Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where K. Selvakumar is active.

Publication


Featured researches published by K. Selvakumar.


2013 International Conference on Emerging Trends in VLSI, Embedded System, Nano Electronics and Telecommunication System (ICEVENT) | 2013

Zone based multicast routing protocol for mobile ad-hoc network

K. Kavitha; K. Selvakumar; T. Nithya; S. Sathyabama

A Mobile Ad-hoc network (MANET) is composed of mobile nodes without using infrastructure. There are several virtual architectures used in the protocol without need of maintaining state information for more robust and scalable membership management. In this paper, we propose a Robust and Scalable Geographic Multicast protocol (RSGM). Both the control messages and data packets are forwarded along efficient tree-like paths, but there is no need to explicitly create and actively maintain a tree structure. To avoid periodic flooding of the source information throughout the network, a well-organized source tracking mechanism is designed. We are analyzing the protocols RSGM, SPBM and ODMRP with the performance metrics such as packet delivery ratio, control overhead, average path length and average joining delay by varying moving speed, node density, group size and network ranges.


international conference on pattern recognition | 2013

Intrusion detection and defense mechanism for packet replication attack over MANET using swarm intelligence

G. Indirani; K. Selvakumar; V. Sivaaamasundari

Due to the nature of a MANET, it is much more vulnerable to attack than a wired network. As a result, an Intrusion Detection System (IDS) for MANETs is designed to detect anomalous behavior and misuse. Swarm intelligence is a relatively novel field. These algorithms, like their natural systems of inspiration, show the desirable properties of being adaptive, scalable, and robust. The objective of this project is to detect and perform defense mechanism for packet replication attack. A Packet replication problem reduced by the NS2 simulator for MANET, each data packet is replicated in the IP layer at its source. The number of replication times is determined by the number of route entries for the destination, each data packet is uniquely identified with the tree-id provided by NS2 and the redundant packets are discarded in the IP layer at the receiver. The Performance of the Intrusion Detection system is verified using the parameters like Throughput, Packet-Received, Packet-Delivery Ratio, End-to-End Latency, Bandwidth and Latency.


2016 IEEE International Conference on Advances in Computer Applications (ICACA) | 2016

Increasing throughput using MMF flow optimization in wireless mesh networks

K. Selvakumar; G. Revathy

Wireless networks progress into subsequent creation to afford quicker and superior services, a key in technology Wireless mesh networks have been emerged in recent times. A wireless mesh network comprised of radio nodes which a form of wireless ad hoc network. In wireless mesh network nodes are combination of mesh routers and mesh clients. Wireless mesh network shows potential wireless technology for abundant applications and hence throughput drop drastically as increase in number of nodes or hops. Hence we put forward a novel method to increase throughput using max and min fair flow optimization followed by centralized and distributed algorithms. Simulation results shows that using this approach number of hop by hop per packet transmission is reduced and so the throughput is increased by 40 percent.


International Journal of Computer Applications | 2013

Power Optimistic With Throughput Improved Adaptive CSMA MAC Protocol Design for Wireless Ad Hoc Network

R. Manikandan; K. Selvakumar

Power conservation and throughput management is a major issue in Mobile Ad Hoc Networks. In the design of wireless ad hoc networks, various techniques are applied to efficiently allocate the scarce resources available for the communication links and the power control and throughput management is not related to any particular layer in the layered design communication protocol design. But most of the power control and throughput management mechanisms are working in MAC layer. An adaptive CSMA medium access control (MAC) protocol is proposed to consider a spatial network model in which nodes are randomly distributed in space, and address the problem of interference, power control, and throughput improvement through CSMA MAC layer design. Power control and throughput improvement is a critical issue to implement Mobile Ad Hoc networks. The proposed method present a novel power control protocol, and improve the aggregate throughput of the network for its possible application in Mobile Ad Hoc networks. Keyword - Ad hoc networks, Poisson point process, MAC protocols, outage probability.


International Journal of Computer Applications | 2012

An Energy Efficient Routing in Mobile Adhoc Networks using Aggregate Interface Queue Length and Node Remaining Energy

R. Madhan Mohan; K. Selvakumar

in this paper we present an adaptive routing in adhoc networks using modified aodv and compared with aodv using the parameters aggregate interface queue length and node remaining energy. differently from exciting approaches , we made changes to the aodv routing protocol in such a way that only destination node can respond to a route request. this greatly reduces the control data packets sent in the network. we also evaluated the performance of modified aodv based on metrics like average end-to-end delay, throughput and energy consumption.


International Journal of Computer Applications | 2012

An Improved Analysis of MAC IEEE 802. 16 in Wireless Ad hoc Networks

R. Manikandan; K. Selvakumar

In Wireless Ad Hoc Networks, the delay performance in data transmission reduces the rate of transmission in Mac layer, which affects the throughput in network. By comparing with existing work and proposed Mac protocol IEEE 802.16, This study carries out a MAC analysis that is of particular focus on networks which is deployed to provide �� -coverage for real-time applications, to improve the Uplink and downlink Ratio in rated transmission. It is shown that introducing sensing for lower densities (i.e., in sparse networks) is not beneficial, while for higher densities (i.e., in dense networks), using an optimized sensing threshold provides significant gain. This simulate in ns2 with different topology to define the Mac issues.


Egyptian Informatics Journal | 2012

Power controlled routing in wireless ad hoc networks using cross layer approach

R. Madhanmohan; K. Selvakumar


International journal of engineering research and technology | 2014

An Efficient Load Balancing Techniques for Wireless Mesh Networks

C. Anbu Ananth; K. Selvakumar


Archive | 2015

Eaack- A Secure Intrusion Detection System for Manets

K. Selvakumar; G. Revathi; V. Senthil Murugan


Archive | 2015

Implementation of DSR Protocol using Different Optimization Techniques

K. Selvakumar; N. Vijayalakshmi; V. Senthil Murugan

Collaboration


Dive into the K. Selvakumar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge