Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ali Hussain, Mohammed
- Deployment of Mobile Ad-hoc Network Ticket Based QoS Routing Protocol for Healthcare
Abstract Views :204 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Mobile Ad Hoc Networks are dynamic and are capable of operating in hostile environments. Research in direction of QoS (Quality of Service) is most prerequisite issue. The motivation behind this paper is to address QoS directing in a MANET domain. Our major work focused on ticket-based routing to improve Qos in MANETs.Keywords
AODV, Delay, MANETs, Ticket Based Routing and Flooding, QoS- A Hybrid Scheme based on Big Data Analytics using Intrusion Detection System
Abstract Views :217 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Andhra Loyola Institute of Engineering College, Vijayawada - 520008, Andhra Pradesh, IN
1 Department of CSE, Andhra Loyola Institute of Engineering College, Vijayawada - 520008, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
Objective: Network security plays a key role for many organizations. Host based and network based Intrusion Detection Systems are available in the market depending upon the detection technology used by them. The objective of this research paper is maintaining security across the heterogeneous data from homogeneous sources and co-relating the heterogeneous data from different sources using hybrid strategy. Methods/Statistical Analysis: A real time detection Intrusion Prevention Systems (IPS), prevents security intrusions by gathering and composing with technologies. Findings: Heterogeneous data from different sources has been collected from KDD Cup Dataset and segregated into learning phase and detection phase. In the learning phase, known attacks will be identified. Similarly detection phase also will consider the same. Applications/Improvements: The proposed system specifies a set of rules and high DoS, R2L, U2R, Probe. One may attempt to get good results by improving the efficiency and reducing the complexity present in the model. In future several reduction techniques may be studied to get more features.Keywords
Big-Data, Host Based, IDS, Network Based, Security.- Survey on Reactive Medium Access Control Mechanism for Peer to Peer Heterogeneous Multi Hop Networks
Abstract Views :144 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, Andhra Loyola Institute of Engineering and Technology, Vijayawada - 520008, Andhra Pradesh, IN
1 Department of Computer Science, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of CSE, Andhra Loyola Institute of Engineering and Technology, Vijayawada - 520008, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 33 (2016), Pagination:Abstract
Based on the functionality, wireless multi-hop network (MANETs) can be divided as mobile ad hoc networks, wireless mesh networks (WSN). WSN is similar to MANETs with the application of monitoring, and it is an extension of infrastructure based single-hop wireless network technology. However, these multi-hop technologies have its applications and limitations depending on their implementation and operation. Analysis: In this work our primary focus is to review the current work on developed reactive MAC protocol for multiple -beam smart –antennas in MANETs and WMNs and secondly focus to review the current work on developed efficient and reliable MAC methods for wireless multi-hop networks. Findings: Based on our analysis we find the method to describe the Medium Access Control Problems for Reliable Data Communication. Application: This work is used to develop reactive medium access control mechanism for peer to peer heterogeneous multi hop networks.Keywords
Antennas, MANETs, Medium Access Control, Multi Hop Network, WSNs.- Implementing Privacy Homomorphism in Data Aggregation for Wireless Sensor Networks
Abstract Views :258 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, KL University, Vijayawada - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 10, No 4 (2017), Pagination:Abstract
Objective: To design and implement a methodology to achieve privacy and security of data in Wireless Sensor Network (WSN) through malleability resilient concealed data aggregation protocol. Analysis: The aim of concealed collection of data in WSN is to provide privacy preservation of the data at both Intermediate Nodes (IN) and at Base Stations (BS) while aiding in-network data aggregation. The data aggregation which can be executed using privacy homomorphism at both INs and BS and is naturally malleable as the encrypted data was processed at INs without decrypting. Hence it is dreadful challenge to recognize constraints like point-to-point privacy and integrity in carrying out the aggregation. Methodology: In this paper, for protecting against passive and active adversaries in the network we propose a malleability resilient concealed data aggregation protocol. The proposed protocol protects the data from the opposing targets like privacy at both IN and at base station, point-to-point integrity, point-to-point privacy, replay protection, and aggregation. Findings/ Improvements: The major contribution of the proposed scheme verifies freshness of the data before performing encrypted data at INs as well as at BS. It also protects the data from the insider attacks as well as the outside. Thus, the protocol improves the privacy homomorphism of the data and verification of data freshness continuously at INs and also at BS.Keywords
Concealed Data Aggregation, Malleable, Privacy Homomorphism, Point-to-Point Privacy, Point-to-Point Integrity, Secure Data Aggregation, Wireless Sensor Networks- Image Encryption using Edge Map and Key Image
Abstract Views :226 |
PDF Views:0
Authors
Affiliations
1 Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, IN
1 Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, IN