• Home
  • Khushboo Tripathi
Khushboo Tripathi

Khushboo Tripathi

About

52
Publications
9,020
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
437
Citations

Publications

Publications (52)
Article
Full-text available
p>This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimist...
Article
Full-text available
A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes without the use of pre-existing infrastructure. They face challenges of security, routing efficiency, and network stability due to dynamic topology and limited resources. The Black Hole Attack on MANETs is a critical concern, affecting communication reliability. This mali...
Chapter
With the notable increase for utilization of the Internet technologies and application and fast growing of Internet and network communication technologies also given the rise to attacks and risk for network communication. Network attack analysis and detection are the active areas of research in the cybersecurity and networking community. Nowadays,...
Chapter
Full-text available
Internet of Things (IoT) has changed the way of living today. Today, Internet connected things (ICT) are increasing at a rapid rate and connecting with devices to reduce load from human being. Irrespective of the sector, the IoT devices are everywhere taking care of everything from the agriculture sector to the sector of manufacturing. But, due to...
Chapter
Congestion is the biggest problem for all kind of communication network. When multiple users send the data or packets to each other in a network then traffic of data/packets increases in a network then congestion problem occur. To solve the congestion problem, use routing protocols and machine learning techniques. Mobile Ad hoc Network (MANET) asso...
Chapter
In this paper, different types of attacks and their malicious act behind the scenes are presented. The solutions to defend the victim against attacks are given. In today’s scenario when hackers typing away incessantly on keyboards, juggling multiple computers to take down a group of individuals, the user needs to focus on identification and solutio...
Chapter
This paper focuses on face recognition and automatic mail generated system for observations by using a solitary camera. The application is created for detection and capturing the face, which can be applicable in surveillance system at border gateway. The camera is fixed for human face identification. A framework that perceives human information is...
Article
Full-text available
This paper proposes Combining the Advantages of Radiomic features based Feature Extraction and Hyper Parameters tuned Recalling Enhanced Recurrent Neural Network (RERNN) using Lizard optimization Algorithm (LOA) for Breast cancer Classification. Here, breast cancer images are taken from the real time dataset collected from VPS hospital and then the...
Chapter
The banking and financial service sector has understood the advantages of blockchain technology. This chapter explores the tremendous impact, implementation challenges, and ground-breaking potential of the blockchain technology in these organizations. The blockchain is a powerful technology that enables Bitcoin, Litecoin, Ethereum, and many more cu...
Chapter
Software Defined Network (SDN) has provided a more flexible approach in setting up a network between applications and the underlying forwarding devices. This technological shift from traditional network to SDN has a big impact on breaking network vendor's monopoly. SDN is a novel approach that tends to address the shortcomings of traditional networ...
Article
Containers, Dockers, and Software Defined Networks are one of the prominent topics in the market these days. In a wish to cater to new business needs of containers with clouds and linking all it to SDN gives promising results. To solve various issues like multiple located branch networks, high cost, technical resources required at each location, ex...
Research
In today's wireless network environment Intrusion Detection System (IDS) is essential critical security components. In Intrusion detection anomaly detection drives attention of researchers. Anomaly detection requires increased accuracy and detection rate. On other hand, anomaly detection need reduce false alarm rate which is inability of system to...
Chapter
With the rapid growth in the network, a demand for more flexible and secure technology of network programmability is increasing. With the introduction of technology like SDN, a new platform for communication evolved which is free from traditional network barriers like vendor lock-ins, limited scope for innovation, buggy software, etc. No doubt, SDN...
Conference Paper
Full-text available
In rapid change with technology a huge development of robots is competing equally with humans. The technology development has brought many changes in the field of manufacturing and research. Initially, the robots were used by humans to make their work easier, but today the robots are developed to replicate humans and substitute the labor in the fie...
Article
Full-text available
Today there are extraordinary attacks on all kind of networks. Security for Payload is considered one of the biggest agenda for all kind of organizations. To deal with new species if attacks like threat, which are blended in nature, no security platform can take guarantee for their intrusion protection. Among all security platforms, intrusion detec...
Article
Full-text available
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed infrastructure, where each node plays a role of the router. There are not any centralize control to handle the routing process of network, due to the dynamic tropology and infrastructure less network the network is vulnerable to various kinds of attacks. Theref...
Article
Full-text available
The Lack of infrastructure makes secured data distribution, challenging task in Wireless Sensor Networks (WSNs). In traditional routing methods, either security or routing optimization is addressed separately; however, both are not addressed at similar instances. Hence, if there exists a bottleneck while handling security or routing, where either o...
Chapter
Cloud computing paradigm has been gaining popularity day by day. This is because of the enormous benefits it offers to the user or provider. The upfront cost of setting up a business is greatly reduced by adopting the required delivery models such as platform, software or application as service. In terms of storage, it provides formidable redundanc...
Conference Paper
Full-text available
Communication in Mobile Ad hoc (MANETS) networks for end-to-end delivery of packets is achieved cooperatively. This model assumes that an intermediary node will always forward traffic originating from other nodes willingly, other than traffic emanating from the node itself. Conversely, in hostile environments where we find most applications of our...
Conference Paper
Emergence of cloud computing has impacted infrastructure architectures, software delivery and development models and the business models. It moves computing and data away from desktop and portable PCs into large data centers. Advancements from client server computing to grid computing, distributed computing and utility computing has finally led to...
Conference Paper
Full-text available
Researchers have found the good solutions to manage their resources in education using cloud computing. In the present scenario, the economic crisis is one biggest problem in the world. The Cloud computing is an emerging new computing paradigm for delivering computing services. This computing approach relies on a number of existing technologies , e...
Article
Full-text available
In this paper the application spectrum of wireless ad hoc network is a typical battle field monitoring system for the public safety purpose and military sector where the sensor network simulator architecture is used to provide support for sensing capabilities in network nodes for different mobility conditions. Rayleigh and Rician fading (K=3) model...
Conference Paper
Full-text available
Ad hoc networks prove to be challenging networks for communication due to its resource constrained nature and frequent changes in the network topology. Though a lot of research has been going on in the various parts of the world for optimization of communications in the ad hoc networks. The application spectrum of ad hoc networks includes commercia...
Article
Full-text available
Routing protocols play crucial role in determining performance parameters such as packetdelivery fraction, end to end (end 2 end) delay, packet loss etc. of any ad hoc communicationnetwork. In this paper the performance of DSDV protocol in sensor network of randomlydistributed static nodes with mobile source and sink nodes is investigated for sourc...
Article
Full-text available
Routing protocols play crucial role in determining performance parameters such as throughput parameter, packet delivery fraction, end to end (end 2 end) delay, packet loss etc. of any ad hoc communication network. In this paper the performance of DSR protocol in sensor network of randomly distributed static nodes with mobile source node is investig...
Article
Full-text available
UP). 3 Professor, Department of Computer Science, MNNIT, Allahabad (UP). Different types of wireless adhoc networks can be designed by the number of nodes participating in the network, the mobility pattern of nodes, the traffic demands of nodes etc. Different types of adhoc networks have different requirements on the performance of their routing pr...
Article
Full-text available
Ad hoc network is a collection of nodes which move independently and freely to communicate with other node through wireless links. These networks are logically represented as a set of clusters by grouping nodes which are in close proximity with one another. Clusterheads form the backbone and this clusterhead is used to route packets from one node t...

Network

Cited By