Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ashwani Kush is active.

Publication


Featured researches published by Ashwani Kush.


international conference on information technology new generations | 2008

Stable and Energy Efficient Routing for Mobile Adhoc Networks

Vinay Rishiwal; Ashwani Kush; Shekhar Verma

Mobile ad hoc networking is a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Although lots of research has been done on supporting QoS in the Internet and other networks, but they are not suitable for mobile Ad hoc networks and still QoS support for such networks remains an open problem. In this paper, a new scheme has been proposed for achieving QoS in terms of packet delivery, multiple connections, better power management and stable routes. It offers quick adaptation to distributed processing, dynamic linking, low processing overhead and loop freedom at all times. The proposed scheme has been incorporated using AODV protocol and by extensive simulation the performance has been studied, and it is clearly shown that the proposed scheme performs very well for different network scenarios.


international conference on multimedia computing and systems | 2010

Energy efficient routing for MANET

Ashwani Kush; Sunil Taneja; Divya Sharma

A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes an analytical analysis of energy parameters, their usage and their evaluation in ad hoc networks. The scheme is incorporated with the AODV and DSR protocols and the performance has been studied through simulation.


global mobile congress | 2009

A hybrid stable routing protocol for mobile ad hoc networks

Ashwani Kush; Phalguni Gupta; C. Jinshong Hwang

A flat mobile ad hoc network has an inherent scalability limitation in terms of achievable network capacity. It is seen that when the network size increases, per node throughput of an ad hoc network rapidly decreases. This is due to the fact that in large scale networks, flat structure of networks results in long hop paths which are prone to breaks. The break is more of two reasons as break in route and power depletion. The long hop paths can be avoided by using backbone nodes concept working as mobile backbone network (BN). There are some specific backbone power capable nodes functionally more capable than ordinary nodes, and power concept can be used to provide stable routing. In this paper, a hybrid routing protocol for large scale networks with mobile backbone nodes and power factor has been proposed. Finally, the NS-2 network simulator has been used for the realistic simulation of the proposed protocol. The simulation results of the proposed routing protocol for networks of different sizes and mobility speeds show that proposed routing protocol performs better compared to other protocols.


International Journal of Computer Applications | 2011

A Secure and Power Efficient Routing Scheme for Ad Hoc Networks

Ashwani Kush; Divya Sharma; Sunil Taneja

A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Security and Power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols


International Journal of Computer Applications | 2012

Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol

Vijay Kumar; Ashwani Kush

A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, Non infrastructural environment and dynamic topology. In Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme named as worm_secure is intended to incorporate security aspect on existing protocols .This paper checks one of the common attack on MANET as wormhole and tries solving the situation. Scheme has been incorporated on AODV and results have been calculated using NS2.


global mobile congress | 2011

Making MANET Energy Efficient

C. Jinshong Hwang; Ashwani Kush; Sunil Taneja

A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes a scheme to improve existing on-demand routing protocols by introducing the power aware virtual node scheme in whole scenario. The scheme establishes the multi paths without transmitting any extra control message. It offers quick adaptation to distributed processing, dynamic linking, low processing and memory overhead and loop freedom at all times. This scheme uses the concept of Power awareness among route selection nodes. It is done by checking power status of each node in the topology which insures fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol and the performance has been studied through simulation.


Iete Technical Review | 2006

Backbone based Routing for Ad Hoc Mobile Networks

Ram Kumar; Ashwani Kush

A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes a scheme to improve existing on-demand routing protocols by introducing the concept of backbone based node scheme in ad hoc network scenarios. The scheme establishes the multiple paths without transmitting any extra control message. It offers quick adaptation to distributed processing, dynamic linking, low processing and memory overhead and loop freedom at all times. We have incorporated our scheme with the ad hoc On-Demand Distance Vector protocol and by extensive simulation the performance has been studied. It clearly shows that our scheme performs very well with respect to existing schemes.


grid computing | 2011

Evaluation of Normalized Routing Load for MANET

Sunil Taneja; Ashwani Kush

Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without any pre-existing network infra- structure. The stable routing over such a network is a very critical task as the wireless links are highly error prone and can go down frequently due to dy- namic network topology. In this paper, evaluation of prominent on-demand routing protocols i.e. DSR and AODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario and by analyzing normalized routing load with respect to pause time. Based on the performance evaluation, recommendations have been made about the significance of the protocol under various circumstances.


Proceedings of the International Conference on Advances in Computing and Artificial Intelligence | 2011

Secured routing over MANET with power management

Ashwani Kush; Sunil Taneja

Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes that communicate with each another without any fixed networking infrastructure. Since the nodes in this network are mobile, security and power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The adhoc environment is accessible to both legitimate network users and malicious attackers. The adhoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The simulation experiments have been carried over network simulator (version 2.34) and the results have been computed using packet delivery fraction and average end to end delay with respect to both speed and pause time. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols.


international association of computer science and information technology | 2009

Proposed Protocol for Secured Routing in Ad Hoc Networks

Ashwani Kush; C. Jinshong Hwang

A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. The Hashing approach has been adopted in the proposed scheme of this paper. This scheme can make most of the on demand protocols secure. The study will help in making protocols more robust against attacks and standardize parameters for security in routing protocols. The proposed scheme has been evaluated using NS2 and compared with existing scheme. The study will help in making protocol more robust against attacks and standardizing parameters for security in routing protocols.

Collaboration


Dive into the Ashwani Kush's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Phalguni Gupta

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

Ruchika

Kurukshetra University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vinay Rishiwal

M. J. P. Rohilkhand University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge