Skip to main content
Top

2021 | Book

Advanced Informatics for Computing Research

4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part II

Editors: Ashish Kumar Luhach, Prof. Dharm Singh Jat, Prof. Kamarul Hawari Bin Ghazali, Prof. Dr. Xiao-Zhi Gao, Pawan Lingras

Publisher: Springer Singapore

Book Series : Communications in Computer and Information Science

insite
SEARCH

About this book

This two-volume set (CCIS 1393 and CCIS 1394) constitutes selected and revised papers of the 4th International Conference on Advanced Informatics for Computing Research, ICAICR 2020, held in Gurugram, India, in December 2020.
The 34 revised full papers and 51 short papers presented were carefully reviewed and selected from 306 submissions. The papers are organized in topical sections on computing methodologies; hardware; networks; security and privacy.

Table of Contents

Frontmatter

Hardware

Frontmatter
Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission
Abstract
There has been an ever-increasing demand for efficient and reliable method of power transmission and energy harvesting. There has been increasing demand for wireless power transmission which can provide renewable free energy. Energy harvesting devices such as Rectenna caters to this purpose due to its significant improvement over the disadvantages of the conventional method of power transfer. The concept of wireless power transmission was first proposed over a century ago, but the real-world application still face a no. of challenges. Employing rectenna as energy harvesting device for portable electronic devices presents advantages which include reducing the cost factor, having consistent and robust transfer system, no affect under different environmental factors. The design proposed in here is a wide band rectenna which can be utilised at frequencies of 5.46 GHz and 5.75 GHz. The rectifier circuit had been implemented using a HSMS- 285C Schottky diode, Greinacher voltage doubler has been selected. While designing the antenna Duroid substrate was implemented as it has a dielectric permittivity of 2.2, this substrate possesses various advantages over conventional FR-4 substrate including minimal electrical losses and low moisture absorption hence efficiency of the antenna design improves significantly. For the designing of the rectifier circuit ADS software was used. Designing of the antenna was done on HFSS software and Proteus design software has been used for the PCB designing of the proposed model. The designed rectifier yielded a conversion efficiency of 70.905% and 68.307% for 5.46 GHz and 5.75 GHz, respectively. The gain of the proposed antenna achieved was 7.46 dB, the directivity achieved was 7.55 dB. The proposed design can be useful under ample number of applications and provides an alternate power source for small wireless electronic devices.
Raghav Tola, Asmita Rajawat
Optimised Multi Energy System (OMES) for Electric Vehicle
Abstract
Air pollution due to carbon emission is a perennial problem faced globally and causing a big threat to the environment and health in particular. Thus, it becomes essential to explore and interface different types of electrical energy to develop an optimized system. Hence, renewable energy resources have been widely acknowledged as a viable option to override this issue along with other viable energy sources. In order to handle this we have proposed, Optimized Multi Energ System (OMES) which consists of a battery, fuel cell and solar energy to improve the overall efficiency of the electric vehicles while reducing carbon emission.
Sheeja Nair, Avinash More, Ionut Cristian Scurtu
Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms
Abstract
In this paper, a novel method of approach of designing the microstrip antenna operating at Industrial, Scientific and Medical band is being analyzed and simulated. As the resonant frequency of the antennas configuration is dependent on the geometrical confinement and dimensions of the antenna the analysis and synthesis of the resonant frequency is carried out using the Artificial Neural Network (ANN) model. The physical dimensions like width (W), Length (L), Height (h), Dielectric permittivity are taken into consideration for the ANN algorithms Radix Basic Function Model (RBF) and Multilayer Perception Algorithm (MLP). The feed forward method and reverse side method is used for the analysis and synthesis of the parameters in determining the resonant frequency (fr) of the Antenna. The antenna configuration is designed by calculating using conventional formulas for the values of Length, Width and Height for the Operating frequency. A good matching is observed in terms of the values of the geometrical parameters between the RBF, MLP and Conventional formula method. The antenna configuration is analyzed using CST and the electrical parameters namely Return loss (S11), Gain and directivity are determined. Further the same is fabricated. The test and measurement values are also produced and a good agreement is observed in terms of Returnloss (S11). This study and analysis of the ANN Model of designing can be extended further in the design of the RF and Microwave components also. As a future scope this design of Antenna using Artificial Neural Network ANN can be extended to the design of Meta materials antennas for communication applications.
M. V. V. Prasad Kantipudi, Sailaja Vemuri, S. Sreenath Kashyap, Rajanikanth Aluvalu, Y. Satish Kumar
Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart Grid
Abstract
The smart meter is one of the indispensable devices in the Smart Grid (SG). A smart meter is an advanced energy meter that collects user power consumption data and provides information. Several sensors and control units coordinately work in the smart meter. In this research paper, a novel Smart Meter design is proposed for power measurement data collection to assist end-users for energy savings. The proposed system is a wireless monitoring system to measure the power consumption of electrical appliances at home. The system comprises of Node-stations, which are electrical meters at the customer’s house, and central data collection system that communicates via RF channel. The software at the master station helps store power in memory ICs and displays them graphically in real-time. The Node stations are built using Atmega328P microprocessor and current-voltage sensors, communicating with the Main station via the NRF24L01 module. The Main station uses the Arduino Mega module and stores information on 24C32 ROM chip and performs real-time management using RTC DS1307 IC. The proposed system operates within a distance of 100 m, a delay of 100 ms, and an accuracy of up to 96%. With the proposed system, users can track how much energy is used as well as the associated cost. Moreover, the Management software provides instructions and recommendations to optimize the time and duration of household electrical appliances.
Van-Truong Truong, Anand Nayyar, Dac Binh Ha
GSM Based Remote Distribution Transformer Condition Monitoring System
Abstract
The main motive of this thesis research pertains to design and implement a remote machine to human (M2H) and human to machine (H2M) communication system that provides remote distribution transformer condition monitoring (DTCM) system using Global System for Mobile Communications (GSM). DTCM will mainly monitor four distribution transformer operational parameters namely voltage unbalance, load current, oil temperature and winding temperature for oil cooled/insulated distribution transformers. The proposed system is a remote mobile embedded system (M2H) that integrates a GSM/GPRS module, interfaced with an Arduino microcontroller board, and sensor packages. It will be installed at the distribution transformer site monitoring the dynamic changes of the above mentioned parameters.
Wilson Kepa, Ashish Kr. Luhach, Moses Kavi, Joseph Fisher, Ravindra Luhach

Networks

Frontmatter
Performance Analysis and Classification of Node Capture Attack Models in WSN
Abstract
Wireless sensor networks (WSN) is a network grid of several self organizing, free, low prices, low control, and functional sensor nodes. The application of these networks in military systems, battlefields, environmental monitoring, smart buildings, and health care exposing the sensor nodes to a variety of physical security attacks. The node capturing attack is the most significant attack. In this attack, the adversary physically catches nodes and extracts the confidential data from the memory of nodes. Thus, analysis of adversary behavior becomes very important in designing different defensive mechanisms for WSNs. The paper presents an exhaustive survey on several node capture attack models in the sensor network. The simulation results compare their performance such in energy cost, attacking rounds, and traffic compromise.
Rohit Bathla, Priyanka Ahlawat
An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers
Abstract
This paper is introducing the missed call messaging services to the consumers of the electricity. Nowadays, there are consumers who could not get their monthly bills in the form of physical papers, specially the consumers residing at the remote area/ far distinct from the utility offices. The consumers at remote area can pay their dues monthly very easily, but once the backlog is increased, the consumer becomes defaulters due to non-availability of huge amount in the form of backlog with heavy amount as delay payment charge/ penalty. So they are ready to pay the bills monthly, but due to non-awareness of their dues amount, they are not able to pay the bills. So for mitigating this issue, the missed call messaging service is proposed for the electricity consumers specially those who are not aware of the internet/ website/ smart phones etc. services. The consumers are not to bother about remembering their large number consumer id, the mobile number registered at utility office, is sufficient enough, they will be getting the messages about their pending dues at utility office after the consumer make a missed call on a specific number for getting the balance details. The missed call for No_Power_Supply complaint on the other number will lodge the no power supply complaint and a unique complaint number will be messaged to the consumer on their mobile phones (can be delivered on basic mobile phone as text message). The architecture is based on the open source solutions.
Kuldeep Sharma, Arun Malik, Isha
A Divide and Conquer Based Data Aggregation Technique for WBANs
Abstract
WBANs monitor health data in an on demand and timely fashion and require effective communication of data from source to sink. In today’s tough times with pandemic taking its toll all over the globe, personalized data from smart wearable devices is empowering medical fraternity to make health care decisions with new insights. The latest wearable devices are capable of monitoring detailed physiological parameters, therefore promoting diagnosing patients from afar. The data transmission using wearable or implanted sensor nodes consume more energy and minimize network lifetime. Various solutions have been proposed by researchers to address issues such as interference, energy consumption, body movement, network lifetime, propagation delay and quality of services. However, issues still prevail in WBANs. In this paper, we have proposed a data aggregation technique using divide and conquer method which increases effectiveness of ubiquitous health care systems. The proposed data aggregation technique efficiently communicates data to the sink node, optimizes residual energy of sensor nodes, packet delivery ration, average delay and longevity of networks. The proposed technique reduces the number of packets to be transmitted by 28–29% and enhances network lifetime by 63% as compared to the other state-of-the-art techniques.
Roopali, Rakesh Kumar
Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT
Abstract
Internet of things (IoT) is an emanate automation in this competitive and innovative world. The emerging growth of IoT devices required high-speed Internet affinity, high data transmission, and low emission, etc. There are several limitations to existing communication technologies such as limited bandwidth, reduced network coverage, and scalability. Thus, IoT with an existing network is less capable to meet the above requirements. Therefore, there is a requirement for next-generation wireless communication 5G network to fulfil all these demands. This article presents an overview of 5G and IoT, as well as the integration of both technologies called 5G-enabled IoT, with their emerging technologies. Although, 5G enabled IoT is a powerful and prominent technology, it suffers from various technological challenges and compatibility issues. So, this paper also reveals the open challenges in 5G, IoT, and 5G enabled IoT. To address the security issue in 5G-IoT, it provides a solution using blockchain technology.
Neha Gupta, Sachin Sharma, Pradeep Kumar Juneja, Umang Garg
A Performance Discussion of Web Crawler Using Some Advanced Factors
Abstract
Research is considering the error rate to enhance the accuracy and reducing space and time during web crawling considering advanced parameters such as TTL, frequency of web page visiting and spam reported by users. The proposed work is supposed to minimize the errors by filtering the urls on the bases of advance parameters. This would increase the accuracy during crawling. More over the time and storage space consumption would be reduced due to elimination of use less links. Accuracy in case of proposed work would be more than previous research because previous research did not considered the advanced parameter to filter the list of URL. The simulation that is representing the accuracy, error rate, time and storage comparison has been made using Matlab. Research is considering the frequency of visiting the page. Another parameter for the crawling is weight age of the page i.e. how much time page gets visited by the end users. The page which is most visited get high weight age. Moreover the research work would consider the TTL value of the page. TTL value shows what the expiry time of the page is. It is considering the pages that are having the less expiry time. The web crawling is capable to filter the web page list during searching considering visiting frequency, weight age and TTL value. The filter has also removed URLs that are reported as spam.
Gaurav Chaudhary, Vijay Laxmi
Internet of Things in Healthcare: A Review
Abstract
Currently, we are witnessing rapid changes in the modern socio-economic system through the introduction of various digital technologies. The healthcare sector is no exception, but on the contrary, digitalization of this industry leads to optimization of medical services, improvement of quality control and reduction of costs. In the article, the authors consider the problems and prospects of it in the healthcare industry in the world. In the context of modern digital transformation processes, the healthcare system is being modernized in the main areas that stimulate technological progress - the use of medical information systems, the introduction of Internet of medical things products, advanced big data Analytics and the practical application of expert medical systems. In conclusion, the main conclusions based on the results of reviews in the use of IoT in the health sector are given.
Batyrkhan Omarov, Altynzer Baiganova, Saya Sapakova, Zhanna Yessengaliyeva, Sapar Issayev, Saltanat Baitenova, Bota Maxutova
Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview
Abstract
Following the inconsistencies encountered on the Indian terrain, the concept of autonomous vehicles has practically vanished from the Indian market. One major cause for the failure of self-driven vehicles in India is the collision occurring due to some common factors including poor lane-markings, deficiency of sign-boards, and most importantly – violation of traffic-rules by human drivers. Apart from the lack of markings, the lack of traffic-sense in human drivers is a major threat to autonomous driving in India; as no machine is capable enough to respond to the fluctuating mindset of a human being. In order to combat this challenge, a novel approach is presented that relies on the inter-vehicular communication strategy for avoiding critical collisions on the Indian roads. A unique application of machine learning technology to collision avoidance is outlined within this work.
Darshit Pandya, Hiren Mer
Wireless Sensor Networks Source Location Privacy Preservation Mechanism
Abstract
Computing and communication had already taken a gigantic step forward with the continuous improvements of the WSNs. In the meantime, security has not received similar consideration regarding compelling event turns. This paper discusses a hot safety research subject called WSN’s source privacy problem and presents WSN PSLP privacy policy. In order to adapt to any of this enemy, nodes of apparition and fake sources that reflect the behaviour of the source are used to broaden the direction. The weight of each hub is then determined as a measure for the next candidate to choose from. In addition, two modes of transmission are designed to convey true bundles. The results of the redevelopment have shown as the proposed PSLP plot enhances the time for good without negotiating the use of vitality.
Syed Umar, Misganu Tuse Abetu, Bodena Terfa Efa, Etana Fikadu Dinsa, Parmanand Prabhat
A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks
Abstract
In the present scenario, deployment of large-scale sensor nodes in the heterogeneous environment is the challenging factor for the network designers. While designing future networking, there are several performance parameters (i.e., cost, energy, delay, bandwidth, transmission rate) involves securing the routing path as well as improves the network lifetime. In this regards data aggregation suitable approach which scales up the overall network lifetime as well as saves the cost and energy in the networking. In this study have to discuss the prior research study on both routing strategy as well as data aggregation mechanism and can be known that there is need to develop a network model that ensures the high level of security in data-aggregation for future WSNs. Also needs to present a optimize routing scheme for data transmission and aggregation for resisting any lethal attacks that significantly drains the energy of sensors. Finally, have discusses a research gap towards data aggregation with optimal routing strategy.
Mahantesh Mathapati, T. Senthil Kumaran, Kavita K. Patil, Sunita S. Patil, H. N. Veena
Comparative Analysis of Internet of Things (IoT) Security Models
Abstract
Nowadays the internet of Things (IoT) is among the most trending technology to make the world better and smart. But IoT technology is not fully matured yet and there are so many security challenges faces while implementing (IoT) in real life that must be overcome like Improper tools upgrades, lack of competent and robust security agreements, user unawareness, and active appliance monitoring. In this paper, we explore the background of IoT cyber security and privacy measures; identify many security and privacy issues. Different methods used to protect parts of systems and systems based on IoT. Currently existing security solution, excellent models privacy required, suitable for different layers of IoT-operated applications. In this work, we proposed a comparative analysis of various IoT security models like Amazon Web Services (AWS), Trust model in IoT-enabled Vehicular Networks, and Autonomous IoT/IIoT Security Models. Along with proposed its solutions and future scope and impact of these security challenges on our social, economical and commercial life.
Tamanna Siddiqui, Saif Saffah Badr Alazzawi
Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks
Abstract
Wireless Sensor Networks (WSN) comprise of a large number of deployed sensor nodes in a certain desired structure. These sensing nodes are generally of minimum cost, less power and different functionality with the capabilities of sensing the parameters, communicating and computing the desired data. Energy conservation is one of the important issues in WSN as DC batteries are employed as power source for the nodes and at times, it is not feasible to replace the nodes frequently. This makes saving of power vital so as to increase the node life span. To ensure the availability of the sensor network for longer duration and minimize the use of power resources, we need to focus on energy efficient routing protocols. This has led the WSN to be one of the hottest topics for researchers. Therefore, it becomes utmost essential to study the current protocols used in WSN with respect to their applications and limitations. In this paper we have made a consolidated effort to analyze the protocols. This will facilitate the development of new or modified routing protocols for optimum performance of AWSN for deployment in both static and mobile environments including hostile terrain.
Rakesh, Payal, Suresh Kumar
IoT Based Smart Transport Management System
Abstract
Currently, vehicle to vehicle communication is an important application and thrust area of research. In this paper the author highlighted the workings, executions, implementations and the application of the Internet of Things (IoT) in transport management and vehicle to vehicle communication systems. The main advantage of this Industry 4.0 based IoT technology is that it helps us to reduce road traffic and accidents. The limitations of GPS like accuracy, precision, effective analysis, etc. has led to the evolution of Mobile based V2V communication which is more effective, error proof, result oriented and smart. For proper analysis of traffic vehicle to vehicle communication is established. Random Data from vehicles taken by numerous sensors. Any car coming in its variety could effortlessly share the data by either of two cars nearby. With the help of vehicle to vehicle communication we can provide a path of emergency vehicles to reach the destination quickly. Based on the V2V application, Red and Green signals can be marked on the path as per traffic density and the emergency vehicle can take the shortest, fastest and low density route. Similar such examples are elaborated in the current research manuscript that will help the researcher in effectively finding the research gap for further advancement, analysis, innovation and optimization.
Vartika Agarwal, Sachin Sharma
Vehicular Ad Hoc Network: Routing Protocols
Abstract
VANET (Vehicular ad hoc network) is a sub-branch or subclass of a mobile ad hoc networking. It is a new and growing technology which is works for vehicles. Safeness and security of all the passengers who are sitting inside the vehicles are the main motives of that technology. It enables the different modes of communications like Vehicles to infrastructure and Vehicles to vehicles by using different kinds of IEEE standards such as IEEE 802.11p. With the help of these standards, VANET is able to transfer the data packets or information to the vehicles because it is not sure that the drivers are aware of everything during the time of driving. In this technology, all the vehicles are considered as a node and the high mobility or movements of nodes create a major challenge or issue in transferring the data packets to the end devices. In this paper, on the basis of their strengths and weaknesses, various VANET routing protocols are evaluated and summarized.
Yogesh Kumar, Isha, Arun Malik, Ashish Kr. Luhach
A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks
Abstract
In this paper, we are describing concept to improve security of wireless sensor networks [1] using checksum one way function called hash code. Along with the security we are also performing file compression using compression techniques like zip input and output streams to reduce the storage cost. In existing technique security is provided using cryptography techniques but still attackers [5] can manage to get original data by hacking keys and eavesdrop (identify and alter packet) packet [7]. Cryptography techniques require heavy computation and can be hack by attackers. To improve security author is using reluctant checksum (hash code) [4] while sending data and only destination can decode and compare data. While sending data first corrupted data will be added to message and only source and destination may know how to get original data from corrupted data and message integrity will be checked using UMAC hash code. Sender will generate checksum code and send code with message to receiver and then receiver once again generate code on received message, if same hash code generated [4] then message was not eavesdrop or alter by attacker. By adding corrupted messages attacker will have no clue to identify which part of message is original and which part is corrupted and without getting original message attacker cannot alter packet and security[6] will be improve. Furthermore, we can add file compression concept to save the memory and processing time in our design with this the storage occupied by compressed file will be lesser than the original file.
Nimmala Mangathayaru, J. Ravi Kumar, Ravindra Luhach

Security and Privacy

Frontmatter
Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier
Abstract
Everything nowadays in operated and connected to the internet, this gives the attackers a great opportunity to steal the sensitive information of the users. Nowadays various kinds of attacks are there on the internet and attackers are continuously finding new ways to overcome the security. Proposed model would be able to detect the Cross-Site scripting attack using an Intrusion detection system. We will be using a modified dataset of KDD-CUP-99 to train our model. The Cross-Site Scripting (XSS) attack targets the web applications. The attacker targets the client side or the server side in this attack. The attacker injects malicious code into the application in the client side or targets the database in the server side. This proposed system focuses on the development that keeps track of the TCP packets parameters like service used, source bytes, destination bytes etc. which helps us determine whether the connection established is by a user or an attacker, thus it helps us detect the attack and prevent it. We have used Gradient Boosting Algorithm to detect the XSS attack and have compared the accuracy of the right detection of the attack with various other machine learning algorithms and have achieved high accuracy rate in the Gradient Boosting Classifier.
P. Sriramya, S. Kalaiarasi, N. Bharathi
Crypto Key Protection Generated from Images and Chaotic Logistic Maps
Abstract
Cryptography is a mechanism used for protection of valuable information from unacceptable users in the networking world. It’s a challenging task to protect such assets from illegal users. This necessitated for the development of Cryptographic techniques to provide security as large volumes of digital data traveling through the shared media. These techniques range from traditional security systems to crypto image techniques. This brings forward to focus on cryptographic techniques that have strong algorithm and strong key. The strength of any crypto algorithm depends on the strongness of the crypto key used. Therefore, both the algorithm technique and key generation methodology are equally important. This motivated to propose and concentrate on a novel scheme that includes crypto key generation and crypto key protection where the protected key and its methodology cannot be traced by an ineligible user.
Kalyanapu Srinivas, V. Janaki, V. Shankar, P. KumarSwamy
An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm
Abstract
Today’s Internet backbone network offers enhanced performance to overcome loss, delay, and unavailability. In the occurence of failure of a component, the network becomes susceptible to problems like link faults, path faults, and router failure. Link failure causes looping, packet dropping, loss of data and unreliable network communication. So an efficient fault management implementation is vital to handle multiple link failures. Fault management is vital to get the network back to normal.To properly operate and maintain a complex network, the system as a whole, and each of its essential individual components, must work in tandem. In this proposed approach On-demand Link State (OLS) routing, with shared bandwidth technology is implemented for fault management, for handling multiple link failures. It guarantees the forwarding of loop free data to destinations in case of any number of network failures. The core idea of OLS routing is a blacklist, which carries information on downgraded links identified along the path that are to be avoided. This ensures uninterrupted data packet forwarding without packets getting dropped. Also, the shortest path to the destination is located, based on the state and cost of the link (Robertson and Nelakuditi 2012).
K. Sashi Rekha
Application and Analysis of Phishing Website Detection in Machine Learning and Neural Networks
Abstract
Web Phishing asks the user to connect to a malicious website. The number one goal of this assault is to steal crucial statistics from the user. Intruder builds websites similar to those that look like the original website. It allows attackers to access Sensitive data such as username, password, details of debit cards etc. This paper aims to review many of the phishing detection strategies recently suggested for the website. This will also provide a high-level description of various forms of phishing detection techniques.
A. S. S. V. Lakshmi Pooja, M. Sridhar, G. Ramesh
Backmatter
Metadata
Title
Advanced Informatics for Computing Research
Editors
Ashish Kumar Luhach
Prof. Dharm Singh Jat
Prof. Kamarul Hawari Bin Ghazali
Prof. Dr. Xiao-Zhi Gao
Pawan Lingras
Copyright Year
2021
Publisher
Springer Singapore
Electronic ISBN
978-981-16-3653-0
Print ISBN
978-981-16-3652-3
DOI
https://doi.org/10.1007/978-981-16-3653-0

Premium Partner