scispace - formally typeset
Search or ask a question
Author

Rama Krishna Challa

Bio: Rama Krishna Challa is an academic researcher from Panjab University, Chandigarh. The author has contributed to research in topics: Wireless sensor network & Distributed coordination function. The author has an hindex of 7, co-authored 24 publications receiving 150 citations.

Papers
More filters
Proceedings ArticleDOI
13 May 2013
TL;DR: This paper presents layered framework integrated with neural network to build an effective intrusion detection system that has high attack detection accuracy and less false alarm rate.
Abstract: The threat from spammers, attackers and criminal enterprises has grown with the expansion of Internet, thus, intrusion detection systems (IDS)have become a core component of computer network due to prevalence of such threats. In this paper, we present layered framework integrated with neural network to build an effective intrusion detection system. This system has experimented with Knowledge Discovery & Data Mining(KDD) 1999 dataset. The systems are compared with existing approaches of intrusion detection which either uses neural network or based on layered framework. The results show that the proposed system has high attack detection accuracy and less false alarm rate.

30 citations

Proceedings ArticleDOI
23 Apr 2010
TL;DR: This paper illustrates how wormhole attack can affect the performance of routing protocols in wireless mesh networks by using QualNet simulator.
Abstract: Wireless Mesh Network is a new networking paradigm. In the development of wireless mesh networks routing is the main issue. There are different security flaws and attacks on routing protocols in wireless mesh networks. These attacks can affect the performance of different routing protocols. Wormhole is one of these attacks. The wormhole attack can affect the performance of different routing protocols. During this attack, a malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a distant point, which replays them locally. This paper illustrates how wormhole attack can affect the performance of routing protocols in wireless mesh networks by using QualNet simulator.

22 citations

Proceedings Article
11 Mar 2015
TL;DR: This paper proposes a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data that retains the security requirements as proposed in the existing approaches in literature but provides results efficiently.
Abstract: Cloud provides an illusion of infinite storage to the user at limited setup and usage cost. Due to the availability of resources at low initial investment cost and fast internet speed, the organizations are motivated to outsource their data on cloud. But storing secure and confidential data on cloud introduces many security risks, namely data leakage, data theft and reduced control on data. In order to maintain confidentiality, the data is encrypted before outsourcing it to cloud. But this introduces the problem of efficient searching on the cloud. Several approaches exist for searching on this encrypted data stored on cloud but require large number of comparisons and time to search the desired documents. In this paper, we propose a cluster based privacy preserving multi-keyword search scheme over encrypted cloud data. The proposed search scheme retains the security requirements as proposed in the existing approaches in literature but provides results efficiently. Experimental results demonstrate the effectiveness of the proposed search scheme as it reduces the number of comparisons required to search the desired document by 80% for dataset with 6000 documents. Also, the time required to search the desired documents is also reduced by 70% for the same dataset as compared to the existing efficient search schemes in literature.

16 citations

Proceedings ArticleDOI
28 Sep 2015
TL;DR: An energy-efficient Quality of Service (QoS) aware time slot allocation scheme is proposed for WBASN Media Access Control (MAC) layer that improves the energy efficiency by reducing the chances of packet drops and energy wastage due to idle listening.
Abstract: With the technological advancements in the field of Wireless Sensor Networks (WSNs) in the last decade, a number of remote monitoring and health care applications have made their presence felt through implanted and wearable biosensors. These biosensors can be used for real time patient monitoring creating a Wireless Body Area Sensor Network (WBASN). These biosensors are equipped with limited battery creating a requirement for energy-efficient schemes for WBASN protocols. The biosensor nodes are heterogeneous in terms of buffer size, traffic type, inter-arrival time and payload size. The data generated by these nodes may have different requirements based on their quality parameters. A biosensor node generating electroencephalography (EEG) reading may require reliable transmission of data and same way some other biosensor node may generate delay sensitive data. Differing requirements of these biosensor nodes lead to the requirement of QoS aware schemes for WBASN. In this paper, an energy-efficient Quality of Service (QoS) aware time slot allocation scheme is proposed for WBASN Media Access Control (MAC) layer. This scheme takes heterogeneity of biosensor nodes under consideration. Slot allocation is based on QoS aware priority classes. Unlike most of the existing schemes, time slot duration is traffic adaptive in this sch eme and variable length slots are allocated based on different payload sizes of the sensor nodes. This scheme improves the energy efficiency by reducing the chances of packet drops and energy wastage due to idle listening. Sleep time for sensor nodes is increased leading to lower energy consumption. The proposed time slot allocation scheme is compared with slot allocation scheme of eMC-MAC protocol. Simulation result shows a significant improvement in energy efficiency over eMC-MAC slot allocation scheme.

13 citations

Proceedings ArticleDOI
23 Apr 2010
TL;DR: With the help of performance metrics like packet delivery ratio, average end-to-end delay and normalized routing load, it is shown that cross-layering between DSR and IEEE 802.11 DCF performs better than cross-Layering between AODV and IEEE802.
Abstract: As Mobile Ad hoc Networks (MANETs) gains popularity, the need for suitable ad hoc MAC and routing protocols will continue to grow. Cross-layer design is an emerging proposal to support flexible layer approaches in MANETs. Less remaining hop More Opportunity (LEMO) algorithm was proposed to improve the packet delivery ratio and fairness among flows for multi-hop ad hoc networks through cross-layer interaction between MAC and the routing layer. The routing information about the total hops and the remaining hops required by a packet to reach its destination is exploited by the MAC layer in order to give priority to the packets that are closer to their destination. This paper compares the performance of LEMO algorithm by using DSR and AODV protocols at the routing layer and varying the mobility and the load conditions. With the help of performance metrics like packet delivery ratio, average end-to-end delay and normalized routing load, it is shown that cross-layering between DSR and IEEE 802.11 DCF performs better than cross-layering between AODV and IEEE 802.11 DCF.

11 citations


Cited by
More filters
Proceedings ArticleDOI
01 Jan 2018
TL;DR: Kitsune is presented: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner, and demonstrates that Kitsune can be a practical and economic NIDS.
Abstract: Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network attacks. However, a drawback of neural networks is the amount of resources needed to train them. Many network gateways and routers devices, which could potentially host an NIDS, simply do not have the memory or processing power to train and sometimes even execute such models. More importantly, the existing neural network solutions are trained in a supervised manner. Meaning that an expert must label the network traffic and update the model manually from time to time. In this paper, we present Kitsune: a plug and play NIDS which can learn to detect attacks on the local network, without supervision, and in an efficient online manner. Kitsune's core algorithm (KitNET) uses an ensemble of neural networks called autoencoders to collectively differentiate between normal and abnormal traffic patterns. KitNET is supported by a feature extraction framework which efficiently tracks the patterns of every network channel. Our evaluations show that Kitsune can detect various attacks with a performance comparable to offline anomaly detectors, even on a Raspberry PI. This demonstrates that Kitsune can be a practical and economic NIDS.

674 citations

Proceedings ArticleDOI
07 Jan 2012
TL;DR: A survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs are presented.
Abstract: MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns. In this paper, we will present survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs. We will also discuss some proposed solutions to detect and prevent these attacks. As MANETs are widely used in many vital applications, lots of research work has to be done to find efficient solutions against these DoS attacks that can work for different routing protocols.

222 citations

Journal ArticleDOI
TL;DR: The motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedICine are examined.
Abstract: The new and ground-breaking real-time remote monitoring in triage and priority-based sensor technology used in telemedicine have significantly bounded and dispersed communication components. To examine these technologies and provide researchers with a clear vision of this area, we must first be aware of the utilised approaches and existing limitations in this line of research. To this end, an extensive search was conducted to find articles dealing with (a) telemedicine, (b) triage, (c) priority and (d) sensor; (e) comprehensively review related applications and establish the coherent taxonomy of these articles. ScienceDirect, IEEE Xplore and Web of Science databases were checked for articles on triage and priority-based sensor technology in telemedicine. The retrieved articles were filtered according to the type of telemedicine technology explored. A total of 150 articles were selected and classified into two categories. The first category includes reviews and surveys of triage and priority-based sensor technology in telemedicine. The second category includes articles on the three-tiered architecture of telemedicine. Tier 1 represents the users. Sensors acquire the vital signs of the users and send them to Tier 2, which is the personal gateway that uses local area network protocols or wireless body area network. Medical data are sent from Tier 2 to Tier 3, which is the healthcare provider in medical institutes. Then, the motivation for using triage and priority-based sensor technology in telemedicine, the issues related to the obstruction of its application and the development and utilisation of telemedicine are examined on the basis of the findings presented in the literature.

143 citations

Journal ArticleDOI
TL;DR: The proposed hybrid technique combines data mining approaches like K Means clustering algorithm and RBF kernel function of Support Vector Machine as a classification module to decrease the number of attributes associated with each data point.

134 citations

Journal ArticleDOI
TL;DR: A comprehensive review of healthcare service provision highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine.
Abstract: The burden on healthcare services in the world has increased substantially in the past decades. The quality and quantity of care have to increase to meet surging demands, especially among patients with chronic heart diseases. The expansion of information and communication technologies has led to new models for the delivery healthcare services in telemedicine. Therefore, mHealth plays an imperative role in the sustainable delivery of healthcare services in telemedicine. This paper presents a comprehensive review of healthcare service provision. It highlights the open issues and challenges related to the use of the real-time fault-tolerant mHealth system in telemedicine. The methodological aspects of mHealth are examined, and three distinct and successive phases are presented. The first discusses the identification process for establishing a decision matrix based on a crossover of `time of arrival of patient at the hospital/multi-services' and `hospitals' within mHealth. The second phase discusses the development of a decision matrix for hospital selection based on the MAHP method. The third phase discusses the validation of the proposed system.

112 citations