100% found this document useful (6 votes)
39 views

Instant download (Ebook) Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) by Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) ISBN 9789811603853, 9811603855 pdf all chapter

The document provides information about the ebook 'Architectural Wireless Networks Solutions and Security Issues,' edited by Santosh Kumar Das and others, which discusses architectural solutions and security challenges in wireless networks. It aims to enhance wireless network applications by addressing issues such as security vulnerabilities and optimizing network performance. The book is organized into 17 chapters covering various aspects of wireless networks, including modeling, optimization, and troubleshooting techniques.

Uploaded by

tierraslimi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
39 views

Instant download (Ebook) Architectural Wireless Networks Solutions and Security Issues (Lecture Notes in Networks and Systems, 196) by Santosh Kumar Das (editor), Sourav Samanta (editor), Nilanjan Dey (editor), Bharat S. Patel (editor), Aboul Ella Hassanien (editor) ISBN 9789811603853, 9811603855 pdf all chapter

The document provides information about the ebook 'Architectural Wireless Networks Solutions and Security Issues,' edited by Santosh Kumar Das and others, which discusses architectural solutions and security challenges in wireless networks. It aims to enhance wireless network applications by addressing issues such as security vulnerabilities and optimizing network performance. The book is organized into 17 chapters covering various aspects of wireless networks, including modeling, optimization, and troubleshooting techniques.

Uploaded by

tierraslimi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

Download the Full Ebook and Access More Features - ebooknice.

com

(Ebook) Architectural Wireless Networks Solutions


and Security Issues (Lecture Notes in Networks and
Systems, 196) by Santosh Kumar Das (editor),
Sourav Samanta (editor), Nilanjan Dey (editor),
Bharat S. Patel (editor), Aboul Ella Hassanien
https://ebooknice.com/product/architectural-wireless-
(editor) ISBN 9789811603853, 9811603855
networks-solutions-and-security-issues-lecture-notes-in-
networks-and-systems-196-36558534

OR CLICK HERE

DOWLOAD EBOOK

Download more ebook instantly today at https://ebooknice.com


Instant digital products (PDF, ePub, MOBI) ready for you
Download now and discover formats that fit your needs...

Start reading on any device today!

(Ebook) Architectural Wireless Networks Solutions and


Security Issues (Lecture Notes in Networks and Systems,
196) by Santosh Kumar Das (editor), Sourav Samanta
(editor), Nilanjan Dey (editor), Bharat S. Patel (editor),
https://ebooknice.com/product/architectural-wireless-networks-
Aboul Ella Hassanien (editor) ISBN 9789811603853,
solutions-and-security-issues-lecture-notes-in-networks-and-
systems-196-36558534
9811603855
ebooknice.com

(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason;


Viles, James ISBN 9781459699816, 9781743365571,
9781925268492, 1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374

ebooknice.com

(Ebook) Vagabond, Vol. 29 (29) by Inoue, Takehiko ISBN


9781421531489, 1421531488

https://ebooknice.com/product/vagabond-vol-29-29-37511002

ebooknice.com

(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena


Alfredsson, Hans Heikne, Sanna Bodemyr ISBN 9789127456600,
9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312

ebooknice.com
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT
II Success) by Peterson's ISBN 9780768906677, 0768906679

https://ebooknice.com/product/sat-ii-success-
math-1c-and-2c-2002-peterson-s-sat-ii-success-1722018

ebooknice.com

(Ebook) Boeing B-29 Superfortress ISBN 9780764302725,


0764302728

https://ebooknice.com/product/boeing-b-29-superfortress-1573658

ebooknice.com

(Ebook) 29, Single and Nigerian by Naijasinglegirl ISBN


9781310004216, 1310004218

https://ebooknice.com/product/29-single-and-nigerian-53599780

ebooknice.com

(Ebook) Jahrbuch für Geschichte: Band 29 ISBN


9783112622223, 3112622227

https://ebooknice.com/product/jahrbuch-fur-geschichte-band-29-50958290

ebooknice.com

(Ebook) Harrow County 29 by Cullen Bunn, Tyler Crook

https://ebooknice.com/product/harrow-county-29-53599548

ebooknice.com
Lecture Notes in Networks and Systems 196

Santosh Kumar Das · Sourav Samanta ·


Nilanjan Dey · Bharat S. Patel ·
Aboul Ella Hassanien Editors

Architectural
Wireless
Networks
Solutions and
Security Issues
Lecture Notes in Networks and Systems

Volume 196

Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland

Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,
School of Electrical and Computer Engineering—FEEC, University of Campinas—
UNICAMP, São Paulo, Brazil
Okyay Kaynak, Department of Electrical and Electronic Engineering,
Bogazici University, Istanbul, Turkey
Derong Liu, Department of Electrical and Computer Engineering, University
of Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academy
of Sciences, Beijing, China
Witold Pedrycz, Department of Electrical and Computer Engineering,
University of Alberta, Alberta, Canada, Systems Research Institute,
Polish Academy of Sciences, Warsaw, Poland
Marios M. Polycarpou, Department of Electrical and Computer Engineering,
KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,
Nicosia, Cyprus
Imre J. Rudas, Óbuda University, Budapest, Hungary
Jun Wang, Department of Computer Science, City University of Hong Kong,
Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latest
developments in Networks and Systems—quickly, informally and with high quality.
Original research reported in proceedings and post-proceedings represents the core
of LNNS.
Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.
The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, Sensor
Networks, Control Systems, Energy Systems, Automotive Systems, Biological
Systems, Vehicular Networking and Connected Vehicles, Aerospace Systems,
Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,
Robotics, Social Systems, Economic Systems and other. Of particular value to both
the contributors and the readership are the short publication timeframe and the
world-wide distribution and exposure which enable both a wide and rapid
dissemination of research output.
The series covers the theory, applications, and perspectives on the state of the art
and future developments relevant to systems and networks, decision making, control,
complex processes and related areas, as embedded in the fields of interdisciplinary
and applied sciences, engineering, computer science, physics, economics, social, and
life sciences, as well as the paradigms and methodologies behind them.
Indexed by SCOPUS, INSPEC, WTI Frankfurt eG, zbMATH, SCImago.
All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/15179


Santosh Kumar Das · Sourav Samanta ·
Nilanjan Dey · Bharat S. Patel ·
Aboul Ella Hassanien
Editors

Architectural Wireless
Networks Solutions
and Security Issues
Editors
Santosh Kumar Das Sourav Samanta
Department of Computer Science Department of Computer Science
and Engineering and Engineering
Sarala Birla University University Institute of Technology
Birla Knowledge City Burdwan University
Ranchi, Jharkhand, India Burdwan, West Bengal, India

Nilanjan Dey Bharat S. Patel


Department of Computer Science Yudiz Solutions Pvt. Ltd.
and Engineering Ahmedabad, Gujarat, India
JIS University
Kolkata, India

Aboul Ella Hassanien


Department of Information Technology
Cairo University
Giza, Egypt

ISSN 2367-3370 ISSN 2367-3389 (electronic)


Lecture Notes in Networks and Systems
ISBN 978-981-16-0385-3 ISBN 978-981-16-0386-0 (eBook)
https://doi.org/10.1007/978-981-16-0386-0

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse
of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface

In the last few decades, the application of wireless network increased rapidly along
with its several variations based on diverse applications of the users and customers.
Its main reason is flexibility and efficiency of the wireless network which is not
available in the wired network. So, it brings a large number of jobs, applications, and
opportunities for the students as well as customers. Although, the wireless network
is an efficient and robustness platform for communication and data transmission, it
has also some challenges and security issues in terms of several applications. Some
of them are mentioned as limited hardware resources, unreliable communication, the
dynamic topology of some wireless networks, vulnerability, unsecure environment,
etc. Hence, it causes several types of attacks, data loss, replication, eavesdropping,
overflow, etc., with respect to the architecture design of the wireless network. These
issues cannot be controlled and managed directly, but it can model and reduce as an
architectural solution. Therefore, to enhance the architecture model of the wireless
network and enhance the security mechanism, some innovative as well as novel ideas
are needed that reflected in this book.

Objective of the Book

This book contains some architectural solutions of wireless network and its
variations. It deals with modeling, analysis, design, and enhancement of different
architectural parts of the wireless network. The main aim of this book is to enhance
the applications of the wireless network by reducing and controlling its
architectural issues. This book is edited for wireless network’s users, academicians,
and researchers.

v
vi Preface

Organization of the Book

The book contains 17 chapters that are organized in four parts as follows. Before
starting the parts, Chap. “Wireless Networks: Applications, Challenges and Security
Issues” describes the overview of wireless network and its variation along with
its several applications, challenges, and security issues. Part One contains four
chapters that outline the modeling of some security issues with their solutions for
enhancing the security part of the wireless network. Part Two contains four chapters
that highlight some optimization models of the wireless network for enhancing the
network lifetime. Part Three contains four chapters that outline the modeling of
the aggregation system to control redundant information. Part Four contains four
chapters that highlight some troubleshooting techniques that help to control and
manage different issues of the network.

Part One: Modelling of Security Enhancements (Chaps.


“An Authentication Model with High Security for Cloud
Database”–“Linear Secret Sharing-Based Key Transfer
Protocol for Group Communication in Wireless Sensor
Communication”)

This part outlines some security issues along with their solutions in the wireless
network and its variations as wireless sensor network and cloud-based network.
Short descriptions of these chapters are as follows.

Chapter “An Authentication Model with High Security


for Cloud Database”

This chapter outlines an authenticate model that handles security and privacy
problems of the cloud-based database. It helps to reduce malicious issues of the
network and provides traceable services to the users. Finally, it helps to find an
appropriate solution for the security issues at both administrator and customer
levels in various directions.
Preface vii

Chapter “Design of Robust Smartcard-Based User


Anonymous Authentication Protocol with AVISPA
Simulation”

In this chapter, the author designed an extended user anonymous authenticated


session key agreement protocol using a smartcard. The scalability of this scheme is
measured in both formal and informal ways. Informal security analysis ensures that
the proposed scheme resists to various kinds of fraudulent attacks. The proposed
scheme does not only hold up security attacks, but also achieves some security
features.

Chapter “Data Security in Cloud Computing Using


Abe-Based Access Control”

This chapter discusses the dynamic access control model with the fusion of risk aware
and hierarchical attribute set-based encryption. The combination of both methods
provides a scalable and flexible services due to sub-domain hierarchy. It is also
proved to be dynamic by permitting the user to access the data by risk evaluation
using risk engine.

Chapter “Linear Secret Sharing-Based Key Transfer


Protocol for Group Communication in Wireless Sensor
Communication”

In this chapter, an intelligent protocol is proposed with the fusion of linear secret
sharing and elliptic curve techniques. The combination of both techniques helps to
overcome the drawback of traditional protocols. The proposed security protocol helps
to reduce the overhead of the network and enhance the several security mechanisms
against different conflicting attacks.
viii Preface

Part Two: Optimization Model for Network Lifetime


(Chaps. “Fuzzy Rule-Based System for Route Selection
in WSN Using Quadratic Programming–“Fuzzy
Q-Learning-Based Controller for Cost- and Energy-Efficient
Load Balancing in Cloud Data Center”)

This part outlines some optimization models for enhancing the network lifetime of the
wireless network or some variation of the wireless network by reducing uncertainty
information and managing conflicting parameters of the networks. Short descriptions
of these chapters are as follows.

Chapter “Fuzzy Rule-Based System for Route Selection


in WSN Using Quadratic Programming”

In this chapter, a combination of intelligent technique as well as mathematical


modeling is used where fuzzy logic as an intelligent technique and quadratic
programming as mathematical modeling are used for solving the proposed goal.
The combination of both provides a robustness technique that uses two basic
parameters energy and distance for selecting the optimal route of the network.

Chapter “Wireless Sensor Network Routing Protocols Using


Machine Learning”

This chapter consists of some machine learning algorithms to optimize the route of
the wireless sensor network. This optimization helps the sensor nodes to learn the
experience data to make appropriate routing decisions and respond to the changing
environment using some learning techniques such as distributed regression, self-
organizing map, and reinforcement learning.

Chapter “Distributed Traversal Based Fault Diagnosis


for Wireless Sensor Network”

In this chapter, the author proposed a traversal-based diagnosis algorithm that seeks
to diagnose both permanent as well as an intermittent fault in a sensor network. The
proposed algorithm employs a special node called an anchor node to traverse the
field. So, it is decided by a proposed traversal algorithm taking into consideration the
length and breadth of the sensor field and the transmission range of the nodes. The
Preface ix

anchor node stops at defined positions in the deployment field where it executes the
fault diagnosis algorithm taking into consideration the normal sensor nodes which
are in its range.

Chapter “Fuzzy Q-Learning-Based Controller for Cost


and Energy Efficient Load Balancing in Cloud Data Center”

In this chapter, the author proposed a fuzzy Q-learning-based self-learning controller


to optimize the load for a specific data center. The proposed method also helps to
reduce uncertainty and solve the congestion issue efficiently through fuzzy linguistic
behavior and membership function. In this proposal, the fuzzy output parameter is
considered as reward value which is used to learn and update the state for each data
center.

Part Three: Modelling of Aggregation Systems (Chaps.


“Localization Techniques Using Machine Learning
Algorithms”–“Analysis of Network Parameters for Network
Lifetime in WSN: A Fuzzy Quadratic Programming
Approach”)

This part outlines some aggregation techniques that help to model several issues
of the network and reduce redundancy of the wireless network efficiently. Short
descriptions of these chapters are as follows.

Chapter “Localization Techniques Using Machine Learning


Algorithms”

In this chapter, the author illustrates how the localization issue in wireless sensor
networks can be solved using the three categorized machine learning algorithms
such as supervised learning, unsupervised learning, and reinforcement learning
algorithms. It also highlights that which machine learning algorithms conjointly
evokes several sensible solutions for localization of nodes that maximize resource
utilization and prolong the lifetime of the network.
x Preface

Chapter “Vehicular Delay Tolerant Network-Based


Communication Using Machine Learning Classifiers”

In this chapter, the authors highlight vehicular delay-tolerant network-based


communication using machine learning classifiers. First the authors analyzed
which machine learning classifier is the best solution for our problem. In this work,
the authors used machine learning classifiers for filtering efficient vehicular nodes,
so that packets can be delivered from source to destination.

Chapter “Applications of Big Data and Internet of Things


in Power System”

This chapter highlights the use of big data and IoT for the power systems. IoT can
be used in various areas of power system such as metering, transformer monitoring,
prediction of demand, and planning for future consumption. The main objective of
this chapter is to make a clear understanding of the use of big data and IoT in the
power system and how it will improve customer service and social welfare.

Chapter “Analysis of Network Parameters for Network


Lifetime in WSN: A Fuzzy Quadratic Programming
Approach”

In this paper, a fuzzy quadratic programming is used to optimize network parameters


efficiently. It is the fusion of fuzzy logic and quadratic programming. Fuzzy logic
is a multi-values logic which is used to reduce uncertainty and estimate imprecise
parameters efficiently. Quadratic programming is a nonlinear programming based
on second order of mathematical polynomial for reducing the main objective. The
combination of both helps to analyze conflicting network parameters and decide the
optimal objective value along with constraints.
Preface xi

Part Four: Analyzing of Troubleshooting Techniques (Chaps.


“IDS Detection Based on Optimization Based on WI-CS
and GNN Algorithm in SCADA Network”–“Investigation
of Memory, Nonlinearity and Chaos in Worldwide Monthly
Mobile Data Traffic in Smartphones”)

This part outlines different troubles in the wireless network in terms of intrusion,
attack, and chaos and also provide their modeling methods. Short descriptions of
these chapters are as follows.

Chapter “IDS Detection Based on Optimization Based


on WI-CS and GNN Algorithm in SCADA Network”

In this chapter, it is identify and categorize the anomalies in a SCADA system through
data optimization. At the initial stage, the collected real-time SCADA dataset is given
as input. Then by using the aforementioned proposed machine learning algorithms,
these data are clustered and optimized. Later to find the type of intrusion will remain
as a further challenge, and for that, the authors proposed HNA-AA algorithm.

Chapter “Performance Analysis of MANET Under Grayhole


Attack Using AODV Protocol”

In this chapter, the author analyzed the performance of the mobile ad-hoc network
under grayhole attack as per AODV routing protocol using NS-2 simulation
environment. Several attacks make the network pretty much risky to rely upon
when scaling up on a large scale. Under the mobile ad-hoc network, all the
transmissions between the mobile nodes occur wirelessly.

Chapter “Technique to Reduce PAPR Problem


in Next-Generation Wireless Communication System”

In this chapter, a technique is design for reducing PAPR in next-generation wireless


communication system. The main effect of strong PAPR is instability in the
analog-to-digital converter and digital-to-analog converter, decreased its
performance and raised costs. A PAPR reduction technique such as clipping and
filtering greatly improves the efficiency compared to the initial GFDM signal
PAPR.
xii Preface

Chapter “Investigation of Memory, Nonlinearity and Chaos


in Worldwide Monthly Mobile Data Traffic in Smartphones”

In this chapter, the proposed chapter employs certain statistical signal processing
techniques to realize the memory, self-similarity, self-organized criticality,
nonlinearity, and chaos in the present time series of worldwide monthly mobile
data traffic per smartphone. This study possibly indicates a persistent, self-similar,
deterministic, nonlinear, and non-chaotic profile with no “soc” for the present time
series.

Santosh Kumar Das


Department of Computer Science
and Engineering
Sarala Birla University
Birla Knowledge City
Ranchi, Jharkhand, India
Sourav Samanta
Department of Computer Science
and Engineering
University Institute of Technology
Burdwan University
Burdwan, West Bengal, India
Nilanjan Dey
Department of Computer Science
and Engineering
JIS University
Kolkata, India
Bharat S. Patel
Director and COO at Yudiz Solutions Pvt. Ltd.
India
Ahmedabad, India
Aboul Ella Hassanien
Founder and Head of the Egyptian Scientific
Research Group (SRGE)
Professor of Information Technology at
the Faculty of Computer and Artificial
Intelligence
Cairo University
Giza, Egypt
List of Reviewers

Abhishek Kumar, Swami Vivekananda Subharti University, Meerut


Amit Kumar Singh, Indian Institute of Technology (ISM), Dhanbad
Amitesh Kumar Pandit, Dr. Rammanohar Lohia Avadh University, Ayodhya, Uttar
Pradesh
Arun Prasad Burnwal, GGSESTC, Bokaro, Jharkhand
Ashish Kumar Dass, National Institute of Science and Technology, Brahmapur,
Odisha
Chandan Kumar Shiva, S. R. Engineering College, Ananthsagar, Hasanparthy,
Warangal, Telangana
Harsh Nath Jha, Asansol Engineering College, Asansol, West Bengal
Jayraj Singh, Indian Institute of Technology (ISM), Dhanbad
Jeevan Kumar, R. V. S. College of Engineering and Technology, Jamshedpur
Kanhu Charan Gouda, Indian Institute of Technology, Roorkee
Mahendra Prasad, Indian Institute of Technology (ISM), Dhanbad
Manoj Kumar Mandal, Jharkhand Rai University, Ranchi
Mukul Majhi, Indian Institute of Technology (ISM), Dhanbad
Nabajyoti Mazumdar, Central Institute of Technology, Kokrajhar, Assam
Priyanka Jaiswal, Indian Institute of Technology (ISM), Dhanbad
Rakesh Ranjan Swain, National Institute of Science and Technology, Brahmapur,
Odisha
Ruchika Padhi, National Institute of Science and Technology, Brahmapur, Odisha
Sagar Samal, National Institute of Science and Technology, Brahmapur, Odisha
Shalini Mahato, B.I.T, Mesra, Ranchi, Jharkhand
Siba Prasada Tripathy, National Institute of Science and Technology, Brahmapur,
Odisha
Smita Rani Sahu, BPUT, Odisha
Sourav Samanta, University Institute of Technology, BU, Burdwan, West Bengal
Subhra Priyadarshini Biswal, National Institute of Science and Technology,
Brahmapur, Odisha
Sunil Gautam, Institute of Advanced Research, Gandhinagar
Vishal Maheswari, RIT, Roorkee, Uttarakhand

xiii
Contents

Wireless Networks: Applications, Challenges, and Security Issues . . . . . . 1


Santosh Kumar Das, Vishal Maheswari, and Aditya Sharma

Modelling of Security Enhancements


An Authentication Model with High Security for Cloud Database . . . . . . 13
Krishna Keerthi Chennam, Rajanikanth Aluvalu, and S. Shitharth
Design of Robust Smartcard-Based User Anonymous
Authentication Protocol with AVISPA Simulation . . . . . . . . . . . . . . . . . . . . . 27
Rifaqat Ali and Preeti Chandrakar
Data Security in Cloud Computing Using Abe-Based Access
Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Rajanikanth Aluvalu, V. Uma Maheswari, Krishna Keerthi Chennam,
and S. Shitharth
Linear Secret Sharing-Based Key Transfer Protocol for Group
Communication in Wireless Sensor Communication . . . . . . . . . . . . . . . . . . 63
Priyanka Jaiswal and Sachin Tripathi

Optimization Model for Network Lifetime


Fuzzy Rule-Based System for Route Selection in WSN Using
Quadratic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Manoj Kumar Mandal, Arun Prasad Burnwal, B. K. Mahatha,
Abhishek Kumar, Santosh Kumar Das, and Joydev Ghosh
Wireless Sensor Network Routing Protocols Using Machine
Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Chaya Shivalingagowda, Hifzan Ahmad, P. V. Y. Jayasree,
and Dinesh Kumar Sah

xv
xvi Contents

Distributed Traversal Based Fault Diagnosis for Wireless Sensor


Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Deepak Kumar, Rakesh Ranjan Swain, Biswa Ranjan Senapati,
and Pabitra Mohan Khilar
Fuzzy Q-Learning Based Controller for Cost and Energy Efficient
Load Balancing in Cloud Data Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Subhra Priyadarshini Biswal, Satya Prakash Sahoo,
and Manas Ranjan Kabat

Modelling of Aggregation Systems


Localization Techniques Using Machine Learning Algorithms . . . . . . . . . 175
Chandrika Dadhirao and RaviSankar Sangam
Vehicular Delay Tolerant Network Based Communication Using
Machine Learning Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Amit Kumar Singh and Rajendra Pamula
Applications of Big Data and Internet of Things in Power System . . . . . . 209
Ramesh Chandra Goswami, Hiren Joshi, Sunil Gautam, and Hari Om
Analysis of Network Parameters for Network Lifetime in WSN:
A Fuzzy Quadratic Programming Approach . . . . . . . . . . . . . . . . . . . . . . . . . 227
Manoj Kumar Mandal, Arun Prasad Burnwal, Abhishek Kumar,
Divya Mishra, and Nikhil Saxena

Analysing of Troubleshooting Techniques


IDS Detection Based on Optimization Based on WI-CS and GNN
Algorithm in SCADA Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
S. Shitharth, N. Satheesh, B. Praveen Kumar, and K. Sangeetha
Performance Analysis of MANET Under Grayhole Attack Using
AODV Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Samiran Gupta and Harsh Nath Jha
Technique to Reduce PAPR Problem in Next-Generation Wireless
Communication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Abhishek Kumar, Vishwas Mishra, Shobhit Tyagi, Priyanka Saini,
and Nikhil Saxena
Investigation of Memory, Nonlinearity and Chaos in Worldwide
Monthly Mobile Data Traffic in Smartphones . . . . . . . . . . . . . . . . . . . . . . . . 301
Swetadri Samadder and Koushik Ghosh
Editors and Contributors

About the Editors

Santosh Kumar Das received his Ph.D. degree in


Computer Science and Engineering from Indian
Institute of Technology (ISM), Dhanbad, India, in
2018 and completed his M.Tech. degree in Computer
Science and Engineering from Maulana Abul Kalam
Azad University of Technology (erstwhile WBUT),
West Bengal, India, in 2013. He has about to three years
teaching experience as Assistant Professor at School of
Computer Science and Engineering, National Institute
of Science and Technology (Autonomous), Institute
Park, Pallur Hills, Berhampur, Odisha, India. He is
currently working as Assistant Professor at Department
of Computer Science and Engineering, Sarala Birla
University, Birla Knowledge City, P.O.-Mahilong,
Purulia Road, Ranchi, India. He has more than eight
years teaching experience. He has authored/edited of
five books with Springer in series as Lecture Notes
in Networks and Systems, Tracts in Nature-Inspired
Computing and Studies in Computational Intelligence.
He has contributed more than 30 research papers. His
research interests mainly focus on Ad-hoc & Sensor
Network, Artificial Intelligence, Soft Computing, and
Mathematical modelling. His h-index is 15 with more
than 600 citations.

xvii
xviii Editors and Contributors

Sourav Samanta is currently working as Assistant


Professor in the Department of Computer Science
and Engineering at University Institute of Technology,
The University of Burdwan, West Bengal, India.
He has completed M.Tech. in Computer Science
and Engineering from JIS College of Engineering,
WBUT. He was Honorary Visiting Scientist at Global
Biomedical Technologies Inc., CA, USA (2014–
2015). He has published about 45 research papers in
various reputed international journals and conference
proceedings including five book chapters in books
published by Elsevier and Springer, respectively.
He is Co-editor of the book Design Frameworks
for Wireless Networks published by Springer in
Lecture Notes in Networks and Systems Series.
He is a regular reviewer of IEEE Access, IEEE
Sensor Journals and other various international
journals. He serves as a Program/Technical Committee
member for AISI2015, ICMCTI-2017, A2ICS-2017
and PerCAA-2019 International Conferences. He is a
member of Computer Society of India, Institution of
Engineers (India), Soft Computing Research Society
and International Association of Engineers. His research
area includes bio-inspired computing, quantum machine
learning and information security. He has an interest in
interdisciplinary research.

Nilanjan Dey is an Associate Professor, Department


of Computer Science and Engineering, JIS University,
Kolkata, India. He is a visiting fellow of the University
of Reading, UK. He was an honorary Visiting Scientist
at Global Biomedical Technologies Inc., CA, USA
(2012–2015). He was awarded his Ph.D. from Jadavpur
Univeristy in 2015. He has authored/edited more
than 70 books with Elsevier, Wiley, CRC Press and
Springer, and published more than 300 papers. He is
the Editor-in-Chief of International Journal of Ambient
Computing and Intelligence, IGI Global, Associated
Editor of IEEE Access and International Journal of
Information Technology, Springer. He is the Series Co-
editor of Springer Tracts in Nature-Inspired Computing,
Springer, Series Co-editor of Advances in Ubiquitous
Sensing Applications for Healthcare, Elsevier, Series
Editor of Computational Intelligence in Engineering
Problem Solving and Intelligent Signal processing
Editors and Contributors xix

and data analysis, CRC. His main research interests


include Medical Imaging, Machine learning, Computer
Aided Diagnosis, Data Mining etc. He is the Indian
Ambassador of International Federation for Information
Processing—Young ICT Group and Senior member of
IEEE.

Bharat S. Patel is Fellow at IEI, IETE and CSI.


He is a member of CSI, International Red Cross,
Association of British Scholars (a Division of British
Council), British Business Group, GCCI, GESIA IT
Association, and a founder member with Gujarat
Innovation Society (GIS), ASSOCHAM and many
more. He was Past Chairman of CSI, Ahmedabad,
and Past Chairman of Gujarat State Centre of IEI.
Currently, he is President with ABS (division of
British Council), Chairman, Startups Mission, and
Chairman, Startup and Innovation, ASSOCHAM for
Western council, Chairman, Academia and Research
Publications committee, GESIA, Vice Chairman,
Gujarat Innovation Society, and a council member
and Chairman, CPDB, at The Institution of Engineers
(India). He is Director and COO at Yudiz Solutions Pvt.
Ltd. India.

Aboul Ella Hassanein is Founder and Head of the


Egyptian Scientific Research Group (SRGE) and
Professor of Information Technology at the Faculty of
Computer and Artificial Intelligence, Cairo University.
Professor Hassanien has more than 1000 scientific
research papers published in prestigious international
journals and over 50 books covering such diverse topics
as data mining, medical images, intelligent systems,
social networks and smart environment. Prof. Hassanien
won several awards including the Best Researcher of
the Youth Award of Astronomy and Geophysics of
the National Research Institute, Academy of Scientific
Research (Egypt, 1990). He was also granted a scientific
excellence award in humanities from the University of
Kuwait for the 2004 Award and received the superiority
of scientific in technology—University Award (Cairo
University, 2013). Also he honored in Egypt as the best
researcher in Cairo University in 2013. He was also
received the Islamic Educational, Scientific and Cultural
Organization (ISESCO) prize on Technology (2014) and
xx Editors and Contributors

received the state Award of excellence in engineering


sciences 2015. He holds the Medal of Sciences and Arts
from the first class from President of Egypt in 2017.

Contributors

Hifzan Ahmad Dr. A. P. J. Abdul Kalam Technical University (AKTU), Lucknow,


India
Rifaqat Ali Department of Mathematics and Scientific Computing, National
Institute of Technology, Hamirpur, Hamirpur, Himachal Pradesh, India
Rajanikanth Aluvalu Department of CSE, Vardhaman College of Engineering,
Hyderabad, India
Subhra Priyadarshini Biswal School of Computer Science and Engineering,
National Institute of Science and Technology (Autonomous), Berhampur, Odisha,
India
Arun Prasad Burnwal Department of Mathematics, GGSESTC, Bokaro,
Jharkhand, India
Preeti Chandrakar Department of Computer Science and Engineering, National
Institute of Technology, Raipur, Raipur, India
Krishna Keerthi Chennam CSE Department, Muffakham Jah College of
Engineering and Technology, Telangana State, Hyderabad, India
Chandrika Dadhirao SCOPE, VIT-AP University, Vellore Institute of Technology
-AP University, Amaravathi, India
Santosh Kumar Das Department of Computer Science and Engineering, Sarala
Birla University, Birla Knowledge City, Ranchi, Jharkhand, India
Sunil Gautam Department of Engineering and Physical Science, Institute of
Advanced Research, Gandhinagar, India
Joydev Ghosh School of Computer Science and Robotics, National Research
Tomsk Polytechnic University (TPU), Tomsk, Russia
Koushik Ghosh Department of Mathematics, University Institute of Technology,
The University of Burdwan, Burdwan, West Bengal, India
Ramesh Chandra Goswami Department of Engineering and Physical Science,
Institute of Advanced Research, Gandhinagar, India
Samiran Gupta Department of Computer Science and Engineering, Asansol
Engineering College, Asansol, West Bengal, India
Editors and Contributors xxi

Priyanka Jaiswal Department of Computer Science and Engineering, IIT (ISM),


Dhanbad, Jharkhand, India
P. V. Y. Jayasree GITAM University, Vizag, India
Harsh Nath Jha Department of Information Technology, Asansol Engineering
College, Asansol, West Bengal, India
Hiren Joshi Department of Computer Science, Gujarat University, Ahmedabad,
India
Manas Ranjan Kabat Department of Computer Science and Engineering, Veer
Surendra Sai University of Technology, Burla, Sambalpur, India
Pabitra Mohan Khilar National Institute of Technology Rourkela, Rourkela, India
Abhishek Kumar Department of Electronics and Communication Engineering,
Swami Vivekananda Subharti University, Meerut, India
B. Praveen Kumar Department of EEE, Bharat Institute of Engineering and
Technology, Hyderabad, India
Deepak Kumar National Institute of Technology Rourkela, Rourkela, India
B. K. Mahatha Amity School of Engineering and Technology, Amity University
Jharkhand, Ranchi, India
Vishal Maheswari Department of Computer Science, RIT, Roorkee, Uttarakhand,
India
Manoj Kumar Mandal Department of Mathematics, Jharkhand Rai University,
Ranchi, India
Divya Mishra Department of Computer Science Engineering, Swami Vivekananda
Subharti University, Meerut, India
Vishwas Mishra Swami Vivekananda Subharti University, Meerut, India
Hari Om Department of Computer Science and Engineering, Indian Institute of
Technology (ISM), Dhanbad, India
Rajendra Pamula IIT (ISM) Dhanbad, Jharkhand, India
Dinesh Kumar Sah Indian Institute of Technology (ISM), Dhanbad, India
Satya Prakash Sahoo Department of Computer Science and Engineering, Veer
Surendra Sai University of Technology, Burla, Sambalpur, India
Priyanka Saini Swami Vivekananda Subharti University, Meerut, India
Swetadri Samadder Department of Mathematics, Fakir Chand College, Diamond
Harbour, India
RaviSankar Sangam SCOPE, VIT-AP University, Vellore Institute of Technology
-AP University, Amaravathi, India
xxii Editors and Contributors

K. Sangeetha Department of CSE, Sri Satya Sai University of Technology and


Medical Sciences, Sehore, Madhya Pradesh, India
N. Satheesh Department of CSE, St. Martin’s Engineering College, Hyderabad,
India
Nikhil Saxena University of Cincinnati, Cincinnati, OH, USA
Biswa Ranjan Senapati National Institute of Technology Rourkela, Rourkela,
India
Aditya Sharma Institute of Nanoengineering and Microsystems, National Tsing
Hua University, Hsinchu, Taiwan R.O.C.
S. Shitharth CSE Department, Vardhaman College of Engineering, Telangana
State, Hyderabad, India
Chaya Shivalingagowda Kalsekar Engineering College, New Panvel Mumbai and
GITAM University, Vizag, India
Amit Kumar Singh IIT (ISM) Dhanbad, Jharkhand, India
Rakesh Ranjan Swain Department of CSE, ITER, Siksha O Anusandhan (Deemed
to be University), Bhubaneswar, India
Sachin Tripathi Department of Computer Science and Engineering, IIT (ISM),
Dhanbad, Jharkhand, India
Shobhit Tyagi Swami Vivekananda Subharti University, Meerut, India
V. Uma Maheswari Department of CSE, Vardhaman College of Engineering,
Hyderabad, India
Wireless Networks: Applications,
Challenges, and Security Issues

Santosh Kumar Das, Vishal Maheswari, and Aditya Sharma

Abstract Nowadays, wireless technology is an essential part of communication.


Most of the organizations benefitted by adopting wireless technology solutions may
lead to higher productivity. Today, globally, several customers are using this tech-
nology for resolving various business issues and create advantages over competitors.
This technology helps to achieve high customer satisfaction with lesser complexity.
It also assists various types of exciting applications such as sensor networks, Blue-
tooth, mobile communication systems, and Internet of Things (IoT). Wireless tech-
nology makes the use of radio waves to transfer data without cables or wiring. In
this proposed paper, several applications of wireless networks and its variations are
illustrated along with their challenges and security issues. It provides a guideline
about upcoming inventions in the area of wireless technology.

Keywords Wireless ad-hoc network · Wireless sensor network · Security issues ·


Challenges · Internet of Things · Attacks

1 Introduction

In the last few decades, the applications of wireless networks and their variations have
increased rapidly due to the widespread use in the developing wireless techniques
[1–3]. Wireless in its simple form can be expressed as the automation process in
which transfer of data and information takes place without using any wired media.
One might be thinking how can data be transferred without using wires and if so, then

S. K. Das (B)
Department of Computer Science and Engineering, Sarala Birla University, P.O.-Mahilong
Purulia Road, Birla Knowledge City, Ranchi, Jharkhand, India
V. Maheswari
Department of Computer Science, RIT, Roorkee, Uttarakhand 247667, India
A. Sharma
Institute of Nanoengineering and Microsystems, National Tsing Hua University, No. 101, Sec. 2,
Guang Fu Road, Hsinchu 30013, Taiwan R.O.C.

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 1
S. K. Das et al. (eds.), Architectural Wireless Networks Solutions
and Security Issues, Lecture Notes in Networks and Systems 196,
https://doi.org/10.1007/978-981-16-0386-0_1
2 S. K. Das et al.

what is the medium? Air is the only medium for the transfer of data through wireless
mode which in return uses electromagnetic waves for the transmission of signal from
the transmitter to the receiver [4]. One might be able to understand that for short-
ranged communications, one can use the wireless technology very smoothly but
what about the long-range communication? Therein comes the concept of receiving
and transmitting data through the waves, i.e., radio waves, which in it provide some
energy for the transmission to occur over longer distances. Herein, it is cleared out
the use of wireless technology which is applicable and widely used for both short
as well as long-distance communication. Figure 1 shows types of wireless network.
Wireless network are categorized as three major types which are: Wireless ad-hoc
network (WANET) [5, 6], wireless sensor network (WSN) [7, 8], and other wireless
network. WANET is a collection of dynamic nodes that are deployed at a particular
location for any operation. It has several variations or types such as mobile ad-hoc
network (MANET) [9], vehicular ad-hoc network (VANET) [10, 11], and hybrid ad-
hoc network (HANET) [12]. MANET is a collection of mobile nodes that are simply
movable based on the requirement of the users or customers. VANET is a collection
of different vehicles that are connected dynamically to provide the services to the
driver as well as the passenger for an automated system. HANET is a combination of
static as well as dynamic nodes. The combination of both helps the user in both static
and dynamic purpose of the services. WSN is a collection of wireless sensor nodes.
The purpose of these sensor nodes is to sense environmental information and send
it to the base station (BS). BS analyzes this information for future processing and
forwards it to the sink node. WSN is also used in HANET with the fusion of VANET
and smart ad-hoc network to make use the services of Internet of Things (IoT) [13].
In HANET, several physical objects are connected with digital technology to make
an efficient and appropriate communication services in HANET.
IoT is nothing more than a collection of wide range of software, systems, and
users via the Internet technology; having a built-in ability of transferring data over
a network without having a human interaction [14, 15]. Talking about first genera-
tion of IoT, SCADA [16] is an acronym for “supervisory control and data acquisi-
tion”. SCADA provides a bundle full of different types of software-based application
program to perform a particular task which can be accessed from remote location.
It includes both hardware as well as software components. The use of hardware

Fig. 1 Types of wireless network


Wireless Networks: Applications, Challenges, and Security Issues 3

component is to gather the data and then feed it into the computer, wherein the
next step is carried out by respective software according to the situation. A SCADA
system is used to gather information, like from where the smoke is coming from a
building, then it transfers the information gathered back to the central site, warning
the home station that the smoke has occurred, carrying out the necessary analysis and
further controlling the scenario, gathering some more information for determining
whether the smoke is caused by fire, and displaying the gathered information in a
proper logical and organized manner. Other areas where SCADA system can be used
include municipal water supply, in a small building and many more. The next section
is illustrated with developmental strategy of IoT and other variations of the wireless
network.
The roadmap of the paper as follows. Unit 2 describes some applications of
wireless network and its variations. Unit 3 illustrates some constraints of ad-hoc
and sensor network. Unit 4 describes some security and major design issues. And
Unit 5 concludes the paper.

2 Applications of Wireless Network and Its Variations

IoT is one of the novel variations of the wireless network. First of all, an ecosystem of
IoT is developed. This ecosystem is different from the typical ecosystem containing
some planets and stars. This ecosystem contains in it a huge number of hardware
and software devices that are connected to a Web-enabled network source which
encapsulates a number of embedded processors, sensors, hardware, and software
based on the task they are going to be helping with. The gathered data is shared by
the IoT devices by bridging of the data to the gateway of IoT or sending the data
to the cloud based systems where it can be easily analyzed and the output can be
made to be accessed and performed as required. All the objects which are having an
in-built sensor are connected to an IoT based platform, which gathers the data from
various hardware devices and share the unmatched information with the software to
meet the required data analytics.
The ecosystem of IoT platform can itself decide which information is to be taken
into consideration and which can be safely ignored without any loss or manipulation
of data. The information collected is based on a preprogrammed software which
include some patterns and recommendations used to find out some possible prob-
lems or issues before they take place. For an example, a person is the owner of a
supermarket store, and he/she must be aware of the products which are most popular.
Sensors can be placed in the supermarket to detect the most popular areas, and where
customers wait around or stay for a longer span of time [17–19]. The faster selling
products can be identified by checking the daily sales data, in case the most selling
product must not go out with not on stock board; automatically align sales data with
supply, so that popular items don’t go out of stock.
The information gathered by the smart connected devices can guide one in making
smart decisions on the products to have a higher stock, which would be completely
4 S. K. Das et al.

based on the people’s shopping bucket list and would help in saving the man-power
required to take up the stock and check out over people’s activity. It is obvious that the
data gathered by the devices will bring more efficiency and accuracy as compared
to the traditional means; and likewise, more efficiency leads to doing work in a
smarter and more controlled manner and resulting in work. By the help of smart
objects and systems, one can automate certain tasks, particularly when those tasks are
bulky, repetitive, mundane, time-taking, or dangerous. Let us have a look over some
examples to make the scenario clearer and more accurate. In one’s daily monotonous
life routine, everyone has to work for having a meal and having a pending or delayed
work can make one lose one’s job. In this competitive era where technology is faster
than human, many times one faces a scenario where a person woke up on time, but
it’s raining outside or his/her car engine is not working, someone has flattened his/her
car tier, he/she had to get off in traffic and many others. In all such cases, there is a
fixed prepared reason to be used by human for his/her delay. Here comes the role of
IoT where the delay can be easily postponed and one need not have to blame one’s
luck over it. Let us summarize some of the benefits of IoT taking the above scenario
into consideration.
(a) Save time and money
(b) Ease of service
(c) Enhance working experience
(d) Increase productivity
(e) Low investment high returns
(f) Taking smart business decisions
(g) Easy to monitor the business.
IoT helps companies and individuals to take smart decisions, adopt smart technolo-
gies, and allow them to work more productively and efficiently. The major concern
of developer is how they are going to secure the use of such an enormous amount
of data, where all the devices are connected to Internet. For the use of IoT based
devices, the only thing which needs to be taken into consideration is the security and
privacy issues. The IoT based devices needs to be always connected to a network,
the hacker has to simply gain an access to any single device and manipulate all
the data, and for a solution to it, you can provide security patch on a regular time
interval. But how many manufacturers are there who will update it to the latest fire-
wall? Apart from, WANET, MANET, VANET, HANET, and WSN, several wireless
networks are used based on customer requirements such as cellular network, mesh
network, delay tolerant network, and software defined network. The stated varia-
tions of the wireless network have become a major and important part of our life and
real-life applications. The combination of all variations gives a lot of efficient and
reliable benefits to the users and customer in terms of mobility and remote areas. It
is low cost, low time consuming, more efficient, and intelligent compared to wired
network. It is also simple for use and license free and also deployable. Wireless
network is a location-depended service that is a replacement of wired network and
helps to the users and customers in emergency situation, business, offices, traveling
salesman, etc. with combinations of some devices such as Wi-Fi, GPS, and cordless
Wireless Networks: Applications, Challenges, and Security Issues 5

Fig. 2 Applications areas of wireless network

telephones. There are several applications of wireless networks and its variations
which is shown in Fig. 2. Some of them are artificial intelligence, enforcement and
control systems, environmental monitoring, intelligent transport systems, IoT, mili-
tary applications, person locator services, smart environment, telecommunications
system, traffic avoidance, virtual reality visual surveillance sensor networks, etc.

3 Constraints of Ad-Hoc and Sensor Networks

The fusion of WANET and WSN is known as ad-hoc sensor network. Although,
both have some similar features, they also both have some differences like a number
of nodes in WSN are more as compared to WANET. The nodes in WSN, known
as sensor nodes, are more prone to failure and energy drain. Although there are
several applications and usage in terms of wireless network-based infrastructure and
infrastructure-less, static, and dynamic topologies, combination of both have some
limitations that differ from classic network such as limited energy supply, limited
computing power, limited bandwidth of the wireless links connecting data, routing
challenges, data aggregation, coverage and scalability, and data reporting methods
and protocols. Summarized limitations are described as follows.
(a) Limited hardware resources: Due to several issues of WSN such as limited
storage, computational system, limited energy, long distance from receiver, it
is limited by the hardware resources.
6 S. K. Das et al.

(b) Unreliable communication: Due to limited bandwidth, dramatically depen-


dency, temporary, and variable channel, the communication is always unreli-
able.
(c) Dynamic topology: In terrestrial sensor network, nodes are deployed densely,
and in underwater sensor network due to flow of water, sensor nodes are mobile.
(d) Vulnerability and insecure environment: There are several applications of
sensor nodes such as monitoring, sensing, target tracking, and detecting hostile
object and region. So, nodes become susceptible to attacks and threats.
The several networks and their variations have been described in the above-
mentioned section. In each variation, security is one of the most crucial parts in
every sector of real-life application. There are several limitations and constraints
described in the above section, in which limited energy is the crucial part. Due to
the above constraints, several threats are detected in the network as shown in Fig. 3.
Basic types of these threats are as follows [20, 21].
(a) Passive attacks: This attack is done by the malicious nodes without inter-
rupting the main operation by receiving information about network and data
transmission, e.g., message distortion, unnecessary message reply, leakage or
trap secret information, interfering, and eavesdropping.
(b) Active attacks: This attack is done by some external or internal nodes. It can
destroy or delete the important data and information, and sometimes it tries to
modify, inject, or drop data packet.
(i) Compromise attacks: In this attack, attacker may compromise the node
for modifying or reading the secret data or information.
(ii) Routing attack: This attack consists of unreliable data transferred to the
destination node. It is also known as rushing attack. Examples are packet
dropping, packet replication, routing table poisoning, and overflow.
(iii) DoS attack: It this attack, attacker tries to prevent the resources from
accessing the data. It is more difficult to detect and handle. Sometimes,
it handles with encryption method of the cryptography.

Fig. 3 Attacks and its type


Wireless Networks: Applications, Challenges, and Security Issues 7

4 Security and Major Design Issues

Ad-hoc and sensor network and its variations have different capabilities in terms
of topology and network parameters. In the above sections, several limitations and
constraints discussed that motivate for designing an efficient model that care about
the following paradigms.
(a) Modeling of security enhancements: The nodes of ad-hoc and sensor
networks are dynamic and autonomous. They act as routers and help in sending
and transmitting the data packets. It greatly relies on the environment of
the modern technology. It also has several limitations like limited energy
supply, limited computing power, limited bandwidth of the wireless links
connecting data, routing challenges, data aggregation, coverage and scalability,
data reporting methods and protocols, unreliable communication, vulnerability,
and unsecure environment. These stated limitations cause two types of attacks:
passive and active attacks. Examples of passive attacks are message distortion,
unnecessary message reply, leakage or trap secret information, interfering,
and eavesdropping. Examples of active attacks are modify, inject or drop data
packet, modify or read secret data information, packet dropping, packet replica-
tion, routing table poisoning and overflow, etc. So, network needs an intelligent
and efficient security modeling with the help of any artificial intelligence, soft
computing, and machine learning techniques. Sometimes cryptographic tech-
nique is also mixed with any of the stated techniques to make the network more
secure in terms of privacy in both systems like network-based data as well as
cloud-based data.
(b) Optimization Model for Network Lifetime Enhancements: The nature of the
ad-hoc and sensor network is dynamic and autonomous. Each node behaves
as router and acts as an intelligent agent that plays the role of data trans-
ferring agent between source and destination nodes. Due to this intelligence
characteristic, several types of interferences occur. So, there is need of some
optimization techniques to model the network and enhance the lifetime of the
wireless network. Network lifetime is the time duration between when the
network is started and when half of the nodes are exhausted. The optimization
technique is used to find an optimal as well as feasible solutions. The optimal
solution is the best solution among all of the solution, and feasible solution is
the solution nearby optimal solution. In ad-hoc and sensor network, optimal
solution indicates the solution when all network metrics are outperformed in
terms of traditional worst metrics. It helps to increase and decrease the network
metrics based on network lifetime such as packet delivery ration, throughput,
goodput, and residual energy are increases and end-to-end delay, packet loss,
jitter, overhead, are decrease. The combination of both changes helps in overall
network performance.
(c) Modeling of Aggregation Systems: Ad-hoc and sensor network is a collection
of large number of small nodes. The purpose of the wireless sensor nodes is to
sense the main requirement phenomena from the environment and send it to the
8 S. K. Das et al.

required places. The purpose of the network is that it should be useful in several
applications such as military, security maintenance, disaster management, and
habitat monitoring. In each application, a node plays an important role, and
each ad-hoc node or sensor node consists of limited energy capacity or battery
which is not sufficient during any operation. Both the networks have high
density due to several variations of sensor nodes or ad-hoc nodes. Same data
packets are sensed by multiple nodes and raising the redundancy or duplicate
data packets. Data aggregation is used to control this issue efficiently and in an
intelligent way. This data aggregation technique is rapidly used in ad-hoc and
sensor network and their several variations. It helps to enhance the network
lifetime as well as network metrics efficiently.
(d) Analysis of Troubleshooting Techniques: The above-mentioned sections and
paragraphs contain several applications and uses of ad-hoc and sensor network.
In each application, there are several types of randomness and uncertainties. It
raises multiple interferences between one node and another node, source node
to destination node or among multiple neighbor nodes. These interferences and
uncertainties are the main cause of imprecise information and network troubles.
These results in of several network security issues and cause different attacks
that are mentioned in the above section. Hence, there is a need of some intelli-
gent technique using artificial intelligence, soft computing, machine learning,
or any other intelligent technique. Sometimes a single technique is efficient for
handling any trouble. Sometimes there is need of some fusion between multiple
techniques. The combination of multiple techniques provides more robustness
for handling uncertainty of the network and estimate imprecise information
efficiently.
The stated inherent paradigms required some necessary precautions shown in
Fig. 4 which help to overcome some major design issues such as coverage that
indicates communications between two or multiple nodes in term of data acquisition.

Fig. 4 Requirement of security


Wireless Networks: Applications, Challenges, and Security Issues 9

Coverage has multiple types like target based and areas based. Target-based
coverage indicates based on destination node cover or sink node cover, and area-based
coverage indicates cover communication range with source node, sink or destination
node, BS, and multiple neighbor nodes. Network lifetime is the key point of the
life cycle of any wireless network or ad-hoc and sensor network. It also indicates
the duration when half of the nodes have exhausted their energy. Network traffic
and network connectivity are two basic points of enhancement of the network life-
time. Sometimes connectivity is slow, sometimes it is fast or moderate, it deals with
the fuzzy value that handles multiple logic between actually true or actually false
values. Network traffic indicates gathering of nodes for communication or data trans-
ferring services. Although, network traffic and network connectivity both are basic
key points of the network lifetime, combination of both has some minor metrics that
also affect the variation of network lifetime. These metrics named as packet delivery
ration, packet loss, average end-to-end delay, throughput, goodput, jitter, etc. These
metrics are affected by control data packets, ratio between data sent and received,
and different inherent elements required during data transfer. The nature of some of
the metrics is same or opposite based on the network behavior.

5 Conclusions

The proposed paper analyzed the details of wireless network and its variations with
their applications, security challenges, and issues. The paper briefly describes the
working principles of wireless network along with its variations such as WANET,
MANET, VANET, WSN, and IoT and how these variations help the user and customer
in context with their real-life applications and requirements. The limitations along
with the constraints give guidelines to the readers and researchers for enhancing the
field of wireless network and their inherent elements. It also guides modeling and
optimization models for security enhancement, network lifetime enhancement, data
aggregation, and troubleshooting techniques.

References

1. Lin Z, Wang P (2019) A review of data sets of short-range wireless networks. Comput Commun
147:138–158
2. Wang W (2020) Deployment and optimization of wireless network node deployment and
optimization in smart cities. Comput Commun 155:117–124
3. Chen Q (2020) Wireless network signal monitoring based on LAN packet capture and protocol
analysis on grid programming. Comput Commun,15:45–52
4. Chen X, Gao L, Chen J, Lu S, Zhou H, Wang T, Wang A, Zhang Z, Guo S, Mu X, Wang, ZL
(2020). A chaotic pendulum triboelectric-electromagnetic hybridized nanogenerator for wave
energy scavenging and self-powered wireless sensing system. Nano Energy 69:104440
5. Vasudeva A, Sood M (2018) Survey on sybil attack defense mechanisms in wireless ad hoc
networks. J Netw Comput Appl 120:78–118
10 S. K. Das et al.

6. Zhong X, Chen F, Guan Q, Ji F, Yu H (2020) On the distribution of nodal distances in random


wireless ad hoc network with mobile node. Ad Hoc Netw 97:102026
7. Pang C, Xu G, Zhang Y (2020) A new energy efficient management approach for wireless
sensor networks in target tracking. Defence Technol. https://doi.org/10.1016/j.dt.2020.05.022
8. De D, Mukherjee A, Das SK, Dey N (2020) Nature inspired computing for wireless sensor
networks
9. Goyal P, Parmar V, Rishi R (2011) Manet: vulnerabilities, challenges, attacks, application.
IJCEM Int J Comput Eng Manage 11(2011):32–37
10. Hartenstein H, Laberteaux K (eds) (2009) VANET: vehicular applications and inter-networking
technologies, vol 1. Wiley
11. Karnadi FK, Mo ZH, Lan KC (2007) Rapid generation of realistic mobility models for VANET.
In 2007 IEEE wireless communications and networking conference. IEEE, pp 2506–2511
12. Qiu T, Chen N, Li K, Qiao D, Fu Z (2017) Heterogeneous ad hoc networks: architectures,
advances and challenges. Ad Hoc Netw 55:143–152
13. Ai Y, Peng M, Zhang K (2018) Edge computing technologies for Internet of Things: a primer.
Digit Commun Netw 4(2):77–86
14. Hao R, Yang H, Zhou Z (2019) Driving behavior evaluation model base on big data from
internet of vehicles. Int J Ambient Comput Intell (IJACI) 10(4):78–95
15. Shinde GR, Olesen H (2018) Beacon-based cluster framework for internet of people, things,
and services (IoPTS). Int J Ambient Comput Intell (IJACI) 9(4):15–33
16. Igure VM, Laughter SA, Williams RD (2006) Security issues in SCADA networks. Comput
Secur 25(7):498–506
17. Yang W, Wang X, Song X, Yang Y, Patnaik S (2018) Design of intelligent transportation system
supported by new generation wireless communication technology. In: Intelligent systems:
concepts, methodologies, tools, and applications. IGI Global, pp 715–732
18. Chandrakar P (2019) A secure remote user authentication protocol for healthcare monitoring
using wireless medical sensor networks. Int J Ambient Comput Intell (IJACI) 10(1):96–116
19. Wu J, Huang Z, Guan Y, Cai C, Wang Q, Xiao Z, Zheng Z, Zhang H, Zhang X (2011) An
intelligent environmental monitoring system based on autonomous mobile robot. In 2011 IEEE
international conference on robotics and biomimetics. IEEE, pp 138–143
20. Poornima IGA, Paramasivan B (2020) Anomaly detection in wireless sensor network using
machine learning algorithm. Comput Commun 151:331–337
21. Yang G, Dai L, Si G, Wang S, Wang S (2019) Challenges and security issues in underwater
wireless sensor networks. Procedia Comput Sci 147:210–216
Modelling of Security Enhancements
An Authentication Model with High
Security for Cloud Database

Krishna Keerthi Chennam, Rajanikanth Aluvalu, and S. Shitharth

Abstract The cloud computing standards are gaining an increased research interest
due to various benefits they offer. Though there are so many influences with cloud
computing, security and privacy problems are various issues handling with the exten-
sive adaption by the model. Malicious problem of service provider is one more
issue which cannot be traceable by data proprietors. Hence, finding the appropriate
solutions to these security issues at both administrator level and customer level
is very attractive in various directions. Cryptographically enforced access control
for securing electronic pathological records (CEASE) is formulated by extending
the proposed ciphertext-based attribute-based encryption (CP-ABE) with advanced
encryption standard (AES) through limited-shuffle techniques. The main objective of
CEASE is to provide data confidentiality, and access control limited-shuffle protects
the data from inference attacks and protects the data confidentiality for hot data. In the
next step, this research works design a multistage encrypt-or model by differentiating
the users as public and personal. Two separate algorithms such as Vigenere encryp-
tion algorithm and two-fish encryption are applied in personal and public domain,
respectively. Further, where, hierarchical agglomerative clustering (HAC) algorithm
is also processed for clustering of users in the public domain by which the overhead
decreases effectively. As a final system, this work develops an integrated framework
by combining the CP-ABE with AES, multistage encryptor and limited-shuffle. As it
is combined with individual methods, this method achieves an efficient performance
in the provision of security and data confidentiality.

Keywords Cloud computing · Data security · Access control models ·


Encryption · Clustering algorithm · Limited-shuffle

K. K. Chennam
CSE Department, Muffakham Jah College of Engineering and Technology, Telangana State,
Hyderabad, India
R. Aluvalu · S. Shitharth (B)
CSE Department, Vardhaman College of Engineering, Telangana State, Hyderabad, India

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 13
S. K. Das et al. (eds.), Architectural Wireless Networks Solutions
and Security Issues, Lecture Notes in Networks and Systems 196,
https://doi.org/10.1007/978-981-16-0386-0_2
14 K. K. Chennam et al.

1 Introduction

Cloud computing standards are gaining an increased research interest by the different
influences. The major benefit involves time savings, with reduced cost and effi-
cient utilization of computing resources. Though there are so many influences with
cloud computing, security and privacy problems are the important problems holding
back the extensive adaption of this automation. The general characteristic of cloud
computing technology requires the clients to store their data on third-party cloud
service providers, which can also be termed as outsourcing of data. The security
and privacy are generally maintained by the CSP where the data proprietors do not
have complete control on the data security, malicious nature of service provider and
third-party users is one more issue which cannot be traceable by data proprietors.
Hence, finding the appropriate solutions to these security issues at both administrator
level and client level is very important in various directions.
Earlier research is based on standard encryption algorithms like AES, data encryp-
tion standard (DES), etc. However, the advancement in the technology makes these
approaches ineffective because of the lack of control on authorization and authen-
tication. In contrast, the attribute-based encryption (ABE) was the new research
which has the desire to give the maximum to handle by the data proprietors who
can give the data and also provide an efficient management for the cloud service
provider. However, the ABE-based approaches provide security at the cost of execu-
tion. Therefore, the challenge of achieving the dual goals of privacy preserving with
effective cloud data sharing remains unresolved.
In summary, the major significant addition in the section is to influence by the
benefits of the ABE application to carry out the real-time answers to security and
privacy problems experienced in the cloud computing environments.
Section 1 discusses the introduction about cloud computing, data security and
access control schema. Section 2 discusses the CP-ABE with AES, Sect. 3 discusses
the CEASE, and Sects. 4 and 5 talk about the partial shuffling with two-stage
encryption and integration model. Last section discusses the results and conclusion.

2 Problems in Data Security

Security, privacy and trust issues are existing and given importance since the evolu-
tion of Internet, and they are widely spoken these days because of cloud computing.
Cloud’s dynamic nature demands higher security levels. Users or organizations
subscribed to cloud for running their business processes are strikes to acquiring the
next level of endanger because of expanded applications. A cloud user while saving
the data on the cloud, which wants to make sure if the data is correctly stored and
can be retrieved later. The service provider must ensure the secure infrastructure to
protect the data and applications of its clients and the users. Various security strategies
proposed earlier have become ineffective due to advancements in technology.
An Authentication Model with High Security for Cloud Database 15

This is not the usual CSP and the user for both imaginations. What is required
is a mechanism that assures data consistency to the cloud user and protects that the
user is not some malicious hacker. Hence, the necessity for developing trust-based
security model is the need of the hour.

3 Objectives of Data Security

Cloud computing applications have to ensure security of the data stored in the cloud.
Existing approaches are suffering from various drawbacks and require improvement.
In particular, the proposed scheme has the following objectives:
(a) Dual optimization: Data confidentiality and processing time are the two main
constraints which are not achieved simultaneously. More processing time
(encryption time + decryption time) is required to achieve an efficient data
security for data stored in the cloud. On the other hand, the less computa-
tional operations to encrypt the data will reduce the data confidentiality and
result in an information loss. To meet these two constraints simultaneously, this
research work focuses on developing an effective cloud computing technique
based on the ABE [1] and multistage encrypt-or. By adding some more stan-
dard techniques (AES and limited-shuffle) with these approaches, this work
tries to achieve the data confidentiality and less processing time.
(b) Increase data confidentiality: To achieve increased hot data confidentiality and
preservation of privacy, this work proposes a CEASE. In this approach, an
advanced encryption standard accomplishes an encryption algorithm to reduce
the effect of curious/malicious administrator.
(c) Resilient to inference attacks: To make the system more secure from infer-
ence attacks and from malicious authority attacks, this work proposes a
single-level block index method along with limited-shuffle, by which the
system acquires data accomplished models off the record without reducing
the querying process.
(d) Reduced computational overhead: To reduce the unnecessary computational
overhead in the large-scale cloud storages, this work accomplishes a clustering
mechanism, called HAC supports based with the place of utilizers.

3.1 CP-ABE with AES

This section proposed access control within database strategy, CP-ABE combined
with standard AES algorithm. Here CP-ABE [2] achieves the authenticated accessing
of only legal users and AES ensures the data security. Before uploading data to the
cloud, it is encrypted through AES algorithm by which the data user will be relaxed
about the data security. Further in CP-ABE, proprietor accommodates attributes set,
when the user wants the data accomplishment which needs the attributes set and
16 K. K. Chennam et al.

requires the secret key for decrypting the data, where encrypt-or accommodates the
key with the strategy of the access control plan of action. Though administrators
are curious about the data, due to the non-availability of key, the data cannot be
accessed by that malicious authority [3]. Hence, this method protects the security
from malicious authority more effectively [4].
The proposed strategy gives cloud document for the security space with respect
to performance metrics like key generation time, encryption and decryption time.
The key generation time is computed with various secret keys with the identified
set attributes. To produce non-public key in CP-ABE with AES is not exactly the
same by CP-ABE with bilinear mapping. It is observed that, for every attributes set,
the obtained key generation time is less when contrast to the conventional CP-ABE
with bilinear. The encryption time and decryption time are computed with various
no. of policy of leaf nodes, which is limited in CP-ABE with AES contrast with
CP-ABE with bilinear mapping. CP-ABE with AES gives protection and security
for data records for the information of the cipher and store in cloud. The CP-ABE
with AES gives limited key generation, encryption time when contrasted by CP-ABE
with bilinear mapping.

4 CEASE

The CEASE is outlined in this section; main objective of CEASE is to provide data
confidentiality and access control of outsourced CS information over the security
threats. The proposed CEASE framework comprises three constituents to protect the
cloud data security:
(a) Accomplishment of AES on sensitive patient health records.
(b) Secure information retrieval through a data accomplishes and direct technique
and query encryption.
(c) Data confidentiality for hot data through limited-shuffle to protect the data
from inference attacks.
Initially, the holder of data modifies the loyal proxy server by extending AES on
the health data before transferring it to CSP. Ordinal, the proxy server is the important
attribute set administration recognizes the individuals applying the set of attributes
and overdrives access control plan of action on electronic information inward cloud.
The encrypted queries retrieve the encrypted data from the cloud and to decrypt
the data using attributes in the proxy server before delivering information to the
final consumer. Nevertheless, retrieving encrypted information of ciphertext assures
high confidentiality of every patient record in the cloud, and there is a possibility of
inference attacks. Thirdly, the CEASE techniques apply the limited-shuffle within a
single block of the data that contains the sensitive health records and protects the data
confidentiality aside from swift retrieval. Thus, the recommended CEASE algorithm
protects malicious authority of cloud unable to take or change (hot) information one
of two is treasure delicate health files or encrypted query execution along with the
An Authentication Model with High Security for Cloud Database 17

faster querying process [5]. The performance metrics such as querying cost, storage
overhead and hot data confidentiality are examined on the recommended method.
The decryption algorithm decrypts the data and sends the plain text to the client when
the set of attributes are matched according to the CP-ABE with AES.
The performance evaluation of recommended CEASE is carried out on the JAVA
platform on a personal health records. The performance metrics such as querying cost,
storage overhead and hot data confidentiality are measured for varying data sizes.
From the simulation results, it is proved that the recommended approach shows
slight increase in the querying cost but reduced storage overhead and finally an
improvement in the hot data confidentiality contrast with existing approach.
Algorithm 1 Decryption algorithm

5 Multistage Encrypt-Or for Securing Data Records

This section outlines the recommended multistage encrypt-or strategy of protecting


the personal health records (PHR) of third-party database storage. The main objective
of this approach is to provide security for the PHR in the cloud with less compu-
tational overhead. The framework differentiated by the multiple regions partitioned
by public and personal domains is discussed according to the client’s data to give
access permissions.
To ensure security in the non-public domain, this approach uses Vigenere encryp-
tion algorithm, and for the public domain, it uses the two-fish-based encryption algo-
rithm. For every user in the non-public domain (PSD), the clients, relatives or nearby
people are connected in a chain fashion, and they are able to get PHR in glimpse of
18 K. K. Chennam et al.

getting opportunities designated from the sick person. Here each client achieves the
Vigenere encryption-based system to manage the decoding by receiving awards of
customers in his/her PSD. In public domain (PUD), two-fish encryption is used by
the attendant of diverse AAs, each one directing a disjoint subset of characters [6,
7]. To regulate approaches by the PUD wards and let on to reflect role-oriented fine-
grained approaches for their PHR documents, while they do not require the sanctioned
users at the time of encryption. The PUDs contain the maximum number of wards.
By coming through the difficulty, here this approach groups the ward’s duty in the
PUD with HAC algorithm. Wards of PUDs get back attribute designated encryption
keys supported with the ward functions. The observational maps about encryption,
decryption time, clustering accuracy and storage requirements are evaluated using
various data set sizes. The observational effect shows that the recommended method
has more clustering quality, less encryption and decryption time.

6 Raising the Security with Fine-Grained Access Control


Plan of Action Using Two-Stage Encryption
with Limited-Shuffle in the Cloud

This section integrates the CP-ABE with AES and two-stage encrypt-or with limited-
shuffle [8]. The primary goal of CP-ABE with AES is to recognize the malicious
clients and data proprietors who can access data from the cloud. Next, the multistage
encrypt-or helps in reducing the extra computational overhead [9]. The electronic
records are protected from inference attacks by applying limited-shuffle as shown in
Fig. 1. The data proprietors are maintaining the keys distribution authority, certificate
verification and attribute authority and send the data to the proxy server. The proxy
server applied two-stage encryption techniques based on the domains mentioned
above, while doing encryption the key pairs are received from elliptic curve. The
encrypted data is stored in the cloud database. The proxy server encrypts data before
storing in cloud and plain queries also encrypted by proxy server before retrieving
data from cloud, where there is no possibility of plain data to the malicious admin
in cloud and in network or in proxy server.
Two-fish algorithm uses with different and random key length of variable size
of 128 bits, 192 bits and 256 bits. Two-fish is a symmetric algorithm with quick
encryption great with AES due to its speed, adaptability and protection outline.
For every query, the database needs to be searched line by line in the table, where
the questioning time is expanded as the information size is expanded straightly. To
address this issue, a record is made by information by examining the file is decent
as opposed to examining the entire information base. The entire information base
records are organized consecutively with the Customer ID. Before storing new data
into database by examine place by identification and a short time later by embed new
segment with the objective that masterminding demand should be kept up. Single-
level information square relies upon activity key, and the information is kept in
An Authentication Model with High Security for Cloud Database 19

Fig. 1 Proposed methodology

squares. All information kept in the database is named as transparent record. Right
when the record is recovered from the information base, the information is changed to
dark. The flooded list rearranging is not required where transparent stamped records
are not recovered, and it is highly unlikely of spillage with transparent records. Dark
checked information is revamped high for entire single list information base after
each rearranging is finished. By rearranging the dark records is a constrained mix
strategy with the different information squares which outfit information mystery and
brisk questioning with the ordering [10, 11].
Protecting the pathological information initially by the access control plan of
action is used based on the user attributes which is CP-ABE and the informa-
tion is encrypted [12] by AES techniques by separating the security domain into
multiple areas one is non-public domain and another is public domain where cardinal-
independent encryption schemes are used for different domain, one is Vigenere
encryption used for non-public domain, and two-fish algorithm is used for PUD,
respectively, as shown in Fig. 2. The chance of information spillage of third-party
database provider of regular avenue example of records, to beat that the restricted
mix, is utilized with single square stockpiling and high security is given with the
method [13]. This strategy includes less key generation time, encryption time and
unscrambling period much as appeared differently in relation to spare CP-ABE plans,
eventually, centered on the distinctive encryption calculation to make sure about
pathological information.
20 K. K. Chennam et al.

Fig. 2 Multistage encrypt-or

7 Result Analysis

This section outlines results of the recommended schemes on the personal health
records (PHR). The entire recommended methodology is accomplished over the
PHR data set, and its performance is evaluated through the performance metrics
such as encryption time, decryption time, time taken to generate non-public key and
hot data confidentiality [14].
The overall research work is implemented in four phases to meet the defined
objectives.
1. Dual optimization through hybridizing CP-ABE and AES.
2. CEASE—Improving data confidentiality and developing resistance to inference
attacks through hybridizing CP-ABE, AES and implementing limited-shuffle.
3. Multistage encryption—Reduction in computational overhead by using multi-
stage encryption on hybridized CP-ABE with AES.
4. Integrating the multistage encryption model with limited-shuffle to further
reduce the computational overhead [15].
The information is scrambled before re-appropriating onto the cloud with
symmetric encryption using AES. This mechanism will restrict the unauthorized
users from accessing the data, and the administrator cannot decrypt the data as they
are not given access to keys. By utilizing this recommended model, the information
is made sure about AES encryption and CP-ABE containment strategy. CP-ABE
with bilinear mapping is in contrast to CP-ABE with AES on different parameters.
The key age time is decreased utilizing the recommended system. It is seen that
CP-ABE with bilinear mapping is procuring tremendous time to generate key than
An Authentication Model with High Security for Cloud Database 21

the CP-ABE with AES. The plain information is scrambled before re-appropriating
the information in cloud to shield the information from the pernicious manager. The
encryption time is diminished in CP-ABE with AES in contrast to CP-ABE with
bilinear mapping and KP-ABE. The customer needs to unscramble the informa-
tion, and the decoding times for CP-ABE with AES are lessened in contrast to the
CP-ABE with bilinear mapping and KP-ABE. Ciphertext varies less and has more
safety measures in both recommended and existing techniques. Furthermore, the
recommended CEASE calculation makes sure that the vigorous admin of third-party
database cannot recover any (hot) information from the delicate records.
The CEASE scheme enforces the recommended method performance. This
method is resolved by various levels in the access control plan of action, encrypted
database to store in third-party database and limited-data shuffling. The performance
of CEASE scheme is in contrast to the encryption scheme integrated with an access
control (EIAC). Querying cost is defined as the time taken to fetch the query result
against encrypted database, data encryption and decryption time. The querying cost
is slightly increased with the database size, but the storage overhead is less and hot
data confidentiality is in more contrast to the existing methods.
Thirdly multistage encrypt-or model is tested on the personal health records. As
the number of users on the public domain may be high, securing the data access
is a complex issue. Hence, two-stage encryption model is developed. For a user
located in the personal domain, this approach adopts Vigenere encryption algo-
rithm, and for a user located in the public domain this approach adopts two-fish
encryption algorithm. For each personal domain, the data proprietor is connected in
a chain fashion through his/her generations and dear one, which may retrieve personal
records in view of access given by the data proprietor. Here every data proprietor
uses Vigenere encryption algorithm, maintains the decrypting key and requires sanc-
tions of his/her wards in his/her personal. The key generation is completely carried
through the elliptic curve method. The generation of key pairs is only allowed after
the authentication of the user.
In the public domain, the users are clustered through HAC algorithm. Based on
the roles and responsibilities of the users, they are clustered into some groups in a
hierarchical fashion. Finally, the performance is measured through the performance
metrics such as encryption time, decryption time, storage requirement and clustering
accuracy for varying data sizes.
Multistage with two-fish and Vigenere encryption is in contrast to the existing
blowfish algorithm. Further the multistage method is evaluated through clustering
accuracy. Here the clustering accuracy is measured as the number of users grouped
into public and personal domains. Since the clustering also plays an important role
in the security provision, the performance of recommended approach is measured by
varying the data size, and for every instant the clustering accuracy is measured and
formulated. Two-fish and Vigenere encryption and decryption time are in contrast to
the existing blowfish algorithm, and results are tabulated [16, 17].
Finally, an integrated approach using CP-ABE with AES and multistage encrypt-
or exhibited high performance through limited-shuffle. The final model is constructed
by merging the CP-ABE with AES, multistage encrypt-or and limited-shuffle. The
22 K. K. Chennam et al.

main objective of CP-ABE with AES is to perceive the malicious clients or admin-
istrator and not giving access for unauthorized users to analyze the data in the cloud.
This has demonstrated that the recommended strategy encryption time and unscram-
bling time are not exactly the other CP-ABE plans. To encode the information before
outsourcing by isolating the PUD and PSD, encryption is diminished, comparably
unscrambling time likewise decreased in this recommended strategy.
In key generation time, secret keys with various numbers of set of attributes which
match the equivalent sets based on the leafy nodes, and the keys are generated as
shown in Fig. 3. Figures 4 and 5 show the encryption and decryption time for various
database sizes, respectively, with the matched attributes sets. Figure 6 shows the

Fig. 3 Key generation time (MS)

Fig. 4 Encryption time (MS)


An Authentication Model with High Security for Cloud Database 23

Fig. 5 Decryption time (MS)

Fig. 6 Data size versus clustering accuracy

clustering accuracy for different database sizes with HAC algorithm. The multi-
stage encrypt-or helps in reducing the additional computational overhead which is
acquired by separating all users into clusters. This methodology endeavors to shield
the electronic records from inference attacks through the accomplishment of limited-
shuffle [18, 19]. The key generation and information retrieval time are limited in the
developed model in contrast to various CP-ABE and KP-ABE techniques.

8 Conclusions

This considered the implementation of CP-ABE with AES and two-stage encrypt-or
exhibiting high performance through limited-shuffle. In this work, initially CP-ABE
24 K. K. Chennam et al.

with AES is developed and proved reduced key generation time. Secondly, CEASE is
developed to use query encryption method to retrieve results from database. Thirdly,
multistage encryption model using two-fish and Vigenere is developed.
Here the users are divided into non-public and public domains, and HAC clustering
is used to further divide the users into groups. This work is evaluated by performance
metric and clustering accuracy [20]. Performance of HAC approach is also measured
by varying the data size for every instance. Finally, the integrated model is developed
using CP-ABE with AES and multistage encryption model through limited-shuffle.
Final work will endeavor to shield the electronic records from inference attacks
through the accomplishment of limited-shuffle. This model has majorly addressed
the below challenges, namely dual optimization to meet the equality between the
data confidentiality, and processing time is achieved with AES and limited-shuffle-
based ABE. Increased hot data confidentiality and privacy preservation are achieved
by reducing the effect of curious/malicious authority using an encryption algorithm
CEASE. Resilient to inference attacks from malicious authority is attained by infor-
mation access arrangement familiarity by not changing the querying process using
single-level block index method along with limited-shuffle. Reduced computational
overhead to reduce the unnecessary computational overhead is achieved by HAC
algorithm mechanism based on the roles of users. Future work is to reduce the cost
of recommended model by increasing the security in data.

Acknowledgements Thank you for your cooperation and the contribution of co-authors and
Springer for publishing the manuscript.

References

1. Lewko A, Waters B (2004) Decentralizing attribute-based encryption, EUROCRYPT, pp 223–


238.
2. Waters B (2011) ciphertext-policy attribute-based encryption: an expressive, efficient, and
provably secure realization, public key cryptography–PKC. Springer, Berlin, pp 53–70
3. Boneh D, Boyen X, Goh EJ (2005) Hierarchical identity based encryption with constant size
cipher text. Advances in cryptology—EUROCRYPT vol 3493, pp 440–456
4. Bettencourt J, Sahai A, Waters B (2003) Ciphertext-policy attribute based encryption. In: IEEE
Symposium on security and privacy (SP), pp 321–334
5. Bobba R, Khurana H, Prabhakaran M (2009) Attribute-sets: A practically motivated enhance-
ment to attribute-based encryption. In: European symposium on research in computer security,
pp 587–604
6. Chase M (2007) Multi-authority attribute based encryption. Spring Theory Cryptograph
4392:515–534
7. Ferretti L, M Colajanni, M.Marchetti (2013) Access control enforcement on query-aware
encrypted cloud databases, IEEE 5th international conference on cloud computing technology
and science (CloudCom), vol 2, pp 219–219
8. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained
access control of encrypted data. In: Proceedings of the 13th ACM conference on computer
and communications security, ACM, pp 89–98
9. Muller S (2008) Distributed attribute based encryption. J Inf Secur Cryptol 4:20–36
Another Random Scribd Document
with Unrelated Content
intellectual class, as even to-day. Our artistic eye, which was only
able to see everything flat, at once opened through the foreign art to
the mysteries of perspective, and though they may not be the real
essence of art, they were at least a new thing for us. There are
many other lessons we received from it; it seems to me that the best
and greatest value is its own existence as a protest against the
Japanese art. If the Japanese art of the old school has made any
advance, as it has done, it should be thankful to the Western school;
and at the same time the artists of foreign method must pay due
respect to the former for its creation of the “Western Art Japonised.”
It may be far away yet, but such an art, if a combination of the East
and West, is bound to come.
APPENDIX I
THE MEMORIAL EXHIBITION OF
THE LATE HARA
The memorial exhibition of Busho Hara, a Japanese artist of the
Western school, held recently in Tokyo to raise a fund for his
surviving family as one of its objects (Hara passed away in October,
1913, in his forty-seventh year), had many significances, one of
which, certainly the strongest, was in contradiction of the general
understanding that Western paintings will never sell in Japan; even a
trifling sketch in which the artist only jotted down his momentary
memory fetched the most unusual price. Hara is a remarkable
example of one who created his own world (by that I mean at least
the buyers, though not real appreciators) among his friends through
his personality, which strengthened his work; paradoxically we shall
say he was an artist well known and utterly unknown; and when I
say he was an utterly unknown artist, I have my thought that he
never even once exhibited his work to the public, and his often
defiant spirit and high aim made him scorn and laugh over people’s
ignorance on art. How he hated the Japanese art world where real
merit is no passport at all. But Hara’s friends are pleased to know
from this exhibition the fact that even the public he ever so despised
are not so unresponsive to his art, whose secret he learned in
London.
Hara was, sad to say, also an artist whose Western art-work, like
that of some other Japanese artists to whom quite an excellent
credit was given in their European days, much declined or, better to
say, missed somehow the artistic thrill since he left England in 1906.
Why was that? What made him so? Was it from the fact that there is
no gallery of Western art old or new in Japan where your work will
only be belittled after you have received a good lesson there? or is it
that our Japanese general public never have a high standard in the
matter of art, especially of Western art? I think there are many
reasons to say that the passive, even oppressive air of Japan,
generally speaking, may have a perfectly disintegrating effect on an
artist trained in the West; it would not be wholly wrong to declare
that the real Western art founded on emotion and life cannot be
executed in Japan. Hara made quite many portraits by commission
since that 1906, some of which were brought out in this exhibition.
As they are work more or less forced, we must go to his other works
for his best, which he executed with mighty enthusiasm and faith
under England’s artistic blessing. He writes down in his diary, the
reading of which was my special privilege, on January 2nd of 1905,
the following words: “At last Port Arthur has fallen. When the war
shall be done that will be the time for our battle of art against
Europe to begin. Oh, what a great responsibility for Japanese
artists!”
Hara made a student’s obeisance toward Watts among the modern
masters, whose influence will be most distinctly seen in one of his
pictures in this exhibition called “The Young Sorrow” (the owner of
this picture is Mr. Takashi Matsuda, one of a few great art collectors
in Japan), in which a young sitting nude woman shows only her
beautiful back, her face being covered by her hands. What a sad,
visionary, pale clarification in colour and tone! Hara writes down
when his mind was saturated with Watts at Tate’s or somewhere
else: “What an indescribable sense of beauty! Art is indeed my only
world and life. Again look at the pictures. How tender, how soft, and
how warm in tone and atmosphere! And how deep is the shadow of
the pictures! And that deep shadow is never dirty.” Again he writes
down on his visit to Tate’s on a certain day: “It was wrong that I
attempted to bring out all the colours from the beginning at once,
and even tried to finish the work up by mending. There is no wonder
my colours were dead things. We must have the living beauty and
tone of colours; by that I do never mean showy. I must learn how to
get the deep colour by light paint.” While he was saturated with
Watts, he on the other hand was copying Rembrandt at the National
Gallery. Hara’s copy of “The Jewish Merchant” is now owned by the
Imperial Household in Tokyo. This copy and a few other copies of
Rembrandt were in the exhibition. And Hara was a great admirer of
Turner. Markino confesses in his book or books that it was Hara who
first opened his spiritual eyes to Turner. At this memorial exhibition
Turner is represented by Hara’s copy of Venice. There was in the
exhibition “The Old Seamstress,” which I was pleased to say was one
of Hara’s best pictures. Whenever I see Hara’s pictures of any old
woman, not only this “Old Seamstress,” I think at once that what
you might call his soul sympathy immediately responded to the old
woman, since Hara’s heart and soul were world-wearied and most
tender.
Markino has somewhere in the book the following passages: “First
few weeks I used to take him round the streets, and whenever we
passed some picture shops he stopped to look through the shop
window, and would not move on. I told him those nameless artists’
work was not half so good as his own. But he always said: ‘Oh,
please don’t say so. Perhaps my drawings are surer than those, and
my compositions are better too. But the European artists know how
to handle oils so skilfully. I learn great lessons from them.’”
Indeed when he returned home he had fully mastered the
technique of handling oils from England, where he stayed some four
years. It is really a pity that Hara passed away without having fully
expressed his own art in his masterly technique, which he learned
with such sacrifice and patience. His death occurred suddenly at the
time when he was about to break away from his former self and to
create his own new art ten times stronger, fresher, and more
beautiful.
I wish to call the readers’ attention to Yoshio Markino’s My
Recollections and Reflections, which contains the most sympathetic
article on Busho Hara.
APPENDIX II
THE NERVOUS DEBILITY OF
PRESENT JAPANESE ART
When I say that I received almost no impression from the annual
Government Exhibition of Japanese Art in the last five or six years, I
have a sort of same feeling with the tired month of May when the
season, in fact, having no strength left from the last glory of bloom
(what a glorious old Japanese art!), still vainly attempts to look
ambitious. Although it may sound unsympathetic, I must declare
that the present Japanese art, speaking of it as a whole, with no
reference to separate works or individual artists, suffers from
nervous debility. Now, is it not the exact condition of the Japanese
life at present? Here it is the art following after the life of modern
Japan, vain, shallow, imitative, and thoughtless, which makes us
pessimistic; the best possible course such an art can follow in the
time of its nervous debility might be that of imitation.

When the present Japanese art tells something, I thank God, it is


from its sad failure; indeed, the present Japanese art is a lost art,
since it explains nothing, alas, unlike the old art of idealistic
exaltation, but the general condition of life. It is cast down from its
high pedestal.

I do not know exactly what simplicity means, when the word is


used in connection with our old art; however, it is true we see a
peculiar unity in it, which was cherished under the influence of India
and China, and always helped to a classification and analysis of the
means through which the artists worked. And the poverty of subjects
was a strength for them; they valued workmanship, or the right use
of material rather than the material itself; instead of style and
design, the intellect and atmosphere. They thought the means to be
the only path to Heaven. But it was before the Western art had
invaded Japan; that art told them of the end of art, and laughed at
the indecision of æsthetic judgment and uncertainty of realism of
Japanese art. It said: “It is true that you have some scent, but it is
already faded; you have refinement, but it is not quite true to nature
and too far away.” Indeed, it is almost sad one sees the artists
troubled by the Western influence which they accepted, in spite of
themselves; I can see in the exhibitions that many of them have
long ago lost their faith by spiritual calamity, and it is seldom to see
them able to readjust their own minds under such a mingled
tempest of Oriental and Occidental. Is it not, after all, merely a
waste of energy? And how true it is with all the other phenomena of
the present life, their Oriental retreat and Occidental rush.

The present Japanese art has sadly strayed from subjectivity, the
only one citadel where the old Japanese art rose and fell; I wonder if
it is not paying a too tremendous price only to gain a little objectivity
of the West.

Printed by Hazell, Watson & Viney, Ld., London and Aylesbury, England.
*** END OF THE PROJECT GUTENBERG EBOOK THE SPIRIT OF
JAPANESE ART ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebooknice.com

You might also like