Yogesh Bhute - Academia.edu (original) (raw)
Papers by Yogesh Bhute
Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552), 2015
The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mo... more The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is a complex task because of its Dynamic nature of Infrastructure. In this proposal, designing an Dynamic routing path decider to find less risk aware routing path for effective communication. The efficiency of the throughput and Routing failures can be further reduced by making Nodes of MANET to be more Knowledgeable that is with more Metadata parameters. This paper introduce a class of metrics to measure the effective security offered in a wireless network as a function of the routing topology and the link security provided by the key assignment protocol. This joint protocol analysis allows a network analyst or an adversary to evaluate the vulnerability of network traffic and isolate weakly secured connections. Its show how an intelligent adversary can mount a node capture attack using vulnerability evaluation to focus ...
Abstract:Message authentication is one of the most effective ways to thwart unauthorized and corr... more Abstract:Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless networks. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial.
Online Social Networks enables its users to keep in touch with friends by exchanging several type... more Online Social Networks enables its users to keep in touch with friends by exchanging several type of content including text, audio and video data. Users of these sites do not have much control to avoid unwanted content to be displayed on their own private space called in general wall. Therefore a major task of today’s online social network is information filtering. Using machine learning approach and a rule based system, text classification and customization of filtering criteria to be applied on user’s wall is to be achieved. From this survey, we will be able to see the challenges in short text classification and filtering criteria that should be considered while publishing messages on user wall.
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connecte... more Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The key feature of MANETs is the absence of a centralmanagement agency or a fixed infrastructure. Since the most devastating damage to MANET is caused by routing attacks they have received considerable attention.In this survey, initially the existing security attacks in MANET are analysed. The attacks categories fall under two stages that include internal and external attacks. The former attack is due to the malicious nodes within the network and later attack is caused by the nodes which do not belong to the network. Then the secure, efficient dynamic routing techniques which are main issues concerned with ad hoc networks are surveyed. An IDS is used to detect attempted intrusion into acomputer or network. It processes audit data, performs analysis and takes certain set of actions against the intruder. Overall, our su...
We consider a road scenario where users aboard equipped with communication-enabled interfaces in ... more We consider a road scenario where users aboard equipped with communication-enabled interfaces in vehicles are requesting for data access or downloading an altogether different content (different from that of the other vehicular users) from internet servers or roadside Access Points (APs). Downloading an altogether different content from the Internet is a topic of increasing interest in vehicular networks. We will review the techniques used for increasing the performance limits of such vehicular communication system for downloading content and accessing data which is unique for the other users by considering the downloading process as an optimization problem and thus we can maximize the overall system throughput by leveraging both Infrastructure-toVehicle (I2V) and Vehicle-toVehicle (V2V) communication. We will see the various methods used to investigate the impact of various factors like traffic intensity of vehicular users in the given region, deployment of roadside infrastructure,...
Issue concerning child pornography has been growing fastest in all over the world. This crime is ... more Issue concerning child pornography has been growing fastest in all over the world. This crime is regarded as being extremely harmful; its prosecution is of the highest priority for police forces and law enforcement organizations around the world. As child pornography is considered as criminal activity therefore the law of possession and distribution of CP images not only applies to regular citizens, but also to police units that they not allowed to gather and catalogue evidence for future reference. Due to this problem, this module presents an innovative solution. This paper presents tools for sequencing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspect's file system. As it provides the relation between previous cases and current cases therefore it is also helpful in capturing offenders and provides protection to victims.
One of the challenges facing the current web is the efficient use of all the available informatio... more One of the challenges facing the current web is the efficient use of all the available information. The Web 2.0 phenomenon has favored the creation of contents by average users, and thus the amount of information that can be found for diverse topics has grown exponentially in the last years. Initiatives such as linked data are helping to build the Semantic Web, in which a set of standards are proposed for the exchange of data among heterogeneous systems. However, these standards are sometimes not used, and there are still plenty of websites that require naive techniques to discover their contents and services. This paper proposes an integrated system for content and service discovery and extraction. The system is divided into several layers where the discovery of contents and services is made in a representational stateless transfer system such as the web. It employs several web mining techniques as well as feature oriented modeling for the discovery of cross-cutting features in web...
Wireless sensor networks are an important for monitoring distributed remote environments. As one ... more Wireless sensor networks are an important for monitoring distributed remote environments. As one of the key technologies involved in WSNs, nodes fault detection is indispensable in most WSN applications. It is well known that the distributed fault detection scheme checks out the failed nodes by exchanging data and mutually testing among neighbor nodes in this network, bu t the fault detection accuracy of a scheme would decrease rap idly when the number of neighbor nodes to be diagnosed is small and the node’s failure ratio is high. Wireless sensor-actor networks, sensors probe their surroundings and forward their data to actor nodes. Actors collaboratively respond to achieve predefined application mission. Since actors h ave to coordinate their operation, it is necessary to maintain a strongly connected network topology at all times. Moreover, the length of the inter -actor communicat ion paths maybe constrained to meet latency requirement. Cost Aware Secure Routing protocol to addr...
As we all know that the biometrics system is used everywhere for person identity verfication. So ... more As we all know that the biometrics system is used everywhere for person identity verfication. So the biometric system identification is based on the modality and that modalities depends on the physical as well as biological behaviour of the person. The physical behaviour like Fingerprint, Iris, face are. physical behaviour of the human being whereas biological behaviour means according to mannerism of human being are signature or DNA testing of human being .If we are using one modality for identification of person it leads to problem as the modality fail for identification so person has to face problems. If modality fails for identification person comes under problem for that purpose multimodal system is the best option. In multimodal system we are using two modalities for person identification. In this paper we have used two modalities i.e. Fingerprint and Iris. If it is compared with other modalities like palm print, Voice, Fingerprint takes comparative little time for scanning an...
Child pornography is one of the rapidly increasing illegal activities in all over the world. Poss... more Child pornography is one of the rapidly increasing illegal activities in all over the world. Possession and distribution of Child pornography are considered as crimes which are prosecuted in most countries around the world. This law is so strict that it is not only just applicable to regular citizens but also to polices forces which may complicates them in gathering and sequencing evidence for future reference. Due to this problem, this module presents an innovative solution. This paper presents tools for sequencing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspect's file system which would helpful in capturing offenders and provide protection to victims . Since the widespread use of the Internet, the distribution and acquisition of child pornography, namely illegal and immoral images and video files of children, or "any visual depiction of illegally explicit conduct involving children has dramatically increase...
Today’s online social networks have become a fairly common way to keep in touch with friends and ... more Today’s online social networks have become a fairly common way to keep in touch with friends and family. The potential of this enhanced connectivity is very huge however the negative impacts are quite evident. Cyber bullying due to online social network (OSN) is also on rise therefore the need of present situation is not only to avoid unwanted wall post but also to avoid undesired creator. In this paper we have presented a system which prevents unwanted messages to get published on OSN user wall and at the same time messages from undesired creator can get blocked as well. Additionally we are implementing a strategy to blacklist user on a tentative or permanent basis with respect to bad post he wishes to post on OSN user wall. A machine learning technique and a customized filtering rule is used for this purpose.
IJIREEICE, 2017
The IoT based Smart and Multi-Functional Energy meter is designed to send actual enrgy consumptio... more The IoT based Smart and Multi-Functional Energy meter is designed to send actual enrgy consumption date of the consumer to the server of the electricity office with the help of Zigbee technology .This data is stored on the database where different parameters are observed such as tampering of meter. We are using zigbee module at the transmitter side and receiver side. Data is stored on the local database with the help of serial port of the computer. Remote connection and disconnection can be done from the electricity office side. External tampering of meter can also be prevented. In this process, there should not be any unwanted interference from the external attackers. Different types of attacks can be possible such as DoS attack. The aim of this paper to discuss various security issues for transmitting consumption data whose integrity is very important for both consumer as well as for electricity board.
In today's world websites are commonly used in almost every walk of life. The use of websites has... more In today's world websites are commonly used in almost every walk of life. The use of websites has certainly brought a huge exchange of important data via the websites, where websites being the platform for such exorbitant information exchange. Being a bridge for such a change there needs to be an inherent requirement to make the websites highly efficient and hence strengthening their performance. An attempt is made in this direction to improve the websites efficiency by following a mathematical model which treats the website as a graph and resolves its complexity assuming it as a graph optimization problem. Treating website as a graph has its own advantage as it enables us to handle the complex links present in a website in an efficient manner.
International Journal of Computer Applications, 2013
communication can be considered as a promising technology to significantly increase the transmiss... more communication can be considered as a promising technology to significantly increase the transmission rate along with the coverage area of a wireless network which aims to achieve spatial diversity via the cooperation of user terminals in transmission without requiring installation of multiple transceiver antennas. The user terminals which can be used for this purpose can be termed as relay nodes. However, most of the existing solutions on relay node assignment problem with multiple source-destination pairs are limited to assign each single pair at most one cooperative relay node. Therefore, this paper studies the cooperative relay node assignment problem in a network environment, where multiple source-destination pairs compete for the same pool of cooperative relay nodes and each pair can be allotted multiple cooperative relay nodes for cooperative communication to maximize the transmission rate and hence improves the performance among all communicating pairs. Without requiring mult...
Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552), 2015
The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mo... more The topological nature of MANET(Mobile Ad-hoc Network) itself demands high security due to its mobility movement, but designing a risk aware routing path for MANET is a complex task because of its Dynamic nature of Infrastructure. In this proposal, designing an Dynamic routing path decider to find less risk aware routing path for effective communication. The efficiency of the throughput and Routing failures can be further reduced by making Nodes of MANET to be more Knowledgeable that is with more Metadata parameters. This paper introduce a class of metrics to measure the effective security offered in a wireless network as a function of the routing topology and the link security provided by the key assignment protocol. This joint protocol analysis allows a network analyst or an adversary to evaluate the vulnerability of network traffic and isolate weakly secured connections. Its show how an intelligent adversary can mount a node capture attack using vulnerability evaluation to focus ...
Abstract:Message authentication is one of the most effective ways to thwart unauthorized and corr... more Abstract:Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being forwarded in wireless networks. For this reason, many message authentication schemes have been developed, based on either symmetric-key cryptosystems or public-key cryptosystems. Most of them, however, have the limitations of high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks. To address these issues, a polynomial-based scheme was recently introduced. However, this scheme and its extensions all have the weakness of a built-in threshold determined by the degree of the polynomial when the number of messages transmitted is larger than this threshold, the adversary can fully recover the polynomial.
Online Social Networks enables its users to keep in touch with friends by exchanging several type... more Online Social Networks enables its users to keep in touch with friends by exchanging several type of content including text, audio and video data. Users of these sites do not have much control to avoid unwanted content to be displayed on their own private space called in general wall. Therefore a major task of today’s online social network is information filtering. Using machine learning approach and a rule based system, text classification and customization of filtering criteria to be applied on user’s wall is to be achieved. From this survey, we will be able to see the challenges in short text classification and filtering criteria that should be considered while publishing messages on user wall.
Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connecte... more Mobile ad hoc networks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. The key feature of MANETs is the absence of a centralmanagement agency or a fixed infrastructure. Since the most devastating damage to MANET is caused by routing attacks they have received considerable attention.In this survey, initially the existing security attacks in MANET are analysed. The attacks categories fall under two stages that include internal and external attacks. The former attack is due to the malicious nodes within the network and later attack is caused by the nodes which do not belong to the network. Then the secure, efficient dynamic routing techniques which are main issues concerned with ad hoc networks are surveyed. An IDS is used to detect attempted intrusion into acomputer or network. It processes audit data, performs analysis and takes certain set of actions against the intruder. Overall, our su...
We consider a road scenario where users aboard equipped with communication-enabled interfaces in ... more We consider a road scenario where users aboard equipped with communication-enabled interfaces in vehicles are requesting for data access or downloading an altogether different content (different from that of the other vehicular users) from internet servers or roadside Access Points (APs). Downloading an altogether different content from the Internet is a topic of increasing interest in vehicular networks. We will review the techniques used for increasing the performance limits of such vehicular communication system for downloading content and accessing data which is unique for the other users by considering the downloading process as an optimization problem and thus we can maximize the overall system throughput by leveraging both Infrastructure-toVehicle (I2V) and Vehicle-toVehicle (V2V) communication. We will see the various methods used to investigate the impact of various factors like traffic intensity of vehicular users in the given region, deployment of roadside infrastructure,...
Issue concerning child pornography has been growing fastest in all over the world. This crime is ... more Issue concerning child pornography has been growing fastest in all over the world. This crime is regarded as being extremely harmful; its prosecution is of the highest priority for police forces and law enforcement organizations around the world. As child pornography is considered as criminal activity therefore the law of possession and distribution of CP images not only applies to regular citizens, but also to police units that they not allowed to gather and catalogue evidence for future reference. Due to this problem, this module presents an innovative solution. This paper presents tools for sequencing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspect's file system. As it provides the relation between previous cases and current cases therefore it is also helpful in capturing offenders and provides protection to victims.
One of the challenges facing the current web is the efficient use of all the available informatio... more One of the challenges facing the current web is the efficient use of all the available information. The Web 2.0 phenomenon has favored the creation of contents by average users, and thus the amount of information that can be found for diverse topics has grown exponentially in the last years. Initiatives such as linked data are helping to build the Semantic Web, in which a set of standards are proposed for the exchange of data among heterogeneous systems. However, these standards are sometimes not used, and there are still plenty of websites that require naive techniques to discover their contents and services. This paper proposes an integrated system for content and service discovery and extraction. The system is divided into several layers where the discovery of contents and services is made in a representational stateless transfer system such as the web. It employs several web mining techniques as well as feature oriented modeling for the discovery of cross-cutting features in web...
Wireless sensor networks are an important for monitoring distributed remote environments. As one ... more Wireless sensor networks are an important for monitoring distributed remote environments. As one of the key technologies involved in WSNs, nodes fault detection is indispensable in most WSN applications. It is well known that the distributed fault detection scheme checks out the failed nodes by exchanging data and mutually testing among neighbor nodes in this network, bu t the fault detection accuracy of a scheme would decrease rap idly when the number of neighbor nodes to be diagnosed is small and the node’s failure ratio is high. Wireless sensor-actor networks, sensors probe their surroundings and forward their data to actor nodes. Actors collaboratively respond to achieve predefined application mission. Since actors h ave to coordinate their operation, it is necessary to maintain a strongly connected network topology at all times. Moreover, the length of the inter -actor communicat ion paths maybe constrained to meet latency requirement. Cost Aware Secure Routing protocol to addr...
As we all know that the biometrics system is used everywhere for person identity verfication. So ... more As we all know that the biometrics system is used everywhere for person identity verfication. So the biometric system identification is based on the modality and that modalities depends on the physical as well as biological behaviour of the person. The physical behaviour like Fingerprint, Iris, face are. physical behaviour of the human being whereas biological behaviour means according to mannerism of human being are signature or DNA testing of human being .If we are using one modality for identification of person it leads to problem as the modality fail for identification so person has to face problems. If modality fails for identification person comes under problem for that purpose multimodal system is the best option. In multimodal system we are using two modalities for person identification. In this paper we have used two modalities i.e. Fingerprint and Iris. If it is compared with other modalities like palm print, Voice, Fingerprint takes comparative little time for scanning an...
Child pornography is one of the rapidly increasing illegal activities in all over the world. Poss... more Child pornography is one of the rapidly increasing illegal activities in all over the world. Possession and distribution of Child pornography are considered as crimes which are prosecuted in most countries around the world. This law is so strict that it is not only just applicable to regular citizens but also to polices forces which may complicates them in gathering and sequencing evidence for future reference. Due to this problem, this module presents an innovative solution. This paper presents tools for sequencing metadata of the evidence material and also provide fast and accurate search to recover such evidence from suspect's file system which would helpful in capturing offenders and provide protection to victims . Since the widespread use of the Internet, the distribution and acquisition of child pornography, namely illegal and immoral images and video files of children, or "any visual depiction of illegally explicit conduct involving children has dramatically increase...
Today’s online social networks have become a fairly common way to keep in touch with friends and ... more Today’s online social networks have become a fairly common way to keep in touch with friends and family. The potential of this enhanced connectivity is very huge however the negative impacts are quite evident. Cyber bullying due to online social network (OSN) is also on rise therefore the need of present situation is not only to avoid unwanted wall post but also to avoid undesired creator. In this paper we have presented a system which prevents unwanted messages to get published on OSN user wall and at the same time messages from undesired creator can get blocked as well. Additionally we are implementing a strategy to blacklist user on a tentative or permanent basis with respect to bad post he wishes to post on OSN user wall. A machine learning technique and a customized filtering rule is used for this purpose.
IJIREEICE, 2017
The IoT based Smart and Multi-Functional Energy meter is designed to send actual enrgy consumptio... more The IoT based Smart and Multi-Functional Energy meter is designed to send actual enrgy consumption date of the consumer to the server of the electricity office with the help of Zigbee technology .This data is stored on the database where different parameters are observed such as tampering of meter. We are using zigbee module at the transmitter side and receiver side. Data is stored on the local database with the help of serial port of the computer. Remote connection and disconnection can be done from the electricity office side. External tampering of meter can also be prevented. In this process, there should not be any unwanted interference from the external attackers. Different types of attacks can be possible such as DoS attack. The aim of this paper to discuss various security issues for transmitting consumption data whose integrity is very important for both consumer as well as for electricity board.
In today's world websites are commonly used in almost every walk of life. The use of websites has... more In today's world websites are commonly used in almost every walk of life. The use of websites has certainly brought a huge exchange of important data via the websites, where websites being the platform for such exorbitant information exchange. Being a bridge for such a change there needs to be an inherent requirement to make the websites highly efficient and hence strengthening their performance. An attempt is made in this direction to improve the websites efficiency by following a mathematical model which treats the website as a graph and resolves its complexity assuming it as a graph optimization problem. Treating website as a graph has its own advantage as it enables us to handle the complex links present in a website in an efficient manner.
International Journal of Computer Applications, 2013
communication can be considered as a promising technology to significantly increase the transmiss... more communication can be considered as a promising technology to significantly increase the transmission rate along with the coverage area of a wireless network which aims to achieve spatial diversity via the cooperation of user terminals in transmission without requiring installation of multiple transceiver antennas. The user terminals which can be used for this purpose can be termed as relay nodes. However, most of the existing solutions on relay node assignment problem with multiple source-destination pairs are limited to assign each single pair at most one cooperative relay node. Therefore, this paper studies the cooperative relay node assignment problem in a network environment, where multiple source-destination pairs compete for the same pool of cooperative relay nodes and each pair can be allotted multiple cooperative relay nodes for cooperative communication to maximize the transmission rate and hence improves the performance among all communicating pairs. Without requiring mult...