Skip to main content
Mayank  Dave
  • National Institute of Technology, Kurukshetra, Haryana, India
Peer-to-Peer (P2P) botnets have emerged as a significant threat against network security because of their distributed platform. The decentralized nature of these botnets makes their detection very challenging and the situation gets... more
Peer-to-Peer (P2P) botnets have emerged as a significant threat against network security because of their distributed platform. The decentralized nature of these botnets makes their detection very challenging and the situation gets aggravated if an existing P2P network is exploited for botnet creation (parasite botnets). In this paper, we present a two-tier detection scheme to detect parasite P2P botnets. Our approach detects botnets in their waiting stage itself, without any requirement of seed information about bots and bots' signature. We have considered two basic behavior of botnets for detection: (i) long-living peers and (ii) search requests' intensity. The approach is able to detect bots from a monitored network with accuracy above 99% at the same time addressing several shortcomings of previous detection approaches.
To create a secure communication among the sensor nodes, a key establishment scheme is very important. Wireless sensor networks (WSN) are usually left unattended and thus may attract the adversary to launch several attacks to the network... more
To create a secure communication among the sensor nodes, a key establishment scheme is very important. Wireless sensor networks (WSN) are usually left unattended and thus may attract the adversary to launch several attacks to the network operation. The exposure of the key during a node capture may disturb a large part of network communication. If there is a reliable, efficient, and secure KMS, disruption in the network to such an extent may not occur during a node capture attack. Several researchers have presented several key agreement schemes, but still the area is open to design an efficient attack resistant KMS. Sometimes, during the design of security protocols, the assumptions taken for the adversary behavior in sensor field may not reflect their actual behavior of the adversary in sensor field making these schemes less feasible in many real-world WSN applications. This chapter first discusses the challenges and security requirements, node capture attacks, its impact on the network, and some open issues of KMS solutions to this problem.
Use of Internet in today's world has been largely dominated by content dissemination but currently used IP architecture is based on connection between hosts. In order to disseminate content efficiently in cost effective manner,... more
Use of Internet in today's world has been largely dominated by content dissemination but currently used IP architecture is based on connection between hosts. In order to disseminate content efficiently in cost effective manner, internet architecture needs to map "what" user wants with "where" host of network is. Content Centric Networking (CCN) decouples content from host. CCN enables in-network caching at network layer. Each node in CCN can cache content along with forwarding the content. In CCN any node can act as host and serve client as if it is actual host for requested content. Content becomes core of network not connection in CCN. Major advantages of CCN are short download time and low communication overhead. As these advantages are because CCN supports in-network caching, so it can be concluded that caching is backbone of CCN. The selection of appropriate router to cache content so that it could be able to serve future requests for longer time is very important. The aim of this paper is to explain CCN functionalities briefly. Proposed caching strategies have also been covered in this paper.
Internet of Things (IoT) is a fairly disruptive technology with inconceivable growth, impact, and capability. We present the role of REST API in the IoT Systems and some initial concepts of IoT, whose technology is able to record and... more
Internet of Things (IoT) is a fairly disruptive technology with inconceivable growth, impact, and capability. We present the role of REST API in the IoT Systems and some initial concepts of IoT, whose technology is able to record and count everything. We as well highlight the concept of middleware that connects these devices and cloud. The appearance of new IoT applications in the cloud has brought new threats to security and privacy of data. Therefore it is required to introduce a secure IoT system which doesn't allow attackers infiltration in the network through IoT devices and also to secure data in transit from IoT devices to cloud. We provide the details on how Representational State Transfer (REST) API allows to securely expose connected devices to applications on cloud and users. In the proposed model, middleware is primarily used to expose device data through REST and to hide details and act as an interface to the user to interact with sensor data.
Organizations across the world are using Cloud to leverage some of its key aspects, such as reduced startup costs, data transmission expenditures, pay-as-you-use model etc. Increasing usage of Cloud based services not only raises... more
Organizations across the world are using Cloud to leverage some of its key aspects, such as reduced startup costs, data transmission expenditures, pay-as-you-use model etc. Increasing usage of Cloud based services not only raises conventional issues related to data security and privacy, but also causes handling data ownership and handling it dynamically difficult. This has now become a prominent research topic. To support real-time applications, concept of Fog computing have emerged. In this paper, we propose a model utilizing Fog computing and incorporating dynamic data ownership for data aggregation and deduplication. The technique presented in the paper uses Key Aggregate Cryptography and Bilinear groups.
Existing three-tier network architecture of Wireless Sensor and Actor Networks (WSANs) consists of three tiers i.e. tier-1 consisting of member sensor nodes and cluster heads, tier-2 consisting of actor nodes and finally tier-3 consisting... more
Existing three-tier network architecture of Wireless Sensor and Actor Networks (WSANs) consists of three tiers i.e. tier-1 consisting of member sensor nodes and cluster heads, tier-2 consisting of actor nodes and finally tier-3 consisting of sink node(s). In this architecture, all the network management functions are to be performed either by sink node(s) or cluster heads or normal member sensor nodes or actor nodes or these nodes in combination. This increases the computation and memory overheads on the network nodes, especially the tier-1 nodes. This paper proposes four-tier architecture for WSANs which introduces a new tier consisting of the relay nodes between tier-1 and tier-2 of three-tier architecture. This newly introduced tier is responsible for performing various network management tasks such as security. The proposed architecture significantly reduces burden on the resource-constrained network nodes, hence increases the network lifetime.
Congestion and quality of service are widely researched topics in Wireless Sensor Networks in recent years. Many researchers proposed and compared the merits and demerits of various algorithms with the existing algorithms. The major... more
Congestion and quality of service are widely researched topics in Wireless Sensor Networks in recent years. Many researchers proposed and compared the merits and demerits of various algorithms with the existing algorithms. The major challenge lies in developing an algorithm which optimizes the various performance parameters like packet drop ratio, residual energy and throughput of the network. Focus of the present work is to reduce congestion and improve quality of service by applying various metaheuristic or computational intelligence techniques which can optimize performance parameters. An objective function is formulated on the basis of factors like residual energy, throughput, distance between nodes and the number of retransmissions and its value is optimized by using various nature inspired computational intelligence techniques and their results are compared. Simulation results have shown that water wave algorithm outperforms all the other algorithms on the basis of packet drop ratio and throughput of wireless sensor network.
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked... more
Wireless sensor networks are often placed in hostile and unattended areas, making the nodes exposed to many attacks. Node capture is one of the prominent attack in such networks. Whenever, a node is captured, its keys have to be revoked from the network by means of rekeying. We aim to optimize the problem of key revocation and rekeying by reducing the communication and computation overhead. An attack algorithm is presented from an adversarial view point, compromising of capturing cost and traveling cost. It is used to compute the destructive rank of each node which ultimately finds the set of vulnerable nodes of the network. Each communicating node determine a backup key for future node revocation and automatically switches to it, to avoid the reconfiguration of the shared key. The keys of vulnerable nodes are bypassed during the generation of the backup link keys. It is shown that proposed scheme has high level of security as well as reduced communication overhead during rekeying process. The proposed attack is also compared with random attack and found that it is improved in terms of route compromise ratio and energy cost.
Several dynamic key management schemes have been proposed for wireless sensor networks (WSNs). However, only few have focused specifically on wireless sensor and actor networks (WSANs). This paper proposes an actor node based rekeying... more
Several dynamic key management schemes have been proposed for wireless sensor networks (WSNs). However, only few have focused specifically on wireless sensor and actor networks (WSANs). This paper proposes an actor node based rekeying scheme for WSANs which follows a three-tier automated architecture. The proposed scheme assigns the responsibility of rekeying to the resource-rich actor nodes, which perform rekeying both periodically as well as on-demand to handle the compromise of critical nodes. The actor nodes are more robust and difficult to be compromised as compared to the normal member sensor nodes and therefore, maintaining the rekeying data structures on them enhances the network security. The simulation results show that the proposed scheme also enhances the network lifetime.
With the expeditious expansion of the Internet of Things (IoT), an individual device’s privacy has become a huge concern for the industry, especially if medically sensitive information is being transferred. Safe and secure passage of this... more
With the expeditious expansion of the Internet of Things (IoT), an individual device’s privacy has become a huge concern for the industry, especially if medically sensitive information is being transferred. Safe and secure passage of this information to the intended destination is one of the main features of IoT. Currently, many schemes have been proposed to guarantee safe passage and secure Data Aggregation of individual device’s message(s). This work investigates present privacy concerns and data aggregation issues in IoT applications such as Wireless Body Sensor Network (WBSN) and goes through different Privacy-preserving Data Aggregation (PPDA) methods presented in Wireless Sensor Network (WSN)/IoT. Finally, this paper proposes a privacy-preserving data aggregation scheme more suitable for medically sensitive data of WBSN. The proposed scheme takes account of important differences between the WSN and WBSN, such as data redundancy and the role of individual sensors.
IoT middleware is an additional layer between IoT devices and the cloud applications that reduces computation and data handling on the cloud. In a typical IoT system model, middleware primarily connects to different IoT devices via IoT... more
IoT middleware is an additional layer between IoT devices and the cloud applications that reduces computation and data handling on the cloud. In a typical IoT system model, middleware primarily connects to different IoT devices via IoT gateway. Device data stored on middleware is sensitive and private to a user. Middleware must have built-in mechanisms to address these issues, as well as the implementation of user authentication and access control. This paper presents the current methods used for access control on middleware and introduces Attribute-based encryption (ABE) on middleware for access control. ABE combines access control with data encryption for ensuring the integrity of data. In this paper, we propose Ciphertext-policy attribute-based encryption, abbreviated CP-ABE scheme on the middleware layer in the IoT system architecture for user access control. The proposed scheme is aimed to provide security and efficiency while reducing complexity on middleware. We have used the AVISPA tool to strengthen the proposed scheme.
In the information retrieval system, relevance manifestation is pivotal and regularly based on document-term statistics, i.e. term frequency (tf), inverse document frequency (idf), etc. Query term proximity within matched documents is... more
In the information retrieval system, relevance manifestation is pivotal and regularly based on document-term statistics, i.e. term frequency (tf), inverse document frequency (idf), etc. Query term proximity within matched documents is mostly under-explored. In this paper, a novel information retrieval framework is proposed, to promote the documents among all relevant retrieved ones. The relevance estimation is a weighted combination of document statistics and query term statistics, and term-term proximity is a simply aggregates of diverse user preferences aspects in query formation, thus adapted into the framework with conventional relevance measures. Intuitively, QTP is exploited to promote the documents for balanced exploitation-exploration, and eventually navigate a search towards goals. The evaluation asserts the usability of QTP measures to balance several seeking tradeoffs, e.g. relevance, novelty, result diversity (Coverage and Topicality), and overall retrieval. The assessment of user search trails indicates significant growth in a learning outcome.
In today’s big data era, large scale data centers are the major infrastructure. One goal of doing research and work in the field of DCNs is to satisfy network transmission demands, increase responsiveness and throughput simultaneously.... more
In today’s big data era, large scale data centers are the major infrastructure. One goal of doing research and work in the field of DCNs is to satisfy network transmission demands, increase responsiveness and throughput simultaneously. Hence, for required stable and optimized architecture an implementation based on software-defined network (SDN) is used to utilize the data center network (DCN) performance. The problem of traffic engineering is observed in the field of routing and load balancing based on traditional networks in data centers. The load balancing is a complex task due to variety in data flows. Thus various solutions have been employed in this field for better results. Load balancing shows its use in the presence of heavy flow generated during peak intervals or other occasions that ultimately results in congestion of the network and performance degradation. This paper proposed the collaboration of online routing method with multipath transmission control protocol (MPTCP) and segment routing (SR) in software defined network for batter results in DCN.
With the evolution of computing from using personal computers to use of online Internet of Things (IoT) services and applications, security risks have also evolved as a major concern. The use of Fog computing enhances reliability and... more
With the evolution of computing from using personal computers to use of online Internet of Things (IoT) services and applications, security risks have also evolved as a major concern. The use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust models have been proposed to measure the security strength of available service providers. We utilize the quantized security of Datacenters and propose a new security-based service broker policy(SbSBP) for Fog computing environment to allocate the optimal Datacenter(s) to serve users' requests based on users' requirements of cost, time and security. Further, considering the dynamic nature of Fog computing, the concept of dynamic reconfiguration has been added. Comparative analysis of simulation results shows the effectiveness of proposed policy to incorporate users' requirements in the decision-making process.
Clustering of nodes in Wireless Sensor Networks is a problem of concern for many researchers. The major challenge is to propose an algorithm which can optimize the values of various performance parameters like packet delivery ratio and... more
Clustering of nodes in Wireless Sensor Networks is a problem of concern for many researchers. The major challenge is to propose an algorithm which can optimize the values of various performance parameters like packet delivery ratio and network lifetime of a node in the network. This paper shows an implementation of firefly algorithm to perform clustering in wireless sensor networks. Simulation results have shown the improvement in the performance parameters. The network lifetime of a node is improved as the energy exhaustion is reduced while transferring data in the network.
Fog Computing is a type of distributed computing that reduces computation on the cloud by creating a new layer between the Internet of Things (IoTs) devices and the cloud. This helps to deliver the services more efficiently and... more
Fog Computing is a type of distributed computing that reduces computation on the cloud by creating a new layer between the Internet of Things (IoTs) devices and the cloud. This helps to deliver the services more efficiently and effectively. The security concerns in fog computing are inherited from the cloud itself as the fog computing is derived from cloud computing. So, a major security concern in fog computing is during sharing of data, as illegitimate users could get access while the data is being shared. Attribute Based Encryption (ABE) method is proved to be beneficial for securing the data, but ABE method alone is not sufficient as there are various security concerns such as forward issue and backward issue. Various methods have been proposed by researchers to solve the problem, one such efficient solution is re-encryption. In this paper we propose a scheme that uses Ciphertext-policy Attribute based Encryption along with re-encryption for providing access control in fog and cloud communication. The analysis of the proposed scheme reveals better security and performance. We have also implemented the proposed scheme to show its effectiveness.
Hybrid watermarking is a prevailing technique in the latest research and has a significant amount of real-time applications. Digital watermarking is utilized to protect copyright and security to multimedia content. In this paper, an... more
Hybrid watermarking is a prevailing technique in the latest research and has a significant amount of real-time applications. Digital watermarking is utilized to protect copyright and security to multimedia content. In this paper, an algorithm is an amalgamation of image watermarking and audio watermarking algorithms. In case of image watermarking algorithm discrete cosine transform (DCT) and in case of audio, discrete cosine transforms (DCT) and discrete wavelet transform (DWT) are used to propose this Hybrid watermarking algorithm. Moreover, to refine the performance of the proposed scheme, error correction technique and Arnold transforms are employed. Peak sound to noise ratio and Bit Error Rate (BER) is applied to estimate the performance of this scheme to counter the Time-Scale Modification and numerous attacks possible on images and audio as well.
Hybrid Watermarking Approach is one of the trending approaches in the field of information security. Watermarking has a variety of applications to ensure data authentication, security, verification, and copyrights protection of digital... more
Hybrid Watermarking Approach is one of the trending approaches in the field of information security. Watermarking has a variety of applications to ensure data authentication, security, verification, and copyrights protection of digital media. The proposed approach is hybrid watermarking applied on image and audio. We proposed a scheme in which the image is blindly embedded over original data with the help of Discrete Wavelength Transformation(DWT) and Singular value decomposition(SVD). Now the watermarked image is embedded into an audio signal by taking advantage of the histogram by making a gathering of three neighboring bins having various samples into it and later histogram is pulled out from embedding range by quoting to the modified mean. There is appropriate security analysis of the hybrid watermarking with respect to robustness and imperceptibility mainly against synchronization attacks and we also analyze the robustness in the case of common attacks
The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from... more
The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes an Early Detection and Isolation Policy (EDIP)to mitigate insider-assisted DDoS attacks. EDIP detects insider among all legitimate clients present in the system at proxy level and isolate it from innocent clients by migrating it to attack proxy. Further an effective algorithm for detection and isolation of insider is developed with the aim of maximizing attack isolation while minimizing disruption to benign clients. In addition, concept of load balancing is used to prevent proxies from getting overloaded.
Over the years, the growth and use of technology in daily life is undeniably fast. Everything is going to be smart with the technology use, from home to vehicle, devices to factories etc. Enabling factors for this smartness are ubiquitous... more
Over the years, the growth and use of technology in daily life is undeniably fast. Everything is going to be smart with the technology use, from home to vehicle, devices to factories etc. Enabling factors for this smartness are ubiquitous network, sensors or actuators, embedded devices or things, long battery life, internet/web connected devices. In medical domain also, due to increasing burden on the existing architecture, costly medical services, and 24*7 and remote area service unavailability, the use of technology is now gaining momentum. To cure a patient with mental disorder is unquestionably tough as this type of healthcare is very patient-centric, a smaller number of psychiatrist/patient ratio and the social stigmas. So, smart mental healthcare is the need of hour. In this paper we propose a semantic web of things driven, cost and time effective solution towards the self-help initiative for diagnosing and treating patients with depressive disorders while also addressing the current state of art of the discipline. We have selected research material from various databases like Google Scholar, IEEE Explore, Science Direct, PubMed, Web of Science etc. The papers are reviewed with respect to the architecture used in various mental healthcare systems, services of IoT in mental healthcare.
...................................................................................... ii Acknowledgements ......................................................................... iv

And 180 more