaglia, Carlo Maria, “An Overview of Privacy and Security Issues in the Internet of Things,” Giusto D., Iera A., Morabito G., Atzori L. Internet Things. Springer, New York, NY, pp. 367–373, 2010.
- G. M. Køien, “Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.
- J. Liu, Y. Xiao, and C. L. P. Chen, “Authentication and access control in the Internet of things,” Proc. - 32nd IEEE International Conference on Distributed Computing Systems Workshops ICDCSW 2012, pp. 588–592, 2012.
- R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
- Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen, and S. Shieh, “IoT security: Ongoing challenges and research opportunities,” Proc. - IEEE 7th International Conference on service-oriented computing and applications SOCA 2014, pp. 230–234, 2014.
- F. L. Ţiplea, “A lightweight authentication protocol for RFID,” International Conference on Cryptography and Security Systems, pp. 110-121. Springer, Berlin, Heidelberg, 2014.
- P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, “PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications,” International Journal of Distributed Sensor Networks, vol. 2014, 2014.
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015.
- S. A. Kumar, T. Vealey, and H. Srivastava, “Security in internet of things: Challenges, solutions and future directions,” Proceedings Annual Hawaii International Conference on System Sciences, vol. 2016-March, pp. 5772–5781, 2016.
- P. K. Dhillon and S. Kalra, “Secure multi-factor remote user authentication scheme for Internet of Things environments,” International Journal of Communication Systems, vol. 30, no. 16, pp. 1–20, 2017.
- M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018.
- A. Luntovskyy and L. Globa, “Performance, Reliability and Scalability for IoT,” Proceedings International Conference on Information and Digital Technologies 2019, IDT 2019, pp. 316–321, 2019.
- S. Behrad, E. Bertin, S. Tuffin, and N. Crespi, “A new scalable authentication and access control mechanism for 5G-based IoT,” Future Generation Computer Systems, vol. 108, pp. 46–61, 2020.
- D. He, C. Chen, S. Chan, and J. Bu, “Secure and efficient handover authentication based on bilinear pairing functions,” IEEE Transactions on Wireless Communications, vol. 11, no. 1, pp. 48–53, 2012.
- D. He, C. Chen, S. Chan, and J. Bu, “Analysis and improvement of a secure and efficient handover authentication for wireless networks,” IEEE Communications Letters, vol. 16, no. 8, pp. 1270–1273, 2012.
- J. L. Tsai, N. W. Lo, and T. C. Wu, “Secure handover authentication protocol based on bilinear pairings,” Wireless Personal Communications, vol. 73, no. 3, pp. 1037–1047, 2013.
- D. He, J. Bu, S. Chan, and C. Chen, “Handauth: Efficient handover authentication with conditional privacy for wireless networks,” IEEE Transactions on Computers, vol. 62, no. 3, pp. 616–622, 2013.
- G. Li, Q. Jiang, F. Wei, and C. Ma, “A New Privacy-Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 80, no. 2, pp. 581–589, 2014.
- W. Wang and L. Hu, “A secure and effcient handover authentication protocol for wireless networks,” Sensors (Switzerland), vol. 14, no. 7, pp. 11379–11394, 2014.
- S. A. Chaudhry, M. S. Farash, H. Naqvi, S. H. Islam, and T. Shon, “A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks,” Wireless Personal Communications, vol. 93, no. 2, pp. 311–335, 2017.
- X. Duan and X. Wang, “Authentication handover and privacy protection in 5G hetnets using software-defined networking,” IEEE Communication Magazine, vol. 53, no. 4, pp. 28–35, 2015.
- D. He, S. Chan, and M. Guizani, “Handover authentication for mobile networks: Security and efficiency aspects,” IEEE Networks, vol. 29, no. 3, pp. 96–103, 2015.
- D. He, S. Zeadally, L. Wu, and H. Wang, “Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography,” Computer Networks, vol. 128, pp. 154–163, 2017.
- J. L. Tsai and N. W. Lo, “Provably secure anonymous authentication with batch verification for mobile roaming services,” Ad Hoc Networks, vol. 44, pp. 19–31, 2016.
- D. He, D. Wang, Q. Xie, and K. Chen, “Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation,” Science China Information Sciences, vol. 60, no. 5, pp. 1–17, 2017.
- Y. Xie, L. Wu, N. Kumar, and J. Shen, “Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network,” Wireless Personal Commununications, vol. 93, no. 2, pp. 523–541, 2017.
- D. Wang, L. Xu, F. Wang, and Q. Xu, “An anonymous batch handover authentication protocol for big flow wireless mesh networks,” Eurasip Journal Wireless Communication Networks, vol. 2018, no. 1, 2018.
- R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: The internet of things architecture, possible applications and key challenges,” Proceedings - 10th International Conference on frontiers of Information Technology FIT 2012, pp. 257–260, 2012.
- P. K. Dhillon and S. Kalra, “A lightweight biometrics based remote user authentication scheme for IoT services,” Journal of Information Security and Applications, vol. 34, pp. 255–270, 2017.
- A. Armando, D. Basin, Y. Boichut, Y. Chevalier, and L. Compagna, “The AVISPA Tool for the Automated Validation,” Computer Aided Verification, vol. 3576, pp. 281–285, 2005.