Visible to the public International Conferences: Signal Processing, Informatics, Communication & Energy Systems (SPICES), India, 2015

SoS Newsletter- Advanced Book Block


SoS Logo

International Conferences: Signal Processing, Informatics, Communication and Energy Systems (SPICES), India, 2015


The 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) was held on 19-21 Feb. 2015 at in Kozhikode, Kerala, India. It was a forum for technical exchange amongst researchers from academia, research laboratories, and industries in various emerging fields of Signal Processing, Communication, Computer Science, Power Systems, and Control spanning across six tracks. The technical program includes keynote lectures, plenary lectures, regular technical sessions, and special sessions.  Conference web page is at:   


Sadio, Ousmane; Ngom, Ibrahima; Lishou, Claude; Saliah-Hassane, Hamadou, "Improving Security And Mobility For Remote Access: A Wireless Sensor Network Case," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091369
Abstract: Ubiquitous Computing is a new Internet revolution that will allow, among other uninterrupted access to the network actors machines and some mobile devices. In this paper, the example of mobile laboratory is composed a Wireless Sensor Network (WSN) whose the data collection is done through a special node called master. HIP (Host Identity Protocol) is used as communication protocol. The HIP architecture uses the identity/locator split. In the proposed architecture, mobility is managed by three entities including mobile node (master), locator manager or fLRVS (firewall and Local Rendezvous Server), access link manager or S-RVS (Subnet Rendezvous Server). The new introduced network entity is fLRVS, it is responsible for the node accessibility in the domain and filtering based on the HI (Host Identifier). The node identifier named HI, is the public key of an asymmetric key-pair. The HIP Registration and HIP Rendezvous Extension have been modified to achieve this authentication system. A proposed mobility scheme, named HIPdisass, is based on a proactive handover mechanism which reduce latency and packet loss. At outside, remote hosts can connect to the mobile laboratory safely regardless of the type of access network.
Keywords: Authentication; Decision support systems; Hip; Protocols; Servers; Wireless sensor networks; host identity protocol; macro-mobility; micro-mobility; remote access; security; wireless sensor network (ID#: 15-5090)


Lata, B T; Sumukha, T V; Suhas, H; Tejaswi, V; Shaila, K; Venugopal, K R; Anvekar, Dinesh; Patnaik, L M, "SALR: Secure Adaptive Load-Balancing Routing In Service Oriented Wireless Sensor Networks," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091379
Abstract: Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the rapidly changing Network State. Adding more complexities to the routing and security schemes increases the end-to-end delay which is not acceptable in Service Oriented WSNs which are mostly in real time. We propose an algorithm Secure Adaptive Load-Balancing Routing (SALR) protocol, in which the routing decision is taken at every hop considering the unforeseen changes in the network. Multipath selection based on Node Strength is done at every hop to decide the most secure and least congested route. The system predicts the best route rather than running the congestion detection and security schemes repeatedly. Simulation results show that security and latency performance is better than reported protocols.
Keywords: Delays; Mathematical model; Routing; Routing protocols; Security; Wireless sensor networks; Wireless Sensor Networks; hop-by-hop routing; load-balancing; machine learning; multipath; network security; secure adaptive routing (ID#: 15-5091)


Sarvabhatla, Mrudula; Narayana, Kodavali Lakshmi; Vorugunti, Chandra Sekhar, "An Improved Secure Remote User Authentication Scheme Using Smart Cards With Check Digits," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091415
Abstract: The advancement of communication technology resulted in increasing number of security threats over public Internet on remote servers. In 2014, Shipra et al. proposed an improved remote user authentication scheme using smart cards with check digits. Shipra et al. claimed that their scheme is secure and efficient against all major cryptographic attacks. Unfortunately, their scheme is vulnerable to some of the cryptographic attacks, particularly “online password guess attack” as discussed in this manuscript. As a part of our contribution, we propose a robust and extra secure authentication scheme for remote users based on smart cards with check digits, with slight increase in the cost. Security is the fundamental compared to complexity, since complexity can be easily manage with improved technology.
Keywords: Authentication; Law; Resists; Servers; Smart cards; Authentication; Check digits; Security; Smart Card; Cryptography (ID#: 15-5092)


Yassin, Mohamad; Rachid, Elias, "A Survey Of Positioning Techniques And Location Based Services In Wireless Networks," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091420
Abstract: Positioning techniques are known in a wide variety of wireless radio access technologies. Traditionally, Global Positioning System (GPS) is the most popular outdoor positioning system. Localization also exists in mobile networks such as Global System for Mobile communications (GSM). Recently, Wireless Local Area Networks (WLAN) become widely deployed, and they are also used for localizing wireless-enabled clients. Many techniques are used to estimate client position in a wireless network. They are based on the characteristics of the received wireless signals: power, time or angle of arrival. In addition, hybrid positioning techniques make use of the collaboration between different wireless radio access technologies existing in the same geographical area. Client positioning allows the introduction of numerous services like real-time tracking, security alerts, informational services and entertainment applications. Such services are known as Location Based Services (LBS), and they are useful in both commerce and security sectors. In this paper, we explain the principles behind positioning techniques used in satellite networks, mobile networks and Wireless Local Area Networks. We also describe hybrid localization methods that exploit the coexistence of several radio access technologies in the same region, and we classify the location based services into several categories. When localization accuracy is improved, position-dependant services become more robust and efficient, and user satisfaction increases.
Keywords: Accuracy; Global Positioning System; IEEE 802.11 Standards; Mobile communication; Mobile computing; Position measurement; Satellites; GPS; GSM; Location Based Services; Positioning techniques; Wi-Fi; hybrid positioning systems (ID#: 15-5093)


Meera, G; Geethakumari, G, "A Provenance Auditing Framework For Cloud Computing Systems," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp.1,5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091427
Abstract: Cloud computing is a service oriented paradigm that aims at sharing resources among a massive number of tenants and users. This sharing facility that it provides coupled with the sheer number of users make cloud environments susceptible to major security risks. Hence, security and auditing of cloud systems is of great relevance. Provenance is a meta-data history of objects which aid in verifiability, accountability and lineage tracking. Incorporating provenance to cloud systems can help in fault detection. This paper proposes a framework which aims at performing secure provenance audit of clouds across applications and multiple guest operating systems. For integrity preservation and verification, we use established cryptographic techniques. We look at it from the cloud service providers' perspective as improving cloud security can result in better trust relations with customers.
Keywords: Cloud computing; Cryptography; Digital forensics; Monitoring; Virtual machining; Auditing; Cloud computing; Provenance (ID#: 15-5094)


Mohan, Arun K; Saranya, M R; Anusudha, K, "Improved Reversible Data Hiding Using Histogram Shifting Method," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091459
Abstract: A reversible data hiding (RDH) algorithm with improved security, which can reacquire the cover in separable manner from the marked stego-image is presented in this paper. In the content owner side cover image is encrypted by deploying user-defined security key derived-chaotic based transposition algorithm. Then the data hider conceals secret data into the encrypted image by perturbing its histogram, by utilizing another user defined data hiding key. At the receiver side, the recuperation of the cover can be implemented directly or indirectly which depends on shared key. Lower bound of Peak Signal to Noise Ratio (PSNR) for direct recuperation method is set to 48.13dB. This technique has improved security & achieved higher data hiding capacity than the existing methods.
Keywords: Data mining; Encryption; Histograms; PSNR; Receivers; Chaotic sequence; Histogram shifting; Image encryption; Key generation; Logistic Map Function; PSNR; Reversible data hiding (ID#: 15-5095)


Kakarla, Jagadeesh; Majhi, Banshidhar; Babu, B Ramesh, "A Trust Based Secured Coordination Mechanism For WSAN," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091460
Abstract: Wireless sensor-actor networks (WSAN) consist of a vast number of sensors and few actors. Generally, these networks are deployed in an unprotected environment to sense the physical world, and perform reliable actions on it. Hence, these networks are always susceptible to various kinds of passive and active attacks by malicious nodes. The back hole and gray hole attacks are part of active attacks. These attacks degrade the network efficiency and performance. In this paper, an efficient trust based secured coordination mechanism is proposed to counter the black hole and gray hole attacks on the delay and energy efficient routing protocol in sensor-actor networks. In the proposed mechanism, each sensor analyzes the trust level of its 1 — hop sensors based on the experience, recommendation, and knowledge. The analyzed trust value is transferred to the actor. The actor analyzes these values to identify the malicious nodes in its cluster region. The proposed trust based secured coordination mechanism (TBSC) is simulated using NS2. The performance is analyzed with respect to packet delivery ratio, average energy dissipation in the network, and average end-to-end delay. The simulation results reveal that TBSC mechanism performs well for the delay and energy efficient routing protocol compared to the existing security mechanisms.
Keywords: Ad hoc networks; Delays; Energy dissipation; Monitoring; Sensors; Wireless communication; Wireless sensor networks; Black hole; Energy; Gray hole; Sensor; Trust (ID#: 15-5096)


Saranya, M R; Mohan, Arun K; Anusudha, K, "Algorithm For Enhanced Image Security Using DNA And Genetic Algorithm," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091462
Abstract: An efficient image encryption algorithm with improved image security has been developed by using chaotic function, deoxyribonucleic acid (DNA) sequencing and genetic algorithm (GA). A chaotic sequence of desired length is generated by using the logistic map function whose initial value is calculated using the secret key. A number of DNA masks are generated and these masks along with the chaotic sequences are used to encrypt the digital image. Finally genetic algorithm is employed to get the best mask for encryption. The proposed method can resist various types of attacks and produce high entropy and very low correlation between pixels.
Keywords: DNA; Decision support systems; Encoding; Encryption; Entropy; Genetic algorithms; Logistics; Deoxyribonucleic acid (DNA); Entropy; Genetic algorithm (GA);Image encryption; Logistic map (ID#: 15-5097)


Sarojkumar, K; Krishna, S, "Comparison Of Numerical Methods For Online Dynamic Security Assessment Using Energy Function," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091485
Abstract: Online dynamic security assessment involves analyzing the effect of a large number of contingencies in a short time. This is a computationally demanding task, and use of energy function method reduces the computational burden. Energy function method involves determination of a quantity called critical energy which requires system simulation for a short duration. In spite of the use of energy function method, there is a significant computational requirement since a large number of contingencies have to be analyzed. In this paper, a comparison of the performance, in terms of accuracy and speed, of different numerical methods in the determination of critical energy, is presented.
Keywords: Accuracy; Computational modeling; Generators; Numerical models; Potential energy; Power transmission lines; Rotors; Online dynamic security assessment; energy function; numerical solution (ID#: 15-5098)


Ramaiah, N.Pattabhi; Ijjina, Earnest Paul; Mohan, C.Krishna, "Illumination Invariant Face Recognition Using Convolutional Neural Networks," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 4, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091490
Abstract: Face is one of the most widely used biometric in security systems. Despite its wide usage, face recognition is not a fully solved problem due to the challenges associated with varying illumination conditions and pose. In this paper, we address the problem of face recognition under non-uniform illumination using deep convolutional neural networks (CNN). The ability of a CNN to learn local patterns from data is used for facial recognition. The symmetry of facial information is exploited to improve the performance of the system by considering the horizontal reflections of the facial images. Experiments conducted on Yale facial image dataset demonstrate the efficacy of the proposed approach.
Keywords: Face; Face recognition; Lighting; Neural networks; Pattern analysis;Training; biometrics; convolutional neural networks; facial recognition; non-uniform illumination (ID#: 15-5099)


Chandrasekaran, Jeyamala; Jayaraman, Thiruvengadam S, "A Fast And Secure Image Encryption Algorithm Using Number Theoretic Transforms And Discrete Logarithms," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091491
Abstract: Many of the Internet applications such as video conferencing, military image databases, personal online photograph albums and cable television require a fast and efficient way of encrypting images for storage and transmission. In this paper, discrete logarithms are used for generation of random keys and Number Theoretic Transform (NTT) is used as a transformation technique prior to encryption. The implementation of NTT is simple as it uses arithmetic for real sequences. Encryption and decryption involves the simple and reversible XOR operation of image pixels with the random keys based on discrete logarithms generated independently at the transmitter and receiver. Experimental results with the standard bench mark test images proposed in the USC-SIPI data base confirm the enhanced key sensitivity and strong resistivity of the algorithm against brute force attack and statistical crypt analysis. The computational complexity of the algorithm in terms of number of operations and number of rounds is very small in comparison with the other image encryption algorithms. The randomness of the keys generated has been tested and is found in accordance with the statistical test suite for security requirements of cryptographic modules as recommended by National Institute of Standards and Technology (NIST).
Keywords: Chaotic communication; Ciphers; Correlation; Encryption; Transforms; Discrete Logarithms; Image Encryption; Number Theoretic Transforms (ID#: 15-5100)


Janani, V.S.; Manikandan, M.S.K., "CRT-KM: Chinese Remainder Theorem Based Key Management Scheme For Securing Ad-Hoc Networks," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091501
Abstract: Providing security for Dynamic Cluster based Mobile Ad-hoc networks (MANET) is a vital task to improve network security with less compromising mobility and with reduced dedicated Data occupancy. Key generation, distribution and authentication are major tasks of a key management system. A flexible and strong model is required to handle key management since dynamic ad-hoc networks are more prone to many kinds of hacking activity. In this paper a new procedure is implemented using Chinese remainder Theorem based Key-management (CRT-KM) and it is compared with one existing ID-Based Multiple Key Management system (IMKM). The performances are compared in terms of parameters like mobility, Overhead message; security and power consumption.
Keywords: Mobile ad hoc networks; Mobile communication; Mobile computing; Public key; Chinese Remainder Theorem; ID based multiple key management system; key management; mobile ad hoc network (ID#: 15-5101)


Jilna, P.; Deepthi, P.P.; Sameer, S.M.; Sathidevi, P.S.; Vijitha, A.P., "FPGA Implementation Of An Elliptic Curve Based Integrated System For Encryption And Authentication," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp.1,6, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091513
Abstract: The resource constrained applications in the present day communication networks demand the use of new cryptographic protocols and hardware with reduced computational and structural complexity. The use of standard, standalone cryptographic primitives are not suitable for such applications. This paper proposes the implementation of a new integrated system for both encryption and authentication based on elliptic curves. An algorithm for pseudo random sequence generation based on cryptographic one way function of elliptic curve point multiplication is developed. This is combined with an elliptic curve based message authentication code to form the integrated system. EC point multiplication operation is preferred as cryptographic one way function for use in this system due to its high security per bit of the key. The hardware is implemented on a Virtex 5 FPGA using Xilinx ISE. In the proposed hardware implementation a single point multiplication unit is time shared between the operations of pseudo random sequence generation and authentication to reduce the overall hardware complexity. A comparison of the resource requirement of the proposed implementation with existing standalone methods is also done.
Keywords: Authentication; Complexity theory; Elliptic curves; Encryption; Hardware; Random sequences; Elliptic Curve Cryptography; MAC; Pseudo random sequence (ID#: 15-5102)


Kodali, Ravi Kishore; Gundabathula, Satya Kesav; Boppana, Lakshmi, "Implementation of Toeplitz Hash based RC-4 in WSN," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091535
Abstract: Certain Wireless sensor network (WSN) applications such as military and e- health care require the inter-node communication to be secure. The tiny WSN nodes have limited computational power, memory and finite energy source. These constraints restrict the implementation of highly secure models on the devices as they demand more memory and involve compute intensive operations. Several protocols have been designed for providing different security levels with varying strengths at the expense of the amount of hardware and computational power of the processor in the WSN node. In wireless equivalent privacy (WEP) model static keys are generated for the XOR operation with the plain text in the encryption process. This work proposes a new security model that provides dynamic keys to the encryption/decryption stages. A model for the proposed scheme has been developed using nesC and the same has been implemented on a IRIS WSN node. The WSN implementation of the proposed security model has been compared with those of WEP, WiFi Protected access (WPA) based on memory usage and execution time.
Keywords: Ciphers; Computational modeling; Encryption; Heuristic algorithms; Random access memory; Wireless sensor networks; IRIS mote; Security; Toeplitz Hash; WEP; WPA; WSN (ID#: 15-5103)


Dickson, Anne; Thomas, Ciza, "Optimizing False Alerts Using Multi-Objective Particle Swarm Optimization Method," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091547
Abstract: Security attacks through Internet have proliferated in recent years. An Intrusion Detection System in the general framework of a network catches the perpetrators before they do real damage to the resources. The performance of Intrusion Detection Systems usually depends on the false alarm rate and the detection rate, since true positive and false positive trade-off is always a major challenge in the choice of systems. In this paper, a multi-objective optimization approach using Particle Swarm Optimization method is used in the context of tradeoffs inherent in the performance evaluators of Intrusion Detection Systems.
Keywords: Classification algorithms; Conferences; Intrusion detection; Optimization; Particle swarm optimization; Search problems; Gbest; Intrusion Detection Systems; Particle Swarm Optimization; Pbest; Swarm Intelligence (ID#: 15-5104)


Tanuja, R; Arudi, Souparnika P; Manjula, S H; Venugopal, K R; Patnaik, L M, "TKP: Three Level Key Pre-Distribution With Mobile Sinks For Wireless Sensor Networks," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091557
Abstract: Wireless Sensor Networks are by its nature prone to various forms of security attacks. Authentication and secure communication have become the need of the day. Due to single point failure of a sink node or base station, mobile sinks are better in many wireless sensor networks applications for efficient data collection or aggregation, localized sensor reprogramming and for revoking compromised sensors. The existing sytems that make use of key predistribution schemes for pairwise key establishment between sensor nodes and mobile sinks, deploying mobile sinks for data collection has drawbacks. Here, an attacker can easily obtain many keys by capturing a few nodes and can gain control of the network by deploying a node preloaded with some compromised keys that will be the replica of compromised mobile sink. We propose an efficient three level key predistribution framework that uses any pairwise key predistribution in different levels. The new framework has two set of key pools one set of keys for the mobile sink nodes to access the sensor network and other set of keys for secure communication among the sensor nodes. It reduces the damage caused by mobile sink replication attack and stationary access node replication attack. To further reduce the communication time it uses a shortest distance to make pair between the nodes for comunication. Through results, we show that our security framework has a higher network resilience to a mobile sink replication attack as compared to the polynomial pool-based scheme with less communication time.
Keywords: Authentication; Base stations; Mobile communication; Mobile computing; Polynomials; Wireless sensor networks; Key predistribution; Security; Wireless Sensor Networks (ID#: 15-5105)


Stuart, Celine Mary; Deepthi, P.P., "Hardware Efficient Scheme For Generating Error Vector To Enhance The Performance Of Secure Channel Code," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1, 5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091564
Abstract: Security, reliability and hardware complexity are the main issues to be addressed in resource constrained devices such as wireless sensor networks (WSNs). Secure channel coding schemes have been developed in literature to reduce the overall processing cost while providing security and reliability. The security of a channel coding scheme against various attacks is mainly decided by the nature of intentional error vectors added to the encoded data. The methods available in literature to generate random error vectors increase the encoding complexity for each message block. Also the error vectors generated are not able to provide much security. A novel method is proposed in this paper to generate intentional error vector with sufficient weight, so that the security of the secure channel code is increased by a large margin without causing any additional encoding complexity. Results show that the proposed model is effective in incorporating security in resource constrained sensor networks.
Keywords: Complexity theory; Cryptography; Hamming weight; Hardware; Polynomials; Quantum cascade lasers; Cryptosystem; MV attack; QCLDPC; RN attack; ST attack (ID#: 15-5106)


Jose, Binesh; Kumar, S D Madhu, "Telecom Grade Cloud Computing: Challenges And Opportunities," Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, pp. 1 ,5, 19-21 Feb. 2015. doi: 10.1109/SPICES.2015.7091565
Abstract: Cloud computing and virtualization are two key technology priorities for telecom service providers. Besides total cost reduction, there are many strategic objectives while adopting cloud technology into the telecom sector. Telecom service providers core assets and strength lies in their communication networks, but these alone are not enough to maintain the industry in the higher level that it once enjoyed. Combining cloud computing technology and networks, telecom service providers can become a significant force in the cloud providers domain and more importantly to return to the growth path. This work evaluates the new challenges and opportunities that are offered by the adoption of cloud and virtualization technologies in telecom sector and its impact on industry value chain and the operational model. Results indicate that even though there are many technical and non-technical challenges still existing, security is still considered as the primary concern that forces cloud into back foot. This study also brings out the fact that, like all other technologies involving in business, cloud technology also brings in many new advantages as well as few disadvantages. Whilst several studies and research works have been done on cloud computing for IT sector, limited research work has been found on cloud computing for telecommunication. Also, majority of the research done in this area is based on industrial research perspective. The significance of our work comes in this context.
Keywords: Cloud computing; Computational modeling; Resource management; Security; Telecommunication services; cloud computing; network function virtualisation; software defined networking; telecom grade cloud (ID#: 15-5107)


Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.