Contemporary Issues in Communication, Cloud and Big Data Analytics
Proceedings of CCB 2020
- 2022
- Buch
- Herausgegeben von
- Dr. Hiren Kumar Deva Sarma
- Dr. Valentina Emilia Balas
- Dr. Bhaskar Bhuyan
- Dr. Nitul Dutta
- Buchreihe
- Lecture Notes in Networks and Systems
- Verlag
- Springer Singapore
Über dieses Buch
Über dieses Buch
This book presents the outcomes of the First International Conference on Communication, Cloud, and Big Data (CCB) held on December 18–19, 2020, at Sikkim Manipal Institute of Technology, Majitar, Sikkim, India. This book contains research papers and articles in the latest topics related to the fields like communication networks, cloud computing, big data analytics, and on various computing techniques. Research papers addressing security issues in above-mentioned areas are also included in the book. The research papers and articles discuss latest issues in the above-mentioned topics. The book is very much helpful and useful for the researchers, engineers, practitioners, research students, and interested readers.
Inhaltsverzeichnis
-
Frontmatter
-
Specular Reflection Removal in Cervigrams
Ayush Agarwal, Faraaz Ali, Aditya Kopparthi, Priya Ranjan, Kumar Dron Shrivastav, Rajiv JanardhananAbstractRemoval of specular reflection also called specularity or highlights from an image is very important before the image is processed or analyzed by computer for image processing, computer graphics and computer vision because it is considered as part of the image by the computer. Removal of specular reflection is important because when there are specular reflections in the image it causes errors in the results of many algorithms of computer vision and image processing. Due to specular reflections in images, shapes in images get distorted, and therefore, all shape detecting algorithms and algorithms based on shape detection, boundary detection results in erroneous outputs. Removal of specular reflection includes detection of the reflection or reflections in the given image and then changing those pixels with some other color pixel based on the other portions of the image which are not faulty. There exist many different techniques for the detection and removal of specular reflection. In this paper, some of such techniques and approaches to tackle the problem are discussed. We have also proposed a simple yet efficient algorithm for specular reflection removal. -
Kloman Metre: An EMD-Based Tool for Triaging Diseases Leading to Lung Infections Including COVID-19
Niranjan Chavan, Priya Ranjan, Uday Kumar, Kumar Dron Shrivastav, Hiren Kumar Deva Sarma, Rajiv JanardhananAbstractThe digital revolution can help developing countries to overcome the problem of limited healthcare infrastructure in developing nations such as India. The COVID-19 pandemic has shown the urgency of integration of digital technologies into healthcare infrastructure. In order to solve the issue of lack of trained healthcare professionals at public health centres (PHCs), researchers are trying to build tools which can help to tag pulmonary ailment within a fraction of second. Such tagging will help the medical community to utilize their time more efficiently. In this work, we have tried to assess the “lung health” of patients suffering from a variety of pulmonary diseases including COVID-19, tuberculosis and pneumonia by applying Earth Mover’s Distance algorithm to the X-ray images of the patients. The lung X-ray images of patients suffering from pneumonia, TB and COVID-19 and healthy persons are pooled together from various datasets. Our preliminary data based upon 100 random images depicting each type of lung disease such as COVID-19, tuberculosis and pneumonia revealed that patients suffering from tuberculosis have the highest severity as per the values obtained from the EMD scale. -
Artificial Intelligence in Diagnosis of Polycystic Ovarian Syndrome
Debasmita Ghosh Roy, P. A. AlviAbstractThe polycystic ovarian syndrome (PCOS) is one of the most developing endocrine disorders, which is a frequent cause of infertility. Around 8–10% of women globally are affected by this syndrome in their fertility period. In light of the heterogeneity of symptoms, the diagnosis of PCOS is a challenging task for clinicians. Artificial intelligence (AI) techniques are now an emerging methodology as a decision support system in the healthcare industry. In this paper, different AI techniques are used for the prognosis and diagnosis of PCOS. The dataset comprises of metabolic and biochemical features of 541 females under 47 years of age having a positive and negative class labels. The reduced dataset is used to diagnose PCOS and assess the prediction efficacy. Finally, the result showed that the SVM outperforms other AI techniques with the prediction efficacy of 96.92%. -
Comparative Assessment of Different Feature Selection Methods with Proposed Method in the Application of Diabetes Detection
Sourav Ghosh, Pranati Rakshit, Sayan Paul, Rishav Sen, Rinika Manna, Sandeep ShawAbstractMachine learning, as we know, is a broad application of artificial intelligence (AI) which gives the capability to the machine to learn automatically and improve itself by own experience. Machine learning is doing excellent job in the medical field. As diabetes is one of the vital diseases which is basically a silent killer, it needs to be more addressed and detected or predicted as well. In this present work, several machine learning algorithms have been used to detect it. We are using various classification and prediction method to detect the diseases more accurately in real time. We have compared all the classification models like logistic regression, linear discriminant analysis, K-Nearest neighbor, decision tree, Naive Bayes, support vector machine to get the more accurate results. Univariate feature selection method also has been used and our new feature selection method has been developed. How this new feature selection method is working and how it over-performs the other feature selection methods has been shown in this work. -
Communication
-
Frontmatter
-
Reliable Data Delivery in Software-Defined Networking: A Survey
Prerna Rai, Hiren Kumar Deva SarmaAbstractSoftware-defined networking is a network paradigm which has shifted the intelligence of the underlying network interface to an independent control plane. The controller acts independently from the data plane. This isolation of the plane brings about greater opportunities but with a challenge of attaining higher reliability and optimum energy consumption in packet delivery. This paper aims at identifying approaches that improve the performance of the software-defined networking (SDN) with increase in reliability, specially required for real-time data delivery. -
Phishing Websites, Detection and Analysis: A Survey
Leena I. Sakri, Pushpalatha S. Nikkam, Madhuri Kulkarni, Priyanka Kamath, Shreedevi Subrahmanya Bhat, Swati KamatAbstractPhishing is the despicable utilization of electronic interchanges to trick clients. Phishing assaults resolve to increase delicate data like usernames, passwords, MasterCard information, network qualifications, and the sky is the limit from there. Phishing assaults endeavor to increase touchy, secret data, for example, usernames, passwords, charge card data, network qualifications, and then some. Phishing Websites copy the first sites so clients believe that they are utilizing the first sites. On account of phishing assaults, each individuals and associations are at threat. Phishing assaults might be forestalled by identifying the sites and serving to clients to detect the phishing sites. To distinguish the phishing sites, there have been various strategies applied. Diverse machine learning methods, information mining procedures, neural organization and different calculations have been utilized for anticipating or ordering or distinguishing the phishing sites. This paper aims at surveying on recently proposed phishing detection techniques. -
Analysis of Security Attacks in SDN Network: A Comprehensive Survey
Ali Nadim Alhaj, Nitul DuttaAbstractSDN is a modern model that has attracted many researchers in the networks since its inception. Since this model was mainly based on separating the control level and the data level which set within the same equipment in the old networks. With the suggestion of the feature of separating control from data transmission and the possibility of programming and adding features as needed in a flexible manner, the SDN architecture has a promising future in the world of networks. Despite the many advantages offered by SDN networks, we cannot ignore the security problem associated with SDN since its inception, which has attracted many researchers to work hard to fill these security gaps and reach a secure infrastructure for SDN networks. So, this research will be divided into parts that include the basic properties of the SDN network and its general structure, and the most important problems and attacks that may affect the structure of network and a review of previous research in this field. The best attempts made to find appropriate security solutions for SDN networks will be discussed. Also, the research will mention the most important attempts to design an integrated security design for SDN, and the future needs to reach a completely secure SDN network. -
An Overview of 51% Attack Over Bitcoin Network
Raja Siddharth Raju, Sandeep Gurung, Prativa RaiAbstractCryptocurrencies are a new paradigm in terms of digital currency due to various features but mostly because of secure in nature and provide anonymity. Bitcoins are the most prominent example of cryptocurrency based on the proof of work (PoW) consensus mechanism. Bitcoins have been initiated as the exchangeable currency in some parts of the world, but the question arises that what are the major challenges that Bitcoins face even if it is secure in nature. The paper highlights the important attributes of a Bitcoin network, how the mining of the Bitcoin is done, and the consensus protocol on which Bitcoins are based on. It also gives insight into the impact of the “51%” attack on the Bitcoin network and the countermeasures that can be applied as a remedial solution to prevent such an attack. -
An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET
Gaurav Soni, Kamlesh Chandravanshi, Mahendra Ku. Jhariya, Arjun RajputAbstractVehicles or nodes in Vehicular Ad hoc Network (VANET) are forwarding the traffic information for validation route information. Attacker vehicles are sending false messages of route information and not accepting traffic status packets or data packets. The abnormal behavior of the malicious nodes (Blackhole Attacker) and wormhole attacker is recognized by the reliable security mechanism. This paper proposes an intrusion detection and prevention (IPS) scheme to secure vehicle to RSU (V-RSU) communication from malicious (Blackhole) as well as wormhole attack in VANET. The IPS algorithm is applied to the RSU to recognize the malicious actions of an attacking vehicle by swarm optimization approach. The particle swarm optimization (PSO) confirms the attacker’s presence and delivers effective traffic information. In the proposed IPS scheme, vehicles also receive traffic data from the leading vehicles and also forward traffic information to other vehicles. The traffic data exchange is monitored by RSU to identified malicious actions. The main task of the proposed security system is the effective management of vehicles in the presence of an intruder. Simulation results confirm that the proposed IPS scheme with PSO provides better performance in the presence of both attackers in VANET. The performance of previous IDS, attacker and proposed IPS is measure through performance metrics. -
BER Analysis of FBMC for 5G Communication
Balwant Singh, Malay Ranjan Tripathy, Rishi AsthanaAbstractThe 4G up-gradation was essential because of the exponential increment of the wireless applications. So, 5G was introduced with large capacity, small latency, improved reliability, high data rate, and better quality of services (QoS). 4G uses orthogonal frequency-division multiplexing (OFDM) which has a decent quality of long-distance communication, by eliminating intersymbol interference (ISI) and improving the signal-to-noise ratio (SNR), but it has a spectrum wastage problem. However, the improved data rate is possible by spectrum utilization. 5G adopted various techniques for the better utilization of spectrum in current scenarios. The new generation waveforms, i.e., filtered orthogonal frequency-division multiplexing (F-OFDM), generalized frequency-division multiplexing (GFDM), universal filtered multicarrier (UFMC), and filter bank multicarrier (FBMC), are one of them. This paper will discuss FBMC which is the alternative technology of OFDM with better features by building subcarrier waveform based on prototype filters. Here, FBMC is investigated in terms of BER (bit error rate) by varying several parameters such as the size of inverse fast Fourier transforms/fast Fourier transform (IFFT/FFT), length of guard band, and length of symbols. Results of simulation will show that the bit error rate (BER) of FBMC is not affected by the variation of symbol length, while advancement in the size of IFFT/FFT increases BER, on the given parameter while the BER reduces for large size of the guard band of each subcarrier. -
Impact of TCP-SYN Flood Attack in Cloud
Anurag Sharma, Md. Ruhul Islam, Dhruba NingombamAbstractThe given paper is focused on experimental study of one particular category of DoS attack (Denial of Service) in cloud computing network known as TCP SYN flood attack, and its effect on the resource availability and the cloud service factors. The attack typically takes up the general services of the cloud and the resources of the cloud, thus denying of proper services to the genuine users. The resources of the cloud server are drained and hence any other incoming requests would not be responded, thereby denying the access to the legitimate users. The assumption here is that the data being transmitted between client, and server is a multimedia data. In this paper, we have tried an experimental study on TCP SYN Flood attack and tried to see out the various parameters affected by the attack. -
An Efficient Cooperative Caching with Request Forwarding Strategy in Information-Centric Networking
Krishna Delvadia, Nitul DuttaAbstractInformation-centric network emphasizes on translating the current Internet paradigm from host driven to content driven. A numerous data-centric features like content driven routing, random network topology, and pervasive caching make ICN caching distinct from state of the art of work. This paper emphasizes on the cooperative caching in ICN and contributes a dominating-set-oriented cooperative caching strategy. It considers placement of data and request message forwarding in a strong co-relation. Here, the concept of connected dominating set has been used to create a virtual backbone that includes core routers where most popular content can be cached. The betweenness centrality parameter of that core router helps the routing strategy to forward request packet to the node where content is most likely to be stored which leads to faster retrieval of data. The proposed strategy will improve the performance parameters like content retrieval latency, cache hit ratio, mean hop distance, total transportation cost, and network overhead. The paper also discusses the working of proposed strategy with related algorithms, illustrations, and its benefits over state-of-the-art research in context of network performance. -
Instabilities of Consensus
Priya RanjanAbstractConsensus protocol analysis suffers from unrealistic instantaneous information communication assumption. To address this, we shall consider arbitrarily large delays in consensus protocols and explore its impact on dynamical behavior of convergence. We formulate a conjecture about emergence of slowly oscillating periodic (SOP) orbits as delay becomes significant from sine-like waves to square-waves. Further, dynamical stability behavior of (i) minimally connected multi-agent configuration, i.e., a chain, (ii) fully connected graph, and finally the intermediate configuration, (iii) multiple agents connected in a circular fashion with exactly one full length closed path will be reported. It will be shown that for chain configuration, period doubling behavior will be observed irrespective of number of agents. For a fully connected network configuration guranteed and stable convergence to consensus point with equal contributions from all agents, i.e., peer-setup will be proved irrespective of delay and number of agents. Surprisingly, it will be demonstrated that multiple agents connected in a full length closed path will converge to consensus with equal contribution from all nodes irrespective of delay if number of agents is odd, while they will oscillate in the period doubling fashion if number of agents is even. A bifurcation diagram with link strength parameter which transitions a chain into fully connected closed path will be presented to illustrate interesting branching processing from period doubling to single equilibrium consensus point. Connection with theory of circulant matrix [11, 12] will be pointed out for future deeper investigations. -
Delay-Based Approach for Prevention of Rushing Attack in MANETs
Ashwin Adarsh, Tshering Lhamu Tamang, Payash Pradhan, Vikash Kumar Singh, Biswaraj Sen, Kalpana SharmaAbstractMobile ad hoc networks (MANETs) are self-organized, self-configuring collection of autonomous mobile nodes that temporarily forms network and does not require any infrastructure or centralized administration for data communication. The network formed by MANET is vulnerable to threats from malicious nodes which can lead to disruption of the network. The routing protocols available for MANETs also do not provide any mechanism to counter threats or identify malicious nodes or behaviour in the network. In this context, this paper is aimed to find and evaluate the performance of routing protocols when exposed to threats. This paper considers rushing attack and presents a detailed study on their impact in MANET routing. A simulation-based performance analysis on one reactive routing protocols viz ad hoc on-demand routing protocol (AODV) has been performed, and a defence mechanism based on processing delay has been devised to prevent rushing attack. The paper contains various sections like Sect. 1 contains introduction followed by few existing approaches for countering rushing attack in Sect. 2. Section 3 provides the delay-based approach for preventing rushing attack. Sections 4 and 5 present the algorithm for countering rushing attack and simulation environment, respectively. Results and discussion are given in Sect. 6 followed by comparison with other model in Sect. 7. The paper ends with the detailed conclusion given in Sect. 8. -
ASCTWNDN:A Simple Caching Tool for Wireless Named Data Networking
Dependra Dhakal, Mohit Rathor, Sudipta Dey, Prantik Dey, Kalpana SharmaAbstractName Data Networking (NDN) is a new and proposed Future Internet Architecture inspired by unsolved problems in current Internet architectures like IP. There can be a multitude of applications realized through Information Centric Network (ICN) in various domains where data is the focal point of communication. One such domain is the Intelligent Transport System which can be realized through Vehicular Ad hoc Network (VANET) and Vehicular Sensor Network (VSN). The VSN has grown rapidly to exchange information, especially in the area of safe and efficient driving. Despite the broad interest, there is a shortage of publicly accessible resources to assess the efficiency of caching systems effectively. To address these issues, we have developed a python-based caching simulator for Wireless Named Data Networking considering vehicular network caching. This tool allows users to evaluate caching strategies and also provides modelling tools useful for caching research. -
Design of MIMO Cylindrical DRA’s Using Metalstrip for Enhanced Isolation with Improved Performance
A. Jayakumar, K. Suresh Kumar, T. Ananth Kumar, S. SundaresanAbstractFor evolving 5G mm-wave applications, an enhanced performance and amplification antenna for the MIMO cylindrical dielectric resonator (DRA) are designed. Here, the dielectric resonators of the cylindrical system (DRA) are centred on a substratum. Every DRA has a surface graved metal strip that unites the cylindrical DRA antenna elements to enhance isolation. A simulated impedance bandwidth of 26,928 GHz to 27,589 GHz (S11-10 dB) is obtained from the planned antenna for the 5G frequency applications of the Telecom Commission covering the 29 GHz array. Improved isolation is completed between 26,928 and 27,589 GHz. The mechanics for enhancing insulation and the process of construction can be contained in this article. The suggested detach approach is checked in the prototype to avoid the expulsion of crosstalks and interchannels.
-
- Titel
- Contemporary Issues in Communication, Cloud and Big Data Analytics
- Herausgegeben von
-
Dr. Hiren Kumar Deva Sarma
Dr. Valentina Emilia Balas
Dr. Bhaskar Bhuyan
Dr. Nitul Dutta
- Copyright-Jahr
- 2022
- Verlag
- Springer Singapore
- Electronic ISBN
- 978-981-16-4244-9
- Print ISBN
- 978-981-16-4243-2
- DOI
- https://doi.org/10.1007/978-981-16-4244-9
Informationen zur Barrierefreiheit für dieses Buch folgen in Kürze. Wir arbeiten daran, sie so schnell wie möglich verfügbar zu machen. Vielen Dank für Ihre Geduld.