Keywords : security


A Trust Calculation Algorithm for Communicating Nodes in Wireless Sensor Networks

Mr. Jeelani; Kishan Pal Singh; Aasim Zafar

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue Special Issue ICARD-2021 3S, Pages 145-152
DOI: 10.47392/irjash.2021.083

In various areas of the communication system, work based on Wireless Sensor Network (WSN) is being used these days. It is observed that trust-based model for WSN as a controlled secure, confidential and robustness with a consistent communication troubleshoots a lot of problems in delivering. This makes a node in WSN, that is, ready to deal with and act on attacks caused by additional nodes in different communication networks.  This is a highly challenging task due to the lack of a trust resource and the dynamics that this network institute brings.  In this paper, we propose Trust Calculation Algorithm for communicating nodes in WSN. Trust calculation algorithm provide the trust-based routing table for every node. It serves as an important role in the communication process for nodes from clusters, nodes from nodes and clusters from clusters in WSN.

ATM Banking System

Arthi S; Dinesh R; Hemalatha P; Sivaranjani V; Sangeetha K

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue Special Issue ICARD-2021 3S, Pages 53-59
DOI: 10.47392/irjash.2021.063

In financial framework, various branches are available and these are associated with the principle branch. Thus, a similar bank is situated at various areas for giving similar sort of banking administrations. Internet Banking is an electronic broadcast communications gadget that gives the clients of a monetary organization with admittance to monetary exchanges in a public space without the requirement for a human agent or bank employee The manual strategy for dealing with these banks from one area is troublesome, yet it very well may be effectively finished with an ATM programming application like this. With this ATM Banking System programming, different errands should be possible by a regular Bank Management Application, for example, adding client subtleties, seeing client money withdrawal/store subtleties, oversee banking accounts, creating pin, producing endless supply of money, and some more. The general financial strategy has gotten a lot simpler, agreeable and got also with ATM (Automated Teller Machine). ATM possesses saved clients energy for pulling out balance, checking late exchanges and checking bank balance from any area. With the proposed ATM Banking System, bank the executives is simpler with a more productive stage for overseeing client subtleties, dealing with their record and recording their exchange history. This venture can assist understudies with understanding the activities that are associated with planning ATM programming. The proposed framework is acceptable and it has a base highlights, however further improvements should be possible by adding new modules, highlights and sub-frameworks into this task.

Study and improved data storage in cloud computing using cryptography

Mohd Akbar; Irshad Ahmad; Thirupathi Regula

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue Special Issue ICOST 2S, Pages 94-99
DOI: 10.47392/irjash.2021.046

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-of- the art deployment and research challenges. Due to security issues, information over the Internet is becoming important. We have suggested a method to protect critical file data. Cryptography algorithms are an efficient way to encrypt sensitive data. It is a retrieval and transmission system that is readable only by intended users. The low cost and data usability of cloud computing is advantageous. Cloud storage has many advantages at low cost and data connectivity through the Internet. Ensured cloud data protection is an important part of the cloud computing environment because customers often store sensitive information with cloud storage services but they are not secure services. So, it remains a challenge to exchange data in a safe way while storing data from an unconfident cloud. Our solution guarantees consumer confidential data protection and privacy by using the AES, RC2 algorithm to store data in a single cloud. The cloud computing concept and transitional discussion under cloud computing will be provided previously proposed. The cryptographic algorithm used in cloud is then addressed and the latest trend for cloud security

Proxy-Oriented Multiple File Uploading and Integrity Checking of files in Multi-Cloud Environment

Toomula Srilatha

International Research Journal on Advanced Science Hub, 2021, Volume 3, Issue Special Issue ICOST 2S, Pages 49-52
DOI: 10.47392/irjash.2021.039

Cloud servers have become an option for the organizations to store their files and data. Security in the hybrid and multi-cloud environment is always a challenge to be considered. Client can access the cloud servers to upload the files and documents. In a particular time, when cloud servers restrict access to client for storing the files, then the client can assign its proxy to process the files and upload them. Contrarily, integrity checking is also a significant security issue. It allows customers to verify if their outsourced data is kept intact without the entire data being downloaded. In Hybrid and Multi Cloud environments, a new proxy-oriented multiple file uploading and integrity checking model is proposed to resolve security problems. This concrete safety protocol is built with the aid in the Multi-Cloud Environment.

Basic Design for the development of Autonomous Underwater Vehicle

Muniyandy Elangovan; Balaji T

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue 11, Pages 12-17
DOI: 10.47392/irjash.2020.213

The artificial intelligence (AI) is used to automate the operation by taking a decision based on the situation or conditions. It is expected that around 2025, Robotics can move on earth similar to a human and support human society. Artificial Intelligence (AI) is in every field to automate the decision making intelligence to execute the desired operation. Understanding the need and importance of AUV for underwater operation, the authors have identified the need an AUV for the monitor, search and rescue operation. During the development unmanned vehicle, it was identified that the major task and key functionalities to be known to the researchers who want to contribute in this AI domain. The functionalities of AUV is decided by features which can be grouped into six categories as (i) Design of AUV shape (ii) Functionalities  (iii) Design of Mechanical and Electrical system (iv) Control system (v) Navigation system (vi) Embedded system/software programming and (vii) Propulsion system. As a researcher, understanding each task or goal is very much needed and useful. Keeping the new researchers need, each task has been studied and highlighted the critical issue in each task which was faced in our development process. This paper can encourage many new researchers to do research in the upcoming domain of AUV.

Challenges for RFID Technology used in Libraries

Geetanjali Rana Kanwar

International Research Journal on Advanced Science Hub, 2020, Volume 2, Issue Special Issue ICAMET 10S, Pages 112-120
DOI: 10.47392/irjash.2020.208

The technological advancements has taken fast pace globally throughout the world during last 10 years. The more and more digital impact has been seen in different areas related to every field. Private as well as government sectors put large emphasis and financial budget involvements to make most of the activities digital among people. The new RFID technology developed and when implemented in the libraries, it reduces the workload of circulating books through digital process of check-in and checkout among the users. RFID reduces time required to perform the Circulation operations in the libraries as compared to manual activities. RFID tags are capable and much faster than barcodes and with the help of handheld reader; items in the stack can be read at the same time. Apart from the advantages, the technology RFID has to face many challenges for its implementation and smooth working in the digital environment. The financial budget involved in it is very high. Due to chances of tag removal and tag collision, it needs extra care to be given. RFID is an excellent advanced technology but it needs to improve security factors and standards of its products and services.