A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vijayakumar, P.
- VANET and its Security Aspects: A Review
Authors
1 School of Electronics Engineering ,VIT University, Chennai Campus, Chennai – 600127, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 44 (2016), Pagination:Abstract
Objectives: This paper reviews research on various routing protocols used in Vehicular Adhoc Network (VANET), with the aim to 1. examine the newly emerged routing strategies, 2. to identify the security aspect of these routing strategies, 3. to explore security importance to users and 4. to investigate the research direction for security in VANET. Methods/Statistical Analysis: This paper focuses on two major aspects which includes literature survey and review along with a conceptual analysis of VANET security aspects. For this 20 security in VANET related papers have compared and analyzed along with some basic paper on VANET and routing to provide security in vehicular adhoc network. Findings: The survey of this paper indicates that the security aspect for VANET secured communication requires successful accomplishment of all aspects. However, the recent survey concludes that there is still further scope for research in security aspects like integrity, non-repudiation, availability. Application/Improvements: This study (review) tries to suggest that understanding the approach of routing and will help to implement a better intelligent transport system with security.Keywords
Routing Protocol, Security Study, Vehicular Adhoc Network.- Real-Time Ambience Sensing and Image Authentication using Internet of Things (IOT) in a Fleet Tracking System
Authors
1 Department of ECE, SRM University, Kattankulathur - 603203, Chennai, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
Background/Objectives: To create a comprehensive fleet tracking system using Internet Of Things (IOT). A fleet tracking system generally provides information on the route that is being used by the vehicle. Other general information like source, destination and driver information can be fed into the system beforehand. Methods/Statistical Analysis: For Intelligent Transportation System (ITS) applications, it becomes necessary to provide several real-time data such as temperature, pressure and humidity to ensure that the transported perishable goods are in good condition. In this paper, the parameters are monitored using a Raspberry-pi and a Sense Hat. Findings: This paper also aims to provide a security feature that can identify authorised personnel who can get access to the transported goods, using Raspberry pi and a Raspberry pi Camera with night vision to provide the real-time information and security alerts using image processing technology. These data are then fed to a server to provide access to drivers, administrators, vendors and management teams for efficient handling of the services. Applications/Improvements: With the boom in online shopping sector and an increase in demand in the freight transportation services, a security feature that can identify authorised personnel can go a long way in improving security.Keywords
IoT, ITS, Raspberry pi, Sense Hat- Hybrid Classifier based Content based Image Retrieval
Authors
1 ECE Department, SRM University, Chennai – 600001, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 46 (2016), Pagination:Abstract
Objectives: Nowadays, the capacity of digital image information is rapidly surging. The computational complexity of retrieving images from database also increases. Methods/Statistical Analysis: Texture and colour are the most important components of visual information which can be used effectively to reduce the complexity. This paper presents Content- Based Image Retrieval System (CBIR) based on texture and colour similarity. The RGB colour space and the colour histogram are used as the colour feature of each image. The texture of each image is obtained by applying gray level co-occurrence matrix. Findings: Based on the similarity between image features CBIR methods retrieve images accurately from the image database. But the traditional system will work well only for the data set which has more dissimilarity. In this study, based on combining the Gaussian Mixture Model (GMM) with k-means clustering algorithm, a new hybrid algorithm for clustering is proposed. A one to one matching scheme is used to compare the query and target image on the basis of all the features extracted. This hybrid Gaussian mixture model will provide more accurate retrieval in the case of the dissimilarity between the image data set is very low. The proposed system is capable of working fewer dissimilarity data set as well more dissimilarity data. Applications/Improvements: The proposed hybrid retrieval method provide more accurate retrieval with the precision measures of 98% and also more robustness with retrieval of 95%.Keywords
Content-Based Image Retrieval (CBIR), Co-occurrence Matrix, Expectation-Maximization (EM) Algorithm, Feature Extraction, Gaussian Mixture Model (GMM), K-Means Clustering Algorithm.- Reconfigurable Filter Bank Multicarrier Modulation for Cognitive Radio Spectrum Sharing - A SDR Implementation
Authors
1 ECE Department, SRM University, Chennai - 603203, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 6 (2016), Pagination:Abstract
Background/Objectives: Cognitive radio is used as promising technologies for dynamic spectrum access and optimization of wireless resources. Under dynamic spectrum access to provide the ability of working any band of frequency based on need, the reconfigurable cognitive radio is designed. Methods/Statistical Analysis: Multicarrier modulation is the feasible method to share the spectrum without interference. OFDM is one of the efficient multicarrier techniques available for the system design. One of the problems in OFDM for spectral sharing is the side band leakage that will inject interference from secondary radio sub carrier to primary radio sub carrier. To avoid this, in this work a Filter Bank based Multi Carrier (FBMC) modulation is used. Findings: Few simulation works are reported for the interference free spectrum sharing by using FBMC. But this work analyzes the real time practical implementation of the interference free dynamic spectrum sharing. Reconfigurable is another important aspect of the implementation which is provided by the Kintex 7 FPGA implementation of the reconfigurable filter bank multicarrier modulation using NI USRP 2943R SDR platform. This FBMC based Transceiver is implemented by using fast Xilink IP cores of FFT and systolic array based FIR filter IP core. The transceiver is realized to produce output for every clock after a fixed latency 240 clocks or 6 microsecond for 40Mz clock rate. This performance is achieved using single clock loop architecture of LABVIEW FPGA tool and the parallel, pipelined architecture realization of IP cores and other building blocks. Applications/Improvements: Experimental study shows that the BER of primary user for the implemented system is better than the OFDM system by the factor of 10-1.Keywords
Cognitive Radio, Dynamic Spectrum Sharing, Multi Carrier Modulation, OFDM Reconfigurable, SDR- A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography
Authors
1 School of Electronics Engineeirng, VIT University Chennai – 600048, Tamil Nadu, IN
2 ECE, GKM College of Engineering and Technology, Chennai - 600 063, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 10 (2016), Pagination:Abstract
Background/Objectives: The terrorism threat caused by terrorist who posses forged passport and identities due to insecure environment which could be more serious imminent. Traditional scheme and techniques available to protect the information from unauthorized user is not enough for the current environment. Methods/Statistical analysis: So, a hybrid multilevel DNA computing based Color Code Cryptographic scheme combined with Elliptic Curve Cryptography is proposed to protect the passport data from the eavesdropper. Proposed data encryption algorithm consists of two level of security, first level of security is provided by convert the personal details (plaintext) of the customer into Unicode and RGB color code, and then map the color code with DNA nucleotide. The mapped DNA molecules converted into ASCII values for encryption process. DNA molecules help to store enormous amount of data intended to allow more number of user to access the system. Second level of security is provided by encrypt the ASCII values using Elliptic Curve Cryptography techniques which require very less key size compared with traditional schemes. Resultant ciphertext is hidden in the personal image of the customer using LSB steganographic method. Findings: Compared with traditional scheme, proposed scheme provides multilevel of security with less communication and computational overhead due to its lesser key size. ECC-80 bit key size based encryption scheme provides same level of security as RSA-1024 scheme with less number of operations involved in the passport verification system. Applications/Improvements: Since the proposed scheme require very less key size, consumes very less power, it will be more suitable for power constrained devices such as smart card, sensors, mobile phones, PDA's, RFID tags, etc.,