Accepted Papers



  • Proposed System for Secure Data Transmission using TBPC Method with NPR
    Ms. Rukaiya A. Chaugule and Ms. Amrita A. Manjrekar,Shivaji University,India.
    ABSTRACT
    The rise of the Internet and multimedia techniques has prompted increasing interest in hiding data in digital media. This work proposes a new scheme of combining image-based non-photorealistic rendering(NPR) that is art image creation and data hiding. In the first phase, a new type of computer art, called line-based Cubism-like image, which exhibit a property of the Cubism art is created. Cubism art is an abstract synthetic art which is full of geometric angles and shapes, and the picture itself it flattened almost to the point of two-dimensionality. In the second phase, data hiding with the minimal distortion is carried out in the created cubism-like art image using tree-based parity check method (TBPC). The TBPC method is a least significant bit (LSB) steganographic method. The tree-based parity check method is very efficient for hiding a message on image data due to its simplicity. The proposed scheme provides a higher level of security for secret data keeping or transmission.
  • A Novel Approach to Mitigate Grayhole attack in Mobile ad-hoc networks
    Mr. Ankit D. Patel,Parul Institute of Engineering and Technology,India
    ABSTRACT
    Due to some characteristics of MANET such as lack of centralized entity and dynamic topology, MANET is highly prone to various security issues. The important type of attack that can harm the MANET is the Grayhole attack. Such type of attack should be detected and prevented as early as possible. Our paper proposes a method which makes the use of the advance version of Data Routing Information (DRI) table which is used mainly in the detection of the Blackhole attack. Our method detects the Grayhole attack by modifying the DRI table entries and implementing other modules. Our method, apart from detecting malicious node, isolates that node from the network once it is detected as malicious node.
  • Efficient ASIC Architecture of RSA Cryptosystem
    Varun Nehru and H.S. Jattana,Semi-Conductor Laboratory,India
    ABSTRACT
    This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA crypto-accelerator along with key-pair generation. A structural design methodology for the same is proposed and implemented. The purpose is to design a complete cryptosystem efficiently with reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and Extended Binary GCD algorithm are presented and then they are integrated. Standard algorithm for RSA has been used. The RSA datapath has further been transformed into DPA resistant design. The simulation and implementation results using 180nm technology are shown and prove the validity of the architecture.
  • Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
    Ranjeet Masram1, Vivek Shahare1, Jibi Abraham1, Rajni Moona1, Pradeep Sinha2, Gaur Sunder2, Prashant Bendale2, Sayali Pophalkar2,1College of Engineering Pune,India,2Centre for Development of Advanced Computing,India
    ABSTRACT
    Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical implementation of different cryptographic algorithms like implementation cost and performance. This paper provides comparative analysis of time taken for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2, Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density, data size and key sizes.
  • Common Policy Language for Policy Compliance and Change Detection System in Managed Service in Data Networks
    Saeed M. Agbariah,University Virginia, USA
    ABSTRACT
    As networks continue to grow in size, speed and complexity, as well as in the diversification of their services, they require many ad-hoc configuration changes. Such changes may lead to potential configuration errors, policy violations, inefficiencies, and vulnerable states. The current Network Management landscape is in a dire need for an automated process to prioritize and manage risk, audit configurations against internal policies or external best practices, and provide centralized reporting for monitoring and regulatory purposes in real time. One of the core requirements for our proposed Automated Policy Compliance and Change Detection system is a common policy language for expressing device and organizational policies; a common policy language will ease the enforcement of such policies to all components of the network. Furthermore, using a common policy language brings numerous practical advantages, such as lower implementation overhead, as well as the possibility to user the same or at least similar tools to maintain the policies.
  • EDA Flow for Differential Logic DPA Resistant Design
    Varun Nehru and Jimit Gadhia,Semi-Conductor Laboratory,India
    ABSTRACT
    In many cryptosystems or secured designs, DPA resistance is a prime requirement. It has been suggested that most effective countermeasure of DPA is its outright prevention. This paper discusses the methodology, custom Electronic Design Automation flow and implementation of Differential Power-balancing countermeasure, Delay Insensitive Min-term Synthesis, a technique of Differential Power Analysis resistance at system level using Synopsys EDA Tools. Implementation of the transformation is carried out using Synopsys Design Complier TCL commands and is guided for its formal equivalence checking using Formality. Place & Route is performed using IC Compiler and the simulation results, obtained in XA, are shown. In the end, the paper is concluded with the observation made in simulation results demonstrating successful implementation of the desired transformation.
  • A Multi-Layer Architecture For Spamdetection System
    Vivek Shandilya, Fahad Polash and Sajjan Shiva,University of Memphis,USA
    ABSTRACT
    Email is one of the most popular communication means in current digital world. People are heavily dependent on email for both professional and personal communication. However, as email communication is very cheap, spammers are taking advantage of it for advertising their products, for committing cybercrimes. So, researchers are working hard to combat with the spammers. Many spam detections techniques are built to fight against the spammers. But the spammers are continuously finding new ways to defeat the existing filters. This paper describes the existing spam filters techniques and proposes a multi-level architecture for spam email detection. .We analyse the performance and show the advantages.
  • Analysis of Current Wi-Fi Security Practices via War Driving and Proposed Solution
    Pranshu Bajpai, Nikhil Raj Singh and Dr. Vrijendra Singh,Indian Institute of Information Technology,India
    ABSTRACT
    As the number of Wi-Fi Access points continue to grow, so does the need for their security. While encryption protocols for securing Wi-Fi access points exist, during the research it was found that such protocols are being overlooked by the access point administrator as he/she continues to use outdated and insecure protocols. This gives a false sense of security. A variety of malicious groups hunt for such weak Wi-Fi Access Points. This paper focuses on War driving activity as a means to gather data regarding the number of users who continue to deploy Weak Wi-Fi security and discusses related implications. The paper also suggests a solution in the form of a simple program that can be used even by a non-technical Wi-Fi user to determine if his/her Wi-Fi security is at par with the current Wi-Fi security practices.
  • Improved Secure Address Resolution Protocol
    Abhishek Samvedi, Sparsh Owlak and Dr. Vijay Kumar Chaurasia,Indian Institute of Information Technology,India
    ABSTRACT
    In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP spoofing attack.
  • Securing Reprogramming Protocols in Wireless Sensor Network
    Minal R.Narad and Archana R.Raut,G.H. Raisoni College of Engineering Nagpur, India.
    ABSTRACT
    Many interesting protocols have been proposed in recent years and there has been a lot of research done focusing on secure reprogramming. However all of the protocols are based on the centralized approach. Alternatively, keeping in mind the security and efficiency of distributed reprogramming in wireless sensor nodes from previous research, we planned to work on a distributed approach and decided to integrate two protocols algorithm, naming improved SDRP and a Rateless Deluge in WSN leading to improve reprogramming protocols security and efficiency using AES and DWT technology. This research may also support user privacy preservation in Distributed Reprogramming.
  • Efficient Algorithm For Rsa Text Encryption Using Cuda-C
    Sonam Mahajan and Maninder Singh,Thapar University,India
    ABSTRACT
    Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhance the speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo value that can process large power of numbers which otherwise are not supported by built-in data types. First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical soundness can be alleviated by this algorithm.
  • Survey on Information Hiding Techniques Using QR Barcode
    Manoj S. Rewatkar and Shital A. Raut,Visvesvaraya National Institute of Technology,India.
    ABSTRACT
    Nowadays, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious purpose. Recently QR barcodes have been used as an effective way to securely share information. This paper presents the survey on information hiding techniques which can share high security information over network using QR barcode.
  • Taxonomy: Mobile Malware Threats
    Lovi Dua, Divya Bansal,PEC University of Technology,India.
    ABSTRACT
    Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals.Information exchange capability of mobile devices open up new security concerns and make them target for attackers.Malware exhibits malicious behavior by embedding malicious code into legitimate applications .They have capability of disrupting system services by compromising confidentiality, integrity and availability of operating systems and applications. Due to their open-source nature, black-hat attackers are attracted to exploit the vulnerabilities in Operating Systems(OSs).This paper provides an overview of mobile malware threat vectors and existing techniques for detection and protection of mobile devices against different classes of attacks.
  • Shared Key Generation for Threshold Cryptography using Points on a Hyper Plane
    Bhaskara Rao N, Dayananda Sagar College of Engineering Bangalore, India.
    ABSTRACT
    This paper presents a new method of generating secret key shares for a (k, n) threshold cryptography. The method uses points lying on a multi dimensional hyper-plane as key shares.
  • Survey on Classification Techniques for Intrusion Detection
    PritamSapate and Shital A. Raut,VNIT,India.
    ABSTRACT
    Intrusion detection is the most essential component in network security. Traditional intrusion detection methods are based on extensive knowledge of signature of known attacks. They are unable to deal with newly arising attacks. Therefore, to deal with these newly arising attacks data mining based intrusion detection techniques are being highly researched. Data mining techniques such as classification, clustering and association rules are used in intrusion detection. In this paper, we present an overview of intrusion detection, KDD Cup 1999 dataset and detailed analysis of different classification techniques namely Support vector Machine, Decision tree, Naive Bayes and Neural Networks used in intrusion detection.