A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saranya, K.
- An Algorithm for Dexterous Scanning Neighbour Devices in Opportunistic Mobile Social Networks
Authors
1 Bannari Amman Institute of Technology, Sathyamangalam, TamilNadu, IN
2 Bannari Amman Institute of Technology, Sathyamangalam, TamilNadu, IN
Source
Networking and Communication Engineering, Vol 8, No 4 (2016), Pagination: 95-99Abstract
In personal mobile devices, information is exchanged between the devices by encountering each other. While, frequent scanning for opportunistic encounters would soon drain the battery on existing devices. We propose a new hybrid algorithm for neighbour discovery called the Amalgam algorithm a combination approach of STAR and PISTONSv2 algorithms. STAR is based on contact probe time, which dynamically selects the probing interval using both the short-term contact history and also the long-term history based on time. PISTONv2 is based on inter probe time calculation, which enables mobile devices dynamically alter the rate when searching for other devices, thus creating a fully decentralized autonomous network and also save energy. By combined approach of STAR and PISTONv2 called Amalgam algorithm which saves power consumptions of a battery and detect more encounters as compared to individual approach of STAR and PISTONv2 algorithm.
Keywords
Neighbour Discovery, Opportunistic Network, Decentralized, STAR, PISTONv2, Amalgam Algorithm, Inter Probe Time, Contact Probe Time.- Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography
Authors
1 Department of M.Tech (ISCF), IN
2 CSE, IN
Source
Networking and Communication Engineering, Vol 8, No 5 (2016), Pagination: 183-186Abstract
Digital evidence is defined as information and data of value to an investigation that is stored on received or transmitted by an electronic device. Investigation takes time to prove against the intruder .The internal and external tampering can happen. Data must be collected and preserved by investigator. By cloning or imaging data can be copied to another drive. Thus Original data can be prevented from the analyzer and intruder. A data base where evidence is analyzed on the device that generates it, can be transmitted from multiple sources to a server using a novel signature scheme which can be easily falsified. Data can be changed into fake or true by working on evidence. Hence data can be preserved by falsification detection. Encrypted data can be recovered and morphed image can be detected by data hiding process. Email is the communication tool which can have much evidence by email header analysis to find the victims contacts and stores as evidence.