Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shalini Punithavathani, D.
- Clone Attack Detection Using Pair Access Witness Selection Technique
Abstract Views :226 |
PDF Views:3
Authors
Affiliations
1 C.S.I. Institute of Technology, Thovalai, Tamilnadu, IN
2 Government College of Engineering, Tirunelveli, Tamilnadu, IN
1 C.S.I. Institute of Technology, Thovalai, Tamilnadu, IN
2 Government College of Engineering, Tirunelveli, Tamilnadu, IN
Source
International Journal of Computer Networks and Applications, Vol 3, No 5 (2016), Pagination: 118-128Abstract
Sensor nodes set out in malicious surroundings and are susceptible to pickup and pact. An intruder may reach confidential hidden particulars from these sensors, clone and cleverly spread out them in the network to put up a variety of insider attacks. This attack mode is mostly defined as a clone attack. We propose a new layout for clone attack detection that comes up with successful and well-organized technique called PAWS (Pair Access Witness Selection) technique to detect such clone attacks. Selecting common nodes in between the pairmate as a witness node is the key idea of PAWS to detect clones in the network. The witness selection plays a vital role to overcome the redundancy and reachability problem. The proposed framework results in detecting clones and detection performance depends on the proper selection of witness nodes. Performance analysis and simulations also reveal that our new scheme is more proficient than extant schemes from communication cost and energy consumption.Keywords
Clone Attacks, Wireless Sensor Networks, Network Security, Node Replication Detection.- Analysis and Epigrammatic Study of Various Tone Mapping Operators for High Dynamic Range Images
Abstract Views :216 |
PDF Views:0
Authors
Affiliations
1 Government College of Engineering, Tirunelveli - 627007, Tamil Nadu, IN
1 Government College of Engineering, Tirunelveli - 627007, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 36 (2015), Pagination:Abstract
Background: In Recent years Display of HDR images on yardstick LDR Displays with Tone mapping Operators (TMO) has many issues like halo artefacts, edge preservations and visual appearance. Always there exists a issue about usage of operator with regard to the input sequence without all these factors. Objectives: In this paper a thorough analysis is carried out with 31 TMO operators. Existing study papers are up to maximum of 8 TMOs, but this paper evaluates all the 31 operators and the objective quality measure is calculated. Researchers are carried out to identify a better operator for its own applications, which motivated to do this paper, the resultant analysis provokes to the development of a new method with lesser computational time. This work can be further extended to optimization of the algorithm used in fusion of base and detail layers of sequence of input. From the analysis the naturalness, structural fidelity and Quality of the image can be improved.Keywords
Enhancement of LDR Image, High Dynamic Range Images, Local and Global Operator, Tone Mapping Operators.- Taws:Table Assisted Walk Strategy in Clone Attack Detection
Abstract Views :231 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, C.S.I. Institute of Technology, IN
2 Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, IN
1 Department of Computer Science and Engineering, C.S.I. Institute of Technology, IN
2 Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 4 (2016), Pagination: 1387-1396Abstract
Wireless Sensor Networks (WSNs) deployed in the destructive atmosphere are susceptible to clone attacks. Clone attack in wireless sensor network is a complicated problem because it deployed in hostile environments, and also the nodes could be physically compromised by an adversary. For valuable clone attack detection, the selection criteria play an important role in the proposed work. In this paper, it has been classified the existing detection schemes regarding device type, detection methodologies, deployment strategies and detection ranges and far explore various proposals in deployment based selection criteria category. And also this paper provides a review of detection methodology based on various clone attack detection techniques. It is also widely agreed that clones should be detected quickly as possible with the best optional. Our work is exploratory in that the proposed algorithm concern with table assisted random walk with horizontal and vertical line, frequent level key change and revokes the duplicate node.Our simulation results show that it is more efficient than the detection criteria in terms of security feature, and in detection rate with high resiliency. Specifically, it concentrates on deployment strategy which includes grid based deployment technique. These all come under the selection criteria for better security performance. Our protocol analytically provides effective and clone attack detection capability of robustness.Keywords
Clone Attacks, Wireless Sensor Networks, Node Replication Detection.- Trustworthy Optimized Clustering Based Target Detection and Tracking for Wireless Sensor Network
Abstract Views :158 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Tamizhan College of Engineering and Technology, IN
2 Government College of Engineering, Tirunelveli, IN
1 Department of Computer Science and Engineering, Tamizhan College of Engineering and Technology, IN
2 Government College of Engineering, Tirunelveli, IN
Source
ICTACT Journal on Communication Technology, Vol 7, No 2 (2016), Pagination: 1326-1333Abstract
In this paper, an efficient approach is proposed to address the problem of target tracking in wireless sensor network (WSN). The problem being tackled here uses adaptive dynamic clustering scheme for tracking the target. It is a specific problem in object tracking. The proposed adaptive dynamic clustering target tracking scheme uses three steps for target tracking. The first step deals with the identification of clusters and cluster heads using OGSAFCM. Here, kernel fuzzy c-means (KFCM) and gravitational search algorithm (GSA) are combined to create clusters. At first, oppositional gravitational search algorithm (OGSA) is used to optimize the initial clustering center and then the KFCM algorithm is availed to guide the classification and the cluster formation process. In the OGSA, the concept of the opposition based population initialization in the basic GSA to improve the convergence profile. The identified clusters are changed dynamically. The second step deals with the data transmission to the cluster heads. The third step deals with the transmission of aggregated data to the base station as well as the detection of target. From the experimental results, the proposed scheme efficiently and efficiently identifies the target. As a result the tracking error is minimized.Keywords
Clustering, Dynamic, Target Tracking, Static, Oppositional, Gravitational Search.- Real Time GA and ANN Based Selective Harmonic Elimination in 9 Level Ups Inverter
Abstract Views :212 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, IN
1 Department of Computer Science and Engineering, Manonmaniam Sundaranar University, IN
2 Department of Computer Science and Engineering, Government College of Engineering, Tirunelveli, IN