Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Thenmozhi, R.
- Randomized Multipath Routing for Overwhelming Attacks in Wireless Sensor Networks
Abstract Views :304 |
PDF Views:1
Authors
Affiliations
1 SRM University, Chennai, IN
2 Department of Computer Application, SRM University, Chennai, IN
1 SRM University, Chennai, IN
2 Department of Computer Application, SRM University, Chennai, IN
Source
Wireless Communication, Vol 3, No 6 (2011), Pagination: 472-475Abstract
A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions. Providing end-to-end data security in wireless sensor network (WSN) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider attacks due to possible node compromise, since a WSN is usually deployed in unattended/hostile environments. Compromised node and denial of service are two key attacks in Wireless Sensor Network (WSN). Here, we study the data delivery mechanisms to overcome these attacks with high probability of circumventing black holes. Classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes known to the source and make all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes.Keywords
Black Holes, Randomized Multipath Routes, Secure Data Collection, Wireless Sensor Network.- Optimal Design of Switched Reluctance Hub Motor
Abstract Views :322 |
PDF Views:3
Authors
Affiliations
1 Arunai Engineering College, Thiruvannamalai, IN
1 Arunai Engineering College, Thiruvannamalai, IN
Source
Programmable Device Circuits and Systems, Vol 4, No 7 (2012), Pagination: 368-371Abstract
This paper presents two criteria for evaluating the motoring operations of switched reluctance hub motor (SRM) drives for electric vehicles (EVs). They imply motoring torque and copper loss. To fulfil the best motoring operation, by using two weight factors and two base values, the developed optimization function selected as the correct balance between the maximum average torque and the maximum average torque per copper loss. The stator and rotor pole arc angles are selected as the optimized variables. Simulations results have demonstrated the proposed optimal design method. Therefore, this paper offers a valuable and feasible approach for implementing the best motoring operation of SR Hub Motor drives for EVs.Keywords
Design, Switched Reluctance Hub Motors (SRHMs), Electric Vehicles (EVs), Optimization.- Vulnerability Management in Web Applications
Abstract Views :391 |
PDF Views:2
Authors
Affiliations
1 Department of CSE, SMVEC, Puducherry, IN
1 Department of CSE, SMVEC, Puducherry, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 4 (2013), Pagination: 162-167Abstract
Web applications consist of several different and interacting technologies. These interactions between different technologies can cause vast security problems. As organizations are taking their businesses online they make their systems accessible to the world. They might have a firewall in place and possibly even their web server is running an up-to-date version of its software but that is not enough to protect their resources. Web applications become integral part in our day today life. Recent studies proves that more than fifty percent of the cost of software development is expend towards for testing, even though the software web applications is not free from its critical issues. Vulnerabilities provides more critical outcome in web applications instead in various researches have been involved with major impact of vulnerabilities. Recently the web applications are tested with minimal parameters. The main objective of proposed work is to reduce the time consumption and high cost for software testing. And in this paper we also tell about other possible vulnerabilities and their control measures. Using static analysis the critical vulnerabilities are analyzed where the issues are arising in web applications. The critical vulnerabilities such as handling catch block, encrypted password, execution failure in exception handling and redirecting the values of parameter. Depends on the severity of the issues the vulnerabilities are classified with the solutions.Keywords
Cross-Site Scripting (XSS), Empty Catch Block, Open Redirect SQL Injection, Storing Passwords in a Recoverable Format, Uncaught Exception.- Emerging Trends in Mobile Health Care System with Different Algorithms
Abstract Views :336 |
PDF Views:2
Authors
Affiliations
1 Department of CSE, SMVEC, Puducherry, IN
1 Department of CSE, SMVEC, Puducherry, IN