Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nitin Pandey is active.

Publication


Featured researches published by Nitin Pandey.


2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) | 2016

Carrier data security using public key steganography in ZigBee

Iqra Hussain; Nitin Pandey

The present time has witnessed a tremendous increase in communications over wireless personal area networks. These communications even include credentials or other sensitive information that in any case need to be protected and not to be read by any third party. So the security of such communications has become a concern and should be emphasized accordingly. A secure communication needs to be communicated in a way thats not susceptible to any sort of eavesdropping or interception. The secure communication defends against the unofficial and the unauthorized interceptors from accessing the communications but still delivering the desired content to the intended communicating parties. Security breaches or the interceptors cannot be totally blocked but such procedures should be taken in account that even if an attack or any sort of an intrusion occurs, the parties involved in the communication must be intimated that there has been some sort of an unwanted interference in the communication taking place. This paper presents a proposition for securing the carrier data by means of Public Key Steganography in the wireless personal area network protocol ZigBee. The proposition doles out with dispensing a secret message to the communicating parties in case of an attack or any attempt compromising the security of data.


international conference on computational intelligence and computing research | 2016

A heuristic light weight security algorithm for resource constrained DTN routing

Vandana Juyal; Nitin Pandey; Ravish Saggar

Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to implement in real world application. It is a constant endeavor of any network community to look for security and privacy inclusions in routing protocols. This paper proposes a Light Weight Security algorithm that forwards messages only to the trusted nodes, thus prevents the malicious or selfish nodes from affecting the entire DTN communication. In this paper, the trust value is computed based on their one to one association of mobile nodes in a DTN. Researchers have contributed by proposing a novel solution for detecting hostile mobile nodes. The computed trust value is further used to prevent malicious nodes to compromise the network. The proposed algorithm is simulated and its performance is analyzed with existing based on the performance metrics like overhead ratio, relayed, removed, delivery ratio and hop count. DTN is still evolving and to the best of our knowledge; the proposed work is first of its kind.


international conference on communication and signal processing | 2016

A neural network model for electric submersible pump surveillance

Rajesh Sharma; Nitin Pandey

The purpose of the study is to make an assessment of the capability of Artificial Neural Network in surveillance of Electric Submersible Pumps, used for lifting oil from mature wells when the natural pressure inside the well is not enough to support the oil flow up to the surface. Electric Submersible Pumps are one of the various processes used to artificially lift oil out of wells when there is insufficient reservoir pressure to keep the well producing. In this paper we will be proposing an Artificial Neural Network model to predict common ESP failures before they occur by identifying the conditions and parameters which may lead to ESP failures. In our approach we will be using the real-time data collected over a period of operation of Electric Submersible Pumps run life containing the information from surface and downhole data which led to ESP failures or trends which may lead to ESP failures. The selected data values from both surface and downhole data values will act as input to the ANN and output of the ANN would be if the input conditions may lead to ESP failure or not. The neural network will be trained to classify the trends or conditions which may lead to ESP failures.


Archive | 2019

Security in ZigBee Using Steganography for IoT Communications

Iqra Hussain; Mukesh Chandra Negi; Nitin Pandey

ZigBee is an IEEE 802.15.4-sourced arrangement for a suite of high-level communication protocols employed to generate personal area networks. ZigBee is a less price, low-complex and low power consumption wireless personal area network (WPAN) norm that targets at the extensive developments of instruments and devices with prolonged battery life that are employed in wireless controls or applications that are used for monitoring purposes. It has an extensive utilization in industries and operations that are conducted physically. Hence, ZigBee is mostly correlated with IoT and M2M. Therefore, security in these WPANs becomes a major interest and has gained a good amount of notice currently. The security methods used in these networks over a period of time usually include practices that are cryptographic in nature. Then again these practices recommended till date can have good scopes of improvements, as a result, to turn up with additional assured and protected data communication. The chapter proposes a technique to enhance security in ZigBee using steganography over the secret data being communicated between communicating parties. However in cryptographic practices, the message even if it stands strongly resilient, can stimulate doubts and, therefore, could be adequate enough for a third party, spying the systems that something that are of significant use have been exposed. Hence, to keep the security features consistent in these networks this chapter proposes a technique to protect data by means of Steganography over the data to be communicated, this allows two communicating parties to transmit covert communication through a shared route in a way with the purpose, no adversary can even discover as in the covert communication is being transferred. Hence, making use of cryptographic practices helps protecting the insides of the messages only, on the other hand using steganographic practices can help in protecting the message contents and even the fact that a covert message has been transferred. The exclusive plan is to come up with a practice that is Steganographic in nature and ultimately has a resistance to any sort of steganalysis.


Archive | 2019

Analysis and Countermeasures for Security and Privacy Issues in Cloud Computing

Abdul Raoof Wani; Q. P. Rana; Nitin Pandey

Cloud computing is having the capacity to dispose off the prerequisites for setting up high-cost computing framework and promises to provide the flexible architecture which is accessible from anywhere. The data in the cloud computing resides over an arrangement of network resources which enables position of the requirements for setting up costly data centers framework and information to be acquired to via virtual machines, and these serves might be arranged in any piece of the world. The cloud computing environment is adopted by a large number of organizations so the rapid transition toward the clouds has fueled concerns about security perspective. There are numbers of risks and challenges that have emerged due to use of cloud computing. The aim of this paper is to identify security issues in cloud computing which will be helpful to both cloud service providers and users to resolve those issues. As a result, this paper will access cloud security by recognizing security requirements and attempt to present the feasible solution that can reduce these potential threats.


Archive | 2019

Performance Evaluation and Analysis of Advanced Symmetric Key Cryptographic Algorithms for Cloud Computing Security

Abdul Raoof Wani; Q. P. Rana; Nitin Pandey

Cloud computing environment is adopted by a large number of organizations, so the rapid transition toward the cloud has fueled concerns on security perspective. Encryption algorithms play the main role in solving such kind of problems in the cloud computing environment. The problem with these encryption algorithms is that they consume a substantial amount of CPU time, memory, and other resources. This paper provides the performance comparison of seven popular symmetric algorithms: AES, DES, 3DES, Blowfish, RC4, IDEA, and TEA. This comparison is done on the basis of encryption time, decryption time, memory usage, flexibility, security, and scalability. The results achieved can be used in cloud-based application and services for the efficient working of cloud computing environment.


Archive | 2018

Preservation of QoS and Energy Consumption-Based Performance Metrics Routing Protocols in Wireless Sensor Networks

Ram Bhushan Agnihotri; Nitin Pandey; Shekhar Verma

The selection of routing protocols is playing a major role in the device and proper utilization of wireless sensor networks (WSNs) that can help to provide better interconnection networks. On preserving the role of key performance, metric related to routing protocols is also an important and challenging task in the WSNs. Therefore, the sensor nodes life can be improved in efficient manner by using routing protocols that preserve the energy consumption and quality of service (QoS). Three different kinds of categories are used in the design of routing protocols which are data centric, hierarchical, and location-based approaches. Energy consumption can be improved by reducing the effect of redundancy level and transferring the passive motes sleep mode. The data transmission time also impacts on the energy conservation and QoS in WSNs. The surveillance and monitoring-related applications are the demanding research field in the WSNs that has to resolve the issue QoS routing in the manner of reliable data delivery. Energy consumption and QoS constraints are two complementary factors in the routing protocol, but the time delay factor can be involved in such a manner to satisfy both the performance metrics in routing protocol in WSNs.


international conference on computer communication and informatics | 2017

Analysis of reliability based algorithm for cognitive networks

Natasha Saini; Nitin Pandey; Ajeet Pal Singh

Nowadays when everyone is busy using mobile devices. There are various risk involved in using mobile devices. Every communication these days are based on mobile devices. Reliability is the greatest factor. Based on reliability we have proposed reliability-based algorithm. The reliability algorithm is used to achieve the trust over the risk involved in various mobile devices. It ensures to achieve integrity, confidentiality, availability, non-repudiation and access services in cognitive networks.


international conference on computational intelligence and computing research | 2016

A formal approach to security techniques in cognitive networks

Natasha Saini; Nitin Pandey; Ajeet Pal Singh

Networking provides the main infrastructure for different recent applications. These applications are targets for various types of attacks. This research mainly focuses on evaluating the techniques used within cognitive system specifically CRN to ensure the security of the data as well as securing the communication. This will include the development of safety technologies in wireless communication in CRNs and also within wired exchanges in the core network. The study will also incorporate security mechanisms into cognitive network fundamentals as well as designing of monitoring framework (Spec Monitor) to monitor the system and detect malicious and abnormal behaviors. The research will evaluate security development techniques such as spectrum sensing in the cognitive network and non-parametric passive traffic monitoring in cognitive systems A detailed methodology is proposed to overcome the increasing complexity threats in Cognitive networks.


international conference on computational intelligence and computing research | 2016

Analyzing and developing security techniques for worms in cognitive networks

Natasha Saini; Nitin Pandey; Ajeet Pal Singh

Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has been proposed. It presents worms attacks. Latest network security technologies are investigated, the current situation and increasing demand for robust network security is analyzed. For security specialist it is vital to make difference any reproducing programs, which may not harm your system, and it closer forms. Worms is one of the most common propagation attacks over the internet. Worm to propagate it can use two methods: finding any vulnerable devices in the network and propagate using topological neighbors. Investigating the methods of worm propagation can provide a clearer vision on how worms propagate and how to defense and prevent such type of attacks. Last decade different mechanisms for detection and defensing have been proposed to deal with the worm attacks. A detailed methodology is proposed to overcome worm attack mechanisms. Based on which different attributes of information security have been analyzed which includes integrity, confidentiality, availability, authentication, non-repudiation and access control.

Collaboration


Dive into the Nitin Pandey's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ajeet Pal Singh

Raj Kumar Goel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ravish Saggar

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Monika Bhalla

Guru Gobind Singh Indraprastha University

View shared research outputs
Researchain Logo
Decentralizing Knowledge