Rahul Saha
Lovely Professional University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rahul Saha.
International Conference on Security Technology | 2011
Rahul Saha; G. Geetha; Gang-soo Lee
In this paper we have introduced a new form of captcha named CLAPTCHA. This Claptcha we believe can reform a new world of image and imagination based captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.
International journal of advanced science and technology | 2018
Rahul Saha; Gulshan Kumar; Mritunjay Kumar Rai; Hye-Jin Kim
Blockchain is a distributed technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. Block chains are the new domain of research and has proved its strong existence in the field of Bitcoins [1, 2]. To use this emerging technology in other fields of network based computing sciences, we have chosen the field of medical data applications as these data needs to be privacy preserving and confidentiality along with its research value. Different medical researches use such data without any predefined framework based upon cloud applications. Several health clouds are also suggested so far. In this paper, we have tried to explore the possibility of the block chain in healthcare information and medical data which will have a transparency in the usage of medical information of the patients and their further analysis.
International Journal of Information Security and Privacy | 2018
Gulshan Kumar; Rahul Saha; Mandeep Singh; Mritunjay Kumar Rai
Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruders activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation filtered and monitor traffic for highlight the intrusion in the network. Further attack sequence has been created and have shown the effects of attack sequence on scenario which have both honey pot and snoop agent with different network performance parameters like throughput, network load, queuing delay, retransmission attempt and packet. The simulation scenario shows the impact of attack on the network performance.
International Journal of Distributed Sensor Networks | 2018
Gulshan Kumar; Mritunjay Kumar Rai; Rahul Saha; Hye-jin Kim
Localization is one of the key concepts in wireless sensor networks. Different techniques and measures to calculate the location of unknown nodes were introduced in recent past. But the issue of nodes’ mobility requires more attention. The algorithms introduced earlier to support mobility lack the utilization of the anchor nodes’ privileges. Therefore, in this article, an improved DV-Hop localization algorithm is introduced that supports the mobility of anchor nodes as well as unknown nodes. Coordination of anchor nodes creates a minimum connected dominating set that works as a backbone in the proposed algorithm. The focus of the research paper is to locate unknown nodes with the help of anchor nodes by utilizing the network resources efficiently. The simulated results in network simulator-2 and the statistical analysis of the data provide a clear impression that our novel algorithm improves the error rate and the time consumption.
Mobile Information Systems | 2017
Gulshan Kumar; Mritunjay Kumar Rai; Hye-jin Kim; Rahul Saha
Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.
International Journal of Information Security Science | 2012
Gulshan Kumar; Rahul Saha; Mritunjay Kumar Rai
Indian journal of science and technology | 2015
Seema Kumari; Gulshan Kumar; Mritunjay Kumar Rai; Rahul Saha
international conference on future generation communication and networking | 2018
Supreeti Bal; Mritunjay Kumar Rai; Hye-Jin Kim; Rahul Saha
International Journal of Control and Automation | 2018
Gulshan Kumar; Thirumalaraju Vamsi Krishna; Mritunjay Kumar Rai; Rahul Saha; Hye-Jin Kim
IEEE Access | 2018
Gulshan Kumar; Rahul Saha; Mritunjay Kumar Rai; Tai-Hoon Kim