Você está na página 1de 6

RESEARCH PROJECT OF GRADUATE STUENTS

UNDER SUPERVISION OF DR. ABDUL RAZAQUE


ELECTRICAL ENGINEERING AND COMPUTER
SCIENCE DEPARTMENT, UNIVERSITY OF
CLEVELAND, OHIO, USA
No#
1

Name of the Project

Student Member

Project Description

Account and Service Hijacking

Ashok Reddy Vanga


Dinesh Kumar Atukuri
Sai Sharanya
Chalamalashetty

Handling of selfish attack over


Wireless Body Area Network

Performance analysis of TDMA


based Multi-hop Infrastructure
cellular networks

Salman khurshid P
Vishnu priya p
Ravinandan Atluri
Lokesh kumar K
Vemuru Chaitanya lakshmi
Yeluri Bhargav kumar
Supraja sesikala Dwarampudi

Novel two factor authentication


mechanism is proposed to improve
user experience, Quick response, and
trusted platform modules, and near
field
communication.
This
mechanism adds new features in
existing public cryptography.
A novel algorithm is proposed to
detect and eliminate selfish nodes

Elimination of ARP spoofing


attacks using DHCP

Krishna Sandeep Maganti


Sarvazna Kedhar Madduri
Bharath Reddy Nookala

Multi detection framework to


handle the worm Of wormhole
attacks
Stand-out segmentation Access
control for cloud outsourcing
data
Token security for internet of
things

Yogeshchandra sriharsha
shitanshu thota
Pranay Reddy Aeruva
Bhanuvardhan Reddy kaipa
Pranay Reddy Aeruva
Yogeshchandra Sriharsha
Sudha Narendrakumar
Varil Patel
Akshat Hans
Raveedra Kumar
Sai Kiran Jagadabi
Srikar Sheela
Nafi Halder,
Rahil Ahmed,
Siddhartha Yagnik
MANEESH Vellanki
Prateek Reddy

Pebble
Watch
Assessment

Optimized Priority Based


Scheduling for Marking of
Edge router in DiffServ
Node level energy efficiency in
the network of internet of things

10

Security

Analyzing the performance of TDMA


based on Outage probability and node
throughput by using frequency
carriers in Multi-hop infrastructure
network and as well as in single hop
architecture
Security issues at mac layer are
addressed Focusing on man-inmiddle attacks at the address
resolution protocol. Using advanced
DHCP algorithm to handle the issue
Three authentication process is used
to detect the wormhole attacks
New segmentation stand-out access
control paradigm is introduced for
securing cloud outsourcing data
Generating token by Xoring with
OTP and making the token secured to
eliminating guessing attack.
Discussion of all possible ways to
make pebble much safer and secured
Priority
based
scheduling
is
introduced to drop the duplicate
packets and improve the QoS
Novel algorithm is proposed to
improve lifespan and energy

11

Securing IEEE 802.15.4 MAC


header

12

Multi-factor
using Kinect

13

Improvising the performance of


Advanced Encryption
Standard Algorithm

Mokshitha Pathuri
Subhakar
Vandan Pendli

14

Jamming in RFID Wireless


Network

Dharin Patel

15

RFID
Tag
Avoidance Protocol

16

RFID: Resolving Power Loss


for passive Tags

17

Task Scheduling
Computing

18

Smart Bandwidth
buffers

authentication

Collision

in

Cloud

Friendly

Nisargkumar soni
Hemin dalal

Ashok Reddy Vanga


Dinesh Kumar Atukuri
Sai Sharanya
Chalamalashetty

Gargey Dholariya
Prudhvi Teja Ettam
Naveen akula
Lokeshwar reddy

Aythu Harish
Marella Sai Gopala Krishna

Guna Sree Janapati


Nikhileswara Reddy
Vennapusa
Akhilesh Reddy Vangala
Ahmad Haroon
Gullapalli Amulya
Manoj

consumption of nodes in internet of


things network
AES Cipher suites is used to improve
the security of 802.15.4 IEEE MAC
header. This improvement will make
used in ZigBee technology more
secure
Multi-factor authentication using
Kinect is introduced. As, regular login
and password are considered as
primary factor and Kinect as a second
source for the user to login into the
cloud that makes cloud more securely.
The performance of AES is improved
using dual core processor by using
Open MP API to reduce the execution
time.
Novel algorithm is introduced to
detect different types of jamming and
possible resolution in RFID
When numerous tags transmit their
IDs instantaneously, the tag-to-reader
signals collide and this collision
interrupts a reader's identification
procedure. Many algorithms for anticollision are projected for betterment
of the throughput and decrease the
latency for tag identification.
Simplified process for Accelerated
Frame Slotted ALOHA protocol, to
condense a number of retransmission
for one tag, besides reducing the
probability of colliding tags. In this
process collided tags in initial stage
are identified in second stage in a
shorter time this helps to reduce tag
collision as collided tags are
identified quickly.
TDMA-based approach is introduced
for avoiding the collision between
two tags in order to control the power
loss occurs and congestion.
Optimized task scheduling algorithm
is introduced to reduce the bandwidth
consumption and reducing the
execution time.
A new scheme for management of
buffers is introduced by combing the
features of EZ flow, Back off
mechanism and WRED.
Proposed scheme handles the
different types of traffic effectively
and making the faster process

19

Prevention of Data Leakage


by Access Control and
Encryption

20

PEGASIS-LEACH to improve
energy efficiency and Quality of
Service

21

Intelligent
Monitoring
Frequency
Detection

22

Location
Aware
Application

23

Power
Modem

Wireless

Vamsi Bottu
Abhinay Chowdary Potu
Harsha Vardhan Nerella

24

Two factor zero knowledge


proof authentication system

Venkata Sai Dutt Ganduri


Anvesh Nalluri

25

Power Reduction for Smart


Homes in an Internet of Things
Framework

Mohit Sangavikar
Peter Oddo
Sushil Manchikatla

26

Detecting subversion on twitter

Rushika Bollimpallli
Sai Sharanya
Chalamalashetty

27

confidential synchronized antitag cloning for securing the


radio frequency identification
communication

Bhaumil Patel,
Gayathri Ramesh,
Sreekar Karna

28

Simultaneous Priority and


Detection based Carrier Sense
Multiple Access Protocol

Savitesh Jain
Irrinki M N K Sai Santosh

Healthcare
Using
Radio
Identification

Efficient

Mobile

Vedavyas Meruguboina
Sai Ram Aditya Ajjarapu
Eswar Prasad Tipirneni

Mrunal Chauhan
Chaitrali Joshi

Soumya Susan Iype


Bhanuteja Dheekonda
Chandra Sekhara Chinta

Haris Chokkalingam
Dinesh Kumar Atukuri

Introduced homomorphic encryption


and proxy re-encryption to prevent
the data leakage. The model is built
using
Eclipse software and Java platform.
P-LEACH protocol is introduced for
Wireless Sensor network to improve
the energy efficiency and QoS. PLEACH involves the features of both
PEGASIS and LEACH
Novel algorithms are proposed to
ensure accuracy of patient data
records. These algorithm are
implemented using RFID technology
to monitor the electronic healthcare
process
Mathematical model is introduced to
track the user location without
Internet
The replacement of class A power
amplifier with class B power
amplifier is proposed. This increases
the power efficiency and delivers
more output
Two factor zero knowledge proof
authentication
mechanism
is
proposed to provide high end security
and maintain privacy for the users.
This mechanism is setup to provide an
extra layer of service
To implement Smart Meter with help
of an Automatic Measuring Threshold
Value (AMTV) algorithm. This
algorithm is used to reduce power
consumption by turning off devices
which are consuming excess power
then desired value
Main aim of the project is to detect
Spammers on the twitter/any social
networking site and prevent them
from doing malpractices or Malicious
Activities.
Confidential Synchronized Anti-Tag
Cloning (CSATC) is introduced, a
method to secure the tag from being
cloned with the help of back end
server. The proposed method
increases the security of the tag
information from hackers
Priority-based protocol is introduced
to establish an efficient connection
and immediate collision detection,
using an additional antenna and a
unique code message. The protocol is
also supported with the shortest first

algorithm for prioritizing the


transmission.
novel elliptic curve cryptography
(ECC)
Based on smaller key encryption
method is proposed and implemented
in cloud computing to make more
secure data encryption.
Flyback transformer concept is
introduced in micro inverter that to be
connected
to
grid.
Flyback
transformer is designed that improved
apt power regulation.
Dynamic slot allocation algorithm is
introduced to avoid the congestion
when more number of nodes are
waiting for transmitting the message
An
android
application
that
superimposes translated text onto live
camera footage. This application
improves on the performance and
features
of
similar
available
applications
Glaucoma is the disease that destroys
the optic nerve of the eye. As a result,
it causes the vision loss or blindness.
This project aims to explore
intraocular pressure, evaluating the
anterior chamber angle using
gonioscopy, blood vessels detection
in the eye, the eye pressure calculation
and pupil thickness detection.
Furthermore,
performed
face
selection,
eye
selection
and
segmentation processes to obtain the
contour

29

Elliptic Curve Cryptography:


faster and lighter
encryption protocol for cloud
computing environment

Jagdish Thiruvayipati
Sumanth Kondaveeti

30

Grid connected solar micro


inverter

Bala Raghav Mallipeddi


Sanjay Kondrakunta
Madhav Thattugolla

31

Dynamic Allocation of Slot


using MAC protocol

Niraj unk
Ankit Trivedi

32

Computer Vision
Translation

Daniel Lustig
Richard Kolk

33

Automatic detection process of


Glaucoma

Ealuri bharath
Satya siva Varma
Naveen Tanakala

34

Improving the efficiency of


Downloading and Streaming of
Data in Cloud.

Sai Dheeraj
Chaitanya
Narayanarao

Mathematical model is proposed for


refining
the
streaming
and
downloading performance

35

Computation on encrypted data

36

Wi-Fi
controlled
home
Automation with Automation
with Infrared technology

T.S Jithendar Singh


Naini Shashidhar Reddy
Vamsi Gorapalli
Karthik Golipally
Siva Ramanjaneyulu Sanaka

37

Blackbox: distributed peer to


peer file storage and backup

Secure database system is developed


for faster computational process
Wi-Fi controlled home automation
with infrared technology is introduced
to Control remotely available multiple
home devices using the infrared
technology
A productive model for peer to peer
file storage is proposed with
numerous functionalities such as
integrity,
confidentiality
and
reliability.

for

Text

Vengamamba Devi
Mallampati
Preethi Reddy Rasamallu
Kavya Velupula

38

SMS based home


system using RFID

security

Ashok Reddy Vanga


Ramesh Borusu
Lakshmi Venkata Rayudu

39

Multi-Biometric System using


Fuzzy Vault

Chaitanya Kumar Nerella


Prudhvi Sagar Sreeramouju
Harsh Saranu

40

Distance Formula for XML


signature

Mansi T
Minusha K
Sharanya S

41

H-LEACH

42

Incorporation of Weighted
Linear Prediction Technique
and M/M/1 Queuing Theory for
Improving Energy Efficiency of
Cloud Computing Datacenters

43

Camera-driven
Attendance
System

44

Secure Data Sharing in Multi


Clouds

Poojitha Anne
Divya Vegi
Nayani Reddy

45

Analytical Comparison of RSA


and
RSA
with Chinese
Remainder Theorem

Ankur Mantri
Hiral Makwana
Parita Parekh

46

Trans Receiving Multimedia


using Raspberry-Pi

Sundeep goud Malkapuram


Sai Subramanya Vamsi
Chavali

47

Two way Authentications using


QR Codes

Sai Ram Krishna, Gutta


Ram Prasad, Edubilli
Maheshwar Reddy, M

Kiran Gavini
Satwic Mudigulam
Sai Krishna Gondi

RFID
Management

ElhamAkbari,
Francis Cung,
Hardik Patel

Dammannagari Nayani
Reddy
Naresh Reddy Kesireddy

This project provides a security


system for houses. This security
system identifies information about
the authorized and unauthorized
access based on the SMS using RFID
system
fuzzy vault is created to store
all biometric data so that the privacy
of biometric data is highly secured
and guaranted
XML wrapping close method is
introduced to avoid the vulnerability
authentication attack and improve the
efficiency
H-LEACH algorithm is introduced to
improve existing LEACH protocol by
creating energy awareness among
nodes and increase lifetime of low
power nodes
weighted linear prediction technique
and M/M/1 queuing theory is
introduced for improving energy
efficiency of cloud computing
datacenters
Improvising the present attendance
management system, sensing camera
is combined with RFID using novel
algorithm. Based on this approach,
picture is captured from camera and
matched with the picture stored in
RFID tag then the attendance is
marked.
The project aims to provide high
security in multi clouds using a data
sharing scheme.
This helps in improving the security
features in cloud.
Analytically comparing RSA and
RSA using Chinese remainder
theorem to identify situations where it
is best suited and highlighting the
shortcomings of RSA using Chinese
remainder theorem.
Improvised
algorithm
for
compressing multimedia data like
image and transmitting to other end
using rasperry pi
Two factor authentication mechanism
is proposed to improve user's security,
Quick response, Finger print and
Email id & Password combo. This
mechanism adds new features in
existing public cryptography.

48

Optimized
Advanced
Encryption Standard

Kalpa Suresh
Shaik Afroz
Dinish Nayak Banoth

OAES is implemented for faster


response time in e-commerce.

49

Automatic tampering detection


paradigm to support PHR

Vijay Chand Mannava


Nandan A Lahurikar
Pavan Teja Kilari

50

ConSec: An Encryption Policy


for Context Aware Security
Applications
Protecting Control Frames from
DoS Attacks in WLAN

security in personal health record


system is improved and how to give
the owner of personal record highest
access privileges and how to generate
complex key by combining key which
specifies the user access privilege
Latency comparison between full disk
encryption and single file encryption
is proposed using ConSec approach
Protecting Control Frames from DoS
Attacks in WLAN

51

Asadul Haque
Shantanu Kode
Protecting Control Frames
from DoS Attacks in WLAN

Você também pode gostar