Dr. P SUBHASH

@vnrvjiet.ac.in

Associate Professor
VNR Vignana Jyothi Institute of Engineering & Technology



              

https://researchid.co/subhash

RESEARCH INTERESTS

Network security, Internet of Things, Wireless Sensor Networks

20

Scopus Publications

56

Scholar Citations

5

Scholar h-index

1

Scholar i10-index

Scopus Publications

  • SNMP Watcher: A Model to Detect DoS and DDoS Attacks Using SNMP Management Information Base Analysis
    V. Surya Narayana Reddy, P. Subhash, Ch. Vinay Kumar, M. Samuel, G. Vishal Reddy, and G. Tharun

    Springer Nature Singapore

  • Performance Study of Three Different Types of Data Center Network Architectures, NovaCube, BCube, and FatTree Using NS-3 Simulator
    A. Ranjith, P. Subhash, G. Nagaraju, M. Srinivas, and A. Prashanth

    Springer Nature Singapore

  • A Security Framework for the Detection of Targeted Attacks Using Honeypot
    P. Subhash, Mohammed Qayyum, C. Likhitha Varsha, K. Mehernadh, J. Sruthi, and A. Nithin

    Springer Nature Singapore

  • rankIMPACT: A Study of Rank Attacks impact over RPL based Internet of Things Networks
    P Subhash

    IEEE
    One of these rapidly evolving technologies, the Internet of Things (IoT), is increasingly demonstrating its capacity to enable more efficient and sustainable smart city infrastructure. Smart cities rely heavily on IoT apps because of their many advantages and ease of integration. The "Internet of Things in Industry," also known as the Industrial Internet of Things (IIoT), is a domain where linked devices are utilized to deliver a range of services related to operational technology, manufacturing, utilities, and machine monitoring. IoT is however susceptible to a number of significant security problems that need to be addressed because of its broad use. In environments where IIoT resources are limited, the Routing Protocol for Low Power and Lossy Networks (RPL), based on IPv6, is the ideal choice. Additionally, RPL is more susceptible to a variety of attacks and, if they are not handled, could result in a decline in network performance. We propose the study of rank attacks and their impacts on a network’s packet delivery ratio (PDR), throughput, inter-packet time, and power consumption are the main objectives of this work. Further, the examination is surely helpful in estimating the performance losses in the network and accordingly devising the mitigation models further. To this end, the results of the study have clearly shown evidence that the attack has significantly lowered the performance of RPL-based IoT and IIoT contexts.

  • Breast Cancer Classification and Predicting Class Labels Using ResNet50
    Et al. T.Sunil Kumar

    Science Research Society
    Numerous studies have been conducted using Deep Learning paradigms to detect Breast Cancer. Breast cancer is a medical condition where abnormal cells in the breast grow uncontrollably, forming tumors. If not treated, these tumors can metastasize and spread to other parts of the body, potentially leading to life-threatening consequences. In the year 2020, there were approximately 2.3 million cases of breast cancer diagnosed in women, leading to around 685,000 deaths worldwide. By the close of 2020, there existed 7.8 million women who had been diagnosed with breast cancer within the preceding five years, solidifying it as the most widespread form of cancer globally. Breast cancer is observed across all countries, affecting women at various ages post-puberty, with incidence rates tending to rise in older age groups. The aim of this paper is to classify and predict the class labels of breast cancer. To achieve this, a ResNet50 model is utilized and mammography images are employed to locate cancer within the image and classify it to emphasize the affected area. The ResNet50 identifies mass regions and classifies them as either ductal carcinoma, inflammatory, triple negative or invasive cancer. The experimentation is carried out on breast cancer dataset and achieved 90.6% accuracy both for classification as well as prediction

  • Controlled blockchain enabled data record security for healthcare applications
    Siva Surya Narayana Chintapalli, S. P. Paramesh, G. S. Nijaguna, Jane Rubel Angelina Jeyaraj, and P. Subhash

    Springer Science and Business Media LLC

  • Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction
    Sasikumar Gurumoorthy, Parimella Subhash, Rocio Pérez de Prado, and Marcin Wozniak

    MDPI AG
    Currently, analysts in a variety of nations have developed various WSN clustering protocols. The major characteristic is the Low Energy Adaptive Clustering Hierarchy (LEACH), which attained the objective of energy balance by sporadically varying the Cluster Heads (CHs) in the region. Nevertheless, because it implements an arbitrary number system, the appropriateness of CH is complete with suspicions. In this paper, an optimal cluster head selection (CHS) model is developed regarding secure and energy-aware routing in the Wireless Sensor Network (WSN). Here, optimal CH is preferred based on distance, energy, security (risk probability), delay, trust evaluation (direct and indirect trust), and Received Signal Strength Indicator (RSSI). Here, the energy level is predicted using an improved Deep Convolutional Neural Network (DCNN). To choose the finest CH in WSN, Bald Eagle Assisted SSA (BEA-SSA) is employed in this work. Finally, the results authenticate the effectiveness of BEA-SSA linked to trust, RSSI, security, etc. The Packet Delivery Ratio (PDR) for 100 nodes is 0.98 at 500 rounds, which is high when compared to Grey Wolf Optimization (GWO), Multi-Objective Fractional Particle Lion Algorithm (MOFPL), Sparrow Search Algorithm (SSA), Bald Eagle Search optimization (BES), Rider Optimization (ROA), Hunger Games Search (HGS), Shark Smell Optimization (SSO), Rider-Cat Swarm Optimization (RCSO), and Firefly Cyclic Randomization (FCR) methods.

  • Analysis of Smart Grid Data for Appliance Prediction and Efficient Power Consumption
    P. Subhash, K. Samrat Surya, and A Brahmananda Reddy

    IEEE
    The recent arrival of Smart Grid has influenced the creation of Big Data in the field of energy consumption. Smart Grid provides with an efficient and reliable end to end two-way delivery system. The electricity consumption for an individual user is available at real time. Also, enables real-time monitoring and controlling of power system from utilities perspective, which helps them reducing the power losses. So, it is going to replace the old methodologies of sharing electricity, to fulfill the exponential needs of electricity in terms of flexibility, reliability and quality, etc. The aim of the study is to find the possible number of appliances used by an individual user and accordingly find the star rating of the individual appliance. Further will be informing user to upgrade specific appliance with a lower star rating to a higher star rating. This would eventually help appliance development companies with respect to targeted advertisement. Also, the cost to the energy consumed would be reduced. So, it is going to help users to save their money on energy consumption and would also help to save energy. This would eventually lead to a healthy environment for the conservation of energy.

  • Power Trust: Energy Auditing Aware Trust-Based System to Detect Security Attacks in IoT
    P. Subhash, Gollapudi Ramesh Chandra, and K. Samrat Surya

    IEEE
    Internet of Things (IoT) has become a part of our daily life; these provide information like sensory data which could help us in driving a vehicle with ease, electricity management in homes, health care, and many more. In all the scenarios, the information is generally in the form of log data used to measure certain parameters to figure out the solutions matching to the applications. As this information is very sensitive, there are chances of capturing the device and tampering the data causing sever performance degradation of the network. The possibility of attacks on these devices is mainly of two types one is of physical attack which could occur due to accidents and intentional damage to the device and the second type of possible attack is cyber-attack like tampering the information, denial-of-service, and compromising the device. In this paper, we propose a Power Trust mechanism to assign trust value for each node of the network based on the energy auditing. This energy auditing is done with reference to CPU cycles, data received, data processed, data sent network performance, and power consumption. Using the energy auditing model, we calculate trust values of every node present in the network dynamically and predict the physical attacks and cyber-attacks. With the method introduced, IoT devices would be better monitored and secured.

  • SmartRPL: Secure RPL Routing Protocol for Internet of Things Using Smart Contracts
    P. Subhash, P. Navya Sree, and M. Pratyusha

    Springer Singapore

  • Event organization system for turnout estimation with user group analysis model
    P. Subhash, N. Venkata Sailaja, and A. Brahmananda Reddy

    Springer Singapore

  • Sentiment research on twitter data
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    The scale of social network data that is being generated is increasing exponentially day by day. Public and private opinion of various subjects or issues are expressed in social media. Sentiment analysis is a method of analyzing the sentiment of a statement that it embodies. Twitter is one of the social medias that is gaining popularity nowadays and most people are using this platform to express their opinions. Sentiment analysis on Twitter is an application of analyzing the sentiment of twitter data(tweets) conveyed by the user. The research on this problem statement has grown consistently. The main reason behind this is the challenging format of tweets that are posted, and it makes the processing difficult. The tweet format would be the number of characters, slangs, abbreviations, emojis, http links and so on. In this paper the aim to describe the methodologies adopted, the process and models applied, along with a generalized approach using python. Sentiment analysis aims to determine or measure the attitude of the writer with respect to some topic.

  • Multi-modal summarization of read, watch, listen for text and multimedia content



  • Trust based HWMP protocol in high-performance wireless mesh networks


  • Secure neighbor verification protocol in wireless mesh networks


  • Secure neighbour discovery in wireless mesh networks using connectivity information
    P Subhash and S Ramachandram

    IEEE
    Authenticated mesh peering exchange (AMPE) is one of the core functionalities of wireless mesh network(WMN) that facilitates mesh routers to discover their peers (neighbours), securely. Even though the AMPE protocol prevents unauthorized neighbours from becoming part of the network, it fails to prevent relay attacks, where an attacker can simply relay frames used to establish peer-links. The motivation of an attacker is to convince two far-away nodes as neighbours, and make them commit to a non-existent link that acts as a wormhole later. In this paper, we address this problem of relay attacks and propose a secure neighbour discovery mechanism that detects non-existent network links. It relies on a ranking mechanism to compute relative distance between neighbours, and employs connectivity information to validate those links.

  • Mitigating FRI-attack using Virtual Co-ordinate system in multi-hop Wireless Mesh Networks
    P. Subhash and S. Ramachandram

    Springer International Publishing

  • Preventing wormholes in multi-hop wireless mesh networks
    P. Subhash and S. Ramachandram

    IEEE
    Wireless Mesh Networks (WMNs) has become an emerging technology in recent days due to its easy deployment and low setup cost. In WMN, Routing protocols play an important role and these are susceptible to various kinds of internal attacks. One such attack that has severe impact on a WMN is a wormhole attack. A Wormhole is a low-latency link between two parts of the network through which an attacker tunnels network messages from one point to another point. In this paper, we specifically focus on wormhole attack launched by colluding nodes referred to as Byzantine wormhole attack. Unfortunately, most of the existing wormhole defense mechanisms are either centralized, or rely on additional hardware. The major challenge in detecting a byzantine wormhole link is the inability to distinguish nodes involved in the attack process, as they form the legitimate part of network. Being legitimate part of the network, they can bypass all security mechanisms and timing constraints imposed by the network. In this paper, we propose a mechanism to prevent byzantine wormhole attack in WMNs. The proposed mechanism relies on digital signatures and prevents formation of wormholes during route discovery process and it is designed for an on-demand hop-by-hop routing protocol like HWMP (Hybrid Wireless Mesh Protocol-the default routing protocol for WMN). This is simplistic and also applicable to source routing protocols like DSR. This is a software based solution and does not require additional (or) specialized hardware.

  • Security issues of data query processing and location monitoring in MANETS
    Mohammed Qayyum, P. Subhash, and Mohammed Husamuddin

    IEEE
    Mobile Ad Hoc Networks (MANETs) are exposed to several extra threats as compared to legacy wireless networks due to their nature. The security management in MANETs, where node level security monitoring plays an integral role in maintaining security and the problem of measuring the overall security level of MANETs. This paper presented the major components of the security level of MANETs. Security issues of Data Query Processing and Location Monitoring. The security level estimation architecture, security level classification and in applications is also presented.

RECENT SCHOLAR PUBLICATIONS

  • rankIMPACT: A Study of Rank Attacks impact over RPL based Internet of Things Networks
    P Subhash
    2023 IEEE International Conference on Advanced Networks and 2023

  • Breast Cancer Classification and Predicting Class Labels Using ResNet50.
    TS Kumar, G Sridhar, D Manju, P Subhash, G Nagaraju
    Journal of Electrical Systems 19 (4) 2023

  • A Security Framework for the Detection of Targeted Attacks Using Honeypot
    P Subhash, M Qayyum, C Likhitha Varsha, K Mehernadh, J Sruthi, ...
    International Conference on Computer & Communication Technologies, 183-192 2023

  • Performance Study of Three Different Types of Data Center Network Architectures, NovaCube, BCube, and FatTree Using NS-3 Simulator
    A Ranjith, P Subhash, G Nagaraju, M Srinivas, A Prashanth
    International Conference on Computer & Communication Technologies, 411-421 2023

  • SNMP Watcher: A Model to Detect DoS and DDoS Attacks Using SNMP Management Information Base Analysis
    V Surya Narayana Reddy, P Subhash, C Vinay Kumar, M Samuel, ...
    International Conference on Computer & Communication Technologies, 193-203 2023

  • Controlled blockchain enabled data record security for healthcare applications
    SSN Chintapalli, SP Paramesh, GS Nijaguna, JRA Jeyaraj, P Subhash
    Neural Computing and Applications, 1-13 2023

  • Analysis of Smart Grid Data for Appliance Prediction and Efficient Power Consumption
    P Subhash, KS Surya, AB Reddy
    2022 International Conference on Recent Trends in Microelectronics 2022

  • Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction
    S Gurumoorthy, P Subhash, R Prez de Prado, M Wozniak
    Sensors 22 (24), 9921 2022

  • Power trust: Energy auditing aware trust-based system to detect security attacks in iot
    P Subhash, GR Chandra, KS Surya
    2021 Sixth International Conference on Wireless Communications, Signal 2021

  • Multi-classification for cardiac arrhythmia detection using deep learning approach
    P Subhash, PG Sai, NR Reddy, A Pampati, SK Palavarapu
    Machine Learning Technologies and Applications: Proceedings of ICACECS 2020 2021

  • SmartRPL: Secure RPL Routing Protocol for Internet of Things Using Smart Contracts
    P Subhash, P Navya Sree, M Pratyusha
    Smart Computing Techniques and Applications: Proceedings of the Fourth 2021

  • Machine Learning Technologies and Applications Proceedings of ICACECS 2020
    CK Mai, AB Reddy, KS Raju
    Proceedings of ICACECS, 1 2020

  • Event Organization System for Turnout Estimation with User Group Analysis Model
    P Subhash, NV Sailaja, AB Reddy
    Intelligent System Design, 697-710 2020

  • Sentiment research on Twitter data
    A Reddy, DN Vasundhara, P Subhash
    Int J Recent Technol Eng 8 (5), 1068-1070 2019

  • A Block chain incorporated Cloud Environment Using Proof-of-Stake Consensus Model
    KB Singamaneni Kranthi Kumar, Dr.P. Subhash
    JOURNAL OF APPLIED SCIENCE AND COMPUTATIONS 6 (1), 409-423 2019

  • Multi-Modal Summarization of Read,Watch,Listen for Text and Multimedia Content
    RMSA P Subhash
    International Journal of Innovative Technology and Exploring Engineering 8 2019

  • A New Approach to Represent Textual Documents Using CVSM
    DPS Dr. A. Brahmananda Reddy, Dr Y Sagar
    International Journal of Engineering & Technology 2019

  • Trust based HWMP protocol in high-performance wireless mesh networks
    P Subhash, S Ramachandram
    work 5 (6), 11-25 2016

  • SECURE NEIGHBOR VERIFICATION PROTOCOL IN WIRELESS MESH NETWORKS.
    P Subhash, S Ramachandram
    Journal of Theoretical & Applied Information Technology 82 (2) 2015

  • Secure neighbour discovery in wireless mesh networks using connectivity information
    P Subhash, S Ramachandram
    2015 International Conference on Advances in Computing, Communications and 2015

MOST CITED SCHOLAR PUBLICATIONS

  • Sentiment research on Twitter data
    A Reddy, DN Vasundhara, P Subhash
    Int J Recent Technol Eng 8 (5), 1068-1070 2019
    Citations: 15

  • Security issues of data query processing and location monitoring in manets
    M Qayyum, P Subhash, M Husamuddin
    2012 International Conference on Communication, Information & Computing 2012
    Citations: 9

  • Preventing wormholes in multi-hop wireless mesh networks
    P Subhash, S Ramachandram
    2013 Third International Conference on Advanced Computing and Communication 2013
    Citations: 8

  • Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction
    S Gurumoorthy, P Subhash, R Prez de Prado, M Wozniak
    Sensors 22 (24), 9921 2022
    Citations: 7

  • Secure neighbour discovery in wireless mesh networks using connectivity information
    P Subhash, S Ramachandram
    2015 International Conference on Advances in Computing, Communications and 2015
    Citations: 5

  • Power trust: Energy auditing aware trust-based system to detect security attacks in iot
    P Subhash, GR Chandra, KS Surya
    2021 Sixth International Conference on Wireless Communications, Signal 2021
    Citations: 4

  • Trust based HWMP protocol in high-performance wireless mesh networks
    P Subhash, S Ramachandram
    work 5 (6), 11-25 2016
    Citations: 3

  • Machine Learning Technologies and Applications Proceedings of ICACECS 2020
    CK Mai, AB Reddy, KS Raju
    Proceedings of ICACECS, 1 2020
    Citations: 2

  • Multi-classification for cardiac arrhythmia detection using deep learning approach
    P Subhash, PG Sai, NR Reddy, A Pampati, SK Palavarapu
    Machine Learning Technologies and Applications: Proceedings of ICACECS 2020 2021
    Citations: 1

  • SECURE NEIGHBOR VERIFICATION PROTOCOL IN WIRELESS MESH NETWORKS.
    P Subhash, S Ramachandram
    Journal of Theoretical & Applied Information Technology 82 (2) 2015
    Citations: 1

  • cTrust: COMPLEMENTARY TRUST BASED ROUTING IN MULTI-HOP WIRELESS MESH NETWORKSS
    P Subhash, S Ramachandram
    Annals. Computer Science Series 12 (1) 2014
    Citations: 1