A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Saranya, S.
- Security and Trust Based Model for Peer To Peer System
Authors
1 Department of CSE, Avinashilingam University, Coimbatore-641 108, Tamil Nadu
Source
Wireless Communication, Vol 6, No 2 (2014), Pagination:Abstract
Peer to peer is an advanced computer networking where all computers contribute to equivalent task for processing data. A Peer to peer network can be an ad hoc connection in which a pair of computers attached by means of a universal serial bus to transmit files. Security is not much effective in this type of systems it is because if the connections are not fixed to the computers appropriately then there will be difficulty in accessing certain files and the relationship is untrusted. Hence security in peer to peer systems is complex since disputes are created by lack of integrated authority. A new hybrid trust algorithm is used in this paper to facilitate a peer to reason about reliability of other peers based on earlier period interactions and recommendations. Both local trust value and global trust value is calculated while downloading from peer to peer system. Interactions and recommendations are assessed based on recentness, importance and peer satisfaction factors. Diffie–Hellman key exchange establishes a shared secret that can be used for secret communications while exchanging data over a public network. RSA algorithm (Rivest, Shamir, Adleman) based on Asymmetric key cryptography which ensures timely accessibility of reputation information to other peers along with security. The approach is to summarize the earlier period performance of the peer in its digital reputation and then predicting its deeds pertaining to future. The information shared among the peers is encrypted and decrypted using RSA Signatures. Thus malicious activities are prevented in peer’s reputation. The experiment is carried out using Java programming and the simulation results revealed that the RSA algorithm implemented using public key cryptography is protected and well-organized in a decentralized peer to peer network. Better peers were capable to figure confidence connections in their immediacy and detach malicious peers.
Keywords
Asymmetric Key Cryptography, Diffie–Hellman Key Exchange, Peer to Peer Systems, RSA Algorithm, RSA Signatures.- Smart System to Guide Ambulance
Authors
Source
Wireless Communication, Vol 11, No 3 (2019), Pagination: 40-43Abstract
The number of casualties in road accident has significantly increased despite the advancement in medicinal fields and hospital facilities. In the present day environment, the traffic limitations are the major concern to reach the hospital on time. The traffic limitations can be overcome by alerting the ambulance to respective traffic signals en route, thereby clearing the path for the ambulance to move without any obstacles. With the help of GPS and GSM it is possible to track the ambulance and the location of the patient. And also we have to develop the algorithm to find the shortest path to reach the nearest hospital.
Keywords
Congestion Control, Traffic Control, Emergency Vehicle, Ambulance, Smart Alert, Shortest Path.References
- Levi L. Rose, “Emergency Traffic control system with security transmission coding.”
- Michael R. Smith, paul J. Davidson ane Henry L.Pfister, “Emergency Vehicle warning and traffic control system”
- A smart phone-based pocket fall accident detection, positioning, and rescue system IEEE Journal of biomedical and health informatics 2014.
- Hi-Fi traffic clearance Technique for life saving vehicles using differential GPS. System world academy of science engineering and technology 2011.
- Cryptography and data security by Dorothy E. enning, peter J. Denning.
- Vehicle accident automatic detection and remote alarm device international Journal of Reconfigurable and Embedded system.