Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume VII Issue I

Author Name
Taruna Saxena, Bhanu Pratap Singh
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prevented by cryptographic solutions because intruders or create new or modify existing packages, but before existing. In this paper a simple technique to effectively detect attacks wormholes without any special hardware and / or location or timing of the stringent requirements proposed. The proposed technique allows the use of the variance in routing information between neighbours to detect wormholes. Basic thesis is to find the alternative path from the source to the second jump and calculate the number of hops to detect wormhole.
PaperID
2020/IJTRM/1/2020/31210

Author Name
Kumudbala Saxena, Praveen Kataria
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
Advancements in web technologies in conjunction with the advent of social media facilitate online users to share contents and interact on a shared platform. Social media mining allows users to visualize, evaluate, analyze, and extract meaningful patterns and trends over the social network. Numerous methods and algorithms have been presented for the massive investigation of social media data. Community detection over social media is the most attracting field of interest for researchers in the area of social media mining. Community detection is a process of identifying densely connected network nodes and forming a group or community based on the density of interconnection among them. Detection of such communities is very crucial for a variety of applications in order to analyze the social network.
PaperID
2020/IJTRM/1/2020/31212

Author Name
Bhagyashri N. Jadhav, Hemant Kumar Gupta
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
Wireless networks are achievementrecognition to its height nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Replication within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed.
PaperID
2020/IJTRM/1/2020/31331

Author Name
Hina Rajwanshi, Sushma Kushwaha
Year Of Publication
2020
Volume and Issue
Volume 7 Issue 1
Abstract
Cloud computing is a set of available services and resources available through the internet. Basically it can be considered as a virtual pool for computing and sharing such as software infrastructures, applications, and business processes. As this field of technology has seen a rapid growth in recent times, security has been the major concern. Confidentiality, Integrity, Availability, Authenticity and Privacy are essential concerns for both Cloud providers and consumers as well. This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing.
PaperID
2020/IJTRM/1/2020/31348