Umashankar Ghugar

Umashankar Ghugar
Verified
Umashankar verified their affiliation via an institutional email.
Verified
Umashankar verified their affiliation via an institutional email.
  • B.E(IT),M.Tech,PhD(Computer Science)
  • Professor (Associate) at Chandigarh University

About

52
Publications
14,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
241
Citations
Current institution
Chandigarh University
Current position
  • Professor (Associate)
Additional affiliations
September 2023 - February 2025
OP JINDAL UNIVERSITY
Position
  • Assistant Professor( Sr. Grade)

Publications

Publications (52)
Article
There has been a significant paradigm shift from wired to wireless technology in in-vehicular networks. This shift is driven by the need for greater scalability, cost-effectiveness, and flexibility. In the automotive industry, traditional wired protocols such as the Local Interconnect Network (LIN) and Media Oriented Systems Transport (MOST) for no...
Article
Full-text available
In today's world, maintaining good health has become increasingly paramount. The global prevalence of diabetes has surged due to the stress of modern life and unhealthy dietary habits. Detecting diabetes at an early stage has become imperative. Leveraging advancements in Cloud and Fog computing, we can create an Internet-enabled Medical Fog framewo...
Article
Full-text available
In the communication model of the OSI layer, the Media access control (MAC) layer has been given higher priority than other layers. It is a sub-layer of the data link layer, mainly controlling the physical equipment and interacting with the channels over the Internet of Things (IoT) sensor nodes. Mac layers have used two protocol types: contention-...
Article
Full-text available
Internet of Things applications that employ wireless sensor networks (WSNs) most often experience packet loss, delays, and sensor node battery drain. Random cluster head selection, malicious node security flaws, and scalability issues in larger networks cause LEACH (Low-Energy Adaptive Clustering Hierarchy) to use energy unequally. Cluster maintena...
Article
Full-text available
The increasing prevalence of Blackhole attacks in Wireless Sensor Networks (WSNs) necessitates advanced and robust detection mechanisms. This paper presents the DLTIDS (Dual-Layer Trust-Based Intrusion Detection System), a sophisticated approach designed to counteract Blackhole attacks by leveraging a trust-based framework. DLTIDS integrates two la...
Chapter
The digitization of healthcare systems has led to a rise in healthcare fraud, posing significant financial and patient safety risks. Data science techniques like predictive analytics and machine learning are essential for detecting patterns and anomalies in healthcare data, allowing for the identification of fraudulent activities. These techniques...
Article
Full-text available
The increasing prevalence of Blackhole attacks in Wireless Sensor Networks (WSNs) necessitates advanced and robust detection mechanisms. This paper presents the DLTIDS (Dual-Layer Trust-Based Intrusion Detection System), a sophisticated approach designed to counteract Blackhole attacks by leveraging a trust-based framework. DLTIDS integrates two la...
Article
Full-text available
Blockchain technology uses a secure and decentralised framework for transaction management and data sharing within supply chains. This is particularly crucial in the pharmaceutical industry, where product authenticity and traceability are paramount. Blockchain plays a pivotal role in preventing product loss and counterfeiting, while simultaneously...
Article
Full-text available
Network security is significantly impacted by the difficult task of securing Internet of Things (IoT) ecosystems. Strong security protocols must be developed in order to protect the communication networks that link Internet-connected IoT devices. Compared to earlier networks, modern networks have a greater variety of communication protocols, standa...
Article
Full-text available
The surging demand for electricity, propelled by the widespread adoption of intelligent grids and heightened consumer interaction with electricity demand and pricing, underscores the imperative for precise prognostication of optimal power plant utilization. To confront this challenge, a dataset centered on issue-centric power plans is meticulously...
Chapter
Artificial intelligence (AI) can enhance operational procedures by utilizing data, advanced algorithms, and faster computational abilities. These technologies, such as robotics, machine learning, and IoT, are increasingly prevalent in modern life. They learn, adapt, and improve based on their interactions with the environment and data. This chapter...
Article
Full-text available
The demand for vehicular networks is prolifically emerging as it supports advancing in capabilities and qualities of vehicle services. However, this vehicular network cannot solely carry out latency-sensitive and compute-intensive tasks, as the slightest delay may cause any catastrophe. Therefore, fog computing can be a viable solution as an integr...
Chapter
This chapter discusses the potential of intelligent engineering applications in contributing to sustainable development efforts. The chapter highlights how these technologies can optimize energy efficiency, reduce waste, and enhance the sustainability of manufacturing processes and infrastructure systems. In addition, the acknowledges that implemen...
Patent
Full-text available
Exemplary embodiments of the present disclosure are directed towards a sign language recognition system, comprising a computing device comprising a camera, includes a sign language recognition module operatively connect with a processing device, the camera configured to enable a user to provide visual input, the processing device configured to perf...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) have raised serious concerns in recent years regarding network connectivity. Multiple attacks occur during network communication, disrupting efficient operation, data flow, and data transmission. Using a trust-based management system, we have proposed an intrusion detection system (IDS) for transport layer threats. I...
Chapter
Full-text available
Wireless Sensor Network (WSN) security is an important aspect in the world. Day to day, unauthorized access has been increasing during the network transmission process. Numbers of researchers have developed a model for detecting those attacks. But, it is not sufficient to solve the security issues. Basically, attacks hamper at the network results i...
Preprint
Full-text available
In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks...
Article
Full-text available
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoo...
Article
Full-text available
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smo...
Article
Full-text available
Over the first few years, a wireless sensor network has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. Wormhole attack is one of the severe attacks, which is smoothly resolved...
Article
Full-text available
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WS...
Chapter
Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a p...
Article
In this paper, a physical layer trust based intrusion detection system (PL-IDS) is proposed to calculate the trust for wireless sensor networks (WSNs) at the physical layer. The trust value of sensor node is calculated as per the deviation of key factors at the physical layer. The proposed scheme is effective to identify the abnormal nodes in WSNs....
Article
Full-text available
This paper looks at how to tackle with the new trend of complexity in IT infrastructure; security professionals are putting immense effort to transform vulnerability management in capable to tackle risk. The main goal of this study is to modify traditional pattern and adopt the required-modern approach of vulnerability management. This approaches w...
Conference Paper
Full-text available
Black hole attack is one of the possible attacks in WSN. In black hole attack a malicious node sends the RREP (Route Replay) message to the source node as a shortest path to the destination node then the sender node send a data packet b to the malicious node in the network. Finally the malicious node drop the entire data packet instead of forward i...
Article
Full-text available
Wireless Sensor Networks (WSN) has wide application in data gathering and data transmission as per the user's requirement and it consist of number of nodes. These nodes have limited battery power, limited resources and limited computational power .Due to all these factors, WSN faces more security threats. Security issues are a vital problem to be s...
Article
Full-text available
The present day is demanding more and more quality of service in broadband group communication to support huge access of internet service and multimedia application. The core based solution is able to full fill this demand a lot. In this paper effort has been put to make it more flexible in comparison to SPAN/COST through a new approach which can b...

Questions

Question (1)
Question
Actually i want build a IDS for Wormhole attacks in WSN.

Network

Cited By