Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where E. Suresh Babu is active.

Publication


Featured researches published by E. Suresh Babu.


Archive | 2016

Efficient DNA-Based Cryptographic Mechanism to Defend and Detect Blackhole Attack in MANETs

E. Suresh Babu; C. Nagaraju; M. H. M. Krishna Prasad

This paper addresses a novel method to detect and defend against the blackhole attack and cooperative blackhole attack using hybrid DNA-based cryptography (HDC) mechanism. Moreover, the proposed method upsurge the security issue with the underlying AODV routing protocol. Eventually, this HDC is one of the high potential candidates for advanced wireless ad hoc networks, which require less communication bandwidth and memory in comparison with other cryptographic systems. The simulation results of this proposed method provide better security and network performances as compared to existing schemes.


Archive | 2016

A Proposal for Packet Drop Attacks in MANETS

Mahesh Swarna; Syed Umar; E. Suresh Babu

The packet drop attack is more familiar to protection risks in MANETS. These attackers implement loop-hole which bring with envious characteristics because the path finding procedure which is vital and unavoidable. Researchers and investigators have performed distinct recognition methods recommend various types of recognition schemes. AODV protocol which correctly appropriate redirecting method for the MANETS and it is more susceptible to dark gap strike by the envious nodes. A harmful node that wrongly delivers the RREP (route reply) that it has a newest path with lowest hop count to location and then it falls all the getting packets. In this paper we present four types of different protocols for detecting black whole attacks and discuss state of the art routing methods. We also perform different properties in collaborative packet drop attacks and analyze categories of propose protocols with specified features stored in wireless ad hoc networks. We analyze comparison of proposed protocol with existing protocols and their methods with respect to time and other features in wireless ad hoc networks.


international conference on computer and communication technology | 2015

A Secure Routing Protocol against Heterogeneous Attacks in Wireless Adhoc Networks

E. Suresh Babu; C. Nagaraju; Mhm Krishna Prasad

This paper presents designing an efficient security solution that can protect wireless adhoc networks from heterogeneous attacks. Over the last few years, researchers had addressed various attacks and its countermeasures against numerous adhoc routing protocols in an isolated fashion. In this paper, initially, we modelled heterogeneous attack to investigate the weaknesses of the existing AODV routing protocols of wireless ad hoc network that exploits the vulnerabilities of adhoc environments, which will harm the system and results in a vulnerability assessment. Thus, deployment of security in these routing protocols of wireless adhoc networks against heterogeneous attack is still in their infancy and unsolved. To address the security issue against these attacks, we proposed inspired biotic hybrid cryptographic (IBHC) mechanism to defend the heterogeneous attacks. IBHC is one of the prospective methodology for sophisticated wireless adhoc network that provides efficient storage, transmission and secure against heterogeneous attack.


Cybernetics and Information Technologies | 2018

Digital Image Steganography Using Bit Flipping

Aditya Kumar Sahu; Gandharba Swain; E. Suresh Babu

Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.


ACSS (1) | 2016

Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks

E. Suresh Babu; C. Nagaraju; M. H. M. Krishna Prasad

DNA cryptography is a new cryptographic paradigm from hastily growing biomolecular computation, as its computational power will determine next generation computing. As technology is growing much faster, data protection is getting more important and it is necessary to design the unbreakable encryption technology to protect the information. In this paper, we proposed a biotic DNA-based secret key cryptographic mechanism, seeing as DNA computing had made great strides in ultracompact information storage, vast parallelism, and exceptional energy efficiency. This Biotic Pseudo DNA cryptography method is based upon the genetic information on biological systems. This method makes use of splicing system to improve security and random multiple key sequence to increase the degree of diffusion and confusion, which makes resulting cipher texts difficult to decipher and makes to realize a perfect secrecy system. Moreover, we also modeled the DNA-assembled public key cryptography for effective storage of public key as well as double binded encryption scheme for a given message. The formal and experimental analysis not only shows that this method is powerful against brute force attack and chosen cipher text attacks, but also it is very efficient in storage, computation as well as transmission.


International journal of engineering and technology | 2018

A Novel Approach to Cyber Hazard Management Intelligence System

B Bala Bharathi; E. Suresh Babu

Detecting and defending against insider and outsider threats seems to be a major challenge for information security system. such that cyber-attacks pose a silent threat for a company with a havoc likely to be in billions, besides slaughtering investor confidence and denting brand image. Long-established and ongoing solutions target mainly to assimilate many known threats in the form of consistent information such as logical & physical address, etc. into detection and blocking techniques. Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems are identified using honeypot, through integration of logs for detecting network, host intrusions using SIEM technology which would efficiently manage the occurrence of threat by using cyber hazard management to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture.


Archive | 2017

Collaborative Attack Effect Against Table-Driven Routing Protocols for WANETs: A Performance Analysis

E. Suresh Babu; Satuluri Naganjaneyulu; P. S. V. Srinivasa Rao; M. Srinivas Rao

Recently, wireless networks are rapidly gaining importance and generating more interest in wireless communication, due to remarkable improvements in wireless devices such as low-cost laptops, palmtops, PDA, etc. Revolutionary development of these widespread wireless networks has resulted in a number of new applications such as vehicle-to-vehicle communication in remote areas. This paper attempts to comprehend the performance issue by evaluating of two proposed two table-driven (DSDV, OLSR) routing protocols with varying traffic and mobility condition in a realistic manner. Moreover. We modelled a collaborative attack against these two routing protocols that can obstruct the normal operations of the ad hoc networks. Precisely, our experiential result shows the comparative analysis of OLSR, DSDV under hostile environments with varying mobility and traffic scenario.


International Journal of Electrical and Computer Engineering | 2015

Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study

A. Peda Gopi; E. Suresh Babu; C. Naga Raju; S. Ashok Kumar


International Journal of Electrical and Computer Engineering | 2015

An Empirical Critique of On-Demand Routing Protocols against Rushing Attack in MANET

S. Ashok Kumar; E. Suresh Babu; C. Nagaraju; A. Peda Gopi


i-manager's Journal on Electronics Engineering | 2011

Local Binary Patterns with ENI features for Images classification and analysis

E. Suresh Babu; S. Salma; A. Reshma; C. Nagaraju

Collaboration


Dive into the E. Suresh Babu's collaboration.

Top Co-Authors

Avatar

C. Nagaraju

University College of Engineering

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. H. M. Krishna Prasad

Jawaharlal Nehru Technological University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge