Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: Urban public spaces are sutured with a range of
surveillance and sensor technologies that claim to enable new forms
of ‘data based citizen participation’, but also increase the tendency
for ‘function-creep’, whereby vast amounts of data are gathered,
stored and analysed in a broad application of urban surveillance. This
kind of monitoring and capacity for surveillance connects with
attempts by civic authorities to regulate, restrict, rebrand and reframe
urban public spaces. A direct consequence of the increasingly
security driven, policed, privatised and surveilled nature of public
space is the exclusion or ‘unfavourable inclusion’ of those considered
flawed and unwelcome in the ‘spectacular’ consumption spaces of
many major urban centres. In the name of urban regeneration,
programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’
city initiatives refashion public space as sites of selective inclusion
and exclusion. In this context of monitoring and control procedures,
in particular, children and young people’s use of space in parks,
neighbourhoods, shopping malls and streets is often viewed as a
threat to the social order, requiring various forms of remedial action.
This paper suggests that cities, places and spaces and those who
seek to use them, can be resilient in working to maintain and extend
democratic freedoms and processes enshrined in Marshall’s concept
of citizenship, calling sensor and surveillance systems to account.
Such accountability could better inform the implementation of public
policy around the design, build and governance of public space and
also understandings of urban citizenship in the sensor saturated urban
environment.
Abstract: Today’s modern interconnected power system is
highly complex in nature. In this, one of the most important
requirements during the operation of the electric power system is the
reliability and security. Power and frequency oscillation damping
mechanism improve the reliability. Because of power system
stabilizer (PSS) low speed response against of major fault such as
three phase short circuit, FACTs devise that can control the network
condition in very fast time, are becoming popular. But FACTs
capability can be seen in a major fault present when nonlinear models
of FACTs devise and power system equipment are applied. To realize
this aim, the model of multi-machine power system with FACTs
controller is developed in MATLAB/SIMULINK using Sim Power
System (SPS) blockiest. Among the FACTs device, Static
synchronous series compensator (SSSC) due to high speed changes
its reactance characteristic inductive to capacitive, is effective power
flow controller. Tuning process of controller parameter can be
performed using different method. But Genetic Algorithm (GA)
ability tends to use it in controller parameter tuning process. In this
paper firstly POD controller is used to power oscillation damping.
But in this station, frequency oscillation dos not has proper damping
situation. So FOD controller that is tuned using GA is using that
cause to damp out frequency oscillation properly and power
oscillation damping has suitable situation.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: E-service quality plays a significant role to achieve
success or failure in any organization, offering services online. It will
increase the competition among the organizations, to attract the
customers on the basis of the quality of service provided by the
organization. Better e-service quality will enhance the relationship
with customers and their satisfaction. So the measurement of eservice
quality is very important but it is a complex process due to
the complex nature of services. Literature predicts that there is a lack
of universal definition of e-service quality. The e-service quality
measures in banking have great importance in achieving high
customer base. This paper proposes a conceptual model for
measuring e-service quality in Indian Banking Industry. Nine
dimensions reliability, ease of use, personalization, security and trust,
website aesthetic, responsiveness, contact and fulfillment had been
identified. The results of this paper may help to develop a proper
scale to measure the e-service quality in Indian Banking Industry,
which may assist to maintain and improve the performance and
effectiveness of e-service quality to retain customers.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.
Abstract: In this paper, we have proposed a parallel IDS and
honeypot based approach to detect and analyze the unknown and
known attack taxonomy for improving the IDS performance and
protecting the network from intruders. The main theme of our
approach is to record and analyze the intruder activities by using both
the low and high interaction honeypots. Our architecture aims to
achieve the required goals by combing signature based IDS,
honeypots and generate the new signatures. The paper describes the
basic component, design and implementation of this approach and
also demonstrates the effectiveness of this approach to reduce the
probability of network attacks.
Abstract: The development of the agricultural sector in Ghana
has been reliant on the use of irrigation systems to ensure food
security. However, the manual operation of these systems has not
facilitated their maximum efficiency due to human limitations.
This paper seeks to address this problem by designing and
implementing an efficient, cost effective automated system which
monitors and controls the water flow of irrigation through
communication with an authorized operator via text messages. The
automatic control component of the system is timer based with an
Atmega32 microcontroller and a real time clock from the SM5100B
cellular module. For monitoring purposes, the system sends periodic
notification of the system on the performance of duty via SMS to the
authorized person(s). Moreover, the GSM based Irrigation
Monitoring and Control System saves time and labour and reduces
cost of operating irrigation systems by saving electricity usage and
conserving water.
Field tests conducted have proven its operational efficiency and
ease of assessment of farm irrigation equipment due to its costeffectiveness
and data logging capabilities.
Abstract: In our paper we describe the security capabilities of
data collection. Data are collected with probes located in the near and
distant surroundings of the company. Considering the numerous
obstacles e.g. forests, hills, urban areas, the data collection is realized
in several ways. The collection of data uses connection via wireless
communication, LAN network, GSM network and in certain areas
data are collected by using vehicles. In order to ensure the connection
to the server most of the probes have ability to communicate in
several ways. Collected data are archived and subsequently used in
supervisory applications.
To ensure the collection of the required data, it is necessary to
propose algorithms that will allow the probes to select suitable
communication channel.
Abstract: The paper deals with communication standards for
control and production system. The authors formulate the
requirements for communication security protection. The paper is
focused on application protocols of the industrial networks and their
basic classification. The typical attacks are analysed and the safety
protection, based on requirements for specific industrial network is
suggested and defined in this paper.
Abstract: Ancillary services are support services which are
essential for humanizing and enhancing the reliability and security of
the electric power system. Reactive power ancillary service is one of
the important ancillary services in a restructured electricity market
which determines the cost of supplying ancillary services and finding
of how this cost would change with respect to operating decisions.
This paper presents a new formation that can be used to minimize the
Independent System Operator (ISO)’s total payment for reactive
power ancillary service. The modified power flow tracing algorithm
estimates the availability of reserve reactive power for ancillary
service. In order to find optimum reactive power dispatch,
Biogeography based optimization method (BPO) is proposed. Market
Reactive Clearing Price (MRCP) is then estimated and it encourages
generator companies (GENCOs) to participate in an ancillary service.
Finally, optimal weighting factor and real time utilization factor of
reactive power give the minimum ISO’s total payment. The
effectiveness of proposed design is verified using IEEE 30 bus
system.
Abstract: In MANET, mobile nodes communicate with each
other using the wireless channel where transmission takes place with
significant interference. The wireless medium used in MANET is a
shared resource used by all the nodes available in MANET. Packet
reserving is one important resource management scheme which
controls the allocation of bandwidth among multiple flows through
node cooperation in MANET. This paper proposes packet reserving
and clogging control via Routing Aware Packet Reserving (RAPR)
framework in MANET. It mainly focuses the end-to-end routing
condition with maximal throughput. RAPR is complimentary system
where the packet reserving utilizes local routing information
available in each node. Path setup in RAPR estimates the security
level of the system, and symbolizes the end-to-end routing by
controlling the clogging. RAPR reaches the packet to the destination
with high probability ratio and minimal delay count. The standard
performance measures such as network security level,
communication overhead, end-to-end throughput, resource utilization
efficiency and delay measure are considered in this work. The results
reveals that the proposed packet reservation and clogging control via
Routing Aware Packet Reserving (RAPR) framework performs well
for the above said performance measures compare to the existing
methods.
Abstract: The use of IT equipment has become a part of every
day. However, each device that is part of cyberspace should be
secured against unauthorized use. It is very important to know the
basics of these security devices, but also the basics of safe conduct
their owners. This information should be part of every curriculum
computer science education in primary and secondary schools.
Therefore, the work focuses on the education of pupils in primary and
secondary schools on the Internet. Analysis of the current state
describes approaches to the education of pupils in security issues on
the Internet. The paper presents a questionnaire-based survey which
was carried out in the Czech Republic, whose task was to ascertain
the level of opinion pupils in primary and secondary schools on the
issue of communication in social networks. The research showed that
awareness of socio-pathological phenomena on the Internet
environment is very low. Based on the results it was proposed
appropriate ways of teaching to this issue and its inclusion a proposal
of curriculum for primary and secondary schools.
Abstract: WiMAX is a telecommunications technology and it is
specified by the Institute of Electrical and Electronics Engineers Inc.,
as the IEEE 802.16 standard. The goal of this technology is to
provide a wireless data over long distances in a variety of ways. IEEE
802.16 is a recent standard for mobile communication. In this paper,
we provide an overview of various key management algorithms to
provide security for WiMAX.
Abstract: The organizations of European and Czech critical
infrastructure have specific position, mission, characteristics and
behaviour in European Union and Czech state/business environments,
regarding specific requirements for regional and global security
environments. They must respect policy of national security and
global rules, requirements and standards in all their inherent and
outer processes of supply - customer chains and networks. A
controlling is generalized capability to have control over situational
policy. This paper aims and purposes are to introduce the controlling
as quite new necessary process attribute providing for critical
infrastructure is environment the capability and profit to achieve its
commitment regarding to the effectiveness of the quality
management system in meeting customer/ user requirements and also
the continual improvement of critical infrastructure organization’s
processes overall performance and efficiency, as well as its societal
security via continual planning improvement via DYVELOP
modelling.
Abstract: Economic Dispatch (ED) is one of the most
challenging problems of power system since it is difficult to determine
the optimum generation scheduling to meet the particular load demand
with the minimum fuel costs while all constraints are satisfied. The
objective of the Economic Dispatch Problems (EDPs) of electric
power generation is to schedule the committed generating units
outputs so as to meet the required load demand at minimum operating
cost while satisfying all units and system equality and inequality
constraints. In this paper, an efficient and practical steady-state genetic
algorithm (SSGAs) has been proposed for solving the economic
dispatch problem. The objective is to minimize the total generation
fuel cost and keep the power flows within the security limits. To
achieve that, the present work is developed to determine the optimal
location and size of capacitors in transmission power system where,
the Participation Factor Algorithm and the Steady State Genetic
Algorithm are proposed to select the best locations for the capacitors
and determine the optimal size for them.
Abstract: Access control is one of the most challenging issues
facing information security. Access control is defined as, the ability to
permit or deny access to a particular computational resource or digital
information by an unauthorized user or subject. The concept of usage
control (UCON) has been introduced as a unified approach to capture a
number of extensions for access control models and systems. In
UCON, an access decision is determined by three factors:
authorizations, obligations and conditions. Attribute mutability and
decision continuity are two distinct characteristics introduced by
UCON for the first time. An observation of UCON components
indicates that, the components are predefined and static. In this paper,
we propose a new and flexible model of usage control for the creation
and elimination of some of these components; for example new
objects, subjects, attributes and integrate these with the original
UCON model. We also propose a model for concurrent usage
scenarios in UCON.