scispace - formally typeset
Search or ask a question
Institution

Christ University

EducationBengaluru, India
About: Christ University is a education organization based out in Bengaluru, India. It is known for research contribution in the topics: Computer science & Convection. The organization has 2267 authors who have published 2715 publications receiving 14575 citations. The organization is also known as: Christ College & Christ University.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers and the results are indicating that the proposed approach can perform better than the other approaches.
Abstract: Wireless Sensor Network (WSN) is a spatially distributed network. It contains many numbers of distributed, self-directed, small, battery powered devices called sensor nodes or motes. In recent years the deployment of WSN in various application domains are growing in a rapid pace as with the upcoming boom of Internet of Things (IoT) and Internet of Everything (IoE). However, the effectiveness of the WSN deployment is restricted due to the constrained computation and power source. Hence, many researchers have been proposing new approaches and models to improve the efficiency of the domain specific WSN deployment procedures. Though, many research communities addressing various issues in WSN deployment, still the privacy and security of such networks are susceptible to various network attacks. Thus, it is necessary to practice different models for authentication and privacy preservation in a highly dynamic resource constrained WSN environment to realize the effectiveness and efficiency of the deployment. Hence, this paper addressing an authentication scheme that can reduce energy consumption without compromising on security and privacy. In order to provide a light weight authentication mechanism, this paper proposing an authentication mechanism for WSN deployment by combining the features of Elliptic Curve Cryptography (ECC) and Hexagonal numbers. The feature of ECC is used to reduce the key size and the effectiveness of generating hexagonal numbers is used for minimizing the energy consumption in a resource constrained WSN environment. The results of the proposed approach are evaluated with the different authentication models and the results were indicating that the proposed approach can perform better than the other approaches.

6 citations

Journal ArticleDOI
TL;DR: In this article, the main issue for fault or collision in controller area network (CAN) is the power consumption and dependable repeated data collection, which has a great impact for designing CAN.
Abstract: Nowadays, the power consumption and dependable repeated data collection are causing the main issue for fault or collision in controller area network (CAN), which has a great impact for designing au...

6 citations

Journal ArticleDOI
TL;DR: The outcome of the study shows SARDS (Secured Anonymous Routing with Digital Signature) to excel best in performance in comparison of existing security and energy efficient routing schemes.
Abstract: A Wireless Sensor Network has witnessed a massive research towards security as well as energy efficiency in past decades. However, there are few studies that have witnessed a cost effective secure routing technique with energy effectiveness till date. Objectives: Our objective is to use public key cryptography for ensuring energy-efficient routing technique in Wireless Sensor Network. Method/Analysis: The proposed paper presents a technique called as SARDS (Secured Anonymous Routing with Digital Signature) that performs verification of the routing information exchanged among the sensors in Wireless Sensor Network. SARDS uses elliptical curve cryptography as the backbone of security formulations and performs authentication of all the communicating nodes present in the network. Findings: The system also allows a dual layer of security by introducing a novel signature based scheme towards public key encryption policy. The outcome of the study shows SARDS to excel best in performance in comparison of existing security and energy efficient routing schemes. Application/Improvements: Proposed SARDS technique offers 1) A novel public key encryption, 2) A novel digital signature scheme, and 3) A novel privacy or anonymous scheme. The outcome of the proposed system is also found to be superior as compared to existing protocols e.g. SecLEACH, LEACH and PEGASIS.

6 citations

Proceedings ArticleDOI
01 Dec 2019
TL;DR: The network security is generally two parameter first one is communication and second one is data automation, and the network security field is directly or indirectly linked with the concept of data encryption.
Abstract: The modern world technology is civilized, globalized and modernized. The technological development of social networks and e-commerce applications produce larger data. This data communication is major task, because device to device communication need network terminal. This data transmission is not safe because of different types of tools and software available to destroy the existing network. In the field of network security during data transfer from one particular node to other node some security vulnerability is happened this is the one of the critical issue in this sector. The reason for this network security is different types of data attacks are happen in day to day life. It is easy to establish a new network but protecting the entire network is a big issue. This network security is generally two parameter first one is communication and second one is data automation. The network security field is directly or indirectly linked with the concept of data encryption. The development in this network security has taken us to a level that from signature again we came back to thumb print. For example maintain the data secure we use the lock system which is a finger print type. This technology helps us to protect the physical data theft, but logical data theft is still problem for data transmission. This article will brief about the network security it also presents the various network security types. Those types are wired and wireless network security. Apart from the network security the following topics is also discussed in this article. Those are network security protocols and simulation tools in network security. The research problems in network security are privacy and vulnerability of data.

6 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: The different speech disabilities in adults is described and the available software and other computer based tools that facilitate better communication for people with speech impairment are reviewed.
Abstract: Speech impairment, though not a major obstacle, is still a problem for people who suffer from it, while they are making public presentations. This paper describes the different speech disabilities in adults and reviews the available software and other computer based tools that facilitate better communication for people with speech impairment. The motivation for this writing has been the fact that stuttering, one of the types of speech disability has affected about 1 percentage of the people worldwide. This fact was provided by the Stuttering Foundation of America, a Non-profit Organization, functioning since 1947. A solution to stuttering is expected to benefit a considerable population. Speech recognition software tools help people with disabilities use their computers and other hand held devices to satisfy their day-to-day needs which otherwise, require dedicated domestic help and also question the person's ability to be independent. ASR (Automatic Speech Recognition) systems are popular among the common people and people with motor disabilities, while using these techniques for the treatment of speech correction is a current research field and is of interest to SLPs/SLTs (Speech Language Pathologist / Speech Language Therapist). On-going research also includes development of ASR based software to facilitate comfortable oral communication with people suffering from speech dysfunctions, i.e., in the domain of AAC (Augmentative and Alternative Communication).

6 citations


Authors

Showing all 2404 results

Network Information
Related Institutions (5)
Amity University
12.7K papers, 86K citations

80% related

Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

79% related

VIT University
24.4K papers, 261.8K citations

78% related

SRM University
11.7K papers, 103.7K citations

78% related

Punjabi University
5.9K papers, 73.1K citations

77% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202371
2022172
2021795
2020479
2019360
2018239