Browsing by Author "Mohan, J."
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item A reinforcement learning approach to optimize downloads over mobile networks(Institute of Electrical and Electronics Engineers Inc., 2017) Mohan, J.; Vittal, A.; Chandrasekaran, K.; Krishnamachari, B.Dedicated Short Range Communication is attracting a lot of interest these days due to its utility in vehicular safety applications, intelligent transportation system and infotainment applications. Such vehicular networks are characterized by the highly dynamic changes in topology, no significant power constraints and ephemeral links. Considering an interaction between the client and server nodes that last for a random duration of time, an important question is to maximize the amount of useful content downloaded by the client, either in a single request phase, or iteratively in multiple phases. The aim of this work is to propose and investigate a multiphase request model using Markov Decision Process and compare its efficiency against a single phase version. We show that a multiphase request protocol performs better than single phase protocol. © 2017 IEEE.Item Reducing DNS cache poisoning attacks(2015) Mohan, J.; Puranik, S.; Chandrasekaran, K.The increasing attacks on The Domain Name System (DNS) and the problems faced in deploying Domain Name System Security Extensions (DNSSEC) on a large scale, result in the need of a simple, and a practical approach to safeguard the DNS. In this paper, we present an efficient approach to significantly reduce the success rate of DNS cache poisoning attacks. The proposed Shift Key(S-Key) based domain name encoding scheme considerably raises the entropy of the DNS packet by encoding the domain name, using the randomly generated 4 bit S-Keys. To successfully poison a DNS cache, the attacker must now guess the 4 bit S-key as well as the encoded domain name, in addition to the port number and the transaction ID. The Bi-Query scheme captures the malicious reply packets by initiating a re-query or pairing up two consecutive requests to resolve the same domain name, thereby validating the Internet Protocol (IP) address retrieved for each domain name, before caching it. The first method proposed makes it difficult for the attacker to guess the DNS packet fields, while the latter detects and discards any packet that has been forged. � 2015 IEEE.Item Reducing DNS cache poisoning attacks(Institute of Electrical and Electronics Engineers Inc., 2015) Mohan, J.; Puranik, S.; Chandrasekaran, K.The increasing attacks on The Domain Name System (DNS) and the problems faced in deploying Domain Name System Security Extensions (DNSSEC) on a large scale, result in the need of a simple, and a practical approach to safeguard the DNS. In this paper, we present an efficient approach to significantly reduce the success rate of DNS cache poisoning attacks. The proposed Shift Key(S-Key) based domain name encoding scheme considerably raises the entropy of the DNS packet by encoding the domain name, using the randomly generated 4 bit S-Keys. To successfully poison a DNS cache, the attacker must now guess the 4 bit S-key as well as the encoded domain name, in addition to the port number and the transaction ID. The Bi-Query scheme captures the malicious reply packets by initiating a re-query or pairing up two consecutive requests to resolve the same domain name, thereby validating the Internet Protocol (IP) address retrieved for each domain name, before caching it. The first method proposed makes it difficult for the attacker to guess the DNS packet fields, while the latter detects and discards any packet that has been forged. © 2015 IEEE.Item A reinforcement learning approach to optimize downloads over mobile networks(2017) Mohan, J.; Vittal, A.; Chandrasekaran, K.; Krishnamachari, B.Dedicated Short Range Communication is attracting a lot of interest these days due to its utility in vehicular safety applications, intelligent transportation system and infotainment applications. Such vehicular networks are characterized by the highly dynamic changes in topology, no significant power constraints and ephemeral links. Considering an interaction between the client and server nodes that last for a random duration of time, an important question is to maximize the amount of useful content downloaded by the client, either in a single request phase, or iteratively in multiple phases. The aim of this work is to propose and investigate a multiphase request model using Markov Decision Process and compare its efficiency against a single phase version. We show that a multiphase request protocol performs better than single phase protocol. � 2017 IEEE.Item Smart and secure monitoring of industrial environments using IoT(2015) Puranik, S.; Mohan, J.; Chandrasekaran, K.The Internet of Things (IoT) standard is giving rise to complex smart systems where in it has been made conceivable to captivate objects we experience in regular life, to interact and exchange information over a wireless network. The steep surge in industrialization and poor strategies used in controlling industrial pollution has resulted in degradation in the quality of environment around us. Negligence of leakage within an industry can result in massive hazards like the Bhopal Gas Tragedy. This paper proposes a secure IoT framework to smartly connect industrial surroundings. Our proposed framework helps in monitoring the level of pollutants, particulate matter and effluents released into the environment, notifying concerned authorities whenever their permissible level surpasses. Also we smartly connect the houses in close vicinity, so that precautionary measures can be taken to evacuate people in times of unexpected leakages. Our paper also discusses the various technologies and the security assessments being done to make it a complete secure system. � 2015 ACM.Item Smart and secure monitoring of industrial environments using IoT(Association for Computing Machinery acmhelp@acm.org, 2015) Puranik, S.; Mohan, J.; Chandrasekaran, K.The Internet of Things (IoT) standard is giving rise to complex smart systems where in it has been made conceivable to captivate objects we experience in regular life, to interact and exchange information over a wireless network. The steep surge in industrialization and poor strategies used in controlling industrial pollution has resulted in degradation in the quality of environment around us. Negligence of leakage within an industry can result in massive hazards like the Bhopal Gas Tragedy. This paper proposes a secure IoT framework to smartly connect industrial surroundings. Our proposed framework helps in monitoring the level of pollutants, particulate matter and effluents released into the environment, notifying concerned authorities whenever their permissible level surpasses. Also we smartly connect the houses in close vicinity, so that precautionary measures can be taken to evacuate people in times of unexpected leakages. Our paper also discusses the various technologies and the security assessments being done to make it a complete secure system. © 2015 ACM.
