Rahul Johari - Academia.edu (original) (raw)

Papers by Rahul Johari

Research paper thumbnail of POSOP Routing Algorithm: A DTN Routing Scheme for Information Connectivity of Health Centres in Hilly State of North India

International Journal of Distributed Sensor Networks, 2015

We explore the application of partitioned network for providing health services in difficult terr... more We explore the application of partitioned network for providing health services in difficult terrain where fixed communication infrastructure is not cost-effective due to low population density and very high cost of setting up a permanent infrastructure. We propose a hybrid routing which is persistent, on-demand, scheduled, opportunistic, and predicted (POSOP) routing algorithm, that exploits various types of contacts existing in a partitioned, hybrid, and sparse network. Such networks may be used to provide guidance from specialist doctors to junior doctors working in primary health centres. We present a scenario from Uttarakhand (a state in hilly region of North India), where POSOP routing algorithm may be used to provide improved health services. Using simulations, we evaluate the performance of POSOP routing algorithm on three metrics, messages delivered, average delay suffered by the delivered messages, and average message traffic. We compare the performance of POSOP routing algorithm with two routing schemes, namely, epidemic and spray and wait on the three metrics. Our approach outperforms both the routing schemes.

Research paper thumbnail of An extended Playfair Cipher using rotation and random swap patterns

2014 International Conference on Computer and Communication Technology, Sep 1, 2014

In this paper, we have proposed an encryption method which is developed by extending Playfair Cip... more In this paper, we have proposed an encryption method which is developed by extending Playfair Cipher to make it more secure. Known as Polyalphabetic cipher, Playfair uses a key matrix containing 25 characters for encryption .This extended playfair cipher supports all 26 characters filled in two different key matrices, second matrix having extra checksum characters. As Playfair is susceptible to various attacks, so to avoid that, we included rotation operation on key matrices and swapping of rows and columns of key matrices according to randomly generated swap patterns. Cryptanalysis of new proposed extended cipher is done by performing various attacks and we conclude that this technique is more secure and can be used as a part of advanced encryption algorithms like AES, DES.

Research paper thumbnail of Unique Identifier System Using Aneka Platform

Advances in Intelligent Systems and Computing, 2016

Research paper thumbnail of GA-LORD: Genetic Algorithm and LTPCL-Oriented Routing Protocol in Delay Tolerant Network

Lecture Notes in Electrical Engineering, 2015

ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of... more ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of data difficult to achieve. In traditional wireless system, if there was any problem such as disconnection between the intermediate nodes or nodes getting drained off because of low energy, then there was high probability of data getting lost. To solve these problems in Delay Tolerant Network(DTN), we propose two new protocols viz. the Licklider Transmission Protocol convergence layer (LTPCL) and a protocol formulated by combination of metaheuristic approaches viz. Genetic Algorithm and Ant Colony Optimization: GAACO to select the shortest path for transmission of the packets from source to destination by consuming less delay, less energy consumption, less number of hops, but at the same time delivering high throughput

Research paper thumbnail of Combined Approach to prevent XSS Attacks and SQL injection

Multiple client side and server side vulnerabilities like SQL Injection and Cross Site Scripting ... more Multiple client side and server side vulnerabilities like SQL Injection and Cross Site Scripting (XSS) are discovered and exploited by malicious users. SQL injection Attacks (SQLIA) and Cross Site scripting vulnerabilities are top ranked in the Open Web Application Security Project (OWASP) top ten vulnerabilities list. Lots of security approaches are proposed like secure coding practices, encryption, static and dynamic analysis of code to secure the web applications but statistics shows that these vulnerabilities are still transpiring at the top. In this paper, we present an integrated model to prevent SQL Injection Attacks and Reflected Cross Site scripting attack in PHP based implementation. This Model is more effective to prevent SQL injection attack and Reflected Cross Site scripting attack in production web environment.

Research paper thumbnail of Application of Routing Metrics in Wireless Network

Research paper thumbnail of Triplicative Cipher Technique

Procedia Computer Science, 2016

Research paper thumbnail of CRiPT: Cryptography in Penetration Testing

Advances in Intelligent Systems and Computing, 2015

Research paper thumbnail of IoTA: Internet of Things Application

Advances in Intelligent Systems and Computing, 2015

Research paper thumbnail of ECBEC: Erasure Coding Block Encryption using Cryptography

Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is ... more Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is known to us in advance and frequent partitioning or disconnection also occurs. In DTN the contact between nodes also occurs opportunistically [6]. In this poster we use the concept of erasure coding based routing in DTN which is the enhancement over simple replication strategy. As transmission of erasure codes is vulnerable to attacks so we provide various mechanism to make the erasure codes more secure. Earlier the erasure codes are insecure and our work focused on providing security to various code blocks that are transmitted through different path of the network. We use Symmetric algorithm (stream as well as block cipher techniques) for providing security to the erasure codes and we also create message digest for each replica of the message that will be sent to the destination node.

Research paper thumbnail of Clearing The Clouds On Cloud Computing : Survey Paper

The advent of Cloud Computing in 2006, has led to significant changes in computing in general and... more The advent of Cloud Computing in 2006, has led to significant changes in computing in general and working pattern of users in particular. Starting from the definition of cloud computing, elements of cloud computing, cloud services, cloud deployment, cloud computing platforms & technologies and issues & challenges of cloud computing are described in this paper. I. INTRODUCTION The term ‗Cloud' has historically been used in the telecommunication industry as an abstraction of the network in system diagrams. It then became the symbol of the most popular computer network ‗Internet'. The internet plays a fundamental role in cloud computing since it represents either the medium or the platform through which many cloud computing services are delivered and made accessible. Cloud computing refers to both the application delivered as a services over the internet and the hardware and the system software in the data centers that provide those services. Cloud computing enables both, a sin...

Research paper thumbnail of A J2ME based Credit Card Number Verification Software using Bluetooth

Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card... more Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card number verification software using Bluetooth. With the extensive use of mobile devices and proliferation of wireless technology in day-to-day life, the proposed software can be easily adapted at various retail shops and can make credit-card number verification process fast and convenient for users. The basis of the proposed method is KVM, an optimized Virtual Machine for mobile devices limited by memory, power consumption and connectivity, and JSR82 (Java Specification Requests 82: Bluetooth API). A secure client-server relationship is established between two mobile devices. The client side device at the customer end passes the credit card details through Bluetooth to the server side device with the retailer. The server side verifies the details. Sun JavaME Wireless Toolkit 2.5.2 is used to automate tasks related to creation and testing of the proposed software and the results are effec...

Research paper thumbnail of PJCT: Penetration testing based JAVA code testing tool

International Conference on Computing, Communication & Automation, 2015

ABSTRACT Security is the key concern for every system, network or application. Penetration Testin... more ABSTRACT Security is the key concern for every system, network or application. Penetration Testing in Software engineering and System Security in Computer Networks are key areas in secure development of an application. Many approaches and research techniques have tried to address the issue of secure coding in development phase only. Rigorous approaches have been introduced in the treatment of security aspects in information systems. Penetration testing is one of the approaches for system security. Penetration testing helps to contradict the security aspects of the system. It is technique of deceiving the hypothesis that any system, network or application is secure. Our study reveals that there are hardly any good quality tool(s) that can detect the vulnerable code in Application, so in this paper we propose a Penetration Testing based Java Code Testing Tool (PJCT) to check major security attribute of any given java code. The PJCT can detect the presence or absence of seven attributes, which we introduce for the first time to test the security of the application effectively. In this paper performance analysis of PJCT has been exhibited and also it’s comparison with other tools such as PIC et al. have also been demonstrated.

Research paper thumbnail of Analysis of Query Based Attack in the Delay/Fault Tolerant Mobile Sensor Network

International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2011

have evolved at a tremendous rate in the last couple of years. As the networks are evolving so is... more have evolved at a tremendous rate in the last couple of years. As the networks are evolving so is the rate at which the queries are exchanged in between these network and the number of database accessess that need to be performed. The queries are getting complex due to the mobile nature of the nodes in these network and their eagerness to get the response accurately in short span of time because of their limited energy resources. In this paper the effort is made to depict the routing strategies prevalent in DFT-MSN using the OMNET++ , proposing a set of SQL/TIQL queries that are exchanged between the pair of nodes taken from the CRAWDAD dataset , portrays their execution on Oracle 9i Enterprise Edition Release 9.2.0.1.0 Production and expose how these queries are vulnerable to the different type of the SQL attack which can either be launched manually or through the various proprietary and open source SQL Injection tools.

Research paper thumbnail of Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network

Communications in Computer and Information Science, 2011

Page 1. DC Wyld et al. (Eds.): CNSA 2011, CCIS 196, pp. 453–462, 2011. © Springer-Verlag Berlin H... more Page 1. DC Wyld et al. (Eds.): CNSA 2011, CCIS 196, pp. 453–462, 2011. © Springer-Verlag Berlin Heidelberg 2011 Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network ...

Research paper thumbnail of A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection

2012 International Conference on Communication Systems and Network Technologies, 2012

Today almost all organizations have improved their performance through allowing more information ... more Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central to the modern websites as they provide necessary data as well as stores critical information such as user credentials, financial and payment information, company statistics etc. These websites have been continuously targeted by highly motivated malicious users to acquire monetary gain.

Research paper thumbnail of DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013

Routing a message in networks that are dynamic in nature with time varying partially connected to... more Routing a message in networks that are dynamic in nature with time varying partially connected topology has been a challenge. The heterogeneity of the types of contacts available in such a network also adds to complexity. In this paper we present an approach to transfer messages in disruption/delay tolerant network when there is only intermittent connectivity between the nodes. Most of the existing approaches exploit either the opportunistic contacts and transfer messages using the probabilities of delivering a message or use periodic contacts. In addition to opportunistic contacts, we also have scheduled carriers that are available periodically. Scheduled carriers guarantee delivery of the messages to the base station, however, it may have an added delay. If a message can tolerate the delay through the scheduled carrier, it waits else it may be forwarded to an opportunistic contact. We define a utility function for a node to decide whether to forward the message to an opportunistic contact or to a scheduled contact. This is an improvement over routing through opportunistic contacts that exploits social behavior of the nodes as in . We compare performance of our approach with [2] on message delivery ratio, message delay and message traffic ratio (number of messages forwarded / number of messages delivered) and found that our algorithm outperforms [2] on all the three metrics. We also studied the impact of initializing the probabilities of the nodes proportional to the varying buffer size in . It was found that delivery ratio increased significantly without increasing the message traffic ratio and delay.

Research paper thumbnail of CONCOR: context-aware community-oriented routing for intermittently connected network

EURASIP Journal on Wireless Communications and Networking, 2015

are characterized by time-varying and partially connected network topology. In such networks, mob... more are characterized by time-varying and partially connected network topology. In such networks, mobility of node may be by virtue of its carrier. Social beings such as humans may act as a carrier of mobile nodes, and therefore mobility pattern of node follows a social-based movement model. Due to intermittent connectivity, end-to-end path between source and destination is rare and therefore message delivery is a challenge in such networks. In this paper, we present a new routing approach, context-aware community-oriented routing (CONCOR) that exploits the community and the context awareness of nodes, for efficient message delivery. Nodes with a common point of interest form a dynamic community. We have identified a set of node's attribute (context) and formulated a utility function to determine its capability to deliver a message. CONCOR is a multihop routing approach exploiting the nodes as message relays (store-carry-forward). Through simulation, we validated the effectiveness of node's attributes in estimation of message delivery probability. The simulations were done for our approach using the social movement-based data set on Opportunistic Network Environment (ONE) simulator. We compared our approach with dynamic social grouping (DSG)-based routing and context-aware routing(CAR) on three metrics viz. message delivery ratio, message traffic ratio and average message delay. We found that the results of our approach outperforms the DSG and CAR on all the three metrics.

Research paper thumbnail of Integrated approach to prevent SQL injection attack and reflected cross site scripting attack

International Journal of System Assurance Engineering and Management, 2012

Research paper thumbnail of GAACO: Metaheuristic driven approach for routing in OppNet

2014 Global Summit on Computer & Information Technology (GSCIT), 2014

Routing in delay tolerant network addresses the ability to transport or route bundles from a sour... more Routing in delay tolerant network addresses the ability to transport or route bundles from a source to a destination, which is a primary responsibility that all communication networks must have. However, Opportunistic Networks (Opp-Nets) or Delay Tolerant Networks are characterized by the sparse connectivity resulting in a lack of instantaneous end-to-end path between source and destination. In such a challenging environment, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. We introduce a new meta heuristic oriented routing protocol GAACO that utilizes the optimization techniques of Genetic Algorithm and Ant Colony Optimization to find the path between source and destination. GAACO has been simulated in Network Simulator (NS 2) and its performance has been compared with Epidemic routing Protocol on issues such as delay, number of hops traversed, energy consumed and throughput achieved.

Research paper thumbnail of POSOP Routing Algorithm: A DTN Routing Scheme for Information Connectivity of Health Centres in Hilly State of North India

International Journal of Distributed Sensor Networks, 2015

We explore the application of partitioned network for providing health services in difficult terr... more We explore the application of partitioned network for providing health services in difficult terrain where fixed communication infrastructure is not cost-effective due to low population density and very high cost of setting up a permanent infrastructure. We propose a hybrid routing which is persistent, on-demand, scheduled, opportunistic, and predicted (POSOP) routing algorithm, that exploits various types of contacts existing in a partitioned, hybrid, and sparse network. Such networks may be used to provide guidance from specialist doctors to junior doctors working in primary health centres. We present a scenario from Uttarakhand (a state in hilly region of North India), where POSOP routing algorithm may be used to provide improved health services. Using simulations, we evaluate the performance of POSOP routing algorithm on three metrics, messages delivered, average delay suffered by the delivered messages, and average message traffic. We compare the performance of POSOP routing algorithm with two routing schemes, namely, epidemic and spray and wait on the three metrics. Our approach outperforms both the routing schemes.

Research paper thumbnail of An extended Playfair Cipher using rotation and random swap patterns

2014 International Conference on Computer and Communication Technology, Sep 1, 2014

In this paper, we have proposed an encryption method which is developed by extending Playfair Cip... more In this paper, we have proposed an encryption method which is developed by extending Playfair Cipher to make it more secure. Known as Polyalphabetic cipher, Playfair uses a key matrix containing 25 characters for encryption .This extended playfair cipher supports all 26 characters filled in two different key matrices, second matrix having extra checksum characters. As Playfair is susceptible to various attacks, so to avoid that, we included rotation operation on key matrices and swapping of rows and columns of key matrices according to randomly generated swap patterns. Cryptanalysis of new proposed extended cipher is done by performing various attacks and we conclude that this technique is more secure and can be used as a part of advanced encryption algorithms like AES, DES.

Research paper thumbnail of Unique Identifier System Using Aneka Platform

Advances in Intelligent Systems and Computing, 2016

Research paper thumbnail of GA-LORD: Genetic Algorithm and LTPCL-Oriented Routing Protocol in Delay Tolerant Network

Lecture Notes in Electrical Engineering, 2015

ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of... more ABSTRACT In communication system, there are lots of challenges that make the reliable delivery of data difficult to achieve. In traditional wireless system, if there was any problem such as disconnection between the intermediate nodes or nodes getting drained off because of low energy, then there was high probability of data getting lost. To solve these problems in Delay Tolerant Network(DTN), we propose two new protocols viz. the Licklider Transmission Protocol convergence layer (LTPCL) and a protocol formulated by combination of metaheuristic approaches viz. Genetic Algorithm and Ant Colony Optimization: GAACO to select the shortest path for transmission of the packets from source to destination by consuming less delay, less energy consumption, less number of hops, but at the same time delivering high throughput

Research paper thumbnail of Combined Approach to prevent XSS Attacks and SQL injection

Multiple client side and server side vulnerabilities like SQL Injection and Cross Site Scripting ... more Multiple client side and server side vulnerabilities like SQL Injection and Cross Site Scripting (XSS) are discovered and exploited by malicious users. SQL injection Attacks (SQLIA) and Cross Site scripting vulnerabilities are top ranked in the Open Web Application Security Project (OWASP) top ten vulnerabilities list. Lots of security approaches are proposed like secure coding practices, encryption, static and dynamic analysis of code to secure the web applications but statistics shows that these vulnerabilities are still transpiring at the top. In this paper, we present an integrated model to prevent SQL Injection Attacks and Reflected Cross Site scripting attack in PHP based implementation. This Model is more effective to prevent SQL injection attack and Reflected Cross Site scripting attack in production web environment.

Research paper thumbnail of Application of Routing Metrics in Wireless Network

Research paper thumbnail of Triplicative Cipher Technique

Procedia Computer Science, 2016

Research paper thumbnail of CRiPT: Cryptography in Penetration Testing

Advances in Intelligent Systems and Computing, 2015

Research paper thumbnail of IoTA: Internet of Things Application

Advances in Intelligent Systems and Computing, 2015

Research paper thumbnail of ECBEC: Erasure Coding Block Encryption using Cryptography

Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is ... more Routing in Delay Tolerant Networks is a major problem as no prior knowledge about the network is known to us in advance and frequent partitioning or disconnection also occurs. In DTN the contact between nodes also occurs opportunistically [6]. In this poster we use the concept of erasure coding based routing in DTN which is the enhancement over simple replication strategy. As transmission of erasure codes is vulnerable to attacks so we provide various mechanism to make the erasure codes more secure. Earlier the erasure codes are insecure and our work focused on providing security to various code blocks that are transmitted through different path of the network. We use Symmetric algorithm (stream as well as block cipher techniques) for providing security to the erasure codes and we also create message digest for each replica of the message that will be sent to the destination node.

Research paper thumbnail of Clearing The Clouds On Cloud Computing : Survey Paper

The advent of Cloud Computing in 2006, has led to significant changes in computing in general and... more The advent of Cloud Computing in 2006, has led to significant changes in computing in general and working pattern of users in particular. Starting from the definition of cloud computing, elements of cloud computing, cloud services, cloud deployment, cloud computing platforms & technologies and issues & challenges of cloud computing are described in this paper. I. INTRODUCTION The term ‗Cloud' has historically been used in the telecommunication industry as an abstraction of the network in system diagrams. It then became the symbol of the most popular computer network ‗Internet'. The internet plays a fundamental role in cloud computing since it represents either the medium or the platform through which many cloud computing services are delivered and made accessible. Cloud computing refers to both the application delivered as a services over the internet and the hardware and the system software in the data centers that provide those services. Cloud computing enables both, a sin...

Research paper thumbnail of A J2ME based Credit Card Number Verification Software using Bluetooth

Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card... more Abstract— This paper describes the use of Java 2 Platform, Micro Edition to develop a credit card number verification software using Bluetooth. With the extensive use of mobile devices and proliferation of wireless technology in day-to-day life, the proposed software can be easily adapted at various retail shops and can make credit-card number verification process fast and convenient for users. The basis of the proposed method is KVM, an optimized Virtual Machine for mobile devices limited by memory, power consumption and connectivity, and JSR82 (Java Specification Requests 82: Bluetooth API). A secure client-server relationship is established between two mobile devices. The client side device at the customer end passes the credit card details through Bluetooth to the server side device with the retailer. The server side verifies the details. Sun JavaME Wireless Toolkit 2.5.2 is used to automate tasks related to creation and testing of the proposed software and the results are effec...

Research paper thumbnail of PJCT: Penetration testing based JAVA code testing tool

International Conference on Computing, Communication & Automation, 2015

ABSTRACT Security is the key concern for every system, network or application. Penetration Testin... more ABSTRACT Security is the key concern for every system, network or application. Penetration Testing in Software engineering and System Security in Computer Networks are key areas in secure development of an application. Many approaches and research techniques have tried to address the issue of secure coding in development phase only. Rigorous approaches have been introduced in the treatment of security aspects in information systems. Penetration testing is one of the approaches for system security. Penetration testing helps to contradict the security aspects of the system. It is technique of deceiving the hypothesis that any system, network or application is secure. Our study reveals that there are hardly any good quality tool(s) that can detect the vulnerable code in Application, so in this paper we propose a Penetration Testing based Java Code Testing Tool (PJCT) to check major security attribute of any given java code. The PJCT can detect the presence or absence of seven attributes, which we introduce for the first time to test the security of the application effectively. In this paper performance analysis of PJCT has been exhibited and also it’s comparison with other tools such as PIC et al. have also been demonstrated.

Research paper thumbnail of Analysis of Query Based Attack in the Delay/Fault Tolerant Mobile Sensor Network

International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2011

have evolved at a tremendous rate in the last couple of years. As the networks are evolving so is... more have evolved at a tremendous rate in the last couple of years. As the networks are evolving so is the rate at which the queries are exchanged in between these network and the number of database accessess that need to be performed. The queries are getting complex due to the mobile nature of the nodes in these network and their eagerness to get the response accurately in short span of time because of their limited energy resources. In this paper the effort is made to depict the routing strategies prevalent in DFT-MSN using the OMNET++ , proposing a set of SQL/TIQL queries that are exchanged between the pair of nodes taken from the CRAWDAD dataset , portrays their execution on Oracle 9i Enterprise Edition Release 9.2.0.1.0 Production and expose how these queries are vulnerable to the different type of the SQL attack which can either be launched manually or through the various proprietary and open source SQL Injection tools.

Research paper thumbnail of Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network

Communications in Computer and Information Science, 2011

Page 1. DC Wyld et al. (Eds.): CNSA 2011, CCIS 196, pp. 453–462, 2011. © Springer-Verlag Berlin H... more Page 1. DC Wyld et al. (Eds.): CNSA 2011, CCIS 196, pp. 453–462, 2011. © Springer-Verlag Berlin Heidelberg 2011 Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network ...

Research paper thumbnail of A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection

2012 International Conference on Communication Systems and Network Technologies, 2012

Today almost all organizations have improved their performance through allowing more information ... more Today almost all organizations have improved their performance through allowing more information exchange within their organization as well as between their distributers, suppliers, and customers using web support. Databases are central to the modern websites as they provide necessary data as well as stores critical information such as user credentials, financial and payment information, company statistics etc. These websites have been continuously targeted by highly motivated malicious users to acquire monetary gain.

Research paper thumbnail of DSG-PC: Dynamic Social Grouping Based Routing for Non-uniform Buffer Capacities in DTN Supported with Periodic Carriers

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013

Routing a message in networks that are dynamic in nature with time varying partially connected to... more Routing a message in networks that are dynamic in nature with time varying partially connected topology has been a challenge. The heterogeneity of the types of contacts available in such a network also adds to complexity. In this paper we present an approach to transfer messages in disruption/delay tolerant network when there is only intermittent connectivity between the nodes. Most of the existing approaches exploit either the opportunistic contacts and transfer messages using the probabilities of delivering a message or use periodic contacts. In addition to opportunistic contacts, we also have scheduled carriers that are available periodically. Scheduled carriers guarantee delivery of the messages to the base station, however, it may have an added delay. If a message can tolerate the delay through the scheduled carrier, it waits else it may be forwarded to an opportunistic contact. We define a utility function for a node to decide whether to forward the message to an opportunistic contact or to a scheduled contact. This is an improvement over routing through opportunistic contacts that exploits social behavior of the nodes as in . We compare performance of our approach with [2] on message delivery ratio, message delay and message traffic ratio (number of messages forwarded / number of messages delivered) and found that our algorithm outperforms [2] on all the three metrics. We also studied the impact of initializing the probabilities of the nodes proportional to the varying buffer size in . It was found that delivery ratio increased significantly without increasing the message traffic ratio and delay.

Research paper thumbnail of CONCOR: context-aware community-oriented routing for intermittently connected network

EURASIP Journal on Wireless Communications and Networking, 2015

are characterized by time-varying and partially connected network topology. In such networks, mob... more are characterized by time-varying and partially connected network topology. In such networks, mobility of node may be by virtue of its carrier. Social beings such as humans may act as a carrier of mobile nodes, and therefore mobility pattern of node follows a social-based movement model. Due to intermittent connectivity, end-to-end path between source and destination is rare and therefore message delivery is a challenge in such networks. In this paper, we present a new routing approach, context-aware community-oriented routing (CONCOR) that exploits the community and the context awareness of nodes, for efficient message delivery. Nodes with a common point of interest form a dynamic community. We have identified a set of node's attribute (context) and formulated a utility function to determine its capability to deliver a message. CONCOR is a multihop routing approach exploiting the nodes as message relays (store-carry-forward). Through simulation, we validated the effectiveness of node's attributes in estimation of message delivery probability. The simulations were done for our approach using the social movement-based data set on Opportunistic Network Environment (ONE) simulator. We compared our approach with dynamic social grouping (DSG)-based routing and context-aware routing(CAR) on three metrics viz. message delivery ratio, message traffic ratio and average message delay. We found that the results of our approach outperforms the DSG and CAR on all the three metrics.

Research paper thumbnail of Integrated approach to prevent SQL injection attack and reflected cross site scripting attack

International Journal of System Assurance Engineering and Management, 2012

Research paper thumbnail of GAACO: Metaheuristic driven approach for routing in OppNet

2014 Global Summit on Computer & Information Technology (GSCIT), 2014

Routing in delay tolerant network addresses the ability to transport or route bundles from a sour... more Routing in delay tolerant network addresses the ability to transport or route bundles from a source to a destination, which is a primary responsibility that all communication networks must have. However, Opportunistic Networks (Opp-Nets) or Delay Tolerant Networks are characterized by the sparse connectivity resulting in a lack of instantaneous end-to-end path between source and destination. In such a challenging environment, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. We introduce a new meta heuristic oriented routing protocol GAACO that utilizes the optimization techniques of Genetic Algorithm and Ant Colony Optimization to find the path between source and destination. GAACO has been simulated in Network Simulator (NS 2) and its performance has been compared with Epidemic routing Protocol on issues such as delay, number of hops traversed, energy consumed and throughput achieved.