This page has only limited features, please log in for full access.
The Internet of things (IoT) is emerging as a prime area of research in the modern era. The significance of IoT in the daily life is increasing due to the increase in objects or things connected to the internet. In this paper, routing protocol for low power and lossy networks (RPL) is examined on the Contiki operating system. This paper used RPL attack framework to simulate three RPL attacks, namely hello-flood, decreased-rank and increased-version. These attacks are simulated in a separate and simultaneous manner. The focus remained on the detection of these attacks through artificial neural network (ANN)-based supervised machine learning approach. The accurate detection of the malicious nodes prevents the network from the severe effects of the attack. The accuracy of the proposed model is computed with hold-out approach and tenfold cross-validation technique. The hyperparameters have been optimized through parameter tuning. The model presented in this paper detected the aforesaid attacks simultaneously as well as individually with 100% accuracy. This work also investigated other performance measures like precision, recall, F1-score and Mathews correlation coefficient (MCC).
Saurabh Sharma; Vinod Kumar Verma. AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing 2021, 1 -31.
AMA StyleSaurabh Sharma, Vinod Kumar Verma. AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things. The Journal of Supercomputing. 2021; ():1-31.
Chicago/Turabian StyleSaurabh Sharma; Vinod Kumar Verma. 2021. "AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things." The Journal of Supercomputing , no. : 1-31.
The routing protocol for low power and lossy networks works as an effective method for communication in Contiki. However, many security attacks exist in RPL. These attacks affect the traffic or energy of the network. This paper focused on the persistent explorations of Contiki-based IoT networks to examine the effect of three well-known security attacks that exist on RPL. The RPL security attacks are named as: hello flood attack, decreased rank attack and increased version attack. The impact of these security attacks has been evaluated for scalability, energy efficiency and destination-oriented directed acyclic graph construction over simulated IoT networks in Contiki. All three aforesaid attacks are found to be responsible for affecting the DODAG construction, rising the network traffic and power consumption in one way or the other. To investigate the impact of attacks particularly on the scalability, the simulations are accomplished using eight different scenarios. It is found that the throughput of the network increases with the rise in the number of normal nodes (N) up to a critical point, at which N has optimum value. It is found that at N = 40, the critical point appears for many categories in different attacks. Like, “resdm” and “resem” categories possess this critical point through hello flood attack. Similarly, the “rdsdm” category has maximum throughput at N = 40 through increased version attack. Likewise, the decreased rank attack brought this critical point at N = 40 for categories “rdsem” and “resem”. The simulation results show that regardless of the attacks “rese” and “rdse” categories produce more throughput than “resd” and “rdsd” categories. This work also demonstrates the effect of the size of heterogenous packets on multiple throughput metrics.
Saurabh Sharma; Vinod Kumar Verma. Security explorations for routing attacks in low power networks on internet of things. The Journal of Supercomputing 2020, 77, 4778 -4812.
AMA StyleSaurabh Sharma, Vinod Kumar Verma. Security explorations for routing attacks in low power networks on internet of things. The Journal of Supercomputing. 2020; 77 (5):4778-4812.
Chicago/Turabian StyleSaurabh Sharma; Vinod Kumar Verma. 2020. "Security explorations for routing attacks in low power networks on internet of things." The Journal of Supercomputing 77, no. 5: 4778-4812.
Recent studies show a worldwide tendency to retain public data – coming from diverse sources such as citizens, automated devices, and sensor networks – inside web repositories. These repositories contain the open data, and they provide transparency and accountability and enable interaction with the private sector. This proposal focuses on the administrative guidelines for digital transparency and public administration regarding open data.
Carlos Moreno; Vinod Kumar Verma; Jean-Yves Simon. Digital Transparency and Open Data. Global Encyclopedia of Public Administration, Public Policy, and Governance 2020, 1 -14.
AMA StyleCarlos Moreno, Vinod Kumar Verma, Jean-Yves Simon. Digital Transparency and Open Data. Global Encyclopedia of Public Administration, Public Policy, and Governance. 2020; ():1-14.
Chicago/Turabian StyleCarlos Moreno; Vinod Kumar Verma; Jean-Yves Simon. 2020. "Digital Transparency and Open Data." Global Encyclopedia of Public Administration, Public Policy, and Governance , no. : 1-14.
The capacity of modern computer numeric control (CNC) machine tool builds on the machine design (structural rigidity, drive system, control looping, etc.), machining process (cutting speed, feed rate and cutting forces) and environment (temperature and vibrations).The linear drive system of CNC machines consists of ball screw and its associated components. The servomotor drives the feed drive system in control conditions at required speed, and providing feedback to controller of the machine. Feed drive system is responsible for the performance of linear axis of machine. The performance indicators include positioning accuracy, repeatability and backlash. The required accuracy on workpiece relies on the torque/power of axis motors. The objective of this article is to derive an equation for the computation of torque for the feed drive system of CNC machines. We have proposed two simple and easiest method of computing torque. Firstly, we computed the torque required for the running of linear axis of machine under load conditions by the first method. Secondly, the verification of computed torque has been done by the second method. Thirdly, we have analyzed three major factors like rapid rate, weight over the system and lead of ball screw to study the behavior of torque. Finally, analytical estimations have been carried out for the validation of the deployed method.
Kuldeep Verma; R. M. Belokar; Vinod Kumar Verma; Klimis Ntalianis. Real-time inclusive investigations for the selection of servo drive system of CNC machining centers. Journal of the Brazilian Society of Mechanical Sciences and Engineering 2019, 42, 38 .
AMA StyleKuldeep Verma, R. M. Belokar, Vinod Kumar Verma, Klimis Ntalianis. Real-time inclusive investigations for the selection of servo drive system of CNC machining centers. Journal of the Brazilian Society of Mechanical Sciences and Engineering. 2019; 42 (1):38.
Chicago/Turabian StyleKuldeep Verma; R. M. Belokar; Vinod Kumar Verma; Klimis Ntalianis. 2019. "Real-time inclusive investigations for the selection of servo drive system of CNC machining centers." Journal of the Brazilian Society of Mechanical Sciences and Engineering 42, no. 1: 38.
PurposeThis paper aims to propose an elementary approach towards the measurement of a globoidal cam profile used in an automatic tool changer (ATC) of computer numerical control (CNC) machines.Design/methodology/approachA simple and unique online method has been designed for the profile metrology of the cam. This simple methodology will replace the traditional methodology of profile metrology of cam by coordinate measuring machine (CMM). A globoidal cam with an indexable turret and roller follower (rotating in an enclosed track) has been evaluated in our analysis. This analysis plays a significant role in the performance determination of the cam as well as the ATC of CNC machines.FindingsA novel model has been designed and implemented to investigate the profile of a globoidal cam. The proposed methodology becomes an enhancement over the old methodology, i.e. measurement through CMM. Theoretical analysis and practical implementation prove the significance of the method.Originality/valueAn enhanced methodology to effectively measure the globoidal cam profile has been proposed. The practical implication of the proposed methodology remains for the CNC machine tool and ATC manufacturers. Finally, analytical explorations have been carried out to prove the validity of the proposal.
Kuldeep Verma; R.M. Belokar; Vinod Kumar Verma; Klimis Ntalianis. Track-based analysis for profile generation on globoidal cam in automatic tool changer of CNC machining center. Assembly Automation 2019, 39, 369 -379.
AMA StyleKuldeep Verma, R.M. Belokar, Vinod Kumar Verma, Klimis Ntalianis. Track-based analysis for profile generation on globoidal cam in automatic tool changer of CNC machining center. Assembly Automation. 2019; 39 (2):369-379.
Chicago/Turabian StyleKuldeep Verma; R.M. Belokar; Vinod Kumar Verma; Klimis Ntalianis. 2019. "Track-based analysis for profile generation on globoidal cam in automatic tool changer of CNC machining center." Assembly Automation 39, no. 2: 369-379.
Subscription and open access journals from SAGE Publishing, the world's leading independent academic publisher.
Vinod Kumar Verma; Klimis Ntalianis; Carlos Manuel Moreno; Chao-Tung Yang. Next-generation Internet of things and cloud security solutions. International Journal of Distributed Sensor Networks 2019, 15, 1 .
AMA StyleVinod Kumar Verma, Klimis Ntalianis, Carlos Manuel Moreno, Chao-Tung Yang. Next-generation Internet of things and cloud security solutions. International Journal of Distributed Sensor Networks. 2019; 15 (3):1.
Chicago/Turabian StyleVinod Kumar Verma; Klimis Ntalianis; Carlos Manuel Moreno; Chao-Tung Yang. 2019. "Next-generation Internet of things and cloud security solutions." International Journal of Distributed Sensor Networks 15, no. 3: 1.
In the last decade, cloud computing has brought enormous changes to people’s lives. Cloud computing gives a client-driven computational model. In this case, the pay-per-use model enables a flexible method of deploying and sharing distributed services and resources. Furthermore, computational resources are progressively reassembled and insulated to give various types of services. Current solutions on how to efficiently utilize energy consumption are inadequate. Thus, we propose two methods to tackle the problem, which are the dynamic resource allocation method and the energy saving method, respectively. In this work, we firstly deployed an infrastructure platform based on OpenStack to actualize the proposed approach with live migration of virtual machines (VMs). Secondly, we allocated the dynamic resources and proposed the energy saving algorithm. Thirdly, we monitor the power distribution unit status to record the energy consumption of the system. Finally, in the experiments, we found that the proposed algorithms cannot just accomplish the proficient use of VMs’ resources but also thrift the energy usage of physical machines. Our experimental results demonstrate about 39.89% of energy is saved from 20 VCPUs of 20 GB memory.
Chao-Tung Yang; Shuo-Tsung Chen; Jung-Chun Liu; Yu-Wei Chan; Chien-Chih Chen; Vinod Kumar Verma. An energy-efficient cloud system with novel dynamic resource allocation methods. The Journal of Supercomputing 2019, 75, 4408 -4429.
AMA StyleChao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Yu-Wei Chan, Chien-Chih Chen, Vinod Kumar Verma. An energy-efficient cloud system with novel dynamic resource allocation methods. The Journal of Supercomputing. 2019; 75 (8):4408-4429.
Chicago/Turabian StyleChao-Tung Yang; Shuo-Tsung Chen; Jung-Chun Liu; Yu-Wei Chan; Chien-Chih Chen; Vinod Kumar Verma. 2019. "An energy-efficient cloud system with novel dynamic resource allocation methods." The Journal of Supercomputing 75, no. 8: 4408-4429.
Vinod Kumar Verma; Klimis Ntalianis; Surinder Singh; N.P. Pathak. Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications 2018, 124, 111 -118.
AMA StyleVinod Kumar Verma, Klimis Ntalianis, Surinder Singh, N.P. Pathak. Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks. Computer Communications. 2018; 124 ():111-118.
Chicago/Turabian StyleVinod Kumar Verma; Klimis Ntalianis; Surinder Singh; N.P. Pathak. 2018. "Data proliferation based estimations over distribution factor in heterogeneous wireless sensor networks." Computer Communications 124, no. : 111-118.
The energy consumption and the resource utilization are the most fundamental concerns to evaluate trustworthiness of any trust and reputation model (TRM) associated with heterogeneous wireless sensor networks (WSNs). However, existing TRMs used for WSNs are incapable of satisfying these concerns because of the gap between theoretical and actual evaluations. In this paper, we proposed investigations over initial pheromone and path length factor value for their strong influence on the performance of wireless sensor networks. Two important trust and reputation models are investigated namely: bio-inspired trust and reputation model and linguistic fuzzy trust and reputation (LFTM). The performance parameters, such as accuracy, path length, and energy consumption of sensor node operations, are evaluated. In addition, we emphasized over the satisfaction evaluation for LFTM model in the deployed WSN framework. Several experiments have been conducted to evaluate the efficiency of the proposed framework by keeping initial pheromone value fixed and path length factor varies and vice versa. The experimental results show that pheromone and path length factor affects to the performance of the above said trust and reputation models up to significant level in heterogeneous WSNs.
Vinod Kumar Verma. Pheromone and Path Length Factor-Based Trustworthiness Estimations in Heterogeneous Wireless Sensor Networks. IEEE Sensors Journal 2016, 17, 215 -220.
AMA StyleVinod Kumar Verma. Pheromone and Path Length Factor-Based Trustworthiness Estimations in Heterogeneous Wireless Sensor Networks. IEEE Sensors Journal. 2016; 17 (1):215-220.
Chicago/Turabian StyleVinod Kumar Verma. 2016. "Pheromone and Path Length Factor-Based Trustworthiness Estimations in Heterogeneous Wireless Sensor Networks." IEEE Sensors Journal 17, no. 1: 215-220.
Trust and reputation models emerges new facet that aims to provide secure and reliable computations in distributed computational environment. In this manuscript, we propose pervasive explorations of wireless sensor network to investigate the effect of static, dynamic and oscillating modes. Our proposed model constitutes five trust and reputation models namely: bio-inspired trust and reputation, Eigen trust, peer trust, power trust, linguistic fuzzy trust and reputation. The impact of different wireless sensor networks modes has been judged for accuracy, path length and energy consumption over deployed models. Further experimental results have demonstrated to prove the validity of our proposal.
Vinod Kumar Verma; Surinder Singh; N. P. Pathak. Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks 2015, 23, 335 -343.
AMA StyleVinod Kumar Verma, Surinder Singh, N. P. Pathak. Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks. Wireless Networks. 2015; 23 (2):335-343.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N. P. Pathak. 2015. "Towards comparative evaluation of trust and reputation models over static, dynamic and oscillating wireless sensor networks." Wireless Networks 23, no. 2: 335-343.
This paper focuses on the event based investigations over different data dissemination routing protocols for highly dense wireless sensor networks. Initially for the wireless sensor network domain, we analyzed data dissemination flooding and gossiping routing protocols. We etude and exemplify our proposed model for data dissemination based evaluation with Delphi random generator distribution strategy. We calculated performance metrics as sense count, transmit count, receive count and receive redundant count. At the end, simulations analysis has been carried out to prove the validity of our designed scenario.
Vinod Kumar Verma; Surinder Singh; N. P. Pathak. Analytical Event Based Investigations Over Delphi Random Generator Distributions for Data Dissemination Routing Protocols in Highly Dense Wireless Sensor Network. Wireless Personal Communications 2015, 87, 1209 -1222.
AMA StyleVinod Kumar Verma, Surinder Singh, N. P. Pathak. Analytical Event Based Investigations Over Delphi Random Generator Distributions for Data Dissemination Routing Protocols in Highly Dense Wireless Sensor Network. Wireless Personal Communications. 2015; 87 (4):1209-1222.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N. P. Pathak. 2015. "Analytical Event Based Investigations Over Delphi Random Generator Distributions for Data Dissemination Routing Protocols in Highly Dense Wireless Sensor Network." Wireless Personal Communications 87, no. 4: 1209-1222.
This paper reports the power consumption and resource utilization of a trust and reputation model deployed in a wireless sensor network (WSN). The impact of sensor augmentation parameter for static and dynamic WSN with trust and reputation models has been examined. In particular, we present a novel WSN framework-based investigations on peer trust and linguistic fuzzy trust model (LFTM) for trust and reputation models. Accuracy, path length, and energy consumption of sensor node operations are reported for their current and average scenarios. In addition, we emphasized over the satisfaction evaluation for LFTM model in the deployed WSN framework. The performance of the sensor augmentation for our proposed framework is evaluated via analytic bounds and numerical simulations. Analytical results together with simulation results exhibit the eminence of the proposed sensor augmentation-based realization over past trust and reputation model investigations.
Surinder Singh; Vinod Kumar Verma; Nagendra Prasad Pathak. Sensors Augmentation Influence Over Trust and Reputation Models Realization for Dense Wireless Sensor Networks. IEEE Sensors Journal 2015, 15, 6248 -6254.
AMA StyleSurinder Singh, Vinod Kumar Verma, Nagendra Prasad Pathak. Sensors Augmentation Influence Over Trust and Reputation Models Realization for Dense Wireless Sensor Networks. IEEE Sensors Journal. 2015; 15 (11):6248-6254.
Chicago/Turabian StyleSurinder Singh; Vinod Kumar Verma; Nagendra Prasad Pathak. 2015. "Sensors Augmentation Influence Over Trust and Reputation Models Realization for Dense Wireless Sensor Networks." IEEE Sensors Journal 15, no. 11: 6248-6254.
This article deals with the impact of malicious servers over different trust and reputation models in wireless sensor networks. First, we analysed the five trust and reputation models, namely BTRM-WSN, Eigen trust, peer trust, power trust, linguistic fuzzy trust model. Further, we proposed wireless sensor network design for optimisation of these models. Finally, influence of malicious servers on the behaviour of above mentioned trust and reputation models is discussed. Statistical analysis has been carried out to prove the validity of our proposal.
Vinod Kumar Verma; Surinder Singh; N.P. Pathak. Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics 2015, 103, 1 -11.
AMA StyleVinod Kumar Verma, Surinder Singh, N.P. Pathak. Impact of malicious servers over trust and reputation models in wireless sensor networks. International Journal of Electronics. 2015; 103 (3):1-11.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N.P. Pathak. 2015. "Impact of malicious servers over trust and reputation models in wireless sensor networks." International Journal of Electronics 103, no. 3: 1-11.
We analyze a wireless sensor network system to address the impact of different battery models on five routing protocols. We present an analytical model to understand the key performance metrics like average jitter, first and last packet received, total bytes received, average end to end delay, throughput and energy consumption. We have proposed the various parameters of our model for static, distance vector and on demand based routing protocols along with linear and service life estimator battery model. The validation of proposed parameters through simulation and derive substantial investigations in wireless sensor network system.
Vinod Kumar Verma; Surinder Singh; N. P. Pathak. Optimized Battery Models Observations for Static, Distance Vector and On-Demand Based Routing Protocols Over 802.11 Enabled Wireless Sensor Networks. Wireless Personal Communications 2014, 81, 503 -517.
AMA StyleVinod Kumar Verma, Surinder Singh, N. P. Pathak. Optimized Battery Models Observations for Static, Distance Vector and On-Demand Based Routing Protocols Over 802.11 Enabled Wireless Sensor Networks. Wireless Personal Communications. 2014; 81 (2):503-517.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N. P. Pathak. 2014. "Optimized Battery Models Observations for Static, Distance Vector and On-Demand Based Routing Protocols Over 802.11 Enabled Wireless Sensor Networks." Wireless Personal Communications 81, no. 2: 503-517.
We derive a new investigation for the wireless sensor networks (WSNs) when the underlying sensor node distribution strategies have strong influence on event specific communication performance. In this paper, we inclusively evaluated eight sensor network distributions namely: normal, gamma, exponential, beta, generalized inverse Gaussian, poison, Cauchy and Weibull. We designed and illustrated our proposed model with these node distributions for data dissemination. Moreover, performance evaluation matrices like sense count, receive count and receive redundant count are also evaluated. Additionally, we emphasized over the routing protocol behavior for different distribution strategies in the deployed WSN framework. Finally, simulation analysis has been carried out to prove the validity of our proposal. However, routing protocol for WSNs seems intractable to the sensor node distribution strategies when varied from one to another in the scenario.
Vinod Kumar Verma; Surinder Singh; N. P. Pathak. Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks 2014, 20, 2349 -2357.
AMA StyleVinod Kumar Verma, Surinder Singh, N. P. Pathak. Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks. Wireless Networks. 2014; 20 (8):2349-2357.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N. P. Pathak. 2014. "Comprehensive event based estimation of sensor node distribution strategies using classical flooding routing protocol in wireless sensor networks." Wireless Networks 20, no. 8: 2349-2357.
We derive a new representation for the collusive sensor nodes when the underlying fraudulent correlated environment has strong influence on wireless sensor networks performance. We have evaluated collusion effect with respect to static (SW) and dynamic (DW) wireless sensor networks to derive the joint resultant. Moreover accuracy, path length, and energy consumption of sensor node operations are also evaluated. Additionally, we emphasized over the satisfaction evaluation for linguistic fuzzy trust and reputation (LFTM) models in the deployed WSN framework. Finally, simulation analysis has been carried out to prove the validity of our proposal. However, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario.
Vinod Kumar Verma; Surinder Singh; N. P. Pathak. Collusion Based Realization of Trust and Reputation Models in Extreme Fraudulent Environment over Static and Dynamic Wireless Sensor Networks. International Journal of Distributed Sensor Networks 2014, 10, 1 .
AMA StyleVinod Kumar Verma, Surinder Singh, N. P. Pathak. Collusion Based Realization of Trust and Reputation Models in Extreme Fraudulent Environment over Static and Dynamic Wireless Sensor Networks. International Journal of Distributed Sensor Networks. 2014; 10 (5):1.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; N. P. Pathak. 2014. "Collusion Based Realization of Trust and Reputation Models in Extreme Fraudulent Environment over Static and Dynamic Wireless Sensor Networks." International Journal of Distributed Sensor Networks 10, no. 5: 1.
Vinod Kumar Verma; Surinder Singh; Nagendra P. Pathak. Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik 2014, 125, 748 -750.
AMA StyleVinod Kumar Verma, Surinder Singh, Nagendra P. Pathak. Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik. 2014; 125 (2):748-750.
Chicago/Turabian StyleVinod Kumar Verma; Surinder Singh; Nagendra P. Pathak. 2014. "Analysis of scalability for AODV routing protocol in wireless sensor networks." Optik 125, no. 2: 748-750.