Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sumanth Yenduri is active.

Publication


Featured researches published by Sumanth Yenduri.


static analysis symposium | 2010

First stage detection of compromised nodes in sensor networks

Wei Ding; Bireswar Laha; Sumanth Yenduri

The node capture attack in wireless sensor networks (WSNs) can be decomposed into three stages: physically capture of node, redeployment of compromised node, and rejoin the network for various insider attacks. A well accepted belief — that the physical capture is easy to implement and that its detection is difficult — has directed majority of research effort to defense in stages three and two. The belief was recently proved false [4]. The discovery made first stage detection an attractive tactic. This paper proposes a new approach to detect the attack at the first stage. The detection is based upon the discovery of missing and malfunction of nodes due to the physical capture. The approach is simple, reliable, energy-efficient, completely local, and completely distributed. It can be used along with other approaches at stages two and three. Hence it could be employed in wide range of applications. In simulation we compare our proposal to one of latest successful research in the area. [2] Simulation results have proved that our approach is more effective and more efficient for in detection of node capture attacks.


International Journal of Software Engineering and Knowledge Engineering | 2007

Performance Evaluation of Imputation Methods For Incomplete Datasets

Sumanth Yenduri; S. Sitharama Iyengar

In this study, we compare the performance of four different imputation strategies ranging from the commonly used Listwise Deletion to model based approaches such as the Maximum Likelihood on enhancing completeness in incomplete software project data sets. We evaluate the impact of each of these methods by implementing them on six different real-time software project data sets which are classified into different categories based on their inherent properties. The reliability of the constructed data sets using these techniques are further tested by building prediction models using stepwise regression. The experimental results are noted and the findings are finally discussed.


global communications conference | 2010

Distributed first stage detection for node capture

Wei Ding; Yingbing Yu; Sumanth Yenduri

The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster, easier to execute, and more reliable than existing approaches. Two implementations FSD and SEFSD are provided. FSD is completely decentralized. SEFSD utilizes the base station to achieve energy efficiency and better security. Simulation shows the scheme outperforms existing techniques while illustrating SEFSD outperforms FSD in terms of message and energy overhead.


international symposium on signal processing and information technology | 2014

Analyzing Intrusion Detection System: An ensemble based stacking approach

Sanjiban Sekhar Roy; P. Venkata Krishna; Sumanth Yenduri

Intrusion Detection System (IDS) is an application software which detects the presence of hostile or intrusive elements inside the system. As the nature and type of the intrusions are continuously changing, a simple IDS cannot completely tackle the security threat. In this paper, we have proposed an IDS model, which classifies different types of intrusion attacks based on Stacking classifier. Stacking is an ensemble based classifier. We have achieved good accuracy while classifying the KDD-Cup 99 dataset and that has been achieved with 10 fold cross validation.


international conference on information technology: new generations | 2014

Resilient Multi Sink Networks Using Simplistic Hop Based Routing

Sumanth Yenduri; Chabli Boler

In this paper, we demonstrate the use of a simplistic time based routing protocol called Simple Resilient Multi-hop Routing (SRMR) for a multi sink wireless sensor network (WSN). SRMR will allow the network to maximize efficiency by using a combination of performance metrics. For this simulation we will use the approximate distance measure based upon travel time of messages between sensor nodes. With multi sink architecture, we show efficient routing of data from the network to the closest sink based upon the selected metric. In doing so, we will be able to allow the network to become more resilient to network isolation, excess energy usage, and suboptimal throughput.


computer science and information engineering | 2009

Production Design by Simulation Software Witness A Case Study

Sarder; Sumanth Yenduri

Today’s customers demand high quality,customized goods and services, quickest delivery at low prices. This has made the design and management of systems more challenging. Companies can not afford to design their production system in a way that does not optimize the scarce resources. With the advancement of computer simulation software in the manufacturing domain, the production design is much easier. The key success of production design depends on the interpretation of simulation results. This paper illustrates the use of computer simulation to design the production of a manufacturing company that produces snow melting modules. The analysis presented here describes the production design process and compares the performance of new design with the existing system performances.


international conference on information technology new generations | 2006

An Agglomerative Clustering Methodology For Data Imputation

Sumanth Yenduri

The prediction of accurate effort estimates from software project data sets still remains to be a challenging problem. Major amounts of data are frequently found missing in these data sets that are utilized to build effort/cost/time prediction models. Current techniques used in the industry ignore all the missing data and provide estimates based on the remaining complete information. Thus, the very estimates are error prone. In this paper, we investigate the design and application of a hybrid methodology on six real-time software project data sets in order to better the prediction accuracies of the estimates. We perform useful experimental analyses and evaluate the impact of the methodology. Finally, we discuss the findings and elaborate the appropriateness of the methodology


international conference on information technology coding and computing | 2004

Digital analysis of thermal infrared imagery using temperature mapping

Cheruku Venkateswarlu; Sumanth Yenduri; S. Sitharama Iyengar

Land surface temperature mapping is one of the key parameters in the physics of land surface processes. The present study covers recovering of land surface temperature from space. The study includes the separation of emissivity and temperature by using different methods. It includes computation of radiant and kinetic temperatures of the land features from Landsat 5 TM thermal infrared (TIR) data. Temperature mapping is done with thermal infrared (TIR) daytime and nighttime data. The mapping is also done using spatially improved daytime and nighttime data. As a final note, the findings between the use of improved TIR data and raw TIR data are compared and discussed.


iet networks | 2017

An Intelligent Vertical Handoff Decision Strategy Based On Network Performance Prediction and Consumer Surplus Value for Next Generation Wireless Networks

Rajasekhara Babu Madda; Dhanaraj Cheelu; Chi-Yuan Chen; P. Venkata Krishna; Sumanth Yenduri

Vertical handoff (VHO) decision services play an essential role in the current wireless networks. Many algorithms designed aim at quality of service while granting seamless roaming amongst a number of heterogeneous access networks. In this study, the authors proposed an intelligent VHO decision strategy targeting to maximise user satisfaction without compromising on quality of service for non-real time mobile based services. The proposed strategy applies consumer surplus value (CSV)-based pricing scheme and also a prediction system to approximate network performances at various intervals. Finally, a fuzzy rule-based behavioral system is proposed to find optimal network by considering both CSV as well as network performance as stimulus parameters. Simulation is carried out using OM Net++ and MATLAB, and the results are acknowledged with discussion and analysis.


International Journal of Applied Research on Information Technology and Computing | 2014

Rerouting Transit Traffic for Effective Monitoring

Hareesh Kesa; Sumanth Yenduri

Traditionally, transit traffic monitoring is performed by placing monitors throughout a network. Over time, there can be changes in the traffic, rendering these monitors useless. Raza et al. developed a framework called ‘Measu Routing’ where they rerouted traffic over fixed monitors to ensure effective monitoring. In this paper, we attempt to build software that uses the methodology presented by Raza et al.

Collaboration


Dive into the Sumanth Yenduri's collaboration.

Top Co-Authors

Avatar

A. Louise Perkins

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar

Farnaz Zand

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar

Louise A. Perkins

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar

S. Sitharama Iyengar

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Wei Ding

Austin Peay State University

View shared research outputs
Top Co-Authors

Avatar

Chabli Boler

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David H. Holt

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar

Sravanthi Munagala

University of Southern Mississippi

View shared research outputs
Top Co-Authors

Avatar

Tom Rishel

University of Southern Mississippi

View shared research outputs
Researchain Logo
Decentralizing Knowledge