Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mahajan, Manish
- A Novel Security Approach for Data Flow And Data Pattern Analysis To Mitigate DDOS Attacks In VANETs
Abstract Views :114 |
PDF Views:0
Authors
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 562-568Abstract
The VANET security is an important issue with the rise of the automatically driven vehicle based technologies. The automatically driven vehicle based clusters are programmed for each vehicle to run individually by coordinating with all of the other nodes in the VANET cluster. The proposed model has been designed to detect and mitigate the DoS and DDoS attacks in the VANET clusters to avoid any of the misbehavior or mis-happening in the form of VANET node failure, collision or in any other form. The DDoS attack prevention algorithm works as the real time attack detection and overhead data filtering algorithm in order to protect against the DoS and DDoS attacks. The proposed model result has been obtained on the basis of network load, throughput, packet delivery ratio, etc. The experimental results have proved the efficiency of the proposed model in comparison with the existing models.Keywords
VANET Security, Denial of Service, Distributed Denial of Service, Resource Unavailability Attacks.- Protection Against DDOS Using Secure Code Propagation in the VANETs
Abstract Views :112 |
PDF Views:0
Authors
Source
Research Cell: An International Journal of Engineering Sciences, Vol 17, No 1 (2016), Pagination: 573-577Abstract
VANETs are the vehicular networks used to connect the vehicles together to share their information with each other in the cluster. The hackers are used to attack VANETs with various means of attacks. Many security techniques are used to mitigate the risks caused by the attacks to cause ill-effects to the traffic movement on the roads. VANETs are also being used for the automatically driven vehicles in the controlled environments. Whereas the human vehicles use the VANETs for extra facility, the automatically driven vehicles completely depend upon the VANETs. Any incursion in the VANETs by hackers can cause major accidents or traffic chaos. A popular technique known as prankster attack is used by militants to plot attacks to cause more damage as possible or by selfish drivers to make their way clear. In this paper, we have proposed a strong security framework to mitigate threats caused by DDoS attack by using road side traffic management unit (RTMU). The RTMU is using various mathematical computations for traffic pattern analysis to detect the abnormality in data traffic between the cluster nodes. All of the nodes in the scenario are GPS location aware nodes and sharing their location actively with RTMU. Also all of the VANET nodes communicate with each other through RTMU. The results have shown the effectiveness of the proposed model to mitigate the DDoS attack and facilitate smooth traffic movement.Keywords
VANET Security, DDoS, Road Side Unit, Network Traffic Analysis, and VANET Resource Unavailability Attacks.- A Novel Technique for Data Embedding Using Visual Saliency Map
Abstract Views :154 |
PDF Views:2
Authors
Affiliations
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering., SGGSWU, Fatehgarh Sahib, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering., SGGSWU, Fatehgarh Sahib, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 6 (2012), Pagination: 200-223Abstract
Steganography is a technique in which secret message is hidden in some media like image file, audio file or video file. The objective of the steganography is to prevent the unauthorized user to estimate that certain secret communication is going on by concealing the very existence of secret message. As it is clear this thing involves deceiving the human visual system (HVS) to get an impression that some secret message is hidden in image or some other media file. Saliency model is one of the methods that generate a map corresponding to the attention region of Human Visual System. So Human Visual System (HVS) is a point of interconnection between two concepts - Steganography and Saliency Map. In this work we represent a method for data hiding in images based on saliency map.Keywords
Saliency Map, Wavelet Domain, Model Based Steganography, Imperceptibility.- Human Eye Deceiving Model for Secret Communication
Abstract Views :98 |
PDF Views:4
Authors
Affiliations
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering, Chandigarh Engineering College, Landran, Mohali, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN
1 Punjab Technical University, Kapurthala, IN
2 Department of Computer Science Engineering, Chandigarh Engineering College, Landran, Mohali, IN
3 Department of Information Technology, Chandigarh Engineering College, Landran, Mohali, IN