Dr. MANJUNATH KOTARI

@aiet.org.in

Professor and Head- CSE
Alva's Institute of Engineering and Technology (AIET)



                 

https://researchid.co/mkotari

EDUCATION

B.E, M.Tech, Ph.D

RESEARCH INTERESTS

Distributed Systems, Computer Networks, Cyber Security, Data Analytics

7

Scopus Publications

47

Scholar Citations

4

Scholar h-index

2

Scholar i10-index

Scopus Publications

  • TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol
    Jayantkumar A. Rathod and Manjunath Kotari

    EverScience Publications
    – Several practical applications are combined in a new paradigm known as 5G-based mobile ad hoc networks (MANET) with cloud. Numerous existing works perform trust assessment, intrusion detection, and route discovery to improve secure data transmission in MANET. Route maintenance was not carried out in several of the existing works, and the absence of enumerating link status and node reliability during route maintenance results in link failure and increases packet loss. By considering the existing issues, a novel Kangaroo-based intrusion detection system was proposed to eliminate malicious nodes from the network using Bidirectional-Long Short-Term Memory (Bi-LSTM). This increases data transmission security. For graphical user authentication, encryption based on ASCII values of the Reflection tree (E-ART algorithm) is employed. In this paper, a divide well merge algorithm was implemented, which is a better approach for hierarchical clustering. This method consists of two phases: a Division and Merging phase. The effective route identification and route maintenance in MANET are implemented by using an Advanced Ad-hoc On-demand Distance Vector Protocol (Advanced AODV), which discovers the route using the Fire Hawk Optimization Algorithm (FHO) to obtain optimal multipath by contemplating trust, node connectivity, throughput, node degree, bandwidth, energy and distance where this protocol offers loop-free operation and enhance its scalability to numerous numbers of terminals. In this way, route discovery and route maintenance are established to enhance secure data transmission, thereby reducing packet loss. The modified blockchain called TriChain is proposed for enhancing data transmission security. For the Proof of Work based on Reputation (PoWR) consensus algorithm is used to reduce transaction confirmation latency and block creation time thereby increasing security. In this way, route discovery and route maintenance are established to enhance secure data transmission thereby reducing packet loss. The proposed work is evaluated using detection rate, energy consumption, packet delivery rate, throughput, authentication rate and delay.




  • A Novel Framework for Network Based Secure Message Transmission Based on Fragmentation and Cryptography
    Jayantkumar A Rathod and Manjunath Kotari

    IEEE
    Here, crypto message fragmentation technique is applied to guarantee the immutability, non-repudiation, reliability, integrity and synchronization of the message during transmission. Multipath routing protocols' are used to get over the single path routing protocols' drawbacks and achieving high performance. The message is encrypted using standard encryption algorithms that are chosen at random: this randomization makes cryptanalysis more difficult. Data availability, data integrity and data's secrecy are addressed in an ad hoc network environment using Secure Message Transmission (SMT). There is no requirement for link encryption because the SMT technique operates end-to-end and between the source and destination nodes, assuming security association (SA). Although it may be used to support end-to-end communication encryption, data integrity and origin authentication are guaranteed by this SA between the end nodes.

  • Integration of MQTT Protocol with Map APIs for Smart Garbage Management
    U B Nagesh, Manjunath Kotari, and S C Chethan

    IEEE
    Today the amount of importance given to waste management by the Municipal Corporation and public people created an unhygienic environment in the city leading to various deadly diseases. The garbage bins provided by municipality at public places are mismanaged due to poor information system and complete manual operations. Implementation of a clear communication system at either ends of the system will be a solution for a cleaner, hygienic city. In view of this, we propose and design an intelligent Smart Waste Management Using IoT. In this system we have deployed multiple garbage bins which are fitted with sensors modules and low cost embedded communicating devices to assist in tracking the level of waste in garbage container. The bins are identified by a unique identifier across the city so that it is easy to track the status of each container from an interactive web interface and a smart phone application. We integrate these networked smart bins to Google maps through suitable APIs to track them in real time. When the level reaches the preset threshold limit, the transmitter module will send the level along with unique ID of the bin through MQTT messages. This data can then be accessed by the concerned municipal authorities through interactive map and web applications and also immediate decision could be taken to track and reach them. We have also added several features such as bin tracking, nearest bin identification, remote garbage level indication etc.

  • A survey on detection and analysis of cyber security threats through monitoring tools
    Manjunath Kotari and Niranjan N. Chiplunkar

    IGI Global
    Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.

  • Investigation of security issues in distributed system monitoring
    Manjunath Kotari and Niranjan N. Chiplunkar

    Springer International Publishing
    The distributed systems have a noteworthy role in today’s information technology whether it is governmental or nongovernmental organization. Adaptive distributed systems (ADS) are distributed systems that can evolve their behaviors based on changes in their environments (Schlichting and Hiltunen, Designing and implementing adaptive distributed systems, 1998, http://www.cs.arizona.edu/adaptiveds/overview.html). For example, a constant monitoring is required in distributed system to dynamically balance the load using centralized approach (Sarma and Dasgupta, Int J Adv Res Ideas Innov Technol 2:5–10, 2014). A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network systems. The monitoring of network may help to improve the efficiency of the overall network. However, the monitoring system may be compromised by the intruder by gathering the information from the distributed systems. The various secure and insecure monitoring mechanisms have been adopted by adaptive distributed systems. Most of the distributed systems nowadays use monitoring tools to monitor the various parameters of the networking system. The monitoring tool has been implemented to assess the performance overhead during monitoring. The Wireshark monitoring tool and JMonitor tool (Penteado and Trevelin, JMonitor: a monitoring tool for distributed systems. In Proceedings of international conference on systems, man, and cybernetics, COEX, Seoul, Korea, pp 1767–1772, 2012) have been used to monitor the communication between the various users and also to monitor the computational resources used in networked computers. The main concern of this chapter is to investigate the existing monitoring tools for finding the impacts of monitoring activities in the distributed network. The investigations result that, when the monitoring tool collects security-critical information, there is a high risk of information disclosure to unauthorized users. The second concern is that a secure communication channel can be implemented by using the Rivest, Shamir, and Adelman (RSA) algorithm to monitor the confidential information. This chapter illustrates the implementation and experimental results related to authors’ research work and formulation of framework for security mechanisms in the context of adaptive distributed systems (Kotari et al., IOSR J Comput Eng 18:25–36, 2016).

  • Implementation of secure customized monitoring tool for adapative distributed systems
    Manjunath Kotari, Niranjan N. Chiplunkar, and H R Nagesh

    IEEE
    In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data in an Adaptive Distributed System (ADS) which changes dynamically in the real time environment. By knowing the parameters the system can work more effectively by doing the necessary changes. The two problems that are addressed here are monitoring a system and collecting data necessary for adaptation, may cause security problems. In this paper we are addressing customized monitoring tool with the help of two modules. One of the module is System Under Study(SUS), a node in a distributed system; which sets the security level of its parameters like IP Address, Host-ID etc. and in turn it gives the permissions for monitoring same with or without encryption. Other module is Network Monitoring Tool(NMT), a monitoring node in a distributed system; gets the different parameters of SUS in encrypted format or unencrypted format depending on the security level set by SUS and decrypt its values for the purpose of adaptation in the distributed systems.

RECENT SCHOLAR PUBLICATIONS

  • Exploration of Non-Convex Optimization Challenges Across Diverse Data Sets Using Machine Learning and Deep Learning Methods
    H Kunder, M Kotari
    International Journal of Computing and Digital Systems 16 (1), 1-12 2024

  • TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol
    JRA Manjunath Kotari
    International Journal of Computer Networks and Applications (IJCNA) 11 (1 2024

  • Advancements and Applications of Blockchain Technology: A Comprehensive Analysis
    DMK Monika L R , Priya D B , Punya N , Mohammed Adnan Akram
    International Journal of Advances in Computer Science and Technology 13 (1 2024

  • Emerging Threats and Innovative Solutions in Cybersecurity: A Comprehensive Review
    DMK shi V K1 , Sanjeev R Gadag2 , Mohammed Uzair Pasha3 , Sushmitha E4
    International Journal of Advances in Computer Science and Technology 13 (1 2024

  • Dynamic Routing Using Petal Ant Colony Optimization for Mobile Ad-hoc Networks
    SBP Manjunath Kotari
    International Journal of Advanced Computer Science and Applications(IJACSA 2023

  • A Novel Framework for Network Based Secure Message Transmission Based on Fragmentation and Cryptography
    JA Rathod, M Kotari
    2022 4th International Conference on Circuits, Control, Communication and 2022

  • Data Warehouse Security Threats and Issues
    DMK Akash1, Nihal Rafeeq2, Tushith Shukla3, T. K Koushik Chinnappa4
    International Journal of Advanced Research in Science, Communication and 2022

  • Cyberbullying in online/E-learning platforms based on social networks
    N Balaji, BH Karthik Pai, K Manjunath, B Venkatesh, N Bhavatarini, ...
    Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 2022

  • Integration of MQTT Protocol with Map APIs for Smart Garbage Management
    NUB Manjunath Kotari
    2021 IEEE International Conference on Distributed Computing, VLSI 2021

  • TOP SLIDING DRIVING HELMET FOR BETTER AIR VENTILATION WITH IOT FEATURES
    MMMDRFDVEDKPBHDAPRDSVVDMKDDKSMV Chandran
    IN Patent A42B0,003,280,000 2021

  • Effectiveness of online teaching & learning during Covid 19 Pandemic – A case study of Engineering Education in Karnataka
    VM Manjunath Kotari, Kiran Malagi
    GIS SCIENCE JOURNAL 8 (2), 234-242 2021

  • A quantitative approach for attainment of CO & PO through laboratory for affiliated Institutes
    VM Manjunath Kotari, Kiran Malagi
    GIS SCIENCE JOURNAL 8 (2), 243-255 2021

  • Design of A Self-Healing Mechanism for Wireless Sensor Networks
    SR Gutti, P Sannidhi
    International Journal of Progressive Research in Science and Engineering 1 2020

  • Sign Language Recognition using Image based Hand Gesture
    N Adarsh, MG Banish, KR Rohan, J Rahul, M Kotari
    2020

  • A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools
    M Kotari, NN Chiplunkar
    Handbook of Research on Intrusion Detection Systems, 77-104 2020

  • Investigation of security issues in distributed system monitoring
    M Kotari, NN Chiplunkar
    Handbook of Computer Networks and Cyber Security: Principles and Paradigms 2020

  • Water Tank Monitoring System
    SS Nishmitha, M Kotari, P Shetty, G Sudarshan
    International Journal Of Engineering Research & Technology (Ijert) Rtesit 2019

  • Driver Drowsiness Detection using Machine Learning Approach
    PB Murdeshwar, ST Salian, S Reddy, DS Sharath, M Kotari
    2019

  • Sign Language Recognition using Image based Hand Gesture
    AN Dr.Manjunath Kotari
    International Journal of Research in Engineering, Science and Management 2 2019

  • Application of IoT in Deep Water Culture
    RKR Dr.Manjunath Kotari
    International Journal of Research in Engineering, Science and Management 2 2019

MOST CITED SCHOLAR PUBLICATIONS

  • Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems
    K Manjunath, C Niranjan N, N HR
    IOSR Journal of Computer Engineering (IOSR-JCE) 18 (4), 25-36 2016
    Citations: 11

  • Investigation of security issues in distributed system monitoring
    M Kotari, NN Chiplunkar
    Handbook of Computer Networks and Cyber Security: Principles and Paradigms 2020
    Citations: 10

  • Cyberbullying in online/E-learning platforms based on social networks
    N Balaji, BH Karthik Pai, K Manjunath, B Venkatesh, N Bhavatarini, ...
    Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 2022
    Citations: 6

  • Water Tank Monitoring System
    SS Nishmitha, M Kotari, P Shetty, G Sudarshan
    International Journal Of Engineering Research & Technology (Ijert) Rtesit 2019
    Citations: 5

  • Driver Drowsiness Detection using Machine Learning Approach
    PB Murdeshwar, ST Salian, S Reddy, DS Sharath, M Kotari
    2019
    Citations: 4

  • An Approach for Adaptive Load Balancing Using Centralized Load Scheduling in Distributed Systems
    MM Mathias, M Kotari
    International Journal of Innovative Research in Computer and Communication 2015
    Citations: 4

  • Application of IoT in Deep Water Culture
    RKR Dr.Manjunath Kotari
    International Journal of Research in Engineering, Science and Management 2 2019
    Citations: 2

  • Security Aspects of Adaptive Distributed Systems and proposed solutions by ANUSANDHANA-Journal of Science
    M Kotari, NN Chiplunkar, HR Nagesh
    Engineering and Management 1, 45-49 2012
    Citations: 2

  • A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools
    M Kotari, NN Chiplunkar
    Handbook of Research on Intrusion Detection Systems, 77-104 2020
    Citations: 1

  • Implementation of secure customized monitoring tool for adapative distributed systems
    M Kotari, NN Chiplunkar, HR Nagesh
    2014 International Conference on Contemporary Computing and Informatics 2014
    Citations: 1

  • Monitoring and its Impacts over Distributed Systems and Possible Solutions
    DNN Manjunath Kotari, HR Nagesh
    International Journal of Computer Science and Mobile Computing 2 2013
    Citations: 1