http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
VANET Optimized IP Address Allocation
Brijesh Kumar Chaurasia,Shekhar Verma,Henna Parveen,G. S. Tomar 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.3
Vehicular Ad hoc network is usually deployed for minimizing hand off latency and reducing packet loss. VANET consist of vehicle to vehicle and vehicle to infrastructure communication. Vehicles form infrastructure network with the access point and infrastructure less within themselves which is called ad-hoc network. The handoff latency and packet loss is reduced with the help of front and rear vehicles. In case of no front or rear vehicles this scenario comes to halt with both handoff latency and packet loss coming into picture. So in order to remove this flaw we create a pool of IP addresses where two access points share a particular group of IP address. This paper deals with this method described in detail.
Gaussian Profile based Vehicular Mobility Modeling
Brijesh Kumar Chaurasia,Shekhar Verma,G. S. Tomar 사단법인 인문사회과학기술융합학회 2011 예술인문사회융합멀티미디어논문지 Vol.1 No.2
The driving behavior of a person is influenced by a multitude of local and global factors. These include nature of the driver, distance between the source and destination, condition of the road selected by the driver, traffic conditions, time constraints, lane changing, overtaking actions, safe distance, reaction time etc. are vital for modeling the mobility of a vehicle and are largely determined by the driving behavior. In this paper, a profile based model has been proposed to define the mobility behavior of the vehicles. Different types of influence on the mobility have been lumped and the profile of the motion of vehicles has been modeled as a Gaussian profile. In this model, a driver, first, selects the source, destination and his path and then, selects the parameters of the profile according to his/her presumption. Simulation and results show that profile based model is able to generate realistic and smooth mobility patterns.
ID- Based Authentication for WiMAX
Pushpi Rani1,Brijesh Kumar Chaurasia,Geetam Singh Tomar 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.2
WiMAX is broadband wireless system being used for long range wireless networking, which makes this system vulnerable to security breaches. In this paperwe present authentication scheme using ID-based signature scheme for WiMAX, which offers a certificate-less public key verification. The proposed scheme has also increased message processing throughput as it has used elliptic curve cryptosystem, sigencryption and identity based cryptography.
Token Based Trust Computation in VANET
Kapil Sharma,Brijesh Kumar Chaurasia,Shekhar Verma,Geetam Singh Tomar 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.5
In vehicular ad hoc network or VANET, the safety related messages broadcast by vehicles is used by other vehicles to make critical decisions. This may trap a vehicle taking wrong decision with dire consequences and authenticated vehicles or malicious vehicles may also broadcast wrong messages. This necessitates those messages of vehicles to be trusted after authentication process of vehicles, especially in the absence of centralized authority. In this paper, token based trust computation based on network connectivity duration of vehicles in VANET is proposed. The proposed technique is based on travelling time association among vehicles or network connectivity of vehicle at the time of driving on the road. We present simulations of the proposed technique that verify its correctness and reliability in the presence of infrastructure and absence of infrastructure. Results show that the efficacy of the proposed scheme and makes it viable for secure and lightweight trusted communication in a VANET.
Filtered Clustering Based on Local Outlier Factor in Data Mining
Vishal Bhatt,Mradul Dhakar,Brijesh Kumar Chaurasia 보안공학연구지원센터 2016 International Journal of Database Theory and Appli Vol.9 No.5
In this paper, the impact of k-means and local outliner factor on data set is studied. Outlier is the observation which is different from or inconsistent with the rest of the data. However, the main challenges of outlier detection are increasing complexity due to variety of datasets and size of dataset. To evaluate the outlierness and catch similar outliers as a group are also issues of this technique. The concept of LOF(Local Outlier Factor) is presented in this work. The paper describes comparative study of five different methodologies using K-means as the base algorithm along with the various distances method used in finding the dissimilarities between the objects hence to analyze the effects of the outliers on the cluster analysis of dataset in data mining.
Secure Multi-party Communication in Data-mining Applications
Anshu Chaturvedi,D.N. Goswami,Rishi Soni,Brijesh Kumar Chaurasia 보안공학연구지원센터 2015 International Journal of Database Theory and Appli Vol.8 No.4
Data mining extracts knowledge or patterns from a large amount of data. Secure communication is an issue of shared database applications. Fundamentally, secure multi party computation is to enable a number of networked parties to carry out distributed computing tasks on sensitive information. In this paper, we have proposed two techniques for multi party communication one is for third party assisted and another without third party. Third party assisted technique uses Group based approach and in case of without third party mechanism ECC based approach is used. Simulation results show that the time taken by the schemes are significantly less as compared to other schemes and this proves the efficacy of the proposed scheme which makes it viable for multi party communication in data mining applications.
A Probabilistic-Based Reputation Computation Model for VANET
Kapil Sharma,Aditya shrivastava,Ranjeet Singh Tomar,Brijesh Kumar Chaurasia,Namkyun Baik 보안공학연구지원센터 2016 International Journal of Software Engineering and Vol.10 No.12
Reputation computation model facilitates vehicles to broadcast traffic information in a vehicular ad hoc network (VANET) in order to improve road safety and efficiency. In this paper, a probabilistic-based reputation computation model for VANETs has been evaluated. The uncertainty of reputation is transformed into a probability distribution over possible reputed states that are hidden from observation but determined by a vehicle’s expected experience in VANET are addressed in this work. HMM is utilized to evaluate the level of reputation in VANET exhibiting dynamic behaviour. The proposed mechanism is probability distribution centric, though the later mechanism is docile to predict accurate trust value of messages. The time taken by the proposed scheme is significantly less and transmission over the shared wireless channel is in the order of milliseconds. Extensive results and simulation show that efficacy of the proposed model.