Notice Board :

Call for Paper
Vol. 7 Issue 5

Submission Start Date:
May 01, 2020

Acceptence Notification Start:
May 10, 2020

Submission End:
May 25, 2020

Final MenuScript Due:
May 30, 2020

Publication Date:
May 30, 2020
                         Notice Board: Call for PaperVol. 7 Issue 5      Submission Start Date: May 01, 2020      Acceptence Notification Start: May 10, 2020      Submission End: May 25, 2020      Final MenuScript Due: May 30, 2020      Publication Date: May 30, 2020




Volume VII Issue I

Author Name
Taruna Saxena, Bhanu Pratap Singh
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prevented by cryptographic solutions because intruders or create new or modify existing packages, but before existing. In this paper a simple technique to effectively detect attacks wormholes without any special hardware and / or location or timing of the stringent requirements proposed. The proposed technique allows the use of the variance in routing information between neighbours to detect wormholes. Basic thesis is to find the alternative path from the source to the second jump and calculate the number of hops to detect wormhole.
PaperID
2020/IJTRM/1/2020/31210

Author Name
Kumudbala Saxena, Praveen Kataria
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
Advancements in web technologies in conjunction with the advent of social media facilitate online users to share contents and interact on a shared platform. Social media mining allows users to visualize, evaluate, analyze, and extract meaningful patterns and trends over the social network. Numerous methods and algorithms have been presented for the massive investigation of social media data. Community detection over social media is the most attracting field of interest for researchers in the area of social media mining. Community detection is a process of identifying densely connected network nodes and forming a group or community based on the density of interconnection among them. Detection of such communities is very crucial for a variety of applications in order to analyze the social network.
PaperID
2020/IJTRM/1/2020/31212

Author Name
Bhagyashri N. Jadhav, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
Wireless networks are achievementrecognition to its height nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed.
PaperID
2020/IJTRM/1/2020/31331