This page has only limited features, please log in for full access.
The need for reliable transmission of data packets is becoming more critical as Wireless Sensor Networks (WSN) gain popularity. Reliable delivery of data packets is possible only when the protocols for routing the data packets are secure and efficient. Due to the constrained nature of the WSN, the current cryptosystems may not be used to provide WSN security. The trust-based intelligent routing, however, may provide security with fewer resources, and it has become common in the last five years. In this paper, a new Trust-Based Secure Intelligent Opportunistic Routing Protocol(TBSIOP) has been proposed. The proposed protocol uses three distinct WSN attributes to compute a node's likelihood of being malicious(Pm). These attributes are sincerity in forwarding data packets(Fs), sincerity in acknowledgment (ACKs), and Energy Depletion (Ed), and these attributes are used for trust computation. Based on the trust factor computed, the relay selection algorithm of the proposed protocol prevents malicious nodes from being chosen as relay nodes. The proposed protocol is applied on the forwarder node list that is formed by Intelligent Opportunistic Routing Protocol. The proposed protocol is simulated and compared with the existing trust-based routing protocols present in the literature. The proposed TBSIOP has better performance in terms of Average Risk Level, Packet Delivery Ratio, End-to-End delay, Energy Consumption, and Network Lifetime than the comparative protocols present in the literature.
Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications 2021, 1 -22.
AMA StyleDeep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh. A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Personal Communications. 2021; ():1-22.
Chicago/Turabian StyleDeep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh. 2021. "A Trust Based Secure Intelligent Opportunistic Routing Protocol for Wireless Sensor Networks." Wireless Personal Communications , no. : 1-22.
The lifetime of a node in wireless sensor networks (WSN) is directly responsible for the longevity of the wireless network. The routing of packets is the most energy-consuming activity for a sensor node. Thus, finding an energy-efficient routing strategy for transmission of packets becomes of utmost importance. The opportunistic routing (OR) protocol is one of the new routing protocol that promises reliability and energy efficiency during transmission of packets in wireless sensor networks (WSN). In this paper, we propose an intelligent opportunistic routing protocol (IOP) using a machine learning technique, to select a relay node from the list of potential forwarder nodes to achieve energy efficiency and reliability in the network. The proposed approach might have applications including e-healthcare services. As the proposed method might achieve reliability in the network because it can connect several healthcare network devices in a better way and good healthcare services might be offered. In addition to this, the proposed method saves energy, therefore, it helps the remote patient to connect with healthcare services for a longer duration with the integration of IoT services.
Deep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors 2020, 20, 3887 .
AMA StyleDeep Kumar Bangotra, Yashwant Singh, Arvind Selwal, Nagesh Kumar, Pradeep Kumar Singh, Wei-Chiang Hong. An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare. Sensors. 2020; 20 (14):3887.
Chicago/Turabian StyleDeep Kumar Bangotra; Yashwant Singh; Arvind Selwal; Nagesh Kumar; Pradeep Kumar Singh; Wei-Chiang Hong. 2020. "An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare." Sensors 20, no. 14: 3887.
Steganography is a type of secret communication which is used to hide the confidential information from the intruder. The security during information communication is a key concern which makes image steganography a popular technique. Image steganography techniques may be broadly classified into two domains i.e., spatial domain and frequency domain. This paper proposes an improved image steganography technique in which data is embedded in the edge pixels of the carrier image. An intruder has less suspicion about the existence of data bits in edges, because edge pixels appear to be different than their neighbours and thus ensures better security. The proposed technique uses different types of edge detection filters like Prewitt, Sobel, Laplacian and Canny in the existing image steganography using edge based data hiding in DCT domain algorithm. Furthermore, the proposed technique results in excellent performance with PSNR of 99% and SNR of 96%. However, the proposed steganography technique surprisingly results in reduction of image size mainly because of image compression.
Nadish Ayub; Arvind Selwal. An improved image steganography technique using edge based data hiding in DCT domain. Journal of Interdisciplinary Mathematics 2020, 23, 357 -366.
AMA StyleNadish Ayub, Arvind Selwal. An improved image steganography technique using edge based data hiding in DCT domain. Journal of Interdisciplinary Mathematics. 2020; 23 (2):357-366.
Chicago/Turabian StyleNadish Ayub; Arvind Selwal. 2020. "An improved image steganography technique using edge based data hiding in DCT domain." Journal of Interdisciplinary Mathematics 23, no. 2: 357-366.
A challenging task for the medical science is to achieve the accurate diagnosis of diseases prior to its treatment. A pattern classifier is used for solving complex and non-separable computing problems in different fields like biochemical analysis, image processing and chemical analysis etc .The accuracy for thyroid diagnosis system may be improved by considering few additional attributes like heredity ,age, anti-bodies etc. In this paper, a thyroid disease prediction system is developed using multilayer perceptron (MLP). The proposed system uses 7–11 attributes of individuals to classify them in normal, hyperthyroid and hypothyroid classes. The proposed model uses gradient descent backpropogation algorithm for training the multilayer perceptron using dataset of 120 subjects. The thyroid prediction system promises excellent overall accuracy of ~100% for 11 attributes. However, the system results in a lower accuracy of 66.7% using 11 attributes and 70% using 7 attributes with 30 subjects.
Arvind Selwal; Ifrah Raoof. A multi-layer perceptron based improved thyroid disease prediction system. Indonesian Journal of Electrical Engineering and Computer Science 2020, 17, 524 -532.
AMA StyleArvind Selwal, Ifrah Raoof. A multi-layer perceptron based improved thyroid disease prediction system. Indonesian Journal of Electrical Engineering and Computer Science. 2020; 17 (1):524-532.
Chicago/Turabian StyleArvind Selwal; Ifrah Raoof. 2020. "A multi-layer perceptron based improved thyroid disease prediction system." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 1: 524-532.
Arvind Selwal; Sunil Kumar Gupta; Surender. Low overhead octet indexed template security scheme for multi-modal biometric system. Journal of Intelligent & Fuzzy Systems 2017, 32, 3325 -3337.
AMA StyleArvind Selwal, Sunil Kumar Gupta, Surender. Low overhead octet indexed template security scheme for multi-modal biometric system. Journal of Intelligent & Fuzzy Systems. 2017; 32 (5):3325-3337.
Chicago/Turabian StyleArvind Selwal; Sunil Kumar Gupta; Surender. 2017. "Low overhead octet indexed template security scheme for multi-modal biometric system." Journal of Intelligent & Fuzzy Systems 32, no. 5: 3325-3337.
Biometric systems are automatic tools used to provide authentication during various applications of modern computing. In this work, three different design frameworks for multimodal biometric systems based on Fingerprint and Hand Geometry modalities are proposed. An analysis is also presented to diagnose various types of template security issues in the proposed system. Fuzzy Analytic Hierarchy Process (FAHP) is applied with five decision parameters on all the designs and framework-1 is found to be better in terms of template data security, templates fusion and computational efficiency. It is noticed that template data security before storage in database is a challenging task. An important observation is that a template may be secured at feature fusion level and an indexing technique may be used to improve the size of secured templates.
Arvind Selwal; Sunil Kumar Gupta; Surender; Anubhuti. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry. Perspectives in Science 2016, 8, 705 -708.
AMA StyleArvind Selwal, Sunil Kumar Gupta, Surender, Anubhuti. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry. Perspectives in Science. 2016; 8 ():705-708.
Chicago/Turabian StyleArvind Selwal; Sunil Kumar Gupta; Surender; Anubhuti. 2016. "Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry." Perspectives in Science 8, no. : 705-708.
The Biometric Systems are automatic tools, which are used to provide authentication during various applications of modern computing. Traditional methods of human recognition because of their limitations are being replaced by biometric applications. Fingerprint biometric system is one of the most widely used system while Hand geometry is comparatively less popular because of its few limitations. Multimodal biometric systems are developed to address few of the limitations of unibiometric systems and works on the principle of using more than one biometric trait for human recognition. In this paper, three conceptual designs for bimodal systems using two important modalities have been presented. A Template security analysis of all the designs is performed using Fuzzy based Analytic Hierarchy Process (FAHP) with five decision parameters. Result indicates that bimodal conceptual design-2 is optimal among all the three in terms of various decision parameters. Template may be well secured at feature level fusion of a multimodal biometric system and results into overall cost effective design. It is also noticed that template security before storage into database is an important parameter for effective and efficient design of a multimodal biometric system.
Arvind Selwal; Sunil Kumar Gupta; Surender. Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs. Procedia Computer Science 2016, 85, 899 -905.
AMA StyleArvind Selwal, Sunil Kumar Gupta, Surender. Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs. Procedia Computer Science. 2016; 85 ():899-905.
Chicago/Turabian StyleArvind Selwal; Sunil Kumar Gupta; Surender. 2016. "Fuzzy Analytic Hierarchy Process based Template Data Analysis of Multimodal Biometric Conceptual Designs." Procedia Computer Science 85, no. : 899-905.
Biometrics is the science of human recognition by means of their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at a very sophisticated level. A biometric system deals with raw...
Arvind Selwal; Sunil Gupta; Surender Kumar. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM. Advances in Science and Technology Research Journal 2016, 10, 23 -30.
AMA StyleArvind Selwal, Sunil Gupta, Surender Kumar. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM. Advances in Science and Technology Research Journal. 2016; 10 (31):23-30.
Chicago/Turabian StyleArvind Selwal; Sunil Gupta; Surender Kumar. 2016. "A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM." Advances in Science and Technology Research Journal 10, no. 31: 23-30.