About
52
Publications
9,020
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
437
Citations
Introduction
Publications
Publications (52)
p>This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in mobile ad hoc networks (MANETs). However, identifying attackers in such networks is a complicated task due to malicious nodes providing optimistic, forward-looking optimist...
A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes without the use of pre-existing infrastructure. They face challenges of security, routing efficiency, and network stability due to dynamic topology and limited resources. The Black Hole Attack on MANETs is a critical concern, affecting communication reliability. This mali...
With the notable increase for utilization of the Internet technologies and application and fast growing of Internet and network communication technologies also given the rise to attacks and risk for network communication. Network attack analysis and detection are the active areas of research in the cybersecurity and networking community. Nowadays,...
Internet of Things (IoT) has changed the way of living today. Today, Internet connected things (ICT) are increasing at a rapid rate and connecting with devices to reduce load from human being. Irrespective of the sector, the IoT devices are everywhere taking care of everything from the agriculture sector to the sector of manufacturing. But, due to...
Congestion is the biggest problem for all kind of communication network. When multiple users send the data or packets to each other in a network then traffic of data/packets increases in a network then congestion problem occur. To solve the congestion problem, use routing protocols and machine learning techniques. Mobile Ad hoc Network (MANET) asso...
In this paper, different types of attacks and their malicious act behind the scenes are presented. The solutions to defend the victim against attacks are given. In today’s scenario when hackers typing away incessantly on keyboards, juggling multiple computers to take down a group of individuals, the user needs to focus on identification and solutio...
This paper focuses on face recognition and automatic mail generated system for observations by using a solitary camera. The application is created for detection and capturing the face, which can be applicable in surveillance system at border gateway. The camera is fixed for human face identification. A framework that perceives human information is...
This paper proposes Combining the Advantages of Radiomic features based Feature Extraction and Hyper Parameters tuned Recalling Enhanced Recurrent Neural Network (RERNN) using Lizard optimization Algorithm (LOA) for Breast cancer Classification. Here, breast cancer images are taken from the real time dataset collected from VPS hospital and then the...
The banking and financial service sector has understood the advantages of blockchain technology. This chapter explores the tremendous impact, implementation challenges, and ground-breaking potential of the blockchain technology in these organizations. The blockchain is a powerful technology that enables Bitcoin, Litecoin, Ethereum, and many more cu...
Software Defined Network (SDN) has provided a more flexible approach in setting up a network between applications and the underlying forwarding devices. This technological shift from traditional network to SDN has a big impact on breaking network vendor's monopoly. SDN is a novel approach that tends to address the shortcomings of traditional networ...
Containers, Dockers, and Software Defined Networks are one of the prominent topics in the market these days. In a wish to cater to new business needs of containers with clouds and linking all it to SDN gives promising results. To solve various issues like multiple located branch networks, high cost, technical resources required at each location, ex...
In today's wireless network environment Intrusion Detection System (IDS) is essential critical security components. In Intrusion detection anomaly detection drives attention of researchers. Anomaly detection requires increased accuracy and detection rate. On other hand, anomaly detection need reduce false alarm rate which is inability of system to...
With the rapid growth in the network, a demand for more flexible and secure technology of network programmability is increasing. With the introduction of technology like SDN, a new platform for communication evolved which is free from traditional network barriers like vendor lock-ins, limited scope for innovation, buggy software, etc. No doubt, SDN...
In rapid change with technology a huge development of robots is competing equally with humans. The technology development has brought many changes in the field of manufacturing and research. Initially, the robots were used by humans to make their work easier, but today the robots are developed to replicate humans and substitute the labor in the fie...
Today there are extraordinary attacks on all kind of networks. Security for Payload is considered one of the biggest agenda for all kind of organizations. To deal with new species if attacks like threat, which are blended in nature, no security platform can take guarantee for their intrusion protection. Among all security platforms, intrusion detec...
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed infrastructure, where each node plays a role of the router. There are not any centralize control to handle the routing process of network, due to the dynamic tropology and infrastructure less network the network is vulnerable to various kinds of attacks. Theref...
The Lack of infrastructure makes secured data distribution, challenging task in Wireless Sensor Networks (WSNs). In traditional routing methods, either security or routing optimization is addressed separately; however, both are not addressed at similar instances. Hence, if there exists a bottleneck while handling security or routing, where either o...
Cloud computing paradigm has been gaining popularity day by day. This is because of the enormous benefits it offers to the user or provider. The upfront cost of setting up a business is greatly reduced by adopting the required delivery models such as platform, software or application as service. In terms of storage, it provides formidable redundanc...
Communication in Mobile Ad hoc (MANETS) networks for end-to-end delivery of packets is achieved cooperatively. This model assumes that an intermediary node will always forward traffic originating from other nodes willingly, other than traffic emanating from the node itself. Conversely, in hostile environments where we find most applications of our...
Emergence of cloud computing has impacted infrastructure architectures, software delivery and development models and the business models. It moves computing and data away from desktop and portable PCs into large data centers. Advancements from client server computing to grid computing, distributed computing and utility computing has finally led to...
Researchers have found the good solutions to manage their resources in education using cloud computing. In the
present scenario, the economic crisis is one biggest problem in the world. The Cloud computing is an emerging new
computing paradigm for delivering computing services. This computing approach relies on a number of existing
technologies , e...
In this paper the application spectrum of wireless ad hoc network is a typical battle field monitoring system for the public safety purpose and military sector where the sensor network simulator architecture is used to provide support for sensing capabilities in network nodes for different mobility conditions. Rayleigh and Rician fading (K=3) model...
Ad hoc networks prove to be challenging networks for communication due to its resource constrained nature and frequent changes in the network topology. Though a lot of research has been going on in the various parts of the world for optimization of communications in the ad hoc networks. The application spectrum of ad hoc networks includes commercia...
Routing protocols play crucial role in determining performance parameters such as packetdelivery fraction, end to end (end 2 end) delay, packet loss etc. of any ad hoc communicationnetwork. In this paper the performance of DSDV protocol in sensor network of randomlydistributed static nodes with mobile source and sink nodes is investigated for sourc...
Routing protocols play crucial role in determining performance parameters such as throughput parameter, packet delivery fraction, end to end (end 2 end) delay, packet loss etc. of any ad hoc communication network. In this paper the performance of DSR protocol in sensor network of randomly distributed static nodes with mobile source node is investig...
UP). 3 Professor, Department of Computer Science, MNNIT, Allahabad (UP). Different types of wireless adhoc networks can be designed by the number of nodes participating in the network, the mobility pattern of nodes, the traffic demands of nodes etc. Different types of adhoc networks have different requirements on the performance of their routing pr...
Ad hoc network is a collection of nodes which move independently and freely to communicate with other node through wireless links. These networks are logically represented as a set of clusters by grouping nodes which are in close proximity with one another. Clusterheads form the backbone and this clusterhead is used to route packets from one node t...