Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rutvij H. Jhaveri.
International Journal of Computer Applications | 2014
Payal V. Parmar; Shraddha B. Padhar; Shafika N. Patel; Niyatee I. Bhatt; Rutvij H. Jhaveri
Homomorphic encryption is the encryption scheme which means the operations on the encrypted data. Homomorphic encryption can be applied in any system by using various public key algorithms. When the data is transferred to the public area, there are many encryption algorithms to secure the operations and the storage of the data. But to process data located on remote server and to preserve privacy, homomorphic encryption is useful that allows the operations on the cipher text, which can provide the same results after calculations as the working directly on the raw data. In this paper, the main focus is on public key cryptographic algorithms based on homomorphic encryption scheme for preserving security. The case study on various principles and properties of homomorphic encryption is given and then various homomorphic algorithms using asymmetric key systems such as RSA, ElGamal, Paillier algorithms as well as various homomorphic encryption schemes such as BrakerskiGentry-Vaikuntanathan (BGV), Enhanced homomorphic Cryptosystem (EHC), Algebra homomorphic encryption scheme based on updated ElGamal (AHEE), Non-interactive exponential homomorphic encryption scheme (NEHE) are investigated.
emerging trends science engineering and technology | 2012
Rutvij H. Jhaveri; Ashish D. Patel; Kruti J. Dangarwala
A Mobile Ad-hoc Network (MANET) is an independent and self-configurable network without any fixed infrastructure. Compared to traditional network, MANETs have unique characteristics such as wireless shared radio medium, limited communication range, highly dynamic topology, power constraints and lack of trusted centralized authority. When a node wishes to communicate with other node in the network, it invites all available nodes to participate in the routing mechanism; moreover, conventional routing protocols assume trusted co-operative environment. As a result, network layer of MANET is prone to various security attacks and therefore, finding a secure and efficient route becomes a major challenge. In this paper, we briefly introduce routing protocols, examine the behavior of various Denial-of-Service (DoS) attacks at the network layer of MANET and provide comprehensive survey of the existing defense approaches to these attacks.
international conference on electrical electronics signals communication and optimization | 2015
Kishan N. Patel; Rutvij H. Jhaveri
A Mobile Ad hoc Network can be said as a collection of mobile nodes, which builds a dynamic topology and a resource constrained network. Due to dynamic nature routing is challenging in MANET. In Mobile Ad hoc Networks different type of attack is possible. By manipulation in routing and attacks against data are reasoned by malicious nodes. MANETs are susceptible to various attacks from selfish nodes. To defeat those problems security is demanded for preventing node from various attacks. Metaheuristic techniques are used for addressing a problem found in ad hoc networks such as routing, security and optimization. A lot of research has been carried out for secure routing process with metaheuristic approaches. In this paper, we present survey of metaheuristic approach to improve routing process by enhancing the security and optimization among different nodes in mobile ad hoc networks. Keywords— Mobile Ad hoc networks; Metaheuristic; Metaheuristic algorithms;Security.
Archive | 2015
Rutvij H. Jhaveri
Mobile Ad hoc Network (MANET) is a form of short term based network that contains multidimensional nodes having major concern such as battery power resources. Energy is playing as consequential undertakings in MANET. Limited power of network causes many effects on the performance of the networks. Lack of energy factor may break the connection which can mess the network or routing process. Routing process requires efficient utilization of battery power or energy to maintain the network condition so that packet can be transferred without any obstacle in the performance. As well as, network life or life of node is proportional to battery life which is powered by limited capacity. The meaning of energy-efficient is not about consuming less energy but to increase the time duration to maintain the network performance level. Routing performances can differ depending upon the network parameters. In order to reduce the usage of energy and to increase the life span of battery, several others Ad hoc routing protocols are reviewed with their novel conceptions and optimization techniques over the main routing protocols.
International Journal of Computer Applications | 2013
Ashish Patel; Rutvij H. Jhaveri; Kruti J. Dangarwala
Wireless sensor networks (WSN) consist of tiny sensor nodes scattered on a relatively large geographical area. The nodes are cooperative in nature, that is, they can communication with one another or to a central control unit. The work of each such node is to collect the information from surrounding like pressure, temperature, humidity, magnetic fields, optical fields etc [2]. Actually they are ad hoc network with some additional constraints. The node should be capable enough for power consumption, collection of data, self healing, mobility, self configuration to name a few. These features of WSN node differentiate it from conventional ad hoc networks [14]. This survey paper aims at reporting wireless sensor network, its design, networking of nodes, and security in system. In this paper, fundamentals of wireless sensor network are discussed. Different component like sensor, microcontroller, battery require for sensor networks are explained in detail. We have tried to include all the aspects of WSN. The Protocols, Operating Systems, tools require for WSN node programming and some security issues are also discussed.
Archive | 2010
Rutvij H. Jhaveri; Ashish Patel; Jatin D. Parmar; Bhavin I. Shah
Procedia Computer Science | 2015
Kishan N. Patel; Rutvij H. Jhaveri
International Journal of Computer Applications | 2017
Aneri M. Desai; Rutvij H. Jhaveri
International Journal of Computer Applications | 2015
Rutvij H. Jhaveri
International Journal of Computer Applications | 2016
Sachi N. Shah; Rutvij H. Jhaveri