Network security and privacy

Size: px
Start display at page:

Download "Network security and privacy"

Transcription

1 Winter semester 2011/2012 Seminar on Network security and privacy (selected topics) Prof. Dr. Dieter Hogrefe Youssef Shehadeh Maimun Rizal

2 Course Overview Prerequisites (Recommended): Mobile communication I Mobile communication II Implements Module: M.inf Seminar Telematik I M.Inf Seminar Telematik II Advanced Topics in Computer Networking I (ITIS) Language English 2

3 Course Objectives Primary objectives: Learn some fundamentals of security and privacy issues in computer and wireless networks. Form the state of art on a certain topic. Provide a paper form report and a professional presentation for a chosen topic. Secondary objectives: Learn how to search for papers: IEEExplore, ACM, Citeseerx, whitepapers. Experience in preparing professional reports and presentations. 3

4 Hints on Reading papers PAPER Start QUICK SCAN Title, Abstract, Subtitles, Figures, Conclusion, READING Is the paper interesting? No Yes Thorough Reading Read carefully paper, discuss, analyze results. Summarize paper contributions, possible enhancements? End 4

5 Report Requirements: In form of IEEE conference template paper [two columns, 5-8 pages]: shing/templates.html Organization: Abstract, Introduction (Related work) Main part of your topic (model, discussion, analysis, simulations, results...) Conclusion PDF + Editable(Latex, word...) format 5

6 Hints on Writing Scientific Papers Abstract: not more than words. Brief Introduction*: Introduce problem (why important, motivate) (Related work). Outline your contribution. Outline paper structure.(this paper is organized as follows...) Body*: Problem, system model/architecture, basics... Discussion, anaylsis. Evaluation, results. Summary and conclusions. Bibliography. *These points might vary with the subject topic. *Source: 6

7 Hints on Writing Scientific Papers Paragraphs should have a logical narrow flow. Avoid very long sentences. Clarify notations at first use. Write for the reader, not yourself. Not only show figures! Comment, Analyze and Abstract! Avoid spelling mistakes!!! Review several times! 7

8 Presentation High-quality presentation Well-structured, correct spelling, professional layout. Duration of each presentation ~30 minutes + ~10 minutes discussion. Slides presentation (e.g. Pdf, ppt, ) Compliance with set deadlines. 8

9 Hints for the Presentation Rule of thumb: A slide containing a normal content takes about 1-2 minutes for 30 minutes approximately slides. Basic guide Welcome your audience. Try to speak without notes, do not read out loud everything from the slides word-by-word. Adjust your presentation speed so that the audience can follow. How to give a good research talk guide: 9

10 Selected Topics 1. Wireless Fingerprinting: identifying devices through physical layer characteristics 2. DOS Attacks against IEEE Privacy Preservation in WSNs 4. Protecting Privacy in Participatory Sensing Systems 5. Security and Privacy in Vehicular Communication Systems 6. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications 7. Border Gateway Protocol (BGP) Security 8. Voice over IP Security 9. Man-in-the-Middle Attacks on VoIP 10. Authentication in Voice over Internet Protocol (VoIP) 10

11 References L. C. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, ''Identifying unique devices through wireless fingerprinting,'' In Proc. of WiSec, March/April L. Wang, B. Srinivasan and N. Bhattacharjee, ''Security Analysis and Improvements on WLANs,'' JOURNAL OF NETWORKS, VOL. 6, NO. 3, MARCH 2011 N. Li, N. Zhang, S. Das, and B. Thuraisingham, ''Privacy preservation in wireless sensor networks: A state-of-the-art survey,'' Journal on Ad Hoc Networks 7 (2009) K. Huang, S. Kanhere, and W. Hu, ''Preserving privacy in participatory sensing systems,'' Journal on Computer communications 33 (2010), pp P. Papadimitratos, et al., ''Secure Vehicular Communication Systems: Design and Architecture,'' IEEE Communications Magazine, November 2008, pp M. Al Ameen, J. Liu, and K. Kwak, ''Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications,'' Journal of Medical Systems, 1 9. DOI /s K. Butler, T. Farley, P. Mcdaniel, and J. Rexford, ''A Survey of BGP Security Issues and Solutions,'' IEEE/ACM Trans. Netw., vol. 98, no. 1, pp , Jan A. Keromytis, ''A Comprehensive Survey of Voice over IP Security Research,'' IEEE Commun. Surveys Tutorials, vol. PP, no. 99, pp. 1 24, R. Zhang, X. Wang, R. Farley, X. Jiang,''On the Feasibility of Launching the Man-in-the-Middle Attacks on VoIP from remote Attackers'', ASLACCS09, March 10-12, 2009, Sydney, NSW, Australia. ACM /09/03. F. Wang, Y. Zhang, ''A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography,'' Computer Communications, Volume 31, Issue 10, 25 June 2008, Pages , ISSN

12 Course Plan 12

13 Grading points Report: 50% Presentation: 40% Active participation in seminar: 10%. Penalties may apply: Incompliance with set deadlines. Incomplete attendance of block seminar. 13

14 14

Pre-Course Meeting Proseminar Network Hacking & Defense

Pre-Course Meeting Proseminar Network Hacking & Defense Network Architectures and Services Department Computer Science Technische Universität München Pre-Course Meeting Proseminar Network Hacking & Defense Dr. Holger Kinkelin and Nadine Herold Content q Administrative

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Seminar Optimizing data management on new hardware (OpDaMNeHa)

Seminar Optimizing data management on new hardware (OpDaMNeHa) Seminar Optimizing data management on new hardware (OpDaMNeHa) Summer Term 2014 Lehrgebiet Informationssysteme Weiping Qu qu@cs.uni-kl.de AG Datenbanken und Informationssysteme AG Heterogene Informationssysteme

More information

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain

Implementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105

More information

Web Engineering. VSR://EDU/Seminar. Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de

Web Engineering. VSR://EDU/Seminar. Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de VSR://EDU/Seminar Web Engineering ////// Summer semester 2016 /////// Prof. Dr.-Ing. Martin Gaedke Sebastian Heil, M. Sc. VSR.Informatik.TU-Chemnitz.de 14.04.2016 Chemnitz University of Technology Prof.

More information

XRM2018 Paper Preparation and Submission Guide

XRM2018 Paper Preparation and Submission Guide XRM2018 Paper Preparation and Submission Guide Welcome to the XRM2018 Meeting paper website. XRM2018 paper submission is entirely electronic; do not mail hard-copy printouts. All papers, whether invited

More information

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS

ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS ESTABLISHMENT OF SECURE COMMUNICATION IN WIRELESS SENSOR NETWORKS Ms.T P Rani 1, Dr. C Jaya Kumar 2 1 Research Scholar, Anna University of Technology,Chennai 1 ranitp.2010@gmail.com 2 Department of Computer

More information

Solution Manual William Stallings Network Security

Solution Manual William Stallings Network Security Solution Manual William Stallings Network Security Computer security william stallings solution - SOLUTION MANUAL WILLIAM STALLINGS NETWORK SECURITY SOLUTION MANUAL WILLIAM STALLINGS NETWORK SECURITY Did

More information

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0

CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 CPSC 4600 Biometrics and Cryptography Fall 2013, Section 0 Course: CPSC4600, Section 0, CRN 42532 Title: Biometrics and Cryptography Class Schedule: EMCS302, MW 2:00 pm-3:15 pm Credit: 3 Faculty: Dr. Li

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

PRACTICE EXERCISES. Student Success SCRATCH

PRACTICE EXERCISES. Student Success SCRATCH PRACTICE EXERCISES Student Success FROM SCRATCH The slide show you create in this practice exercise covers concepts and skills that will help you be successful in college. You create a title slide, an

More information

ITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2)

ITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2) ITSE 1294 Special Topics in CS: Information Technology in Health Care (2:1-2) Informal Description: The medical environment in now highly computerized. This course introduces students to computers, and

More information

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus

Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008. Course Syllabus Philadelphia University Faculty of Information Technology Department of Computer Science --- Semester, 2007/2008 Course Syllabus Course Title: Advanced Databases Course Level: 4 Lecture Time: Course code:

More information

Securing BGP Networks using Consistent Check Algorithm

Securing BGP Networks using Consistent Check Algorithm Securing BGP Networks using Consistent Check Algorithm C. K. Man, K.Y. Wong, and K. H. Yeung Abstract The Border Gateway Protocol (BGP) is the critical routing protocol in the Internet infrastructure.

More information

ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology)

ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology) ECET 590 Special Problems in Electrical & Computer Engineering Technology (SmartGrid Technology) Spring 2010 Paul I-Hai Lin, Professor of Electrical and Computer Engineering Technology Indiana University-Purdue

More information

2. Course prerequisites, corequisites, and where the course fits in the program of study

2. Course prerequisites, corequisites, and where the course fits in the program of study 1. Course title/number, number of credit hours Cloud Computing/COT5612 # of credit hours 3 2. Course prerequisites, corequisites, and where the course fits in the program of study Basic knowledge of UML

More information

PDA Trainer Certification Process V 1.0

PDA Trainer Certification Process V 1.0 PDA Trainer Certification Process V 1.0 ~ 1 ~ Index Introduction to the Certification Process... 3 Certification Process Steps... 4 Description of the Certification Process Steps... 5 A - PDA Trainer Profile...

More information

Author Submission Guidelines

Author Submission Guidelines Author Submission Guidelines UPDATED: WINTER 2019 Contents 1. Overview... 3 1.1 Important Conference Dates... 3 1.2 Summary Checklist... 4 1.3 Required Paper Attributes... 4 1.4 Paper Submission System...

More information

PowerPoint Basics. Getting Started

PowerPoint Basics. Getting Started PowerPoint Basics Getting Started 1. Open up PowerPoint. 2. The following window will appear. 3. Select Template. 4. Click the OK button. 5. A new window appears. Click on the Presentation Design tab to

More information

Cryptanalysis of a Markov Chain Based User Authentication Scheme

Cryptanalysis of a Markov Chain Based User Authentication Scheme Cryptanalysis of a Markov Chain Based User Authentication Scheme Ruhul Amin, G.P. Biswas Indian School of Mines, Dhanbad Department of Computer Science & Engineering Email: amin ruhul@live.com, gpbiswas@gmail.com

More information

42 Computing in Science & Engineering 43 Concurrency, IEEE 44 Consumer Electronics Magazine, IEEE 45 Consumer Electronics, IEEE Transactions on 46

42 Computing in Science & Engineering 43 Concurrency, IEEE 44 Consumer Electronics Magazine, IEEE 45 Consumer Electronics, IEEE Transactions on 46 IEEE Journals List 1 Advanced Packaging, IEEE Transactions on 2 Aerospace and Electronic Systems Magazine, IEEE 3 Aerospace and Electronic Systems, IEEE Transactions on 4 Affective Computing, IEEE Transactions

More information

ECE 4450:427/527 - Computer Networks

ECE 4450:427/527 - Computer Networks ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Lecture 1: Introduction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks 1 / 16 Outline 1 Information 2 Broad Overview

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY

More information

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.

More information

Web Design: Business Site Project

Web Design: Business Site Project Web Design: Business Site Project Purpose: You will be developing a large business site. The purpose of this website is to demonstrate your knowledge of web design elements. Directions: You will have benchmark

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby

IJENS-RPG [IJENS Researchers Promotion Group] ID: IJENS-1017-Joby Dr. P.P.Joby Contact Address Professor & Dean, Department of Computer Science & Engineering, MBC College of Engineering and Technology, Kuttikanam, Peermade, Idukki Dt, Kerala-685531. Permanent Address

More information

BS375 AUDITING. This sample unit outline is provided by CHC for prospective and current students to assist with unit selection.

BS375 AUDITING. This sample unit outline is provided by CHC for prospective and current students to assist with unit selection. BS375 AUDITING This sample unit outline is provided by CHC for prospective and current students to assist with unit selection. Elements of this outline which may change with subsequent offerings of the

More information

Seminar Recent Trends in Database Research

Seminar Recent Trends in Database Research Seminar Recent Trends in Database Research Summer Term 2013 Lehrgebiet Informationssysteme Weiping Qu qu@cs.uni-kl.de AG Datenbanken und Informationssysteme AG Heterogene Informationssysteme Goals a) Familiarize

More information

STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY

STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY STUDY GUIDE: MASTER S DEGREE IN ECONOMIC POLICY This study guide informs you about the rules and policies for the Master s program in Economic Policy. It is based on the official examination regulations

More information

Introduction to PowerPoint 2013

Introduction to PowerPoint 2013 Viewing a Presentation Introduction to PowerPoint 2013 When you create a Blank Presentation in PowerPoint, the workspace opens in Normal view. Normal view is divided into three areas: 1. Slide Pane - shows

More information

Tree Structure and Algorithms for Physical Design

Tree Structure and Algorithms for Physical Design Tree Structure and Algorithms for Physical Design Chung Kuan Cheng, Ronald Graham, Ilgweon Kang, Dongwon Park and Xinyuan Wang CSE and ECE Departments UC San Diego Outline: Introduction Ancestor Trees

More information

Education. Professional Experience. Awards and Honors

Education. Professional Experience. Awards and Honors Education Wade Trappe Department of Electrical and Computer Engineering, and Wireless Information Network Laboratory (WINLAB) Rutgers, The State University of New Jersey 73 Brett Road, Piscataway, NJ 08854

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

Written Communication

Written Communication Module 2: Written Communication 1 Your Passport to Professionalism: Module 2 Written Communication Step 1 Learn Introduction Sooner or later, you will need to communicate in writing. You will write down

More information

Certicate programs in English Language

Certicate programs in English Language Module Guide Certicate programs in English Language Summer Term 2018 Based on Rev. 156. Last change 16.11.2017 at 12:55 from kwunderlich. Generated on 16.11.2017 at 13:55. Contents 1 Introduction to RF

More information

Analysis and Implementation Wireless Sensor Network of Information Technology Systems

Analysis and Implementation Wireless Sensor Network of Information Technology Systems International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 3 (March 2017), PP.69-73 Analysis and Implementation Wireless Sensor Network

More information

S. Indirakumari, A. Thilagavathy

S. Indirakumari, A. Thilagavathy International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

University of Bonn. Faculty of Agriculture ARTS. Agricultural Sciences and Resource Management in the Tropics and Subtropics.

University of Bonn. Faculty of Agriculture ARTS. Agricultural Sciences and Resource Management in the Tropics and Subtropics. University of Bonn ARTS Secretariat Nussallee 1 53115 Bonn Germany University of Bonn Faculty of Agriculture ARTS Agricultural Sciences and Resource Management in the Tropics and Subtropics Application

More information

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING

HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING HOMOMORPHIC HANDOVER AUTHENTICATION TECHNIQUE FOR MOBILE CLOUD COMPUTING Gagandeep Kaur, Dr. Gagandeep Abstract Mobile Cloud Computing has brought the IT industry to a new level by providing an innovative

More information

CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS. SYLLABUS Winter 2018

CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS. SYLLABUS Winter 2018 1 of 5 CONCORDIA UNIVERSITY DEPARTMENT OF CHEMISTRY AND BIOCHEMISTRY CHEM 293 SPECTROSCOPY AND STRUCTURE OF ORGANIC COMPOUNDS SYLLABUS Winter 2018 GENERAL INFORMATION Spectroscopy and Structure of Organic

More information

IP MULTIMEDIA SUBSYSTEM (IMS) SECURITY MODEL

IP MULTIMEDIA SUBSYSTEM (IMS) SECURITY MODEL International Journal of Advance Research, IJOAR.org ISSN 2320-9194 1 International Journal of Advance Research, IJOAR.org Volume 1, Issue 3, March 2013, Online: ISSN 2320-9194 IP MULTIMEDIA SUBSYSTEM

More information

Welcome to Part 5 of the slide show.

Welcome to Part 5 of the slide show. Welcome to Part 5 of the slide show. Part 5:Finding Articles using GALILEO. Go to the homepage at http://www.galileo.usg.edu Google vs. GALILEO A search in Google gave 10,400,000 results on water purification

More information

Australian Standard. Records Management. Part 1: General AS ISO ISO

Australian Standard. Records Management. Part 1: General AS ISO ISO AS ISO 15489.1 2002 ISO 15489-1 AS ISO 15489.1 Australian Standard Records Management Part 1: General [ISO title: Information and documentation Records management Part 1: General] This Australian Standard

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

How To Write Maintainable Engineering Specifications. Forrest Warthman

How To Write Maintainable Engineering Specifications. Forrest Warthman 1 How To Write Maintainable Engineering Specifications Forrest Warthman 2 Outline Motivations and audience Editing and vector-graphics tools Document formats and templates Inserting figures and tables

More information

This course contains the subject matter to prepare candidates for the ivanti Certified Service Desk 2017 Administrator exam.

This course contains the subject matter to prepare candidates for the ivanti Certified Service Desk 2017 Administrator exam. Course Overview The Service Desk Administration 2017 course is a five-day training course covering topics for both administrative and design functions within the Service Desk 2017. Students will learn

More information

CLICK (Complete Learning In Computer Knowledge)

CLICK (Complete Learning In Computer Knowledge) CLICK (Complete Learning In Computer Knowledge) Microsoft Office 2016 Level 2 Course Overview: The CLICK Level 2 course is intended for students who want to learn the advanced tools and features of Windows

More information

PhD Candidacy Exam Overview

PhD Candidacy Exam Overview EDIC - Doctoral Program in Computer & Communication Sciences PhD Candidacy Exam Overview https://phd.epfl.ch/edic/candidacyexams Candidacy exam background The philosophy After your 1 st year of PhD you

More information

A S ISO Records Management Part 1: General

A S ISO Records Management Part 1: General AS ISO 15489.1 2002 ISO 15489-1 AS ISO 15489.1 Australian Standard Records Management Part 1: General [ISO title: Information and documentation Records management Part 1: General] This Australian Standard

More information

Netiquette: Composing

Netiquette: Composing Netiquette: Composing Email Critical Learning Summarizing information from multiple internet sources Understand email: my attitudes, advantages and disadvantages, comparison to memos, guidelines for writing

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC)

Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC) Clone Detection for Efficient System in Wireless Sensor Network Using Ad Hoc on Demand Distance Vector (AODVC) Submitted By Ms. Rupika Yadav M Tech III Sem Co-guide Prof Vishal Tiwari Dept. of CSE Guide

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

Adobe Connect Webinar Software Host

Adobe Connect Webinar Software Host Adobe Connect Webinar Software Host This document is designed to cover the basic steps involved in setting up and hosting a meeting using Adobe Connect. Creating a New Meeting In order to create a new

More information

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar

More information

Business Computer Applications (BCIS 1305) Online. Credit: 3 semester credit hours (3 hours lecture)

Business Computer Applications (BCIS 1305) Online. Credit: 3 semester credit hours (3 hours lecture) 1 Business Computer Applications (BCIS 1305) Online Credit: 3 semester credit hours (3 hours lecture) Prerequisite/Co-requisite: Complete the Online Orientation and answer yes to 7+ questions on the Online

More information

Information and documentation Records management. Part 1: Concepts and principles AS ISO :2017 ISO :2016

Information and documentation Records management. Part 1: Concepts and principles AS ISO :2017 ISO :2016 ISO 15489-1:2016 AS ISO 15489.1:2017 Information and documentation Records management Part 1: Concepts and principles This Australian Standard was prepared by Committee IT-021, Records and Document Management

More information

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Chennai) 1 Vladymir.F, 2 J.Sivanesa Selvan, 3 Mr.Prabhu.D 1 (Information Technology, Loyola Institute of Technology, Chennai) ( Email:

More information

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model

Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model Digital Advisory Services Professional Service Description SIP SBC with Field Trial Endpoint Deployment Model 1. Description of Services. 1.1 SIP SBC with Field Trial Endpoint Deployment Verizon will assist

More information

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues

Security Flaws of Cheng et al. s Biometric-based Remote User Authentication Scheme Using Quadratic Residues Contemporary Engineering Sciences, Vol. 7, 2014, no. 26, 1467-1473 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49118 Security Flaws of Cheng et al. s Biometric-based Remote User Authentication

More information

What are the elements of website design?

What are the elements of website design? Contents What is a website?...1 Why does design matter?...1 What are the elements of website design?...1 What guidelines can help direct the design?...2 What physical objects are most similar to a web

More information

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431 Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:

More information

FORMAT & TYPING GUIDE

FORMAT & TYPING GUIDE FORMAT & TYPING GUIDE for CEATI Reports updated March 2018 Timeline of a Report Pre-Writing As you sit down to write the report, ensure you begin by downloading the most recent CEATI template at www.ceati.com/rfps.

More information

Writing Reports with Report Designer and SSRS 2014 Level 1

Writing Reports with Report Designer and SSRS 2014 Level 1 Writing Reports with Report Designer and SSRS 2014 Level 1 Duration- 2days About this course In this 2-day course, students are introduced to the foundations of report writing with Microsoft SQL Server

More information

Web WRITING

Web WRITING Web WRITING BASICS 800-556-3009 www.careertrack.com DISCLAIMER: The principles and suggestions in this handout and the WEB WRITING BASICS webinar are presented to apply to diverse personal and company

More information

ITSM Training for Field Service

ITSM Training for Field Service itsm@harvard.edu May 2013 ITSM Training for Field Service Incident & Request Management with ServiceNow (ServiceNow Training for Field Service Version 1) Agenda Introduction Identifying & Logging Categorizing

More information

The PCC CIS etutorial to PowerPoint

The PCC CIS etutorial to PowerPoint The PCC CIS etutorial to PowerPoint Table of Contents What happens when I start PowerPoint?...4 Setting Up Your Toolbars... 5 Expanding Your Menus... 6 How do I start creating a new presentation?...6 Design

More information

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014

IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 IEEE ComSoc Distinguished Lecture Tour Australia, June 8-18, 2014 Ying-Dar Lin, IEEE Fellow National Chiao Tung University, TAIWAN July 5, 2014 DLT Planning This was my first DLT (Distinguished Lecture

More information

Writing for the Web. Nonprofit 911 Teleconference June 16, 209. Farra Trompeter Dan Gunderman

Writing for the Web.   Nonprofit 911 Teleconference June 16, 209. Farra Trompeter Dan Gunderman Writing for the Web www.bigducknyc.com Nonprofit 911 Teleconference June 16, 209 Farra Trompeter Dan Gunderman Overview What s different Principles of Web text Guidelines Resources Appendix What s different?

More information

Using PowerPoint - 1

Using PowerPoint - 1 Using PowerPoint - 1 Introduction to the course. Before we start, we need to know what power point is. I m sure most of you know about ppt, but for those of you who may be new to this: [1a-c] When you

More information

Radnor Middle School Course Syllabus. Fill in course name: Technology Education Computers Put in course number (4 digits):

Radnor Middle School Course Syllabus. Fill in course name: Technology Education Computers Put in course number (4 digits): Radnor Middle School Course Syllabus Created November 5, 2013: Gail Furman Fill in course name: Technology Education Computers Put in course number (4 digits): Credits: Grades: 8 Weighted: Prerequisite:

More information

CUE-10: Moderation Page 1. Comparative Usability Evaluation 10. Moderation. Observing usability test moderators

CUE-10: Moderation Page 1. Comparative Usability Evaluation 10. Moderation. Observing usability test moderators CUE-10: Moderation Page 1 Comparative Usability Evaluation 10 Moderation Observing usability test moderators Workshop: Boston, MA, USA, Wednesday 9 May 2018 CUE-10: Moderation Page 2 Call For Participation

More information

A Hierarchical Document Clustering Approach with Frequent Itemsets

A Hierarchical Document Clustering Approach with Frequent Itemsets A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of

More information

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards

Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Security Weaknesses of a Biometric-Based Remote User Authentication Scheme Using Smart Cards Younghwa An Computer Media Information Engineering, Kangnam University, 111, Gugal-dong, Giheung-gu, Yongin-si,

More information

A Review Paper on Voice over Internet Protocol (VoIP)

A Review Paper on Voice over Internet Protocol (VoIP) A Review Paper on Voice over Internet Protocol (VoIP) Aastha Tiwari* Research Scholar, M.tech. 2 nd Computer Networks 1 Bhilai Institute of Technology, Durg, Chattisgarh, India tiwariaastha17@gmail.com

More information

Ken Agress, Senior Consultant PlanNet Consulting, LLC.

Ken Agress, Senior Consultant PlanNet Consulting, LLC. Elements of a Vulnerability Assessment Ken Agress, Senior Consultant PlanNet Consulting, LLC. Defining a Vulnerability Assessment Agenda Types of Vulnerability Assessments Are You Ready for an Assessment?

More information

Hello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files.

Hello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files. Hello, welcome to this brief tutorial on accessing and playing Adobe Presenter video files. Recorded video presentations for this course were produced using Adobe Presenter. After viewing this brief tutorial,

More information

Creating Great Visual Aids

Creating Great Visual Aids Creating Great Visual Aids How to create and use visual aids well! l Keep it simple, Stern! l Use message titles l Ensure readability l Be consistent l Think visually Follow design guidelines 1. Keep it

More information

https://asd-pa.perfplusk12.com/admin/admin_curric_maps_display.asp...

https://asd-pa.perfplusk12.com/admin/admin_curric_maps_display.asp... 1 of 8 8/27/2014 2:10 PM Units: Teacher: KeyboardingMOWord/Powerpoint, CORE Course: KeyboardingMOWord/Powerpoint Year: 2012-13 Skill Builder Content Skills What is good technique? What are proofreader

More information

Cryptanalysis on Two Certificateless Signature Schemes

Cryptanalysis on Two Certificateless Signature Schemes Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 4, pp. 586-591 Cryptanalysis on Two Certificateless Signature Schemes F. Zhang, S. Li, S. Miao, Y. Mu,

More information

Scalable overlay Networks

Scalable overlay Networks overlay Networks Dr. Samu Varjonen 1 Contents Course overview Lectures Assignments/Exercises 2 Course Overview Overlay networks and peer-to-peer technologies have become key components for building large

More information

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu

A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET. Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu A Scalable and Secure Key Distribution Scheme for Group Signature based Authentication in VANET Kiho Lim, Kastuv M. Tuladhar, Xiwei Wang, Weihua Liu Outline Introduction to Vehicular Networks Motivation

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

Metal Recovery from Low Grade Ores and Wastes Plus

Metal Recovery from Low Grade Ores and Wastes Plus Metal Recovery from Low Grade Ores and Wastes Plus D7.1 Project and public website Public Authors: Marta Macias, Carlos Leyva (IDENER) D7.1 I Page 2 Deliverable Number 7.1 Deliverable Name Project and

More information

INF 315E Introduction to Databases School of Information Fall 2015

INF 315E Introduction to Databases School of Information Fall 2015 INF 315E Introduction to Databases School of Information Fall 2015 Class Hours: Tuesday & Thursday10:30 am-12:00 pm Instructor: Eunyoung Moon Email: eymoon@utexas.edu Course Description Almost every website

More information

epath - Participant s User Guide

epath - Participant s User Guide Participant s Users Guide Last Updated: 05/18/2012 From the Office of Instructional Technology and Learning Services Page 1 of 32 Table of Contents Look for the blue dots for the new content that s been

More information

Microsoft PowerPoint level 1 course content (1-day)

Microsoft PowerPoint level 1 course content (1-day) http://www.multimediacentre.co.za Cape Town: 021 790 3684 Johannesburg: 011 083 8384 Microsoft PowerPoint level 1 course content (1-day) Course Description Microsoft Office PowerPoint Beginners course

More information

B.A. in Information Systems

B.A. in Information Systems General Elective 1 Term Credits 15 B.A. in Information Systems 1 B.A. in Information Systems (120 credits minimum) Course Title Credits First Year CS 100 Roadmap to Computing HUM 101 English Composition:

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

PowerPoint TM Tutorial

PowerPoint TM Tutorial PowerPoint TM Tutorial PowerPoint TM is an exciting tool that assists in effectively presenting a summation of important ideas to an audience. PowerPoint TM can often be intimidating to one who has never

More information

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks

A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks International Journal of Engineering and Technical Research (IJETR) A Secure System for Evaluation and Management of Authentication, Trust and Reputation in Cloud-Integrated Sensor Networks Ms. Arati Phadtare,

More information

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document

More information

Visual Identity Standards

Visual Identity Standards Visual Identity Standards 12.0 Presentations Information and inquiries: University Relations brand@ucalgary.ca Visual Identity Standards 2 12.0 Presentations 12.01 Introduction 12.01 Introduction 12.02

More information

Chapter 22: Communication Process Study Guide Matching

Chapter 22: Communication Process Study Guide Matching Chapter 22: Communication Process Study Guide Matching Match the following terms with their definitions. A. barrier B. channel C. decoding D. empathy E. encoding F. feedback G. four Cs of writing H. memo

More information

Institute of Economic Sciences, Belgrade, Serbia Manual

Institute of Economic Sciences, Belgrade, Serbia Manual Institute of Economic Sciences, Belgrade, Serbia Manual User Registration and Submission of Articles to the Journal of Women's Entrepreneurship and Education Editorial Board of the Journal of Women s Entrepreneurship

More information

PowerPoint 2016 Basics for Mac

PowerPoint 2016 Basics for Mac 1 PowerPoint 2016 Basics for Mac PowerPoint 2016 Basics for Mac Training Objective To learn the tools and features to get started using PowerPoint more efficiently and effectively. What you can expect

More information

Application Manual for International Baccalaureate Applications

Application Manual for International Baccalaureate Applications Application Manual for International Baccalaureate Applications How to get started? Go to the main UWC Belgium IB application page The main access page to apply for an International Baccalaureate with

More information