Jeril Kuriakose | St. John College of Engineering and Technology, Palghar (original) (raw)

Uploads

Papers by Jeril Kuriakose

Research paper thumbnail of Invalidating Vulnerable Broadcaster Nodes Using Maximum Likelihood Expectation

International Journal of Research in Engineering and Technology, 2014

Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem ... more Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in localization. We were able to attain a considerable reduction in the error achieved during localization. For implementation purpose we simulated our scheme using ns-3 network simulator.

Research paper thumbnail of A Comparative Review of Moveable Sensor Location Identification

International Journal of Robotics Applications and Technologies, 2015

Research paper thumbnail of Assessing the Severity of Attacks in Wireless Networks

Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, 2016

Research paper thumbnail of Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2015

Research paper thumbnail of Confiscation of Malicious Anchor Nodes in Wireless Sensor Networks

Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering t... more Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in identifying malicious or cheating anchor nodes during localiza...

Research paper thumbnail of Attacks that Downturn the Performance of Wireless Networks

2015 International Conference on Computing Communication Control and Automation, 2015

Research paper thumbnail of A survey on localization of Wireless Sensor nodes

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Research paper thumbnail of A review on host vs. Network Mobility (NEMO) handoff techniques in heterogeneous network

Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, 2014

Research paper thumbnail of A Comparative Analysis of Mobile Localization and its Attacks

Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '14, 2014

ABSTRACT

Research paper thumbnail of A Review on Localization in Wireless Sensor Networks

Advances in Intelligent Systems and Computing, 2014

Research paper thumbnail of A novel approach to naval architecture using 1G VLAN with RSTP

2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014

Research paper thumbnail of A Review on Mobile Sensor Localization

Communications in Computer and Information Science, 2014

Research paper thumbnail of A Review on the Security of Mobile Ad Hoc Networks

In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for researc... more In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc networks has become one of the most active and vibrant field in communication and networks. The unique features of MANETs such as dynamic network topology, limited battery power, limited bandwidth has made it a challenging task to provide secure routing in MANETs than in other conventional networks. In this paper we present an overview of various security issues in MANETs. In particular, we have examined attacks such as wormhole, black hole, greyhole, rushing, Sybil and flooding attacks as well as existing solutions to protect MANET.

Research paper thumbnail of Attacks that Decline the Proficiency of Wireless Sensor Networks

—Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communicati... more —Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communications techniques happen to be an important tool. Since several users make use of this technique concurrently over one channel where security becomes a great concern. Although there are several methods to provide a safe network by protecting it from various attacks, but giving 100% security and sustaining confidentiality is a great challenge. This paper will give you a survey about the different attacks on a network such as Sybil attacks, Black hole attack, DOS attacks, Wormhole attack and Sinkhole attack.

Research paper thumbnail of Multipoint Relay Selection using Trilateration Technique

— Mobile network had become the broad area in wireless network, because of its reduced deployment... more — Mobile network had become the broad area in wireless network, because of its reduced deployment cost, easy to use, and relief from wires. Routing is carried out in a mobile network with the help of broadcasting. There are several broadcasting schemes among which multipoint relay (MPR) is found to be the effectual and uncomplicated scheme. The MPR broadcast scheme works with the help of selected MPR nodes. The selected node can be any node in the network, and provides no assurance about its honesty. In our paper, we have discussed a novel approach in MPR node selection, by adding a security feature before the node selection request is being sent to the neighboring node. Future events are also being discussed.

Research paper thumbnail of Invalidating Vulnerable Broadcaster Nodes Using Maximum Likelihood Expectation

International Journal of Research in Engineering and Technology, 2014

Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem ... more Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in localization. We were able to attain a considerable reduction in the error achieved during localization. For implementation purpose we simulated our scheme using ns-3 network simulator.

Research paper thumbnail of A Comparative Review of Moveable Sensor Location Identification

International Journal of Robotics Applications and Technologies, 2015

Research paper thumbnail of Assessing the Severity of Attacks in Wireless Networks

Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, 2016

Research paper thumbnail of Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2015

Research paper thumbnail of Confiscation of Malicious Anchor Nodes in Wireless Sensor Networks

Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering t... more Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in identifying malicious or cheating anchor nodes during localiza...

Research paper thumbnail of Attacks that Downturn the Performance of Wireless Networks

2015 International Conference on Computing Communication Control and Automation, 2015

Research paper thumbnail of A survey on localization of Wireless Sensor nodes

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Research paper thumbnail of A review on host vs. Network Mobility (NEMO) handoff techniques in heterogeneous network

Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, 2014

Research paper thumbnail of A Comparative Analysis of Mobile Localization and its Attacks

Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '14, 2014

ABSTRACT

Research paper thumbnail of A Review on Localization in Wireless Sensor Networks

Advances in Intelligent Systems and Computing, 2014

Research paper thumbnail of A novel approach to naval architecture using 1G VLAN with RSTP

2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014

Research paper thumbnail of A Review on Mobile Sensor Localization

Communications in Computer and Information Science, 2014

Research paper thumbnail of A Review on the Security of Mobile Ad Hoc Networks

In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for researc... more In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc networks has become one of the most active and vibrant field in communication and networks. The unique features of MANETs such as dynamic network topology, limited battery power, limited bandwidth has made it a challenging task to provide secure routing in MANETs than in other conventional networks. In this paper we present an overview of various security issues in MANETs. In particular, we have examined attacks such as wormhole, black hole, greyhole, rushing, Sybil and flooding attacks as well as existing solutions to protect MANET.

Research paper thumbnail of Attacks that Decline the Proficiency of Wireless Sensor Networks

—Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communicati... more —Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communications techniques happen to be an important tool. Since several users make use of this technique concurrently over one channel where security becomes a great concern. Although there are several methods to provide a safe network by protecting it from various attacks, but giving 100% security and sustaining confidentiality is a great challenge. This paper will give you a survey about the different attacks on a network such as Sybil attacks, Black hole attack, DOS attacks, Wormhole attack and Sinkhole attack.

Research paper thumbnail of Multipoint Relay Selection using Trilateration Technique

— Mobile network had become the broad area in wireless network, because of its reduced deployment... more — Mobile network had become the broad area in wireless network, because of its reduced deployment cost, easy to use, and relief from wires. Routing is carried out in a mobile network with the help of broadcasting. There are several broadcasting schemes among which multipoint relay (MPR) is found to be the effectual and uncomplicated scheme. The MPR broadcast scheme works with the help of selected MPR nodes. The selected node can be any node in the network, and provides no assurance about its honesty. In our paper, we have discussed a novel approach in MPR node selection, by adding a security feature before the node selection request is being sent to the neighboring node. Future events are also being discussed.