N. Sreenath
Pondicherry Engineering College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by N. Sreenath.
international conference on communications | 2015
Amit Kumar Tyagi; N. Sreenath
With the rapid development of wireless and mobile technologies (LBS, Privacy of personal location information in location-based services of a vehicle ad-hoc network (VANET) users is becoming an increasingly important issue. LBSs provide enhanced functionalities, they open up new vulnerabilities that can be exploited to cause security and privacy breaches. During communication in LBSs, individuals (vehicle users) face privacy risks (for example location privacy, identity privacy, data privacy etc.) when providing personal location data to potentially untrusted LBSs. However, as vehicle users with mobile (or wireless) devices are highly autonomous and heterogeneous, it is challenging to design generic location privacy protection techniques with desired level of protection. Location privacy is an important issue in vehicular networks since knowledge of a vehicles location can result in leakage of sensitive information. This paper focuses and discussed on both potential location privacy threats and preserving mechanisms in LBSs over road networks. The proposed research in this paper carries significant intellectual merits and potential broader impacts i.e. a) investigate the impact of inferential attacks (for example inference attack, position co-relation attack, transition attack and timing attack etc.) in LBSs for vehicular ad-hoc networks (VANET) users, and proves the vulnerability of using long-term pseudonyms (or other approaches like silent period, random encryption period etc.) for camouflaging users real identities. b) An effective and extensible location privacy architecture based on the one approach like mix zone model with other approaches to protect location privacy are discussed. c) This paper addresses the location privacy preservation problems in details from a novel angle and provides a solid foundation for future research to protecting users location information.
International Journal of Computer Applications | 2015
Amit Kumar Tyagi; N. Sreenath
The fast advances of mobile devices and positioning technologies has led to the flourish of Location-Based Services (LBS), in that people want to enjoy wireless services everywhere like in hotels, colleges, etc. LBS, the branch of computer program level services used in various fields and support, the application are broadly classified as Maps and Navigation, Information service, Tracking service, Social networking, Games, Vehicular navigation and Advertising etc. Now a days, LBSs attract millions of mobile users for example include POI finders such as Qype, which help the users to find the next POI such as bars or cinemas, and enrich the provided information. But during this communication, Security and Privacy of personal location information (of LBSs users) is becoming an increasingly important issue for future. So concerning it (privacy) as an important issue, discusses several privacy preserving location issues for vehicular (mobile) users (since knowledge of a vehicle‟s location can result in leakage of sensitive information). Location privacy for mobile users is mainly determined into two levels such as internally by a device or externally by systems and kind of networks with which the device interrelates. Users wish to maintain the vehicle„s information is known only to those legally authorized to have access to them and remain unknown to anybody unauthorized. Hence the purpose and contribution of this paper is to discussed about various privacy and challenges issues in LBSs increasing in future that have not been published in the any research journal so far.
international conference on information communication and embedded systems | 2014
K. Geetha; N. Sreenath
This paper analyzes one type of denial of service attacks in Mobile Adhoc Networks called SYN flooding attack, and its impact on the quality of service parameters. Denial of service attacks generally take away the resources and the services of the node and deny further legitimate services. In SYN flooding attack, an attack node sends many TCP (Transmission Control Protocol) SYN requests with spoofed source addresses to a node. Each request makes the destination node to allocate its resources out of the availability. The destination sends the acknowledgement to the spoofed address and waits for the third message from the source, since TCP connection is established after a three way handshake. But, the source address is a spoofed address and it will not respond with an acknowledgement. In the mean time, the attacker sends a lot of SYN requests. All the victims resources are exhausted and hence further connection requests cannot be considered, denying the legitimate accesses. In this paper, it is assumed that the data sent from the source to destination is multimedia data with the communication between a client and server. This paper provides a detailed analysis on the SYN Flooding attack and analyzes the various parameters which are affected by the attack. The necessary condition for the identification of SYN flood attack, which is the ratio of the number of acknowledgements received from the client to the SYN acknowledgements sent from the server is checked. The protocols used are selective proactive and reactive routing protocols. This attack affects the quality of service parameters like packet delivery ratio, average end to end delay, throughput and jitter.
international conference on communications | 2014
Terrance Frederick Fernandez; K. Brabagaran; N. Sreenath
Optical Burst Switching, an efficient core networking architecture, suffers from various security vulnerabilities. This paper proposes the Burstification threat and summarizes other potential threats for optical nodes.
International Journal of Computer Applications Technology and Research | 2013
Terrance Frederick Fernandez; T. Megala; N. Sreenath
Optical Burst Switching architecture (OBS) is based on buffer-less WDM network that provides unbelievably huge bandwidth for communication. A brief review on OBS architecture along with its supporting protocols is studied here. This architecture suffers from various issues and these complications along with the future research directions are reviewed here.
emerging trends science engineering and technology | 2012
N. Sreenath; Terrance Frederick Fernandez; S. Ramachandiran
This paper deals with multicast routing overhead for TCP over Optical Burst Switched Networks. This scheme is based on specialized nodes in All-Optical Networks (AONs) called as Virtual Source (VS) nodes. It aims at exploiting the capabilities of these nodes in order to reduce number of failed requests, thus reducing number of Burst retransmissions required. The architecture is simulated and proved effective with experimental results.
2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) | 2016
Amit Kumar Tyagi; N. Sreenath
Cloud Computing, the long-held dream of computing as a utility has the potential to transform (run) every service on a single platform. Todays cloud computing has become the buzzword (i.e. pay as you go) in the computing world. As extension of cloud technology, vehicle used cloud services to exchange communications over road network. Vehicular Ad-hoc Networks (VANETs) were primarily designed to support the communication between totally different vehicles (V2V) and therefore the communication between vehicles and the margin infrastructures (V2I). Vehicle Cloud Computing (VCC) is a new field of research that aims to study vehicle agents (people, vehicles, robots etc.) as they interact and collaborate to sense the environment, process the data, propagate the results and more generally share resources to exchanges communication. They need not be concerned about over-provisioning for a service whose popularity does not meet their predictions, wasting costly resources, or under-provisioning for one that becomes wildly popular, missing potential customers and revenue. Trust is an essential concern for vehicle users during using cloud services. Vehicles used location based services (during users journey) to find the nearest location, point of interest etc. This paper aims to reduce that confusion by clarifying terms between vehicular network and vehicular cloud, and provides trusted services to vehicle users with opportunities of Cloud Computing.
international conference on information communication and embedded systems | 2013
N. Sreenath; Terrance Frederick Fernandez; T. Megala
The issue of multicast routing in TCP over Optical Burst Switched (OBS) networks was dealt before and here few parameters are presented to determine the efficiency of the OBS Virtual Source heuristic. Such QoS parameters include Burst Throughput (η), Burst Latency (τ) and Burst Loss Probability (φ). It is mathematically proved that using the Virtual Source (VS) heuristic for OBS Networks under TCP protocol, the throughput is increased while maintaining a minimum Burst Loss Probability and Latency.
emerging trends science engineering and technology | 2012
K. Ratna Pavani; N. Sreenath
In an all optical networks we made a study on two important variants of TCP like TCP-Reno and TCP-Vegas. In an OBS network the bursts are aggregated at the edge nodes and they travel cutting through all optical network. A data burst is preceded by a control packet with an offset time. There is an amount of hop-delay for the data burst between the core nodes in the OBS network. There is also a limit on the number of packets for each burst which we call as burst size. At the ingress node burstification takes place and packets are assembled into bursts which forms a maximum flow queue. In our simulation we have taken the hop delay, maximum flow queue and burst size as parameters and analyzed the performance of TCP-Reno and TCP-Vegas using NS-2 simulator.
Archive | 2015
Amit Kumar Tyagi; N. Sreenath