Abdul razaque research project cleveland state university

Page 1

RESEARCH PROJECT OF GRADUATE STUENTS UNDER SUPERVISION OF DR. ABDUL RAZAQUE ELECTRICAL ENGINEERING AND COMPUTER SCIENCE DEPARTMENT, UNIVERSITY OF CLEVELAND, OHIO, USA No# 1

Name of the Project

Student Member

Project Description

Account and Service Hijacking

Ashok Reddy Vanga Dinesh Kumar Atukuri Sai Sharanya Chalamalashetty

2

Handling of selfish attack over Wireless Body Area Network

3

Performance analysis of TDMA based Multi-hop Infrastructure cellular networks

Salman khurshid P Vishnu priya p Ravinandan Atluri Lokesh kumar K Vemuru Chaitanya lakshmi Yeluri Bhargav kumar Supraja sesikala Dwarampudi

Novel two factor authentication mechanism is proposed to improve user experience, Quick response, and trusted platform modules, and near field communication. This mechanism adds new features in existing public cryptography. A novel algorithm is proposed to detect and eliminate selfish nodes

4

Elimination of ARP spoofing attacks using DHCP

Krishna Sandeep Maganti Sarvazna Kedhar Madduri Bharath Reddy Nookala

5

Multi detection framework to handle the worm Of wormhole attacks Stand-out segmentation Access control for cloud outsourcing data Token security for internet of things

Yogeshchandra sriharsha shitanshu thota Pranay Reddy Aeruva Bhanuvardhan Reddy kaipa Pranay Reddy Aeruva Yogeshchandra Sriharsha Sudha Narendrakumar Varil Patel Akshat Hans Raveedra Kumar Sai Kiran Jagadabi Srikar Sheela Nafi Halder, Rahil Ahmed, Siddhartha Yagnik MANEESH Vellanki Prateek Reddy

6

7

8

Pebble Watch Assessment

9

Optimized Priority Based Scheduling for Marking of Edge router in DiffServ Node level energy efficiency in the network of internet of things

10

Security

Analyzing the performance of TDMA based on Outage probability and node throughput by using frequency carriers in Multi-hop infrastructure network and as well as in single hop architecture Security issues at mac layer are addressed Focusing on man-inmiddle attacks at the address resolution protocol. Using advanced DHCP algorithm to handle the issue Three authentication process is used to detect the wormhole attacks New segmentation stand-out access control paradigm is introduced for securing cloud outsourcing data Generating token by Xoring with OTP and making the token secured to eliminating guessing attack. Discussion of all possible ways to make pebble much safer and secured Priority based scheduling is introduced to drop the duplicate packets and improve the QoS Novel algorithm is proposed to improve lifespan and energy


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.