scispace - formally typeset
Search or ask a question
Author

Tushar Singh Chouhan

Bio: Tushar Singh Chouhan is an academic researcher. The author has contributed to research in topics: Reconfigurable computing & Encryption. The author has an hindex of 2, co-authored 2 publications receiving 17 citations.

Papers
More filters
Proceedings ArticleDOI
01 Dec 2015
TL;DR: NS-3 is used to implement AODV, OLSR and DSDV routing on V- to-V, I-to-I and V-To-I nodes to compare these routing protocols and simulation results show that O LSR is the most optimum technique amongst A ODV, D SDV and OLSS for this model.
Abstract: VANET's is an emerging field in communication networks and has become a promising tool to provide safety and connectivity for an intelligent transport system. Choosing appropriate routing protocols is necessary for smooth communication. In this paper we use NS-3 to implement AODV, OLSR and DSDV routing on V-to-V, I-to-I and V-to-I nodes. Then we employ Qos (Quality of service) parameters like throughput, PLR (packet loss ratio) and packet overhead, as evaluation parameters to compare these routing protocols. We use IEEE 802.11p [2] and Nakagami-n fast fading propagation loss model for the simulations. The simulation results show that OLSR is the most optimum technique amongst AODV, DSDV and OLSR for our model.

17 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: A lightweight cryptographic algorithm called Present algorithm is used to enhance the security in netfpga by creating a module dedicated for encrypting the data transmitted by the netFPGA.
Abstract: The NetFPGA is a low-cost reconfigurable hardware platform optimized for high-speed networking. The NetFPGA includes all the logic resources, memory, and Gigabit Ethernet interfaces required to build a complete switch, router, and/or any other security device. Because the entire data path is implemented in hardware, the system can support back-to-back packets at full Gigabit line rates and has a processing latency measured in very few clock cycles. The security of the packet transfer using NETFPGA is one that has not yet been implemented on a more secure scale due to hardware limitation as many of the advanced algorithms such as AES or DES cannot be used due to their high complexity and excessive use of resources. In light of this I used a lightweight cryptographic algorithm called Present algorithm to enhance the security in netfpga by creating a module dedicated for encrypting the data transmitted by the netfpga. The algorithm is implemented using Xilinx for the initial testing and then the bit file is burned on the chip for real time emulation. Once the ping or rather the connection between the two connected machines is established the encrypted message is sent from the transmitter to the receiver and the output is observed.

5 citations


Cited by
More filters
Proceedings ArticleDOI
01 Oct 2018
TL;DR: This work investigates on how three state-of-the-art Mobile Ad-Hoc Network (MANET) routing protocols behave over the IEEE 802.11p/WAVE stack, and shows that the DSDV and OLSR protocols have a better performance than AODV, for low-density and low-speed scenarios.
Abstract: Vehicle-to-Vehicle (V2V), Vehicle-to-Road Infrastructure (V2R) and Vehicle-to-Pedestrian (V2P) communications are paramount for paving the way for smarter, cleaner and safer cities and roads. We investigate on how three state-of-the-art Mobile Ad-Hoc Network (MANET) routing protocols behave over the IEEE 802.11p/WAVE stack, which has been recently been specified for Vehicular Ad-hoc Networks (VANETs): Ad-hoc On-Demand Distance Vector (AODV), Optimized Link State Routing (OLSR) and Destination-Sequenced Distance-Vector (DSDV). Based on ns-3 and BonnMotion simulations, we evaluate Packet Delivery Rate, Goodput, Routing Overhead and End-to-End Delay for different trajectories, average speeds, and network densities. Our results show that the DSDV and OLSR protocols have a better performance than AODV, for low-density and low-speed scenarios. Additionally, we have observed that when the number of Nodes (network density) or Nodes’ velocity increases, the OLSR protocol performs better than the other two.

29 citations

Journal ArticleDOI
01 Aug 2021
TL;DR: Comparing the different classes of VANET protocols gives guidelines in one place and demonstrates that AODV is the most optimal method among A ODV, OLSR & DSDV for the model.
Abstract: VANET (Vehicle Ad hoc Network) is a subclass of MANET, which is a rapidly increasing research field in the world. Vehicles are interactive with each other, V2I & hybrid in VANET. Several difficulties are facing author’s today V2V, V2I, and hybrid communication. Vehicles usually turn the field of VANET communication, transparent and enter new vehicles, network size or street conditions are main elements of this communication, which poses particular challenges such as highly dynamic topology, unregulated network size, high mobility, scalability, and networking. The previous MANET protocols are not enough to help VANET as a result of these issues. In this study, we surveyed and published numerous classes of VANET routing protocols (VRPs). Comparing the different classes of VANET protocols gives guidelines in one place. In this work, we utilize network simulator 3 to apply AODV, DSDV & OLSR routing on V2V, nodes. The evaluation criteria for comparison of these routing protocols include the use of QoS (Quality of Service) parameters such as PLR, packet overhead & throughput. For simulations, we use IEEE 802.11p model. The results of the simulation demonstrate that AODV is the most optimal method among AODV, OLSR & DSDV for our model.

25 citations

Proceedings ArticleDOI
01 Jun 2018
TL;DR: A new hardware architecture design has been developed here for both PRESENT and HIGHT, and a significant design optimization has been achieved for HIGHT and asignificant throughput has be achieved for PRESENT.
Abstract: Light weight cryptography is a technology for providing the security solutions for the hardware systems where there is no computational resource or limited resource. PRESENT and HIGHT are a class of lightweight block ciphers which uses two different ways of computational structure for cipher generation. The paper presents the design and FPGA implementation of the two cryptographic structures PRESENT and HIGHT. A new hardware architecture design has been developed here for both PRESENT and HIGHT. A comparative analysis of the presented designs PRESENT and HIGHT have been done with the existing designs. A significant design optimization has been achieved for HIGHT and a significant throughput has been achieved for PRESENT.

5 citations

Journal ArticleDOI
TL;DR: Evaluated protocols for attenuation of communication signal over the transmission distance show that Ad hoc On-demand Distance Vector Routing Protocol outperforms the others being the most resistant to fading phenomena.
Abstract: ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------Quality of service is negatively impacted by the attenuation of the communication signal over the transmission distance. The attenuation phenomena can be modelled using different fading models; Nakagami model is regarded as the most realistic one. Attenuation in VANET is more challenging since it depends also on vehicle’s length and node density. The main purpose of this paper is to evaluate the performances of Ad hoc On-demand Distance Vector, Dynamic destination-Sequenced Distance Vector and Optimized Link State Routing protocols. A real map from an urban zone has been used. The map has been prepared using the simulator of urban mobility (SUMO) for the network simulator 3 (ns-3). Results show that Ad hoc On-demand Distance Vector Routing Protocol outperforms the others being the most resistant to fading phenomena.

4 citations

Dissertation
01 Jan 2019
TL;DR: A framework for evaluating proposed technologies for next-generation wireless systems, using systems modelling approaches, mixes hard systems modelling into a soft approach providing a method for managing complexity and facilitating learning points for the development of future wireless systems.
Abstract: This thesis presents a framework for evaluating proposed technologies for next-generation wireless systems, using systems modelling approaches. First, the socio-economic system is explored addressing the challenging question of how to develop a strategy for research investment in the complex development space of Fifth Generation (5G) era technologies. By the application of Problem Structuring Methods, and focusing on developing a clearer understanding of the industry landscape, a methodology for strategic decision making is proposed. The approach is used to identify key areas of wireless technology research for the 5G era. Subsequently, identified key areas of wireless technology including, full-duplex, beamforming, clear channel assessment and transmission power adaptation are explored in single and multi-hop wireless networks. A novel conceptual simulation modelling methodology is proposed and applied to investigate the performance impact of these technologies when implemented in the context of Carrier Sense Multiple Access with Collision Avoidance wireless networks. The methodology is designed to aid researchers in the environment of a corporate research and development lab with the goal of developing innovations and intellectual property that can bring commercial success. Whilst each technology is capable in principle of improving system performance, often the gain is limited when implementing in a network environment. The methodology is used to propose strategies for maximising performance gain with quantitative results to support the conclusions. The framework mixes hard systems modelling into a soft approach providing a method for managing complexity and facilitating learning points for the development of future wireless systems.

4 citations