Browsing by Author "Sidhu, Navjot"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Advance Stable Election Protocol in Wireless Sensor Network(Excel India Publishers, 2014) Singh, Mandeep; Sidhu, NavjotWireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering is main technique used for this. Various protocols like SEP (Stable Election Protocol) and ESEP (Extended Stable Election Protocol) are clustering based heterogeneous aware protocols. In this paper, a new protocol ASEP (Advance Stable Election Protocol) has been proposed based on SEP. This is based on changing more efficiently and dynamically the cluster head election probability. Performance of this protocol has been evaluated in MATLAB and graphical results have been shown. The performance of ASEP is better than SEP in form of first node dies and total number of packets delivered.Item Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing(IASIR, 2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.Item Impact of Denial of Service Attack on the Virtualization in Cloud Computing(2014) Kanika; Sidhu, NavjotCloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the Internet. Cloud computing offers infrastructure as a service (IaaS). IaaS provides infrastructure including software, hardware, storage space, network bandwidth to the users on demand over the internet. Cloud computing makes use of virtualization to provide infrastructure as a service. Virtualization is based on the concept that multiple tenants can use the same physical machine with multiple operating systems. Virtualization comprises the vulnerability of Denial of Service (DOS) attack that can affect the performance of cloud computing. A malicious VM attacker can compromise the other guest VM or the host OS. The paper explores the TCP SYN flood attack over the other guest VM by a malicious VM attacker coexisting in the virtualized cloud infrastructure. Different Parameters are analyzed over the victim VM to detect the TCP SYN flood attack