- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Indoor and Outdoor Localization Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Cooperative Communication and Network Coding
- Image Retrieval and Classification Techniques
- Security in Wireless Sensor Networks
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Image Enhancement Techniques
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Advanced Image and Video Retrieval Techniques
- Wireless Networks and Protocols
- Electric Power System Optimization
- Advanced Image Processing Techniques
- Caching and Content Delivery
- Optimal Power Flow Distribution
- Energy Load and Power Forecasting
- Spam and Phishing Detection
- Advanced Image Fusion Techniques
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2015-2024
SRM University, Andhra Pradesh
2024
Anglia Ruskin University
2016
Indian Institute of Technology Madras
2010
Indian Institute of Technology Indore
2008
Indian Institute of Technology Roorkee
2002
The salient features of cloud computing (such as on-demand self-service, resource pooling, broad network access, rapid elasticity, and measured service) are being exploited by attackers to launch the severe Distributed Denial Service (DDoS) attack. Generally, DDoS attacks in such an environment have been implemented flooding a huge volume (high-rate) malicious traffic exhaust victim servers' resources. Due this traffic, can be easily detected. Thus, getting attracted towards low-rate...
Wireless sensor networks (WSNs) have become one of the essential components Internet Things (IoT). In any IoT application, different sensor-based devices gather data from physical objects and transmit sensed information to base station (BS). The BS analyzes this depending on location. A high-performance intelligent WSNs is for IoT-based application. article, are referred as IoT-enabled WSNs. WSNs, fault occurrence probability much more than traditional networks. Faulty nodes broken links...
The visibility of an image captured in poor weather (such as haze, fog, mist, smog) degrades due to scattering light by atmospheric particles. Single dehazing (SID) methods are used restore from a single hazy image. SID is challenging problem its ill-posed nature. Typically, the model (ATSM) solve problem. transmission and two prime parameters ATSM. accuracy effectiveness depends on accurate value light. proposed method translates estimation into difference between minimum color channel...
Wireless Sensor Networks (WSNs) have become an indistinguishable part of any Internet Things (IoT) based system. In IoT-based system, WSN monitors different physical objects and forwards the collected data to base station or gateway node for further processing. Existing routing protocols designed WSNs are not suitable systems. An intelligent high-performance protocol is essential real-time analysis decision-making. Therefore, this paper proposes a mobile sink-based scheme WSNs. Initially,...
Connected Dominating Set (CDS) problem in unit disk graph has a significant impact on an efficient design of routing protocols wireless sensor networks. In this paper, algorithm is proposed for finding Minimum (MCDS) using Set. Sets are connected by Steiner tree. The goes through three phases. first phase found, second connectors identified, third the CDS obtained pruned to obtain MCDS. MCDS so constructed needs adapt continual topology changes due deactivation node exhaustion battery power....
In 2018, with the internet being treated as a utility on equal grounds clean water or air, underground malicious software economy is flourishing an influx of growth and sophistication in attacks. The use documents has increased rapidly last five years along spectrum They offer flexibility document structure numerous features for attackers to exploit. Despite efforts from industry research communities, this remains viable security threat. paper, broad classification based attacks provided...
The Man-in-the-Middle (MITM) attack on ARP is presently a common and nuisance to the typical LAN environment. This type of MITM brought effect by cache poisoning which achieved using forged packets. mechanism in node poisons table another forcing it send packets destination other than intended one. paper presents feasible solution poisoning, removing inconsistencies from all tables hosts network. uses centralized system Central Server (ACS) manage entries hosts. All network ACS validate...
In the competitive electric power market allowing open access transmission environment, knowledge of available transfer capability (ATC) is very important for optimum utilization existing facility. ATC information conveys how much can be transmitted through network over and above already committed usage without violation system security limits. This paper presents a Levenberg-Marquardt algorithm neural (LMANN)-based approach fast accurate estimation ATC. System has been estimated both...
Cloud computing is a fast-growing and promising technology segment that aims to reduce maintenance management costs by shifting high-quality infrastructure the Internet. It emerging as dominant because it provides an on-demand, self-service, scalable, pay-per-use business model. Despite its numerous benefits, suffers from several security challenges. As consequence of on-demand service, availability resources crucial attribute cloud among necessities. In this work, survey presented on...
Being as an essential component for data communication in disaster management scenario, IoT has evolved the key paradigm to update information consequent nodes. In such scenarios, sensors, equipped with a limited battery, consume lot of energy communication. Therefore, practical realization networks is challenging task routing ignores paths consuming tremendous amount and delay during tree construction multicast routing. This paper proposes improved squirrel search algorithm (SSA) by...
In today's era of digitisation, many technologies have evolved that every manual work can be digitally automatized. the digital automatizing process, security and privacy are most important highly demanding aspects. Blockchain offers features used in almost sphere life. Features like decentralisation, transparency, makes it an extremely useful technology. Therefore, by making use all these features, several problems healthcare sector solved removing complex network third parties lack...
The Industrial Internet of Things (IIoT) uses smart sensors to monitor an industrial environment. These transmit the data through wireless mediums and form Wireless Sensor Networks (WSNs). However, environments are prone accidents like leakage harmful gases, fires, boilers bursting, etc., which is very dangerous for people working there. Existing emergency evacuation systems suffer from low response time, uneven distribution, longer or less safe paths. This paper presents Intelligent...
Virtual machine introspection is a technique used to inspect and analyse the code running on given virtual machine. has gained considerable attention in field of computer security research. In recent years, it been applied various areas, ranging from intrusion detection malware analysis complete cloud monitoring platforms. A survey existing tools necessary address possible research gaps focus key features required for wide application techniques. this paper, we evolution their ability...