Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gauri Kalnoor is active.

Publication


Featured researches published by Gauri Kalnoor.


Archive | 2017

Agent-Based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed; Siddarama R. Patil

Secured transmission of data is the most challenging and critical issue in Wireless Sensor networks (WSN). QoS parameters such as energy efficiency, power consumption, end-to-end delay and so on plays an important role for system performance. Clustering approach is an effective way that can enhance system and network performance. In Clustered Wireless Sensor Network (CWSN), any type of attacks that are malicious and harmful to the network can occur and security of CWSN is affected. One of the major attack that may occur in CWSN is sinkhole attack that needs to be detected. An agent-based protocol is used to detect or prevent such type of attack. This can help improve the performance of the network that includes QoS parameters. An intrusion detection system (IDS) is configured using agent-based protocol to detect if an intrusion occurs.


international conference on circuit power and computing technologies | 2016

QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks

Gauri Kalnoor; Jayashree Agarkhed

Wireless Sensor networks (WSN) is basically comprised of sensors that are spatially distributed with self-ruling capability, which monitors physical or environmental conditions such as, pressure, temperature, motion, sound and so on. Sensors also passes all the related information throughout the network. As the number of nodes and size of the network increases, there will be rapid increase in internet traffic. In WSN, security is the major issue and needs to a system that can provide security. Intrusion detection system is the system which plays a vital role in security of a system. One of the major challenges of WSN is to provide consistent Quality of Service (QoS) such as reliability, congestion control, energy efficiency and end-to-end delay, by applying secured routing protocols along with detection of an intruder so that QoS of WSN does not get affected. In our research work, we have discussed different routing protocols that are QoS based, to improve overall performance of the network.


international conference on advances in electrical electronics information communication and bio informatics | 2016

Pattern matching intrusion detection technique for Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed

Wireless Sensor Network (WSN) is a network with large number of tiny sensor devices which are of low cost, and minimum consumption of power called as sensor nodes. These type of nodes have great sensing technology which are specifically designed for applications such as military, smart homes and other security related areas. Due its wireless nature, network can be deployed anywhere in the environment, which becomes more vulnerable for attackers to destroy the network. Most importantly, WSN should be protected from malicious activities to take place and thus security becomes a major issue. However, such security can be provided by applying mechanisms for both intrusion detection and prevention. In our study, pattern matching is one of the mechanism that can be used for security of WSN. We also discuss some of the preventive measures that can be considered for protecting the sensor network.


Archive | 2019

Intrusion Detection System Using Pattern Matching Techniques for Wireless Sensor Networks

Jayashree Agarkhed; Gauri Kalnoor; Siddarama R. Patil

Wireless sensor network (WSN) is one among the fast-emerging technologies which plays very important role in the research field and has become the integral part of the research. According to the standards of NIST (National Institute of Standards and Technology), “the WSN is a network with many sensors deployed in the environment or geographical area.” Sensor network is a system including actuators and sensors with some elements of computation. WSN contains the sensors nodes, which senses the physical quantities of the surroundings. Wireless sensor network became most famous in recent years for both military and civil jobs. The most challenging task for WSN is security which is unprotected in an open environment. Cryptographic technique is not much better that can protect a sensor network from external threats and attacks.


Archive | 2018

Biometric-Based System for Intrusion Detection and Prevention Mechanism for Energy Efficiency in Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed

Wireless sensor networks (WSNs) are a new and most recent technology which is used in many critical applications. WSN is a network which is deployable anywhere in the environment. Due to this nature of WSN, an unattended network is more probable for vulnerable and unavoidable attacks. WSN is comprised of huge different types of nodes which are distributed within the network. Some of the nodes have sensing technique for detecting unusual behaviour in the network. Detection and prevention mechanisms are used for securing the network, with the consideration of energy efficiency. Biometric-based system is most efficient way of detecting an intruder which is one of the major techniques of pattern matching. Since WSN is more probable vulnerable to various harmful security attacks as it has the nature of broadcasting the transmission data and has very low capacity of computation, an Intrusion detection system (IDS) is used to detect such mobile attackers or intruders. Intrusion prevention system (IPS) uses a mechanism which enables the reduction of consumption of energy in sensor nodes of WSN.


Archive | 2017

Artificial Intelligence-Based Technique for Intrusion Detection in Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed

Network with large number of sensor nodes distributed spatially is termed as Wireless Sensor Network (WSN). The tiny devices called as sensor nodes are cheap, consume less power, and the capabilities of computation is limited. The most challenging issue for WSN is protecting the network from misbehavior of intruders or adversaries. One of the major techniques used to prevent from any type of attack in the sensor network is artificial intelligence system (AIS). Intrusion Detection System (IDS) is considered to be the second line of defense, as sensor nodes are first defense line. WSNs are highly vulnerable to intrusions and different types of attacks. In most critical applications of WSN, the human intervention or some physical devices are not sufficient for protecting the network from strong adversaries and attacks. Thus, artificial intelligence techniques are used for intrusion detection and prevention of sensor networks.


international conference on applied and theoretical computing and communication technology | 2016

Performance of motes in Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed

The network of nodes with sensing technology and wireless capability is termed as Wireless Sensor Network (WSN). WSN has high potential to adapt to the changes of how we live. Its budding technology makes the motes communicate with each other efficiently. The sensor nodes in WSN are referred as motes and they form the main building blocks for creating a network. The motes need to work efficiently and thus we present performance metrics that includes power consumption, size, cost, memory management, mote sensitivity, and OS for motes configuration. Certain challenges and constraints are designed for each mote in terms of low cost, limited communicational capabilities and low energy requirements. Many applications of WSN use different types of motes such as TinyNode, IRIS and Sun SPOT which can improve the performance of the network.


international conference on robotics and automation | 2018

Intrusion Threats and Security Solutions in Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed


Procedia Computer Science | 2018

Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks

Gauri Kalnoor; Jayashree Agarkhed


soft computing | 2016

Management of Big Data for Improving Performance of Wireless Sensor Network Using a Structured Clustering Approach

Gauri Kalnoor; Jayashree Agarkhed

Collaboration


Dive into the Gauri Kalnoor's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge