Papers by Siddarama Patil

A Survey on Byzantine Attack using Secure Cooperative Spectrum Sensing in Cognitive Radio Sensor Network
2022 6th International Conference on Computing Methodologies and Communication (ICCMC), Mar 29, 2022
The strategy of permanently allocating a frequency band in a wireless communication network to on... more The strategy of permanently allocating a frequency band in a wireless communication network to one application has led to exceptionally low utilization of the vacant spectrum. By utilizing the unused licensed spectrum along with the unlicensed spectrum, Cognitive Radio Sensor Network (CRSNs) ensures the efficiency of spectrum management. To utilize the spectrum dynamically it is important to safeguard the spectrum sensing. Cooperative Spectrum Sensing (CSS) is recommended for this task. CSS aims to provide reliable spectrum sensing. However, there are various vulnerabilities experienced in CSS which can influence the performance of the network. In this work, the focus is on the Byzantine attack in CSS and current security solutions available to avoid the Byzantines in CRSN.

Smart Environmental Monitoring through Internet of Things (IoT) using RaspberryPi 3
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC), Sep 1, 2017
This paper discusses a monitoring system which gives information about environmental conditions a... more This paper discusses a monitoring system which gives information about environmental conditions and briefly touches the technological advancements in monitoring the environment and bringing out the new scope in monitoring the current environment problems. The system is developed using Arduino, Raspberry Pi 3, Zigbee and Adafruit IO which proves to be cost effective and having low power consumption. The sensors will gather the data of various environmental parameters and provide that data to Raspberry Pi via Zigbee from the Arduino. The Raspberry Pi 3 will then upload the processed data on to the internet through python programming and using Adafruit IO as an IoT platform. Experimental results demonstrated that the system is able to accurately measure the concentrations of the carbon monoxide, carbon dioxide, combustible gases, smoke and air quality.

A survey on spectrum sensing algorithms for cognitive radio
The availability of radio spectrum is limited. The demand for high data transmission requires the... more The availability of radio spectrum is limited. The demand for high data transmission requires the increase in the spectrum which over burdens the available frequency spectrum because of licensed spectrum management. But on the other hand the studies indicate that the licensed spectrum is underutilized. Therefore this underutilized spectrum needs to be relocated dynamically so that the spectrum can be used by unlicensed user when it is not used by primary users. This paper provides an overview of spectrum sensing for cognitive radio for opportunistic spectrum access and related research topics The Cognitive Radio (CR) technology requires the detection of primary user signals at the secondary users to dynamically allocate the spectrum hole to the unlicensed user. The important task for cognitive radio is to detect the existence of primary user to reduce interference to the primary user. Therefore spectrum sensing is a most important part of the cognitive radio. A number of promising concepts for spectrum sensing in cognitive radio were briefly presented and discussed in this paper in the area of blind semi-blind and non-blind spectrum techniques.

Implementation of Artificial Intelligence in Disease Prediction and Healthcare System- A Survey
2021 Innovations in Power and Advanced Computing Technologies (i-PACT), Nov 27, 2021
In the current years, artificial intelligence is bringing a great revolution in different fields,... more In the current years, artificial intelligence is bringing a great revolution in different fields, especially in the field of medicine and healthcare. It is witnessing and gaining much importance which looked to be impossible few years ago. AI is like a boon to medical field and it is becoming increasingly important for doctors, radiologists, nurses and other healthcare professionals as well. The healthcare has become a basic need for humans in this current era and also became a big business today. The promise of AI in the field of medicine is to improve decision making and also to rectify errors such as misdiagnosis and unnecessary long procedures involved in healthcare systems. The various technologies like Internet of Things (IoT), cloud computing, edge computing, Artificial intelligence, big data analysis that are developed and are under process of development in the context of healthcare. The healthcare industry provides a huge amount of health data of patients where in machine learning algorithms could use this data for early detection of problems. The patients, doctors and the hospitals are looking forward for better health monitoring and management systems within stipulated amount of time and better efficiency. This paper briefs about various latest developments and technologies involved in healthcare and disease prediction systems using artificial intelligence carried out in recent years.

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate wit... more A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate without a central controller or fixed infrastructure. Due to node mobility, designing a routing protocol to provide an efficient and suitable method to route the data with less energy consumption, packet drop and to prolong the network lifetime has become a challenging issue in MANETs. In MANETs, reducing energy consumption and packet loss involves congestion control and load balancing techniques. Thus, this paper introduces an efficient routing technique called the multipath load balancing technique for congestion control (MLBCC) in MANETs to efficiently balance the load among multiple paths by reducing the congestion. MLBCC introduces a congestion control mechanism and a load balancing mechanism during the data transmission process. The congestion control mechanism detects the congestion by using an arrival rate and an outgoing rate at a particular time interval T. The load balancing mechanism selects a gateway node by using the link cost and the path cost to efficiently distribute the load by selecting the most desirable paths. For an efficient flow of distribution, a node availability degree standard deviation parameter is introduced. Simulation results of MLBCC show the performance improvements in terms of the control overhead, packet delivery ratio, average delay and packet drop ratio in comparison with Fibonacci sequence multipath load balancing, stable backbone-based multipath routing protocol and ad hoc on demand multipath
Performance Evaluation of QoS-Aware Routing Protocols in Wireless Sensor Networks
Advances in intelligent systems and computing, Dec 1, 2016
Wireless Sensor Networks (WSNs) consists of densely populated large number of spatially distribut... more Wireless Sensor Networks (WSNs) consists of densely populated large number of spatially distributed configurable sensors, to meet the requirements of industrial, military, precision agriculture and health monitoring applications with ease of implementation and maintenance cost. Transmission of data requires both energy and quality of service (QoS) aware routing to ensure efficient use of the sensors and effective access of gathered information. In turn routing technique must provide reliable transmission of data without compromising QoS requirements of applications. We have addressed different routing protocol categories with range of QoS metrics to be achieved, to improve performance of WSNs applications.

Multipath Load Balancing Technique for Congestion Control in Mobile Ad Hoc Networks
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate wit... more A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate without any centralized administration or fixed infrastructure. Because of limited wireless link capabilities, nodes with heavy traffic will reduce their energy rapidly and increases the possibility of congestion and path disconnection. Hence, load balancing and congestion is necessary in MANET. Thus, this paper explores an efficient routing technique called multipath load balancing technique for congestion control (MLBCC) in MANETs to efficiently balance the load among the multiple paths by reducing congestion. The proposed protocol performs two major functions during the data transmission process, firstly, congestion detection by using an arrival rate and an outgoing rate at a particular time interval T. Secondly, selection of gateway node using link cost and the path cost to efficiently distribute the load by selecting the most desirable paths. For an efficient flow of distribution, a node availability degree standard deviation parameter is introduced. The results of our experiments show performance improvements in terms of average end-to-end delay, packet delivery ratio and packet drop ratio in comparison with AOMDV and FMLB.

Wireless Personal Communications, Aug 9, 2016
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate wit... more A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that can communicate without a central controller or fixed infrastructure. Due to node mobility, designing a routing protocol to provide an efficient and suitable method to route the data with less energy consumption, packet drop and to prolong the network lifetime has become a challenging issue in MANETs. In MANETs, reducing energy consumption and packet loss involves congestion control and load balancing techniques. Thus, this paper introduces an efficient routing technique called the multipath load balancing technique for congestion control (MLBCC) in MANETs to efficiently balance the load among multiple paths by reducing the congestion. MLBCC introduces a congestion control mechanism and a load balancing mechanism during the data transmission process. The congestion control mechanism detects the congestion by using an arrival rate and an outgoing rate at a particular time interval T. The load balancing mechanism selects a gateway node by using the link cost and the path cost to efficiently distribute the load by selecting the most desirable paths. For an efficient flow of distribution, a node availability degree standard deviation parameter is introduced. Simulation results of MLBCC show the performance improvements in terms of the control overhead, packet delivery ratio, average delay and packet drop ratio in comparison with Fibonacci sequence multipath load balancing, stable backbone-based multipath routing protocol and ad hoc on demand multipath

International Journal of Information Technology and Computer Science, May 8, 2015
In mobile ad hoc networks (MANETs), providing reliable and stable communication paths between wir... more In mobile ad hoc networks (MANETs), providing reliable and stable communication paths between wireless devices is critical. This paper presents a fuzzy logic stablebackbone-based multipath routing protocol (FLSBMRP) for MANET that provides a high-quality path for communication between nodes. The proposed protocol has two main phases. The first phase is the selection of candidate nodes using a fuzzy logic technique. The second phase is the construction of a routing backbone that establishes multiple paths between nodes through the candidate nodes, thus forming a routing backbone. If any candidate node in the path fails due to a lack of bandwidth, residual energy or link quality, an alternate path through another candidate node is selected for communication before the route breaks, because a candidate node failure may lead to a broken link between the nodes. Simulation results demonstrate that the proposed protocol performs better in terms of the packet delivery ratio, overhead, delay and packet drop ratio than the major existing ad hoc routing protocols.

Data storage security algorithms for multi cloud environment
Cloud computing technology is considered to be the top most strategic technology in today's w... more Cloud computing technology is considered to be the top most strategic technology in today's world. This is the result made in the advancement in storage technology towards cloud computing. The world of cloud computing has become more and more advanced in the recent years. It has become more and more popular and powerful in gaining everyone's attention in the field axdbhof research and business as well. Advanced cryptographic techniques are proposed for performing security much stronger way. Therefore, people from different field especially for business in companies are relying on cloud storage. Auditability is considered as an important factor for securing the cloud environment to overcome the hacking issue. Data auditability has been designed for storing the cloud data. This paper discusses various data security algorithms for public cloud computing area.
Network virtualization system for security in cloud computing
Virtualization is one of the important key technologies in cloud computing. Main advantages inclu... more Virtualization is one of the important key technologies in cloud computing. Main advantages include maximum resource utilization and high flexibility. The virtualization technology offers different services to users and the vendors and has become an upcoming technology in the IT (Information Technology) industry. This article explores various network virtualization technologies using cloud computing system to a certain extent which has turned more efficient than previous technologies.
Brain Tumor De-noising MRI Image and Superpixel SLIC segmentation

International Journal of Computer Network and Information Security, Mar 8, 2016
In mobile ad hoc networks (MANETs), high node mobility leads to frequent link breaks and creates ... more In mobile ad hoc networks (MANETs), high node mobility leads to frequent link breaks and creates complexities in route discovery, this effect on the quality of service (QoS) and degrades the systems performance. So, providing a high quality communication using stable links among mobile nodes is a challenging issue in MANETs. Existing stability based routing algorithms initiate estimation of route stability metrics during the routing process, results in increased delay and overhead. In order to overcome these issues, in this paper, we construct a stable backbone-based multipath routing protocol (SBMRP). Initially, the nodes with high residual bandwidth, residual power, link quality and low mobility are designated as candidate nodes. Then multiple paths are established between source and destination through these candidate nodes, thus forming a routing backbone. If any candidate node in the path tend to fail due to lack of bandwidth, energy or link quality, alternate path through other candidate node is established before path breaks. Proposed routing scheme has been compared with other three existing protocols: AODV, AOMDV and RSQR. The protocol performance has been evaluated in terms of packet delivery ratio, normalized routing load, delay and packet drop ratio.

A cluster based Energy Efficient Reliable Routing Protocol for Wireless Sensor Networks
In this paper, We have developed a new energy efficient routing protocol called An Energy Efficie... more In this paper, We have developed a new energy efficient routing protocol called An Energy Efficient Reliable Routing Protocol for Wireless Sensor Networks (WSN) which is cluster based. Data aggregation is essentially used to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. Data aggregation protocols aims at eliminating redundant data transmission. Power consumption is an important aspect to be considered in the data aggregation which is a scarce resource and they are irreplaceable. In addition to power consumption, reliability is also of major concern in data aggregation. Initially we form clusters and a coordinator node (CN) is selected near the cluster in order to monitor the nodes in the cluster. The CN selects a cluster head (CH) in each cluster based upon the energy level and the distance to the CN. The packets sent by the sensor nodes are aggregated at the CH and transmitted to the CN. The CN measures the loss ratio and compares it with a threshold value of loss ratio. Depending upon this value, the forward node count is incremented or decremented and the cluster size is adaptively changed, ensuring reliability and balanced energy consumption. We have compared the new protocol with Low Energy Adaptive Clustering Hierarchy (LEACH) using NS-2, evaluated the protocol, the simulation results show that EERDAT outperforms the LEACH.

International Journal of Electronic Business, 2020
Cloud computing provides data storage facility to its users in cloud storage servers based on the... more Cloud computing provides data storage facility to its users in cloud storage servers based on the required payment. Using public auditability, we can check the behaviour of data in the cloud. The auditing protocol must measure less communication cost incurred by the auditor and the cloud server. Third party auditor is responsible for the authentication of secret files in cloud system on behalf of the data owner. This paper describes an auditing system for secure cloud storage systems using privacy preservation scheme. The data auditability technique allows the user to make the data integrity check using a third party. The public auditability system permits the TPA to check the cloud information without downloading the original data from the user. This process involves profiling the data and evaluating the impact of inadequate quality data which results in the performance of the organisation.

An efficient privacy preserving cryptographic approach in cloud computing
Cloud computing belongs to distributed network technology for computing and storage capabilities ... more Cloud computing belongs to distributed network technology for computing and storage capabilities purpose. It is a kind of cost-effective technology dedicated to information technology. Using the Internet, the accessibility and retrieving of cloud data have become much more accessible. The service providers can expand the storage space in a cloud environment. Security is well-thought-out to be the essential attribute in a distributed system. Cryptography can be described as a method of securing the data from attackers and eavesdroppers. Third Party Auditor is responsible for the authentication of secret files in cloud system on behalf of the data owner. The data auditability technique allows the user to make the data integrity check using a third party. Cloud computing offers unlimited data space for storage to its users and also serves sharing of data and planned use of heterogeneous resources in distributed systems. This paper describes privacy-preserving enabled public auditing method using cryptographic techniques for low-performance based end devices.
Internet of Things that Makes Things Talk
Lecture notes in networks and systems, May 26, 2018
With the development of Internet technology and communications technology, our lives are progress... more With the development of Internet technology and communications technology, our lives are progressively led into the virtual world. The Internet facilitates people to chat, shop and work in the virtual world. This virtual world can be integrated with real world by Internet of Things (IoT) with its potential to identify and connect all physical objects worldwide into a unified system using sensors/actuators and wireless communication. This paper presents need to understand protocol stack of IoT, various ways to integrate sensor network to IoT for better implementation of IoT applications.

International Journal of Computer Network and Information Security, Oct 8, 2021
Cluster-based protocols are best for applications that require reliability and a continuous funct... more Cluster-based protocols are best for applications that require reliability and a continuous functioning environment with a sustainable lifetime of WSN. The dynamic nature of the sensor node makes energy conservation a challenging issue. Sensor node scheduled based on sensing error for energy conservation compromise the accuracy of prediction. The high data accuracy achieved using a single duty cycle controller at each node with compromised throughput and increased routing overhead. Duty Cycle Controller managing a great number of control messages at the network level leads to control packet interference with data packet transmission, increasing packet drop and minimizing throughput. Also, the single-duty cycle controller at the network level leads to increased control overhead. The proposed multilevel cluster-based approach focuses on the appropriate cluster design, selection of cluster head, and sensor nodes scheduling based on sensing error. The proposed method applies a multi-duty cycle controller at each cluster level, and control messages handled are related to nodes in a cluster. Thus has less interference and packet drop leading to maximum throughput than existing methods. The simulation results demonstrated that the proposed method with sensor nodes scheduled at individual cluster levels using a multi-duty cycle controller exhibited improved network lifetime, throughput, and reduced energy consumption compared with the state-of-the-art techniques.

Precision agriculture with cluster‐based optimal routing in wireless sensor network
International Journal of Communication Systems, Apr 16, 2021
SummaryAgriculture played a vital role in the growth of the Indian economy. New technologies can ... more SummaryAgriculture played a vital role in the growth of the Indian economy. New technologies can overcome the various issues in agriculture. One such ever‐growing area is Precision Agriculture (PA) with advancements in Wireless Sensor Network (WSN) technology. It finds applications in various segments of agriculture. The data packet of each application expects different services from the underlying network. Most of the techniques have not found much on service differentiation and arrival rate. Due to the dynamicity of the network, the traffic rate may get vary and load the selected paths which degrade performance expected from the network. These issues addressed by the proposed protocol employing Decision Support System (DSS) for intelligent path selection based on traffic rate. The proposed protocol outperforms in terms of minimized delay, energy consumption, achieving high throughput, and packet delivery ratio.

Smart Healthcare Systems Using Cloud Computing Environments
Lecture notes in electrical engineering, 2019
The involvement of Information and Communication Technology (ICT) for the adoption of smart citie... more The involvement of Information and Communication Technology (ICT) for the adoption of smart cities in India is in high demand today. The healthcare service solution uses cloud computing based future technology which uses the coming Internet of things technology to access the patient’s details and their confidential healthcare information. The rapid circulation of mobile cloud computing model is associated with massive amounts of energy spent by the cloud data centers. So enhancing the energy efficiency of those data centers, has to they turn out to be a leading challenge in the healthcare industry. Mobile cloud computing provides services by bringing the plentiful resources of medical data in cloud computing to the nearness of mobile devices to authorize the performance of the application and preserve the battery life.
Uploads
Papers by Siddarama Patil