Group key management is an important functional building block for any secure distributed communication environment. Key distribution techniques are key factors in secure communication in grid computing. Once the secure key management is performed, messages can be securely exchanged among the grid entities. In any group communication systems supporting GRID and cloud-based applications, the communication parties need to communicate with each other as members of a group in a secure manner. Several protocols have been proposed to support secure group key management. This paper presents a new secure password-based group key management protocol for Grid computing environment, which is composed of two dynamic servicing tiers: the grid application that requests grid services, and the grid services that work on behalf of the user.
The research was conceived to realise a robust and high energy-saving WSN node, which on deployment to the field would minimize the energy consumption at radio, processor and sensor domains. The work strived to unravel and bridge notable existing gaps in the literature work which include: The inability of previous researchers to minimize the energy consumption scheme across the three domains of nodes; Their failure to realize that excessive sleeping by the nodes could adversely lead to network disconnection; The direct deployment of a single network topology stuff which hitherto leads to over consumption of energy by the nodes or sudden network failure depending on the particular network topology adopted. In testimony whereof, a balanced and multi-dimensional approach for energy-efficient communication protocol, which extends the lifetime of WSNs, was achieved. In this research, an improved algorithm design for energy saving in WSN nodes, which cuts across the sensor, processor and radio domains, was also realised. Furthermore, W-hybrid network topology structure for ensuring stable network connectivity among the nodes was developed as an innovation.
Wireless network is a group of nodes which act as router for communicating with each other over a wireless channel. Using the concept of these network, we focus to strengthen communication between a community in a certain diameter of area. It is never hard to find geographical location where mobile network and internet connection is turbulent. Let’s imagine ourselves in such piece of land and ask ourselves a question, "How can we communicate with each other?". With a view to answering this question, we target to build a network where we need no internet or mobile network, rather we are going to make our currently available smart equipment to use as nodes to build network through which a sender can send some important message or information to a specific individual or a group of people. We also made this transmission of data reliable, fault tolerant and secure using various techniques from Wireless networking and Cryptography.
Although technology has advanced at breathless pace, wildfire still bursts out every year all over the world. There are various wildfire monitoring system employed in diferrent countries, most of them are depended on photos or videos to identify features of wildfire, after wildfire happened. Delay of confirmation is diverse based on used techonologies. An autonomous forest patrol system by Unmanned Aerial Vehicle(UAV) is presented in this paper, which try to employ the fashinable UAV to patrol in forest and collect environmental data in order to monitor and predict wildfire before it really erupts. From limited practical data collected, the monitoring data such as temperature and humidity are effective to reflect the real situation, prediction requires more data and time to prove.
Derived from bullying, cyberbullying is a new problem that is spreading because of the many advances in technology, like the Internet and smartphones, affecting especially to the world's youth population. Currently, there are some studies to investigate their effects on victims or suggest different solutions to detect it. However, a definitive tool that can detect and prevent this harassment is no yet available. For this reason, this paper proposes a novel mobile application for smartphones that will allow detecting whether a person is being a victim of cyberbullying. For this, the application is based on a set of data processing techniques and fuzzy logic that make up a system for decision making, capable of detecting harassment effectively. In addition, this paper also includes some experimental results obtained by performing cyberbullying detection tests with the application.
In venues where there are restricted access areas, access control systems that work by entering a code or with some extra element such as a card are used. This paper proposes an access control system based on controlling each restricted area using a Raspberry Pi with an NFC reader, in addition to using Android smartphones emulating an NFC tag as an identification method thanks to an application for these devices. The management of the system is performed through a web panel that also allows to view all the data. Moreover, the system is based on the role access control model. In order to protect the information exchanged between the different elements of the system, security mechanisms are used.