M V S S Nagendranath

@sasi.ac.in

Professor
Sasi Institute of Technology and Engineering

6

Scopus Publications

Scopus Publications

  • Type II fuzzy-based clustering with improved ant colony optimization-based routing (t2fcatr) protocol for secured data transmission in manet
    M. V. S. S. Nagendranth, M. Rajesh Khanna, N. Krishnaraj, Mohamed Yacin Sikkandar, Mohamed Abdelkader Aboamer, and R. Surendran

    Springer Science and Business Media LLC

  • An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks
    Nagendranath M V S S and A. Ramesh Babu

    Springer Science and Business Media LLC
    Energy efficiency and security are considered as two crucial issues in the design of MANET. In this paper, an energy efficient stable as well as secure clustering (EESSC) technique is presented for MANET. The presented EESSC technique makes use of fuzzy logic mechanism to select the cluster heads (CHs) properly by the use of five variables namely remaining energy level, node degree, distance, trust level and node mobility. In addition, a standby CH (SBCH) is also introduced to find useful in case of accidental cases like CH dies, CH moves out of the cluster or CH is comprises. In such case, SBCH is invoked to act as CH and again another SBCH is chosen. This process helps to achieve network availability with no disturbances along with the additional level of security. The simulation of the EESSC takes place under diverse aspects and the outcome verified the betterment of the presented model over the compared ones. From the simulation outcome, under the simulation time of 250 s, the CH changes takes place by 19 times whereas a maximum of 28 and 30 CHs were changed by the existing EWCA and EESSC methods respectively.

  • Effective routing protocol and analysing various attacks in the manet network
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Mobile Ad-hoc Network is the self-configuring structure less network for transmitting the information from one node to another node because of the independent node direction. During the information transmission in the network one of the main challenges is to maintain the intermediate node information for making the effective transmission. In addition the intermediate person may be hacking the information by performing the Wormhole and Black hole attacks. So, in this paper proposes an effective Neighboring Relationship based Clustering protocol. The protocol analyzes the neighboring relationship between the transmitted node information protocols. Each similar node information is grouped into the cluster. At the time cluster head and neighboring node topology has been updated continuously for avoiding the middle man attacks like, wormhole and black hole. Further the energy consumption is managed by applying the Fireflies algorithm based Energy efficient routing protocol with efficient manner. Then the efficiency of the system is analyzed using the experimental results like, packet delivery ratio, energy utilization factor and percentage of attack free routing efficiency.

  • Detection of Packet Dropping and Replay Attacks in MANET
    M. V. S. S. Nagendranath, Babu.A Ramesh, and V. Aneesha.

    IEEE
    Mobile Ad-hoc Network (MANET) is a application of wireless network with self-configuring mobile nodes. MANET will not need any mounted infrastructure. Nodes in MANET will communicate with every alternative nodes if and provided that all the nodes square measure within the same vary. This distribution of nodes makes MANET vulnerable to varied attacks, packet dropping attack or black hole attack and replay are some of the possible attacks. It is very heavy to notice and preclude. To prevent from packet dropping attack, detection of misbehaviour links and egotistical nodes plays a necessary role in MANETs. In this paper we are going to compare all technique how they notice the self-absorbed link and malicious node.

  • Adverse effect of black hole and worm hole attacks on MANETs


  • Node Failure Identification and Recovery algorithm to enhance the Lifetime and Defending Vampire Attack in WSNs