Sudhakar Sengan | Anna University (original) (raw)
Uploads
Papers by Sudhakar Sengan
International Journal of Advanced Science and Technology (IJAST), 2020
There are several ways to transfer files from one computer system to another or from one user to ... more There are several ways to transfer files from one computer system to another or from one user to another. But they are less secure. Secure File Transfer Protocol (SFTP) aimed at developing a secure file transfer system for fast and secure file transmission. This is a WinForms application in which, software on one system communicates with software on another remote system. It prevents passwords and other sensitive information from being transmitted in the clear over the network. Here the data as well the key used for the encryption will be encrypted by a software key. The 32-byte long private key is generated by SFTP, from the data and personal information of the user. It is again encrypted by using the static software key of SFTP and sent it along with the data. Software key and the sender's private key are hidden from the clients, so it provides more security to the data. This key is required to decrypt the data at the receiver. SFTP allows for the search of remote files and lock of files on a range of remote systems. Add-on directory listings and screen share are shown in an SFTP client. SFTP provides an interactive screen sharing between clients.
International Journal of Advanced Science and Technology (IJAST), 2020
On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two c... more On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two components; Sustainable IT is a complicated matter. The first and most complex issues are energy efficiency and the energy ratio of the IT environment. Secondly, there is the utilization of renewable. These two have to be dealt with. An application design plays a significant role in CC, while an efficient application structure may increase cloud data centres' energy efficiency and viability. However, cloud data centres consume a considerable amount of energy and leave a significant carbon footprint on an ecosystem. Data centres account for 1.98% of the global emission of CO2, just like aviation. Therefore, it is unavoidable for distributed cloud data centres to have energy and carbon-efficient technology. Cloud providers should also meet their required service quality while efficiently allocating computing resources to users. The main aim of this paper is to deal with the energy Copyright ⓒ 2020 SERSC 4145 problem and the carbon-efficient management of resources in geographically distributed cloud data centres. It emphasizes VM-positioning technology, examines the highest impact of energy and carbon cost parameters, migration from VM to renewable energy, and projections for optimal use from VMs.
'Big data' is a large measure of facts that can do something amazing. Big records in healthcare d... more 'Big data' is a large measure of facts that can do something amazing. Big records in healthcare discuss the digital health records sets, which are so gigantic and complex that they are extraordinarily awkward to manipulate with the obsolete programming/equipment or even thru the traditional data management apparatuses and methods. In the healthcare business, exceptional hotspots for massive data include emergency health facility records, scientific information of patients, and aftereffects of scientific examinations, and gadgets that are a piece of IoT. That is the reason to supply appropriate options for improving open health, and healthcare suppliers are required to be equipped with becoming the foundation to produce and inspect astronomical data correctly. These facts should be of essential importance for finding out understandings that would be useful for enhancing consideration conveyance, reducing squanders, and in the implied time diminishing expenses. It can change the way healthcare suppliers utilize refined advances to accomplish information from their scientific records and different information distribution facilities and settle on knowledgeable choices.
A mobile ad hoc network (MANET) consists of assorted mobile devices in a network without centrali... more A mobile ad hoc network (MANET) consists of assorted mobile devices in a network without centralised administration and infrastructure. Routing processes in MANETs rely on cooperation of independent nodes constituting the network. Geographical Routing Protocols (GRPs) are suggested for MANETs in the literature. MANETs are highly susceptible to attacks. In this paper, a three-stage method has been proposed to address the performance degradation of a GRP due to the malicious nodes. This method based on a GRP, creates clusters. The malicious nodes are identified using modified hello message and secure keys are used to mitigate the effect of the maliciousness. The delay for the proposed clustered GRP was less than the GRP. When the size of the network increased, the end-to-end delay was significantly less. Cluster Heads (CHs) distribute public keys by using fuzzy logic. The effectiveness of the proposed cluster GRP when compared to the GRP is proved.
Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the a... more Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one station to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. Ad Hoc routing protocols can be divided into two categories: Table-driven (proactive schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Table-driven routing protocols each node maintains one or more tables containing routing information about nodes in the network whereas in on-demand routing the routes are created as and when required. Some of the Table ...
ijcset.excelingtech.co.uk
An ad hoc network is a group of wireless mobile computers, in which individual nodes cooperate by... more An ad hoc network is a group of wireless mobile computers, in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Attacks on ad hoc network routing protocol affects network performance and reliability. Traditional routing protocols have no security mechanism and can be attacked by malicious nodes. In this paper, we present secure on demand position based routing protocol for ad hoc network based on basic operation of AODV protocol. The protocol makes use of protected position information to make routing decisions, resulting in improved efficiency and performance. In AODV protocol route selection is a function of hop count and destination sequence number. In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, we focus on secure neighbor detection, trust factor evaluation, operational mode, route discovery and route selection. The paper mainly addresses the security of geographic routing.
Life Science Journal, 2013
This paper proposes to study the impact of malicious nodes on Mobile Ad hoc Networks (MANETs). Du... more This paper proposes to study the impact of malicious nodes on Mobile Ad hoc Networks (MANETs). Due to their flexibility and independence from network infrastructure like base stations, it is being widely researched. Routing in MANETs is more challenging when compared to conventional networks due to various characteristics like dynamic network topology, limited bandwidth and limited battery power. Early research focused on developing efficient routing mechanisms in dynamic and resource-constrained networks in MANETs. Most of the routing protocols were suggested mainly based on the assumption of trust and cooperative nature amongst the nodes. Thus, the MANET is vulnerable to malicious node attacks. Geographic routing research, a recent approach compared to topological routing received attention due to improved routing capability resulting from accurate geographic information. This study investigates the impact of malicious nodes on geographic routing; through simulations conducted to evaluate network performance degradation caused by malicious node activity. Simulation studies demonstrate that the networks with 15% malicious nodes show significant performance degradation. [Sudhakar Sengan, S.Chenthur Pandian. A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Sci J 2013;10(4s):158-163] (ISSN:1097-8135). http://www.lifesciencesite.com. 24
Journal of Computer Science, 2012
Problem statement: Mobile Ad-hoc Network is infrastructureless network supported by no fixed trus... more Problem statement: Mobile Ad-hoc Network is infrastructureless network supported by no fixed trusted infrastructure. The packets had a chance to drop or hacked by eavesdropper during transmission. So, encryption method is required for sending and receiving packet in secret manner. Approach: In this approach, the block and key size had been increased by 256 bits. When compared to Rijndael algorithm, it was more secure and effective. To attain security goals like: authentication, integrity, non-repudation, privacy, a secret key was necessary to be shared between the sender and receiver. For data communication, we use MAC address for exchanging packet with encrypted key exchange system. Results: For encryption, In Rijndael algorithm the whole data had to be run twice but our proposed algorithm would encrypt the whole data and run once. The encryption was done with neighborhood key and with message specific key for the enhancement of security. Conclusion: In our algorithm, the time required to break an encryption scheme is excessive as the key size is larger. Here the security is focusing the application level. The forward and backward security is ensured with neighborhood and with message specific key for the route discovery.
Computing Research Repository, 2010
In our proposed model, the route selection is a function of following parameters: hop count, trus... more In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, to focus on secure neighbor detection, trust factor evaluation, operational mode, route discovery and route selection. The paper mainly address the security of geographic routing. The watchdog identifies misbehaving nodes, while the Pathselector avoids routing packets through these nodes. The watchdog, the pathselector is run by each server. In order to keep the source informed about the destination's mobility, the destination keeps sending the alert message to its previous hop telling that it has changed its position and any reference to it for data packet forwarding be informed to the VHR server.
IJCSIS Volumes by Sudhakar Sengan
In this March 2010 issue, we present selected publications from the active research area of core ... more In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and
information security. The paper acceptance rate for this issue is 32%. The journal covers the state-of-art issues in the computer science and their applications in business, industry and other subjects. Printed copies of the journal are distributed to accredited universities and libraries. All the papers in IJCSIS are also available freely with online full-text content and permanent worldwide web link. The abstracts are indexed and available at major academic databases.
https://sites.google.com/site/ijcsis/Home
International Journal of Advanced Science and Technology (IJAST), 2020
There are several ways to transfer files from one computer system to another or from one user to ... more There are several ways to transfer files from one computer system to another or from one user to another. But they are less secure. Secure File Transfer Protocol (SFTP) aimed at developing a secure file transfer system for fast and secure file transmission. This is a WinForms application in which, software on one system communicates with software on another remote system. It prevents passwords and other sensitive information from being transmitted in the clear over the network. Here the data as well the key used for the encryption will be encrypted by a software key. The 32-byte long private key is generated by SFTP, from the data and personal information of the user. It is again encrypted by using the static software key of SFTP and sent it along with the data. Software key and the sender's private key are hidden from the clients, so it provides more security to the data. This key is required to decrypt the data at the receiver. SFTP allows for the search of remote files and lock of files on a range of remote systems. Add-on directory listings and screen share are shown in an SFTP client. SFTP provides an interactive screen sharing between clients.
International Journal of Advanced Science and Technology (IJAST), 2020
On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two c... more On-demand Cloud Computing (CC) offers users worldwide access to computing resources. It has two components; Sustainable IT is a complicated matter. The first and most complex issues are energy efficiency and the energy ratio of the IT environment. Secondly, there is the utilization of renewable. These two have to be dealt with. An application design plays a significant role in CC, while an efficient application structure may increase cloud data centres' energy efficiency and viability. However, cloud data centres consume a considerable amount of energy and leave a significant carbon footprint on an ecosystem. Data centres account for 1.98% of the global emission of CO2, just like aviation. Therefore, it is unavoidable for distributed cloud data centres to have energy and carbon-efficient technology. Cloud providers should also meet their required service quality while efficiently allocating computing resources to users. The main aim of this paper is to deal with the energy Copyright ⓒ 2020 SERSC 4145 problem and the carbon-efficient management of resources in geographically distributed cloud data centres. It emphasizes VM-positioning technology, examines the highest impact of energy and carbon cost parameters, migration from VM to renewable energy, and projections for optimal use from VMs.
'Big data' is a large measure of facts that can do something amazing. Big records in healthcare d... more 'Big data' is a large measure of facts that can do something amazing. Big records in healthcare discuss the digital health records sets, which are so gigantic and complex that they are extraordinarily awkward to manipulate with the obsolete programming/equipment or even thru the traditional data management apparatuses and methods. In the healthcare business, exceptional hotspots for massive data include emergency health facility records, scientific information of patients, and aftereffects of scientific examinations, and gadgets that are a piece of IoT. That is the reason to supply appropriate options for improving open health, and healthcare suppliers are required to be equipped with becoming the foundation to produce and inspect astronomical data correctly. These facts should be of essential importance for finding out understandings that would be useful for enhancing consideration conveyance, reducing squanders, and in the implied time diminishing expenses. It can change the way healthcare suppliers utilize refined advances to accomplish information from their scientific records and different information distribution facilities and settle on knowledgeable choices.
A mobile ad hoc network (MANET) consists of assorted mobile devices in a network without centrali... more A mobile ad hoc network (MANET) consists of assorted mobile devices in a network without centralised administration and infrastructure. Routing processes in MANETs rely on cooperation of independent nodes constituting the network. Geographical Routing Protocols (GRPs) are suggested for MANETs in the literature. MANETs are highly susceptible to attacks. In this paper, a three-stage method has been proposed to address the performance degradation of a GRP due to the malicious nodes. This method based on a GRP, creates clusters. The malicious nodes are identified using modified hello message and secure keys are used to mitigate the effect of the maliciousness. The delay for the proposed clustered GRP was less than the GRP. When the size of the network increased, the end-to-end delay was significantly less. Cluster Heads (CHs) distribute public keys by using fuzzy logic. The effectiveness of the proposed cluster GRP when compared to the GRP is proved.
Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the a... more Ad Hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one station to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from existing Internet protocols because of dynamic topology, mobile host, distributed environment, less bandwidth, less battery power. Ad Hoc routing protocols can be divided into two categories: Table-driven (proactive schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Table-driven routing protocols each node maintains one or more tables containing routing information about nodes in the network whereas in on-demand routing the routes are created as and when required. Some of the Table ...
ijcset.excelingtech.co.uk
An ad hoc network is a group of wireless mobile computers, in which individual nodes cooperate by... more An ad hoc network is a group of wireless mobile computers, in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Attacks on ad hoc network routing protocol affects network performance and reliability. Traditional routing protocols have no security mechanism and can be attacked by malicious nodes. In this paper, we present secure on demand position based routing protocol for ad hoc network based on basic operation of AODV protocol. The protocol makes use of protected position information to make routing decisions, resulting in improved efficiency and performance. In AODV protocol route selection is a function of hop count and destination sequence number. In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, we focus on secure neighbor detection, trust factor evaluation, operational mode, route discovery and route selection. The paper mainly addresses the security of geographic routing.
Life Science Journal, 2013
This paper proposes to study the impact of malicious nodes on Mobile Ad hoc Networks (MANETs). Du... more This paper proposes to study the impact of malicious nodes on Mobile Ad hoc Networks (MANETs). Due to their flexibility and independence from network infrastructure like base stations, it is being widely researched. Routing in MANETs is more challenging when compared to conventional networks due to various characteristics like dynamic network topology, limited bandwidth and limited battery power. Early research focused on developing efficient routing mechanisms in dynamic and resource-constrained networks in MANETs. Most of the routing protocols were suggested mainly based on the assumption of trust and cooperative nature amongst the nodes. Thus, the MANET is vulnerable to malicious node attacks. Geographic routing research, a recent approach compared to topological routing received attention due to improved routing capability resulting from accurate geographic information. This study investigates the impact of malicious nodes on geographic routing; through simulations conducted to evaluate network performance degradation caused by malicious node activity. Simulation studies demonstrate that the networks with 15% malicious nodes show significant performance degradation. [Sudhakar Sengan, S.Chenthur Pandian. A Trust and Co-Operative Nodes with Affects of Malicious Attacks and Measure the Performance Degradation on Geographic Aided Routing in Mobile Ad Hoc Network. Life Sci J 2013;10(4s):158-163] (ISSN:1097-8135). http://www.lifesciencesite.com. 24
Journal of Computer Science, 2012
Problem statement: Mobile Ad-hoc Network is infrastructureless network supported by no fixed trus... more Problem statement: Mobile Ad-hoc Network is infrastructureless network supported by no fixed trusted infrastructure. The packets had a chance to drop or hacked by eavesdropper during transmission. So, encryption method is required for sending and receiving packet in secret manner. Approach: In this approach, the block and key size had been increased by 256 bits. When compared to Rijndael algorithm, it was more secure and effective. To attain security goals like: authentication, integrity, non-repudation, privacy, a secret key was necessary to be shared between the sender and receiver. For data communication, we use MAC address for exchanging packet with encrypted key exchange system. Results: For encryption, In Rijndael algorithm the whole data had to be run twice but our proposed algorithm would encrypt the whole data and run once. The encryption was done with neighborhood key and with message specific key for the enhancement of security. Conclusion: In our algorithm, the time required to break an encryption scheme is excessive as the key size is larger. Here the security is focusing the application level. The forward and backward security is ensured with neighborhood and with message specific key for the route discovery.
Computing Research Repository, 2010
In our proposed model, the route selection is a function of following parameters: hop count, trus... more In our proposed model, the route selection is a function of following parameters: hop count, trust level of node and security level of application. In this paper, to focus on secure neighbor detection, trust factor evaluation, operational mode, route discovery and route selection. The paper mainly address the security of geographic routing. The watchdog identifies misbehaving nodes, while the Pathselector avoids routing packets through these nodes. The watchdog, the pathselector is run by each server. In order to keep the source informed about the destination's mobility, the destination keeps sending the alert message to its previous hop telling that it has changed its position and any reference to it for data packet forwarding be informed to the VHR server.
In this March 2010 issue, we present selected publications from the active research area of core ... more In this March 2010 issue, we present selected publications from the active research area of core and applied computer science, networking, information retrieval, information systems, emerging communication technologies and
information security. The paper acceptance rate for this issue is 32%. The journal covers the state-of-art issues in the computer science and their applications in business, industry and other subjects. Printed copies of the journal are distributed to accredited universities and libraries. All the papers in IJCSIS are also available freely with online full-text content and permanent worldwide web link. The abstracts are indexed and available at major academic databases.