CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Proposal of an Intelligent Surveillance Algorithm for Scatternet Network

by R. Kanthavel, R. Dhaya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 6
Year of Publication: 2012
Authors: R. Kanthavel, R. Dhaya
10.5120/6110-8346

R. Kanthavel, R. Dhaya . Proposal of an Intelligent Surveillance Algorithm for Scatternet Network. International Journal of Computer Applications. 43, 6 ( April 2012), 37-42. DOI=10.5120/6110-8346

@article{ 10.5120/6110-8346,
author = { R. Kanthavel, R. Dhaya },
title = { Proposal of an Intelligent Surveillance Algorithm for Scatternet Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 6 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number6/6110-8346/ },
doi = { 10.5120/6110-8346 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:44.765379+05:30
%A R. Kanthavel
%A R. Dhaya
%T Proposal of an Intelligent Surveillance Algorithm for Scatternet Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 6
%P 37-42
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Bluetooth, a short range communication technology to replace peripheral cables, has grown steadily and includes a variety of wireless applications. The Bluetooth protocol operates on a wide variety of mobile and wireless devices and is nearly present everywhere. Several attacks exist that successfully target and exploit Bluetooth enabled devices. This paper presents the design of a network intrusion detection system using Bluetooth scatternet for discovering malicious traffic for surveillance. Several Bluetooth enabled devices are internet worked to form scatternet and developing the secure network is an important issue in the scatternet formation. This paper also proposes an Intelligent Surveillance algorithm (ISA) to make the scatternet network secure. The aim of the proposed network is to present a security integrated system that ensures the detection of the intruder which enters the scatternet network. The experimental results show that the system can significantly improve the overall security of the scatternet network.

References
  1. T. Hodes, M. Newman, S. McCanne, R. Katz, J. Landay. 1998. Shared Remote Control of a Video Conferencing Application: Motivation,Design, and Implementation. SPIE Multimedia Computing and Networking (MMCN. vol. 3654. 17-28.
  2. B. Myers, H. Stiel, and R. Gargiulo. 1998. Collaboration Using Multiple PDAs Connected to a PC. Proceedings CSCW'98: ACM Conference on Computer-Supported Cooperative Work. 285-294.
  3. M. Roesch. 1999. SNORT - lightweight intrusion detection for networks. In 13th LISA Conference.
  4. Juha T. Vainio. 2000. Bluetooth Security. , Helsinki University of Technology.
  5. J. Anderson. 2001. Computer security threat monitoring and surveillance. James P. Anderson Co. , Tech. Report.
  6. C. Law and K. Y. Siu,. 2001. A Bluetooth Scatternet Formation Algorithm. IEEE Symposium on Ad Hoc Wireless Networks. 3519-3522.
  7. . Jennifer Bray and Charles F Sturman. 2001. Bluetooth: Connect Without Cables. Prentice Hall.
  8. Satyajit Chakrabarti. 2002. Bluetooth Scatternet Formation and Internetworking with 802. 11 and GPRS . University of Kalyani. 1-109.
  9. G. Tan and J. Guttang. 2002. A locally coordinated scatternet Scheduling Algorithm. In the 27th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, Florida. 1-11.
  10. Chakrabarti, Liyun Wu , Son Vuong, Victor C. M. Leung. 2004. A Remotely Controlled Bluetooth Enabled Environment. Satyajit University of British Columbia Vancouver, Canada. 77-81.
  11. Mahtab Hossain A. K. M. and Wee-Seng Soh. 2007. A comprehensive study of bluetooth signal parameters for localization. IEEE Symposium on Personal, Indoor and Mobile Radio Communications. 1-5.
  12. Karen Scarfone and John Padgette. 2008. Guide to Bluetooth Security (Draft). NIST Special Publication 800-121. 2008. 1-43.
  13. MAJ Terrence Oconnor, Dr. Douglas reeves. 2008. Bluetooth network-based misuse detection. Annual computer security applications conference. IEEE Computer Society. 377-391.
  14. Barrales-Guadarrama R. ,Rodri? guez-Rodri? guez M. E. , Barrales-Guadarrama V. R. and Mocholi? -Salcedo A. 2010. A Bluetooth Development platform for Wireless Sensors. IEEE Conference on Electronics, Robotics and Automotive Mechanics (CERMA). 213-219.
  15. Guotao Zhao, Huadong Ma, Yan Sun, Hong Luo and Xufei Mao. 2011. Enhanced surveillance platform with low-power wireless audio sensor networks. IEEE Symposium on World of Wireless, Mobile and Multimedia Networks . 1-9.
  16. Han Bin. 2011. Research of Cluster based Intrusion deduction system in Wireless Sensor Networks. IEEE Conference on Internet Technology and Applications. 1-4.
  17. Ishiguro K. and Runhe Huang. 2011. Implementation of a Wireless Communication technology based home Security System. IEEE Conference on Computer Research and Development. 394-398.
  18. Trinh Minh Tri, Gatica-Perez and Daniel. 2011. Contextual Grouping: Discovering Real-Life Interaction Types from Longitudinal Bluetooth Data. IEEE Conference on Mobile Data Management. 256-265.
Index Terms

Computer Science
Information Sciences

Keywords

Piconet Scatternet Surveillance Intelligence Algorithm