scispace - formally typeset
Search or ask a question
Author

J. Sandeep

Other affiliations: Bharathiar University
Bio: J. Sandeep is an academic researcher from Christ University. The author has contributed to research in topics: Mobile ad hoc network & Network packet. The author has an hindex of 3, co-authored 10 publications receiving 31 citations. Previous affiliations of J. Sandeep include Bharathiar University.

Papers
More filters
Journal ArticleDOI
TL;DR: Three different network situations and possible solutions to identify the networking gaps in MANET for military scenarios and enhance networks efficiency based on networks demand are presented.

16 citations

Journal ArticleDOI
TL;DR: This paper relates human senses with network behaviours from gateway node's perception on MANET to suggest new routing methods and algorithms for better and secured data transfer parameters.

5 citations

Book ChapterDOI
01 Jan 2019
TL;DR: A detailed survey has been done on different methods to detect and preventMAC spoofing and a new proposal of security architecture has been proposed that makes use of Monitoring System that generates frequent network traces into MS table, server data and MS cache which ensures that the MAC spoofing is identified and blocked from the same environment.
Abstract: Ubiquitous computing is a new paradigm in the world of information technology. Security plays a vital role in such networking environments. However, there are various methods available to generate different Media Access Control (MAC) addresses for the same system, which enables an attacker to spoof into the network. MAC spoofing is one of the major concerns in such an environment where MAC address can be spoofed using a wide range of tools and methods. Different methods can be prioritized to get cache table and attributes of ARP spoofing while targeting the identification of the attack. The routing trace-based technique is the predominant method to analyse MAC spoofing. In this paper, a detailed survey has been done on different methods to detect and prevent such risks. Based on the survey, a new proposal of security architecture has been proposed. This architecture makes use of Monitoring System (MS) that generates frequent network traces into MS table, server data and MS cache which ensures that the MAC spoofing is identified and blocked from the same environment.

4 citations

Journal ArticleDOI
TL;DR: In this paper , the authors evaluated high-resolution (1 km) forecasts during the Cloud Aerosol Interaction and Precipitation Enhancement Experiment (CAIPEEX) for verification purposes.

4 citations

Journal ArticleDOI
TL;DR: A system is proposed which connects the vehicles to a centralized sink for getting the optimal routes and performance analysis of routing protocols for the proposed system is done as a major step in selection of protocols.
Abstract: Revenue generated by tourism is positively correlated with the development of any city. In recent years, tourism is getting peak focus among the government, local bodies, and researchers. This has led to increase in initiatives to grow tourism in and across the country. Being one of the most flourishing sectors, tourism in India shows bold signals of emerging as a strong participant in the world of tourism. In addition to safeguarding its culture and deep-rooted traditional values, tourism provides a way to increase employment opportunities as well as increase the foreign exchange within the country. There are many open research problems arising in the domain, which need the attention of researchers. City traffic management is one among the major concern for cities around the world. Scheduling dynamic travel plans for tourists with crowd and traffic awareness has high scope for research. In this paper, a system is proposed which connects the vehicles to a centralized sink for getting the optimal routes. Route scheduling is done based on a prediction model. Different parameters were collected from the environment that includes crowd, traffic, and schedule of other vehicles. The system has modules like static nodes, mobile nodes, host nodes, and sink node for the control and management. Selection of path and protocol is a primary strategy to design any VANET systems. Hence, performance analysis of routing protocols for the proposed system is done as a major step in selection of protocols. Packet delivery ratio, jitter, and throughput are common measures used for the comparison of protocols.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A new mechanism for route selection combining Ad-hoc On-Demand Distance Vector (AODV) protocol with Ant Colony Optimization (ACO) protocol to improve Quality of Service (QoS) in MANET is proposed.

65 citations

01 May 2006
TL;DR: A case study has been conducted to detect the power of complexity metrics in predicting integration and maintenance efforts and revealed that component oriented complexity metrics can be of great value in predicting both integration and Maintenance efforts.
Abstract: The work presented in this paper introduces a set of metrics for component oriented software systems. The work focuses mainly on the complexity that results mainly from factors related to system structure and connectivity. Also, a new set of properties that a component-oriented complexity metric must possess are defined. The metrics have been evaluated using the properties defined in this paper. A case study has been conducted to detect the power of complexity metrics in predicting integration and maintenance efforts. The results of the study revealed that component oriented complexity metrics can be of great value in predicting both integration and maintenance efforts.

38 citations

Journal ArticleDOI
TL;DR: The MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated and an overview of the dynamic domain of MANets is provided.
Abstract: Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on the evolution of MANETs followed by its significance in various fields. Besides, the MANETs have been analysed from the security perspective, particularly the work performed in the node misbehaviour paradigm has been elaborated.

23 citations

Journal ArticleDOI
TL;DR: A design of an address verification technique to detect threats by using multiplicative increase and additive decrease algorithm based on network localization with the support of Port Scanning, OS fingerprinting and Route Tracing algorithms has been discussed.

20 citations

Journal ArticleDOI
TL;DR: Results from this research indicate that blockchain technology contributes to the achievement of logistics objectives.
Abstract: The purpose of this article is to identify blockchain's role in achieving logistic objectives, with the aim of pointing out the significance of blockchain technology in the digital transformation of logistics and transportation. Implementation of the blockchain technology in combination with IoT elements in logistics and transportation contributes to business process optimization, supply chain traceability and transparency, and significant financial savings. There are limitations as blockchain is at a relatively early stage of development with most projects. Therefore, the approach of theory building from multiple case studies was used. The article provides a comprehensive overview of current blockchain initiatives and use-cases. This article is believed to be the first to address the role of blockchain technology in achieving logistics objectives. Results from this research indicate that blockchain technology contributes to the achievement of logistics objectives.

19 citations