14 results on '"Kamlesh Chandravanshi"'
Search Results
2. Predictive machine learning-based integrated approach for DDoS detection and prevention
- Author
-
Solomon Damena Kebede, Basant Tiwari, Vivek Tiwari, and Kamlesh Chandravanshi
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Media Technology ,Software - Published
- 2021
- Full Text
- View/download PDF
3. A Novel Privacy-Preserving and Denser Traffic Management System in 6G-VANET Routing Against Black Hole Attack
- Author
-
Kamlesh Chandravanshi and Dr. Gaurav Soni
- Published
- 2022
- Full Text
- View/download PDF
4. An Efficient Energy Aware for Reliable Route Discovery Using Energy with Movement Detection Technique in MANET
- Author
-
Kamlesh Chandravanshi, Gaurav Soni, and Durgesh Kumar Mishra
- Published
- 2022
- Full Text
- View/download PDF
5. An IPS Approach to Secure V-RSU Communication from Blackhole and Wormhole Attacks in VANET
- Author
-
Arjun Rajput, Mahendra Ku. Jhariya, Gaurav Soni, and Kamlesh Chandravanshi
- Subjects
Scheme (programming language) ,Vehicular ad hoc network ,Network packet ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Swarm behaviour ,Particle swarm optimization ,Task (computing) ,Data exchange ,Routing (electronic design automation) ,business ,computer ,computer.programming_language ,Computer network - Abstract
Vehicles or nodes in Vehicular Ad hoc Network (VANET) are forwarding the traffic information for validation route information. Attacker vehicles are sending false messages of route information and not accepting traffic status packets or data packets. The abnormal behavior of the malicious nodes (Blackhole Attacker) and wormhole attacker is recognized by the reliable security mechanism. This paper proposes an intrusion detection and prevention (IPS) scheme to secure vehicle to RSU (V-RSU) communication from malicious (Blackhole) as well as wormhole attack in VANET. The IPS algorithm is applied to the RSU to recognize the malicious actions of an attacking vehicle by swarm optimization approach. The particle swarm optimization (PSO) confirms the attacker’s presence and delivers effective traffic information. In the proposed IPS scheme, vehicles also receive traffic data from the leading vehicles and also forward traffic information to other vehicles. The traffic data exchange is monitored by RSU to identified malicious actions. The main task of the proposed security system is the effective management of vehicles in the presence of an intruder. Simulation results confirm that the proposed IPS scheme with PSO provides better performance in the presence of both attackers in VANET. The performance of previous IDS, attacker and proposed IPS is measure through performance metrics.
- Published
- 2021
- Full Text
- View/download PDF
6. Security Scheme to Identify Malicious Maneuver of Flooding Attack for WSN in 6G
- Author
-
Gaurav Soni and Kamlesh Chandravanshi
- Subjects
Computer science ,Network packet ,business.industry ,Sensor node ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Bandwidth (computing) ,Overhead (computing) ,Network performance ,Energy consumption ,business ,Wireless sensor network ,Flooding (computer networking) ,Computer network - Abstract
Energy-efficient consumption is essential in sensor networks because sensor node replacement and charging of batteries in some places are not possible, like in heavy flooding areas and areas of expected explosive volcanoes. This paper proposes a new security scheme for flooding attacks in 6G communication for sensor networks. The sensor nodes are also communicating with each other with a high data rate. The Security scheme identified a Malicious Maneuver of Flooding attack (SIMMF) for WSN in the 6G network. The WSN nodes have limited bandwidth. The selection of cluster head (CH) is based on the higher remaining energy, and the rest of the Cluster Members (CM) are transferring information outside the cluster with the help of CH. The 6G data rate is at least ten times faster than the 5G communication. In each group (GCr) having a separate CH and CM. The performance of the LEACH protocol is affected by flooding attacker and proposed SIMMF detect the attacker’s malicious functioning and block its presence. The previous scheme performance is based on the Trust Value (TV), and TV depends on packets receiving at the destination, not on attacker flooding. In 6G communication, there is no bandwidth problem, but attacker infection increases w.r.t time continuously. The SIMMF provides a reliable routing scheme to improve network performance at a minimum energy cost. The minimum energy consumption enhances the possibility of communication, which enhances network lifetime and reduces overhead. SIMMF, TESDA, and flooding attacks are evaluated through performance metrics like energy consumption, overhead, and Unwanted fake data analysis..
- Published
- 2021
- Full Text
- View/download PDF
7. Lung Cancer Detection Using Semantic Based ANN Approach
- Author
-
Chandni Kumari, Kamlesh Chandravanshi, and Gaurav Soni
- Subjects
Oncology ,medicine.medical_specialty ,business.industry ,Internal medicine ,medicine ,business ,Lung cancer ,medicine.disease - Published
- 2018
- Full Text
- View/download PDF
8. A Novel Approach for Super Resolution of Video Frame using Spatially Adaptive Total Variation
- Author
-
Vinod Kumar Banse and Kamlesh Chandravanshi
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Frame (networking) ,Spatially adaptive ,02 engineering and technology ,Superresolution ,020901 industrial engineering & automation ,Variation (linguistics) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business - Published
- 2017
- Full Text
- View/download PDF
9. A Multipath Location based Hybrid DMR Protocol in MANET
- Author
-
Deepak Singh Tomar, Gaurav Soni, Kamlesh Chandravanshi, and Mahendra Kumar Jhariya
- Subjects
Routing protocol ,Dynamic network analysis ,Network packet ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,Network delay ,050301 education ,Mobile ad hoc network ,010501 environmental sciences ,01 natural sciences ,Flooding (computer networking) ,Multipath routing ,business ,0503 education ,Multipath propagation ,0105 earth and related environmental sciences ,Computer network - Abstract
MANET nodes move continuously in a limited area with a random mobility speed. MANET forms a dynamic topology and the nodes only know neighboring nodes if they are within range of the radio. If the nodes are out of range, it is not possible to communicate with this node in the network. Dynamic topology training is also possible in decentralized MANET. The AOMDV routing protocol in MANET establishes several routes between the sender and the receiver. The performance of the multi-route protocol is better than that of the single route protocol. The multiple routes are better by providing multiple routes between the sender and the receiver, but do not retain the location information of the nodes in the network. In this investigation, we proposed DREAM Multipath Routing (DMR) based on the hybrid location in MANET. The DREAM protocol improves the routing performance of multiple routes by maintaining the location information of the mobile nodes. The DREAM protocol reduces the overhead by forwarding packet floods in MANET, which also reduces network delay. The proposed DMR performance is better than normal AOMDV routing. THE DREAM is to keep the location information with the mobility speed of the nodes. The expected possibility of node movement is calculated and flooding of routing packets is also minimized. Package flooding takes place at the intended location of the destination. The position of the number of nodes changes continuously and the DREAM works on each node. Each node stores the location information of all nodes in the neighborhood of the network. The proposed hybrid DMR protocol improves routing performance and offers better data transmission in a dynamic network.
- Published
- 2020
- Full Text
- View/download PDF
10. Prolong the Life time of Network using Minimum Energy Consumption in MANET
- Author
-
Aakanksha Jain, Hitesh KumarRinhayat, and Kamlesh Chandravanshi
- Subjects
Battery (electricity) ,Computer science ,business.industry ,Reliability (computer networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Topology (electrical circuits) ,Mobile ad hoc network ,Energy consumption ,Computer Science::Networking and Internet Architecture ,Wireless ,Network performance ,Routing (electronic design automation) ,business ,Simulation ,Computer network - Abstract
Mobile Ad hoc network (MANET) are self-configuring, individual nodes or routers networks that move about freely, organize themselves randomly and are interconnected through wireless links that when synchronized, form a dynamic topology. The nodes in required battery power for communication and it is very crucial matter to utilize the battery power of nodes efficiently in network. The battery replacement and charging is not possible in that kind of network and the insufficient battery lifetime imposes a limitation on the network performance. To take full utilization of the lifetime of nodes, traffic should be routed in a way that energy consumption is minimized. The energy efficient routing is improves the battery life and routing capability of nodes. In this research we proposed a new energy efficient routing scheme with AODV routing protocol to improve the reliability of data delivery and energy utilization. The proposed scheme is efficiently utilizes the energy of mobile nodes through variation in the energy of nodes on the basis of their radio range in network utilization. It means the nodes are only communicate to nearest neighbor by that the less amount of transmission and receiving energy is required for communication. In this approach the proposer energy utilization and consumption is possible that reduces the improper energy depletion of mobile nodes. The routing performance is measured through performance matrices and the proposed scheme is showing the much better performance as compare to normal energy routing with AODV routing protocol.
- Published
- 2014
- Full Text
- View/download PDF
11. A Novel Defence Scheme Against Selfish Node Attack in Manet
- Author
-
Kamlesh Chandravanshi and Gaurav Soni
- Subjects
Computer science ,Wireless network ,business.industry ,Network packet ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network performance ,Intrusion detection system ,Mobile ad hoc network ,business ,Block (data storage) ,Flooding (computer networking) ,Computer network - Abstract
Security is one of the major issue in wired and wireless network but due to the presence of centralized administration not difficult to find out misbehavior in network other than in Mobile Ad hoc Network due to the absence of centralized management and frequently changes in topology security is one of a major issue in MANET. Only prevention methods for attack are not enough. In this paper a new Intrusion Detection System (IDS) algorithm has proposed against selfish node attack to secure MANET. Here the behavior of selfish node is unnecessary flooding the information in network and block all types of packets transferring between the reliable nodes. Proposed IDS Algorithm identifies the behavior of selfish node and also blocked their misbehavior activities. In case of selfish node attack network performance is almost negligible but after applying IDS on attack network performance is enhanced up to 92% and provides 0% Infection rate from attack.
- Published
- 2013
- Full Text
- View/download PDF
12. A REVIEW ON WIRELESS SENSOR NETWORK FOR ENERGY CONSUMPTION
- Author
-
Deepak Singh Tomar, Kamlesh Chandravanshi, and Shobha Kushwaha
- Subjects
Computer science ,business.industry ,ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMS ,Energy consumption ,business ,Wireless sensor network ,Computer network - Abstract
A wireless sensors network (WSNs) is a collection of a large number of small, spatially distributed, and autonomous devices. These devices are known as sensor nodes. The Advancement in wireless communication leads to develop wireless sensor networks (WSN). It consists of small devices. These devices amass information by coordinating with each other. These tiny devices are known as a sensor node which consists of CPU (for data processing), memory (for data storage), battery (for energy) and transceiver (for receiving and sending signals or information from one node to further). The use of WSN is increasing day by day and at the same instance facing quandary of energy constraints in terms of short battery lifetime. Every node depends on the battery resource for assorted activities; this has becoming a most important concern in wireless sensor networks .so in this paper we are providing issues allied to sink repositioning that help to augment battery life time and also we provided information related to various approach for energy competent wsns.
- Published
- 2016
- Full Text
- View/download PDF
13. Minimization of routing overhead on the bases of multipath and destination distance estimation mechanism under MANET
- Author
-
Kamlesh Chandravanshi and D.K. Mishra
- Subjects
Routing protocol ,Zone Routing Protocol ,Dynamic Source Routing ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Geography ,Optimized Link State Routing Protocol ,Multipath routing ,Destination-Sequenced Distance Vector routing ,business ,Triangular routing ,Computer network - Abstract
Mobile Ad hoc Network (MANET) is a form of mobile hosts or nodes that move in freely in omni-direction with random movement without the need to maintain connectivity with deployed network infrastructure. While two mobile nodes within the radio zone from each other's, than they can communicate and transfer /receives data with each other directly, otherwise, the mobile nodes in between have to forward the route packets for them. In such a case, every mobile node has to function as a router and to forward the packets for others intermediate nodes. Thus, routing is a basic operation for the MANET. In this paper we design combined approach of AOMDV-Dream protocol, the multipath routing strategy balance the load of the network, and Dream protocol for destination location estimation and periodically send location information to the sender for route flood minimization from the network, so that our networks performance can been increases and routing overhead minimize. We take network simulator −2 and analyze the comparatively study about AOMDV as well as AOMDV-Dream protocol.
- Published
- 2016
- Full Text
- View/download PDF
14. Intrusion Detection System for Wireless Ad-hoc network
- Author
-
Akrosh Tiwari, Mukesh Bathre, and Kamlesh Chandravanshi
- Subjects
Host-based intrusion detection system ,Key distribution in wireless sensor networks ,Wireless intrusion prevention system ,Computer science ,business.industry ,Wireless ad hoc network ,Intrusion detection system ,Intrusion prevention system ,business ,Computer network - Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.