You are on page 1of 18

A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

Abstract. Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in network location anonymization algorithms, namely, resource- and quality-aware algorithms, that aim to enable the system to provide high quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the well established k-anonymity privacy concept, that is, a person is indistinguishable among k persons, to enable trusted sensor nodes to provide the aggregate location information of monitored persons for our system. Each aggregate location is in a form of a monitored area A along with the number of monitored persons residing in A, where A contains at least k persons. The resource-aware algorithm aims to minimize communication and computational cost, while the quality-aware algorithm aims to maximize the accuracy of the aggregate locations by minimizing their monitored areas. To utilize the aggregate location information to provide location monitoring services, we use a spatial histogram approach that estimates the distribution of the monitored persons based on the gathered aggregate location information. Then the estimated distribution is used to provide location monitoring services through answering range queries. We evaluate our system through simulated experiments. The results show that our system provides high quality location monitoring services for system users and guarantees the location privacy of the monitored persons.

Client and Server Node Capture Attacks

Abstract:

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences.

CONTEXT AWARENESS IN MOBILE PHONE USING BLUETOOTH

ABSTRACT:

The emerging location-detection devices together with ubiquitous connectivity have enabled a large variety of location- based services (LBS). Location-based services are becoming popular for mobile users. The mobile users location plays a key role to provide the service from one side, but it other side it is dimension of their privacy, so it necessary to keep the user information anonymous to the other parties. Since one important issue in LBS is to achieve an accurate service, hence it is important to use the mobile user accurate location. Using the location accurately raises some concerns on behalf of the users privacy. One solution for meeting this requirement is using by the means of a anonymizer. Anonymizer uses K-anonymity cloaking the user location to K- anonymizing spatial region (K-ASR). Traditional Kanonymity method needs complex query processing algorithms at the server side and have drawback of tracking user. In this paper we have proposed a new model for mobile users to retrieve the result quickly and increases users privacy.

Continuous Neighbor Discovery in Asynchronous Sensor Networks


Abstract: In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighboring nodes. Hence, even after a sensor is aware of its immediate neighbors, it must continuously maintain its view, a process we call continuous neighbor discovery. In this work we distinguish between neighbor discovery during sensor network initialization and continuous neighbor discovery. We focus on the latter and view it as a joint task of all the nodes in every connected segment. Each sensor employs a simple protocol in a coordinate effort to reduce power consumption without increasing the time required to detect hidden sensors.

Credit Card Fraud Detection Using Hidden Markov Model


Abstract:

Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. We present detailed experimental results to show the effectiveness of our approach and compare it with other techniques available in the literature.

Security Reporting Tool (CSRS)

Abstract:

To Develop a CSRS System for a network ,which should study the hackers behaviour and store it in a DataBase.

CSRS can play a key role in a defensive strategy. While there are many studies and sources for information, there is no single source that discusses the major strategic issues concrerning CSRS. The main attraction of a CSRS is not limited to what you can learn but how you can learn it. As a result, a CSRS fits into the defensive plan as a way of
Studying black hat activity. Developing a reasoned response to the threat, Testing and developing new responses and tactics to a given threat, and CSRS can also slow down another attack thus allowing time to develop a countermeasure.

Customer Cart System using Ontology search

Synopsis:-

The Customer Care service is mainly designed to provide fast and effective user environment for Call center activities. This application software is based on Model view controller architecture. The Client side forms used for display forms the view, database connections, business logics are developed and are represented as models, while controllers are pages used to link model with the view. There is a product support team consisting of 3 groups. Their duty is to attend the customer, make new problem report, solving the problems and test the product before giving back to the customer. The manager form deals with the Report generation and modification of customer details entered by call agent. In the primitive two-tier architecture the validations of the data are performed in client side or at the server side. This caused the delay in data retrieval and transmission.

Data Mining Application in CRM System Based On Traders Network Abstract : Data Mining, simply called DM, is a kind of method for data analyses at deep level. The process of Data Mining, actually is a process using analytic tools to seek the models and the relationship between the data and the models whose function is to make predictions. Therefore, Data Mining can be described as this: It is, in light of the set target of an enterprise, an effective and advanced method in probing and analyzing huge numbers of enterprise data and revealing the unknown regularities or verifying the known disciplines and model them better.

COMPANY INFORMATION TRACKING SYSTEM

Synopsis: CITS is a powerful human resource tool for maintaining employee and company information. More then a data storage program, CITS helps you manage your employee. CITS offers a wide variety of reports that give you exactly the information you need. vie payroll information by department, or find everyone who is receiving company Benefits. CITS gives you the power of information with different report categories.

You can import from third party programs such as excel or louts. CITS also allows you to export your data to other programs. When you import data, you have the option of Adding the information to your existing CITS database or replacing your CITS database with the imported one. (Remember, once you delete your data, it can not be retrieved.) After the import process is complete, CITS will close down and you must restart the program to access your data.

CITS allows you to add and remove employee from the program and provides access to all employee information categories from Address History to work information. Organization files keep track of your company information. From this screen you can crate, modify, and Remove company data. You can adjust data for company benefits, department, evaluation categories, and positions It is a good idea your

department and positions before adding employees. You must also set up your company benefits and evaluations before adding them to your employee files. When you create a new category such as an Additional department or position, it is immediately available for selection in every applicable employee screen. Checklists assist you in office management by creating a list of items the need to be completed for a done when someone is hired.

You might add items such as complete I-9 or Introduce to other employees. The Automatic office Assistant cheeks your employee and department information for specific items and informs you of possible errors. You can instruct The Automatic Assistant to check for missing information of other anomalous data patterns. To access the office Assistant you must have security access to all departments and edit access to personal. The Automatic Office Assistant will check only the information in the Modules being checked list box. To add an item to the list box, first select the module category then place a check mark beside the item in the category you want to check. The Automatic Office Assistant will add the item to your Modules being checked list box. There are two modes for selecting data, Regular mode and Scheduler mode. You can create a separate list for each mode. When you assign modules to the modules being checked list box, be aware of which mode you have selected. You can choose to have the Onboard Assistant do a Regular check or you can use the Scheduler.

CITS allows you to preview and print different reports that range from individual Work History to department Headcounts. Each report

screen has different option. You can change the name of the report by editing the Report Title field. This will not change the name of the report in the drop down box, only the name as it appears on the report in the information such as the report title and date. Your company name (if selected) and report title will appear in every header. If you choose to have your company logo displayed on your report, it will appear in the top left corner .directly above the page number. The header may also contain information such as the employee name, department, and selection criteria.

Eliminating SQL-Injection Attack Abstract The widespread adoption of web services as an instant means of information dissemination and various other transactions has essentially made them a key component of todays Internet infrastructure. Web-based systems comprise both of infrastructure components and of application specic code. Various organizations have started extensively deploying Intrusion Detection/Prevention Systems and Firewalls as a means of securing their vital installations. However, very little emphasis is laid on securing the applications that run on these systems, apart from frequent updates and patching. SQL-Injection Attacks are a class of attacks that many of these systems are highly vulnerable to, and there is no known fool-proof defense against such attacks. In this paper, we propose a technique, which combines static application code analysis with runtime validation to detect the occurrence of such attacks. The deployment of this technique eliminates the need to modify source code of application scripts, additionally allowing seamless integration with currently-deployed systems. We provide various optimizations improving overall efciency, and also preliminary evaluation of prototype developed.

Turning HTTP Proxy to WAP Gateway


Objective To deliver a firewall based on packet filter application that allows or deny packet on the time of transfer specified by the user. It filters or stops the packet between the two specified IPs. Mechanism: [Working of firewall is based on the following steps]

Extract the packet header Check the protocol associated Compare with the rules Check the source and destination add. If protocol is same Check out the port if protocol is TCP Drop or pass the packet

Description: After declaring structure variables an integer type countrule is declared and initialized it holds the value of the number the rule, it is incremented when new rule is required. Filter list is initialized to first, its size increases as more and more rules are added. Now the packet header is extracted and is assigned to the variable ipp. Next the protocol is checked. If the protocol is numbered as 6 means it is TCP. We accept all the packets if the connection is already established. Also if we don't have the bit SYN activate then we pass the packet by using return PF_FORWARD.

Knowledge Based Medical Diagnosis


Abstract is the complete solution for Appointment fixing and canceling in the hospital. It deals fully Online between the Doctor and Patient. To providing an exact TIME-SLOT and TOKEN-ID. Abstract: To eliminate the problem when Appointment fixing and cancellation to the appropriate doctors. To Intimate Doctors unavailability to the patient after fixed the appointment when the appropriate doctor left from appointment. This system helps to The HR and Administrator to adopt the alternative doctor when the appropriate doctor left. OVERVIEW OF PROJECT This project fully integrated with online. The main objective of project is to reduce patient and time. Once the patient can registered in hospital website the records are stored permanently. Whenever the patient fixing or canceling appointment dont need type all the required fields. The form itself all the fields are filled. The patient can do the after the login. The end of appointment fixing or canceling the token-id automatically modified. The new doctor also must to register from the hospital site by instruction given by the hospital. Whenever the Doctor entered in their login the patient details automatically generated like a report. The report contains only who are the patient got appointment and displays the full details about the patient. The Doctor can send the leave and clear the leave by this login session itself. The HR or Administrator only can enter the Administrator login. We generate the Doctors leave status by using this after the login. The report can be generated date to date. So the weekly, monthly, yearly report also possible.

Mobile Banking
Upon development of m-commerce as one of the new branches of ecommerce, m-banking has emerged as one of the main divisions of mcommerce. In spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system This paper presents a method for increasing security of the information requested by users with the use of Pin method.

ONLINE MOBILE RECHARGE USING MANET Abstract:

The Project ONLINE MOBILE RECHARGE MANET gives us the information about all the mobile service providers. This application provides us the complete information in a service provider wise. The major advantage of this proposed system is to have the recharging facility of any service provider under one roof. It contains 3 major modules that are Admin, User and Visitor. Admin module contains all the details of the users like when it was created and what all the transactions done by the user, detailed information of the user can be accessed or can be manipulated by the administrator. User module consists of how to create the user and how to access the service provider and any time he can have the complete information of his account, when he had updated his balance and how the balance has been utilized that can be viewed in the form of reports. Visitor is the module where he can visit the proposed system and can have the complete information of all the service providers.

Multiple Access System

Abstract:This Application bring three major protocols in single entity so that, we can browse the Internet using http client, we have ftp client in GUI so that it easy to interact by end user, and TCP/IP file server is user to share the file with in the LAN and the operating system in the can be anything which supports Java. This system is helpful to the administrator for configuring and managing the network in easy way.

Using TCP/IP Server We can connect n number of clients, as soon as connected to the server IP-address of all machines which are running client software spontaneously it will inform to all the clients. Client can have all client IP Address so that the client can upload, download file from the remote machine, not only file transferring but also we can send message to remote machine which is in Local network FTP is transferring the file based on the GUI and it can provide enough facility to access the FTP Server, we can work all the commands which is provided in ordinary cui based FTP client which is available in the operating system itself. Performance of this Client is based on speed of the server and the network connection. FTP protocol provided by inetfactory package to connect remote machine. In Ftp client we can determine the mode of file transfer as well as block size of the transfer so that we customize our transferring rate of the date
Http Client is nothing but a web browser, but the main objective of this Http Client to download a file from the web server, instead of seeing the hypertext Format and in text format we have interpreter to display as a web page. HTTP is based on the Internet connection, which are using by the Client. HTTP protocol is used to download from the remote web server but the file in hypertext format. This Application can provide immense facility to access all of this protocol in single entity itself, moreover we have multithreaded Application so that we can run the entire

client simultaneously. Since all client side validations are worked out. So, that the end user did any mistakes also it will give proper message to perform the specified task. In our web browser we cannot execute any binary applications so we are reliving from virus alert. Corporate Recruitment System:

ABSTRACT

Corporate Recruitment System (CRS) is web-based tool to reduce communication gap between Job providers and Job seekers.

The Main objective of this solution is to make easy the recruitment process of any organization. This CRS is designed by keeping in mind both parties Job providers and Job seekers. CRS allows Job seekers to register their details like skills and experience with the system, and then on the other hand even it allows job providers to post their requirements with the system.

Corporate Recruitment Management system is helpful for the job providers i.e. companies which are in need of employees, job seekers who are in need of job, (for both Exp and freshers). This portals main aim is to provide the vacancies available for the job seekers without taking any charge from them in IT technologies.CRS will automatically send mails to all job seekers whose skills are matched with the requirement.

You might also like