Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Divya Upadhyay is active.

Publication


Featured researches published by Divya Upadhyay.


2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) | 2014

PeMo: Modifying application's permissions and preventing information stealing on smartphones

Ashmeet Kaur; Divya Upadhyay

Android OS protects user data and system resources with the help of permission based model which requires the android application developers to declare the resources to be used by their application well in advance. The system resources and the users data would not be accessible to the developer unless the user grants the acceptance to the permissions being asked by the developer. In order to install the application on the mobile, the user has to allow access to all the requested permissions. There is no method of granting some permission to the application and denying rest of the others. Such a case leads to accepting the permissions like reading messages or accessing contacts etc. and puts the users data on stake. In this paper we present a permission enforcement framework for android called PeMo, which will allow the user to selectively grant permissions to application according to the need of the application, as there are many applications on the Play Store those are asking for some permissions which are not required for their working. We will also show how these constraints can be set by the user through an easy to use interface. Our permission enforcement framework is implemented and tested on Android OS and is compatible with the current security mechanism. The permission enforcement framework would help user to protect their private data from being misuse.


Archive | 2016

An Energy Efficient Proposed Framework for Time Synchronization Problem of Wireless Sensor Network

Divya Upadhyay; P. Banerjee

Now a day’s Wireless Sensor Network are used in various applications where full or partial time synchronization plays a vital role. Basic aim of Time synchronization is to achieve equalization of local time between all the nodes within the network. This paper proposes a new framework for time synchronization problem of wireless sensor network. Time synchronization protocols are very popular and widely used in WSN now days. An analysis has been performed utilizing the proposed frame work, which leads to a conclusion that it consumes less energy than the traditional time synchronization protocols: Reference Broadcast Time Synchronization and Time-Sync Protocol for Sensor Network. It has been observed that the proposed frame work do not require a Global Positioning System or any other external system to coordinate with time, as a typical Network Time Protocol for wireless sensor system uses. The proposed time synchronization protocol is categorized as peer to peer, clock-correcting sender- receiver network-wide synchronization protocol depending upon the characteristics of WSN. The maximum probability theory is used in order to analyze the clock offset. It was observed that resynchronization interval is required to achieve a specific level of synchronization correctness. Results are obtained by simulating the WSN on NS2 to demonstrate the energy efficient feature of the proposed protocol.


international conference on computational intelligence and communication networks | 2014

A Scheme for Detecting Intrusions and Minimising Data Loss in Virtual Networks

Rutba Maqsood; Naila Shahabuddin; Divya Upadhyay

Cloud computing is an enticing field nowadays due to its cost effective nature, easy accessibility, the pay per use service and shared resources. These shared resources, easy accessibility and shared storage of resources are responsible for putting the confidential information under a great deal of risk. Although the cloud is becoming gigantic day by day but its efficiency is being hampered considerably due to the threats in the cloud computing environment. The threats in the cloud computing environment not only account to external attacks which are launched with the intention of hampering work flow of the cloud provider but the internal attacks also which are being launched so that the efficiency and the reliability of the cloud is at stake. The firewalls monitor traffic between networks such that all the traffic must flow through it, but they are certainly not sufficient to shield the dynamic cloud computing environment from all attacks. They may be able to subvert external attacks to a certain extent but internal attacks do not even pass through the firewalls, therefore rendering them useless. Moreover, attackers exploit vulnerabilities in the virtual machines in order to set up large scale attacks like Ddos. They compromise these VMs into zombies and the detection of these VMs is very difficult because cloud users install all types of applications onto their VMs some of which may be malicious. Thus, the cloud needs stronger security for handling all the intrusions of every scale. An intrusion detection system is presented in the paper which detects the intrusions launched on the VMs which act an avenue for deploying large scale attacks, therefore, minimising the loss. The IDS presented in the paper is a network IDS and provides security from the IaaS based attacks.


International Journal of Systems Assurance Engineering and Management | 2018

Time synchronization problem of wireless sensor network using maximum probability theory

Divya Upadhyay; Ashwani Kumar Dubey; P. Santhi Thilagam

Synchronizing time between the sensors of wireless sensor network has vital importance. It helps in maintaining a consistent and reliable frame of time across the network. Two clocks are stated to be synchronized when their frequency source runs with equal rate and their offsets are set identical. Basically, due to the manufacturing difference there is slight variation in their clock oscillator which affects the degree of frequency source and accuracy. Therefore this leads to the problem of synchronizing time between the sensor clocks. To attain time synchronization in a network typical contention-based message passing techniques are used. In this paper two-way message passing scheme is utilized. It proposes a statistical tool based on the maximum probability theory for selecting the reference clock offset for time synchronization protocols. It also proposes a subset selection algorithm to support the proposed statistical tool. The results obtained consist of the selection of most probable estimate for clock offset. The proposed algorithm utilizes the two-way message passing scheme for the exchange of timing messages within the network. The proposed algorithm is compared with the existing algorithms for estimation of clock offset. It was observed that the proposed works gives better results in terms of efficiency i.e. 99.8% efficient.


international conference on next generation computing technologies | 2015

Performance examination of Wireless Switching Robot for optimal application for home automation

Neha Singh; Divya Upadhyay

Wireless Switching Robot is a solution for transmitting and receiving signals wirelessly using Radio-Frequency module. It have been seen earlier that these technique reduces the processing loads. The main focus of this paper is to analyze efficiency and performance of wireless small scale switching system which can be utilized for daily household activities. A small switching system is implemented using Arduino board along with Radio-Frequency module, Dual Tone Multiple Frequency key tone generator. These components are for transmitting and receiving signals and for giving input to the transmitter side for transmitting data respectively. The performance of the system is analyzed using VIRtronics. It was observed that memory required was very less just approx. 30KB and response time is very fast with minimum delay. These devices provide good efficiency for small scale application like garage door opening etc. Therefore, these robots are good to use for a small range approx. 100meters.


Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference - | 2014

Secured data transmission in energy efficient mobile adhoc network

Nitika Kaushik; Divya Upadhyay

Hotspot is a new technology which recently becomes popular as more and more people are using smart phones now days. We can easily connect two or more devices via hotspot and create a new network and provide data transmission between them. We can also provide internet to other devices via hotspot. Hotspots can be easily accessed by common people as they are available in many public areas such as Mc Dee, Cafe Coffee Day, Dominos, Pizza hut, Airports, Shopping Malls etc. So, to overcome the problems of Manet in which we used Bluetooth for data transmission, we propose a new QoS based work in which we will going to perform secured data transmission in Energy Efficient hotspot based adhoc network.


2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) | 2014

Implementing dynamic certificates for securing database

Kiran Gautam; Divya Upadhyay

With every passing day, huge number of information is exchanged, gathered over the electronics mean. This needs to aware users about their database security and how to handle it. Though, this is a more complex process for large organizations having massive amount of data in the warehouses, legacy systems, flat files, etc. This paper has proposed new method of protecting database using dynamic certificates for each query sent to the database. This dynamically generated encrypted query is more secure than the original query. Also, we have developed a very own Database Management System to test our security mechanism.


publisher | None

title

author


international conference on signal processing | 2018

Optimized Time Synchronization Algorithm Inspired By Nature

Nishtha Joshi; Nagma Arora; Divya Upadhyay; Ashwani Kumar Dubey


Recent Patents on Engineering | 2018

A Statistical Tool for Time Synchronization Problem in WSN

Divya Upadhyay; Ashwani Kumar Dubey; P. Santhi Thilagam

Collaboration


Dive into the Divya Upadhyay's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge