A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Premalatha, N.
- Congestion Control and Performance Improvement of Ad-hoc Networks by Increasing Throughput and Reducing Delay
Authors
1 Department of Computer Science and Engineering, Kongu Engineering College, Perundurai, IN
2 Bannari Amman Institute of Technology, Sathyamangalam, IN
Source
Wireless Communication, Vol 3, No 4 (2011), Pagination: 292-299Abstract
A medium access control (MAC) protocol decides when competing nodes may access the radio channel, and tries to ensure that no two nodes are interfering with each other’s transmissions. In this paper we propose a QoS model for wireless ad hoc networks. Unlike other models it provides stochastic end to end delay guarantees using a routing protocol called GPSR (Greedy Perimeter Stateless Routing) protocol. After the routing is over the packets transmission is done through CTMAC (Concurrent Transmission MAC) protocol with fragmentation. The packets are transmitted concurrently where concurrent transmission is possible. CTMAC inserts additional control gap between the transmission of control packets (RTS/CTS) and data packets (DATA/ACK), which allows a series of RTS/CTS exchanges to take place between the nodes in the vicinity of the transmitting, or receiving node to schedule possible multiple, concurrent data transmissions. It completely utilizes the channel bandwidth and increase the fairness of each flow without causing congestion. This increases the throughput. The results shows us that the throughput of QoS model, where network flow is identified using GPSR protocol and packets are transmitted through CTMAC protocol with fragmentation, is increased when compared with the throughput of CTMAC protocol alone.Keywords
Wireless, Congestion Control, MAC Protocol, QOS Enhancement, Fragmentation, CTMAC Protocol, Throughput, GPSR.- Efficient User Authentication in Multi user Cloud using Fingerprint and Merkle Hash Algorithm
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 6 (2016), Pagination: 157-160Abstract
Cloud Computing has been envisioned as the next generation architecture of the IT enterprise due to its on demand self-service, ubiquitous network access, location-independent resource pooling , rapid resource elasticity and usage-based pricing . The fundamental aspect of cloud storage computing model is that data is being centralized or outsourced into the cloud without the burden of local hardware and software management thereby new and challenging threat on data arises. Fingerprint Authentication , a significant security element and popular biometric modality which is used extensively in several applications for person authentication, providing high uniqueness and acceptable performance. In existing system the security of fingerprint data is not highly ensured . In this project a new approach of remote user fingerprint authentication scheme using the concept of Merkle Hash Tree has been proposed. The data owner stores the file in an encrypted form in the cloud server. The cloud user has to register with the owner along with the ischolar_main signature. In the client side, the Fingerprint template is split it into eight shares using image processing technique. The splitted eight shares are given as inputs to merkle hash tree wherein each share has to undergo hashing function and hence ischolar_main signature is generated. The signature is generated and stored in the cloud server. The user has to submit the adjacent and sibling shares of fingerprint template for authentication purpose. The signature is generated in the cloud service provider and thus verified with the stored signature in the cloud. The misuse of sensitive data can be avoided and this provides an effective and efficient user remote authentication with the cloud.
Keywords
Cloud Computing, Finger Print, Root Signature, Biometric, Authentication.- An Enhanced Intrusion Detection System for Multitier Dynamic Web Applications
Authors
1 Dr. MCET, Pollachi, Coimbatore – 641 035, IN