Gaurav Kumar Tak
Lovely Professional University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gaurav Kumar Tak.
International Journal of Computer Applications | 2015
Pooja Chahal; Gaurav Kumar Tak; Anurag Singh Tomar
Mobile Ad hoc Networks (MANET) is a part of wireless networks. No wires and fixed routers are used in this type of network. It is not everlasting network; it is the short term network. Nodes has the capability to self organize themselves and it follows infrastructure less architecture. Network is formed by number of nodes moving in an inconsistent manner. They do not form any topology. Few examples of Ad hoc wireless network devices are Laptops, palmtops, smart phones etc [6]. And every nodes further acts as routers which transfers packet from one node to another node. Security is one of the main issues in Mobile Ad hoc Network. From last few years security problems in MANETs are gaining much attention. As there are many security vulnerabilities in MANET and which is the reason that it is not safe from attacks. There are many types of MANET like VANET (Vehicular Ad hoc Network), SPANs (Smart Phone Ad hoc Networks), iMANET (Internet based Mobile Ad hoc Network), Tactical MANET. The aim of this paper is to discuss about different types of attacks in Ad hoc network and some of the techniques by which these attacks can be protected.
International Journal of Computer Applications | 2015
Pooja Chahal; Gaurav Kumar Tak
ad hoc network is part of wireless networks which is formed by collection of two or more nodes moving in an arbitrary manner. The nodes are self organizing, adaptive, infrastructure less and has dynamic topology. Hence due to high mobility and multipath propagation network is vulnerable to attacks. There are many types of MANET like VANET (Vehicular Ad hoc Network), SPANs (Smart Phone Ad hoc Networks), iMANET (Internet based Mobile Ad hoc Network), Tactical MANET. There are various attacks that can be possible on MANET like Denial of Service attack, Black hole attack, Wormhole attack, Sybil attack etc which can disturb the communication between the nodes. So todays requirement is to provide secure and authentic communication in MANET. For small network security is not a big issue but for large or complex network security should be provided in large extent. To provide security for complex networks in the network using a technique Seniority Based Pretty Good Privacy (SBPGP) is used. KeywordsBlack hole attack, DOS, MANET, Network Security, SBPGP.
ACITY (1) | 2012
Gaurav Kumar Tak; Gaurav Ojha
E-mail plays a very important role in modern day communication. It is helpful for personal as well as business correspondences between people, or organizations. The major features of E-mail, which make it a convenient mode of communication, are its speed, efficiency, storage options and search facilities. Due to the high popularity of E-mails, it forms the preferred medium for a large number of web attacks. Spammers usually send spams and phishers send phishing URLs via E-mail. Of the large number of techniques that have already been proposed for the detection of several types of such attacks, quite a few of them provide good results but with higher false positives. In this paper, we are proposing a novel technique, which not only identifies spam but also scam mails, phishing, advertisements, etc. This technique utilizes some intelligence on the part of users, apart from keywords parsing, knowledge base, and token separation methods to detect various E-mail attacks. Implementation of the proposed methodology can help protect E-mail users from a wide range of unwanted E-mails, with increased efficiency and highly reduced number of false positives.
Procedia Computer Science | 2015
Shashi Kant Shankar; Anurag Singh Tomar; Gaurav Kumar Tak
2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom) | 2014
Anurag Singh Tomar; Gaurav Kumar Tak; Ruchi Chaudhary
International Journal of Network Security & Its Applications | 2013
Gaurav Kumar Tak; Gaurav Ojha
Archive | 2014
Anurag Singh Tomar; Gaurav Kumar Tak; Manmohan Sharma
International Journal of Innovative Research in Computer and Communication Engineering | 2014
Gaurav Kumar Tak; Anurag Singh Tomar
IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012) | 2012
Gaurav Kumar Tak; Gaurav Ojha
Archive | 2014
Anurag Singh Tomar; Gaurav Kumar Tak