The collections of large number of sensor nodes are called wireless sensor networks. It is one of... more The collections of large number of sensor nodes are called wireless sensor networks. It is one of the domineering technologies in near future and also poses the unique challenges for the researchers to related field. Sensor networks are tiny nodes with sensing, computation capability. The fault tolerance, high sensing fidelity, flexibility and rapid deployment are some of the characteristic of sensor network which make it exiting in the field of remote sensing. Though there is another side too. In a very large scale sensor network individual sensors are subject to security compromise. Attacker can overhear the messages sent by another sensor node due to broadcast nature of communication. With increasing requirement of WSN in the areas of military and other areas, the security threats also increases. However the open nature of the wireless communication channels, the lack of infrastructure, the fast deployment practices, and the hostile environments where they may be deployed, make them vulnerable to a wide range of security attacks. The key issues in WSN are security, energy consumption and proper communication .In this paper we surveyed all the possible security attacks and all the geographical routing protocols in WSN .Some possible security attacks in wireless sensor network are Sink hole attack, Sybil attack, selective forwarding attack, wormhole attack and hello flood attack. This paper presents a thorough review of all the routing protocols as well as all these attacks which are given above in WSN.
Rapid growth of the demand for computational power by scientific, business and web-applications h... more Rapid growth of the demand for computational power by scientific, business and web-applications has led to the creation of large-scale data centers consuming enormous amounts of electrical power. Generally it has been proposed that energy efficient resource management system for virtualized Cloud data centers that reduces operational costs and provides required Quality of Service (QoS). Energy savings are achieved by continuous consolidation of VMs according to current utilization of resources, virtual network topologies established between VMs and thermal state of computing nodes. From so long improving performance has been the primary motive of computing systems industry whose growth is steadily fuelled by resource hungry applications. A typical data centre with 1000 racks needs 10 MW of power to operate, which is sufficient enough to power a small city. With increasing shift in migrating services to cloud the power demands of the backend data centers will continue to grow. Apart ...
An important problem in intrusion detection is how effectively can separate the attack patterns a... more An important problem in intrusion detection is how effectively can separate the attack patterns and normal data patterns from a large number of network data and how effectively generate automatic intrusion rules after collected raw network data. To accomplish this, various data mining techniques are used such as classification, clustering, association rule mining etc. Examples for Data Mining based Misuse detection model of IDS are JAM (Java Agents for Meta-learning), MADAM ID (Mining Audit Data for Automated Models for Intrusion Detection), and Automated Discovery of Concise Predictive Rules for Intrusion Detection. Ant clustering technique in data mining is a novel approach which uses Ants technique to find the relevant information and put them in various clusters. Since several Ants work in parallel therefore the processing speed of the system is high and in case of large data sets it is worth using Ant clustering to apply. This paper proposes to perform mining on the data collec...
Global journal of computer science and technology, 2013
A Cloud is a type of parallel and distributed system consisting of a collection of interconnected... more A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. C loud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centres that provide those services (Software as a Service - SaaS). The data center hardware and software is what we will call a Cloud. Fr om the studies of various research papers and works done by various researchers it has been found that the major areas of focus in the field of cloud computing are architecture definitions, security, integration of services on various layers, inclusion of Various network and communication devices being developed rapidly. E -Learning through cloud computing is a promising area for the ease of ...
Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a ro... more Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust dynamic routing protocol. In such an environment, it may be necessary for one mobile host to enlist the aid of others in forwarding a packet to its destination, due to the limited propagation range of each mobile host's wireless transmissions. Some previous attempts have been made to use conventional routing protocols for routing in ad hoc networks, treating each mobile host as a router. There have been several routing protocol proposed. In Manet protocols are classified in two categories Reactive and proactive protocol.The most efficient reactive protocol is Ad-hoc on demand distance vector (AODV) routing protocol. We examine AODV in term of advantage and limitation.
Global journal of computer science and technology, 2013
Cloud has now become the essential part of the web technology and fast growth of cloud computing ... more Cloud has now become the essential part of the web technology and fast growth of cloud computing technique making it worth for the companies to invest in cloud. Growth of number of clouds is requiring inter cloud communication as concept of multi cloud or hybrid cloud is also spreading quickly. With this fast growth, more and more challenges are arising in the field of cloud computing. Various researchers are focusing on cloud oriented challenges and lots of research works are going on in this field. With emergence of cloud computing, the term "Hybrid Topology" or "Hybrid Deployment" is becoming more and more common. A "Hybrid Cloud" is group of clouds you join different cloud deployments into one connected cluster. Another area of research is to focus on communication between a cloud and non cloud computing system. Hybrid Cloud computing mainly deals with working of data centers where different software are installed with huge of growing data to provid...
A new method is proposed to rank the susceptibility of austenitic steels to IGSCC. • This method ... more A new method is proposed to rank the susceptibility of austenitic steels to IGSCC. • This method measures the sensitivity of grain boundaries to IGSCC more accurately. • Cluster compactness, a network connectivity measure, is used for predicting IGSCC. • The populations of intergranular crack nuclei are assessed by statistic of extreme.
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2014
SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols t... more SPIN(Sensor Protocols for Information via Negotiation) comprises of a set of adaptive protocols that proficiently disseminate data in wireless sensor network(WSN).SPIN overcomes certain deficiencies associated with some of the data dissemination protocols & brings in more efficiency. WSNs have limited energy and hence efficiency of protocol has a significant impact on network‟s lifetime. Many protocols have been developed that are based on SPIN and are its modifications. This paper presents a survey on SPIN protocol and the various protocols devised which use SPIN as a base in one or another way.
International Journal of Computer Applications, 2014
Cloud Computing is very fruitful area for today's business. It provide lot of advantages like red... more Cloud Computing is very fruitful area for today's business. It provide lot of advantages like reduction of hardware and software cost for organization. Organization not has to invest a lot of money for their infrastructure and they gain full benefit of their investment. Number of cloud provider also increasing some of which have their own data center and some also have virtual data centre to provide services over the internet. Cloud is a model where customer expects more services or services without interruption for their money and cloud provider expect more ROI (Return on investment). These thing depend enough on effective scheduling Cloud provider have many VM at their data centre so they must have a proper load balancing to utilize their all VM. At present time environment is becoming serious issue and in near future problem is increasing more and more. So scheduling algorithm must consider the issue of minimization of carbon emission. In our work we propose an algorithm which will address environment and load balancing issue for public cloud.
Autonomic computing is an entirely new philosophy f o r the development of computing systems .It ... more Autonomic computing is an entirely new philosophy f o r the development of computing systems .It is emerging as. a sign8canr new approach to the design of computing systems. Its goal is the development of systems that are self configuring, selfhealing, selfprotecting and self optimizing. This makes autonomic computing best candidate for designing critical applications, rhus minimizing human inremention. Bur these applications need to be monitored, even if total maintenance is done by the system itself: Remotely tracking the performance of system is necessary in case of critical autonomic computing applications to spot any extraordinary behavior which may arise due to some error .Bur the tracking system needs to be a parr of the whole system and needs to be secure as it is vulnerable to all kinds of security threats. This paper proposes to add security at the application layer to track remotely these critical applications .These security mechanisms secures the communication channel between rracking system and application thus making it safe from all kinds of security threats. An example of a critical autonomic computing application, e-medicine is a k o discussed showing how the remote tracking system can help in monitoring the application guaranteeing total securiry.
International Journal of Managment, IT and Engineering, 2013
Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized L... more Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
International Journal of Computer Networks and Applications, 2021
Energy-efficiency, Coverage-quality, and Faulttolerance Issues (ECFI) are the three primary and c... more Energy-efficiency, Coverage-quality, and Faulttolerance Issues (ECFI) are the three primary and crucial quality assurance standards in a Wireless Sensor Network (WSN). These three standards ensure the network design of a self-configurable and sustainable WSN. First, energy-efficiency mechanisms ensure the prolonging of the overall network lifetime. Second, the coverage quality means how well a region of interest (RoI) is covered. Third, fault-tolerance refers to the ability of a network to continue operating without interruption when one or more components fail. With rapid innovations and developments in Wireless Sensor Network (WSN) applications, many researchers' most sustainable objective is to provide an adeptly operational sensor network. A broad range of applications of WSNs can be seen in the fields of academic, military, industry, medical, and daily needs worldwide. This analysis and survey article's main objective is to highlight different promising challenges on various fundamental characteristics, designing limitations, and their impacts on applications of WSNs. The authors also highlight the energy depletion and energy-provision issues with a concise survey of coverage and fault-related issues in WSNs. The authors finally summarized with discussion and analysis of the overall impacts of ECFI and other parameters on WSNs with simulator availability and future research direction.
International Journal of Computer Applications, Nov 18, 2014
Ever since the inception of internet network security has been the prime important area of resear... more Ever since the inception of internet network security has been the prime important area of research for computer scientists. Network s e c u r i t y using Honeypot p r e s e n t s a system that pretends to have one or more network vulnerabilities that a blackhat is looking for. Actually it does not have those vulnerabilities; it does so just to deceive the intruder by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. I n t h i s r e s e a r c h w o r k , o ur system uses the advantages of Honeypot for implementing an intrusion d e t e c t i o n s ys t e m. There are two major part of our research work. First is data accumulator and second is data analyzer. For data accumulation, we h a v e used honeypot. We have a l s o used open source tool Honeyd which is available free of cost. Honeyd is a powerful tool which can simulate even complex networks very easily. Second part is data analyzer which analyzes data captured by the Honeyd. This part of the system is basically a java based Intrusion detection system which can work along honeyd system. This is a basic pattern based IDS which uses snort rule base to detect intrusion. It is a feature rich data analyzer which can detect intrusion. Function of the system is quite simple it reads the data logged by the honeypot system and looks for intrusion pattern of rule base into the packets. This analyzer can work in both offline and online mode; in online mode it reads data directly from the network interface card while in offline mode it reads data from binary files (tcpdump) which also gives it an advantage that it can analyze data from other resources as well.
International Journal of Computer Applications, 2014
Ever since the inception of internet network security has been the prime important area of resear... more Ever since the inception of internet network security has been the prime important area of research for computer scientists. Network secur i ty using Honeypot p resen ts a system that pretends to have one or more network vulnerabilities that a blackhat is looking for. Actually it does not have those vulnerabilities; it does so just to deceive the intruder by stealthily monitoring the network. Honeypots are emerging technology and have got lot of attention of late. I n t h i s r e s e a r c h w o r k , o ur system uses the advantages of Honeypot for implementing a n intrusion d e t ec t ion sys t e m. There are two major part of our research work. First is data accumulator and second is data analyzer. For data accumulation, w e h a v e used honeypot. We have a l s o used open source tool Honeyd which is available free of cost. Honeyd is a powerful tool which can simulate even complex networks very easily. Second part is data analyzer which analyzes data captured by the Honeyd. This p...
Private Cloud Scheduling with SJF, Bound Waiting, Priority and Load Balancing
Cloud computing is an emerging field and prefer by many organization for to manage the group of c... more Cloud computing is an emerging field and prefer by many organization for to manage the group of computer system's hardware and software but it performance is lot more depend on the effective scheduling algorithm and load balancing. In this paper we address this issue and propose an algorithm for private cloud which has high throughput. To improve the throughput in private cloud SJF is used for scheduling and to overcome form the problem of starvation we use bounded waiting. For load balancing we monitor the load and dispatch the job to the least loaded VM. In private cloud there we consider that there are mainly two group of user one more important who are involve with controlling and important function of organization and other who are mainly involve with the daily routine task. In our algorithm we maintain two different queues for these two types of user. This will insure that the job of important employee or user is executed as early as possible.
Cloud Computing is an emerging field and prefer by many one at current but it's craze is lot more... more Cloud Computing is an emerging field and prefer by many one at current but it's craze is lot more depend on its performance which in turn is too much depend on the effective scheduling algorithm and load balancing. In this paper we address this issue and propose an algorithm for private cloud which has high throughput and for public cloud which address the issue of environment consciousness also with performance. To improve the throughput in private cloud SJF is used for scheduling and to overcome form the problem of starvation we use bounded waiting. For load balancing we monitor the load and dispatch the job to the least loaded VM. To gain more benefit and to have opportunity for future enhancement in public cloud environment consciousness is the key factor and for better performance and load balancing also desired. While load balancing improve the performance, the environment consciousness increase the profit of cloud providers.
The use of wireless sensor networks (WSNs) has grown enormously in the last decade, pointing out ... more The use of wireless sensor networks (WSNs) has grown enormously in the last decade, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. To maximize network lifetime in Wireless Sensor Networks (WSNs) the paths for data transfer are selected in such a way that the total energy consumed along the path is minimized. To support high scalability and better data aggregation, sensor nodes are often grouped into disjoint, non overlapping subsets called clusters. Clusters create hierarchical WSNs which incorporate efficient utilization of limited resources of sensor nodes and thus extends network lifetime. The objective of this paper is to present a survey on clustering algorithms reported in the literature of WSNs. This paper presents taxonomy of energy efficient clustering algorithms in WSNs.
Abstract—Mobile Ad hoc networks perform multi-hop communication in an environment without a dedic... more Abstract—Mobile Ad hoc networks perform multi-hop communication in an environment without a dedicated fixed infrastructure, with mobile nodes and changing network topology. In the last 15 years, the wireless networking community designed hundreds of new routing protocols targeting the various scenarios of this design space. The objective of this paper is to create taxonomy of the mobile ad hoc routing protocols, and to survey and compare representative examples for the topology based and position based routing protocols. Keywords-topology based routing protocols;position based routing protocols;Mobile ad hoc Networks; styling; insert (key words) 1.
E-Learning is spreading around the world with leaps and bounds with the growth of Internet. Peopl... more E-Learning is spreading around the world with leaps and bounds with the growth of Internet. People are keen to get high skilled knowledge from the knowledge pros in the industry and a very new concept of cloud computing is also not unaffected with E-learning. With the intense penetration of the Internet in the life of mankind and fast acceptance of the cloud computing is making researchers to design the various architectures for the cloud applications in generalized manner and specific to the applications. E-learning facilitates the students, teachers, universities and educational service providers to get the services with all ease and 24x7 bases. In cloud computing we mean by a Cloud as a type of parallel and distributed system over the network and virtual machines which are managed for load balancing with high provision for security, and its services are offered to the customers using SLA (Service Level Agreement). Whereas, Cloud Computing includes both applications and hardware &...
Uploads
Papers by sandeep sahu