A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nagarajan, V. R.
- Certificate Revocation Based on Weighted Voting Game and Secure Way Routing Protocol (CR-WVG-SWR)
Authors
1 Mphil in Computer Science, Sree Narayana Guru College, Coimbatore-641105, Tamil Nadu, IN
Source
Indian Journal of Education and Information Management, Vol 5, No 3 (2016), Pagination: 1-7Abstract
Objectives: To improve the security of MANET by effectively removing the malicious nodes through certificate revocation mechanism based on game theory approach.
Methods: Weighted Voting Game (WVG) approach is most widely used game theory approach to find and remove the certificate of malicious nodes from the network. it used the voting mechanism in which each node can detect its nearby nodes behavior with the help of detection mechanism.
Findings: Mobile Adhoc Network contains mobile nodes which are deployed randomly in the network. These mobile nodes should cooperate each other for successful communication. But due to the frequent changes in network topology, the infrastructure for communication is not available and also presence of some malicious nodes cause attacks in the networks routing path. Hence, security is the major concern in this type of network. Certificate revocation mechanism based on weighted voting game (CR-WVG) approach was introduced in which malicious nodes were identified based on the voting mechanism with respect to weights and quota of each node. However, security in routing paths was still a problem in this approach.
Application/Improvements: To overcome this security issue, Certificate revocation based on weighted voting game and Secure Way Routing protocol (CR-WVG-SWR) is developed in which certificate from certificate authority (CA), shortest route discovered and data packets are encrypted using various encryption algorithms. Thus the performance of CR-WVG-SWR scheme is improved and compared with CR-WVG in terms of false revocation, revocation of malicious nodes, accuracy ratio of revocation and normalised time to revocation.
Keywords
Mobile Adhoc Network, Certificate Revocation, Weighted Voting Game, Secure Way Routing, Encryption Algorithms.References
- A. Kumar, S. Jakhar, S. Makkar. Distinction between Secret Key and Public Key Cryptography with Existing Glitches. Indian Journal of Education and Information Management, 2012, 1(9), 392-395.
- S. Kim. Effective certificate revocation scheme based on weighted voting game approach. IET Information Security. 2016, 10(4), 180-187.
- J. Rajeshwar, G. Narsimha. Secure way routing protocol for mobile ad hoc network. Wireless Networks, 2015, 1-10.
- T. Poongodi, M. Karthikeyan. Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks. Wireless Personal Communications, 2016; 90(2), 1039-1050.
- M. Raya, D. Jungels, P. Papadimitratos, I. Aad, J. P. Hubaux. Certificate revocation in vehicular networks. Laboratory for computer Communications and Applications (LCA) School of Computer and Communication Sciences, EPFL, Switzerland. 2006, 1-10.
- T.R. Panke. Clustering Based Certificate Revocation Scheme for Malicious Nodes in MANET. International Journal of Scientific and Research Publications, 2013; 3(5). 1-5.
- J. Clulow, T. Moore. Suicide for the common good: a new strategy for credential revocation in self-organizing systems. ACM SIGOPS Operating Systems Review, 2006, 40(3), 18-21.
- M. Srividya, K. Radhika, D. Jamuna. Review on certificate revocation of mobile ad hoc networks. International Journal of Engineering Research and Technology. ESRSA Publications. 2012; 1(7), 1-4.
- H. Luo, J. Kong, P. Zerfos, S. Lu, L. Zhang. URSA: ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Transactions on Networking (ToN), 2004, 12(6), 1049-1063.
- G. Arboit, C. Crépeau, C. R. Davis, M. Maheswaran. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 2008; 6(1), 17-31.
- R. Ayyasamy, P. Subramani. An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks. International Arab Journal of Information Technology, 2012, 9(3), 291-298.
- W. Liu, H. Nishiyama, N. Ansari, J. Yang, N. Kato. Cluster-based certificate revocation with vindication capability for mobile ad hoc networks. IEEE Transactions on parallel and distributed systems, 2013; 24(2), 239-249.
- D. S. Kumari, K. T. Sikamani. Communication based clustering to detect selfish nodes in MANET. Indian Journal of Science and Technology, 2015, 8(20), 1-6.
- Improved Top K Similarity Join with Data Dependent Hashing in Heterogeneous Information Network
Authors
1 Sree Narayana Guru College, Coimbatore-641105, Tamil Nadu, IN
Source
Indian Journal of Education and Information Management, Vol 5, No 4 (2016), Pagination: 1-7Abstract
Objectives: To reduce the length of hash codes in Local Sensitive Hashing (LSH)
Methods: Heterogeneous information network is a network where computers and other devices with different operating system are connected together. Today heterogeneous information network gets more attention in a network. But data mining becomes more difficult in heterogeneous information network. Similarity join is more important for many applications like online advertising, friend recommendation etc., similarity join is a measure of relationship between any two objects or strings or nodes. In this paper we considered the semantic meaning behind the paths to give top k similar pairs through Path-based Similarity join (PS-join) method. Then the expensive computations are removed by using bucket based data dependent hashing while the Local Sensitive Hashing is more expensive and involves more tedious process like to hold lengthier hash codes and approximate near neighbor problem.
Findings: The proposed data dependent hashing reduced the computation cost, memory and storage cost of hash codes and also overcome the problem of approximate near neighbor. The experimental results prove that the proposed technique works more efficiently than the existing technique in terms of recall, running time, and error ratio.
Application/Improvements: To increase the recall and to reduce the computation time and error ratio PS join with data dependent hashing is proposed.
Keywords
Heterogeneous Information Network, Top K Similar Pairs, Similarity Join, Path Based Similarity Join, Local Sensitive Hashing, Data Dependent Hashing.References
- J.Feng, J.Wang, G.Li. Trie-join: a trie-based method for efficient string similarity joins. The VLDB Journal—The International Journal on Very Large Data Bases, 2012; 21(4), 437-461.
- Y.Xiong, Y.Zhu, S. Y.Philip. Top-k similarity join in heterogeneous information networks. IEEE Transactions on Knowledge and Data Engineering, 2015; 27(6), 1710-1723.
- J.Cui, W.Wang, D.Meng, Z.Liu. Continuous similarity join on data streams. In 2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)2014 Dec, 552-559.
- C.Gennaro, F.Rabitti. Scalability Issues for Self Similarity Join in Distributed Systems. In 2010 18th Euromicro Conference on Parallel, Distributed and Network-based processing. IEEE. 2010, 309-316.
- Kunanusont, K., Chongstitvatana, J. An index structure for similarity join based on high-frequency queries. In Computer Science and Engineering Conference (ICSEC), 2014 International, 2014 Jul,415-420.
- K.Kunanusont, Chongstitvatana. Finding a set of high-frequency queries for high-frequency-query-based filter for similarity join. In:Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2015 12th International Conference (pp. 1-6). IEEE.
- J.Xu, B. Lei, Y. Gu, M.Winslett,G.Yu.Z.Zhang. Efficient Similarity Join Based on Earth Mover’s Distance Using MapReduce. IEEE Transactions on Knowledge and Data Engineering. 2015; 27(8), 2148-2162.
- X.Lian, Chen, L. Similarity join processing on uncertain data streams. IEEE Transactions on Knowledge and Data Engineering. 2011; 23(11), 1718-1734.
- S.Liu, G.Li, J.Feng. A prefix-filter based method for spatio-textual similarity join. IEEE Transactions on Knowledge and Data Engineering, 2014; 26(10), 2354-2367.
- C.Rong, W.Lu, X.Wang, X.Du, Y.Chen, A. K.Tung. Efficient and scalable processing of string similarity join. IEEE Transactions on Knowledge and Data Engineering, 2013; 25(10), 2217-2230.
- S. Mohammadi. Improvement of power Systems Operation using smart grid technology. Indian Journal of Education and Information Managements, 2012; 1(9), 396-405.