Loading...
Thumbnail Image

Thesis

Browse

Search Results

Now showing 1 - 5 of 5
  • ThesisItemOpen Access
    Multi-objective optimal routing with security in mobile ad-hoc networks
    (FACULTY OF ENGINEERING & TECHNOLOGY SAM HIGGIBOTTOM UNIVERSITYOF AGRICULTURE, TECHNOLOGY AND SCIENCES NAINI, PRAYAGRAJ-211007, (2019), 2019) Prabha, Shashi; Yadav, Dr. Raghav
    Data sharing and disseminated coordinated effort are seen as essential usefulness to accomplish the arrangement objectives of MANETs in a harsh situation. In MANET, routing protocols are responsible for data dissemination and appropriate network performance, through the honest coordination between the nodes. The coordinated effort will be productive just when, every single taking part nodes are trustworthy. Due to the dynamic nature and absence of any centralized system, routing protocols in MANETs are exposed to various attacks. The intentions of these attacks are to simply exploit resources such as battery draining, bandwidth, and data. In MANET all the participating nodes are assumed to be trustworthy but it is impossible to have this situation in the real world as some of them can be malicious. Therefore, some mechanism which is more reliable and secure in terms of Quality of service (QoS) can be put forward. In this proposal, a meta-heuristic based routing algorithm has been introduced that is inspired by the process of Hemostasis. It is a metaheuristics approach of the fast convergent differential evolutionary algorithm with Hemostasis mutation strategy in routing to search optimal route to provide QoS. Hemostasis mutation strategy involves the implementation of new mutation vectors inspired from the biological phenomenon called Hemostasis that regulates the blood flow in the human body. It enhances diversity by means of good vectors during earlier stages thereby avoiding stagnation in the later stages. Actually, the process to avoid trapping in local search space pushes the proposed algorithm to perform globally in an effective manner. In MANET application of Hemostasis vectors speeds up the selection procedure effectively by moving locally to globally. The proposed model integrated the concept to distinguish the path which is ii secure as well as optimal for data transmission from the set of discovered paths. The model considered various metrics of QoS such as link life, trust, power, hop count, delay and distance in order to satisfy the multi-objective goal. In this proposal, a trust model with punishment factor has been introduced that maintain the credibility of nodes in terms of direct trust, indirect trust, previous trust and current trust evaluation The very motive is to discover the path that satisfies multi-objective goals with security considered for optimal routing.
  • ThesisItemOpen Access
    Hybrid privacy preserving universal authentication (HPriauth ) protocol for secure mobile IP. "
    (FACULTY OF ENGINEERING AND TECHNOLOGY SAM HIGGINBOTTOM UNIVERSITY OF AGRICULTURE, TECHNOLOGY AND SCIENCES (U.P. State Act No. 35 of 2016, as passed by the Uttar Pradesh Legislature) ALLAHABAD, INDIA, 2019) Igrair, Ms. Abdurahem EL Atman; Yadav, Dr. Raghav
    Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP Protocol for Secure Mobile IP A universal authentication protocol is a method for verifying the identity of mobile users on a network without asking for the same identification each time the user moves from one network to another. An efficient universal authentication protocol is vital to preserve the users’ privacy in mobile networks. Different privacy safeguarding authentication protocols were proposed lately. However, the majority of them either have high communication expenses or lacks in privacy protection. There are many universal authentication protocols presented by various researchers with objectives of privacy-preserving, authentication, and secure communications. Most of these protocols failed to achieve efficient user authentication schema and secure communication. They also fail to achieve the quality of service (QOS) requirements. This research work proposes privacy authentication protocols (i) Modified privacy preserving universal authentication protocol (MPriAuth) (ii) Hybrid privacy preserving authentication protocol (HPriAuth) aimed at mobile IP networks. This protocols were devised to authenticate the mobile users in foreign network whilst safeguarding the users’ privacy. The proposed MPriAuth algorithm has three steps; key generation, key sign and key verify. Group signature is utilized for key generation and key verification. The proposed HPriAuth algorithm comprises of two stages, namely registration stage and verification stage.The proposed protocols were simulated and tried utilizing two situations; differing MNs’mobility speed and fluctuating number of attackers in the network. Throughput, packet delivery ratio (PDR), packet loss ratio (PLR) and average delay are the parameters considered for the assessment. Through varying the mobility ii speed, the comparative analysis between the existing Priauth with the proposed MPriAuth and HPriAuth methods reveals that the MPriAuth protocol offers 17.21 % and 12.90% improvement in throughput and PDR respectively. At the speed of 5m/s experimental result shows that the proposed MPriAuth achieves a maximum packet loss of 85 packets and a minimum of 30 packets when contrasted to existing Priauth with maximum packet loss of 100 packets and a minimum of 33 packets. The average end to end delay for PriAuth, MPriAuth and HPriAuth are 5.50s, 4.50s and 3.46s respectively indicating that HPriAuth has the minimal delay performance contrasted to others.Similarly by fluctuating the number of attackers, experimental results shows that the proposed HPrauth offers an improvement of 11.05% and 18.27% respectively interms of throughput and PDR on contrasted to MPriAuth and PriAuth.Also, the packet loss for HPriAuth, MPriAuth and PriAuth are 83,92 packets and 118 packets respectively . The HPriAuth has less packet loss contrasted to others. The average end to end delay values for MPriAuth, HPriAuth and PriAuth are 5.94s, 4.80s and 3.93s indicating that the HPriAuth achieves the minimal delay performance. Thus, it can be concluded that the proposed MPriAuth method performs best in the scenario of differing mobility speed where as the proposed HPriAuth performs best considering the scenario by varying the number of attacks.
  • ThesisItemOpen Access
    A Secure Model for Information Dissemination in Cloud Enabled VANET
    (FACULTY OF ENGINEERING & TECHNOLOGY SAM HIGGINBOTTOM UNIVERSITY OF AGRICULTURE, TECHNOLOGY AND SCIENCES NAINI, ALLAHABAD-211007, UP, INDIA (2018), 2018) N., Rajapraveen.K.
    VANET (Vehicular ad-hoc networks) has become a significant research area due to its specific features and applications. VANET is a communication technology developed for better traffic management. It is a network of moving vehicles and stationary road side units. Cloud computing is the next big thing, where the cloud technology altered the communication and computation, by separating computational assets from physical infrastructure. The aim of the cloud computing is “what resources you need? and at what time?”. These days large number of vehicles are there on the roads and parking lots where the computational and communicational resources are underutilized, which can be used to form cloud VANET. Few researchers proposed the idea of cloud VANET. In this thesis, it is assumed that vehicles are using cloud services. There is much risk involved with renting virtual resources in cloud or storage data in cloud. So privacy and data storage security are the major concern in VANET based cloud. Cloud services governance is a general term for applying specific policies or principles to the use of cloud computing services. The goal of cloud service governance is to secure applications and data even when they are remotely located. In many ways, cloud services governance can be viewed as an extension of Service Oriented Architecture (SOA) governance. Ideally, cloud services governance complements or is integrated into existing governance processes and is viewed as an ongoing process, not a product. So in this thesis, Governance as a Service (GaaS) for cloud enabled VANET environment is proposed. GaaS is used for decision making, criteria and policies in planning, architecture, acquisition, deployment, operation and management of a Cloud computing capability provided in VANET. To support GaaS, prototype software is designed which is expected to be used by vehicles, cloud administrator, pollution control authority and traffic control authority. For secure information dissemination, a cryptographic technique based on visual cryptography is proposed. Results and security analysis shows the applicability of the proposed scheme.
  • ThesisItemOpen Access
    A Peer-to-Peer Content Distribution Simulator
    (FACULTY OF ENGINEERING AND TECHNOLOGY SAM HIGGINBOTTOM UNIVERSITY OF AGRICULTURE, TECHNOLOGY AND SCIENCES (FORMERLY ALLAHABAD AGRICULTURAL INSTITUTE) NAINI, ALLAHABAD –211007 INDIA 2018, 2018) Kisembe, Phillip; Jeberson, Dr. W.
    Peer-to-peer (P2P)systems and applications aredistributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality.The core operation in P2P systems is said to be its efficient location of data items. A look at the existing research in the fieldof P2P file sharing systems shows that focus has beenon performance issues such as efficient file lookup which involves search and routing mechanisms and replication offilesto improve download speeds among other topics. Nonetheless, there is a new concern that questions the very existence and usefulness of such systems in the form of “Free-Riding”. The free-riding peers famously referred to as free-ridersact selfishly because they only want to download files but are not willing to upload to other nodesin return. Knowing thatcooperation is the key to the success of anyP2P systemand application, it is a challenge to work without an effective incentive mechanism and accordingly suffer from free-riding. Free-riding however emerges asa concern because it decreases the effectiveness of the shared resources in the system partially to the point of system collapse. As free riders increase on any given P2P network, they contribute in an increase of traffic on the internet due to their selfish nature of not sharing the content being distributed among the other peers. P2P trafficis the major traffic source in Internet traffictoday. It is estimated that 60% -80% in P2P traffic is from content distribution. With this then, P2P content distribution aims at extremely large systems, consisting of several thousand or even millions of peers, which makes simulation a logical choice in researching and doing a study on them. This work will present a P2P simulator; this will show a simulation framework for investigating P2P content distribution. Key functionalities of a P2P content distribution system are identified andimplemented in this simulator. This simulator is developedin Java and will use some external libraries such as iii Jarkata Commons Math Library to generate distributions and random variable, Jarkata Commons Configuration to handle XML configuration files and JFreeChart in displaying and previewing of results. The simulator offersa simple way of simulating P2P content distribution systems and applications. This simulator will mainly serve as a tool of research in various options of P2P systems and applications with focus on amount of free riders. The structure of the simulator application is also documented to give developers the chance to improve and extend the functionality.
  • ThesisItemOpen Access
    Edge Based Steganographic Techniques for Covert Communication Through Overt Channels
    (Sam Higginbottom Institute of Agriculture, Technology & Sciences (SHIATS), 2016) Fernandes, Aisha Cyra Furtado; Jeberson, Wilson
    Cross Swords between the good and the bad in the internet ground is getting tougher as more and more refined evolution takes place in this technology driven era. The focus behind data security is to ensure privacy while protecting personal or corporate data. At times, data transmission secrecy is important as more and more people are joining the cyberspace revolution. This demands the need to revamp techniques in the ancient science of steganography. Steganography is the art of concealing data in a manner that its existence itself cannot be detected. Numerous techniques for steganography are known to exist, but very few of them are found to be independent of the file formats, as well as few of them target coloured images. This thesis proposes two steganographic techniques, namely, Arithmetic Division based data embedding (ADDE) and Bit Stream based data embedding (BSDE), bearing in mind the important characteristics of an embedding algorithm: capacity, imperceptibility and robustness. Both the techniques use the least significant bits of the red, green and blue components of a 24- bit coloured image as the carrier medium and the secret data can either be in the form of text or an image. To ensure imperceptibility, the secret data is stored within the edges of the cover image. If the secret data is an image, it is compressed using a wavelet compression algorithm, before being embedded. In the ADDE method, we perform an arithmetic division operation on the secret binary data, so as to reduce its magnitude and further apply a mapping logic by analyzing the sizes of all the bytes of quotient data. In the BSDE method, we use a stream of continuous bits to store the secret data. In order to optimize the data storage, the amount of bits used by each byte of data is mapped to a value set in a flag array. The proposed methods were tested on 200 real time camera clicked digital images and on various other image databases. Various performance metrics were used to evaluate the quality of the stego image, as well as the extracted secret data. Experimental results indicate that the proposed techniques produce stego images that are highly imperceptible, as well as resist some of the most common visual and statistical attacks. The results obtained were compared with similar works done by other researchers and our results seemed to be more promising.