@aiet.org.in
Professor and Head- CSE
Alva's Institute of Engineering and Technology (AIET)
B.E, M.Tech, Ph.D
Distributed Systems, Computer Networks, Cyber Security, Data Analytics
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Jayantkumar A. Rathod and Manjunath Kotari
EverScience Publications
– Several practical applications are combined in a new paradigm known as 5G-based mobile ad hoc networks (MANET) with cloud. Numerous existing works perform trust assessment, intrusion detection, and route discovery to improve secure data transmission in MANET. Route maintenance was not carried out in several of the existing works, and the absence of enumerating link status and node reliability during route maintenance results in link failure and increases packet loss. By considering the existing issues, a novel Kangaroo-based intrusion detection system was proposed to eliminate malicious nodes from the network using Bidirectional-Long Short-Term Memory (Bi-LSTM). This increases data transmission security. For graphical user authentication, encryption based on ASCII values of the Reflection tree (E-ART algorithm) is employed. In this paper, a divide well merge algorithm was implemented, which is a better approach for hierarchical clustering. This method consists of two phases: a Division and Merging phase. The effective route identification and route maintenance in MANET are implemented by using an Advanced Ad-hoc On-demand Distance Vector Protocol (Advanced AODV), which discovers the route using the Fire Hawk Optimization Algorithm (FHO) to obtain optimal multipath by contemplating trust, node connectivity, throughput, node degree, bandwidth, energy and distance where this protocol offers loop-free operation and enhance its scalability to numerous numbers of terminals. In this way, route discovery and route maintenance are established to enhance secure data transmission, thereby reducing packet loss. The modified blockchain called TriChain is proposed for enhancing data transmission security. For the Proof of Work based on Reputation (PoWR) consensus algorithm is used to reduce transaction confirmation latency and block creation time thereby increasing security. In this way, route discovery and route maintenance are established to enhance secure data transmission thereby reducing packet loss. The proposed work is evaluated using detection rate, energy consumption, packet delivery rate, throughput, authentication rate and delay.
Jayantkumar A Rathod and Manjunath Kotari
IEEE
Here, crypto message fragmentation technique is applied to guarantee the immutability, non-repudiation, reliability, integrity and synchronization of the message during transmission. Multipath routing protocols' are used to get over the single path routing protocols' drawbacks and achieving high performance. The message is encrypted using standard encryption algorithms that are chosen at random: this randomization makes cryptanalysis more difficult. Data availability, data integrity and data's secrecy are addressed in an ad hoc network environment using Secure Message Transmission (SMT). There is no requirement for link encryption because the SMT technique operates end-to-end and between the source and destination nodes, assuming security association (SA). Although it may be used to support end-to-end communication encryption, data integrity and origin authentication are guaranteed by this SA between the end nodes.
U B Nagesh, Manjunath Kotari, and S C Chethan
IEEE
Today the amount of importance given to waste management by the Municipal Corporation and public people created an unhygienic environment in the city leading to various deadly diseases. The garbage bins provided by municipality at public places are mismanaged due to poor information system and complete manual operations. Implementation of a clear communication system at either ends of the system will be a solution for a cleaner, hygienic city. In view of this, we propose and design an intelligent Smart Waste Management Using IoT. In this system we have deployed multiple garbage bins which are fitted with sensors modules and low cost embedded communicating devices to assist in tracking the level of waste in garbage container. The bins are identified by a unique identifier across the city so that it is easy to track the status of each container from an interactive web interface and a smart phone application. We integrate these networked smart bins to Google maps through suitable APIs to track them in real time. When the level reaches the preset threshold limit, the transmitter module will send the level along with unique ID of the bin through MQTT messages. This data can then be accessed by the concerned municipal authorities through interactive map and web applications and also immediate decision could be taken to track and reach them. We have also added several features such as bin tracking, nearest bin identification, remote garbage level indication etc.
Manjunath Kotari and Niranjan N. Chiplunkar
IGI Global
Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.
Manjunath Kotari and Niranjan N. Chiplunkar
Springer International Publishing
The distributed systems have a noteworthy role in today’s information technology whether it is governmental or nongovernmental organization. Adaptive distributed systems (ADS) are distributed systems that can evolve their behaviors based on changes in their environments (Schlichting and Hiltunen, Designing and implementing adaptive distributed systems, 1998, http://www.cs.arizona.edu/adaptiveds/overview.html). For example, a constant monitoring is required in distributed system to dynamically balance the load using centralized approach (Sarma and Dasgupta, Int J Adv Res Ideas Innov Technol 2:5–10, 2014). A monitoring system or tool is used to identify the changes in the distributed systems and all the activities of the entire network systems. The monitoring of network may help to improve the efficiency of the overall network. However, the monitoring system may be compromised by the intruder by gathering the information from the distributed systems. The various secure and insecure monitoring mechanisms have been adopted by adaptive distributed systems. Most of the distributed systems nowadays use monitoring tools to monitor the various parameters of the networking system. The monitoring tool has been implemented to assess the performance overhead during monitoring. The Wireshark monitoring tool and JMonitor tool (Penteado and Trevelin, JMonitor: a monitoring tool for distributed systems. In Proceedings of international conference on systems, man, and cybernetics, COEX, Seoul, Korea, pp 1767–1772, 2012) have been used to monitor the communication between the various users and also to monitor the computational resources used in networked computers. The main concern of this chapter is to investigate the existing monitoring tools for finding the impacts of monitoring activities in the distributed network. The investigations result that, when the monitoring tool collects security-critical information, there is a high risk of information disclosure to unauthorized users. The second concern is that a secure communication channel can be implemented by using the Rivest, Shamir, and Adelman (RSA) algorithm to monitor the confidential information. This chapter illustrates the implementation and experimental results related to authors’ research work and formulation of framework for security mechanisms in the context of adaptive distributed systems (Kotari et al., IOSR J Comput Eng 18:25–36, 2016).
Manjunath Kotari, Niranjan N. Chiplunkar, and H R Nagesh
IEEE
In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data in an Adaptive Distributed System (ADS) which changes dynamically in the real time environment. By knowing the parameters the system can work more effectively by doing the necessary changes. The two problems that are addressed here are monitoring a system and collecting data necessary for adaptation, may cause security problems. In this paper we are addressing customized monitoring tool with the help of two modules. One of the module is System Under Study(SUS), a node in a distributed system; which sets the security level of its parameters like IP Address, Host-ID etc. and in turn it gives the permissions for monitoring same with or without encryption. Other module is Network Monitoring Tool(NMT), a monitoring node in a distributed system; gets the different parameters of SUS in encrypted format or unencrypted format depending on the security level set by SUS and decrypt its values for the purpose of adaptation in the distributed systems.