Jainy Varghese - Academia.edu (original) (raw)
Uploads
Papers by Jainy Varghese
Zenodo (CERN European Organization for Nuclear Research), Nov 12, 2022
Wireless Sensor Network (WSN) is infrastructure-less. This is mainly used for target monitoring, ... more Wireless Sensor Network (WSN) is infrastructure-less. This is mainly used for target monitoring, target detection by setting in an ad-hoc style. So, in a wireless network target want to be protected. But the network cannot hide source permanently but it is capable of increasing the safety time. Both data privacy and location privacy are important to WSN security. In the case of data privacy there are many encrypting algorithm to protect data.But it is not possible in the case of source location privacy. When taking source location privacy there is source location privacy and sink location privacy.Source location privacy techniques will collapse generally by tracing back by the attacker.Hiding the source location is a crucial challenge in WSNs since the location of a source sensor gives contextual information about an event. In WSNs, a variety of approaches are utilised to safeguard the source location.One of these methods concealed the source location by using fakesources. Phantom nodes were utilised in another method to shield the source location. Although the current systems operate pretty well with the use of fake sources and phantom nodes.The efficient way to protect source location privacy is using of both phantom nodes and fake nodes.There is determination of fake source to protect from adversary which is chosen by randomly.So determining fake sources by path extension which helps to increase the safety time.PEM is done after the initialfake sources are determined, each of them will choose a newfake source from its neighbor. There by can increase the safety time.
The present study was conducted to determine the changes in the physico-chemical characteristics ... more The present study was conducted to determine the changes in the physico-chemical characteristics of the groundwater in the surroundings of the sewage farm in Valiathura, Thiruvananthpuram district, Kerala. For this, 42 groundwater samples (29 dug wells and 13 bore wells) were collected bimonthly from the study area during the period January to December 2010 covering pre-monsoon, monsoon and post-monsoon seasons and the major physico-chemical parameters were analysed. The values recorded for parameters such as total alkalinity (330 mg/l), potassium (63.40 mg/l), magnesium (52.39 mg/l) and phosphates (4.71 mg/l in dug wells at some stations exceeded the desirable limits for drinking water quality prescribed by WHO and BIS standards. The Sodium Adsorption Ratio (0.20 6.33), Percent sodium (8.54 71.83) and Permeability Index values (48.07 119.35) showed that all the groundwater samples in the study area were suitable for irrigation purposes. The study revealed that about 31% of the dug ...
Zenodo (CERN European Organization for Nuclear Research), Nov 12, 2022
Wireless Sensor Network (WSN) is infrastructure-less. This is mainly used for target monitoring, ... more Wireless Sensor Network (WSN) is infrastructure-less. This is mainly used for target monitoring, target detection by setting in an ad-hoc style. So, in a wireless network target want to be protected. But the network cannot hide source permanently but it is capable of increasing the safety time. Both data privacy and location privacy are important to WSN security. In the case of data privacy there are many encrypting algorithm to protect data.But it is not possible in the case of source location privacy. When taking source location privacy there is source location privacy and sink location privacy.Source location privacy techniques will collapse generally by tracing back by the attacker.Hiding the source location is a crucial challenge in WSNs since the location of a source sensor gives contextual information about an event. In WSNs, a variety of approaches are utilised to safeguard the source location.One of these methods concealed the source location by using fakesources. Phantom nodes were utilised in another method to shield the source location. Although the current systems operate pretty well with the use of fake sources and phantom nodes.The efficient way to protect source location privacy is using of both phantom nodes and fake nodes.There is determination of fake source to protect from adversary which is chosen by randomly.So determining fake sources by path extension which helps to increase the safety time.PEM is done after the initialfake sources are determined, each of them will choose a newfake source from its neighbor. There by can increase the safety time.
The present study was conducted to determine the changes in the physico-chemical characteristics ... more The present study was conducted to determine the changes in the physico-chemical characteristics of the groundwater in the surroundings of the sewage farm in Valiathura, Thiruvananthpuram district, Kerala. For this, 42 groundwater samples (29 dug wells and 13 bore wells) were collected bimonthly from the study area during the period January to December 2010 covering pre-monsoon, monsoon and post-monsoon seasons and the major physico-chemical parameters were analysed. The values recorded for parameters such as total alkalinity (330 mg/l), potassium (63.40 mg/l), magnesium (52.39 mg/l) and phosphates (4.71 mg/l in dug wells at some stations exceeded the desirable limits for drinking water quality prescribed by WHO and BIS standards. The Sodium Adsorption Ratio (0.20 6.33), Percent sodium (8.54 71.83) and Permeability Index values (48.07 119.35) showed that all the groundwater samples in the study area were suitable for irrigation purposes. The study revealed that about 31% of the dug ...