Hemanta Kumar Kalita - Academia.edu (original) (raw)

Papers by Hemanta Kumar Kalita

Research paper thumbnail of Analysis and application of conditional software rejuvenation — A new approach

2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), 2008

Abstract — Software aging effects if left uncontrolled are known to cause availability issues. Wh... more Abstract — Software aging effects if left uncontrolled are known to cause availability issues. When an application is serving live in production, fixing such issues is close to impossible. Software rejuvenation techniques can be used effectively to avoid failure, but will incur some ...

Research paper thumbnail of Non-Intrusive Remote Monitoring of Services in a Data Centre

Non-intrusive remote monitoring of data centre services should be such that it does not require (... more Non-intrusive remote monitoring of data centre services should be such that it does not require (or minimal) modification of legacy code and standard practices. Also, allowing third party agent to sit on every server in a data centre is a risk from security perspective. Hence, use of standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open source or commercial) available which uses SNMP; but we observe that most of the tools do not have an essential feature for auto-discovery of network. In this paper we present an algorithm for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto discovery of network topology and 2) data collection from remote machine. Further, we compare SNMP with WBEM and identify some other options for remote monitoring of services and their advantages and disadvantages.

Research paper thumbnail of Different firewall techniques: A survey

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2014

ABSTRACT Firewalls today are an integrated part of security mechanism of any organization or inst... more ABSTRACT Firewalls today are an integrated part of security mechanism of any organization or institution. Firewalls throughout the years have evolved merely from static rule mapping to understanding the dynamic behavior of traffic and react accordingly. Different firewall techniques operating in several layers of the TCP/IP model have been proposed by different authors in different times. In this paper an insight into some of the firewall techniques are discussed and also an attempt has been made to portray different challenges that exist in the application traffic.

Research paper thumbnail of Social Media Forensics - A Holistic Review

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)

Research paper thumbnail of Wireless Sensor Network Security Analysis

The emergence of sensor networks as one of the dominant technology trends in the coming decades h... more The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also propose some countermeasures against these threats in Wireless Sensor Network.

Research paper thumbnail of An User Authentication Scheme using McEliece Cryptosystem on Fog based IoT Network

In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT pr... more In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT provides several services for the ease of human life in several significant areas such as health care, logistics, power grid etc. To keep these devices connected in an efficient network, the concept of Fog network has taken precedence over all other network architecture. Fog network has taken the services provided by a centralized cloud server closer to the Edge devices. Thus providing services from a closer range and in the process providing several facilities such as faster access, scalability, lower lag etc. Although, the security of a network significantly depends on the cryptosystem utilized by the entities involved in the network. Therefore, we choose the latest variant of McEliece cryptosystem to be utilized in our scheme. McEliece cryptosystem has been categorized under Post Quantum Cryptography under NIST.

Research paper thumbnail of Learning is never secure: Poison learning by Intrusion Detection System based on Self-Organizing Map

Research paper thumbnail of A Study Of Bio-inspired Self Organizing Networks

ADBU Journal of Engineering Technology (AJET), 2016

In today’s perplexed world of wireless networking, there are many rapid changes and challenges th... more In today’s perplexed world of wireless networking, there are many rapid changes and challenges that could lead to an excessive quantity of users flocking to one or only a few networks, thereby leaving some potentially subsidiary accommodation providers out of the picture. Self-Organizing Networks (SON) is a term for mobile network automation, cost efficient, easy operation and maintenance of mobile networks .This article provides an overview of SON features and challenges. Since self-organization is expected to bring us remarkable benefits in terms of costs reduction in network configuration, management, operation and optimization, etc, enormous research has been carried out to address the challenges brought by the ever increasing complexity and dynamics in complex communications systems. Keywords:SON; Self organizing networks

Research paper thumbnail of McEliece Cryptosystem based User Authentication Scheme in Fog Computing Environment

In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT pr... more In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT provides several services for the ease of human life in several significant areas such as health care, logistics, power grid etc. To keep these devices connected in an efficient network, the concept of Fog network has taken precedence over all other network architectures. Fog network has taken the services provided by a centralized cloud server closer to the edge devices, thus providing services from a closer range and in the process, providing several facilities such as faster access, scalability, lower lag etc. Although, the security of a network significantly depends on the cryptosystem utilized by the entities involved in the network. Therefore, we chose the latest variant of McEliece cryptosystem to be utilized in our scheme. McEliece cryptosystem has been categorized under post-quantum cryptography under NIST. Keywords: Internet of Things, fog network, McEliece cryptosystem, encrypti...

Research paper thumbnail of Plant based Biologically Inspired Intrusion Response Mechanism: An insight into the proposed model PIRIDS

Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. ... more Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. They are classified into different forms based on the nature of their functionality such as Host based IDS, Network based IDS and Anomaly based IDS. However, Literature survey portrays different evasion techniques of IDS. Thus it is always important to study the responsive behavior of IDS after such failures. The state of the art shows that much work have been done on IDS on contrary to little on Intrusion Response System (IRS). In this paper we propose a model of IRS based on the inspiration derived from the functioning of defense and response mechanism in plants. The proposed model is the first attempt of its kind with the objective to develop an efficient response mechanism in a network subsequent to the failure of IDS, adopting plants as a source of inspiration.

Research paper thumbnail of Are machine learning based intrusion detection system always secure? An insight into tampered learning

Journal of Intelligent & Fuzzy Systems, 2018

Machine learning is successful in many applications including securing a network from unseen atta... more Machine learning is successful in many applications including securing a network from unseen attack. The application of learning algorithm for detecting anomaly in a network has been fundamental since few years. With increasing use of machine learning techniques, it has become important to study to what extent it is good to be dependent on them. Altogether a different discipline called 'adversarial learning' have come up as a separate dimension of study. The work in this paper is to test the robustness of online machine learning based IDS to carefully crafted packets by the attacker called poison packets. The objective is to observe how a remote attacker can deviate the normal behavior of machine learning based classifier in the IDS by injecting the network with carefully crafted packets externally, that may seem normal by the classification algorithm and the instance made part of its future training set. This behavior eventually can lead to a poisoned learning by the classification algorithm in the long run, resulting in misclassification of true attack instances. This work explores one such approach with SOM and SVM as the online learning-based classification algorithms.

Research paper thumbnail of Semantic Model for Web-Based Big Data Using Ontology and Fuzzy Rule Mining

Smart Innovation, Systems and Technologies, 2016

A huge amount of data is being generated everyday through different transactions in industries, m... more A huge amount of data is being generated everyday through different transactions in industries, medicals, social networking, communication systems etc. This data is mainly of unstructured format in nature. Transformation of the large heterogeneous datasets into useful information is very much required for society. This huge unstructured information should be easily presented and made available in a significant and effective way to obtain semantic knowledge so that machine can interpret them. In this paper, we have introduced a novel approach for semantic analysis with web based big data using rule based ontology mapping. To handle social data with natural language terms, we have proposed the fuzzy rule based resource representation. After that, a refined semantic relation reasoning mining is applied to obtain overall knowledge representation. Finally semantic equivalent of these unstructured data is stored in structured database using Web Ontology Language (OWL) based ontology system.

Research paper thumbnail of Efficient Classification Rule Mining for Breast Cancer Detection

Research Advances in the Integration of Big Data and Smart Computing

Breast cancer is the second largest cause of cancer deaths among women. Mainly, this disease is t... more Breast cancer is the second largest cause of cancer deaths among women. Mainly, this disease is tumor related cause of death in women. Early detection of breast cancer may protect women from death. Various computational methods have been utilized to enhance the diagnoses procedures. In this paper, we have presented the genetic algorithm (GA) based association rule mining method which can be applied to detect breast cancer efficiently. In this work, we have represented each solution as chromosome and applied to genetic algorithm based rule mining. Association rules which imply classification rules are encoded with binary strings to represent chromosomes. Finally, optimal solutions are found out by develop GA-based approach utilizing a feedback linkage between feature selection and association rule.

Research paper thumbnail of Analysis of Machine Learning Techniques Based Intrusion Detection Systems

Smart Innovation, Systems and Technologies, 2015

Attacks on Computer Networks are one of the major threats on using Internet these days. Intrusion... more Attacks on Computer Networks are one of the major threats on using Internet these days. Intrusion Detection Systems (IDS) are one of the security tools available to detect possible intrusions in a Network or in a Host. Research showed that application of machine learning techniques in intrusion detection could achieve high detection rate as well as low false positive rate. This paper discusses some commonly used machine learning techniques in Intrusion Detection System and also reviews some of the existing machine learning IDS proposed by authors at different times.

Research paper thumbnail of Key Management and Security Planning in Wireless Ad-Hoc Networks

Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important... more Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important phase of a wireless sensor network. After deployment, sensors nodes are required to self organize themselves to form a network of their own. Security is an important aspect while forming the network. Only the authorized nodes should be allowed to join the network. For implementing security, such as confidentiality, integrity and authentication, keys are needed. How keys are handled is described in key management approach. Key management encompasses generation, storage, distribution, re-key and retirement of a key. It is observed that majority of the attacks are carried out during the key distribution phase itself. Hence, a proper key management is utmost important for implementing fool proof security in a Wireless Sensor Network. Depending upon the type of keys used, for example, symmetric or asymmetric key, key management techniques vary. In this paper an approach to key management for asymmetric key based security schemes of Wireless Sensor Network is proposed. The approach considers entire life of a 'key' and subsequently proposes algorithms/schemes for key (pre) distribution, re-key and revocation. We also discuss security planning steps for wireless sensor network in this paper.

Research paper thumbnail of Propularity Analysis on Social Network using MapReduce

Research paper thumbnail of A New Algorithm for End to End Security of Data in a Secure Self Organized Wireless Sensor Network

We consider a self-organized wireless sensor network where sensor nodes are multi-hop away from b... more We consider a self-organized wireless sensor network where sensor nodes are multi-hop away from base station. This means data communication happens through several intermediate nodes before it reaches the base station from source. End to end security of data ensures data sent from the source to destination through several intermediate nodes preserve confidentiality, integrity, authentication and nonrepudiation of data. Due to resource-constrained sensor nodes it was considered that implementing confidentiality, integrity, authentication and non repudiation of data using public key infrastructure based scheme would be a challenge in Wireless Sensor Network. Consequently we have seen a lot of secure data communication schemes based on symmetric key in the literature. Although symmetric key based schemes are easy to implement, yet it has a single point of failure, i.e. the key. If a node's key falls in the hand of attacker, then the whole network is compromised. In this paper we propose a secure data communication scheme for wireless sensor network. Our scheme takes advantage of both asymmetric and symmetric key based schemes and preserves confidentiality, integrity, authentication and non-repudiation of data.

Research paper thumbnail of A New Algorithm for Ordering of Points to Identify Clustering Structure Based on Perimeter of Triangle: OPTICS(BOPT)

15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007

... We observe that – most of the clustering algorithms de-signed so far require user interventio... more ... We observe that – most of the clustering algorithms de-signed so far require user intervention. ... 2001. [10] J. Roddick, K. Hornsby, and D. Vries. A unifying seman-tic distance model for determining the similarity of attribute values. 2003. [11] E. Triantaphyllou. ...

Research paper thumbnail of A New Algorithm of Self Organization in Wireless Sensor Network

Wireless Sensor Network, 2010

Self organization is one of the most important characteristics in an Ad-hoc Sensor Network. Thous... more Self organization is one of the most important characteristics in an Ad-hoc Sensor Network. Thousands of Sensors are deployed in a geographical area randomly without considering the location factor. After deployment, sensors are to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission. Self organization based on clustering has proven to be very useful in this regard. Since hierarchical clustering reduces energy consumption by routing data from one node to another. In this paper, we discuss a new algorithm for self organization of sensors deployed in a geographical area. The algorithm forms clusters of sensors by ordering them using a unique triangulation method. This algorithm not only considers all sensors but also groups them so that their inherent clustering property is preserved.

Research paper thumbnail of A Quantum Safe User Authentication Protocol for the Internet of Things

international journal of next-generation computing, Dec 12, 2019

Let n ≥ 3 be an integer and d an odd square-free integer. We shall compute the rank of the 2-clas... more Let n ≥ 3 be an integer and d an odd square-free integer. We shall compute the rank of the 2-class group of L n,d := Q(ζ 2 n , √ d), when all the prime divisors of d are congruent to ±3 (mod 8) or 9 (mod 16).

Research paper thumbnail of Analysis and application of conditional software rejuvenation — A new approach

2008 IEEE International Conference on Software Reliability Engineering Workshops (ISSRE Wksp), 2008

Abstract — Software aging effects if left uncontrolled are known to cause availability issues. Wh... more Abstract — Software aging effects if left uncontrolled are known to cause availability issues. When an application is serving live in production, fixing such issues is close to impossible. Software rejuvenation techniques can be used effectively to avoid failure, but will incur some ...

Research paper thumbnail of Non-Intrusive Remote Monitoring of Services in a Data Centre

Non-intrusive remote monitoring of data centre services should be such that it does not require (... more Non-intrusive remote monitoring of data centre services should be such that it does not require (or minimal) modification of legacy code and standard practices. Also, allowing third party agent to sit on every server in a data centre is a risk from security perspective. Hence, use of standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open source or commercial) available which uses SNMP; but we observe that most of the tools do not have an essential feature for auto-discovery of network. In this paper we present an algorithm for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto discovery of network topology and 2) data collection from remote machine. Further, we compare SNMP with WBEM and identify some other options for remote monitoring of services and their advantages and disadvantages.

Research paper thumbnail of Different firewall techniques: A survey

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2014

ABSTRACT Firewalls today are an integrated part of security mechanism of any organization or inst... more ABSTRACT Firewalls today are an integrated part of security mechanism of any organization or institution. Firewalls throughout the years have evolved merely from static rule mapping to understanding the dynamic behavior of traffic and react accordingly. Different firewall techniques operating in several layers of the TCP/IP model have been proposed by different authors in different times. In this paper an insight into some of the firewall techniques are discussed and also an attempt has been made to portray different challenges that exist in the application traffic.

Research paper thumbnail of Social Media Forensics - A Holistic Review

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)

Research paper thumbnail of Wireless Sensor Network Security Analysis

The emergence of sensor networks as one of the dominant technology trends in the coming decades h... more The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications; we have made an in depth threat analysis of Wireless Sensor Network. We also propose some countermeasures against these threats in Wireless Sensor Network.

Research paper thumbnail of An User Authentication Scheme using McEliece Cryptosystem on Fog based IoT Network

In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT pr... more In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT provides several services for the ease of human life in several significant areas such as health care, logistics, power grid etc. To keep these devices connected in an efficient network, the concept of Fog network has taken precedence over all other network architecture. Fog network has taken the services provided by a centralized cloud server closer to the Edge devices. Thus providing services from a closer range and in the process providing several facilities such as faster access, scalability, lower lag etc. Although, the security of a network significantly depends on the cryptosystem utilized by the entities involved in the network. Therefore, we choose the latest variant of McEliece cryptosystem to be utilized in our scheme. McEliece cryptosystem has been categorized under Post Quantum Cryptography under NIST.

Research paper thumbnail of Learning is never secure: Poison learning by Intrusion Detection System based on Self-Organizing Map

Research paper thumbnail of A Study Of Bio-inspired Self Organizing Networks

ADBU Journal of Engineering Technology (AJET), 2016

In today’s perplexed world of wireless networking, there are many rapid changes and challenges th... more In today’s perplexed world of wireless networking, there are many rapid changes and challenges that could lead to an excessive quantity of users flocking to one or only a few networks, thereby leaving some potentially subsidiary accommodation providers out of the picture. Self-Organizing Networks (SON) is a term for mobile network automation, cost efficient, easy operation and maintenance of mobile networks .This article provides an overview of SON features and challenges. Since self-organization is expected to bring us remarkable benefits in terms of costs reduction in network configuration, management, operation and optimization, etc, enormous research has been carried out to address the challenges brought by the ever increasing complexity and dynamics in complex communications systems. Keywords:SON; Self organizing networks

Research paper thumbnail of McEliece Cryptosystem based User Authentication Scheme in Fog Computing Environment

In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT pr... more In the recent past, the notion of Internet of Things has gained tremendous pace worldwide. IoT provides several services for the ease of human life in several significant areas such as health care, logistics, power grid etc. To keep these devices connected in an efficient network, the concept of Fog network has taken precedence over all other network architectures. Fog network has taken the services provided by a centralized cloud server closer to the edge devices, thus providing services from a closer range and in the process, providing several facilities such as faster access, scalability, lower lag etc. Although, the security of a network significantly depends on the cryptosystem utilized by the entities involved in the network. Therefore, we chose the latest variant of McEliece cryptosystem to be utilized in our scheme. McEliece cryptosystem has been categorized under post-quantum cryptography under NIST. Keywords: Internet of Things, fog network, McEliece cryptosystem, encrypti...

Research paper thumbnail of Plant based Biologically Inspired Intrusion Response Mechanism: An insight into the proposed model PIRIDS

Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. ... more Intrusion Detection Systems (IDS) are one of the primary components in keeping a network secure. They are classified into different forms based on the nature of their functionality such as Host based IDS, Network based IDS and Anomaly based IDS. However, Literature survey portrays different evasion techniques of IDS. Thus it is always important to study the responsive behavior of IDS after such failures. The state of the art shows that much work have been done on IDS on contrary to little on Intrusion Response System (IRS). In this paper we propose a model of IRS based on the inspiration derived from the functioning of defense and response mechanism in plants. The proposed model is the first attempt of its kind with the objective to develop an efficient response mechanism in a network subsequent to the failure of IDS, adopting plants as a source of inspiration.

Research paper thumbnail of Are machine learning based intrusion detection system always secure? An insight into tampered learning

Journal of Intelligent & Fuzzy Systems, 2018

Machine learning is successful in many applications including securing a network from unseen atta... more Machine learning is successful in many applications including securing a network from unseen attack. The application of learning algorithm for detecting anomaly in a network has been fundamental since few years. With increasing use of machine learning techniques, it has become important to study to what extent it is good to be dependent on them. Altogether a different discipline called 'adversarial learning' have come up as a separate dimension of study. The work in this paper is to test the robustness of online machine learning based IDS to carefully crafted packets by the attacker called poison packets. The objective is to observe how a remote attacker can deviate the normal behavior of machine learning based classifier in the IDS by injecting the network with carefully crafted packets externally, that may seem normal by the classification algorithm and the instance made part of its future training set. This behavior eventually can lead to a poisoned learning by the classification algorithm in the long run, resulting in misclassification of true attack instances. This work explores one such approach with SOM and SVM as the online learning-based classification algorithms.

Research paper thumbnail of Semantic Model for Web-Based Big Data Using Ontology and Fuzzy Rule Mining

Smart Innovation, Systems and Technologies, 2016

A huge amount of data is being generated everyday through different transactions in industries, m... more A huge amount of data is being generated everyday through different transactions in industries, medicals, social networking, communication systems etc. This data is mainly of unstructured format in nature. Transformation of the large heterogeneous datasets into useful information is very much required for society. This huge unstructured information should be easily presented and made available in a significant and effective way to obtain semantic knowledge so that machine can interpret them. In this paper, we have introduced a novel approach for semantic analysis with web based big data using rule based ontology mapping. To handle social data with natural language terms, we have proposed the fuzzy rule based resource representation. After that, a refined semantic relation reasoning mining is applied to obtain overall knowledge representation. Finally semantic equivalent of these unstructured data is stored in structured database using Web Ontology Language (OWL) based ontology system.

Research paper thumbnail of Efficient Classification Rule Mining for Breast Cancer Detection

Research Advances in the Integration of Big Data and Smart Computing

Breast cancer is the second largest cause of cancer deaths among women. Mainly, this disease is t... more Breast cancer is the second largest cause of cancer deaths among women. Mainly, this disease is tumor related cause of death in women. Early detection of breast cancer may protect women from death. Various computational methods have been utilized to enhance the diagnoses procedures. In this paper, we have presented the genetic algorithm (GA) based association rule mining method which can be applied to detect breast cancer efficiently. In this work, we have represented each solution as chromosome and applied to genetic algorithm based rule mining. Association rules which imply classification rules are encoded with binary strings to represent chromosomes. Finally, optimal solutions are found out by develop GA-based approach utilizing a feedback linkage between feature selection and association rule.

Research paper thumbnail of Analysis of Machine Learning Techniques Based Intrusion Detection Systems

Smart Innovation, Systems and Technologies, 2015

Attacks on Computer Networks are one of the major threats on using Internet these days. Intrusion... more Attacks on Computer Networks are one of the major threats on using Internet these days. Intrusion Detection Systems (IDS) are one of the security tools available to detect possible intrusions in a Network or in a Host. Research showed that application of machine learning techniques in intrusion detection could achieve high detection rate as well as low false positive rate. This paper discusses some commonly used machine learning techniques in Intrusion Detection System and also reviews some of the existing machine learning IDS proposed by authors at different times.

Research paper thumbnail of Key Management and Security Planning in Wireless Ad-Hoc Networks

Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important... more Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important phase of a wireless sensor network. After deployment, sensors nodes are required to self organize themselves to form a network of their own. Security is an important aspect while forming the network. Only the authorized nodes should be allowed to join the network. For implementing security, such as confidentiality, integrity and authentication, keys are needed. How keys are handled is described in key management approach. Key management encompasses generation, storage, distribution, re-key and retirement of a key. It is observed that majority of the attacks are carried out during the key distribution phase itself. Hence, a proper key management is utmost important for implementing fool proof security in a Wireless Sensor Network. Depending upon the type of keys used, for example, symmetric or asymmetric key, key management techniques vary. In this paper an approach to key management for asymmetric key based security schemes of Wireless Sensor Network is proposed. The approach considers entire life of a 'key' and subsequently proposes algorithms/schemes for key (pre) distribution, re-key and revocation. We also discuss security planning steps for wireless sensor network in this paper.

Research paper thumbnail of Propularity Analysis on Social Network using MapReduce

Research paper thumbnail of A New Algorithm for End to End Security of Data in a Secure Self Organized Wireless Sensor Network

We consider a self-organized wireless sensor network where sensor nodes are multi-hop away from b... more We consider a self-organized wireless sensor network where sensor nodes are multi-hop away from base station. This means data communication happens through several intermediate nodes before it reaches the base station from source. End to end security of data ensures data sent from the source to destination through several intermediate nodes preserve confidentiality, integrity, authentication and nonrepudiation of data. Due to resource-constrained sensor nodes it was considered that implementing confidentiality, integrity, authentication and non repudiation of data using public key infrastructure based scheme would be a challenge in Wireless Sensor Network. Consequently we have seen a lot of secure data communication schemes based on symmetric key in the literature. Although symmetric key based schemes are easy to implement, yet it has a single point of failure, i.e. the key. If a node's key falls in the hand of attacker, then the whole network is compromised. In this paper we propose a secure data communication scheme for wireless sensor network. Our scheme takes advantage of both asymmetric and symmetric key based schemes and preserves confidentiality, integrity, authentication and non-repudiation of data.

Research paper thumbnail of A New Algorithm for Ordering of Points to Identify Clustering Structure Based on Perimeter of Triangle: OPTICS(BOPT)

15th International Conference on Advanced Computing and Communications (ADCOM 2007), 2007

... We observe that – most of the clustering algorithms de-signed so far require user interventio... more ... We observe that – most of the clustering algorithms de-signed so far require user intervention. ... 2001. [10] J. Roddick, K. Hornsby, and D. Vries. A unifying seman-tic distance model for determining the similarity of attribute values. 2003. [11] E. Triantaphyllou. ...

Research paper thumbnail of A New Algorithm of Self Organization in Wireless Sensor Network

Wireless Sensor Network, 2010

Self organization is one of the most important characteristics in an Ad-hoc Sensor Network. Thous... more Self organization is one of the most important characteristics in an Ad-hoc Sensor Network. Thousands of Sensors are deployed in a geographical area randomly without considering the location factor. After deployment, sensors are to self organize themselves to form a network of their own. How well the network is formed determines the life of the whole network as well as the quality of data transmission. Self organization based on clustering has proven to be very useful in this regard. Since hierarchical clustering reduces energy consumption by routing data from one node to another. In this paper, we discuss a new algorithm for self organization of sensors deployed in a geographical area. The algorithm forms clusters of sensors by ordering them using a unique triangulation method. This algorithm not only considers all sensors but also groups them so that their inherent clustering property is preserved.

Research paper thumbnail of A Quantum Safe User Authentication Protocol for the Internet of Things

international journal of next-generation computing, Dec 12, 2019

Let n ≥ 3 be an integer and d an odd square-free integer. We shall compute the rank of the 2-clas... more Let n ≥ 3 be an integer and d an odd square-free integer. We shall compute the rank of the 2-class group of L n,d := Q(ζ 2 n , √ d), when all the prime divisors of d are congruent to ±3 (mod 8) or 9 (mod 16).