The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Session Hijacking is one of the major threats in IEEE 802.11 Wireless LANs. Existing methodologies to overcome this attack seems to be non comprehensive. These Existing mechanisms to counter-act this attack increase the communicational overhead and load on the server and client. In this paper we propose a novel and robust mobile agent based mechanism to overcome the session hijacking attacks in IEEE...
The concept of audio/video call and conferencing using Wi-Fi is discussed in this paper. We have proposed a method to have audio/video calls and conferencing using Wi-Fi at negligible cost. Most of the techniques used for the conferencing are based on the client-server architecture. These techniques suffer from the fundamental problem of the centralized system i.e., single point of failure. The main...
In Mobile Ad hoc Networks, routes are drastically discovered by broadcasting the control packets. Broadcasting of these packets is useful, but results in high routing packet overhead. In this paper, a route discovery mechanism using an optimum angle selection based approach is proposed in order to improve the network performance by minimizing the flooding of control packets, result in less routing...
In mobile ad hoc network due to the limited transmission range of wireless nodes, multiple hops are needed to exchange information between nodes in the network. Thus routing is a crucial issue to design of a Mobile Ad-Hoc Network. So, there is need of efficient routing protocols to establish communication paths between nodes, without causing extreme control traffic overhead or power constrained devices...
In this paper, a new work on channel drop filters (CDFs) based on photonic crystals ring resonators (PCRRs) is presented. The filter characteristics for single-ring configurations based on two dimensional (2D) square lattice photonic crystal (PC) silicon rods have been investigated by using the two-dimensional (2D) finite-difference time-domain (FDTD) method. The CDF we designed can easily separate...
Generally wireless sensor nodes have been using omni-directional antennas to broadcast data. But these antennas are not very efficient as they suffer from poor spatial reuse, high collisions, decreased throughput and are not energy efficient. Usage of directional antennas which radiate in a particular direction is more efficient as it can lead to significant energy savings. They reduce beamwidth by...
The performance analysis of Alamouti space time block code (STBC) based orthogonal frequency division multiplexing (OFDM) is often analyzed on the assumption that the channel is constant over Alamouti code period (two consecutive OFDM symbol block). But when the channel is fast fading, this assumption does not hold good and causes co-channel interference (CCI) and inter-carrier interference (ICI)...
In this article, a non-signature based statistical scanner for metamorphic malware detection, employing feature ranking methods like Term Frequency-Inverse Document Frequency-Class Frequency (TF-IDF-CF), Galavotti-Sebastiani-Simi Coefficient (GSS), Term Significance (TS) and Odds Ratio (OR) is proposed. Malware and benign models for classification are created by considering top ranked features obtained...
Multi-Channel Dynamic Scheduling has been centric stage of research in WSNs in recent years. In this paper, we propose a Distributed Multi-Channel Scheduling MAC communication protocol (DMS-MAC) to improve the network performance of WSNs, which selects the best channel for an individual wireless sensor node. DMS-MAC supports dynamic channel assignment mechanism where each sensor node is equipped with...
Multicasting is intended for group communication, which supports the dissemination of information from a sender to all the receivers in a group. Mobile wireless Ad Hoc networks are infrastructure less and often used to operate under unattended mode, posing problems like scarcity of bandwidth, short lifetime of the nodes due to power constraints, and dynamic topology caused by the mobility of nodes...
Due to lack of power source, energy is the key concern area in Wireless Sensor Networks. Maximum energy is used in transmission of data. Many research works have been done to develop routing algorithms to increase the lifetime of a sensor network. Among them clustering based approach is well known for achieving energy efficiency. This paper proposes a new routing strategy based on hierarchical routing...
Now-a-days cloud computing is the most emerging technology due to its elasticity of resource provisioning and the pay-as-you-go pricing model which enables users to pay only according to their need. As cloud can be accessed anytime and anywhere through commodity hardware only its demand is increasing day by day. So it must provide high performance gain to the user and at the same time must be beneficial...
Regression analysis is one of the techniques of data mining and is used to generate futuristic model for a given problem. One of the major challenge in the study of Regression analysis is to reduce the Outlier values. But the inherent complex and flexible nature of web data makes it difficult for various regression algorithms to propose an ideal futuristic model. This paper discusses a method that...
Internet has had offered plethora of services availed by the users either free of cost or at unimaginable price. Voice over Internet Protocol (VoIP) is also one of such boons provided by the net. It is a technique for transferring Voice (analog signals) over the Internet (packet switched based) using Internet Protocol (IP). Voice transmission through a non-circuit switched network rather than a dedicated...
Due to evolution of prevalent sophisticated digital video editing software it has become easier to forge any video. Copy-Move forgery is a special kind of video forgery technique, in which copy-move of the frame region is performed in intra frame or inter frames. This copy-move introduces a special kind of relationship between the original frame segment and the pasted one, which provides clue for...
In today's era VoIP system is globally accepted and popular communication system because of its rich features. VoIP system uses two signalling protocol: H323 and SIP (Session Initiation Protocol) for session initialization. Out of these SIP is popular amongst VoIP subscriber because of its light weight nature. SIP is vulnerable to various confidentiality threats because of its text nature and poor...
The Emerging E-commerce and high hit rate web applications requires distribution of computational resources in a wide-area network with components administered locally and independently to provide faster response time to remote users. The dynamic and multi-institutional nature of these environments poses challenging security issues. Trust relationships among the communicating entities and faster access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.