Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rahul Saha is active.

Publication


Featured researches published by Rahul Saha.


International Conference on Security Technology | 2011

CLAPTCHA- A Novel Captcha

Rahul Saha; G. Geetha; Gang-soo Lee

In this paper we have introduced a new form of captcha named CLAPTCHA. This Claptcha we believe can reform a new world of image and imagination based captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.


International journal of advanced science and technology | 2018

A Security Provisioned Blockchain Architecture for Multi-Purpose Health Information

Rahul Saha; Gulshan Kumar; Mritunjay Kumar Rai; Hye-Jin Kim

Blockchain is a distributed technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. Block chains are the new domain of research and has proved its strong existence in the field of Bitcoins [1, 2]. To use this emerging technology in other fields of network based computing sciences, we have chosen the field of medical data applications as these data needs to be privacy preserving and confidentiality along with its research value. Different medical researches use such data without any predefined framework based upon cloud applications. Several health clouds are also suggested so far. In this paper, we have tried to explore the possibility of the block chain in healthcare information and medical data which will have a transparency in the usage of medical information of the patients and their further analysis.


International Journal of Information Security and Privacy | 2018

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN

Gulshan Kumar; Rahul Saha; Mandeep Singh; Mritunjay Kumar Rai

Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruders activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation filtered and monitor traffic for highlight the intrusion in the network. Further attack sequence has been created and have shown the effects of attack sequence on scenario which have both honey pot and snoop agent with different network performance parameters like throughput, network load, queuing delay, retransmission attempt and packet. The simulation scenario shows the impact of attack on the network performance.


International Journal of Distributed Sensor Networks | 2018

An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks:

Gulshan Kumar; Mritunjay Kumar Rai; Rahul Saha; Hye-jin Kim

Localization is one of the key concepts in wireless sensor networks. Different techniques and measures to calculate the location of unknown nodes were introduced in recent past. But the issue of nodes’ mobility requires more attention. The algorithms introduced earlier to support mobility lack the utilization of the anchor nodes’ privileges. Therefore, in this article, an improved DV-Hop localization algorithm is introduced that supports the mobility of anchor nodes as well as unknown nodes. Coordination of anchor nodes creates a minimum connected dominating set that works as a backbone in the proposed algorithm. The focus of the research paper is to locate unknown nodes with the help of anchor nodes by utilizing the network resources efficiently. The simulated results in network simulator-2 and the statistical analysis of the data provide a clear impression that our novel algorithm improves the error rate and the time consumption.


Mobile Information Systems | 2017

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Gulshan Kumar; Mritunjay Kumar Rai; Hye-jin Kim; Rahul Saha

Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.


International Journal of Information Security Science | 2012

DSAB – A Hybrid Approach for Providing Security in MANET

Gulshan Kumar; Rahul Saha; Mritunjay Kumar Rai


Indian journal of science and technology | 2015

Improved Hybrid Scheduling Algorithm for Grid Infrastructure

Seema Kumari; Gulshan Kumar; Mritunjay Kumar Rai; Rahul Saha


international conference on future generation communication and networking | 2018

An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA

Supreeti Bal; Mritunjay Kumar Rai; Hye-Jin Kim; Rahul Saha


International Journal of Control and Automation | 2018

An Approach for Location Verification using Atomic Localization in Wireless Sensor Networks

Gulshan Kumar; Thirumalaraju Vamsi Krishna; Mritunjay Kumar Rai; Rahul Saha; Hye-Jin Kim


IEEE Access | 2018

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication

Gulshan Kumar; Rahul Saha; Mritunjay Kumar Rai; Tai-Hoon Kim

Collaboration


Dive into the Rahul Saha's collaboration.

Top Co-Authors

Avatar

Gulshan Kumar

Lovely Professional University

View shared research outputs
Top Co-Authors

Avatar

Mritunjay Kumar Rai

Lovely Professional University

View shared research outputs
Top Co-Authors

Avatar

G. Geetha

Lovely Professional University

View shared research outputs
Top Co-Authors

Avatar

Hye-jin Kim

Sungshin Women's University

View shared research outputs
Top Co-Authors

Avatar

Hye-Jin Kim

Jeju National University

View shared research outputs
Top Co-Authors

Avatar

Mandeep Singh

Lovely Professional University

View shared research outputs
Top Co-Authors

Avatar

Seema Kumari

Lovely Professional University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tai-Hoon Kim

Sungshin Women's University

View shared research outputs
Researchain Logo
Decentralizing Knowledge