The Fourth International Conference on Network Security & Applications (CNSA-2011)

Venue: Hyatt Regency Chennai
July 15 ~ 17, 2011, Chennai, India.


Accepted Papers

1
A Modified Energy-Efficient Transmission Strategy for Wireless Sensor Networks
N.A.Natraj, S.Gopinath and S.B.Aneithkumar, Anna University of Technology-Coimbatore, India
4
Study of Malware Threats Faced by the Typical Email Users
Anthony Ayodele,James Henrydoss,Walter Schrier and Terry Boult, University of Colorado at Colorado Springs, USA
9
Re-Pro-active vs Hybrid Protocols: A Simulation study between different routing approaches using traversing in Wireless Ad-hoc network
Akhilendra S Bhadoria, Sanjeev Sharma, Manisha Bhadoria and Rajesh Wadhwani
19
A Comparison of Routing Attacks on Wireless Sensor Networks
Shahriar Mohammadi1 and Hossein Jadidoleslamy2, 1K.N.Tossi University of Technology, Iran and 2University of Guilan, Iran
24
Vector Space Access Structure and ID based Distributed DRM Key Management
Ratna Dutta, Indian Institute of Technology-Kharagpur, India
29
Vulnerability Assessment Methods - A Review
Hiran V Nath and Gireesh Kumar T, Amrita Vishwa Vidyapeetham University, India
41
Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks
K. Gopalakrishnan and V. Rhymend Uthariaraj, Anna University, India
49
Difference between Intrusion Detection System (IDS) & Intrusion Prevention System (IPS)
Asmaa Shaker Ashoor and Sharad Gore, Pune University, India
59
Defense Strategy Against Network Worms causing ICMP attacks and its Forensic Analysis
Aathira K. S, Thulasi N. Kutty and Gireesh Kumar, Amrita University-Coimbatore, India
69
Time Stamp Based ECC Encryption and Decryption
A.V.N.Krishna, PJMS, India
77
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM
Ashji s Raj and Chungath Srinivasan, Amrita Vishwa Vidyapeetham, India
81
Intrusion Detection System using Rough Set Theory and Incremental SVM
Ghanshyam Prasad Dubey, Vijay Chaudhary and Illyas Khan, TIT, Bhopal, M.P., India
88
Development of a Novel Algorithm To Increase Network Lifetime for Sensor Network
A.R. Sardar1, J. P. Sharma2, S.J.Das2, J.K.Sing2 and S.K.Sarkar2, 1Institute of Technology & Marine Engineering, India and 2Jadavpur University, India
90
An Efficient Route Discovery In MANETs With Improved Route Lifetime
S.Priyadarsini, T.M. Navamani and Yogesh, Anna university, India
93
End-to-End Security for At-Home Medical Monitoring
Mohanavalli Seetha Subramanian1 and Sheila Anand2, 1Tagore Engineering College, India and 2Rajalakshmi Engineering College, India
94
Design of Secure Chaotic Hash Function based on Logistic and Tent Maps
P. Jhansi Rani, M.Sambasiva Rao and S.Durga Bhavani, University of Hyderabad, India
96
Detecting Anomalous Application Behaviors using a System Call Clustering Method over Critical Resources
Jyostna Grandhi, Himanshu Pareek and P R L Eswari, Centre for Development of Advanced Computing, India
97
Behavioral malware detection expert system - Tarantula
Sandeep Romana, Swapnil Phadnis and Himanshu Pareek, Center for development of advanced computing, India
98
Tool for Prevention and Detection of Phishing E-mail Attacks
Shamal M. Firake, Pravin Soni, B.B.Meshram, V.J.T.I.-Mumbai, India
100
Improvement of QoS performance in MANET by QoS-TORA: a TORA Based QoS Routing Algorithm
Govind K.Jha,Neeraj Kumar, Himanshu Sharma and K.G Sharma, GLA University Mathura, India
107
Authentication Process in IEEE 802.11: Current Issues and Challenges
Dinesh Yadav and Anjali Sardana, Indian Institute of Technology Roorkee, India
114
Tool For Prevention And Detection Of Input Validation Attacks
Anjali Yeole and Bandu Meshram,Veermata Jijabai Technological Institute Matunga Mumbai, India
117
Network Level Anomaly Detection System Using MST Based Genetic Clustering
Kola Sujatha P, Arun R, Shanthoosh P V, Ezra Prince Jebahar I and Kannan A, Anna Unniversity, Chennai, India
130
A Hybrid Approach to Texture Classification
V. Subbiah Bharathi1 and B. Vijayalakshmi2, 1DMI College of Engineering, India and 2Velammal College of Management and Computer Studies, India
131
Completeness of LAN Attack Detection using Discrete Event Systems
F.A. Barbhuiya, N Hubballi and S Biswas and S Nandi, Indian Institute of Technology Guwahati, India
139
Designing Dependable Web Services Security Architecture Solutions
D.Shravani1, P.Suresh Varma2 and M.Upendra Kumar3, 1Rayalaseema University, India, 2Adikavi Nannaya University, India and 3JNTU, India
147
A Case Study Of Security In Vanets
Siva Rama Krishnan S, Pavithra Balaji, Gracia S and Sakthi Ganesh M, VIT University, India
152
Minimizing Synchronization Messages in Coordinated Checkpointing for Mobile Distributed Systems
Parveen Kumar, Meerut Institute of Engineering & Technology, India
157
e-Tendering: Making e-business Alive
Ishan Mishra, Salhin Iqbal and S.M.Yasir Anwar, YCCE, India
166
Performance Evaluation of RB Switching and NRB Switching in Ad Hoc Wireless Network
Vikas G. Bhowate and Girija G.Chiddarwar, Sinhgad College of Engineering-Pune, India
172
Different Types of Debouncing Solutions
Sri Latha Bhamidipati and Venkata Praveen. M, GITAM University, India.
178
Protocol for Simultaneous Ownership Transfer of Multiple RFID Tags with TTP
Wei Zhou1 and Selwyn Piramuthu2, 1ESCP Europe, France and 2University of Florida, USA
180
Data Security in Free Roaming Mobile agents
G.Geetha 1 and C.Jayakumar2, 1Jerusalem college of Engineering, India and 2RMK Engineering college, India
182
A Preventive Measure to Protect from Denial of Service Attack
Manas Ku.Dasmohapatra1, Kamalika Datta1 and Indranil Sengupta2, 1KIIT University-Bhubaneswar, India and 2IITK, India
186
Review of Some Checkpointing Algorithms for Distributed and Mobile Systems
Sunil Kumar Gupta1 and Parveen Kumar2, 1Meerut Institute of Engineering & Technology, India and 2Beant College of Engineering and Technology, India
191
Using Raga as a Cryptographic Tool
Sandip Dutta, Soubhik Chakraborty and N.C.Mahanti, Birla Institute of Technology, India
198
Analysis and Comparision of Position Based Routing Protocol in Mobile Adhoc Network.
Vimal Upadhyay , Gori Shankar, Amritpal and Jai Balwan, St. Margaret Engineering College, India
199
Establishing Stable Certificate Chain Based Hybrid Key Management Scheme for MANET
M. Suguna and P. Subathra, Thiagarajar College of Engineering, India
203
Run-time Estimation based Grid Scheduling using Multilevel Feedback Queue for the Computational Grid Environment
Rajkumar Rajavel, Adhiyamaan College of Engineering, India
209
Combining Power of MATLAB with SystemVerilog for Image and Video Processing ASIC Verification
Dhaval Modi1, Harsh Sitapara2, Rahul Shah3, Ekata Mehul3 and Pinal Engineer4, 1L.D. College of Engineering, India, 2M.S.University of Baroda, India, 3einfochips, India and 4S.V.N.I.T, India
217
Security Analysis Of Encryption Scheme Based On Edge Map Algorithm
S.Anusha and B.Bhuvaneswaran, Rajalakshi Engineering College, India
218
Memory Attack Detection of Cryptographic Algorithm
K.Rahimunnisa, S.Sureshkumar and Rincy Merrin Varkey, Karunya University, India
228
Performance Comparison Of Queueing Disciplines For Aeerg Protocol In Manet
S.Rajeswari and Y.Venkataramani, Saranathan College of Engineering, India
229
Design of a Cryptographic Tamper Detection Scheme for Network Security
B. Srinivasa Rao and S.D.V. Prasad, Malla Reddy EngineeringCollege, India
232
An Active Way of Filtering Scheme for Data Reporting in Wireless Sensor Networks
V.Manjula1 and R.Thalapathi Rajasekaran2, 1Anna University, India and 2S M K Fomra Inst. of Tech, India
234
Simulation of unified architecture of IEEE 802.11a and 802.16a PHY layers using MATLAB
Devashish Raval1, Nilesh Ranpura2, Ekata Mehul3 and Zuber Saiyed2, 1Charotar Institute of Technology, India, 2SVNIT-Surat, India and 3Einfochips Pvt. Ltd, India
236
A Novel Approach Towards Implementation Of Aes And Performance Comparison With The Proposed S-Box
K.Rahimunnisa, K.Rajeshkumar and S. Sureshkumar, Karunya University, India
237
Mutual Authentication for Mobile Communication Using Symmetric and Asymmetric Key Cryptography
Tumpa Roy and Kamlesh Dutta, NIT Hamirpur, India
238
Energy Efficient and Congestion Control Multipath Routing in Wireless Sensor Networks
Nesa Sudha.M1, Sapna E. John1 and Valarmathi M.L2, 1karunya university, India and 2Govt.College of Technology-Coimbatore, India
243
Advanced Techniques for Detection and Removal of Cracks in Digitized Paintings
Pranob K Charles, B.S.N Sasidhar Reddy and Ch.Pujitha, KLU, India
246
Intrusion Prevention By Native Language Password Authentication Scheme
Sree Latha.M1 and Sashi.M2, 1J.C.College of Engineering, India and Andhra University, India
249
An Improved Uncertainty Reduction Scheme Based on Bayesian Prediction in MANETs
B. Lydia Elizabeth, S. Sudha, A. John Prakash and V. Rhymend Uthariaraj, Anna University, India
252
Scalable Implementation of Active Detection Mechanism for LAN based Attacks
G. Bansal, N Kumar, F.A. Barbhuiya, S Biswas, and S Nandi, IIT Guwahati, India
266
A Survey Of Recent Intrusion Detection Systems For Wireless Sensor Network
Tapolina Bhattasali1 and Rituparna Chaki2, 1Techno India College of Technology, India and 2West Bengal University of Technology, India
269
Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers
Vengala Satish Kumar, Tanima Dutta, Arijit Sur and Sukumar Nandi, IIT Guwahati India
286
Tcp Over Multihop Wireless Mesh Network
Sumedha R. Chokhandre and Urmila Shrawankar, G.H.Raisoni College of Engg, India
303
Novel Patch Propagation based Text Removal in an Image
B. Vidhya and S. Valarmathy, Bannari Amman Institute of Technology, India
308
Intrusion Detection System based on Real Time Rule Accession and Honeypot
Abhay Nath Singh, Shiv Kumar and R.C.Joshi, Indian Institute of Technology-Roorkee, India
309
Dynamic Trust Based Method to Mitigate Greyhole Attack in Mobile Adhoc Networks
N.Bhalaji and A.Shanmugam, Anna university of technology coimbatore, India
310
Key pre-distribution in 3-D grid-group deployment scheme
Samiran Bag, Indian Statistical Institute, India
311
Novel Methods for Montgomery Modular Multiplication for Public Key Cryptosystems
V.R.Venkatasubramani, M.Surendar, and S.Rajaram, Thiagarajar College of Engineering, India
313
Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture
Alwyn Roshan Pais, Deepak D.J and B.R Chandavarkar, NITK-Surathkal, India
318
Reducing space complexity and Increase in security in 3D password Scheme
Sonkar S.K1, Awdeshkumar2 and Shivaji Ghungrad3, 1JJTU rajsthan, India, 2AVCOE Sangamner, India and 3st.xavier institute mumbai, India
334
Highly Resilient Key Predistribution Scheme Using Transversal Designs And Reed Muller Codes For Wireless Sensor Network
Samiran Bag1, Amrita Saha2 and Pinaki Sarkar3, 1ISI Kolkata, India, 2IIT Bombay, India and 3Jadavpur University, India
345
Communication Aware Co-Scheduling For Parallel Job Scheduling In Cluster Computing
A.Neela madheswari1 and A.Neela madheswari2, 1cse, India and 2Government College of Engineering, India
346
Improving fairness in network traffic by controlling congestion and unresponsive flows
M.Azath1 and R.S.D.Wahida banu2, 1MET'S School of Engineering, India and 2Government College of Engineering, India
347
Prevention Of Wormhole Attack in Ad-Hoc Networks
Sharma Pallavi and Trivedi Aditya, ABV-Indian Institute of Information and Management Technology, India
348
Authenticated Routing for Ad-hoc On-demand Distance Vector Routing Protocol
Preeti Sachan and Pabitra Mohan Khilar, NIT Rurekela, India
372
A Fast and Efficient Mixed Encryption Scheme for Management Information Systems
P.Varalakshmi, Aravindh Ramaswamy, Aswath Balasubramanian and Palaniappan Vijaykumar, Anna University Chennai, India
379
Passblot: A usable way of authentication scheme to generate one time passwords
Sainath Gupta, Pruthvi Sabbu, Siddhartha Varma and Suryakanth V Gangashetty, IIIT - Hyderabad, India
380
Safeguarding Web Services using Self-Adaptive Schema Hardening Algorithm
Vipul Patel, Radhesh Mohandas and Alwyn R. Pais, NITK Surathkal, India
390
Modeling and Performance Analysis of QAM System
T.P. surekha1, T. Ananthapadmanabha2 and C. Puttamadappa3, 1Vidyavardhaka College of Engineering, India, 2National Institute of Engineering, India and 3S.J.B. Institute of Technology, India
399
An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks
Khalid Nasr, Anas Abou-El Kalam, and Christian Fraboul, Universite de Toulouse, France
405
Rational Secret Sharing with Honest Players over an Asynchronous Channel
William K. Moses Jr. and C. Pandu Rangan, IIT Chennai, India
415
A Cloud Computing Solution For Monitoring Patient's Health Conditions
Neethu.G.S and M.Shanmugasundaram, Hindustan Institute of Technology and science, India
424
A secure email login system using virtual password
Nishant Doshi, SVNIT, India
429
Bibliography of Social Networks
M.P.S. Bhatia and Deepti Lamba, University of Delhi, India
430
Agent based Cross Layer Intrusion Detection System for MANET
V. Anjana Devi1 and R.S.Bhuvaneswaran2, 1St.Joseph's College of Engineering, India and 2Anna University-Chennai, India
451
Designing Usability Heuristics for Intrusion Detection System
Tulsidas Patil, Ganesh Bhutkar and Noshir Tarapore, VIT,Pune, India
452
Evaluating Machine Learning Algorithms For Detecting DDoS Attacks
Manjula Suresh and R.Anitha, PSG College of Technology, India
460
Cognitive Symmetric Key Cryptographic Algorithm
Y.RA. Kannan, S. Aravind Prasad, Arshad Azeem and P. Varalakshmi, Madras Institute of Technology, India
478
Bayesian Based Confidence Model for Trust Inference in MANET
B. Lydia Elizabeth, R. Aaishwarya, P. Kiruthika, M. Nandini Shrada, A.John Prakash and V. Rhymend Uthariaraj, Anna University Chennai, India
480
Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network
Rahul Johari1 and Neelima Gupta2, 1GGSIP University, India and 2University of Delhi, India
484
Efficiency and Security Enhancement in Tracking Mobile Devices
M. Roberts Masillamani, Renju.J.Vattakuzhy and D.S.John Deva Prasanna, Hindustan University Chennai, India
485
Implementation of Microcontroller Based Driver Circuit for Plasma Display Panel
P.Saravanan1 and P.A.Balakrishnan2, 1SNS College Of Engineering, India and 2KCG College of technology, India
486
Implementation of Localized Multicast for the Clone Detection in a Distributed Large- Scale Network
M.Roberts Massillamani, Jelin Sara George and D.S John Deva Prasanna, Hindustan University-Chennai, India
496
A Co-Operative Intrusion Detection System In Mobile Ad-Hoc Network
S.S Chopade1 and N.N.Mhala2, 1SSPACE, India and 2Bapurao Deshmukh COE, India
511
A Remote Laboratory Platform For Industrial Training Based On Programmable Logic Controllers
Sreedeep Krishnan and M.Arul Prasanna, PSNA College of Engineering and Technology, India
578
Barrel Distortion Correction In Wide Angle Camera Images Based On Fpga
T.Arul Nancy, Madha Engineering College, India
583
Design and study of Chirped Fiber Bragg Grating sensor for sensing Hazardous gases
Anubhuti Khare and Jaikaran Singh, UIT,RGPV Bhopal, India
584
Trust based Multipath Route Discovery for MANETs with improved Route Lifetime
S. Priyadarsini1, T.M. Navamani1 and P. Yogesh2, 1Easwari enginnering college, India and 2Anna University, India
587
Financial Time Series Volatility Forecast Using Evolutionary Hybrid Artificial Neural Network
Anupam Tarsauliya, Rahul Kala, Ritu Tiwari and Anupam Shukla, Indian Institute of Information Technology & Management Gwalior, India
597
Web Mining Research and Future Directions
G.Dileep Kumar and Manohar Gosul, SR Engineering College, India
605
Efficient Multicast Packet Authentication Using Batch Signature
P.Deepika and M.Pradeep, Anna University Chennai, India
607
An Intelligent Approach for Mining Frequent Spatial Objects in Geographic Information System
Animesh Tripathy1 and Prashanta Kumar Patra2, 1KIIT University, India and 2CET, BPUT, India
608
A Renovated Idea On Minimum Spanning Tree-Based Clustering Algorithm
K. Kavitha and N. RajKumar, Sri RamaKrishna Engineering College, India
609
Randomized Dispersive Multipath Routing In Wireless Sensor Networks
Juvanita.J, Pavendhar Bharathidasan College of Engineering and Technology, India
615
Raising End-User Security Awareness Through Interactive Games
Sheeba Mohandoss, University of Plymouth, United Kingdom
616
Real Time Vehicle Tracking Using Rfid
Robert.P and Anuradha.P, Information Technology, Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College, India
617
A Location Discovery Distance Scheme Against Malicious Beacon Nodes
P.Selvaperumal and S.Sharanyaa, Vel Tech Dr.RR & Dr.SR Technical University, India
665
Conditional Proxy Re-Encryption - A More Efficient Construction
S. Sree Vivek1,S. Sharmila Deva Selvi1, V. Radhakishan2 and C. Pandu Rangan1, 1Indian Institute of Technology Madras,India and 2National Institute of Technology Trichy, India