Prasenjit Choudhury
National Institute of Technology, Durgapur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Prasenjit Choudhury.
international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011
Alokparna Bandyopadhyay; Satyanarayana Vuppala; Prasenjit Choudhury
Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.
international conference on industrial informatics | 2011
Prasenjit Choudhury; Anirban Sarkar; Narayan C. Debnath
Service Oriented architecture (SOA) on Mobile Ad hoc NETwork (MANET) promotes the effort to deploy the day to day business and other services over the ad hoc mobile environments. In this paper several research challenges have been summarized related to the service publishing, registration indexing, availability, discovery and composition on dynamic environment of MANET. Several general issues related to SOA which may affect the functionality of MANET, also have been raised. Moreover, various security issues related to service deployment in MANET have been discussed. The research issues have been categorized based on the related underlying architectures of MANET like, centralized, distributed and peer-to-peer (P2P).
international conference on information technology: new generations | 2010
G. Praveen Kumar; Arjun Kumar Murmu; Biswas Parajuli; Prasenjit Choudhury
The science of Cryptology dates back to Caesar’s time. A wide variety of techniques have been employed for encryption and decryption but cryptanalysis has simultaneously cracked these encryption techniques from time to time. The use of a multilingual approach in cryptography is not prevalent. In this paper we propose an algorithm that focuses on encryption of plain text over a range of languages supported by Unicode. Also, it will facilitate the localization of Cryptographic Software tools.
international conference on industrial informatics | 2012
Prasenjit Choudhury; Subrata Nandi; Anita Pal; Narayan C. Debnath
An ad hoc network is an infrastructure-less, decentralized network, consisting of a group of mobile wireless nodes, moving around freely and cooperating with each other in routing and forwarding of packets. Due to the lack of any clear line of defense, MANET is accessible to both legitimate users and malicious attackers. Among various types of attacks, it is particularly vulnerable to various denial of service (DoS) attacks. Route request flooding attack is one such distributed DoS attack, launched by compromised nodes or intruders. This triggers an acute need of flooding attack prevention mechanisms for this highly vulnerable type of network. In this paper, a reputation based scheme is proposed to resist the impact of flooding attack in MANET. This scheme observes the behavior of a node in the network periodically and limits its route request sending rate accordingly.
international conference business and information | 2014
Srabasti Mukherjee; Saurabh Pal; Prasenjit Choudhury; Subrata Nandi
The increased popularity of the smart devices among student community has increased the teacher learner communication and taken learning beyond classroom now. The Mobile based Learning (m-learning) gives learner the flexibility of learning and enables a collaborative learning environment. Involvement, cooperation, team work are the crucial benefits that a student can obtain from the collaborative learning environment. Because of the dynamic nature of m-learning environment, a dynamic self created network or Mobile Ad hoc Network (MANET) would be best suited to establish the collaborative learning environment. Use of MANET in itself raises various issues. For the educational collaboration mobile nodes may frequently exchange data, text, images, transmit audio, video streaming packets to one another or even exchange information from databases thereby causing heavy network traffic. Another important issue to be considered are the malicious attacks-the mobile learning collaborative environment may have to face in absence of centralized authorities and granting access to both legitimate users and attackers. This unconditional trust may not only cause attack on single node, but also on numerous others. Keeping the reputation of participating nodes and to mitigate the attacks against them in the collaborative learning environment has become a challenging issue. This paper will try to jot down these challenges of establishing a Collaborative Learning Environment using the MANET.
international conference on industrial informatics | 2012
Prasenjit Choudhury; Prasenjit Dutta; Subrata Nandi; Narayan C. Debnath
With the rapid proliferation of network enabled hand devices Mobile Ad hoc network (MANET) is gaining tremendous popularity among the research community. Wirelessly connected mobile nodes are capable of providing a wide range of services such as GPS position indicator, nearest car parking information, word processing, internet connectivity etc. to other nodes in their vicinity. Service composition is a technique by which new services can be created by combining atomic services. The challenges of service composition mechanism have been addressed for wired infrastructure networks and internets. In this paper we address different issues of service composition considering node mobility, link failure and delay for MANET specifically architecture for dynamic service composition using distributed broker where QoS is ensured by energy and mobility prediction.
international test conference | 2010
G. Praveen Kumar; Biswas Parajuli; Arjun Kumar Murmu; Prasenjit Choudhury; Jaydeep Howlader
The Internet traffic is increasing day by day. Also, secure data communication is the need of the hour. But the standard compression techniques which are in use, are independent and do not consider the security issues. Hence, we present a general encoding technique for secure data communication over a language
Archive | 2017
Monalisa Mishra; Sushruta Mishra; Brojo Kishore Mishra; Prasenjit Choudhury
L
communication systems and networks | 2015
Partha Sarathi Paul; Vickey Kumar; Prasenjit Choudhury; Subrata Nandi
with a finite alphabet set
international conference business and information | 2014
Saurabh Pal; Prasenjit Choudhury; Srabasti Mukherjee; Subrata Nandi
\sum