Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 4 of 4
  • Item
    Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory
    (Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.
    Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.
  • Item
    Adaptive Selection of Cryptographic Protocols in Wireless Sensor Networks using Evolutionary Game Theory
    (Elsevier B.V., 2016) Arora, S.; Singh, P.; Gupta, A.J.
    Game theory applies to scenarios wherein multiple players with contrary motives contend with each other. Various solutions based on Game theory have been recently proposed which dealt with security aspects of wireless sensor networks (WSNs). However, the nodes have limited capability of rationality and evolutionary learning which makes it unfavorable to apply conventional game theory in WSNs. Evolutionary Game Theory (EGT) relies on bounded rationality assumption which is in harmony with the wireless sensor networks characteristics. Based on EGT, authors propose an adaptive security model for WSNs for the selection of cryptographic protocols during runtime. The authors formulate this selection in WSNs with the help of an evolutionary game to obtain the evolutionarily stable strategy (ESS) for the system. In this model, the sensor nodes dynamically adapt their defensive strategies to attain the most efficient defense, corresponding to the attackers' varied strategies. Further, the simulations convey that the proposed system converges rapidly to the Evolutionary Stable Strategy. Not only the system converges, but also forms a stable system which was verified by deliberately destabilizing the system. Results show that the nodes quickly return to ESS even after perturbation. © 2016 The Authors.
  • Item
    Broker-based mechanism for cloud provider selection
    (Inderscience Publishers, 2020) Achar, R.; Santhi Thilagam, P.; Acharya, S.
    Cloud computing has recently emerged as a new computing paradigm for delivering on demand virtualised computing resources over the internet on a pay-as-use basis. Applications hosted in cloud have different requirements which include both low level (resource) requirements and high level (performance) requirements. However, most of the cloud providers satisfy SLAs based on resource requirements rather than providing performance guarantees to applications. This gap creates a need for selecting a more suitable cloud provider who can satisfy performance requirements of applications along with resource requirements. This work aims at proposing a broker-based approach to rank cloud providers based on QoS requirements of customers. It helps the SaaS providers to save cost and complexity in choosing a suitable cloud provider for hosting applications. The experimental results show that proposed approach selects the suitable cloud provider for hosting various types of applications satisfying the needs of different cloud customers. © 2020 Inderscience Enterprises Ltd.
  • Item
    Slim – Gal for shape optimization of structures
    (CAFET INNOVA Technical Society 1-2-18/103, Mohini Mansion, Gagan Mahal Road, Domalguda, Hyderabad 500029, 2011) Babu Narayan, K.S.; Devraj, M.; Arun Prabha, K.S.
    Structural Optimization has been & continues to be an active area of research offering scope and need to handle a wide & varied range of problems. Genetic Algorithms (GA) recently have been, with great success employed to solve structural engineering problems either in conjunction with traditional methods or as alternatives. Sizing, shape and topology design of trusses is an interesting exercise that has attracted the attention of researchers. However design problems have not been kept free of conceptual designs, defeating the possibility of evolution of more efficient & innovative designs, the reason being the complexity of the problem on hand. This paper presents GA based methodology of arriving at the best configuration & member sizing employing simultaneous mode of failure approach for problem formulation of the multi-objective type to yield a structure that satisfies functional & structural requirements optimally. © 2011 CAFET-INNOVA TECHNICAL SOCIETY. All rights reserved.