Journal Articles

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/19884

Browse

Search Results

Now showing 1 - 10 of 16
  • Item
    Social Engineering Attacks During the COVID-19 Pandemic
    (Springer, 2021) Venkatesha, S.; Reddy, K.R.; Chandavarkar, B.R.
    The prevailing conditions surrounding the COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet. This has led to an increase in the number of people present on these platforms and also led to jump in the time spent by existing participants online. This increase in the presence of people on the Internet is almost never preceded by education about cyber-security and the various types of attacks that an everyday User of the Internet may be subjected to. This makes the prevailing situation a ripe one for cyber-criminals to exploit and the most common type of attacks made are Social Engineering Attacks. Social Engineering Attacks are a group of sophisticated cyber-security attacks that exploit the innate human nature to breach secure systems and thus have some of the highest rate of success. This paper delves into the particulars of how the COVID-19 pandemic has set the stage for an increase in Social Engineering Attacks, the consequences of this and some techniques to thwart such attacks. © 2021, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. part of Springer Nature.
  • Item
    Simplified and Improved Analytical Hierarchy Process Aid for Selecting Candidate Network in an Overlay Heterogeneous Networks
    (Kluwer Academic Publishers barbara.b.bertram@gsk.com, 2015) Chandavarkar, B.R.; Guddeti, G.R.M.
    Analytical hierarchy process (AHP) is one of the pairwise comparison, attributes weight calculation approach of multiple attribute decision making aid to select the candidate network for seamless handoff in an overlay heterogeneous network. The main challenging issue in AHP is manually computing the reciprocal matrix results in an inconsistency indicated by the consistency ratio >0.1. This paper proposes a simplified and improved AHP (SI-AHP), which accepts the perceived one-dimensional linguistic values of the attributes from the decision maker. Further, SI-AHP is used to automatically compute the reciprocal matrix for the attribute weights calculation with the minimum involvement of the decision maker resulting in reduced computational time and improved consistency. The consistency ratio of SI-AHP is further improved by deriving the reciprocal matrix of pairwise comparison of any one of the attribute to others. Using the MATLAB simulations, the proposed SI-AHP is evaluated for the consistency ratio of voice and download traffic and also for 78,125 different combinations of one-dimensional linguistic values of the attributes. SI-AHP’s weight calculated for the decision attributes is used in the multiple attribute decision making approach for selecting the candidate network in an overlay heterogeneous network. © 2015, Springer Science+Business Media New York.
  • Item
    Simplified and improved multiple attributes alternate ranking method for vertical handover decision in heterogeneous wireless networks
    (Elsevier, 2016) Chandavarkar, B.R.; Guddeti, G.R.
    Multiple Attribute Decision Making (MADM) is one of the best candidate network selection methods used for Vertical Handover Decision (VHD) in heterogeneous wireless networks (4G). Selection of the network in MADM is predominantly decided by two steps, i.e., attribute normalization and weight calculation. This dependency in MADM results in an unreliable network selection for handover, and in a rank reversal (abnormality) problem during the removal and insertion of the network in the network selection list. Hence, this paper proposes a Simplified and Improved Multiple Attributes Alternate Ranking method referred to as SI-MAAR to eliminate the attribute normalization and weight calculation methods, thereby solving the rank reversal problem. Further, the MATLAB simulation results demonstrate that the proposed SI-MAAR method outperforms MADM methods such as TOPSIS, SAW, MEW and GRA with respect to the network selection reliability and rank reversal problems. © 2015 Elsevier B.V. All rights reserved.
  • Item
    E-Var: Enhanced void avoidance routing algorithm for underwater acoustic sensor networks
    (Institution of Engineering and Technology kvukmirovic@theiet.org, 2019) Nazareth, P.; Chandavarkar, B.R.
    Underwater acoustic sensor networks (UASNs) have gained attention among researchers due to its various aquatic applications. On the other hand, UASNs encounter many research challenges due to its inherent characteristics such as high propagation delay, limited bandwidth, high bit-error-rate, limited energy, and communication void during routing. These limitations severely affect the performance of delay-sensitive and reliable applications of UASNs. The primary objective of this study is to address the communication void during routing. Various methods, such as backward–forwarding, passive participation, flooding, heuristic, and transmission power adjustments, are proposed to address the communication void during routing. The major drawbacks of these methods are void as a part of routing, loops, unreachable data to the sink, and more number of transmission of duplicate packets. This study proposes a void avoidance routing algorithm referred to as enhanced-void avoidance routing (E-VAR) using an idea of void awareness among the nodes. The E-VAR inhibits the participation of void in routing, thereby resulting in better performance in comparison with the state-of-the-art. Through MATLAB simulations, E-VAR is compared with interference-aware routing and state-of-the-art backward–forwarding, in terms of the number of nodes reachable and unreachable due to looping to the sink, average hop-count, and distance. © The Institution of Engineering and Technology 2019.
  • Item
    Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives
    (Springer, 2022) Rushad, M.; Nambiar, A.; Chandavarkar, B.R.
    With the increased use of highly constrained interconnected devices in various areas like healthcare, sensor networks, the internet of things (IoT), etc., the need for security and proper encryption of data in such devices has grown as well. To ease the integration of security into these devices, it is reasonable to standardize some primitives. Despite there being several cryptographic algorithms to safely encrypt data, they are mainly designed for heavier use and they not only consume a lot of energy, but also require a lot of processing power and space. To provide secure data transfer and storage while allowing implementation on smaller, constrained devices, various lightweight cryptographic primitives have been developed and implemented. In this paper, we first describe the constraints that must be followed to claim a lightweight design, then we analyze the design as well as security and cryptanalysis of some recently proposed state of the art primitives that are competing to be chosen as industry standards. Finally, we also compare the performance of each of these primitives when implemented on microcontrollers and categorize them according to their design, functionalities, claimed security and respective performance. Finally, we present various insights and observations based on our study. © The Author(s).
  • Item
    Location-Free Void Avoidance Routing Protocol for Underwater Acoustic Sensor Networks
    (Springer, 2022) Nazareth, P.; Chandavarkar, B.R.
    The field of Underwater Acoustic Sensor Networks (UASNs) is one of the emerging areas of communication due to the number of marine applications. However, UASNs face several fundamental challenges like node movement, high propagation delay, low throughput, high bit-error-rate, low bandwidth, and void-node during communication. Void-node during routing is one of the major problems during routing, which causes high end-to-end delay to route the packets to the sink. The void-node is a fundamental challenge in UASNs and directly influences the UASNs in terms of the end-to-end delay, packet loss, and reliability of the UASNs. The main objective of this paper is to design a void-aware routing protocol referred to as Location-Free Void Avoidance Routing (LFVAR) protocol. It develops void-awareness among nodes in the UASNs and prevents forwarding of the packets to void and trap nodes. Further, LFVAR capable of selecting the efficient void-recovery path for the void-nodes present in the UASNs. Thus, it aims at reducing the end-to-end delay, lower energy consumption, higher packet delivery ratio, and increasing throughput during routing. The LFVAR protocol is implemented in UnetStack and further compared with the state-of-the-art Interference-aware routing (Intar) protocol. The simulation result shows that the packets in LFVAR reach the sink 32.32 % faster, consumes 20.54 % lower energy, and 9.8 % higher packet delivery ratio than Intar. © 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Hop-based void avoidance routing protocol for underwater acoustic sensor networks
    (Inderscience Publishers, 2023) Nazareth, P.; Chandavarkar, B.R.
    More than 70% of the Earth’s surface is covered by water. There is a need to explore the underwater in various applications like disaster detection, environmental monitoring, resource detection, etc. Underwater acoustic sensor networks (UASNs) are the prominent technology used in exploring underwater. UASNs faces challenges such as energy constraint on networks, increased routing complexity due to dynamic network topology, and void node results in increased complexity. The void node poses a major challenge in the routing of UASNs. A void node not being handled properly leads to a lower packet delivery ratio (PDR), higher end-to-end delay. This paper proposes a hop-based void avoidance routing (HVAR) protocol, which is a sender-based, void-avoidance routing protocol. HVAR efficiently distributes void node information in the networks and avoids data transmission to such nodes in the network. HVAR is implemented using UnetStack, and its performance is compared with the state-of-the-art Interference-aware routing (Intar) in terms of end-to-end delay, PDR, energy consumption, and throughput. © © 2023 Inderscience Enterprises Ltd.
  • Item
    Media Independent Handover and Mobile IPv6-Based UDP Performance Evaluation Suite for Heterogeneous Wireless Networks
    (Springer, 2023) Chandavarkar, B.R.
    Simulation is a cost-effective, simple, and straightforward approach to implementing a system for exhaustive analysis. Many commercial and open-source simulators, such as NS2, NS3, OMNET++, OPNET, QualNet, etc., exist in the literature to simulate wired and wireless networks. However, the major challenge in dealing with open-source simulators is analysing the results and presenting their performance metrics. Further, the ever-increasing demands of the users in terms of higher data rates with uninterrupted connections resulted in a heterogeneous wireless network (HWN) that supports the integration of WiFi, WiMAX, LTE, etc. Amongst all network simulators available in the literature, NS2 and NS3 are the most popularly used by the research community because of their immense support for implementing and verifying innovative networking algorithms. Furthermore, with the contribution of the National Institute of Science and Technology (NIST), NS2 supports the simulation of WiFi and WiMAX heterogeneous wireless networks with Media Independent Handover and Mobile-IPv6 which is yet to be supported entirely by NS3. However, the major shortcoming of NIST’s contribution is the ease of developing a simulation script followed by result analysis. In continuation with the NIST’s contribution, this paper proposes a Graphical User Interface-based evaluation suite (ES) for the simulation of User Datagram Protocol applications’ in HWN, referred to as ES-HWN. With the support of this suite, the research community can quickly develop the heterogeneous wireless network simulation script followed by the textual and graphical results of handover, packets sent and received, throughput, packet delay, and jitter. The proposed ES-HWN supports the configuration of 10 WiFi and WiMAX interface mobile nodes with two WiFi-Access Points and a WiMAX-Base Station. Besides, it supports the configuration of UDP-based applications’ packet size and transmission rate. Finally, over many experiments, ES-HWN exhibited 100% reliable results. © 2023, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
  • Item
    Novel Fuzzy-based Objective Function for routing protocol for low power and lossy networks
    (Elsevier B.V., 2023) Kamble, S.; Bhilwar, P.; Chandavarkar, B.R.
    In both wired and wireless networks, data routing along the best path is constantly a top priority for the research community. Currently, the most widely adopted routing algorithms in the Internet of Things is the Routing Protocol for Low Power and Lossy Networks (RPL). In RPL, selecting the optimal path primarily depends on the Objective Function (OF). Multi-attribute OFs are thought to be a viable method for choosing the best path, but the main concern here is how these attributes must be coupled. Such issues are being taken care by fuzzy based technologies as it deals with imprecise or distorted attribute values. Most of the fuzzy logic-based OFs are mainly based on the Mamdani method, which has low accuracy. However, a better accuracy is observed in Takagi–Sugeno method. Hence the paper develops a Fuzzy-based Takagi and Sugeno Objective Function (FTSOF) for RPL. The FTSOF technique combines the routing metrics to give a crisp value based on which the parent node is selected. The proposed approach is implemented in the Contiki operating system. The simulation was carried out on different network densities and various data rates. The performance parameters considered are packet delivery ratio, latency, network setup time, and control message overhead. The results shows that FTSOF outperforms the state-of-the-art techniques such as OF-0, MRHOF, and the Fuzzy-based Mamdani Objective Function (FMOF). © 2023 Elsevier B.V.
  • Item
    Integration of Synergetic IoT Applications with Heterogeneous Format Data for Interoperability Using IBM ACE
    (Springer, 2024) Sandeep, M.; Chandavarkar, B.R.
    Data interoperability is a crucial requirement in IoT to improve services and enhance business opportunities and innovation. Integrating synergetic applications with heterogeneous data formats is a critical issue that needs to be addressed to achieve interoperability. The use cases indicate IBM ACE is promising in resolving integration issues among on-premises and cloud applications. Further, many efforts are observed to address the interoperability issue apart from the IBM ACE approach. However, they are complex, restricted to few data formats, and use proprietary solutions. To address these above-mentioned issues, this paper proposes the Integration of Synergetic IoT applications with Heterogeneous format data for Interoperability using IBM ACE (ISHII). Further, an intelligence-based data recognition module in the proposed ISHII is trained with standard features defined in RFC 7111, 8259, 8996, JSON-LD of W3C, and Google’s Protobuf. Subsequently, recognized heterogeneous format data are integrated and translated to interoperable format using Data Format Description Language (DFDL) with Extended SQL codes on IBM ACE. Finally, the performance of ISHII has been evaluated with synthetically generated patient monitoring and room ambiance datasets with reference to accuracy, time required for integration, and translation efficiency. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.