B. Sathish Babu
Indian Institute of Science
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by B. Sathish Babu.
International Journal of Network Security | 2009
B. Sathish Babu; Pallapa Venkataram
Most of the existing authentication schemes for mobile communication are static in nature, and principally dependent on strength of authenticating identifiers for users identity. The acceptance of all the transactions of a user under a single authentication level is vulnerable. We propose a novel transaction based authentication scheme (TBAS) for mobile communication using cognitive agents. The proposed approach provides range of authentication based on mobile transaction sensitivity, and users behaviors. The TBAS uses mobile agents to gather user behaviors, and static agents for detecting transaction sensitivity, user history analysis, and for choosing appropriate authentication actions. The method has been simulated using the agent factory framework for cognitive agents generation, and their communication. The performance analysis, and the simulation of the proposed system shows that, there is a considerable reduction in the security cost compared to regular session based authentication schemes. By combining transaction based authentication with behavior analysis the authentication attacks can be effectively identified.
Computer Communications | 2008
B. Sathish Babu; Pallapa Venkataram
Maintaining anonymity during authentication has become challenging research issue in the field of mobile security. The application level authentication schemes have seriously affected by the absence of effective mechanisms to protect the privacy of a client transactions. We propose a novel Cognitive Agents Based Authentication and Privacy Scheme (CABAPS) for mobile transactions, which integrates procedure of authentication with privacy protection. The authentication challenges and privacy measures are dynamically deployed by cognitive agents based on transaction sensitivity and users behaviors. The method has been successfully simulated using the Agent Factory framework for cognitive agents generation and communication.
international parallel and distributed processing symposium | 2007
B. Sathish Babu; Pallapa Venkataram
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users information fraudulently. Most of the existing authentication systems for mobile communication principally depends on the strength of authenticating identifiers. Once the client who may be genuine or an attacker, successfully proves the possession of the identifiers the system accepts all the transactions of a session under single risk level, which is the most important point of vulnerability. We propose a novel transaction based authentication scheme(TBAS) for mobile communication using cognitive agents. The proposed approach intensifies the procedure of authentication by deploying authentication scheme based on the transaction sensitivity and clients transaction time behaviors. The TEAS provides effective authentication solution, by relieving the conventional authentication systems, from being dependent on only the strength of authentication identifiers. Additionally the transaction time behavior analysis by cognitive agents provides rational approach towards establishing the legitimacy or illegitimacy of the mobile client. The method has been simulated with different applications over in-house established wired and wireless networks. The agent factory framework is used for cognitive agents generation and communication. The simulation results are quite encouraging.
international performance computing and communications conference | 2007
Pallapa Venkataram; B. Sathish Babu; Mk Naveen; G. H. Samyama Gungal
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abases in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as activity-event-symptoms (AES) model for detecting fraud and intrusion attacks which appears daring payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs daring mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Security and Communication Networks | 2009
B. Sathish Babu; Pallapa Venkataram
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
International Journal of Information and Computer Security | 2008
Pallapa Venkataram; Jeremy Pitt; B. Sathish Babu; Ebrahim Mamdani
The computers at cyber centres are vulnerable. They can be used for various illegal activities. Only the system-level security solutions are not sufficient to prevent these activities completely. There is a need for an intelligent scheme which identifies culprits based on behaviours and actions. This paper proposes an intelligent and environment based proactive security system for cyber centres, using cognitive agents. The agents are used for belief generation, belief analysis and to execute suitable security actions and pro-actions. This method of controlling the cyber crime at usage level, will be the requisite step towards preventing Internet abuse.
International Journal of Ad Hoc, Sensor & Ubiquitous Computing | 2017
Seema B. Hegde; B. Sathish Babu; Pallapa Venkataram
In Manets Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
International Journal of Network Security | 2013
B. Sathish Babu; N Jayashree; Pallapa Venkataram
Archive | 2008
B. Sathish Babu; Pallapa Venkataram
Archive | 2014
Pallapa Venkataram; Sunilkumar S. Manvi; B. Sathish Babu