Filters








16 Hits in 0.53 sec

Different types of attacks in Mobile ADHOC Network [article]

Aniruddha Bhattacharyya, Arnab Banerjee, Dipayan Bose, Himadri Nath Saha, Debika Bhattacharya
2011 arXiv   pre-print
Security in mobile AD HOC network is a big challenge as it has no centralized authority which can supervise the individual nodes operating in the network. The attacks can come from both inside the network and from the outside. We are trying to classify the existing attacks into two broad categories: DATA traffic attacks and CONTROL traffic attacks. We will also be discussing the presently proposed methods of mitigating those attacks.
arXiv:1111.4090v1 fatcat:ebdrmrtfzjgenliousw7t4xq4i

Overview of End-to-End WiMAX Network Architecture [chapter]

Mohuya Chakraborty, Debika Bhattacharyya
2010 WiMAX Security and Quality of Service  
Source: Dr Mohuya Chakraborty and Dr Debika Bhattacharyya.  ...  Source: Dr Mohuya Chakraborty and Dr Debika Bhattacharyya.  ... 
doi:10.1002/9780470665749.ch1 fatcat:zfigur7kazee5kix5qij7migpi

Minimized Overhead and Administrator based Secure Routing Protocol

Himadri Nath Saha, Debika Bhattacharyya, P. K.Banerjee
2011 International Journal of Computer Applications  
As an emerging new technology a wireless communication allows users to access services electronically, wherever they might geographically be positioned. A MANET (M obile Ad Hoc Network )is a special wireless network without any fixed infrastructure and It has dynamic topology. In this paper we have discussed a new secure routing protocol named as minimized overhead and admsinistrator based secure routing protocol(MOAP) for data packets, which is signifiacndly different from existing routing
more » ... ocol. We have reduced the amount of network activity for each node required to route a data packet. We have utilized our algorithm to implement this protocol and then simulate with diffentent test cases. Finally we have discussed how this protocol prevents various attacks which may jeopardize any wireless network.
doi:10.5120/3060-4178 fatcat:yy7674wtunh2jfvs6qxs5r4z6e

A novel and Efficient Secured Routing Algorithm in Mobile Ad hoc Network

Himadri Nath Saha, Debika Bhattacharyya, Banerjee
2011 International Journal of Wireless & Mobile Networks  
Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. The lack of static infrastructure causes several issues in mobile Ad hoc network (MANET) environment, such as node authentication and secure routing. In this paper we propose a new approach for secure routing of data packets in MANET. This approach will reduce the computational
more » ... erhead to a lot extent. The scheme is based on a specific criterion of the nodes called "fidelity Index" .Data packets are routed based on this fidelity index. Simulation results show our proposed scheme is simple yet robust under some scenarios.
doi:10.5121/ijwmn.2011.3519 fatcat:2i3mhz5z7vh6bnwqjw5qslzrxq

Administrator and Fidelity Based Secure Routing (AFSR) Protocol in MANET
english

Rohit Singh, Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee
2016 Journal of Computing and Information Technology  
The proliferation of mobile computing and communication devices are driving a revolutionary change in our information society. Among all the applications and services run by mobile devices, network connections and corresponding data services are without doubt the most demanded services by mobile users. A MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires, which makes it ideal for the present scenario. But, due to lack of any
more » ... d infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The prominent routing protocols we know are generally designed for environments where the nodes within a network are non-malicious. Due to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb its development. We propose a protocol for MANETs named "Administrator and Fidelity Based Secure Routing Protocol" (AFSR), which ensures secure routing through the network: by electing an Administrator node on the basis of Willingness and Fidelity, after which a node only communicates to that secure Admin node. This selection of secured admin nodes results in mitigation of various threats. We have evaluated our proposed protocol by simulating and comparing in GloMoSim.
doi:10.20532/cit.2016.1002634 fatcat:cyvcb6w2pfbwdd5dcufotkectm

Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs

Himadri N. Saha, Rohit Singh, Debika Bhattacharyya
2015 International Journal of Computer Network and Information Security  
With the advent of real applications in fields like defense and domestic fields, MANET is becoming more popular. MANET does not require any infrastructure, moreover it can behave as mobile networks. These features have boosted up the popularity of MANET in the community. As more and more fields get dependent on MANET, the system needs to be more robust and less expensive. For example, in defense field security is the major issue, while in the domestic field maintaining the QoS is the major
more » ... . To commercialize MANET the routing protocols need to be lightweight, secure and the hardware on which it is to be implemented should be low cost at the same time. We propose a lightweight, secure and efficient routing model for MANETs; which uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses new packets like report and recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To observe the results we implement this protocol in hardware, on the Arduino platform in ZigBee network. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load and low end to end delay, compared to existing secure routing protocols. Thereby, maintaining a constant tradeoff between the QoS and the security of the network.
doi:10.5815/ijcnis.2015.08.05 fatcat:4nmb27ksava55b5s26cnzywrxm

Secure Multipoint Relay based Routing in MANET

Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee
2012 Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology - CCSEIT '12  
Building proper routing protocols for a mobile ad-hoc network (MANET) is a critical challenge. A desirable MANET routing protocol must consider not only the broadcast storm problem which comes from flooding route requests in route discovery but also the path repair problem which usually takes massive control packets to rebuild paths when damage occurs. To advance the performance of MANETs, this paper presents a new routing protocol which employs the concept of multipoint relaying and 2-hop
more » ... r (MR2R) to deal with the broadcast storm and path damage problems. The MR2R protocol is distinct from previous protocols in its ability to reach rapid damage detection and repair, decrease packet amounts and increase the repair chances. As the obtained simulation results exhibit, our new protocol can effectively discover paths and repair damaged routes at less bandwidth consumption (i.e., with reduced control packets), in contrast to other protocols.
doi:10.1145/2393216.2393228 dblp:conf/ccseit/SahaBB12 fatcat:uqri4hlhazdmvbdz3rjmzkseym

Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network

Himadri Nath Saha, Rohit Singh, Debika Bhattacharyya, P.K. Banerjee
2015 Foundations of Computing and Decision Sciences  
With advent of technology MANET is becoming more and more ubiquitous, and so is the vulnerability of such networks to attacks. In this paper, we propose a secure, lightweight, on-demand routing protocol for MANETs. It uses the concept of fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that neighbor or not. To combat attacks efficiently new packets like report and recommendation are used. After receiving a few of these packets a node can conclude
more » ... ut the behavior of a node, thereby identifying and blacklisting the malicious nodes. We try to impose bounds for the fidelity with reference to the battery of the node, which restricts a node to increase its fidelity to infinity and become dominant in the network. This protocol not only finds a secure route to transmit data, but also identifies the malicious nodes in the network. Our protocol exhibits high packet delivery fraction, with low normalized routing load and low end to end delay; which has been observed while simulating in GloMoSim platform. We have observed that our protocol performs not only better than other existing secure routing protocol in a malicious environment, but also combats, many attacks which have not been dealt with these protocols.
doi:10.1515/fcds-2015-0016 fatcat:f7kqchf3qbfjxnuau5edr7wesm

Interactions amongDrosophilaNuclear Envelope Proteins Lamin, Otefin, and YA

Michal Goldberg, Huihua Lu, Nico Stuurman, Ruth Ashery-Padan, Aryeh M. Weiss, Jing Yu, Debika Bhattacharyya, Paul A. Fisher, Yosef Gruenbaum, Mariana F. Wolfner
1998 Molecular and Cellular Biology  
The nuclear envelope plays many roles, including organizing nuclear structure and regulating nuclear events. Molecular associations of nuclear envelope proteins may contribute to the implementation of these functions. Lamin, otefin, and YA are the threeDrosophilanuclear envelope proteins known in early embryos. We used the yeast two-hybrid system to explore the interactions between pairs of these proteins. The ubiquitous major lamina protein, lamin Dm, interacts with both otefin, a peripheral
more » ... otein of the inner nuclear membrane, and YA, an essential, developmentally regulated protein of the nuclear lamina. In agreement with this interaction, lamin and otefin can be coimmunoprecipitated from the vesicle fraction ofDrosophilaembryos and colocalize in nuclear envelopes ofDrosophilalarval salivary gland nuclei. The two-hybrid system was further used to map the domains of interaction among lamin, otefin, and YA. Lamin's rod domain interacts with the complete otefin protein, with otefin's hydrophilic NH2-terminal domain, and with two different fragments derived from this domain. Analogous probing of the interaction between lamin and YA showed that the lamin rod and tail plus part of its head domain are needed for interaction with full-length YA in the two-hybrid system. YA's COOH-terminal region is necessary and sufficient for interaction with lamin. Our results suggest that interactions with lamin might mediate or stabilize the localization of otefin and YA in the nuclear lamina. They also suggest that the need for both otefin and lamin in mediating association of vesicles with chromatin might reflect the function of a protein complex that includes these two proteins.
doi:10.1128/mcb.18.7.4315 pmid:9632815 pmcid:PMC109015 fatcat:7jvtjmh2ifbgzn2xnjshvt3qzy

Implementation of a personal area network for secure routing in MANETs by using low-cost hardware

Himadri Nath SAHA, Rohit SINGH, Debika BHATTACHARYYA, Pranab Kumar BANERJEE
2017 Turkish Journal of Electrical Engineering and Computer Sciences  
Presently, mobile ad hoc networks (MANETs) are being used extensively in the defense, private, domestic, etc. fields and each of these emulates a personal area network (PAN). A MANET does not require any infrastructure; moreover, it can behave as a mobile network. These features have boosted the popularity of MANETs in the community. As more and more fields become dependent on MANETs, the system needs to be more energy aware and low cost. To commercialize MANETs, the routing protocols need to
more » ... lightweight, secure, and energy efficient, and the hardware on which it is to be implemented should be low cost at the same time. In this paper, we have proposed a lightweight, energy aware, secure routing model for MANETs, which has been implemented on low-cost hardware. Our model uses fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that secure neighbor or not. It also uses packets like Report and Recommendation that help the protocol to detect and eliminate the malicious nodes from the network. To make the protocol energy aware we have formulated new battery thresholds, so that the battery can be monitored and losses can be minimized. To observe the results we implement this protocol in hardware, on the Arduino platform, which is a scalable, reliable, cheap, and open source. We observe that our protocol exhibits high packet delivery fraction, low normalize routing load, and low end to end delay, compared to existing secure routing protocols.
doi:10.3906/elk-1501-112 fatcat:iv4kaettxrgufphqksba7ndoba

Molecular Cloning and Characterization of a Mouse Homolog of Bacterial ClpX, a Novel Mammalian Class II Member of the Hsp100/Clp Chaperone Family

Sandro Santagata, Debika Bhattacharyya, Fu-Hou Wang, Netai Singha, Andrew Hodtsev, Eugenia Spanopoulou
1999 Journal of Biological Chemistry  
In this paper, we present the molecular cloning and characterization of a murine homolog of the Escherichia coli chaperone ClpX. Murine ClpX shares 38% amino acid sequence identity with the E. coli homolog and is a novel member of the Hsp100/Clp family of molecular chaperones. ClpX localizes to human chromosome 15q22.2-22.3 and in mouse is expressed tissue-specifically as one transcript of ϳ2.9 kilobases (kb) predominantly within the liver and as two isoforms of ϳ2.6 and ϳ2.9 kb within the
more » ... s. Purified recombinant ClpX displays intrinsic ATPase activity, with a K m of ϳ25 M and a V max of ϳ660 pmol min ؊1 g ؊1 , which is active over a broad range of pH, temperature, ethanol, and salt pa- rameters. Substitution of lysine 300 with alanine in the ATPase domain P-loop abolishes both ATP hydrolysis and binding. Recombinant ClpX can also interact with its putative partner protease subunit ClpP in overexpression experiments in 293T cells. Subcellular studies by confocal laser scanning microscopy localized murine ClpX green fluorescent protein fusions to the mitochondria. Deletion of the N-terminal mitochondrial targeting sequence abolished mitochondrial compartmentalization. Our results thus suggest that murine ClpX acts as a tissue-specific mammalian mitochondrial chaperone that may play a role in mitochondrial protein homeostasis.
doi:10.1074/jbc.274.23.16311 pmid:10347188 fatcat:etg5bdradnhtfjar5b2q7gqh3e

A REVIEW ON ATTACKS AND SECURE ROUTING PROTOCOLS IN MANET

Himadri Saha, Debika Bhattacharyya, Bipasha Banerjee, Sulagna Mukherjee, Rohit Singh, Debopam Ghosh
2013 International Journal of Innovative Research and Review   unpublished
MANET (mobile ad-hoc network) is a network model which is infrastructure-less. It consists of mobile networks which are free to move and the communication between them are wireless. Due to lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The conventional method of certificate revocation is not applicable in such mobile communication. The prominent routing protocols we know are generally designed for non-adversarial
more » ... where the nodes within a network are non-malicious, unselfish and well-behaving. The reality however is that in any network, there are likely to be malicious, selfish or miss-behaving nodes which have intentions of disrupting the routing protocol. Owing to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb the development of it. In this paper we make a review of all the threats faced by the commonly known routing protocols, and classify these attacks. Brief descriptions of these attacks are given, mainly emphasizing on the network level attacks. Further we briefly review the existing secured MANET routing protocols to tackle these attacks and discuss their efficiency and shortcomings.
fatcat:4tviztazojflxjid4vaesqtpja

Editorial for Vol 24, No 1

Vlado Glavinić
2016 Journal of Computing and Information Technology  
Rohit Singh, Himadri Nath Saha, Debika Bhattacharyya and Pranab Kumar Banerjee describe in their paper Administrator and Fidelity Based Secure Routing (AFSR) Protocol in MANET a secure proactive routing  ... 
doi:10.20532/cit.2016.1003262 fatcat:fszr564singflbn4bwa3e2nmpa

Detection of Sybil Attacks in Structured P2P Overlay Network

Manjari Kaushik, Kamal Kr., Gulista Khan, Rahul Rathore
2016 International Journal of Computer Applications  
Debika Bhattacharyya, Dr. P. K.Banerjee [4] :-Sybil attack is a serious threat for today"s wireless adhoc networks.  ... 
doi:10.5120/ijca2016908466 fatcat:mv6asni26jgnvd3clw4edskx3y

Power and Trust based Secured Routing Approach in MANET

Arnab Banerjee
2012 International Journal of Security Privacy and Trust Management  
Debika Bhattacharyya who have guided us through the course of our work  ... 
doi:10.5121/ijsptm.2012.1304 fatcat:sb4sn6h74bgkrchwyuuo2fiyxi
« Previous Showing results 1 — 15 out of 16 results