scispace - formally typeset
Search or ask a question
Author

Gundala Swathi

Bio: Gundala Swathi is an academic researcher from VIT University. The author has contributed to research in topics: Network packet & Botnet. The author has an hindex of 3, co-authored 6 publications receiving 12 citations.

Papers
More filters
Journal ArticleDOI
Gundala Swathi1
TL;DR: For leakage-resilient cryptosystem, the proposed Hash-Proof System techniques will be applied on chosen cipher text key leakages and other key leaks, a number of cipher text classes are predefined in this approach.
Abstract: Abstract Nowadays, cloud computing has become popular for storage of data. Yet, flexibility and security are the significant parameters for better transmission. Sharing data with others may lead to security and flexibility issues. Key cryptosystem is a technique in which, decryption rights for a set of cipher texts are efficiently assigned. Key aggregation will be performed by the power of all keys, when they are aggregated. But the delegated keys or aggregate keys stored in the mobile device are prompt to leakage. Hence, we need to design a leakage-resilient cryptosystem which reduces key leakage attacks. For leakage-resilient cryptosystem, we propose Hash-Proof System techniques; which will be applied on chosen cipher text key leakages and other key leakages. A number of cipher text classes are predefined in our approach.

6 citations

Journal ArticleDOI
TL;DR: This paper proposes an algorithm for secure multi hop transmission used for external attacks in mobile adhoc networks and shows how data replication and data diffusion are used to solve the problem of data availability.
Abstract: In recent years synchronization plays a major issue for secure transmission in mobile adhoc networks. When an attacker modifies the time synchronization algorithm, the nodes will have faulty estimates of other nodes location, leading to chaos. While transmitting under these adverse conditions, packets might be lost or might be sent to wrong locations. Data replication and data diffusion are two methods which are used to solve the problem of data availability. In this paper we propose an algorithm for secure multi hop transmission used for external attacks.

4 citations

Journal ArticleDOI
TL;DR: In this paper , a set of unique traffic flow features has been presented in order to detect botnet attacks and to estimate their impact on IoT and IoE networks, which is referred to as BIE-TFF (Botnet Impact Estimation using Traffic Flow Features).

1 citations

Journal ArticleDOI
Gundala Swathi1
TL;DR: The proposed Geographic Routing Protocol is combined with the Grid Location Service to integrate the protocols of routing and the services based on location, to minimize the routing overhead and latency in communication.
Abstract: Location information plays a pivotal role in geographic routing protocols for packet routing. Network based services provide the location-based services with location information maintained in a distributed manner. In spite of their intimate association, location services and routing need to be considered separately. Hence, in the evaluation of the overheads of geographic routing, the resultant overhead of the location-based service is not reckoned. The projected purpose here is to integrate the protocols of routing and the services based on location, to minimize the routing overhead and latency in communication. Our chief contribution is the reduction of location overhead. We are proposed Geographic Routing Protocol is combined with the Grid Location Service. Instead of placing a request for exact position, the packet is sent to the earlier destination position. As the packet nears the former position, then the exact location is requested. Simulation results satisfactorily establish the complexity of the analysis and positive output regarding latency, the ratio of packet delivery and the overhead of control message.

Cited by
More filters
Journal ArticleDOI
TL;DR: This paper proposes trust enhanced cluster based multipath routing (TECM) algorithm, which is very effective in terms of loss and delivery rate, delay, routing overhead and network lifetime compare to FPNT-OLSR.
Abstract: The dynamic nature of mobile nodes of ad hoc network is mostly affected by security problems which reduce data forwarding rate in multimedia sources Due to the rapid growth of wireless applications, the different multitalented routing protocols are proposed in recent years But the recent protocols are not efficient for multimedia applications, till now, specific security aware routing protocols are not proposed for multimedia data transfers In this paper, we proposed trust enhanced cluster based multipath routing (TECM) algorithm We use energy efficient PSO algorithm used to create cluster formation and cluster head, super cluster head are selected from trust values, which compute form proposed TECM algorithm The multi trust factors are used for trust computation, such as frame/packet loss ratio, frame/packet forward energy, frame/packet receiving energy, routing overhead, received signal strength, frame/packet forward rate, average forward delay and protocol deviation flag We then combine proposed TECM algorithm with standard multipath OLSR protocol (TECM-OLSR) to analyze the performance of proposed algorithm The simulated results show that proposed TECM-OLSR protocol is very effective in terms of loss and delivery rate, delay, routing overhead and network lifetime compare to FPNT-OLSR

24 citations

Journal ArticleDOI
TL;DR: The comparative analysis of results has been demonstrated that the proposed resource scheduling algorithm performed better as compared to existing algorithms, and can be used to improve the efficacy of cloud resources.
Abstract: Cloud computing is providing resources to customers based on application demand under service level agreement (SLA) rules. Service providers are concentrating on providing a requirement based resource to fulfill the quality of service (QoS) requirements. But, it has become a challenge to cope with service-oriented resources due to uncertainty and dynamic demand for cloud services. Task scheduling is an alternative to distributing resource by estimating the unpredictable workload. Therefore, an efficient resource scheduling technique needs to distribute appropriate virtual machines (VMs). Swarm intelligence, involving a metaheuristic approach, is suitable to handle such uncertainty problems meticulously. In this research paper, we present an efficient resource scheduling technique using ant colony optimization (ACO) algorithm, with an objective to minimize execution cost and time. The comparative analysis of results has been demonstrated that the proposed scheduling algorithm performed better as co...

18 citations

Journal ArticleDOI
TL;DR: An innovative Quality of Service dependent secured multipath routing system for reliable data communication along with encryption technique is proposed and an optimal path is chosen from the recognized routes to shelter the data key management techniques.
Abstract: Wireless Mobile Ad Hoc Network (MANET) is an independentmethod of mobile nodes. The multipath routing in MANET is the most important pertains for securable transmission which is potential by neglecting the attackers or self-centered nodes from the network in MANET. The nodes are allowed to move haphazardly. The data reliability, privacy, authorization and authentication, and non-denial are effectively guaranteed by secure routing. In this study, an innovative Quality of Service dependent secured multipath routing system for reliable data communication along with encryption technique is proposed. Also, the Multipath routing process AODV-BR protocol with Optimal Fuzzy Logic is conceived. The Adaptive formation of Grey Wolf Optimization approach envisions the optimal path. Therefore, an optimal path is chosen from the recognizedroutes to shelter the data key management techniques; here Homomorphic Encryption is used. The efficiency in the functioning of the projected technique is evaluated with respect to parameters such as the end to end delay, packet delivery ratio etc. Simulation result demonstrates that energy efficiency and network lifetime of our suggested work is developed than that of existing work.

13 citations

Journal ArticleDOI
TL;DR: This research paper focuses on the use of optimized algorithms for antipattern detection and proposes a new optimized algorithm which not only works on static metrics but also takes into consideration dynamic metrics for execution.
Abstract: Maintainability of a software can be enhanced by using refactoring activities. Refactoring activities aims at eliminating antipatterns from the system Application of refactoring techniques ...

9 citations

Journal ArticleDOI
TL;DR: The embedding method allows creating a family of ciphers which have an upgraded level of security over a chosen original algorithm and have the same key length with an option to extend the key length.
Abstract: This paper proposes a method of embedding block cipher algorithms in a new algorithm in order to create variations and improving security of the original algorithm. The method is concretely explained for embedding AES128 block cipher. In practice there is often a need to develop a bank of secure cipher algorithms in short time. Designing such algorithms from first principles is a very long drawn process. The embedding method allows creating a family of ciphers which have an upgraded level of security over a chosen original algorithm and have the same key length with an option to extend the key length. The embedding method is chosen such that the efficiency of operation of the new algorithm is kept close to that of the original algorithm.

6 citations