Vanitha Kumar - Academia.edu (original) (raw)
Papers by Vanitha Kumar
MANET is multi hop ad-hoc networks and nodes in that can acts as sender or receiver or relay. Pac... more MANET is multi hop ad-hoc networks and nodes in that can acts as sender or receiver or relay. Packet drooping is one of the main concerns and the packet loss can be occurred by link errors and malicious packet dropping. The main purpose of this work is to develop an accurate algorithm for detecting selective packet drops made by insider attackers and to improve the detection accuracy, to differentiate whether packet loss is caused due to link error or activity of the attacker by exploiting the correlations between lost packets and to detect packet dropping attacks in mobile environment. The packet dropping in this case is nearly equal to the normal link error because of which existing algorithm that are based on detecting the packet loss rate cannot find the exact cause of packet loss. Hence to improve the detection accuracy, the correlations between lost packets is identified. The technique called Homomorphism Linear Authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of packet loss information reported by nodes. This architecture is privacy preserving, collusion proof and incurs low communication and storage overheads. Hence to improve the detection accuracy, the correlations between the bitmap generated are calculated and lost packets are identified. The public auditing architecture is developed that detects and verifies the truthfulness of the packet loss information reported by nodes.
The Mobile Adhoc Network (MANET) consists of several wireless mobile nodes and due to its mobilit... more The Mobile Adhoc Network (MANET) consists of several wireless mobile nodes and due to its mobility their network topology changed dynamically. So the network does not have any fixed infrastructure. In this paper discussed about the various problem and security attacks in each layer in the MANET and also about what are the security services in mobile adhoc network. Routing in adhoc network is main issues because of node mobility and limited resource. Here we discussed two types of routing protocol In this paper also reviewed about the working principles of on demand routing protocol AODV and DSR.Finally compare both the protocol. This will provide guidance for the security related research works in this area.
We consider the location service in a mobile ad-hoc network (MANET), where each and every node ne... more We consider the location service in a mobile ad-hoc network (MANET), where each and every node needs to maintain its information about location by 1) often updating its positional information within its neighboring region, which is called neighborhood update (NU), and 2) frequently updating its location information to specific distributed location server in the network, which is called location server update (LSU). The tradeoff between the operation costs in location updates and the performance losses of the target application due to location errors imposes a crucial question for nodes to decide the optimal strategy to update their location information, where the optimality is in the sense of reducing the overall costs. In this paper, we develop a stochastic sequential decision framework to analyze this problem. Under a Markovian mobility model, the location update decision problem is modeled as a Markov Decision Process (MDP). We first investigate the monotonicity properties of optimal NU and LSU operations with respect to location inaccuracies under a general cost setting. From the discovered separation property of the problem structure and the monotonicity properties of optimal actions, we find that 1) there always exists a simple optimal threshold-based update rule for LSU operations; 2) for NU operations, an optimal threshold-based update rule exists in a low-mobility scenario. In the case that no advance knowledge of the MDP model is available, we also introduce a practical model-free learning approach to find a near-optimal solution for the issue.
Nowadays, detection scheme of packet loss and link error is placing a key role for efficient acce... more Nowadays, detection scheme of packet loss and link error is placing a key role for efficient access and analysis in multi-hop wireless ad hoc network. In this paper, for avoiding the dropping of packet and the link error while observing the network an enhanced approach is implemented. In order to have an efficient process of detecting malicious drop and better performances the Failure aware Third Party Auditor (FTPA) based Homomorphism Linear Authenticator (HLA) mechanism (FHM) is proposed. The proposed approach allows reliability verification of information of packet loss and provides preserving process by ensuring the correct estimation of the system. The simulation of the proposed system outcome provides accurate detection, better computation of the system complexity and efficient tasks of multiple auditing. Also, provides a random generating of the approach procedure by using the pseudo random function (PRF). It provides simultaneous process of auditing and improvement in performance than the existing system.
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that commu... more A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attacks. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper presents a review of Black hole and Gray hole attacks in AODV routing protocol.
Mobility and portable nature of Mobile Ad hoc Networks (MANET) has increased its popularity by tw... more Mobility and portable nature of Mobile Ad hoc Networks (MANET) has increased its popularity by two fold. MANETs have become a commonly used network for various applications. But this advantage suffers with serious security concerns, mainly a wireless transmission medium perspective where such networks may be subject topacket dropping. Mobility and portable nature of Mobile Ad hoc Network may also lead to link failure. During packet forward, valuable packets may be dropped by malicious nodes present in the network. Link error and malicious packetdropping are the two sources for packet losses in MANET. A node can act maliciously and could harm the packet sending process. Ad hoc on demand distance vector (AODV) is a popular routing protocol but is exposed to well-known packet dropping attack.
Research India Publications, 2015
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links... more Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. This paper describes the fundamental problems of ad hoc network by giving its related research background including the concept, features, goals, and attacks of MANET. One such specific attack is a black hole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. Ad hoc On-demand Distance Vector (AODV) is one of the most suitable routing protocol for theMANETs and it is more vulnerable to black hole attack by the malicious nodesThis paper discussed about AODV routing protocol also describes how the black hole attack can detect and avoid in AODVrouting protocol.
Al-Ameen , 2019
The introduction of mobile devices has changed our daily lives. They enable users to obtain infor... more The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT), our communication ability will not be restricted to only mobile devices this new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of IOT, Application of IOT and Technology Used in IOT.
MANET is multi hop ad-hoc networks and nodes in that can acts as sender or receiver or relay. Pac... more MANET is multi hop ad-hoc networks and nodes in that can acts as sender or receiver or relay. Packet drooping is one of the main concerns and the packet loss can be occurred by link errors and malicious packet dropping. The main purpose of this work is to develop an accurate algorithm for detecting selective packet drops made by insider attackers and to improve the detection accuracy, to differentiate whether packet loss is caused due to link error or activity of the attacker by exploiting the correlations between lost packets and to detect packet dropping attacks in mobile environment. The packet dropping in this case is nearly equal to the normal link error because of which existing algorithm that are based on detecting the packet loss rate cannot find the exact cause of packet loss. Hence to improve the detection accuracy, the correlations between lost packets is identified. The technique called Homomorphism Linear Authenticator (HLA) based public auditing architecture is developed that allows the detector to verify the truthfulness of packet loss information reported by nodes. This architecture is privacy preserving, collusion proof and incurs low communication and storage overheads. Hence to improve the detection accuracy, the correlations between the bitmap generated are calculated and lost packets are identified. The public auditing architecture is developed that detects and verifies the truthfulness of the packet loss information reported by nodes.
The Mobile Adhoc Network (MANET) consists of several wireless mobile nodes and due to its mobilit... more The Mobile Adhoc Network (MANET) consists of several wireless mobile nodes and due to its mobility their network topology changed dynamically. So the network does not have any fixed infrastructure. In this paper discussed about the various problem and security attacks in each layer in the MANET and also about what are the security services in mobile adhoc network. Routing in adhoc network is main issues because of node mobility and limited resource. Here we discussed two types of routing protocol In this paper also reviewed about the working principles of on demand routing protocol AODV and DSR.Finally compare both the protocol. This will provide guidance for the security related research works in this area.
We consider the location service in a mobile ad-hoc network (MANET), where each and every node ne... more We consider the location service in a mobile ad-hoc network (MANET), where each and every node needs to maintain its information about location by 1) often updating its positional information within its neighboring region, which is called neighborhood update (NU), and 2) frequently updating its location information to specific distributed location server in the network, which is called location server update (LSU). The tradeoff between the operation costs in location updates and the performance losses of the target application due to location errors imposes a crucial question for nodes to decide the optimal strategy to update their location information, where the optimality is in the sense of reducing the overall costs. In this paper, we develop a stochastic sequential decision framework to analyze this problem. Under a Markovian mobility model, the location update decision problem is modeled as a Markov Decision Process (MDP). We first investigate the monotonicity properties of optimal NU and LSU operations with respect to location inaccuracies under a general cost setting. From the discovered separation property of the problem structure and the monotonicity properties of optimal actions, we find that 1) there always exists a simple optimal threshold-based update rule for LSU operations; 2) for NU operations, an optimal threshold-based update rule exists in a low-mobility scenario. In the case that no advance knowledge of the MDP model is available, we also introduce a practical model-free learning approach to find a near-optimal solution for the issue.
Nowadays, detection scheme of packet loss and link error is placing a key role for efficient acce... more Nowadays, detection scheme of packet loss and link error is placing a key role for efficient access and analysis in multi-hop wireless ad hoc network. In this paper, for avoiding the dropping of packet and the link error while observing the network an enhanced approach is implemented. In order to have an efficient process of detecting malicious drop and better performances the Failure aware Third Party Auditor (FTPA) based Homomorphism Linear Authenticator (HLA) mechanism (FHM) is proposed. The proposed approach allows reliability verification of information of packet loss and provides preserving process by ensuring the correct estimation of the system. The simulation of the proposed system outcome provides accurate detection, better computation of the system complexity and efficient tasks of multiple auditing. Also, provides a random generating of the approach procedure by using the pseudo random function (PRF). It provides simultaneous process of auditing and improvement in performance than the existing system.
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that commu... more A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attacks. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper presents a review of Black hole and Gray hole attacks in AODV routing protocol.
Mobility and portable nature of Mobile Ad hoc Networks (MANET) has increased its popularity by tw... more Mobility and portable nature of Mobile Ad hoc Networks (MANET) has increased its popularity by two fold. MANETs have become a commonly used network for various applications. But this advantage suffers with serious security concerns, mainly a wireless transmission medium perspective where such networks may be subject topacket dropping. Mobility and portable nature of Mobile Ad hoc Network may also lead to link failure. During packet forward, valuable packets may be dropped by malicious nodes present in the network. Link error and malicious packetdropping are the two sources for packet losses in MANET. A node can act maliciously and could harm the packet sending process. Ad hoc on demand distance vector (AODV) is a popular routing protocol but is exposed to well-known packet dropping attack.
Research India Publications, 2015
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links... more Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. This paper describes the fundamental problems of ad hoc network by giving its related research background including the concept, features, goals, and attacks of MANET. One such specific attack is a black hole attack in which malicious node falsely claiming itself as having the fresh and shortest path to the destination. Ad hoc On-demand Distance Vector (AODV) is one of the most suitable routing protocol for theMANETs and it is more vulnerable to black hole attack by the malicious nodesThis paper discussed about AODV routing protocol also describes how the black hole attack can detect and avoid in AODVrouting protocol.
Al-Ameen , 2019
The introduction of mobile devices has changed our daily lives. They enable users to obtain infor... more The introduction of mobile devices has changed our daily lives. They enable users to obtain information even in a nomadic environment and provide information without limitations. A decade after the introduction of this technology, we are now facing the next innovation that will change our daily lives. With the introduction of the Internet of Things (IoT), our communication ability will not be restricted to only mobile devices this new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of IOT, Application of IOT and Technology Used in IOT.