Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
10 results
Search Results
Item CARED: Cautious Adaptive RED gateways for TCP/IP networks(2012) Tahiliani, M.P.; Shet, K.C.; Basavaraju, T.G.Random Early Detection (RED) is a widely deployed active queue management algorithm that improves the overall performance of the network in terms of throughput and delay. The effectiveness of RED algorithm, however, highly depends on appropriate setting of its parameters. Moreover, the performance of RED is quite sensitive to abrupt changes in the traffic load. In this paper, we propose a Cautious Adaptive Random Early Detection (CARED) algorithm that dynamically varies maximum drop probability based on the level of traffic load to improve the overall performance of the network. Based on extensive simulations conducted using Network Simulator-2 (ns-2), we show that CARED algorithm reduces the packet drop rate and achieves high throughput as compared to RED, Adaptive RED and Refined Adaptive RED. Unlike other RED based algorithms, CARED algorithm does not introduce new parameters to achieve performance gain and hence can be deployed without any additional complexity. © 2011 Elsevier Ltd. All rights reserved.Item Self-similar behavior of highway road traffic and performance analysis at toll plazas(2012) Perati, M.R.; Raghavendra, K.; Koppula, H.K.R.; Doodipala, M.R.; Dasari, R.Until recently, the Poisson process has been used to model internet and road traffic queues. It has been established that internet traffic exhibits self-similarity, which is very different from the Poisson process. Motivated by this, efforts have been made to examine whether road traffic is also self-similar. Earlier efforts in this direction indicate that road traffic is indeed self-similar. To substantiate this, this paper examines, by various methods, whether real time traffic on a busy national highway in India is self-similar. The results from this examination prove that the traffic observed on the highway is self-similar. This paper also presents a novel method based on percentiles for computing the Hurst parameter, which is an indicator for the intensity of self-similarity. The paper also validates the percentile method with two other existing methods. Additionally, the traffic at a toll plaza on the highway has been modelled as queueing system, and performance measures have also been computed, namely, mean queue length and busy period distribution. The numerical results clearly demonstrate that the analysis presented in this paper can be useful for improved designs of toll plazas.©2012 American Society of Civil Engineers. © ASCE / OCTOBER 2012.Item Implementation and validation of BLUE and PI queue disciplines in ns-3(Elsevier B.V., 2018) Jain, V.; Mittal, V.; K S, S.; Tahiliani, M.P.High queuing delay arising out of the bufferbloat problem has reignited research in the area of Active Queue Management (AQM). The Internet Engineering Task Force (IETF) has created a new working group to discuss the deployment feasibility of existing and upcoming AQM algorithms (or queuing disciplines) in the Internet. Network simulations are essential to gain an accurate and deep understanding of the network algorithms before they are deployed in the Internet. ns-3 is among the most widely used network simulators, and the recent addition of Linux-like traffic control subsystem in ns-3 makes it highly suitable and reliable for studying the performance of queuing disciplines. However, the current traffic control subsystem in ns-3 has very few queuing disciplines. In an effort to provide support for more queuing disciplines and foster active research in this area, we implement two popular algorithms in ns-3: BLUE and Proportional Integral controller (PI). This paper discusses the implementation and validation of the proposed models in ns-3, and presents a detailed comparative study of both queuing disciplines based on the evaluation guidelines provided in RFC 7928. © 2018 Elsevier B.V.Item Towards a better understanding and analysis of controlled delay (CoDel) algorithm by using fluid modelling(Institution of Engineering and Technology journals@theiet.org, 2019) Patil, S.D.; Tahiliani, M.P.In this study, a modified fluid model is proposed to understand the design of controlled delay (CoDel) algorithm for active queue management (AQM) and analyse its sensitivity to parameter settings. CoDel significantly differs from other AQM algorithms because it operates at the head of the queue and adopts a deterministic packet drop strategy, unlike other algorithms that operate at the tail and adopt a probabilistic packet drop strategy. The correctness of the proposed fluid model is verified by comparing its results with those obtained from ns-2. Subsequently, using the model developed in this study, the authors analyse the performance of CoDel algorithm by changing its internal parameters and modifying its control law. They highlight the role of the internal parameters and control law on the ability of the CoDel algorithm to control queue delay. Their analysis shows that the CoDel algorithm is sensitive to its parameter settings and that its control law requires minor modifications to gain a better control over the queue delay. © The Institution of Engineering and Technology 2018.Item Minstrel PIE: Curtailing queue delay in unresponsive traffic environments(Elsevier B.V., 2019) Patil, S.D.; Tahiliani, M.P.Active Queue Management (AQM) algorithms aim to maintain a proper trade-off between queue delay and bottleneck link utilization. However, it is often noticed that this trade-off is not achieved convincingly when unresponsive UDP flows coexist with responsive TCP flows. This paper proposes an extension to Proportional Integral controller Enhanced (PIE) algorithm called Minstrel PIE, which adapts the reference queue delay to improve the trade-off between queue delay and link utilization when unresponsive flows share the same bottleneck queue as responsive flows. Extensive evaluations through simulations and real time experiments demonstrate that Minstrel PIE improves the performance of PIE in the presence of unresponsive flows, and delivers similar performance otherwise. Moreover, the Minstrel PIE algorithm does not introduce new knobs to improve the performance of PIE and hence, can be easily deployed without any additional complexity. © 2019 Elsevier B.V.Item Revisiting design choices in queue disciplines: The PIE case(Elsevier B.V., 2020) Imputato, P.; Avallone, S.; Tahiliani, M.P.; Ramakrishnan, G.Bloated buffers in the Internet add significant queuing delays and have a direct impact on the user perceived latency. There has been an active interest in addressing the problem of rising queue delays by designing easy-to-deploy and efficient Active Queue Management (AQM) algorithms for bottleneck devices. The real deployment of AQM algorithms is a complex task because the efficiency of every algorithm depends on appropriate setting of its parameters. Hence, the design of AQM algorithms is usually entrusted on simulation environments where it is relatively straightforward to evaluate the algorithms with different parameter configurations. Unfortunately, several factors that affect the efficiency of AQM algorithms in real deployment do not manifest during simulations, and therefore, lead to inefficient design of the AQM algorithm. In this paper, we revisit the design considerations of Proportional Integral controller Enhanced (PIE), an algorithm widely considered for network deployment, and extensively evaluate its performance using a Linux based testbed. Our experimental study reveals some performance anomalies in certain circumstances and we prove that they can be attributed to a specific design choice of PIE, namely the use of the estimated departure rate to compute the expected queuing delay. Therefore, we designed an alternative approach based on packet timestamps, implemented it in the Linux kernel and proved its effectiveness through an experimental campaign. © 2020Item Performance enhancement of FSO communication system using machine learning for 5G/6G and IoT applications(Elsevier GmbH, 2022) Kumar, L.J.S.; Krishnan, P.; Shreya, B.; Sudhakar, S.6G networks will provide extremely high capacity and will support a wide range of new applications in the future, but the existing frequency bands may not be sufficient. Furthermore, because traditional wireless communications are incapable of providing high-speed data rates, 6G enables superior coverage by integrating space/air/underwater networks with terrestrial networks. 5G-and-beyond (5 GB) and 6G networks have been mandated as a paradigm shift to take the enhanced broadband, massive access, and ultra-reliable and low latency services of 5G wireless networks to an even more advanced and intelligent level, to meet the ever-growing quantities of demanding services. In 5G and 6G wireless communication systems, artificial intelligence (AI), particularly machine learning (ML), has emerged as an essential component of fully intelligent network orchestration and management. 5 GB and 6G communication systems will also rely heavily on a tactile Internet of Things (IoT). The diverse nature of heterogeneous traffic and the established service quality parameters in 5 GB networks will present numerous challenges. Many other wireless technologies, including free space optics (FSO), look promising for meeting the demands of 5 GB systems. FSO has been identified as a promising technology for achieving higher data rates while consuming less power. However, attenuation due to weather, pointing errors, and turbulences limits its performance. Traditional Maximum likelihood decoding techniques require prior channel information to decode the signals. in this paper, first time we proposed a novel decoding technique for decoding on–off keying (OOK) modulated FSO signals using support vector machines (SVM). The model is tested under various atmospheric weather conditions such as fog, rain, and snow, as well as turbulence and pointing errors. Simulated numerical results demonstrate that the proposed SVM-based decoding schemes are capable of mitigating attenuation, pointing error, and turbulent channel impairments. © 2021 Elsevier GmbHItem Lagrange's multiplier based resource management for energy efficient D2D communication in 5G networks(Springer, 2023) Pandey, K.; Arya, R.; Kumar, S.Device to device communication is the predominantly renowned trait for the 5G network and IoT applications. In the work, proposed novel joint low power/energy efficient resource allocation with mode selection for the D2D communication underlay in-band with transmit power, interference, data rate constraints are investigated with formulation of a novel problem which integrates the three major modules (resource management, mode selection, and power management) of D2D communication into one. To achieve the low power/energy efficient resource allocation with mode selection, we formulate novel optimization problem with objective of maximizing the energy efficiency using the subtractive form method to solve fractional objective function and form an iterative algorithm. The formulated fractional optimization problem is transformed into min–max problem and solved by the Lagrange dual function with low transmit power, interference, data rate constraints as a lagrange multipliers via an iterative process to achieve the optimal low power. Numerical analysis exemplifies and validates the optimal low power and the energy efficient characteristics of the novel proposed algorithm with all constraints to ensure the quality of the communication for the D2D communication, 5G, and IoT applications with the industrial need of low power/energy efficient devices to promote the conservation of energy and green communication. © 2021, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.Item Security in 5G Network Slices: Concerns and Opportunities(Institute of Electrical and Electronics Engineers Inc., 2024) Singh, V.P.; Singh, M.P.; Hegde, S.; Gupta, M.Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings a new paradigm of adaptable and efficient network provisioning. However, with the diversification of services and the increasing complexity of network infrastructures, a simultaneous rise in security vulnerabilities becomes evident. These flaws go beyond the limitations of conventional network security and affect various aspects of network slice (NS) implementation and management. The limitations of traditional security, such as static policies, single point of failure, and challenges in effectively securing network slicing deployments, underscore the need to explore security measures tailored to the dynamic nature of 5G networks. To ensure the robust security of 5G networks, it is essential to consider various security concerns such as isolation, authentication, and authorization. Furthermore, dynamic orchestration and inter-slice communication security challenges must be proactively tackled. The security concerns related to 5G networks must be addressed comprehensively to ensure the safe and secure operation of the network. Our survey paper goes into these complex security issues, providing an in-depth and systematic review of the various contexts in which they emerge. We have identified the five most vulnerable areas in Network Slicing: Slice-Lifecycle, Communication type slice uses, Technologies used to provide service, Management threats, and End Devices utilized in service. Apart from threats in these vulnerable areas, we also discussed a few generous attacks that can be launched to disrupt network-slicing services. Furthermore, this study is a valuable resource for evaluating the current state of research efforts in this domain, contributing to the ongoing enhancement of security measures and the overall robustness of network-slicing technology. In doing so, we aim to ensure the secure and sustainable evolution of 5G networks as they become increasingly integral to our digital infrastructure. © 2013 IEEE.Item Next-Generation DDoS Attacks on IoT Deployments: Targeting the Advanced Features of MQTT v5.0 Protocol(Institute of Electrical and Electronics Engineers Inc., 2025) Lakshminarayana, S.; Santhi Thilagam, P.Message queuing telemetry transport (MQTT) has emerged as the widely adopted application layer protocol for IoT environments because of its lightweight header, minimal power, and bandwidth requirements. Despite its popularity, the earlier version of the protocol, MQTT v3.1.1, encounters performance issues in large-scale implementations and required an update to handle the growing requirements of modern IoT applications. In response to these concerns, MQTT v5.0 was released with several significant features designed to enhance the reliability, user experience, and performance of IoT systems. While the MQTT protocol features were intended to facilitate robust and efficient communications, adversaries could exploit these features to mount various types of attacks in IoT deployments. More specifically, the Denial-of-Service (DoS) attacks toward the MQTT protocol have recently gained a lot of attention from the research community. However, the existing works primarily focus only on exploring the possibilities of misusing the MQTT v3.1.1 protocol features to generate DoS attacks in IoT realms. In this work, we attempt to extensively investigate the advanced protocol features of MQTT v5.0 that can be exploited to launch DDoS attacks impacting the IoT paradigm. We present the first critical evaluation of Distributed DoS (DDoS) attacks on the MQTT v5.0 protocol by analyzing three significant features: 1) CONNECT properties; 2) user properties; and 3) flow control. Moreover, we systematically propose attack scenarios based on the adversary’s capabilities, thus illustrating the practicality of proposed attacks in real-world scenarios. Furthermore, we built a real-world testbed for IoT healthcare application to evaluate the severity of the identified attacks. The experimental results demonstrate the effectiveness of these attacks in impacting the availability of guaranteed IoT services to legitimate users, even in times of need. Additionally, we disclose the insightful findings of this work as takeaways and present research initiatives toward developing effective defense mechanisms for MQTT v5.0 protocol. We hope that such a discussion could pave the way for future research, contributing to MQTT v5.0 security and resiliency. © 2014 IEEE.
