Friday, 21 December 2012

CRYPTOGRAPHY IN MOBILE COMMUNICATIONS USING SECURE EXTENSIBLE AND EFFICIENT SMS


ABSTRACT:
                        Short Message Service (SMS) still represents the most used mobile messaging service. SMS messages are used in many different application fields, even in cases where security features, such as authentication and confidentiality between the communicators must be ensured. Unfortunately, the SMS technology does not provide a built-in support for any security feature.

                   This work presents SEESMS (Secure Extensible and Efficient SMS), a software framework written in Java which allows two peers to exchange encrypted and digitally signed SMS messages. The communication between peers is secured by using public key cryptography. The key-exchange process is implemented by using a novel and simple security protocol which minimizes the number of SMS messages to use. SEESMS supports the encryption of a communication channel through the ECIES and the RSA algorithms. The identity validation of the contacts involved in the communication is implemented through the RSA, DSA and ECDSA signature schemes. SEESMS is able to certify the phone number of the peers using the framework. Additional cryptosystems can be coded and added to SEESMS as plug-ins. Special attention has been devoted to the implementation of an efficient framework in terms of energy consumption and execution time. This efficiency is obtained in two steps.

                   First, all the cryptosystems available in the framework are implemented using mature and fully optimized cryptographic libraries. Second, an experimental analysis was conducted to determine which combination of cryptosystems and security parameters were able to provide a better trade-off in terms of speed/security and energy consumption. This experimental analysis has also been useful to expose some serious performance issues affecting the cryptographic libraries which are commonly used to implement security features on mobile devices.











PROPOSED SYSTEM:

Two are the major security vulnerabilities affecting SMS based communication: the lack of confidentiality during the transmission of a message and the absence of a standard way to certify the identity of the user (or at least his phone number) who sent the message. These vulnerabilities originate from the protocol used to exchange SMS messages and from the infrastructures used to implement it. There are currently several proposals, mostly coming from the scientific research, about how to secure SMS messages. Some of these proposals require security to be injected at the protocol level. Instead, most of them consist of software frameworks which can be installed on mobile phones and/or on the SIM cards in order to implement security features.




PROJECT DOMAIN DESCRIPTION:
There have been several proposals up to now to secure SMS based communications on a GSM network. A first category of contributions tries to address these problems by changing the original GSM specifications in order to introduce security features. This is the case, for example, of the proposal presented by Hossain et al. in which argues for a modification of the GSM protocol at the transport level to achieve confidentiality between mobile equipment (ME) and the GSM base station (BS) connected to it. The advantage of this approach, if followed, is that it would be able to inject security features at infrastructural level, thus allowing strengthening the entire communication network. However, it is unlikely that these proposals will be implemented and widely adopted in the near future, mostly because of the technical difficulties arising from the implementation of structural changes in well established network architecture like the GSM one.
A second category of contributions to secure SMS communication— which is becoming viable because of the increasing diffusion of ME with advanced computational capabilities — introduces security features through the implementation of security schemes at the application level. The resulting software frameworks can be categorized according to the place where the application implementing the security scheme, and their cryptographic keys, are stored. The first possibility is to locate the application and its keys in a programmable SIM card used by the ME. This solution is adopted by systems like the one developed by Rongyu et al. in or by the IPCS Group with the IPCryptSIM

Sending or receiving SMS messages is a common habit for most of the people using a cellular phone? The general expectations are that mobile equipment should be able to promptly send and receive a message with almost no delay. The way of sending and receiving secure SMS messages could change this habit since it involves processing incoming / outcoming secure messages which may be of several seconds.

Thus, the efficiency of these systems is almost as important as the security they guarantee. Moreover, the efficiency of a system for guaranteeing secure SMS messages is heavily influenced by the same ingredients which govern its own security: in other words, the cryptosystems and the security parameters it uses. The user should be given the possibility to choose to trade part of the security of a system with shorter response times, and vice-versa. Moreover, such a customization should be allowed on a per-message basis, because the same user might need to send messages, even to the same recipient, with different levels of security. As a matter of fact, all the systems for sending secure SMS messages presented so far in literature are bound to a particular cryptosystem. While this choice simplifies their development, it may have a negative effect on their ability to meet the requirements of the users.

Tuesday, 18 December 2012

AN EFFICIENT KEY MANAGEMENT SCHEME FOR SECURE DATA ACCESS CONTROL IN WIRELESS BROADCAST SERVICES


Abstract

Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy consumption, I introduce an Efficient Keying Management Scheme for WSNs that significantly reduces the number of transmissions needed for re-keying to avoid stale keys.

It is able to efficiently detect and filter false data injected into the network by malicious outsiders. This framework consists of two operational modes each of which is optimal for different scenarios. In Mode-I, each node monitors its one-hop neighbors where Mode -II statistically monitors downstream nodes. I have evaluated Efficient Keying Management Scheme’s feasibility and performance analytically and through simulations. Our results show that , without incurring transmission overhead is able to eliminate malicious data from the network in an energy efficient manner.The key to the RC4 encryption mechanism dynamically changes as a function of the residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the successive packets of the stream.

 The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific re-keying messages.





vebak


Abstract—Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Since the communication cost is the most dominant factor in a sensor’s energy
consumption, we introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that
significantly reduces the number of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy,
minimal transmission is imperative for some military applications of WSNs where an adversary could be monitoring the wireless
spectrum. VEBEK is a secure communication framework where sensed data is encoded using a scheme based on a permutation code
generated via the RC4 encryption mechanism. The key to the RC4 encryption mechanism dynamically changes as a function of the
residual virtual energy of the sensor. Thus, a one-time dynamic key is employed for one packet only and different keys are used for the
successive packets of the stream. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the
incoming packets using a predicted value of the key generated by the sender’s virtual energy, thus requiring no need for specific rekeying
messages. VEBEK is able to efficiently detect and filter false data injected into the network by malicious outsiders. The VEBEK
framework consists of two operational modes (VEBEK-I and VEBEK-II), each of which is optimal for different scenarios. In VEBEK-I,
each node monitors its one-hop neighbors where VEBEK-II statistically monitors downstream nodes. We have evaluated VEBEK’s
feasibility and performance analytically and through simulations. Our results show that VEBEK, without incurring transmission overhead
(increasing packet size or sending control messages for rekeying), is able to eliminate malicious data from the network in an energyefficient
manner. We also show that our framework performs better than other comparable schemes in the literature with an overall
60-100 percent improvement in energy savings without the assumption of a reliable medium access control layer.
Index Terms—Security, WSN security, VEBEK, virtual energy-based keying, resource-constrained devices.
Ç
1 INTRODUCTION
RAPIDLY developed WSN technology is no longer nascent
and will be used in a variety of application scenarios.
Typical application areas include environmental, military,
and commercial enterprises [1]. For example, in a battlefield
scenario, sensors may be used to detect the location of
enemy sniper fire or to detect harmful chemical agents
before they reach troops. In another potential scenario,
sensor nodes forming a network under water could be used
for oceanographic data collection, pollution monitoring,
assisted navigation, military surveillance, and mine reconnaissance
operations. Future improvements in technology
will bring more sensor applications into our daily lives and
the use of sensors will also evolve from merely capturing
data to a system that can be used for real-time compound
event alerting [2].
From a security standpoint, it is very important to
provide authentic

Friday, 7 September 2012

CLASS MATES


R.NO           NAME                   NATIVE PLACE                
             
01   AJMAL                               KERALA
02  BALAMURALI                    SALEM
03  BAVITHRA                          DINDIGUL
04  BRINDHA                           PALLADAM
05  DINESH.K                          THIRUPUR
06  DINESH.R                          SALEM
07  ILAKIYA                             NAMAKAL
08  E.PRINCY                          MADURAI
09  KIRUJA                              SALEM
10  KUHAN                              PALANI
11  JAGANATHAN                   THIRUPUR
12  JAYAPRIYA                        SAKTHI
13  JAYAKUMAR                     NAMPIUR
14  JEYANTHI                         SALEM
15  JULIE                                KERALA
16  K.RAJA                              SALEM
17  K.DVEI                             THIRUPUR
18  KAVIKO                            SALEM
19  KAYALVIZHI                    MADURAI
20  M.BALA                            SALEM
21  MAHESWARI                   COVAI
22  MANIKANDAN                SALEM
23  MANJUNATH                  HOUSR 
24  M.BADUSHA                  THIRUPUR
25  M.PRIYA                         COVAI
26  M.WARI                          NAMAKAL
27  MUTHATHAL                COVAI
28  N.KUMAR                     DHARMAPURI
29  NITHYA                        COVAI
30  NITHIN                        OOTY
31  NIVETHA                    THENI
32  NIVASH                      NAMAKAL
33  OVIYA                        DHARMAPURI
34  PANDIAN                  VEDASANDUR
35  PAVITHRA               THENI
36  POOJA                     COVAI
37  PREETHA                MADURAI
38  PRAVEENA             SALEM
39  PRASATH                POLLACHI
40  PRASANTH             NAMAKAL

Thursday, 6 September 2012

Windows New Technology





                                                          Windows New Technology

                                     A full 32-bit operating system developed by Microsoft to be a very stable operating system to be used on servers and business machines. It was developed from the ground up to be fully 32-bit without much worry about DOS compatibility.


                                                             Windows NT releases
Version                Marketing name              Editions                    Release date          RTM build
NT 3.1                Windows NT 3.1          Workstation                   27 July 1993                528
                                                    (named just Windows NT),
                                                         Advanced Server            
NT 3.5                Windows NT 3.5    Workstation, Server             21 Sep 1994                 807
NT 3.51              Windows NT 3.51  Workstation, Server             30 May 1995                 1057
NT 4.0                Windows NT 4.0   (Workstation, Server, 
                                                     Server Enterprise Edition, 
                                                      Terminal Server, 
                                                        Embedded )                       29 July 1996                  1381
NT 5.0                 Windows 2000   (Professional, Server,
                                                      Advanced Server,
                                                      Datacenter Server,
                                                      Advanced/Datacenter 
                                                     Server Limited Edition)          17 February 2000              2195
NT 5.1                  Windows XP       (Home, Professional,
                                                        64-bit Edition,
                                                      Media Center
                                                        (original, 2003, 2004
                                                         & 2005), Tablet PC 
                                                         (original and 2005), 
                                                       Starter, Embedded,
                                                            Home N,
                                                          Professional N )                   25 Octbr 2001               2600
NT 5.2                  Windows XP       64-bit Edition Version 2003[19]  28 March 2003              3790
                            Win Server03   (Standard, Enterprise,
                                                   Datacenter, Web, Storage,
                                                      Small Business Server ,
                                                        Compute Cluster )                     24 April 2003
                            Windows XP       Professional x64 Edition               25 April 2005
                      Win Server 03 R2     (Standard, Enterprise,
                                                      Datacenter, Web,
                                                        Storage, Small Business 
                                                      Server, Compute Cluster)             6 December 2005

NT 6.0           Windows Vista          (Starter, Home Basic,

                                                 Home Premium, Business,
                                                     Enterprise, Ultimate,                   30 November 2006
                                               Home Basic N, Business N)                
                 
NT 6.1[21]       Windows 7         (Starter, Home Basic,                                         
                                           Home Premium, Professional, 
                                                       Enterprise,)                              22 October 2009[23]     7600          

NT 6.2       Windows 8[25]      Foundation, Essentials, Standard, 

                 Windows 8 (x86),                                                            26 October 2012[27]             9200


Virtual Keyboard



Free Virtual Keyboard














USES


              *Mobility Impairments
              *Foreign Character Sets
              *Touchscreens

ADVANTAGES
                        * It is a most widely used and efficient text entry method at present.
                        *An average professional typist reaches 50 to 70 words per minute (wpm) typing speed while advanced typists can work at 120 wpm.
                        * Speaking speed is generally 2-4 times faster




BMW CAR MODELS&PRICE



BMW Cars Price List

                                                                                   SEE THE LATEST AND UPDATED PRICE OF BMW CAR PRICES IN INDIA. THE PRICES LIST MENTIONED HERE BASED ON EX –SHOWROOM IN DELHI. BMW INDIA PVT. LTD. – THE NEW HOME OF SHEER DRIVING PLEASURE. AS THE LEADING BRAND WORLDWIDE IN THE PREMIUM CAR SEGMENT, BMW IS PROUD TO ANNOUNCE ITS BUSINESS OPERATIONS IN INDIA. COMMITTING TO A STRONG, LONG-TERM PARTNERSHIP, BMW CARS LOOKS FORWARD TO SETTING ANOTHER MILESTONE IN THE AUTOMOTIVE HISTORY. THE DYNAMIC BMW CARS RANGE OFFERS DISCERNING DRIVERS A WORLD OF UNRIVALLED INNOVATIONS, PREMIUM QUALITY AND SHEER DRIVING PLEASURE. SEE THE LATEST BMW CAR PRICE LIST IS GIVEN BELOW:

BMW 3 SERIES PRICES

BMW 3 SeriesBMW 3 Series 320d Corporate Edition –Rs. 24,40,000/-
BMW 3 SeriesBMW 3 Series 320d Highline – Rs. 31,50,000/-
BMW 3 SeriesBMW 3 Series 320i – Rs. 27,80,000/-
BMW 3 SeriesBMW 3 Series 330i – Rs.33,95,000/-

BMW 5 SERIES PRICES

- BMW 5 SeriesBMW 5 Series 523i – Rs. 38,90,000/-
- BMW 5 SeriesBMW 5 Series 525d – Rs. 39,90,000/-
- BMW 5 SeriesBMW 5 Series 530d – Rs.45,90,000/-

BMW 6 SERIES PRICES

- BMW 6 SeriesBMW 6 Series 650i Convertible – Rs. 87,90,000/-
- BMW 6 SeriesBMW 6 Series 650i Coupe – 79,70,000/-

BMW 7 SERIES PRICES

- BMW 7 SeriesBMW 7 Series 730Ld – Rs. 73,60,000/-
- BMW 7 SeriesBMW 7 Series 740Li – Rs. 79,60,000/-
- BMW 7 SeriesBMW 7 Series 750Li –Rs. 86,80,000/-
- BMW 7 SeriesBMW 7 Series 760Li – Rs. 1,24,10,000/-