-
Nontransitive Ranking to Enhance Routing Decision in MANETS
Authors:
Md. Amir Khusru Akhtar,
Arshad Usmani,
G. Sahoo
Abstract:
An ad hoc network is an infrastructureless network in which nodes perform terminal as well as routing functions. A routing protocol is the only substitute to complete the communications in the absence of an access point. In spite of that mobile nodes or so called routers uses some mechanism for calculating the best route when it has multiple routes for the same destination. On the basis of one or…
▽ More
An ad hoc network is an infrastructureless network in which nodes perform terminal as well as routing functions. A routing protocol is the only substitute to complete the communications in the absence of an access point. In spite of that mobile nodes or so called routers uses some mechanism for calculating the best route when it has multiple routes for the same destination. On the basis of one or more metrics routes are ranked from best to worst. But, in an ad hoc network many factors can affect this decision, such as the delay, load, route lifetime etc. Thus measuring and finding routes on the basis of crisp mathematical model for all these attributes is complicated. That why, the fuzzy approach for best route determination is required for MANET because some of the metrics are fuzzy or vague and the classical ranking of routes and transitivity in the ranking does not hold. The proposed Nontransitive Route Ranking subjective comparison of one route with others and performs nontransitive ranking to rank routes from best to worst. The pairwise comparisons of each route with others give more accurate and fair comparison. The proposed ranking is easier than classical ranking in which metrics have assigned some value and these values are combined to obtain the ranking. Experimental result shows the efficiency of the proposed model. Keywords: Fuzzy, Rank, Nontransitive, Route, Ranking, Relativity
△ Less
Submitted 21 July, 2014;
originally announced July 2014.
-
A New Clustering Approach for Anomaly Intrusion Detection
Authors:
Ravi Ranjan,
G. Sahoo
Abstract:
Recent advances in technology have made our work easier compare to earlier times. Computer network is growing day by day but while discussing about the security of computers and networks it has always been a major concerns for organizations varying from smaller to larger enterprises. It is true that organizations are aware of the possible threats and attacks so they always prepare for the safer si…
▽ More
Recent advances in technology have made our work easier compare to earlier times. Computer network is growing day by day but while discussing about the security of computers and networks it has always been a major concerns for organizations varying from smaller to larger enterprises. It is true that organizations are aware of the possible threats and attacks so they always prepare for the safer side but due to some loopholes attackers are able to make attacks. Intrusion detection is one of the major fields of research and researchers are trying to find new algorithms for detecting intrusions. Clustering techniques of data mining is an interested area of research for detecting possible intrusions and attacks. This paper presents a new clustering approach for anomaly intrusion detection by using the approach of K-medoids method of clustering and its certain modifications. The proposed algorithm is able to achieve high detection rate and overcomes the disadvantages of K-means algorithm.
△ Less
Submitted 10 April, 2014;
originally announced April 2014.
-
Cloud Computing Simulation Using CloudSim
Authors:
Ranjan Kumar,
G. Sahoo
Abstract:
As we know that Cloud Computing is a new paradigm in IT. It has many advantages and disadvantages. But in future it will spread in the whole world. Many researches are going on for securing the cloud services. Simulation is the act of imitating or pretending. It is a situation in which a particular set of condition is created artificially in order to study that could exit in reality. We need only…
▽ More
As we know that Cloud Computing is a new paradigm in IT. It has many advantages and disadvantages. But in future it will spread in the whole world. Many researches are going on for securing the cloud services. Simulation is the act of imitating or pretending. It is a situation in which a particular set of condition is created artificially in order to study that could exit in reality. We need only a simple Operating System with some memory to startup our Computer. All our resources will be available in the cloud.
△ Less
Submitted 21 February, 2014;
originally announced March 2014.
-
Humanistic approach in mobile ad hoc network: HAMANET
Authors:
Md. Amir Khusru Akhtar,
G. Sahoo
Abstract:
Human society is a complex and most organized networks, in which many communities have different cultural livelihood. The creation/formation of one or more communities within a society and the way of associations can be mapped to MANET. By involving human characteristics and behavior, surely it would pave a new way, for further development. In this paper we have presented a new approach called "HA…
▽ More
Human society is a complex and most organized networks, in which many communities have different cultural livelihood. The creation/formation of one or more communities within a society and the way of associations can be mapped to MANET. By involving human characteristics and behavior, surely it would pave a new way, for further development. In this paper we have presented a new approach called "HAMANET" which is not only robust and secure but it certainly meets the challenges of MANET (such as name resolution, address allocation and authentication). Our object oriented design defines a service in terms of Arts, Culture, and Machine. The 'Art' is the smallest unit of work (defined as an interface), the 'Culture' is the integration/assembling of one or more Arts (defined as a class) and finally the 'Machine' which is an instance of a Culture that defines a service. The grou** of the communicable Machines of the same Culture forms a 'Community'. We have used the term 'Society' for MANET consisting of one or more communities and modeled using humanistic approach. We have compared our design with GloMoSim and proposed the implementation of file transfer service using the said approach. Our approach gives better results in terms of implementation of the basic services, security, reliability, throughput, extensibility, scalability etc.
△ Less
Submitted 30 December, 2013;
originally announced December 2013.
-
Load Balancing using Ant Colony in Cloud Computing
Authors:
Ranjan Kumar,
G. Sahoo
Abstract:
Ants are very small insects.They are capable to find food even they are complete blind. The ants lives in their nest and their job is to search food while they get hungry. We are not interested in their living style, such as how they live, how they sleep. But we are interested in how they search for food, and how they find the shortest path. The technique for finding the shortest path are now appl…
▽ More
Ants are very small insects.They are capable to find food even they are complete blind. The ants lives in their nest and their job is to search food while they get hungry. We are not interested in their living style, such as how they live, how they sleep. But we are interested in how they search for food, and how they find the shortest path. The technique for finding the shortest path are now applying in cloud computing. The Ant Colony approach towards Cloud Computing gives better performance.
△ Less
Submitted 7 December, 2013;
originally announced December 2013.
-
Subsiding routing misbehavior in MANET using "Mirror Model"
Authors:
Md. Amir Khusru Akhtar,
G. Sahoo
Abstract:
Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that's why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified. In this paper, we present the "Mirror Model…
▽ More
Noncooperation or failure to work together is a big challenge that surely degrades the performance and reliability of Mobile Adhoc Networks. In MANETs, nodes have dual responsibilities of forwarding and routing, that's why it needs unison with nodes. To sort out non-cooperation a real life behavior should be implemented, so that misbehavior is nullified. In this paper, we present the "Mirror Model" that strictly enforces cooperation due to its punishment strategy. Node's behavior is watched by its neighbors in PON mode, to update the NPF, NPRF values for a threshold time. After the expiry of the threshold time each node calculates the PFR and broadcasts its neighbors. Similarly all neighbors broadcasted PFR is received and processed by the node to define the 'G' and 'BP' values. The G value is used to isolate selfish nodes from the routing paths and BP denotes the amount of packets to be dropped by an honest node against a selfish node in spite of its misbehavior/packet drops. Cooperation within the neighbors, certainly result in subsiding misbehavior of selfish nodes, therein enhancing cooperation of the whole MANET. This model ensures honesty and reliability in MANET because it does not eliminate a node, but it behaves in the same way as the node behaved. Therefore, it justifies its name, after all mirrors reflects the same. We have implemented the model in "GloMoSim" on top of the DSR protocol, resulting its effectiveness, as compared to the DSR protocol when the network is misconducting for its selfish needs.
△ Less
Submitted 14 November, 2013;
originally announced November 2013.
-
The principles of humanism for MANETs
Authors:
Md. Amir Khusru Akhtar,
G. Sahoo
Abstract:
The proposed humanistic approach mapped the human character and behavior into a device to evade the bondages of implementation and surely succeed as we live. Human societies are the complex and most organized networks, in which many communities having different cultural livelihood. The formation of communities within a society and the way of associations can be mapped to MANET. In this work we hav…
▽ More
The proposed humanistic approach mapped the human character and behavior into a device to evade the bondages of implementation and surely succeed as we live. Human societies are the complex and most organized networks, in which many communities having different cultural livelihood. The formation of communities within a society and the way of associations can be mapped to MANET. In this work we have presented the principles of humanism for MANETs. The proposed approach is not only robust and secure but it certainly meets the existing challenges (such as name resolution, address allocation and authentication). Its object oriented design defines a service in terms of Arts, Culture, and Machine. An 'Art' is the smallest unit of work (defined as an interface), the 'Culture' is the integration and implementation of one or more Arts (defined as a class) and finally the 'Machine' which is an instance of a Culture that defines a running service. The grou** of all communicable Machines having the same Culture forms a 'Community'. We have used the term 'Society' for a MANET having one or more communities and modeled using the humanistic approach. The proposed approach is compared with GloMoSim and the implementation of file transfer service is presented using the said approach. Our approach is better in terms of implementation of the basic services, security, reliability, throughput, extensibility, scalability etc.
△ Less
Submitted 13 November, 2013;
originally announced November 2013.
-
Securing Software as a Service Model of Cloud Computing: Issues and Solutions
Authors:
Rashmi Rai,
G. Sahoo,
S. Mehfuz
Abstract:
Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed new…
▽ More
Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed new security issues. This paper provides an insightful analysis of the existing status on cloud computing security issues based on a detailed survey carried by the author. It also makes an attempt to describe the security challenges in Software as a Service (SaaS) model of cloud computing and also endeavors to provide future security research directions.
△ Less
Submitted 10 September, 2013;
originally announced September 2013.
-
A Novel Methodology to Overcome Routing Misbehavior in MANET using Retaliation Model
Authors:
Md. Amir Khusru Akhtar,
G. Sahoo
Abstract:
MANET is a cooperative network in which nodes are responsible for forwarding as well as routing. Noncooperation is still a big challenge that certainly degrades the performance and reliability of a MANET. This paper presents a novel methodology to overcome routing misbehavior in MANET using Retaliation Model. In this model node misbehavior is watched and an equivalent misbehavior is given in retur…
▽ More
MANET is a cooperative network in which nodes are responsible for forwarding as well as routing. Noncooperation is still a big challenge that certainly degrades the performance and reliability of a MANET. This paper presents a novel methodology to overcome routing misbehavior in MANET using Retaliation Model. In this model node misbehavior is watched and an equivalent misbehavior is given in return. This model employs several parameters such as number of packets forwarded, number of packets received for forwarding, packet forwarding ratio etc. to calculate Grade and Bonus Points. The Grade is used to isolate selfish nodes from the routing paths and the Bonus Points defines the number of packets dropped by an honest node in retaliation over its misconducts. The implementation is done in "GloMoSim" on top of the DSR protocol. We obtained up to 40% packet delivery ratio with a cost of a minimum of 7.5% overhead compared to DSR. To minimize total control traffic overhead we have included the FG Model with our model and it reduces the overhead up to 75%. This model enforces cooperation due to its stricter punishment strategy and justifies its name.
△ Less
Submitted 9 September, 2013;
originally announced September 2013.
-
Towards Securing APIs in Cloud Computing
Authors:
Kumar Gunjan,
R. K. Tiwari,
G. Sahoo
Abstract:
Every organisation today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organisations focus on their core activities leaving all IT services development and maintenance to the cloud service providers. Application Programming Interfaces (APIs) act as the interface betwe…
▽ More
Every organisation today wants to adopt cloud computing paradigm and leverage its various advantages. Today everyone is aware of its characteristics which have made it so popular and how it can help the organisations focus on their core activities leaving all IT services development and maintenance to the cloud service providers. Application Programming Interfaces (APIs) act as the interface between the CSPs and the consumers. This paper proposes an improved access control mechanism for securing the Cloud APIs.
△ Less
Submitted 25 July, 2013;
originally announced July 2013.
-
Some New Methodologies for Image Hiding using Steganographic Techniques
Authors:
Rajesh Kumar Tiwari,
Gadadhar Sahoo
Abstract:
Security and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space have been discussed. Based on thes…
▽ More
Security and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space have been discussed. Based on these methods, we have constructed secured stego image creator and secured multi image viewer in Microsoft platform so as to provide high level of security and using less memory space for storage of image files in the above said electronic devices
△ Less
Submitted 2 November, 2012;
originally announced November 2012.
-
An Unmanned Aerial Vehicle as Human-Assistant Robotics System
Authors:
Tejbanta Singh Chingtham,
G. Sahoo,
M. K. Ghose
Abstract:
According to the American Heritage Dictionary [1],Robotics is the science or study of the technology associated with the design, fabrication, theory, and application of Robots. The term Hoverbot is also often used to refer to sophisticated mechanical devices that are remotely controlled by human beings even though these devices are not autonomous. This paper describes a remotely controlled hoverbo…
▽ More
According to the American Heritage Dictionary [1],Robotics is the science or study of the technology associated with the design, fabrication, theory, and application of Robots. The term Hoverbot is also often used to refer to sophisticated mechanical devices that are remotely controlled by human beings even though these devices are not autonomous. This paper describes a remotely controlled hoverbot by installing a transmitter and receiver on both sides that is the control computer (PC) and the hoverbot respectively. Data is transmitted as signal or instruction via a infrastructure network which is converted into a command for the hoverbot that operates at a remote site.
△ Less
Submitted 19 April, 2011;
originally announced April 2011.
-
An Artificial Immune System Model for Multi-Agents Resource Sharing in Distributed Environments
Authors:
Tejbanta Singh Chingtham,
G. Sahoo,
M. K. Ghose
Abstract:
Natural Immune system plays a vital role in the survival of the all living being. It provides a mechanism to defend itself from external predates making it consistent systems, capable of adapting itself for survival incase of changes. The human immune system has motivated scientists and engineers for finding powerful information processing algorithms that has solved complex engineering tasks. This…
▽ More
Natural Immune system plays a vital role in the survival of the all living being. It provides a mechanism to defend itself from external predates making it consistent systems, capable of adapting itself for survival incase of changes. The human immune system has motivated scientists and engineers for finding powerful information processing algorithms that has solved complex engineering tasks. This paper explores one of the various possibilities for solving problem in a Multiagent scenario wherein multiple robots are deployed to achieve a goal collectively. The final goal is dependent on the performance of individual robot and its survival without having to lose its energy beyond a predetermined threshold value by deploying an evolutionary computational technique otherwise called the artificial immune system that imitates the biological immune system.
△ Less
Submitted 24 February, 2011;
originally announced March 2011.
-
Hiding Secret Information in Movie Clip: A Steganographic Approach
Authors:
G. Sahoo,
Rajesh Kumar Tiwari
Abstract:
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant informatio…
▽ More
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.
△ Less
Submitted 4 March, 2011;
originally announced March 2011.
-
Artificial Immune Privileged Sites as an Enhancement to Immuno-Computing Paradigm
Authors:
Tejbanta Singh Chingtham,
G. Sahoo,
M. K. Ghose
Abstract:
The immune system is a highly parallel and distributed intelligent system which has learning, memory, and associative capabilities. Artificial Immune System is an evolutionary paradigm inspired by the biological aspects of the immune system of mammals. The immune system can inspire to form new algorithms learning from its course of action. The human immune system has motivated scientists and engin…
▽ More
The immune system is a highly parallel and distributed intelligent system which has learning, memory, and associative capabilities. Artificial Immune System is an evolutionary paradigm inspired by the biological aspects of the immune system of mammals. The immune system can inspire to form new algorithms learning from its course of action. The human immune system has motivated scientists and engineers for finding powerful information processing algorithms that has solved complex engineering problems. This work is the result of an attempt to explore a different perspective of the immune system namely the Immune Privileged Site (IPS) which has the ability to make an exception to different parts of the body by not triggering immune response to some of the foreign agent in these parts of the body. While the complete system is secured by an Immune System at certain times it may be required that the system allows certain activities which may be harmful to other system which is useful to it and learns over a period of time through the immune privilege model as done in case of Immune Privilege Sites in Natural Immune System.
△ Less
Submitted 19 February, 2011;
originally announced February 2011.
-
Algorithm for Predicting Protein Secondary Structure
Authors:
K. K Senapati,
G. Sahoo,
D. Bhaumik
Abstract:
Predicting protein structure from amino acid sequence is one of the most important unsolved problems of molecular biology and biophysics.Not only would a successful prediction algorithm be a tremendous advance in the understanding of the biochemical mechanisms of proteins, but, since such an algorithm could conceivably be used to design proteins to carry out specific functions.Prediction of the se…
▽ More
Predicting protein structure from amino acid sequence is one of the most important unsolved problems of molecular biology and biophysics.Not only would a successful prediction algorithm be a tremendous advance in the understanding of the biochemical mechanisms of proteins, but, since such an algorithm could conceivably be used to design proteins to carry out specific functions.Prediction of the secondary structure of a protein (alpha-helix, beta-sheet, coil) is an important step towards elucidating its three dimensional structure as well as its function. In this research, we use different Hidden Markov models for protein secondary structure prediction. In this paper we have proposed an algorithm for predicting protein secondary structure. We have used Hidden Markov model with sliding window for secondary structure prediction.The secondary structure has three regular forms, for each secondary structural element we are using one Hidden Markov Model.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
A Probabilistic Model For Sequence Analysis
Authors:
Amrita Priyam,
B. M. Karan,
G. Sahoo
Abstract:
This paper presents a probabilistic approach for DNA sequence analysis. A DNA sequence consists of an arrangement of the four nucleotides A, C, T and G and different representation schemes are presented according to a probability measure associated with them. There are different ways that probability can be associated with the DNA sequence: one way is when the probability of an occurrence of a l…
▽ More
This paper presents a probabilistic approach for DNA sequence analysis. A DNA sequence consists of an arrangement of the four nucleotides A, C, T and G and different representation schemes are presented according to a probability measure associated with them. There are different ways that probability can be associated with the DNA sequence: one way is when the probability of an occurrence of a letter does not depend on the previous one (termed as unsuccessive probability) and in another scheme the probability of occurrence of a letter depends on its previous letter (termed as successive probability). Further, based on these probability measures graphical representations of the schemes are also presented. Using the diagram probability measure one can easily calculate an associated probability measure which can serve as a parameter to check how close is a new sequence to already existing ones.
△ Less
Submitted 11 February, 2010;
originally announced February 2010.