Indian Journal of Data Communication and Networking - Regular Issue
Latest Publications


TOTAL DOCUMENTS

26
(FIVE YEARS 26)

H-INDEX

0
(FIVE YEARS 0)

Published By Blue Eyes Intelligence Engineering And Sciences Engineering And Sciences Publication - BEIESP

2582-760x

Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


Author(s):  
Dr. Akhilesh A. Waoo ◽  
◽  
Mr. Virendra Tiwari ◽  

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.


Author(s):  
Foued Sabbagh ◽  

This paper focuses on the methods and the mechanisms of E-commerce and E-marketing, and the important role of international electronic companies in this vital and digital field. The spreaders of the digital economy and the techniques of information and communication technology are deployed with applications of E-commerce and E-marketing. Thus, the digital globalization opens the horizon of technological development and accelerates the growth of the use of modern techniques through the innovation of the digital economy in our daily lives. In addition, the modernization of companies in the field of E-marketing and E-commerce has a direct impact on the strategic relationship between internet users, information, technology and business. In this sense, my theoretical study determines methods and mechanisms of promotion through E-commerce and E-marketing during the revolution of the digital economy and the technologies of modern and social communication.


Author(s):  
Foued Sabbagh ◽  

This paper aims to show that the marketing and management of advertising campaigns have contributed in a positive and growing way since the nineties until now bring in targeted customers and increase sales of electronic products. Social communication networks are transformed into the promoting and marketing advertising forum in order to automatically attract customers without the need for traditional sales methods. In this sense, electronic marketing represents the space of commercial transactions of the future. Therefore, this type of marketing and the management of campaigns promoting social media via social networks have a direct impact on internet users by the effect of electronic advertising.


Author(s):  
Kamlesh Sharma* ◽  
Nidhi Garg

Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.


Author(s):  
Foued Sabbagh

This paper aims to show that the marketing and management of advertising campaigns have contributed in a positive and growing way since the nineties until now bring in targeted customers and increase sales of electronic products. Social communication networks are transformed into the promoting and marketing advertising forum in order to automatically attract customers without the need for traditional sales methods. In this sense, electronic marketing represents the space of commercial transactions of the future. Therefore, this type of marketing and the management of campaigns promoting social media via social networks have a direct impact on internet users by the effect of electronic advertising.


Author(s):  
Munishka Vijayvergiya ◽  
Abhignya Tayi ◽  
Sanya jain ◽  
Sanjana Reddy

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code


Author(s):  
Foued Sabbagh

This paper focuses on the methods and the mechanisms of E-commerce and E-marketing, and the important role of international electronic companies in this vital and digital field. The spreaders of the digital economy and the techniques of information and communication technology are deployed with applications of E-commerce and E-marketing. Thus, the digital globalization opens the horizon of technological development and accelerates the growth of the use of modern techniques through the innovation of the digital economy in our daily lives. In addition, the modernization of companies in the field of E-marketing and E-commerce has a direct impact on the strategic relationship between internet users, information, technology and business. In this sense, my theoretical study determines methods and mechanisms of promotion through E-commerce and E-marketing during the revolution of the digital economy and the technologies of modern and social communication.


Author(s):  
Munishka Vijayvergiya ◽  
◽  
Abhignya Tayi ◽  
Sanya Jain ◽  
Sanjana Reddy ◽  
...  

Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.


Sign in / Sign up

Export Citation Format

Share Document