Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 143
  • Item
    Data formats and its research challenges in iot: A survey
    (Springer Science and Business Media Deutschland GmbH, 2021) Mahanthappa, S.; Chandavarkar, B.R.
    In the current context, the increase in data generated by the heterogeneous IoT sensors results in several challenges to the IoT applications’ developers. One of the significant problems is handling nonstandardized zeta bytes of heterogeneous IoT data. Further, there is a lack of understanding of data generated by the sensors and incompatibility in representing the data. The objective of this survey paper is to introduce IoT sensors with their areas of applications, the different data formats, representing the data in an interchangeable format, and handling data as a stream. Further, this paper also presents challenges and research opening in IoT data. © Springer Nature Singapore Pte Ltd 2021.
  • Item
    Void-aware routing protocols for underwater communication networks: A survey
    (Springer Science and Business Media Deutschland GmbH, 2021) Nazareth, P.; Chandavarkar, B.R.
    Underwater Acoustic Sensor Networks (UASNs) is a technology used in several marine applications like environment prediction, defense applications, and discovering mineral resources. UASNs has several challenges like high bit error rate, high latency, low bandwidth, and void-node problem during routing. In the context of routing protocols for underwater communication networks, the void-node problem is one of the major challenging issues. The void-node problem arises in the underwater communication during the greedy-forwarding technique, due to which packet will not be forwarded further toward the sink. In this review paper, we analyze the void-node problem in underwater networks and issues related to the void-node. Also, we elaborate on the significant classification of void-handling routing protocols. We analyze both location-based and pressure-based void-handling routing protocols. © Springer Nature Singapore Pte Ltd 2021.
  • Item
    Mitigation of RPL stateless address auto-configuration IPV6 spoofing attack in IOT
    (Apple Academic Press, 2023) Yadav, S.; Gangwar, S.; Kembhavi, P.; Chandavarkar, B.R.; Kamble, S.
    As wireless network usage is expanding, attempts are being made to disrupt the smooth functioning of the network. Due to power and memory constraints inherent in the Internet of Things (IoT) devices, implementing security measures becomes an even more significant challenge. There are many ways in which confidential information can be extracted from networks. IP address spoofing is one such attack. IP address spoofing is an illegal, unauthorized change of IP address. Malicious elements in the network impersonate as a genuine client by copying their IP address. As a result, attackers can intercept network communication between genuine clients. A false IP address makes it possible for the attacker to bypass existing security mechanisms, which creates severe security and confidentiality problems. This chapter proposes a method to resolve the issue by ensuring that an incoming node in a network always gets a unique IP address, thus making it difficult for the attacker to disguise itself as a genuine client and carry out the attack. © 2023 Apple Academic Press, Inc. All rights reserved.
  • Item
    Congestion adaptive routing in wireless mesh networks
    (2010) Tiwari, A.K.; Basavaraju, T.G.; Chandavarkar, B.R.
    The main reason for packet loss in Wireless Mesh Networks (WMNs) is due to congestion. Presently, routing in WMNs is not congestion-adaptive. Routing may let a congestion happen which is detected by congestion control. The way in which the congestion is handled results in longer delay and more packet loss and requires significant overhead if a new route is needed. Hence, we propose a congestion adaptive routing protocol (CARP) for WMNs with such properties. Our ns-2 simulation results confirm that CARP can successfully achieve a high packet delivery ratio with lower routing overhead and latency in WMNs. ©2010 IEEE.
  • Item
    Protection against denial of service and input manipulation vulnerabilities in service oriented architecture
    (2011) Pais, A.R.; Deepak, D.J.; Chandavarkar, B.R.
    Organizations are increasingly adopting Service Oriented Architecture (SOA) to build their distributed applications. SOA is a computing paradigm, emphasizing dynamic service discovery composition and interoperability. Web services are a technology that can be used to implement SOA and are increasingly becoming the SOA implementation of choice. Because a Web service relies on some of the same underlying HTTP and Web-based architecture as common Web applications, it is susceptible to similar threats and vulnerabilities. There are many vulnerabilities in web services such as SQL injection, Denial of Service, etc. that cannot be detected by web service standards and conventional firewalls. In this paper, we present a detailed design of XML firewall that can be used to prevent different vulnerabilities by validating the input xml documents before being processed by the web services. Also the XML firewall does the function of authentication, authorization and session management. We designed a modular architecture for XML firewall where each module checks for a particular vulnerability. We have also developed methods to detect and prevent SQL injection and Denial of Service vulnerabilities. © 2011 Springer-Verlag.
  • Item
    Implementation of AAA server for PMIPv6 in NS-2
    (2011) Tarbani, N.M.; Chandavarkar, B.R.
    Proxy Mobile IPv6 is a network-based mobility protocol where the mobility management signaling is performed by a network entity on behalf of the node requiring mobility itself. Mobile IPv6 (MIPv6) enables Mobile Node (MN) to maintain its connectivity to the Internet during handover. The Mobile Access Gateway (MAG), located in the access router, retrieves the MN profile information from Authentication, Authorization, and Accounting (AAA) server and sends the customized Router Advertisements to the MN, emulating the home network behavior. Theoretically there is an inclusion of AAA server in PMIPV6 but the practical inclusion is not been attempted yet, hence this paper proposes an architecture for including the AAA server into the NS2 for PMIPV6. © 2011 Springer-Verlag.
  • Item
    Survey paper: Mobility management in heterogeneous wireless networks
    (2012) Chandavarkar, B.R.; Guddeti, G.
    Ever increasing user demands and development of modern communication technologies have led to the evolution of communication networks from 1st Generation (1G) network to 4G heterogeneous networks. Further, 4G with heterogeneous network environment will provide features such as, "Always Best Connected", "Anytime Anywhere" and seamless communication. Due to diverse characteristics of heterogeneous networks such as bandwidth, latency, cost, coverage and Quality of Service (QoS) etc., there are several open and unsolved issues namely mobility management, network administration, security etc. Hence, Designing proficient mobility management to seamlessly integrate heterogeneous wireless networks with all-IP is the most challenging issue in 4G networks. Mobile IPv6 (MIPv6) developed by Internet Engineering Task Force (IETF) has mobility management for the packet-switched devices of homogeneous wireless networks. Further, mobility management of homogeneous networks depends on network related parameter i.e., Received Signal Strength (RSS). However the mobility management of heterogeneous networks, not only depends on network related parameters, but also on terminal-velocity, battery power, location information, user-user profile & preferences and service-service capabilities & QoS etc. Designing mobility management with all-IP, while, considering issues such as context of networks, terminal, user and services is the main concern of industry and researchers in the current era.
  • Item
    Preventing bad prefixes attack in IPv6 stateless address auto-configuration protocol
    (2012) Doshi, R.D.; Chandavarkar, B.R.
    Stateless address auto-configuration protocol in IPv6 is found to be vulnerable to bad prefixes attack wherein malicious node in the network can misconfigure hosts in the network so as to cause disruption in the communication between nodes in the same subnet or in different subnets. This paper proposes solution to prevent this type of attack. Initially this paper demonstrates existence of such vulnerability in Linux operating system. At the end of this paper implementation of prevention technique and results are presented. © 2012 IEEE.
  • Item
    An Efficient Bandwidth Management algorithm for WiMAX (IEEE 802.16) wireless network: EBM allocation algorithm
    (2012) Gupta, A.; Chandavarkar, B.R.
    IEEE 802.16 WiMAX (Worldwide Interoperability for Microwave Access) consists of five service classes with different priorities. The priority of real time traffic is higher than that of non-real time traffic. Since bandwidth is limited, it must be allocated in advance to guarantee the throughput of real time traffic in WiMAX network. But WiMAX standard does not provide any algorithm for dynamic allocation of bandwidth to these services. In this paper, a dynamic bandwidth allocation algorithm for WiMAX called Efficient Bandwidth Management (EBM) is proposed. In EBM the bandwidth will be increased in the upcoming frames when the allocated bandwidth is not sufficient to transfer the data. On the other side if the allocated bandwidth is more, then the bandwidth will be decreased in the upcoming frames so that the other services can use this excess bandwidth. This bandwidth increase or decrease is proportional to the remaining data in the queue. EBM increase the throughput of real time traffic as the bandwidth is handled efficiently. The proposed algorithm is implemented in ns-2 and results are compared with traditional IEEE 802.16 WiMAX. The simulation results show that EBM algorithm gives better result for real-time traffic. © 2012 IEEE.
  • Item
    Security analysis of session initiation protocol in IPv4 and IPv6 based VoIP network
    (IEEE Computer Society help@computer.org, 2013) Sonwane, G.D.; Chandavarkar, B.R.
    VoIP is new emerging technology for the delivery of voice communication and multimedia session over the Internet. In VoIP network voice and signaling are multiplexed and travel as normal data inside the IP network. This growing popularity is due to cost saving factor and flexibility of services. SIP is VoIP standard protocol for establish, maintain and terminates voice communication. While VoIP service getting popular, they are also becoming attractive target for attacker for their malicious activities. Due to open nature of SIP protocol implementation that runs over the UDP transport make vulnerable to various threats in VoIP Service. In this paper we mainly concern with different SIP protocol attacks and their impact on the VoIP with and without security mechanisms in IPv4 and IPv6 networks. Based on current security issues and threats our main focus on implementation of attacks and security analysis of SIP protocol layer in both IPv4 and IPv6 network along with their comparison. Then we implement the security mechanism for the SIP protocol over the three different transport layers along with their impact on the VoIP infrastructure. This paper also explains the impact of TLS over the SIP server performance and comparison over the IPv4 network and IPv6 network for better security implementation. © 2013 IEEE.