Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where B. Sathish Babu is active.

Publication


Featured researches published by B. Sathish Babu.


International Journal of Network Security | 2009

A Dynamic Authentication Scheme for Mobile Transactions

B. Sathish Babu; Pallapa Venkataram

Most of the existing authentication schemes for mobile communication are static in nature, and principally dependent on strength of authenticating identifiers for users identity. The acceptance of all the transactions of a user under a single authentication level is vulnerable. We propose a novel transaction based authentication scheme (TBAS) for mobile communication using cognitive agents. The proposed approach provides range of authentication based on mobile transaction sensitivity, and users behaviors. The TBAS uses mobile agents to gather user behaviors, and static agents for detecting transaction sensitivity, user history analysis, and for choosing appropriate authentication actions. The method has been simulated using the agent factory framework for cognitive agents generation, and their communication. The performance analysis, and the simulation of the proposed system shows that, there is a considerable reduction in the security cost compared to regular session based authentication schemes. By combining transaction based authentication with behavior analysis the authentication attacks can be effectively identified.


Computer Communications | 2008

Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)

B. Sathish Babu; Pallapa Venkataram

Maintaining anonymity during authentication has become challenging research issue in the field of mobile security. The application level authentication schemes have seriously affected by the absence of effective mechanisms to protect the privacy of a client transactions. We propose a novel Cognitive Agents Based Authentication and Privacy Scheme (CABAPS) for mobile transactions, which integrates procedure of authentication with privacy protection. The authentication challenges and privacy measures are dynamically deployed by cognitive agents based on transaction sensitivity and users behaviors. The method has been successfully simulated using the Agent Factory framework for cognitive agents generation and communication.


international parallel and distributed processing symposium | 2007

Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach

B. Sathish Babu; Pallapa Venkataram

The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users information fraudulently. Most of the existing authentication systems for mobile communication principally depends on the strength of authenticating identifiers. Once the client who may be genuine or an attacker, successfully proves the possession of the identifiers the system accepts all the transactions of a session under single risk level, which is the most important point of vulnerability. We propose a novel transaction based authentication scheme(TBAS) for mobile communication using cognitive agents. The proposed approach intensifies the procedure of authentication by deploying authentication scheme based on the transaction sensitivity and clients transaction time behaviors. The TEAS provides effective authentication solution, by relieving the conventional authentication systems, from being dependent on only the strength of authentication identifiers. Additionally the transaction time behavior analysis by cognitive agents provides rational approach towards establishing the legitimacy or illegitimacy of the mobile client. The method has been simulated with different applications over in-house established wired and wireless networks. The agent factory framework is used for cognitive agents generation and communication. The simulation results are quite encouraging.


international performance computing and communications conference | 2007

A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce

Pallapa Venkataram; B. Sathish Babu; Mk Naveen; G. H. Samyama Gungal

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abases in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as activity-event-symptoms (AES) model for detecting fraud and intrusion attacks which appears daring payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs daring mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.


Security and Communication Networks | 2009

Random security scheme selection for mobile transactions

B. Sathish Babu; Pallapa Venkataram

Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.


International Journal of Information and Computer Security | 2008

An intelligent proactive security system for cyber centres using Cognitive Agents

Pallapa Venkataram; Jeremy Pitt; B. Sathish Babu; Ebrahim Mamdani

The computers at cyber centres are vulnerable. They can be used for various illegal activities. Only the system-level security solutions are not sufficient to prevent these activities completely. There is a need for an intelligent scheme which identifies culprits based on behaviours and actions. This paper proposes an intelligent and environment based proactive security system for cyber centres, using cognitive agents. The agents are used for belief generation, belief analysis and to execute suitable security actions and pro-actions. This method of controlling the cyber crime at usage level, will be the requisite step towards preventing Internet abuse.


International Journal of Ad Hoc, Sensor & Ubiquitous Computing | 2017

An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach

Seema B. Hegde; B. Sathish Babu; Pallapa Venkataram

In Manets Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.


International Journal of Network Security | 2013

Performance Analysis of Steiner Tree-based Decentralization Mechanism (STDM) for Privacy Protection in Wireless Sensor Networks

B. Sathish Babu; N Jayashree; Pallapa Venkataram


Archive | 2008

Performance Analysis of an Authentication Scheme for Personalized Mobile Multimedia applications: A Cognitive Agents based Approach

B. Sathish Babu; Pallapa Venkataram


Archive | 2014

Communication Protocol Engineering

Pallapa Venkataram; Sunilkumar S. Manvi; B. Sathish Babu

Collaboration


Dive into the B. Sathish Babu's collaboration.

Top Co-Authors

Avatar

Pallapa Venkataram

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

Mk Naveen

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

N Jayashree

Siddaganga Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Seema B. Hegde

Siddaganga Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeremy Pitt

Imperial College London

View shared research outputs
Researchain Logo
Decentralizing Knowledge