Jeril Kuriakose | St. John College of Engineering and Technology, Palghar (original) (raw)
Uploads
Papers by Jeril Kuriakose
International Journal of Research in Engineering and Technology, 2014
Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem ... more Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in localization. We were able to attain a considerable reduction in the error achieved during localization. For implementation purpose we simulated our scheme using ns-3 network simulator.
International Journal of Robotics Applications and Technologies, 2015
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, 2016
Communications in Computer and Information Science, 2015
Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering t... more Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in identifying malicious or cheating anchor nodes during localiza...
2015 International Conference on Computing Communication Control and Automation, 2015
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, 2014
Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '14, 2014
ABSTRACT
Advances in Intelligent Systems and Computing, 2014
2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014
Communications in Computer and Information Science, 2014
In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for researc... more In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc networks has become one of the most active and vibrant field in communication and networks. The unique features of MANETs such as dynamic network topology, limited battery power, limited bandwidth has made it a challenging task to provide secure routing in MANETs than in other conventional networks. In this paper we present an overview of various security issues in MANETs. In particular, we have examined attacks such as wormhole, black hole, greyhole, rushing, Sybil and flooding attacks as well as existing solutions to protect MANET.
—Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communicati... more —Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communications techniques happen to be an important tool. Since several users make use of this technique concurrently over one channel where security becomes a great concern. Although there are several methods to provide a safe network by protecting it from various attacks, but giving 100% security and sustaining confidentiality is a great challenge. This paper will give you a survey about the different attacks on a network such as Sybil attacks, Black hole attack, DOS attacks, Wormhole attack and Sinkhole attack.
— Mobile network had become the broad area in wireless network, because of its reduced deployment... more — Mobile network had become the broad area in wireless network, because of its reduced deployment cost, easy to use, and relief from wires. Routing is carried out in a mobile network with the help of broadcasting. There are several broadcasting schemes among which multipoint relay (MPR) is found to be the effectual and uncomplicated scheme. The MPR broadcast scheme works with the help of selected MPR nodes. The selected node can be any node in the network, and provides no assurance about its honesty. In our paper, we have discussed a novel approach in MPR node selection, by adding a security feature before the node selection request is being sent to the neighboring node. Future events are also being discussed.
International Journal of Research in Engineering and Technology, 2014
Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem ... more Discovering the cheating or vulnerable anchor node (or broadcaster node) is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in localization. We were able to attain a considerable reduction in the error achieved during localization. For implementation purpose we simulated our scheme using ns-3 network simulator.
International Journal of Robotics Applications and Technologies, 2015
Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing, 2016
Communications in Computer and Information Science, 2015
Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering t... more Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nodes. Ingenuous localization is not possible in the presence of a cheating anchor node or a cheating node. Nowadays, it's a challenging task to identify the cheating anchor node or cheating node in a network. Even after finding out the location of the cheating anchor node, there is no assurance, that the identified node is legitimate or not. This paper aims to localize the cheating anchor nodes using trilateration algorithm and later associate it with maximum likelihood expectation technique (MLE) to obtain maximum accuracy in identifying malicious or cheating anchor nodes during localiza...
2015 International Conference on Computing Communication Control and Automation, 2015
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, 2014
Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies - ICTCS '14, 2014
ABSTRACT
Advances in Intelligent Systems and Computing, 2014
2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), 2014
Communications in Computer and Information Science, 2014
In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for researc... more In wireless networks, Mobile Adhoc Network (MANET) is one of the most promising field for research and development. As popularity of wireless networks and mobile devices has considerably improved over the past few years, wireless ad hoc networks has become one of the most active and vibrant field in communication and networks. The unique features of MANETs such as dynamic network topology, limited battery power, limited bandwidth has made it a challenging task to provide secure routing in MANETs than in other conventional networks. In this paper we present an overview of various security issues in MANETs. In particular, we have examined attacks such as wormhole, black hole, greyhole, rushing, Sybil and flooding attacks as well as existing solutions to protect MANET.
—Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communicati... more —Wireless Sensor Network (WSN) is an emerging technology, in any application wireless communications techniques happen to be an important tool. Since several users make use of this technique concurrently over one channel where security becomes a great concern. Although there are several methods to provide a safe network by protecting it from various attacks, but giving 100% security and sustaining confidentiality is a great challenge. This paper will give you a survey about the different attacks on a network such as Sybil attacks, Black hole attack, DOS attacks, Wormhole attack and Sinkhole attack.
— Mobile network had become the broad area in wireless network, because of its reduced deployment... more — Mobile network had become the broad area in wireless network, because of its reduced deployment cost, easy to use, and relief from wires. Routing is carried out in a mobile network with the help of broadcasting. There are several broadcasting schemes among which multipoint relay (MPR) is found to be the effectual and uncomplicated scheme. The MPR broadcast scheme works with the help of selected MPR nodes. The selected node can be any node in the network, and provides no assurance about its honesty. In our paper, we have discussed a novel approach in MPR node selection, by adding a security feature before the node selection request is being sent to the neighboring node. Future events are also being discussed.