This page has only limited features, please log in for full access.

Dr. Yashwant Singh
Department of Computer Science and Information Technology, Central University of Jammu

Basic Info


Research Keywords & Expertise

0 Vulnerability Assessment
0 WSN, IOT, Wildfire
0 IoT Security
0 IoT Sensing
0 IoT Sensors

Fingerprints

Vulnerability Assessment

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Chapter
Published: 30 July 2021 in Unmanned Aerial Vehicles for Internet of Things (IoT)
Reads 0
Downloads 0

The technological leap in Information and Communications Technology (ICT), brings a new paradigm of the Internet of Things (IoT) as an “intelligent connection of things”. Moreover, the IoT technology is extended beyond to provide connectivity between people, data, processes, and things that constitutes the Internet of Everything (IoE). In the meantime, IoT encounters several challenges due to the constrained nature of network and devices by memory, power, processing, and link speed. Recently, the concept of Unmanned Aerial Vehicles (UAVs) has elevated to potentially conquer the challenges faced by IoT. However, the assimilation of UAV into IoT poses many scientific and technical challenges during integration. The purpose of this study is to bridge the landscape between IoT and UAV by identifying the technical and non-technical issues facing integration. Also, the study discusses the applications, architecture, and technologies of UAV enabled Internet of Things. The study definitely answers the question regarding the proximity between IoT and UAV by exploiting the mobility of UAVs. The UAV-enabled IoT solution can greatly help to improve the scalability, heterogeneity, and network coverage constraint of IoT.

ACS Style

Bharti Rana; Yashwant Singh. Internet of Things and UAV: An Interoperability Perspective. Unmanned Aerial Vehicles for Internet of Things (IoT) 2021, 105 -127.

AMA Style

Bharti Rana, Yashwant Singh. Internet of Things and UAV: An Interoperability Perspective. Unmanned Aerial Vehicles for Internet of Things (IoT). 2021; ():105-127.

Chicago/Turabian Style

Bharti Rana; Yashwant Singh. 2021. "Internet of Things and UAV: An Interoperability Perspective." Unmanned Aerial Vehicles for Internet of Things (IoT) , no. : 105-127.

Article
Published: 18 May 2021 in Wireless Personal Communications
Reads 0
Downloads 0

The need for reliable transmission of data packets is becoming more critical as Wireless Sensor Networks (WSN) gain popularity. Reliable delivery of data packets is possible only when the protocols for routing the data packets are secure and efficient. Due to the constrained nature of the WSN, the current cryptosystems may not be used to provide WSN security. The trust-based intelligent routing, however, may provide security with fewer resources, and it has become common in the last five years. In this paper, a new Trust-Based Secure Intelligent Opportunistic Routing Protocol(TBSIOP) has been proposed. The proposed protocol uses three distinct WSN attributes to compute a node's likelihood of being malicious(Pm). These attributes are sincerity in forwarding data packets(Fs), sincerity in acknowledgment (ACKs), and Energy Depletion (Ed), and these attributes are used for trust computation. Based on the trust factor computed, the relay selection algorithm of the proposed protocol prevents malicious nodes from being chosen as relay nodes. The proposed protocol is applied on the forwarder node list that is formed by Intelligent Opportunistic Routing Protocol. The proposed protocol is simulated and compared with the existing trust-based routing protocols present in the literature. The proposed TBSIOP has better performance in terms of Average Risk Level, Packet Delivery Ratio, End-to-End delay, Energy Consumption, and Network Lifetime than the comparative protocols present in the literature.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications 2021, 1 -22.

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications. 2021; ():1-22.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. 2021. "A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks." Wireless Personal Communications , no. : 1-22.

Journal article
Published: 05 March 2021 in Sensors
Reads 0
Downloads 0

The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications.

ACS Style

Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors 2021, 21, 1809 .

AMA Style

Parushi Malhotra, Yashwant Singh, Pooja Anand, Deep Bangotra, Pradeep Singh, Wei-Chiang Hong. Internet of Things: Evolution, Concerns and Security Challenges. Sensors. 2021; 21 (5):1809.

Chicago/Turabian Style

Parushi Malhotra; Yashwant Singh; Pooja Anand; Deep Bangotra; Pradeep Singh; Wei-Chiang Hong. 2021. "Internet of Things: Evolution, Concerns and Security Challenges." Sensors 21, no. 5: 1809.

Journal article
Published: 15 September 2020 in Energies
Reads 0
Downloads 0

In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common IoT devices and proposes a threat architecture for IoT, addressing threats in the context of a three-layer IoT reference architecture. Furthermore, the vulnerabilities exploited at the several IoT attack surfaces and the challenges they exert are explored. Thereafter, the challenges in quantifying the IoT vulnerabilities with the existing framework are also analyzed. The study also covers a case study on the Intelligent Transportation System, covering road transport and traffic control specifically in terms of threats and vulnerabilities. Another case study on secure energy management in the Smart Grid is also presented. This case study covers the applications of Internet of Vulnerable Things (IoVT) in Smart energy Grid solutions, as there will be tremendous use of IoT in future Smart Grids to save energy and improve overall distribution. The analysis shows that the integration of the proposed architecture in existing applications alarms the developers about the embedded threats in the system.

ACS Style

Pooja Anand; Yashwant Singh; Arvind Selwal; Pradeep Singh; Raluca Felseghi; Maria Raboaca. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies 2020, 13, 4813 .

AMA Style

Pooja Anand, Yashwant Singh, Arvind Selwal, Pradeep Singh, Raluca Felseghi, Maria Raboaca. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids. Energies. 2020; 13 (18):4813.

Chicago/Turabian Style

Pooja Anand; Yashwant Singh; Arvind Selwal; Pradeep Singh; Raluca Felseghi; Maria Raboaca. 2020. "IoVT: Internet of Vulnerable Things? Threat Architecture, Attack Surfaces, and Vulnerabilities in Internet of Things and Its Applications towards Smart Grids." Energies 13, no. 18: 4813.

Journal article
Published: 09 September 2020 in IEEE Access
Reads 0
Downloads 0

Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT). There are social, economic, and commercial impacts of IoT on human lives. However, IoT nodes are generally power-constrained with data transmission using an open channel, i.e., Internet which opens the gates for various types of attacks on them. In this context, several efforts are initiated to deal with the evolving security issues in IoT systems and make them self-sufficient to harvest energy for smooth functioning. Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm. Moreover, we provide a general overview of IoT, Sustainable IoT, its architecture, and the Internet Engineering Task Force (IETF) protocol suite. Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT. A detailed taxonomy of attacks associated with various vulnerabilities is also presented in the text. Then we have specifically focused on the IoT Vulnerability Assessment techniques followed by a case study on sustainability of Smart Agriculture. Finally, this paper outlines the emerging challenges related to IoT and its sustainability, and opening the doors for the beginners to start research in this promising area.

ACS Style

Pooja Anand; Yashwant Singh; Arvind Selwal; Mamoun Alazab; Sudeep Tanwar; Neeraj Kumar. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. IEEE Access 2020, 8, 168825 -168853.

AMA Style

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar. IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges. IEEE Access. 2020; 8 (99):168825-168853.

Chicago/Turabian Style

Pooja Anand; Yashwant Singh; Arvind Selwal; Mamoun Alazab; Sudeep Tanwar; Neeraj Kumar. 2020. "IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges." IEEE Access 8, no. 99: 168825-168853.

Journal article
Published: 13 July 2020 in Sensors
Reads 0
Downloads 0

The lifetime of a node in wireless sensor networks (WSN) is directly responsible for the longevity of the wireless network. The routing of packets is the most energy-consuming activity for a sensor node. Thus, finding an energy-efficient routing strategy for transmission of packets becomes of utmost importance. The opportunistic routing (OR) protocol is one of the new routing protocol that promises reliability and energy efficiency during transmission of packets in wireless sensor networks (WSN). In this paper, we propose an intelligent opportunistic routing protocol (IOP) using a machine learning technique, to select a relay node from the list of potential forwarder nodes to achieve energy efficiency and reliability in the network. The proposed approach might have applications including e-healthcare services. As the proposed method might achieve reliability in the network because it can connect several healthcare network devices in a better way and good healthcare services might be offered. In addition to this, the proposed method saves energy, therefore, it helps the remote patient to connect with healthcare services for a longer duration with the integration of IoT services.

ACS Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors 2020, 20, 3887 .

AMA Style

Deep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh, Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors. 2020; 20 (14):3887.

Chicago/Turabian Style

Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. 2020. "An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare." Sensors 20, no. 14: 3887.

Journal article
Published: 27 April 2020 in Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)
Reads 0
Downloads 0

Background: Security in WSNs is the most significant because sensor nodes deployed are in an unattended environment, and the information is communicated over insecure wireless channels. Therefore, there is a need to put enhanced security measures for securing sensor nodes as well as ensure secured transmission of information. Objective: These resource-constrained networks suffer from various attacks namely, node clone attack, Sybil attack, and DoS attack. In this paper, we proposed a hybrid cryptography algorithm, which secured WSNs from node clone attack. Methods: The proposed algorithm uses a combination of symmetric (AES) and asymmetric (ECC) cryptography techniques along with the hash function. Further, the proposed algorithm checks the integrity of messages during communication in the sensor network. Results: The performance of the proposed hybrid algorithm was examined through the various metrics like communication, computation, and storage overheads. The comparison of the results validates the efficiency of the proposed hybrid algorithm. Conclusion: The proposed hybrid algorithm provides a secure and efficient solution to the energy sensor networks.

ACS Style

Vandana Mohindru; Yashwant Singh; Ravindara Bhatt. Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 2020, 13, 251 -259.

AMA Style

Vandana Mohindru, Yashwant Singh, Ravindara Bhatt. Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack. Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering). 2020; 13 (2):251-259.

Chicago/Turabian Style

Vandana Mohindru; Yashwant Singh; Ravindara Bhatt. 2020. "Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, no. 2: 251-259.

Journal article
Published: 01 January 2020 in International Journal of Information and Computer Security
Reads 0
Downloads 0

Message communication in WSNs is not secure because energy-starving networks are vulnerable to numerous security attacks mainly due to their nature of distribution and unprotected communication. Securing communication in these networks not only needs to provide the elementary security but also needs resistance against countless attacks. Message authentication and integrity is a serious concern for sensor networks security, therefore, sensor network must assure the distribution of authentic message without any amendment or alteration. To solve these problems, a lightweight message authentication algorithm is proposed for securing message communication in WSNs. The algorithm uses

ACS Style

Vandana Mohindru; Yashwant Singh; Ravindara Bhatt. Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm. International Journal of Information and Computer Security 2020, 12, 217 .

AMA Style

Vandana Mohindru, Yashwant Singh, Ravindara Bhatt. Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm. International Journal of Information and Computer Security. 2020; 12 (2/3):217.

Chicago/Turabian Style

Vandana Mohindru; Yashwant Singh; Ravindara Bhatt. 2020. "Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm." International Journal of Information and Computer Security 12, no. 2/3: 217.

Conference paper
Published: 22 November 2019 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

With the passage of time, Wireless Sensor Networks (WSNs) gain importance and have become one of the most fascinating areas of research in the past few years. Reliable and efficient data routing, that helps the data to reach its destination, remains the bottom line of research problem. Hence, various routing protocols are developed which are based on different parameters. But opportunistic routing has fascinated many researchers these days because of its broadcasting nature that makes it more efficient than the old routing methods. However, while routing in this sensor network the loss of data takes place because of its security lack. Therefore, security is also a challenging issue with the routing of WSN. This paper presents an overview of the WSN, its architecture, applications of WSN in different fields presented. An overview of the security aspect of routing in WSN is given. Finally, a comparison of different security methods of opportunistic routing is also presented.

ACS Style

Archana Sharma; Yashwant Singh. On Security of Opportunistic Routing Protocol in Wireless Sensor Networks. Lecture Notes in Electrical Engineering 2019, 407 -419.

AMA Style

Archana Sharma, Yashwant Singh. On Security of Opportunistic Routing Protocol in Wireless Sensor Networks. Lecture Notes in Electrical Engineering. 2019; ():407-419.

Chicago/Turabian Style

Archana Sharma; Yashwant Singh. 2019. "On Security of Opportunistic Routing Protocol in Wireless Sensor Networks." Lecture Notes in Electrical Engineering , no. : 407-419.

Journal article
Published: 01 September 2019 in Sustainable Computing: Informatics and Systems
Reads 0
Downloads 0
ACS Style

Vandana Mohindru; Ravindara Bhatt; Yashwant Singh. Reauthentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems 2019, 23, 158 -166.

AMA Style

Vandana Mohindru, Ravindara Bhatt, Yashwant Singh. Reauthentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems. 2019; 23 ():158-166.

Chicago/Turabian Style

Vandana Mohindru; Ravindara Bhatt; Yashwant Singh. 2019. "Reauthentication scheme for mobile wireless sensor networks." Sustainable Computing: Informatics and Systems 23, no. : 158-166.

Conference paper
Published: 01 June 2019 in 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Reads 0
Downloads 0

Wireless Sensor Network (WSN) is emerging field in research, due to its applications almost in every field. Mostly WSN are used to sense a specific area or region which is used to monitor the chemical and biological changes within a region. The main component of a Wireless Sensor Network is a sensor node, which collects information and transmits it to the receiving station for further processing. Further, how to deploy these sensors in a network so that it will cover maximum area is very important. For efficient deployment in a network different strategies are used for node deployment. After deployment of nodes the question is whether they collect all the information in that region, it depends upon the coverage or how well a node senses a given region. In this paper, a brief description of deployment and coverage in WSN is presented. The various optimization algorithms used in deployment of WSN is also described. A comparison of various deployment methods based on their performance and area in which they are deployed is illustrated. Further, the various coverage methods are also compared on the basis of their efficiency and connectivity.

ACS Style

Yashwant Singh; Jahangir Ahmad Lone; Pradeep Kumar Singh; Zdzislaw Polkowski; Sudeep Tanwar; Sudhanshu Tyagi. Deployment and Coverage in Wireless Sensor Networks: A Perspective. 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2019, 1 -7.

AMA Style

Yashwant Singh, Jahangir Ahmad Lone, Pradeep Kumar Singh, Zdzislaw Polkowski, Sudeep Tanwar, Sudhanshu Tyagi. Deployment and Coverage in Wireless Sensor Networks: A Perspective. 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 2019; ():1-7.

Chicago/Turabian Style

Yashwant Singh; Jahangir Ahmad Lone; Pradeep Kumar Singh; Zdzislaw Polkowski; Sudeep Tanwar; Sudhanshu Tyagi. 2019. "Deployment and Coverage in Wireless Sensor Networks: A Perspective." 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) , no. : 1-7.

Conference paper
Published: 01 June 2019 in 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Reads 0
Downloads 0

Estimating the effort behind a software project is the approximation time and resources an engineer need to create a software application. The estimation is one of the most important phase in the developing process to set the cost of project and ultimately to attract the client. In the preliminary stage of a project, the accuracy of estimation is to be extremely precise and dependable, which may not be easy to achieve. Therefore, use of machine learning algorithms is a possible solution for the estimation process on which the decision can be made. In this study, we have analyzed various studies and machine learning trends conducted in this field. Doing this effective reductions in the cost and parameter for the project to be accomplished. Accuracy, root mean and relative absolute errors are used to compute the effort estimation accuracy.

ACS Style

Zdzislaw Polkowski; Jayneel Vora; Sudeep Tanwar; Sudhanshu Tyagi; Pradeep Kumar Singh; Yashwant Singh. Machine Learning-based Software Effort Estimation: An Analysis. 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2019, 1 -6.

AMA Style

Zdzislaw Polkowski, Jayneel Vora, Sudeep Tanwar, Sudhanshu Tyagi, Pradeep Kumar Singh, Yashwant Singh. Machine Learning-based Software Effort Estimation: An Analysis. 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). 2019; ():1-6.

Chicago/Turabian Style

Zdzislaw Polkowski; Jayneel Vora; Sudeep Tanwar; Sudhanshu Tyagi; Pradeep Kumar Singh; Yashwant Singh. 2019. "Machine Learning-based Software Effort Estimation: An Analysis." 2019 11th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) , no. : 1-6.

Conference paper
Published: 01 December 2018 in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC)
Reads 0
Downloads 0

The small program to perform any type of malicious activity that may damage the system of the legal user automatically without legal users' knowledge is called a bot (bad bot). The network of bots under the control of a botmaster is called a botnet. It is a serious threat to information, communication, and economy etc. The interaction of devices to form a botnet are smartphones, computers, IoT systems whose vulnerabilities are exploited and so the security is breached to relinquish the control to bot controllers or third-party. On the basis of C2 (command and control) structure the botnet is considered as a centralized, decentralized or hybrid type, however, the architecture of botnet includes botmaster, C2 (low false positive rates) respectively. The machine learning plays an essential role in the detection and recognition of Botnets and is therefore explored in thispaper. In this paper, the mean of the accuracy of k-means clustering and j48 classification approach (hybrid approach) is calculated while using the two random dataset partitions whose sum are always equal to the original dataset to compute the accuracy of low positive rates and high positive rates based on the percentages of “correctly and incorrectly instances”. The comparative analysis of the three techniques i.e. clustering, classification, and hybrid approach suggest that the results of classification and clustering are constant on one end i.e. lower in case of classification and higher in case of clustering and on the contrary, results of our approach are varying in nature and gives the approximation in both the processes.

ACS Style

Shamsul Haq; Yashwant Singh. Botnet Detection using Machine Learning. 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) 2018, 240 -245.

AMA Style

Shamsul Haq, Yashwant Singh. Botnet Detection using Machine Learning. 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC). 2018; ():240-245.

Chicago/Turabian Style

Shamsul Haq; Yashwant Singh. 2018. "Botnet Detection using Machine Learning." 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) , no. : 240-245.

Journal article
Published: 01 January 2018 in International Journal of Information and Computer Security
Reads 0
Downloads 0

Wireless sensor networks (WSN) consist of small size sensor nodes with limited sensing, processing, communication, and storage capabilities. These sensor nodes are vulnerable to the node clone attack where the attacker compromises the node and extracts secret information from the node and replicate the large numbers of clones of captured node throughout the sensor network. Therefore, providing security in such networks is of utmost importance. The main challenge to achieve this is to make the security solution energy efficient so that it is feasible to implement in such resource constrained nodes in WSN. In this paper, an energy efficient algorithm is proposed for node authentication. The aim of node authentication algorithm is to authenticate the sensor nodes before message communication within WSN so that cloned nodes are identified in the initial step of the communication. This algorithm uses encryption decryption operations and also XOR, extraction, bitwise shift operations. The performance of the proposed algorithm is analysed in terms of communication, storage, and computation overheads metrics. Finally, performance of the proposed algorithm is analysed with the other node authentication algorithms.

ACS Style

Vandana Mohindru; Yashwant Singh. Node authentication algorithm for securing static wireless sensor networks from node clone attack. International Journal of Information and Computer Security 2018, 10, 129 .

AMA Style

Vandana Mohindru, Yashwant Singh. Node authentication algorithm for securing static wireless sensor networks from node clone attack. International Journal of Information and Computer Security. 2018; 10 (2/3):129.

Chicago/Turabian Style

Vandana Mohindru; Yashwant Singh. 2018. "Node authentication algorithm for securing static wireless sensor networks from node clone attack." International Journal of Information and Computer Security 10, no. 2/3: 129.

Conference paper
Published: 01 September 2017 in 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
Reads 0
Downloads 0

Opportunistic routing in wireless networks has grown the popularity because it utilizes the broadcasting abilities of wireless links. Wireless sensor networks (WSN) also adopted opportunistic routing in recent years. In WSN, most important objectives of the researchers are to maintain the data integrity, availability and reliability with minimum energy consumption. If any WSN user have to achieve all of these objectives than, he has to ensure the security of the network first. Existing cryptographic schemes are not efficient for WSN, because of high energy consumption. This paper presents a new trust and packet load balancing based opportunistic routing (TPBOR) protocol. The proposed protocol is energy efficient and secure by utilizing the trusted nodes in the routing process. Also the proposed protocol balance the overall network traffic and distribute the traffic load equally in the network. The simulation results show that proposed OR protocol has significantly improves the network performance and reduces the end-to-end delays as compared to existing packet load balancing trust based routing protocols for WSN.

ACS Style

Nagesh Kumar; Yashwant Singh. Trust and packet load balancing based secure opportunistic routing protocol for WSN. 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) 2017, 463 -467.

AMA Style

Nagesh Kumar, Yashwant Singh. Trust and packet load balancing based secure opportunistic routing protocol for WSN. 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). 2017; ():463-467.

Chicago/Turabian Style

Nagesh Kumar; Yashwant Singh. 2017. "Trust and packet load balancing based secure opportunistic routing protocol for WSN." 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) , no. : 463-467.

Conference paper
Published: 01 September 2017 in 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC)
Reads 0
Downloads 0

Security in an important concern in Wireless Sensor Networks (WSN) because of wide range of applications like health care monitoring, wildlife monitoring, highway traffic monitoring, earthquake monitoring, and many military applications. All these applications require information to be communicate in a secure way without any type of modification by attackers. Therefore, an authentication mechanism is needed to check the authenticity of messages that are communicated with in the network. This paper presents the extensive performance analysis of various message authentication algorithms in terms of communication overhead, computational overhead, memory overhead and security level. Also the paper proposed the lightweight message authentication algorithm that covers all the demerits of the algorithm discussed in literature. The proposed algorithm generates the fixed size hash digest that is used for the authentication of messages within WSN. Also, the proposed algorithm results in low communication overhead, computational overhead, memory overhead and attain high level of security.

ACS Style

Vandana Mohindru; Yashwant Singh. Performance analysis of message authentication algorithms in wireless sensor networks. 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) 2017, 468 -472.

AMA Style

Vandana Mohindru, Yashwant Singh. Performance analysis of message authentication algorithms in wireless sensor networks. 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). 2017; ():468-472.

Chicago/Turabian Style

Vandana Mohindru; Yashwant Singh. 2017. "Performance analysis of message authentication algorithms in wireless sensor networks." 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) , no. : 468-472.

Journal article
Published: 01 April 2017 in International Journal of Information System Modeling and Design
Reads 0
Downloads 0

As the wireless sensor networks (WSN) are gaining popularity the need of reliable delivery of data packets becomes more important. The reliable delivery is only possible when the routing protocols are efficient and secure. Because of lack of resources it is not possible to use existing cryptosystems to provide security in WSN. But, trust aware routing can provide the security with lesser resources, which become popular in last three to four years. In this paper, a new energy efficient and trust aware reliable opportunistic routing (TAEROR) protocol is proposed. The protocol consists of a trust metric and also a relay selection algorithm. The trust aware metric detects the malicious nodes on the basis of forwarding sincerity, energy consumption and acknowledgement sincerity. Relay selection algorithms avoid these malicious nodes to get selected in the routing process. The protocol is simulated and compared to existing trust aware routing protocols. Proposed protocol TEAROR presents better results than the other compared protocols.

ACS Style

Nagesh Kumar; Yashwant Singh; Pradeep Kumar Singh. An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network. International Journal of Information System Modeling and Design 2017, 8, 30 -44.

AMA Style

Nagesh Kumar, Yashwant Singh, Pradeep Kumar Singh. An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network. International Journal of Information System Modeling and Design. 2017; 8 (2):30-44.

Chicago/Turabian Style

Nagesh Kumar; Yashwant Singh; Pradeep Kumar Singh. 2017. "An Energy Efficient Trust Aware Opportunistic Routing Protocol for Wireless Sensor Network." International Journal of Information System Modeling and Design 8, no. 2: 30-44.

Journal article
Published: 30 August 2016 in Indian Journal of Science and Technology
Reads 0
Downloads 0

Objectives: Increase in traffic density in the world results in more and more congestion, air pollution and accidents. Hence Intelligent Transport System (ITS) has been emerged as a solution to various transport related issues. The aim of this research paper is to conduct systematic analysis on ITS. Methods/Statistical Analysis: ITS is defined as the set of applications which are advance and aim to apply intelligent information and communication technologies in order to provide services for transport and traffic management. ITS have combined various technologies such as Data collection, Communication, Data Mining, Machine Learning, Artificial Intelligence and Database Management. By combining these information technologies ITS have provided various applications such as Traffic control, Fault detection systems, In-vehicle information and navigation systems and driver assistance systems. Findings: We have considered the most relevant published work from 2008 onward relative to our objective from different popular digital libraries. We have summarized this work into issues in ITS and techniques used to solve them. Application/Improvements: It has been found that by combining various new technologies such as agent based computing, cloud computing, VANETS etc. ITS have become very efficient to solving transport related issues in smart cities.

ACS Style

Aditi Zear; Pradeep Kumar Singh; Yashwant Singh. Intelligent Transport System: A Progressive Review. Indian Journal of Science and Technology 2016, 9, 1 .

AMA Style

Aditi Zear, Pradeep Kumar Singh, Yashwant Singh. Intelligent Transport System: A Progressive Review. Indian Journal of Science and Technology. 2016; 9 (32):1.

Chicago/Turabian Style

Aditi Zear; Pradeep Kumar Singh; Yashwant Singh. 2016. "Intelligent Transport System: A Progressive Review." Indian Journal of Science and Technology 9, no. 32: 1.

Conference paper
Published: 01 January 2016 in 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
Reads 0
Downloads 0

Applications of Wireless Sensor Networks (WSN) require reliable delivery of unaltered data. Data security in transit is an important issue for reliable delivery of data in WSN. Existing cryptographic methods are not meet the requirements for WSN because of their limited resources and opportunistic behavior of wireless nodes. In last four years, reputation and trust aware methods are used to solve the issue of security in WSN. In this paper, we have defined a novel opportunistic routing (OR) metric for sensor networks. The metric is derived by using energy consumption and trustworthiness of sensor nodes. The simulation result shows that the metric is able to detect a malicious activity in the network segment. This metric effectively and efficiently prevent from malicious activities and maintain data integrity.

ACS Style

Nagesh Kumar; Yashwant Singh. An energy efficient and trust management based opportunistic routing metric for wireless sensor networks. 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) 2016, 611 -616.

AMA Style

Nagesh Kumar, Yashwant Singh. An energy efficient and trust management based opportunistic routing metric for wireless sensor networks. 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC). 2016; ():611-616.

Chicago/Turabian Style

Nagesh Kumar; Yashwant Singh. 2016. "An energy efficient and trust management based opportunistic routing metric for wireless sensor networks." 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) , no. : 611-616.

Conference paper
Published: 01 December 2015 in 2015 Third International Conference on Image Information Processing (ICIIP)
Reads 0
Downloads 0

In this paper we have analyzed the distributed node clone detection techniques in wireless sensor networks. Although there are many protocols in literature proposed for node clone detection, but we have discussed some efficient protocol like LSM and RED under the category of witness based node clone detection. We have analyzed the detection level, memory, and energy overhead of LSM, RED and proposed protocol. We have presented an approach for the optimization of witness based distributed node clone detection. For the validation of proposed protocol performance, we have provided mathematical as well as simulation results for the various parameters of the WSN.

ACS Style

Balmukund Mishra; Yashwant Singh. An approach toward the optimization of witness based node clone attack. 2015 Third International Conference on Image Information Processing (ICIIP) 2015, 506 -510.

AMA Style

Balmukund Mishra, Yashwant Singh. An approach toward the optimization of witness based node clone attack. 2015 Third International Conference on Image Information Processing (ICIIP). 2015; ():506-510.

Chicago/Turabian Style

Balmukund Mishra; Yashwant Singh. 2015. "An approach toward the optimization of witness based node clone attack." 2015 Third International Conference on Image Information Processing (ICIIP) , no. : 506-510.