Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
124 results
Search Results
Item Congestion adaptive routing in wireless mesh networks(2010) Tiwari, A.K.; Basavaraju, T.G.; Chandavarkar, B.R.The main reason for packet loss in Wireless Mesh Networks (WMNs) is due to congestion. Presently, routing in WMNs is not congestion-adaptive. Routing may let a congestion happen which is detected by congestion control. The way in which the congestion is handled results in longer delay and more packet loss and requires significant overhead if a new route is needed. Hence, we propose a congestion adaptive routing protocol (CARP) for WMNs with such properties. Our ns-2 simulation results confirm that CARP can successfully achieve a high packet delivery ratio with lower routing overhead and latency in WMNs. ©2010 IEEE.Item Protection against denial of service and input manipulation vulnerabilities in service oriented architecture(2011) Pais, A.R.; Deepak, D.J.; Chandavarkar, B.R.Organizations are increasingly adopting Service Oriented Architecture (SOA) to build their distributed applications. SOA is a computing paradigm, emphasizing dynamic service discovery composition and interoperability. Web services are a technology that can be used to implement SOA and are increasingly becoming the SOA implementation of choice. Because a Web service relies on some of the same underlying HTTP and Web-based architecture as common Web applications, it is susceptible to similar threats and vulnerabilities. There are many vulnerabilities in web services such as SQL injection, Denial of Service, etc. that cannot be detected by web service standards and conventional firewalls. In this paper, we present a detailed design of XML firewall that can be used to prevent different vulnerabilities by validating the input xml documents before being processed by the web services. Also the XML firewall does the function of authentication, authorization and session management. We designed a modular architecture for XML firewall where each module checks for a particular vulnerability. We have also developed methods to detect and prevent SQL injection and Denial of Service vulnerabilities. © 2011 Springer-Verlag.Item Implementation of AAA server for PMIPv6 in NS-2(2011) Tarbani, N.M.; Chandavarkar, B.R.Proxy Mobile IPv6 is a network-based mobility protocol where the mobility management signaling is performed by a network entity on behalf of the node requiring mobility itself. Mobile IPv6 (MIPv6) enables Mobile Node (MN) to maintain its connectivity to the Internet during handover. The Mobile Access Gateway (MAG), located in the access router, retrieves the MN profile information from Authentication, Authorization, and Accounting (AAA) server and sends the customized Router Advertisements to the MN, emulating the home network behavior. Theoretically there is an inclusion of AAA server in PMIPV6 but the practical inclusion is not been attempted yet, hence this paper proposes an architecture for including the AAA server into the NS2 for PMIPV6. © 2011 Springer-Verlag.Item Survey paper: Mobility management in heterogeneous wireless networks(2012) Chandavarkar, B.R.; Guddeti, G.Ever increasing user demands and development of modern communication technologies have led to the evolution of communication networks from 1st Generation (1G) network to 4G heterogeneous networks. Further, 4G with heterogeneous network environment will provide features such as, "Always Best Connected", "Anytime Anywhere" and seamless communication. Due to diverse characteristics of heterogeneous networks such as bandwidth, latency, cost, coverage and Quality of Service (QoS) etc., there are several open and unsolved issues namely mobility management, network administration, security etc. Hence, Designing proficient mobility management to seamlessly integrate heterogeneous wireless networks with all-IP is the most challenging issue in 4G networks. Mobile IPv6 (MIPv6) developed by Internet Engineering Task Force (IETF) has mobility management for the packet-switched devices of homogeneous wireless networks. Further, mobility management of homogeneous networks depends on network related parameter i.e., Received Signal Strength (RSS). However the mobility management of heterogeneous networks, not only depends on network related parameters, but also on terminal-velocity, battery power, location information, user-user profile & preferences and service-service capabilities & QoS etc. Designing mobility management with all-IP, while, considering issues such as context of networks, terminal, user and services is the main concern of industry and researchers in the current era.Item Preventing bad prefixes attack in IPv6 stateless address auto-configuration protocol(2012) Doshi, R.D.; Chandavarkar, B.R.Stateless address auto-configuration protocol in IPv6 is found to be vulnerable to bad prefixes attack wherein malicious node in the network can misconfigure hosts in the network so as to cause disruption in the communication between nodes in the same subnet or in different subnets. This paper proposes solution to prevent this type of attack. Initially this paper demonstrates existence of such vulnerability in Linux operating system. At the end of this paper implementation of prevention technique and results are presented. © 2012 IEEE.Item An Efficient Bandwidth Management algorithm for WiMAX (IEEE 802.16) wireless network: EBM allocation algorithm(2012) Gupta, A.; Chandavarkar, B.R.IEEE 802.16 WiMAX (Worldwide Interoperability for Microwave Access) consists of five service classes with different priorities. The priority of real time traffic is higher than that of non-real time traffic. Since bandwidth is limited, it must be allocated in advance to guarantee the throughput of real time traffic in WiMAX network. But WiMAX standard does not provide any algorithm for dynamic allocation of bandwidth to these services. In this paper, a dynamic bandwidth allocation algorithm for WiMAX called Efficient Bandwidth Management (EBM) is proposed. In EBM the bandwidth will be increased in the upcoming frames when the allocated bandwidth is not sufficient to transfer the data. On the other side if the allocated bandwidth is more, then the bandwidth will be decreased in the upcoming frames so that the other services can use this excess bandwidth. This bandwidth increase or decrease is proportional to the remaining data in the queue. EBM increase the throughput of real time traffic as the bandwidth is handled efficiently. The proposed algorithm is implemented in ns-2 and results are compared with traditional IEEE 802.16 WiMAX. The simulation results show that EBM algorithm gives better result for real-time traffic. © 2012 IEEE.Item Security analysis of session initiation protocol in IPv4 and IPv6 based VoIP network(IEEE Computer Society help@computer.org, 2013) Sonwane, G.D.; Chandavarkar, B.R.VoIP is new emerging technology for the delivery of voice communication and multimedia session over the Internet. In VoIP network voice and signaling are multiplexed and travel as normal data inside the IP network. This growing popularity is due to cost saving factor and flexibility of services. SIP is VoIP standard protocol for establish, maintain and terminates voice communication. While VoIP service getting popular, they are also becoming attractive target for attacker for their malicious activities. Due to open nature of SIP protocol implementation that runs over the UDP transport make vulnerable to various threats in VoIP Service. In this paper we mainly concern with different SIP protocol attacks and their impact on the VoIP with and without security mechanisms in IPv4 and IPv6 networks. Based on current security issues and threats our main focus on implementation of attacks and security analysis of SIP protocol layer in both IPv4 and IPv6 network along with their comparison. Then we implement the security mechanism for the SIP protocol over the three different transport layers along with their impact on the VoIP infrastructure. This paper also explains the impact of TLS over the SIP server performance and comparison over the IPv4 network and IPv6 network for better security implementation. © 2013 IEEE.Item Performance comparison of executing fast transactions in bitcoin network using verifiable code execution(IEEE Computer Society help@computer.org, 2013) Singh, P.; Chandavarkar, B.R.; Arora, S.; Agrawal, N.In this paper, we study Bitcoin network for electronic cash transactions, and compare the extension to the BTCs network which inculcates provision of executing fast transactions with greater security and assurance with the former method of Proof-Of-Work for executing transactions. Above milestones are achieved by introducing the concepts of mutual trust and verifiable code execution between the payer and the payee in the network. Our work proposes a significant modification of the Pioneer model to provide a two-party trust framework for Bitcoin transactions; considerably faster compared to the generic trust platform of Bitcoin networks based on slow proof-of-work. The scheme proposed can promote the use of Bitcoin transactions in real life scenarios, where fast transactions are desirable due time constraints between the payment and the service. © 2013 IEEE.Item Comparative analysis of queue mechanisms with respect to various traffic in wired-cum-wireless network(Institute of Electrical and Electronics Engineers Inc., 2014) Dhadse, J.S.; Chandavarkar, B.R.Current Active Queue Management (AQM) and TCP are designed to work well for wired networks where packet loss is mainly due to network congestion. In wired cum wireless networks, however, wireless bandwidth is much smaller than the wired network and at base station packet loss occurs due to bottleneck wireless link. As a result, the performance of TCP flows is significantly degraded. To overcome this problem, Base Station (BS) is the key point for performance enhancement in wired-cum-wireless network. There is need of AQM at base station which stabilize the system and achieve low delay, low packet loss, and high link utilization regardless the dynamic of network conditions. To study the behavior of Queue at base station, we carry out simulation of wired-cum-wireless network with respect to various traffics (Background, streaming, conversational) in ns-2. © 2014 IEEE.Item Improving RED for reduced UDP packet-drop(Institute of Electrical and Electronics Engineers Inc., 2015) Mukund, Y.R.; Rohit, C.; Chandavarkar, B.R.This paper gives an understanding of how the Random Early Detection(RED) algorithm can be implemented in a network involving UDP sources. The User Datagram Protocol(UDP) protocol is an unreliable protocol and does not have the mechanism to detect the packet drops that are carried out by the RED gateway which results in a bias by the gateway against UDP packets. By manipulating certain parameters of the RED algorithm we can make the algorithm less biased against the UDP packets. Various methods have been simulated and their corresponding results are shown in this paper. The aim is to show that the algorithm can be used in a network which consists of both the TCP and the UDP sources. © 2015 IEEE.
