Debdutta Barman Roy
Calcutta Institute of Engineering and Management
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Debdutta Barman Roy.
Security and Communication Networks | 2010
Debdutta Barman Roy; Rituparna Chaki; Nabendu Chaki
Mobile ad hoc networks (MANET) are highly vulnerable to attacks due to multiple factors including the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring. Besides slowing down the network, the traditional way of using firewalls and cryptography often fails to detect different types of attacks. The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. In this paper, we present a new, cluster based Black Hole Intrusion Detection System (BHIDS) for mobile, ad hoc networks. The features that are considered for BHIDS include mobility of nodes, variation in number of attacking nodes, packet delivery rate, density of the network, etc. The nodes in the network form a two-layered cluster. This helps splitting the processing and communication overhead between the cluster heads at Layer 1 and 2. The proposed IDS algorithm has been tested on a simulated network using the NS simulator. The performance graphs show marked improvement as far as packet dropping is concerned. Copyright
international conference on electronics computer technology | 2011
Manasi Sarkar; Debdutta Barman Roy
MANETs are highly vulnerable to attacks due to the open medium dynamically changing network topology, cooperative algorithm, lack of centralized monitoring and management point. The fact that security is a critical problem in implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is exhausting a node by consuming its battery power. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes may not cooperate correctly. In this paper an algorithm is proposed to prevent sleep deprivation attack. The proposed algorithm is based on clustering mechanism.
computer information systems and industrial management applications | 2011
Debdutta Barman Roy; Rituparna Chaki
A Mobile Ad Hoc Network (MANET) is a network built on ad hoc demand by some mobile wireless nodes geographically distributed over an area. There is no fixed infrastructure and also no centralized administration. The traditional security measures fail to provide the required security level in MANETs. Specialised detection schemes are to be employed for detecting the intruder attack in MANET. The intrusion detection systems based on mobile agents uses a set of mobile agents moving from one node to another node within a network. The distributed ID consists of multiple mobile agents which cooperate over a large network and communicate with each other. This as a whole reduces network bandwidth usage by moving data analysis computation to the location of the intrusion data & support heterogeneous platforms. In this paper, a mobile agent based IDS have been proposed to detect the black hole attack in MANET, with the aim of reducing computational complexity.
Archive | 2011
Debdutta Barman Roy; Rituparna Chaki
Mobile Adhoc Network (MANET) is highly vulnerable to malicious attacks due to infrastructure less network environment, be deficient in centralized authorization. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is selfishness. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes (i.e. selfish or malicious) may not cooperate correctly. There can be two types of selfish attacks –selfish node attack (saving own resources) and sleep deprivation (exhaust others’ resources. In this paper, we propose a new Mobile Agent Based Intrusion Detection System (IDS). The approach uses a set of Mobile Agent (MA) that can move from one node to another node within a network. This as a whole reduces network bandwidth consumption by moving the computation for data analysis to the location of the intrusion. Besides, it has been established that the proposed method also decreases the computation overhead in each node in the network.
International Journal of Computer Applications | 2012
Debdutta Barman Roy; Rituparna Chaki
inbuilt flexibility along with easy set-up and low main- tenance cost causes MANETs to be increasingly useful in catastrophe management, battlefield surveillance; etc. The infrastructure-less performance of MANET has made it more vulnerable to intrusion than ever before making the security of network all the more acute. As the previously used security systems fail to protect the MANET from insider attacks, the need for an Intrusion Detection System (IDS) becomes evi- dent. IDS based on Mobile Agents is long been used for se- curing the MANET. The prior works seem to suffer from computational overhead leading to performance. This paper proposes a mobile agent based IDS in order to reduce the overheads. The use of distributed ID consists of multiple mobile agents which assist over a large network and to make communication with each other, or with a central server that provide advanced network monitoring, incident analysis, and instant attack data. This as a whole reduces the network bandwidth usage by moving data analysis computation to the place of the intrusion data & sustains on the heterogeneous platforms.
ieee india conference | 2013
Debdutta Barman Roy; Rituparna Chaki
Mobile ad hoc networks are highly vulnerable to attacks due to infrastructure less environment. The features of MANETs are like open media, dynamic changes in topology, cooperative and collaborative algorithm and no centralized monitoring system. These features make the network more prone to malicious attack. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we present a new cluster based intrusion detection algorithm that takes care of black hole attacks in a MANET. This proposed algorithm is based on trustworthiness of the nodes in a network. The network is considered to be a layered structured. The nodes are member of a cluster. Each cluster has cluster head that takes care of all the members of its own cluster and communicates with cluster head at layer 2 whenever required. The cluster head at layer 2 communicate with all cluster head at layer 1. The selection of cluster head depends on three parameters battery power, mobility and trust value of a node in a cluster. Periodically the cluster head updation is done according to three parameters. We have implemented our algorithm using the NS simulator. The performance of the proposed Intrusion Detection System (IDS) has also been evaluated in the process. The performance graph shows marked improvement as far as packet dropping is concerned.
arXiv: Networking and Internet Architecture | 2010
Debdutta Barman Roy; Rituparna Chaki; Nabendu Chaki
International Journal of Wireless & Mobile Networks | 2011
Debdutta Barman Roy; Rituparna Chaki
Archive | 2014
Debdutta Barman Roy; Rituparna Chaki
Archive | 2014
Debdutta Barman Roy; Rituparna Chaki