Chetan Agrawal
Chicago, Rock Island and Pacific Railroad
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chetan Agrawal.
wireless and optical communications networks | 2013
Ayonija Pathre; Chetan Agrawal; Anurag Jain
Vehicular ad hoc network (VANET) has extensively used to enhance protection of the passengers and reduce occasion of traffic congestion. Consistent communication in vehicular ad-hoc networks is important to provide functional and reliable traffic safety and efficiency applications. Security is the major issue in the network due to the mobile nature of the vehicle. In this paper we proposed the novel traffic congestion detection and removal scheme against DDOS attack Here the attacker behavior is broadcast the huge numbers of false information packets in network i.e. the false information about the traffic. The number of nodes or vehicles that receives the false packet information are affected from attack are called Node. Now if the traffic is jammed or congestion occurring and their information goes to Roadside Unit (RSU) then RSU must be detected and excluded permanently from the network after applying proposed effective approach. Proposed scheme against DDOS attack aims to identify and exclude attackers from the network. In the presence of misbehaving in network the false information is transferred in the network by that the vehicles are deciding to do the routing according to false information. Proposed security scheme recovers control information and improves the performance of VANET in the presence of an attacker.
International Journal of Computer Applications | 2012
Zeenat Mahmood; Anurag Jain; Chetan Agrawal
In the present work, a block cipher is presented which deals with a dynamic symmetric key cryptographic method using substitution and transposition technique. In this work a dynamic secret key is generated using Linear Congruential Generator (LCG). The striking feature of the present work is creation of a new secret key for every pair of encryption and decryption operation, thus secret key is a dynamic key. After encryption and decryption operation the dynamic key is discarded. The proposed cryptography method is a process consisting of two rounds of encryption and two rounds of decryption. The key generation algorithm uses SHA-1 hashing scheme to produce key of size 196 bits. This key is used to encrypt plain text of variable size. Since this is a block cipher method authors divide the variable size plaintext into ‘n’ fixed size (49 bit) blocks. The notion of dynamic key has evolved from the concept of the one time pad. Different parts of dynamic secret key are used in different places in order to make it harder for cryptanalysis or attacks.
Archive | 2013
Shivendra dubey; Chetan Agrawal
Journal of Global Research in Computer Sciences | 2013
Ayonija Pathre; Chetan Agrawal; Anurag Jain
Advances in Vision Computing: An International Journal | 2016
Rahul kumar; Anurag Jain; Chetan Agrawal
arXiv: Networking and Internet Architecture | 2015
Sonal Shrivastava; Chetan Agrawal; Anurag Jain
International Journal of Wireless and Microwave Technologies | 2015
Sudhir Goswami; Chetan Agrawal; Anurag Jain
Archive | 2014
Sonal Shrivastava; Chetan Agrawal; Anurag Jain
Computer Engineering and Intelligent Systems | 2014
Shivendra dubey; Chetan Agrawal; Anurag Jain
International Journal of Computer Applications | 2013
Sanjay N. Gunjal; Manoj Lipton; Chetan Agrawal