Naman Vaishnav - Academia.edu (original) (raw)

Papers by Naman Vaishnav

Research paper thumbnail of Comprehensive Study on Key Management Schemes in Manet

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR

Content dissemination is performed between wireless mobile nodes in an infrastructure-less mobile... more Content dissemination is performed between wireless mobile nodes in an infrastructure-less mobile ad-hoc environment. So, securing content is a major problem in MANETs because mobile nodes cannot trust their neighbor nodes. We present a security approach for small topological environments by adding crypto-graphical mechanism into DSR routing protocol. Our aim is to secure the traffic and reduce the effect of possible attacks without affecting network performances.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative Analysis of Application Layer Internet of Things (IoT) Protocols

Information and Communication Technology for Sustainable Development, 2017

IoT devices will be everywhere, will be context-aware and will enable ambient intelligence. This ... more IoT devices will be everywhere, will be context-aware and will enable ambient intelligence. This provides a possibility of a framework that would allow direct machine-to-machine communication. This vision has produced an exemplar which is often referred to as the Internet of things (IoT). We have studied the application level IoT protocols namely, The Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT) and the Hypertext Transfer Protocol (HTTP)/REpresentational State Transfer (REST). We have used the cooja simulator for carrying out the simulation. We have simulated the above protocols in the cooja simulator demonstrating a simple scenario of three motes. We have read the sensor information from the server with the help of browser. We can also make use of different topologies and simulate the scenario according the requirement.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comprehensive Study on Key Management Schemes in Manet

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Secure Content Dissemination in Small Topological Environment by Enhancing Security of DSR

Content dissemination is performed between wireless mobile nodes in an infrastructure-less mobile... more Content dissemination is performed between wireless mobile nodes in an infrastructure-less mobile ad-hoc environment. So, securing content is a major problem in MANETs because mobile nodes cannot trust their neighbor nodes. We present a security approach for small topological environments by adding crypto-graphical mechanism into DSR routing protocol. Our aim is to secure the traffic and reduce the effect of possible attacks without affecting network performances.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Comparative Analysis of Application Layer Internet of Things (IoT) Protocols

Information and Communication Technology for Sustainable Development, 2017

IoT devices will be everywhere, will be context-aware and will enable ambient intelligence. This ... more IoT devices will be everywhere, will be context-aware and will enable ambient intelligence. This provides a possibility of a framework that would allow direct machine-to-machine communication. This vision has produced an exemplar which is often referred to as the Internet of things (IoT). We have studied the application level IoT protocols namely, The Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT) and the Hypertext Transfer Protocol (HTTP)/REpresentational State Transfer (REST). We have used the cooja simulator for carrying out the simulation. We have simulated the above protocols in the cooja simulator demonstrating a simple scenario of three motes. We have read the sensor information from the server with the help of browser. We can also make use of different topologies and simulate the scenario according the requirement.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of COMPREHENSIVE STUDY ON KEY MANAGEMENT SCHEMES IN MANET

MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination no... more MANET does not have pre-existing fixed structure. Mobile nodes send packets to the destination nodes directly or via the intermediate nodes. Nodes exchange packets with each other to allow the message to pass among both ends step by step. These packets are outside the wireless transmission range. It is for potential security concern because intermediate nodes cannot be trusted. With such feature ad-hoc networks are least attacked which influences performance of the network with its reliability. Secure communication in MANET is to be claimed by the reliability parameter of the key management strategy, which is capable for securing contents among the nodes. This survey presents the conceptual view for various key management techniques with their special features.

Bookmarks Related papers MentionsView impact