May 2011

Contents:

1) SECURITY ASPECTS IN MOBILE CLOUD SOCIAL NETWORK SERVICES
(pp. 137-146)

Authors: G. K. Panda, B. K. Tripathy, S. K. Jha

Abstract: Social networking is increasingly becoming a popular means of social communication for online users. Associated services are evolving in the affiliated areas. The trend is also true for offline scenarios where people use their mobile phones to social network with nearby buddies. The power of cloud computing services in Mobile Social networking is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. This article explores the roadblocks and solutions to provide a trustworthy environment.

FULL MANUSCRIPT

2) TRAFFIC FLOWS MODELING OF A DIGITAL CENTER AT ABU USING OPNET SOFTWARE
(pp. 147-151)

Authors: Friday Yakubu, Barroon I. Ahmad

Abstract: The large number of computers getting connected everyday to the Internet is becoming more and more seamlessly high with the decrease in the price of computers and network devices. The Digital Center attendants wish to better understand the behavior of applications traffic flows and expected merits of network topology before making final decision. To have the idea of the traffic behavior and expected performance of the new topology, simulation and modeling technique offers the best way of examining the optimal network design and applications traffic configurations. The objective of this work is to model a Digital Center at Ahmadu Bello University (ABU), Zaria-Nigeria, its network topology, applications environment and examine the usage of applications. Application and user profiles used in the Digital Center were developed. These applications include FTP clients, e-mail transfer agents, web browsers, VOIP and Video applications. The results obtained with live packet traces using Ethereal were examined and the simulation configuration adjusted accordingly. Finally, the simulation model was developed using the OPNET Modeler software package, and analysis of the traffic flows behavior were studied.

FULL MANUSCRIPT


3) SECURE FACE-RECOGNITION USING ENCRYPTED IMAGE BETWEEN CLIENT AND SERVER

(pp. 152-157)

Authors: Akhil Kumar Singh, Dr.Harsh K.Verma, and Vaibhaw Dixit

Abstract: This paper includes two different parts, first one encrypt an image at the client side and the next part is used for the recognition purpose, which results that the claimed identity is authorized or not. In this paper we are presenting an approach to the detection and identification of human faces for the purpose of secure authentication between a client and a server and describe a working, near real-time face recognition system which tracks a subject’s head and then recognizes the person by comparing characteristics of the face to those of known individuals. Here our approach treats face recognition as a two-dimensional recognition problem, and we are using Principal component analysis(PCA) for the image recognition and compression purpose. Face images are projected onto a feature space (“face space”) that best encodes the variation among known face images. The face space is defined by the “eigen-faces”, which are the eigen vectors of the set of faces. The block based transformation technique with Blowfish algorithm makes PCA algorithm more secure for face recognition and for very strong authentication between client and server communication

FULL MANUSCRIPT

4) COMPARING ENHANCED FUZZY LOGIC IMAGE FILTRATION WITH MEAN AND MEDIAN FILTERED IMAGES

(pp. 158-163)

Authors: Ramesh Tiwari, Renu Dhir

Abstract: This paper makes contrast between mean, median and fuzzy filters and further analyze fuzzy filter for multiple iterations at constant amplification factor of 10. The paper makes use of java programs to generate a simulation environment for comparison and also depicts implementation of some important functions in paper. The marked difference between filters is noted and analyzed for a single PGM image which contains impulse noise used in a block of 9*9 for input.

FULL MANUSCRIPT

5) EFFICIENT KEY PRE-DISTRIBUTION APPROACH FOR WIRELESS SENSOR NETWORKS

(pp. 164-168)

Authors: Saurabh Kumar Singh, Dr Harsh K Verma, Ravindra Kumar Singh

Abstract: Wireless sensor network is highly vulnerable to attacks because it consists of various resource-constrained sensor nodes which communicate among themselves via wireless links. Securely distributing keys among sensor nodes is a fundamental challenge for providing security services in WSNs. In the random key pre-distribution approach is suitable for low power and resource constrained sensor nodes, a shared key between a pair of nodes is not guaranteed and thus they may not be able to communicate with each other. Matrix based scheme for key pre-distribution essentially use LU decomposition of matrix which can provide keys between any pair of nodes but are quite vulnerable to attack. This paper proposes an improved and efficient key pre-distribution scheme based on LU composition of matrices. Our scheme, we use integer as elements of symmetric matrices. The existing approach use decomposition of matrices which is compute intensive but our proposed scheme uses composition of matrices. The proposed scheme allows almost 100% connectivity indifferent of the number of keys and provides resilience against node capture.

FULL MANUSCRIPT

6) POLYGON-CONNECTED AUTOTRANSFORMER BASED 28-PULSE AC-DC CONVERTER FOR POWER QUALITY IMPROVEMENT

(pp. 169-175)

Authors: R. Abdollahi, and A. Jalilian

Abstract: This paper presents the design and analysis of a Polygon-Connected autotransformer based 28-pulse ac-dc converter which supplies direct torque controlled induction motor drives (DTCIMD’s) in order to have better power quality conditions at the point of common coupling. The proposed converter output voltage is accomplished via two paralleled 14-pulse ac-dc converters. An autotransformer is designed to supply the rectifiers. The design procedure of magnetics is in a way such that makes it suitable for retrofit applications where a six-pulse diode bridge rectifier is being utilized. The aforementioned structure improves power quality criteria at ac mains and makes them consistent with the IEEE-519 standard requirements for varying loads. Furthermore, near unity power factor is obtained for a wide range of DTCIMD operation. A comparison is made between 6-pulse and proposed converters from view point of power quality indices. Results show that input current total harmonic distortion (THD) is less than 5% for the proposed topology at variable loads

FULL MANUSCRIPT

7) CREATED A REALISTIC VIRTUAL HUMAN BODY MODEL THROUGH THE RADIUS DISTANCE FREE FORM DEFORMATION AND ANTHROPOMETRIC MEASUREMENT

(pp. 176-184)

Authors: Sheng-Fuu Lin, Shih-Che Chien

Abstract: Nowadays the interest in creating 3D real humans is one of the most challenging problems and a topic of great interest and has been investigated within different research activities in the last decade. A methodology is proposed for creating a computer generated virtual mannequins through the individual anthropometric measurement. The example based deformation is performed to preserve more details and save more processing time. For more approximated to the real body, the human body is divided into several parts for deformation via each anthropometric measurement. For seamless body shape, the Skeleton link frame and several key joints are adopted to make a smoothing connection of each divided part.The radius distance free form deformation is the extended cylinder free form deformation and to be the method for deformation through each corresponding anthropometric measurement in each part. In this paper, the example based 3-D object deformation is used and provides a proper way to create a virtual mannequin with lower constrains. So the virtual mannequins are then adjusted by using the measurement of the nearest cluster example model. In this way, the realistic accurate virtual mannequins are created.

FULL MANUSCRIPT

8) AN APPROACH OF USING RTP WITH BEST PERFORMANCE OF CONFIDENTIALITY AND AUTHENTICITY

(pp. 185-189)

Authors: Musaddeque Anwar Al-Abedin Syed, M.M. Naushad Ali and Shah Ahsanul Haque

Abstract: This paper presents an approach of using the Real-time Transport Protocol (RTP) emphasizing key security aspects; confidentiality and authenticity. This approach takes a media file as input, encrypts it, creates a message digest of the encrypted data and then transmits it along with the main input file to the user. On the other side, the receiver calculates digest and compares it with the received one, if match occurs, then decrypts and plays it in real time player. In current specification of RFC1889, only the confidentiality is described and authenticity is left for lower layer protocols. This work experiments both on authenticity and confidentiality. For authenticity MD5, SHA-1, and SHA-2 hash algorithms can be used and for confidentiality AES-128 and Triple DES cryptographic algorithms can be used. In fact, SHA-2 is better than other hash algorithms in terms of security but SHA-1 is better than SHA-2 in terms of time efficiency. In addition, we show the experimental results on SHA-2 algorithm. On the other hand, AES-128 is better than Triple DES in terms of time efficiency and security. Hence, SHA-1 and AES-128 are chosen for authenticity and confidentiality respectively for the security of RTP. The experiments were performed using J2SDK1.5.

FULL MANUSCRIPT