Browsing by Author "Meenakshi"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item Analysis of VANET geographic routing protocols on real city map(Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, H.; MeenakshiVehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET protocols are classified as topology based and position based protocols. Research showed that position based protocols are more suited to VANETs as compared to topology based protocols because geographic routing does not involve an overhead and delay of maintaining routing tables instead geographic position of nodes is used for routing which can be obtained by Global Positioning System (GPS) device on vehicles. In this paper, two geographic routing protocols Anchor based Street and Traffic Aware Routing (A-STAR) and Greedy Perimeter Stateless Routing (GPSR) protocols are evaluated on real city map. Simulation of VANETs on real map scenarios provide accurate results and also useful to design and deploy VANETs in real world. Real world mobility model is important because it reflects real-world performance of protocols considered. Analysis of performance is carried in terms of throughput, packet delivery ratio, packet loss and average delay. Simulation of protocols is carried by varying density of nodes. A-STAR showed better performance on real city map over GPSR because A-STAR adopted Street awareness method of routing whereas GPSR works on Greedy forwarding and Routing around the perimeter methods. ? 2017 IEEE.Item Comparison and analysis of logistic regression, Na�ve Bayes and KNN machine learning algorithms for credit card fraud detection(Springer Science and Business Media B.V., 2020-02-15T00:00:00) Itoo, Fayaz; Meenakshi; Singh, SatwinderFinancial fraud is a threat which is increasing on a greater pace and has a very bad impact over the economy, collaborative institutions and administration. Credit card transactions are increasing faster because of the advancement in internet technology which leads to high dependence over internet. With the up-gradation of technology and increase in usage of credit cards, fraud rates become challenge for economy. With inclusion of new security features in credit card transactions the fraudsters are also developing new patterns or loopholes to chase the transactions. As a result of which behavior of frauds and normal transactions change constantly. Also the problem with the credit card data is that it is highly skewed which leads to inefficient prediction of fraudulent transactions. In order to achieve the better result, imbalanced or skewed data is pre-processed with the re-sampling (over-sampling or under sampling) technique for better results. The three different proportions of datasets were used in this study and random under-sampling technique was used for skewed dataset. This work uses the three machine learning algorithms namely: logistic regression, Na�ve Bayes and K-nearest neighbour. The performance of these algorithms is recorded with their comparative analysis. The work is implemented in python and the performance of the algorithms is measured based on accuracy, sensitivity, specificity, precision, F-measure and area under curve. On the basis these measurements logistic regression based model for prediction of fraudulent was found to be a better in comparison to other prediction models developed from Na�ve Bayes and K-nearest neighbour. Better results are also seen by applying under sampling techniques over the data before developing the prediction model. � 2020, Bharati Vidyapeeth's Institute of Computer Applications and Management.Item Development of a Web Application for Computing Trade Indicators(International Journal of Research and Analytical Reviews., 2018) Harshvardhan; Meenakshi; Kaur, SandeepItem Implementation and analysis of enhanced obfuscation technique for data security(Blue Eyes Intelligence Engineering and Sciences Publication, 2019) Tanuja; MeenakshiWith the fast development of digital exchange of data in an electronic way, data and information security are becoming more important in both transmission and data storage. Cryptography is used as a solution which plays an important role in data and information security systems against malicious attacks. The encryption technique is used to provide confidentiality to the data during transmission because security threats are more on data during transmission than data at rest. One can also use encryption to secure user's data at data storage (i.e., data at rest). But an encryption algorithm consumes a more amount of computing resources such as processing power, memory and computation time. Obfuscation technique is a very lightweight technique that comes into a picture to protect the data at storage from malicious attacks. There are many obfuscation techniques are available to ensure the confidentiality of the data. In this paper, an obfuscation technique has been proposed and implemented which uses a 128-bit key to improve the security of the data. The experimental results show that the time taken for obfuscation and de-obfuscation is less and also from the security point of view it provides high avalanche effect.Item Performance evaluation of manet routing protocols dsdv, tora enhanced tora(Central University of Punjab, 2014) Kaur, Amandeep; MeenakshiWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the globe. Mobile ad hoc networks (MANETs) are a kind of infrastructure less wireless networks in which all the nodes act as peers and themselves configure the network. Mobile ad hoc networks are an open area of research because of its applicability in a number of areas like tactical networks, emergency services and education. One of the major challenges in networking is the efficient, accurate, reliable, secure and immediate delivery of data from source to destination. Therefore, the efficient routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been developed to send data efficiently across mobile ad hoc networks. These protocols have been divided into three categories- Proactive, Reactive and Hybrid. The performance evaluation of these protocols has been going on since a long time. Most of the current research focuses on the pause times, simulation times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models and traffic patterns. This dissertation work is focused on the improvement of the poor performance of TORA with the rise in number of traffic connections. This behavior has been credited to the link sensing mechanism of Internet MANET Encapsulation protocol (IMEP). IMEP is a multi-purpose network-layer protocol that supports the operation of many routing protocols including TORA. It provides mechanism for sensing the status of links in TORA. This link sensing mechanism has been investigated and proposed modification by K. H. Lim and A. Datta has been implemented to observe improvement in the overall performance of Enhanced-TORA protocol in comparison with original TORA. iv Through this research, investigations have been made into the behavior of DSDV, and TORA mobile ad hoc routing protocols by varying the underlying mobility models (Random Waypoint, Random Direction and Manhattan Grid model) and Traffic patterns (FTP, TELNET, HTTP). The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead, Packet Delivery Ratio and Packet Loss. This research draws an analysis whether under which mobility model and traffic pattern combination these protocols give the best performance. Results show that DSDV gives best performance under Manhattan Grid Mobility model and FTP traffic pattern. Whereas, TORA and Enhanced-TORA give best performance under Random Direction Mobility model and FTP traffic. The performance of Enhanced-TORA is then compared with original TORA using 10 traffic connections under Random Direction mobility model and FTP Traffic and it was observed that Enhanced-TORA outperformed original TORA thereby eliminating the problem of performance degradation with rise in number of connectionsItem Security analysis of AODV, ARAN and improved mobile adhoc networks routing protocols(Central University of Punjab, 2014) Goel, Ruby; MeenakshiWireless networks use wireless connections to provide a communication environment between the communicating devices using their radio transmission range. Wireless network doesn?t require any pre-established infrastructure. Adhoc network is an infrastructure-less network which allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile nodes. Wireless communication is guided by routing protocols. Wireless routing protocols come under different categories like- On-demand, Table-driven and secure routing protocols. Wireless networks face many challenges due to limited resources, dynamic topologies and lack of physical security, due to which variety of attacks have been identified that target both the on-demand and table- driven routing protocols. By attacking the routing protocols attacker can absorb network traffic, or can inject the false traffic in the network. Due to this attacks like- Blackhole, IP-Spoofing, False message fabrication, Denial of service, etc. are possible in adhoc networks. Many secure routing protocols have been developed that can deal with these attacks. One of them is Authenticated Routing for Adhoc Network (ARAN) which introduces authentication, message integrity and non- repudiation as part of its security policy and provides security against various network attacks like- Message modification, false message fabrication and impersonation attack. But ARAN is vulnerable to Distributed Denial of Service (DDOS) attack because legitimate nodes can send large amount of unnecessary packets in the network and can create congestion and thus prevent other legitimate nodes to access the network. In this research work security aspects of ARAN have been analyzed with respect to Adhoc On-Demand Distance Vector (AODV) routing protocol under Blackhole and IP-Spoofing attack. Further a technique has been proposed for ARAN to resist DDOS attack by limiting the number of packets per unit of time each node can send in the network and this enhanced ARAN in this research work is called as improved ARAN (i-ARAN). By implementing the proposed technique i- ARAN is able to prevent DDOS attack. Various performance metrics like- Packet Delivery ratio, Average Path Length, Average end-to-end delay and Throughput; iv are calculated under Glomosim-2.03 simulator. Results show that ARAN is safe against Blackhole and IP-Spoofing attack, but AODV is highly vulnerable to both the attacks. Also results of i-ARAN under DDOS attack show that the attack can be prevented by the proposed technique as it provides constant Packet delivery ratio from all the source nodes and throughput of i-ARAN is also approximately constant. By using i-ARAN there is no congestion in the network so average end- to-end delay of i-ARAN is less than the ARAN.