0% found this document useful (0 votes)
96 views7 pages

(IJETA-V7I5P10) :dr. A. Poomari

Web applications are utilized on an extensive scale worldwide, which handles sensitive individual information of users. Structured Query Language (SQL) Data Inference (DI) and injection is a procedure that abuses a security defenselessness occurring in the database layer of an application. In this paper we will research the website page database security help of optimization and encryption method.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views7 pages

(IJETA-V7I5P10) :dr. A. Poomari

Web applications are utilized on an extensive scale worldwide, which handles sensitive individual information of users. Structured Query Language (SQL) Data Inference (DI) and injection is a procedure that abuses a security defenselessness occurring in the database layer of an application. In this paper we will research the website page database security help of optimization and encryption method.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

RESEARCH ARTICLE OPEN ACCESS

SQL and Data Inference Injection and Enhancing Website


Security
Dr. A. Poomari
Lecturer In Ayya Nadar Janaki Ammal Polytechnic College-Sivakasi
ABSTRACT
Web applications are utilized on an extensive scale worldwide, which handles sensitive individual information of
users. Structured Query Language (SQL) Data Inference (DI) and injection is a procedure that abuses a security
defenselessness occurring in the database layer of an application. In this paper we will research the website page
database security help of optimization and encryption method. At long last, the attack will be detected dependent on
the user query with the assistance of query tree Mechanism. For enhancing the security level of attack detection and
prevention. Fully Homomorphic Encryption (FHE) encryption is proposed.
Keywords: Webpage database, Injection, prevention, optimization, attack and security.

I. INTRODUCTION II. LITERATURE REVIEW


In recent times, web application is widely utilized in The detection process of SQL injection attacks is a
different kind of organization, business or commerce one of the challenging tasks in cloud database
field because of its reliable and efficient solution to security because of its extreme heterogeneity of the
the various challenges of communication over the attack vectors. One of the novel approaches to deal
internet [1-10]. Similar to some evolving structures with SQL injection attack detection as graph of
gained high interest databases [11-15] and thus tokens and the centrality measures is trained by
malicious users who want to exploit their weaknesses Support Vector Machine (SVM) [61] Though we
and imperfections for their personal goals [16-25]. center fundamentally around web applications
The security of databases isn't unimportant is as yet a created with PHP and MySQL, the methodology can
developing concern considering the number of be effortlessly ported to different stages. A Gap-
occurrences reported constantly [26-30]. The attack Weighted String Subsequence Kernel technique is
marks at injection focuses will contain examples of actualized to recognize subsequences of shared
SQL tokens and images as SQLIA positive while characters between query strings for the yield of a
substantial web requests would appear as expected similarity metric by Paul R. McWhirter et al, [62]. At
information from the application [31-39]. SQL last, SVM algorithm is trained on the basis of
injection alludes to that the attacker works the similarity measure (between known and unknown
database by embeddings a progression of SQL query strings which are utilized to classification). By
statements in the query task [40]. Likewise, there are social occasion all component information from the
different assets on the web that discloses point by query strings, extra data from the source application
point methodology to ordinary users on the best way isn't required. An effective SQL injection attack
to attack web applications with various sorts of forces a genuine risk to the database, web
attacks all in all and with SQL injection specifically application, and the whole web server and this attack
[41]. is extremely normal attack that controls the
information going through web application to the
In order to overcome the SQL injections, the database servers through web servers so that it
traditional SQL injections are easily detected with lot changes or uncovers database substance.
of procedures and methodologies [42]. By utilizing
different Database Management Systems (DBMS) III. PROBLEM STATEMENT OF
[43-50], the developed organizations have the level CURRENT STRATEGY
of assurance and security for the cloud storage data
[51]. For the purpose of securing data and preventing The attempt of SQL injection and DI attack is
unauthorized access from unprivileged entities, unbeaten only when an infused with web server
DBMS is engaged with access control [52-60]. database. In existing literary works numerous
administrations are infused to secure the webpage,
this is driven by the way that new types of SQL

ISSN: 2393-9516 www.ijetajournal.org Page 63


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

injection attacks often do not qualify as completely needed, integrity with the assurance from
new, yet minor and imaginative varieties of already unauthorized data access and illegal change; and
observed attack vectors. In the existing filtering confidentiality with the insurance of unauthorized
model removing the special characters, operators, data to webpage database security.
brackets and the final solution this is to standardize
SQL questions totally into a text form that is 4.2 Query Preprocessing
reasonable for applying document similarity measure
calculation. Additionally, for security different For query preprocessing the front-end restricts
encryption procedure like AES, DES, RSA, and ECC inquiries to aggregate results only. Each item being
are utilized. The security parameters have not been chosen is checked to guarantee that just a supported
instated and the attacker can access the sensitive aggregate function is used for each. Additionally, a
content without checking the personality of the user. count is added for each of the chosen items to assist
In this way, the attacker misuses this defenselessness with later analysis. From this preprocessing system to
to infuse SQL injection model. avoid non-valuable queries are neglected to the
webpage data security model. Moreover, by
IV. INNOVATIVE DATABASE decreasing the number of on operations, the
performance of query processing can be greatly
SECURITY MECHANISM improved. When the data had been accessed by a lot
Databases turned out to be highly robust and refined of unknown people, the chances of the data threats is
structures during multiple decades of evolvement. increases. Furthermore, the database attacks are to
Databases like all other developing structures gained. make a lot of money by offering sensitive
Secure database in Cloud inject multi-attacks in information in illegal ways.
webservers, our work query attack and DI attack are
4.3 Proxy Server and Filtering
utilized by using the optimization technique. The
database server side being related with a distributed
In view of optimal quires, filtering model is
cloud environment to give a security controlling
considered to evacuating the uncommon characters
system for guaranteeing the secure execution of all
utilizing proxy filtering model and it's transferred in
requested queries without any database hacking.
the server. This server can likewise be utilized to
Webserver security model generate the dummy SQL
expand security for a business. A [27] server can
query to the database server, this generation is done
give network address interpretation, which makes the
by the presented DBCO technique. After
individual users and PCs on the system mysterious
embeddings, the SQL and DI in web data the proxy
when they are utilizing the Internet. Attack the
filtering method is to remove the unwanted server
ordinary strings and characters are changed over into
information to secure the web server database. This
hexadecimal, ASCII and Unicode.
filtering technique is to recognize the special form
As a result of this, the input inquiry is gotten away
like, characters, ID, and so on, Finally the admin will
from the channel which checks the question for some
detect the query from the database belongs to the
awful character which results. This filtering to
query user help of query tree Mechanism. For
captures web demands at a proxy for ideal SQL and
enhancing the security, we utilizing FHE algorithm to
DI detection and counteractive action appears in
encrypted and decrypted identified query. Its helps
figure 3. It's having the upside of having the capacity
queries to get compared from the original one using
to decode obfuscated internet traffic for careful
similarity measure stored over the security tool that
investigation.
filters out the malicious queries.

4.1 Database Interferences Problem


Homomorphic Encryption
Sorting database inference to a group of data security
attacks is very hard, because of the way that it The completely homomorphic encryption is
leverages the human personality and a logic approach performed on the multiple nodes to diminish the
in order to derive secure data. Inference occurs when processing time. This FHE [30] is a kind of
a malicious user infers some ensured or private data encryption that enables specific calculations to be led
without directly accessing it. Database security on cipher query and restore an encoded outcome, the
depends on availability, integrity, and confidentiality, decoded of the result is equivalent the aftereffect of
whereby availability deals with the avoidance of directing the activity on the plain query. This
hardware and software. Information whenever webpage security the ideal questions re-infused to

ISSN: 2393-9516 www.ijetajournal.org Page 64


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

enhance the security included four processes which graph concludes that the prevention rate is high in the
are {Key Initialization, encryption, decryption, and events web application compared to other.
analysis}.
VI. CONCLUSION
Key Initialization: Initialize encryption key is secret
and consists of the set of the relatively prime moduli The method is working over the database server
and two sets of vectors and optimal queries with the side being related with a dispersed cloud condition to
corresponding database. give a security controlling framework. FHE utilized
Encryption: An Encryption algorithm is currently to analyzed the security level of our work. SQL and
functional to the secret data of the first data. In the DI injection is a common technique hacker utilize to
encryption process review, the ideal public key has to assault general databases. The attack modifies the
encode each byte of cipher query. SQL queries and behavior of the framework for the
Decryption: This process that uses the secret key and advantages of behavior. From this proposed
the cipher query returns the original information in a technique analyzed all generated optimal SQL and DI
web database. From this process evaluation of a queries related with user input and catches the first
permitted circuit yields the correct result. structure of the query statement. From the
implementation results, its produce 93.56% of
security level of prevented webpage applicated based
V. RESULTS AND ANALYSIS databases.

Our proposed SQL and DI attack injection REFERENCE


webpage database security model is implemented in
the platform of Net beans and JAVA language along [1] Anand Nayyar, Vikram Puri,
with the cloud sim, here cloudsim act as the web Nhu Gia Nguyen, Dac Nhuong Le, Smart
server. The proposed innovative approach is executed Surveillance Robot for the Real Time
and its performance measures are analyzed and Monitoring and Control System in
compared with other security algorithms. Environment and Industrial Applications,
Advances in Intelligent System and
Computing, pp 229-243, Springer
[2] Ezhilarasu, P., & Krishnaraj, N. (2015).
Applications of Finite Automata in Lexical
Analysis and as a Ticket Vending Machine–A
Review. Int. J. Comput. Sci. Eng.
Technol, 6(05), 267-270.
[3] Agrawal, U., Arora, J., Singh, R., Gupta, D.,
Khanna, A., & Khamparia, A. (2020). Hybrid
Wolf-Bat Algorithm for Optimization of
Connection Weights in Multi-layer
Perceptron. ACM Transactions on Multimedia
Computing, Communications, and
Applications (TOMM), 16(1s), 1-20.
[4] Prasanna, S., & Ezhilmaran, D. (2016).
Fig 1: Detection Accuracy Vs Web application
Association rule mining using enhanced
apriori with modified GA for stock
The detection accuracy of different web applications
prediction. International Journal of Data
such as jobs, events, book store, payments, and
Mining, Modelling and Management, 8(2),
games are analyzed in figure 1. For each web
195-207.
application, the accuracy of SQL page, DI page,
detection, and prevention are examined and [5] Pustokhina, I. V., Pustokhin, D. A., Gupta, D.,
compared. Considering job application, the SQL page Khanna, A., Shankar, K., & Nguyen, G. N.
is 79%, DI page is 70%, query detected is in the (2020). An effective training scheme for deep
range of 97.23% and prevented is 96.89%. Similarly, neural network in edge computing enabled
the parameters are analyzed for other applications Internet of medical things (IoMT)
like events, book store, payments, and games. The systems. IEEE Access, 8, 107112-107123.

ISSN: 2393-9516 www.ijetajournal.org Page 65


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

[6] Shankar, K., Zhang, Y., Liu, Y., Wu, L., & Image Compression Scheme Using
Chen, C. H. (2020). Hyperparameter tuning Neighborhood Correlation Sequence
deep learning for diabetic retinopathy fundus Algorithm in WSN. IEEE Transactions on
image classification. IEEE Access, 8, 118164- Reliability.
118173. [17] Deepalakshmi, P., & Shankar, K. (2020). Role
[7] Joshi, G. P., Perumal, E., Shankar, K., Tariq, and Impacts of Ant Colony Optimization in
U., Ahmad, T., & Ibrahim, A. (2020). Toward Job Shop Scheduling Problems: A Detailed
Blockchain-Enabled Privacy-Preserving Data Analysis. Evolutionary Computation in
Transmission in Cluster-Based Vehicular Scheduling, 11-35.
Networks. Electronics, 9(9), 1358. [18] Ashwin, M., Kamalraj, S., & Azath, M.
[8] Saračević, M. H., Adamović, S. Z., Miškovic, (2019). Multi objective trust optimization for
V. A., Elhoseny, M., Maček, N. D., Selim, M. efficient communication in wireless M
M., & Shankar, K. (2020). Data Encryption for learning applications. Cluster
Internet of Things Applications Based on Computing, 22(5), 10687-10695.
Catalan Objects and Two Combinatorial [19] Ezhilarasu, P., & Krishnaraj, N. (2015).
Structures. IEEE Transactions on Reliability. Double Substring based Classification for
[9] Namasudra, S., & Roy, P. (2017). Time saving Nondeterministic Finite Automata. Indian
protocol for data accessing in cloud Journal Of Science And Technology, 8, 26.
computing. IET Communications, 11(10), [20] Amira S. Ashour, Samsad Beagum, Nilanjan
1558-1565. Dey, Ahmed S. Ashour, Dimitra Sifaki
[10] Elsir, A., Elsier, O., Abdurrahman, A., & Pistolla, Gia Nhu Nguyen, Dac-Nhuong Le,
Mubarakali, A. (2019). Privacy Preservation in Fuqian Shi (2018), Light Microscopy Image
Big Data with Data Scalability and Efficiency De-noising using Optimized LPA-ICI Filter,
Using Efficient and Secure Data Balanced Neural Computing and Applications,
Scheduling Algorithm. Vol.29(12), pp 1517–1533, Springer, ISSN:
[11] Ezhilarasu, P., Krishnaraj, N., & Babu, S. V. 0941-0643.
(2015). Applications of finite automata in text [21] Prasanna, S., Govinda, K., & Kumaran, U. S.
search-a review. International Journal of (2012). An Evaluation study of Oral Cancer
Science, Engineering and Computer Detection using Data Mining Classification
Technology, 5(5), 116. Techniques. International Journal of Advanced
[12] Huyen, D.T.T., Binh, N.T., Tuan, T.M., Research in Computer Science, 3(1).
Nguyen, G.N, Dey, N., Son, L.H, Analyzing [22] Sankhwar, S., Gupta, D., Ramya, K. C., Rani,
trends in hospital-cost payments of patients S. S., Shankar, K., & Lakshmanaprabu, S. K.
using ARIMA and GIS: Case study at the (2020). Improved grey wolf optimization-
Hanoi Medical University Hospital, Vietnam, based feature subset selection with fuzzy
Journal of Medical Imaging and Health neural classifier for financial crisis
Informatics, 7(2), pp. 421-429. prediction. Soft Computing, 24(1), 101-110.
[13] Prasanna, S., & Maran, E. (2015). Stock [23] Namasudra, S., & Deka, G. C. (2018).
Market Prediction Using Clustering with Introduction of DNA computing in
Meta-Heuristic Approaches. Gazi University cryptography. In Advances of DNA computing
Journal of Science, 28(3). in cryptography (pp. 1-18). Chapman and
[14] Pustokhina, I. V., Pustokhin, D. A., Rodrigues, Hall/CRC.
J. J., Gupta, D., Khanna, A., Shankar, K., ... & [24] Mubarakali, A., Srinivasan, K., Mukhalid, R.,
Joshi, G. P. (2020). Automatic Vehicle Jaganathan, S. C., & Marina, N. (2020).
License Plate Recognition using Optimal K- Security challenges in internet of things:
Means with Convolutional Neural Network for Distributed denial of service attack detection
Intelligent Transportation Systems. IEEE using support vector machine‐based expert
Access. systems. Computational Intelligence.
[15] Namasudra, S. (2018). Cloud computing: A [25] Le Nguyen Bao, Dac-Nhuong Le, Gia Nhu
new era. Journal of Fundamental and Applied Nguyen, Vikrant Bhateja, Suresh Chandra
Sciences, 10(2). Satapathy (2017), Optimizing Feature
[16] Uthayakumar, J., Elhoseny, M., & Shankar, K. Selection in Video-based Recognition using
(2020). Highly Reliable and Low-Complexity Max-Min Ant System for the Online Video

ISSN: 2393-9516 www.ijetajournal.org Page 66


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

Contextual Advertisement User-Oriented based automated system for Alzheimer disease


System, Journal of Computational Science, classification, Journal of Advanced
Elsevier ISSN: 1877-7503. Vol.21, pp.361- Microscopy Research, 11(1), pp. 1-10
370. [35] Krishnaraj, N., Ezhilarasu, P., & Gao, X. Z.
[26] Ezhilarasu, P., Thirunavukkarasu, E., Hybrid Soft Computing Approach for
Karuppusami, G., & Krishnaraj, N. (2015). Prediction of Cancer in Colon Using
Single substring based classification for Microarray Gene Data. Current Signal
nondeterministic finite automata. International Transduction Therapy, 11(2).
Journal on Applications in Information and [36] Namasudra, S., Deka, G. C., Johri, P.,
Communication Engineering, 1(10), 29-31. Hosseinpour, M., & Gandomi, A. H. (2020).
[27] Bhateja, V., Gautam, A., Tiwari, A., Nhu, The revolution of blockchain: State-of-the-art
N.G., Le, D.-N, Haralick features-based and research challenges. Archives of
classification of mammograms using SVM, Computational Methods in Engineering.
Advances in Intelligent Systems and [37] Goel, N., Grover, B., Gupta, D., Khanna, A.,
Computing, Volume 672, 2018, Pages 787- & Sharma, M. (2020). Modified Grasshopper
795. Optimization Algorithm for detection of
[28] Latha, A., Prasanna, S., Hemalatha, S., & Autism Spectrum Disorder. Physical
Sivakumar, B. (2019). A harmonized trust Communication, 101115.
assisted energy efficient data aggregation [38] Prasanna, S., Narayan, S., NallaKaruppan, M.
scheme for distributed sensor K., Anilkumar, C., & Ramasubbareddy, S.
networks. Cognitive Systems Research, 56, (2019). Iterative Approach for Frequent Set
14-22. Mining Using Hadoop Over Cloud
[29] Krishnaraj, N., Elhoseny, M., Lydia, E. L., Environment. In Smart Intelligent Computing
Shankar, K., & ALDabbas, O. (2020). An and Applications (pp. 399-405). Springer,
efficient radix trie‐based semantic visual Singapore.
indexing model for large‐scale image retrieval [39] Le, D.-N.a, Kumar, R.b, Nguyen, G.N.,
in cloud environment. Software: Practice and Chatterjee, J.M.d, Cloud Computing and
Experience. Virtualization, DOI: 10.1002/9781119488149,
[30] Namasudra, S., Roy, P., Vijayakumar, P., Wiley.
Audithan, S., & Balusamy, B. (2017). Time [40] Raj, R. J. S., Shobana, S. J., Pustokhina, I. V.,
efficient secure DNA based access control Pustokhin, D. A., Gupta, D., & Shankar, K.
model for cloud computing (2020). Optimal Feature Selection-Based
environment. Future Generation Computer Medical Image Classification Using Deep
Systems, 73, 90-105. Learning Model in Internet of Medical
[31] Lakshmanaprabu, S. K., Shankar, K., Rani, S. Things. IEEE Access, 8, 58006-58017.
S., Abdulhay, E., Arunkumar, N., Ramirez, G., [41] Namasudra, S., & Deka, G. C. (2018).
& Uthayakumar, J. (2019). An effect of big Taxonomy of DNA-based security models.
data technology with ant colony optimization In Advances of DNA Computing in
based routing in vehicular ad hoc networks: Cryptography (pp. 37-52). Chapman and
Towards smart cities. Journal of cleaner Hall/CRC.
production, 217, 584-593. [42] Mubarakali, A., Ramakrishnan, J., Mavaluru,
[32] Namasudra, S., & Deka, G. C. (Eds.). D., Elsir, A., Elsier, O., & Wakil, K. (2019). A
(2018). Advances of DNA computing in new efficient design for random access
cryptography. CRC Press. memory based on quantum dot cellular
[33] Mubarakali, A., Ashwin, M., Mavaluru, D., & automata nanotechnology. Nano
Kumar, A. D. (2020). Design an attribute Communication Networks, 21, 100252.
based health record protection algorithm for [43] Ramakrishnan, J., Mavaluru, D., Sakthivel, R.
healthcare services in cloud S., Alqahtani, A. S., Mubarakali, A., &
environment. Multimedia Tools and Retnadhas, M. (2020). Brain–computer
Applications, 79(5), 3943-3956. interface for amyotrophic lateral sclerosis
[34] Dey, N., Ashour, A.S., Chakraborty, S., Le, patients using deep learning
D.-N., Nguyen, G.N, Healthy and unhealthy network. NEURAL COMPUTING &
rat hippocampus cells classification: A neural APPLICATIONS.

ISSN: 2393-9516 www.ijetajournal.org Page 67


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

[44] Van, V.N., Chi, L.M., Long, N.Q., Nguyen, record transaction in block chain. Journal of
G.N., Le, D.-N, A performance analysis of Ambient Intelligence and Humanized
openstack open-source solution for IaaS cloud Computing, 1-9.
computing, Advances in Intelligent Systems [54] Devaraj, A. F. S., Murugaboopathi, G.,
and Computing, 380, pp. 141-150. Elhoseny, M., Shankar, K., Min, K., Moon, H.,
[45] Sinha, A., Shrivastava, G., Kumar, P., & & Joshi, G. P. (2020). An Efficient Framework
Gupta, D. (2020). A community‐based for Secure Image Archival and Retrieval
hierarchical user authentication scheme for System Using Multiple Secret Share Creation
Industry 4.0. Software: Practice and Scheme. IEEE Access, 8, 144310-144320.
Experience. [55] Mubarakali, A. (2020). Healthcare Services
[46] Namasudra, S., Devi, D., Kadry, S., Monitoring in Cloud Using Secure and Robust
Sundarasekar, R., & Shanthini, A. (2020). Healthcare-Based BLOCKCHAIN (SRHB)
Towards DNA based data security in the cloud Approach. MOBILE NETWORKS &
computing environment. Computer APPLICATIONS.
Communications, 151, 539-547. [56] Namasudra, S. (2019). An improved
[47] Mubarakali, A., Durai, A. D., Alshehri, M., attribute‐based encryption technique towards
AlFarraj, O., Ramakrishnan, J., & Mavaluru, the data security in cloud
D. (2020). Fog-Based Delay-Sensitive Data computing. Concurrency and Computation:
Transmission Algorithm for Data Forwarding Practice and Experience, 31(3), e4364.
and Storage in Cloud Environment for [57] Kathiresan, S., Sait, A. R. W., Gupta, D.,
Multimedia Applications. Big Data. Lakshmanaprabu, S. K., Khanna, A., &
[48] Reshmi, T. R., & Azath, M. (2020). Improved Pandey, H. M. (2020). Automated detection
self-healing technique for 5G networks using and classification of fundus diabetic
predictive analysis. Peer-to-Peer Networking retinopathy images using synergic deep
and Applications, 1-17. learning model. Pattern Recognition Letters.
[49] Namasudra, S., Chakraborty, R., Majumder, [58] Govinda, K., & Prasanna, S. (2015, February).
A., & Moparthi, N. R. (2020). Securing Medical dialysis prediction using fuzzy rules.
multimedia by using DNA based encryption in In 2015 International Conference on Soft-
the cloud computing environment. ACM Computing and Networks Security
Transactions on Multimedia Computing (ICSNS) (pp. 1-5). IEEE.
Communications and Applications. [59] Sujatha, R., Navaneethan, C., Kaluri, R., &
[50] Patro, K. K., Reddi, S. P. R., Khalelulla, S. E., Prasanna, S. (2020). Optimized Digital
Kumar, P. R., & Shankar, K. (2020). ECG data Transformation in Government Services with
optimization for biometric human recognition Blockchain. In Blockchain Technology and
using statistical distributed machine learning Applications (pp. 79-100). Auerbach
algorithm. The Journal of Publications.
Supercomputing, 76(2), 858-875. [60] Govinda, K., & Prasanna, S. (2015, February).
[51] Rajagopal, A., Joshi, G. P., Ramachandran, A., A generic image cryptography based on
Subhalakshmi, R. T., Khari, M., Jha, S., ... & Rubik's cube. In 2015 International
You, J. (2020). A Deep Learning Model Based Conference on Soft-Computing and Networks
on Multi-Objective Particle Swarm Security (ICSNS) (pp. 1-4). IEEE.
Optimization for Scene Classification in [61] Anand Nayyar, Vikram Puri,
Unmanned Aerial Vehicles. IEEE Access, 8, Nhu Gia Nguyen, BioSenHealth 1.0: A Novel
135383-135393. Internet of Medical Things (IoMT) Based
[52] Chakchai So-In, Tri Gia Nguyen, Gia Nhu Patient Health Monitoring System, Lecture
Nguyen: Barrier Coverage Deployment Notes in Networks and Systems. Springer,
Algorithms for Mobile Sensor Networks. 2019
Journal of Internet Technology 12/2017; [62] Prasanna, S., & Narayanan, V. (2017). A
18(7):1689-1699. Novel Approach for Generation of All-Optical
[53] Mubarakali, A., Bose, S. C., Srinivasan, K., OFDM Using Discrete Cosine Transform
Elsir, A., & Elsier, O. (2019). Design a secure Based on Optical Couplers in a Radio-Over-
and efficient health record transaction utilizing Fiber Link. International Journal of Advanced
block chain (SEHRTB) algorithm for health

ISSN: 2393-9516 www.ijetajournal.org Page 68


International Journal of Engineering Trends and Applications (IJETA) – Volume 7 Issue 5, Sep-Oct 2020

Research in Engineering and


Technology, 8(3).
[63] Sanjeevi, P., Prasanna, S., Siva Kumar, B.,
Gunasekaran, G., Alagiri, I., & Vijay Anand,
R. (2020). Precision agriculture and farming
using Internet of Things based on wireless
sensor network. Transactions on Emerging
Telecommunications Technologies, e3978.
[64] Rathi, V. K., Chaudhary, V., Rajput, N. K.,
Ahuja, B., Jaiswal, A. K., Gupta, D., ... &
Hammoudeh, M. (2020). A Blockchain-
Enabled Multi Domain Edge Computing
Orchestrator. IEEE Internet of Things
Magazine, 3(2), 30-36.
[65] Khanna, A., Rodrigues, J. J., Gupta, N.,
Swaroop, A., & Gupta, D. (2020). Local
mutual exclusion algorithm using fuzzy logic
for Flying Ad hoc Networks. Computer
Communications.

ISSN: 2393-9516 www.ijetajournal.org Page 69

You might also like