VIVEK KUMAR SINHA | RAJIV GANDHI TECHNICAL UNIVERSITY , BHOPAL (original) (raw)
Uploads
Papers by VIVEK KUMAR SINHA
Proceedings 13th International Symposium on System Synthesis
Journal of Pharmacy and Pharmacology, 2007
Compression coating is one of the approaches for delaying the release of drugs. The aim of this s... more Compression coating is one of the approaches for delaying the release of drugs. The aim of this study was to develop colon-specific compression coated systems of 5-fluorouracil (5-FU) for the treatment of colorectal cancer using xanthan gum, boswellia gum and hydroxypropyl methylcellulose (HPMC) as the coating materials. Core tablets containing 50 mg of 5-FU were prepared by direct compression. The coating of the core tablets was done using different coat weights (230, 250, 275 and 300 mg) and different ratios (1:2, 2:1, 1:3, 1:7 and 3:4) of boswellia gum and xanthan gum and different ratios (1:1, 1:2, 2:1, and 2:3) of boswellia gum and HPMC. In-vitro release studies were carried out using simulated gastric and intestinal fluids, with and without rat caecal contents. Among the different ratios used for coating with boswellia:xanthan gum combination, ratio 1:3 gave the best release profile with the lowest coating weights of 230 mg (7.47 ± 1.56% in initial 5 h). Further increase in th...
Colloids and Surfaces B: Biointerfaces, 2013
Content from this work may be used under the terms of the a Creative Commons Attribution-ShareAli... more Content from this work may be used under the terms of the a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0
Symmetry
The proper verification of users plays a vital role during communication over a social network to... more The proper verification of users plays a vital role during communication over a social network to protect the personal data of users. Multifarious protocols have been implemented to secure the confidential data of the users, but these protocols have various limitations and are incapable of providing secrecy of data against various attacks, such as replay and cryptanalysis attacks. In this article, the authors proposed a novel method for security verification of the social network model using an improved three-party authenticated key exchange (3PAKE) protocol based on symmetric encryption and (ECC) elliptic curve cryptography. The outcome of the paper demonstrates that our proposed algorithm provides the desired secrecy to the confidential data exchange over social networks in real-time and consumes less time in comparison to existing protocols. Our protocol consumes a search time of 0.09 s, overall communication steps took 2 during the verification, and depth plies was 3 along with ...
After the worldwide resolution of cellular technology, the communication protocols started Fifth ... more After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the net...
In WSN, delay sensitive means minimizing the delay of event driven wireless sensor network for wh... more In WSN, delay sensitive means minimizing the delay of event driven wireless sensor network for which events occur occasionally by using asynchronous sleep wake scheduling protocol (SWSP). SWSP can be significantly reduced the energy consumption without incurring the communication overhead the clock synchronization needed for synchronous SWSP. In WSN most of the energy consumed through when the sensor nodes are on waiting for an event to occur. SWSP is an effective mechanism to increase the lifetime of WSN. This article presents the energy consumption by the mobile sensor nodes using 802.11 media access control (MAC) and sensor media access control (SMAC) protocols and calculates total energy consumption in the network which helps to make a good balance between energy efficiency and delay. Also the investigation report is presented which explains the throughput and end to end delay of nodes and estimate the life time of sensor networks based on delay (latency). Network Simulator-2 is...
Wireless Networks, 2016
Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfac... more Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfactory network functioning in a DTN relies heavily on coordination among participating nodes. However, in practice, such coordination cannot be taken for granted due to possible misbehaviour by relay nodes. Routing in a DTN is, therefore, vulnerable to various attacks, which adversely affect network performance. Several strategies have been proposed in the literature to alleviate such vulnerabilitiesthey vary widely in terms of throughput, detection time, overhead etc. One key challenge is to arrive at a tradeoff between detection time and overhead. We observe that the existing table-based reactive strategies to combat Denialof-service (DoS) attacks in DTN suffer from two major drawbacks: high overhead and slow detection. In this paper, we propose three secure, lightweight and time-efficient routing algorithms for detecting DoS attacks (Blackhole and Grey-hole attacks) in the Spray & Focus routing protocol. The proposed algorithms are based on use of a small fraction of privileged (trusted) nodes. The first strategy, called TN, outperforms the existing table-based strategy with 20-30 % lesser detection time, 20-25 % higher malicious node detection and negligible overhead. The other two strategies, CTN_MI and CTN_RF explore the novel idea that trusted nodes are able to utilize each others' information/experience using their long range connectivity as and when available. Simulations performed using an enhanced ONE simulator reveals that investing in enabling connectivity among trusted nodes (as in CTN_RF) can have significant performance benefits.
Journal of emerging technologies and innovative research, 2015
with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Genera... more with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Generation (5G) wireless communication system started to emerge and it is foreseen that it will be a result of standards convergence. The 5G expectations in terms of scalability and maximum throughput is set much higher when compared with existing technologies e.g. 4G. There are also some challenges and obstacles that has to be addressed by this emerging technologies, like Device to Device (D2D) communication, efficient energy scheme, complete ubiquity and autonomous management .This paper analyses new technologies that could enable 5G networking, discusses potential standardization and development directions, and presents recent research efforts in the area of future mobile networks. Wi-Max is a broadband remote result that gets to versatile and altered broadband systems through broadband radio access engineering for D2Dcommunication system. IndexTerm— 5G, D2D, HetNet, Trust Node, Neighbor Di...
with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Genera... more with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Generation (5G) wireless communication system started to emerge and it is foreseen that it will be a result of standards convergence. The 5G expectations in terms of scalability and maximum throughput is set much higher when compared with existing technologies e.g. 4G. There are also some challenges and obstacles that has to be addressed by this emerging technologies, like Device to Device (D2D) communication, efficient energy scheme, complete ubiquity and autonomous management .This paper analyses new technologies that could enable 5G networking, discusses potential standardization and development directions, and presents recent research efforts in the area of future mobile networks. Wi-Max is a broadband remote result that gets to versatile and altered broadband systems through broadband radio access engineering for D2Dcommunication system.
Proceedings 13th International Symposium on System Synthesis
Journal of Pharmacy and Pharmacology, 2007
Compression coating is one of the approaches for delaying the release of drugs. The aim of this s... more Compression coating is one of the approaches for delaying the release of drugs. The aim of this study was to develop colon-specific compression coated systems of 5-fluorouracil (5-FU) for the treatment of colorectal cancer using xanthan gum, boswellia gum and hydroxypropyl methylcellulose (HPMC) as the coating materials. Core tablets containing 50 mg of 5-FU were prepared by direct compression. The coating of the core tablets was done using different coat weights (230, 250, 275 and 300 mg) and different ratios (1:2, 2:1, 1:3, 1:7 and 3:4) of boswellia gum and xanthan gum and different ratios (1:1, 1:2, 2:1, and 2:3) of boswellia gum and HPMC. In-vitro release studies were carried out using simulated gastric and intestinal fluids, with and without rat caecal contents. Among the different ratios used for coating with boswellia:xanthan gum combination, ratio 1:3 gave the best release profile with the lowest coating weights of 230 mg (7.47 ± 1.56% in initial 5 h). Further increase in th...
Colloids and Surfaces B: Biointerfaces, 2013
Content from this work may be used under the terms of the a Creative Commons Attribution-ShareAli... more Content from this work may be used under the terms of the a Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0
Symmetry
The proper verification of users plays a vital role during communication over a social network to... more The proper verification of users plays a vital role during communication over a social network to protect the personal data of users. Multifarious protocols have been implemented to secure the confidential data of the users, but these protocols have various limitations and are incapable of providing secrecy of data against various attacks, such as replay and cryptanalysis attacks. In this article, the authors proposed a novel method for security verification of the social network model using an improved three-party authenticated key exchange (3PAKE) protocol based on symmetric encryption and (ECC) elliptic curve cryptography. The outcome of the paper demonstrates that our proposed algorithm provides the desired secrecy to the confidential data exchange over social networks in real-time and consumes less time in comparison to existing protocols. Our protocol consumes a search time of 0.09 s, overall communication steps took 2 during the verification, and depth plies was 3 along with ...
After the worldwide resolution of cellular technology, the communication protocols started Fifth ... more After the worldwide resolution of cellular technology, the communication protocols started Fifth Generation (5G) to come out. The previous generations of cellular technology have been a major transforming term that has covered all the backwards deficiency one by one. And 5G will need to be a major shift that includes very high carrier frequencies with massive bandwidths and extreme base station scalability. The outlook towards 5G is much higher as well as better in terms of capacity, bandwidth and throughput as compared with Fourth Generation (4G). But this technology also faces the major challenges like Device to Device (D2D) communication protocols, efficient energy schemes, pervasiveness and autonomous management [1]. In this paper, we propose a security framework to measure and evaluate trust model, trust propagation, and defend trust evaluation systems against malicious nodes. Our security technique is assessed by its ability to detect and isolate compromised nodes over the net...
In WSN, delay sensitive means minimizing the delay of event driven wireless sensor network for wh... more In WSN, delay sensitive means minimizing the delay of event driven wireless sensor network for which events occur occasionally by using asynchronous sleep wake scheduling protocol (SWSP). SWSP can be significantly reduced the energy consumption without incurring the communication overhead the clock synchronization needed for synchronous SWSP. In WSN most of the energy consumed through when the sensor nodes are on waiting for an event to occur. SWSP is an effective mechanism to increase the lifetime of WSN. This article presents the energy consumption by the mobile sensor nodes using 802.11 media access control (MAC) and sensor media access control (SMAC) protocols and calculates total energy consumption in the network which helps to make a good balance between energy efficiency and delay. Also the investigation report is presented which explains the throughput and end to end delay of nodes and estimate the life time of sensor networks based on delay (latency). Network Simulator-2 is...
Wireless Networks, 2016
Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfac... more Delay tolerant networks (DTNs) are characterized by delay and intermittent connectivity. Satisfactory network functioning in a DTN relies heavily on coordination among participating nodes. However, in practice, such coordination cannot be taken for granted due to possible misbehaviour by relay nodes. Routing in a DTN is, therefore, vulnerable to various attacks, which adversely affect network performance. Several strategies have been proposed in the literature to alleviate such vulnerabilitiesthey vary widely in terms of throughput, detection time, overhead etc. One key challenge is to arrive at a tradeoff between detection time and overhead. We observe that the existing table-based reactive strategies to combat Denialof-service (DoS) attacks in DTN suffer from two major drawbacks: high overhead and slow detection. In this paper, we propose three secure, lightweight and time-efficient routing algorithms for detecting DoS attacks (Blackhole and Grey-hole attacks) in the Spray & Focus routing protocol. The proposed algorithms are based on use of a small fraction of privileged (trusted) nodes. The first strategy, called TN, outperforms the existing table-based strategy with 20-30 % lesser detection time, 20-25 % higher malicious node detection and negligible overhead. The other two strategies, CTN_MI and CTN_RF explore the novel idea that trusted nodes are able to utilize each others' information/experience using their long range connectivity as and when available. Simulations performed using an enhanced ONE simulator reveals that investing in enabling connectivity among trusted nodes (as in CTN_RF) can have significant performance benefits.
Journal of emerging technologies and innovative research, 2015
with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Genera... more with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Generation (5G) wireless communication system started to emerge and it is foreseen that it will be a result of standards convergence. The 5G expectations in terms of scalability and maximum throughput is set much higher when compared with existing technologies e.g. 4G. There are also some challenges and obstacles that has to be addressed by this emerging technologies, like Device to Device (D2D) communication, efficient energy scheme, complete ubiquity and autonomous management .This paper analyses new technologies that could enable 5G networking, discusses potential standardization and development directions, and presents recent research efforts in the area of future mobile networks. Wi-Max is a broadband remote result that gets to versatile and altered broadband systems through broadband radio access engineering for D2Dcommunication system. IndexTerm— 5G, D2D, HetNet, Trust Node, Neighbor Di...
with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Genera... more with in the short span of time the WLAN started to emerged, the novel Concept of the Fifth Generation (5G) wireless communication system started to emerge and it is foreseen that it will be a result of standards convergence. The 5G expectations in terms of scalability and maximum throughput is set much higher when compared with existing technologies e.g. 4G. There are also some challenges and obstacles that has to be addressed by this emerging technologies, like Device to Device (D2D) communication, efficient energy scheme, complete ubiquity and autonomous management .This paper analyses new technologies that could enable 5G networking, discusses potential standardization and development directions, and presents recent research efforts in the area of future mobile networks. Wi-Max is a broadband remote result that gets to versatile and altered broadband systems through broadband radio access engineering for D2Dcommunication system.