• Publications
  • Influence
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
TLDR
The objective of the present paper is to make microscopic analysis of behavior of hybrid covert channel with a clearly understanding of theoretical literatures of composed covert channels. Expand
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
TLDR
A study of multi-trapdoor covert channels is presented and design of a new detection engine for hybrid covert channel in transport layer visualized in TCP and SSL is introduced. Expand
A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks
TLDR
This paper proposes a complete set of low complexity protocols to generate and distribute two types of secret keys for a clustered hierarchical network. Expand
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
TLDR
A basic key management protocol to generate and distribute the keys required for a secure group communication system, which also preserves the backward and forward secrecies is discussed. Expand
Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks
TLDR
Two major schemes are proposed: 1) a post-deployment key distribution based permanent key establishment scheme 2) two on-the-fly key establishment schemes that are better suited for intrusion confirmation in energy constrained sensor networks. Expand
Cascket: A binary protocol based c client-driver for Apache Cassandra
TLDR
This paper proposes a driver, `Cascket' that allows direct communication of Cassandra over C without the existence of a middle-ware, and is proposed to be one of the leading NoSQL Databases drivers for C. Expand
Perceive Core Logical Blocks of a C Program Automatically for Source Code Transformations
TLDR
A novel method to identify the core logical blocks of any C source code, which mainly consists of two steps: source code entity identification and dependency identification. Expand
Estimation of communication overhead during Pair-wise key establishment in wireless sensor networks
TLDR
An analysis of communication overhead for executing the essentially required security protocols for these networks, centralized and distributed in nature, shows that the communication overhead of centralized scheme is 65% less compared to the distributed scheme. Expand
Secure process migration in cloud for load balancing and energy efficiency
TLDR
A load balancing solution on basis of CPU, memory and IO using process migration between the VMs of the cloud is proposed, which balances the load in such a way that the use of energy efficiency techniques like DVFS can be maximised. Expand
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters
TLDR
Comparison analysis of time taken for encryption by seven symmetric key cryptographic algorithms with variation of parameters like different data types, data density, data size and key sizes is provided. Expand
...
1
2
...