Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
4 results
Search Results
Item Effect of denatured spirit-water blends on engine performance and exhaust emissions(Combustion Institute, 2009) Ashok Babu, T.P.A.; Hubballi, P.A.The obj ective of this study was to investigate the effect of using Denatured spirit (DNS = [Ethanol 93.3% + water 6.7%]) and DNS-Water blends as fuels in a four cylinder four stroke SI engine. In the process of investigation, the performance tests were conducted on the engine to analyze brake thermal efficiency (BThE), brake power (BP), engine torque and brake specific fuel consumption (BSFC). Exhaust emissions were also investigated for carbon monoxide (CO), hydrocarbons (HC), oxides of nitrogen (NOx) and carbon dioxide (CO2). The results of the experiments revealed that, both DNS and DNS95W5 (DNS 95% + water 5%) as fuels increase BThe, BP, engine torque and BSFC. The CO, HC, NOx and CO2 emissions in the exhaust decreased. The DNS and DNS95W5 as fuels produced the encouraging results in engine performance and reduced exhaust emissions for all the tested speeds and measured performance parameters. © 2009 Combustion Institute. All rights reserved.Item DANE: An inbuilt security extension(Institute of Electrical and Electronics Engineers Inc., 2016) Aishwarya, C.; Raghuram, M.A.; Hosmani, S.; Sannidhan, M.S.; Rajendran, B.; Chandrasekaran, K.; Bindhumadhava, B.S.Use of TSL and certificates in secure applications in the internet is very common today. Certificate authorities are playing the important role of trust anchors. But this means that third party certificate authorities have to be trusted by both domain owners and their clients. Compromises of certificate authorities will put many users under a huge risk. To solve this problem, the DANE protocol was proposed that is used on top of DNSSEC. It allows using the chain of trust in DNS for authenticating certificates and makes clients impose many constraints on the certificates they receive. We analyze the performance of the DANE protocol at the client side and also present a tool for deploying and administrating DANE with BIND servers in a local network. © 2015 IEEE.Item DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods(Institute of Electrical and Electronics Engineers Inc., 2023) Chandrasekaran, K.; Divakarla, U.; Srinivasan, K.S.DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE.Item D-DNS: A Decentralized Domain Name System on the Blockchain: Implementation and Assessment(Institute of Electrical and Electronics Engineers Inc., 2024) Divakarla, U.; Chandrasekaran, K.Cache poisoning and DDoS attacks are just two of the many ways that the Domain Name System (DNS), an essential part of the Internet infrastructure, can be attacked. Countermeasures have been suggested, although they are not without restrictions. This article introduces D-DNS, a domain name system built on blockchain technology that can offer effective and safe DNS services. D-DNS solves two issues with current blockchain-based DNS systems: the inefficient query handling and the computationally demanding Proof-of-Work (PoW) protocol. D-DNS accomplishes this by putting in place a domain index and a Proof-of-Stake (PoS) consensus mechanism. To evaluate the security of D-DNS versus legacy DNS in terms of attack success rate, attack cost, and attack surface, a new quantitative comparison is presented.. According to experimental results, the attack surface of D-DNS is substantially less than that of legacy DNS, the attack cost is a million times higher, and the chance of a successful attack on D-DNS is 1% of a successful attack on legacy DNS. When D-DNS query performance is compared to the most advanced commercial DNS implementations, it is demonstrated to achieve equivalent or even reduced query latency. © 2024 IEEE.
