Wireless Communications and Mobile Computing, 2022
Random deployment, the absence of central authority, and the autonomous nature of the network mak... more Random deployment, the absence of central authority, and the autonomous nature of the network make wireless sensor networks (WSNs) prone to security threats. Security, bandwidth, poor connectivity, intrusion, energy constraints, and other challenges are critical and could affect the performance of the WSN while considering the energy-efficient and secure routing protocols in WSNs. Security threats to WSNs are gradually being expanded. Thus, to improve the network’s performance, detection of anomalies (malicious and suspicious nodes, redundant data, bad connections, etc.) is important. This paper is aimed at introducing the malicious node detection algorithm based on the DBSCAN algorithm, which is a density-based unsupervised learning method for enabling wireless sensor networks to be much more secure and reliable. The prime objective of this algorithm is to develop a routing algorithm capable of detecting malicious nodes and having a prolonged network lifespan and higher stability p...
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of co... more To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performanc...
2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2021
Statistical and Neural Machine translation techniques are based on the parallel data used for tra... more Statistical and Neural Machine translation techniques are based on the parallel data used for training models. The general belief is that more training data would result in better models. We studied the available corpora and ambient noises present in them. It revealed that the available data is highly noisy. The paper describes various types of noises present in there and how these are identified. Different types of noise filters are developed and normalization processes have been applied on the corpora. Statistical and neural machine translation models are trained to study the impact of cleaning of noisy data. We performed experiments with noisy data and with cleaned data after discarding noisy data from the training corpus. Standard test set WMT-14 has been used for performing evaluation. The quality of machine translation has been measured through BLEU scores. It was observed that even after discarding a significant volume of noisy data, the models without noisy data performed better than the corpus containing noises. It proves that quality of data has significant impact and mere having huge piles of uncleaned data in not a good choice. The test case presented here is for English-Hindi language pair. It also shows a path that for low resource language pairs, paying attention to the quality of data would bring returns in form of better translation performance. As the noises discussed in paper are general in nature, the findings should be true for any other Indian language pair also, due to inherent similarity among Indian languages.
Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives the... more Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives them the capability to effectively sense, communicate, and compute parameters. However, the security and life span of a WSN node is a primary concern. This paper is focused on introducing a mathematical model of a modified Multitier Deterministic Energy-Efficient Clustering (DEC) based on novel election multi-tier random probability protocol for agricultural WSNs to enhance the life span of a WSN node along with a comparison of it with existing DEC protocol. In the proposed model, the selection of cluster heads, (CH), is done based on the energy drain pattern and location of the sensor nodes, which increased the lifespan of sensor nodes. In addition, several WSN probabilistic routing protocols to save energy throughout data transmissions like Low Energy Adaptive Clustering Hierarchy (LEACH), Power-Efficient Gathering in Sensor Information Systems (PEGASIS), DEC, and Stable Election Protocol...
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015
This paper presents the hardware design procedure (principles and practices) required to convert ... more This paper presents the hardware design procedure (principles and practices) required to convert a specification in the hardware representation of the given design. The paper first examines general design principles required to guarantee optimum performance of the system to be designed such as pipelining and sequencing using finite state machines (FSM). The general hardware design methodology is then presented after which the hardware implementation of the designed system will be discussed. Finally, the procedure to be used for verifying and validating the implemented system has been presented.
2008 Second Asia International Conference on Modelling & Simulation (AMS), 2008
... GS Tomar; Member IEEE Rustamji Institute of Technology, Tekanpur, Gwalior 475005 India E-mail... more ... GS Tomar; Member IEEE Rustamji Institute of Technology, Tekanpur, Gwalior 475005 India E-mail:[email protected] ... 2001. 6. Rajiv Misra, CR Mandal, Performance Comparison of AODV/DSR On Demand Routing Protocols for Ad hoc Networks in Constrained situation IEEE ...
2011 International Conference on Communication Systems and Network Technologies, 2011
Shreyansh Jain Automation and Control System Lab Honeywell Technolgy Solutions Lab, Bangalore, In... more Shreyansh Jain Automation and Control System Lab Honeywell Technolgy Solutions Lab, Bangalore, India e-mail: [email protected] ... Geetam S Tomar Machine Intelligence Research Labs 223 New Jiwaji Nagar, Thatipur Gwalior 474011 India e-mail: ...
Wireless Communications and Mobile Computing, 2022
Random deployment, the absence of central authority, and the autonomous nature of the network mak... more Random deployment, the absence of central authority, and the autonomous nature of the network make wireless sensor networks (WSNs) prone to security threats. Security, bandwidth, poor connectivity, intrusion, energy constraints, and other challenges are critical and could affect the performance of the WSN while considering the energy-efficient and secure routing protocols in WSNs. Security threats to WSNs are gradually being expanded. Thus, to improve the network’s performance, detection of anomalies (malicious and suspicious nodes, redundant data, bad connections, etc.) is important. This paper is aimed at introducing the malicious node detection algorithm based on the DBSCAN algorithm, which is a density-based unsupervised learning method for enabling wireless sensor networks to be much more secure and reliable. The prime objective of this algorithm is to develop a routing algorithm capable of detecting malicious nodes and having a prolonged network lifespan and higher stability p...
To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of co... more To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performanc...
2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2021
Statistical and Neural Machine translation techniques are based on the parallel data used for tra... more Statistical and Neural Machine translation techniques are based on the parallel data used for training models. The general belief is that more training data would result in better models. We studied the available corpora and ambient noises present in them. It revealed that the available data is highly noisy. The paper describes various types of noises present in there and how these are identified. Different types of noise filters are developed and normalization processes have been applied on the corpora. Statistical and neural machine translation models are trained to study the impact of cleaning of noisy data. We performed experiments with noisy data and with cleaned data after discarding noisy data from the training corpus. Standard test set WMT-14 has been used for performing evaluation. The quality of machine translation has been measured through BLEU scores. It was observed that even after discarding a significant volume of noisy data, the models without noisy data performed better than the corpus containing noises. It proves that quality of data has significant impact and mere having huge piles of uncleaned data in not a good choice. The test case presented here is for English-Hindi language pair. It also shows a path that for low resource language pairs, paying attention to the quality of data would bring returns in form of better translation performance. As the noises discussed in paper are general in nature, the findings should be true for any other Indian language pair also, due to inherent similarity among Indian languages.
Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives the... more Wireless Sensor Networks (WSNs) may be incorporated with thousands of small nodes. This gives them the capability to effectively sense, communicate, and compute parameters. However, the security and life span of a WSN node is a primary concern. This paper is focused on introducing a mathematical model of a modified Multitier Deterministic Energy-Efficient Clustering (DEC) based on novel election multi-tier random probability protocol for agricultural WSNs to enhance the life span of a WSN node along with a comparison of it with existing DEC protocol. In the proposed model, the selection of cluster heads, (CH), is done based on the energy drain pattern and location of the sensor nodes, which increased the lifespan of sensor nodes. In addition, several WSN probabilistic routing protocols to save energy throughout data transmissions like Low Energy Adaptive Clustering Hierarchy (LEACH), Power-Efficient Gathering in Sensor Information Systems (PEGASIS), DEC, and Stable Election Protocol...
2015 Fifth International Conference on Communication Systems and Network Technologies, 2015
This paper presents the hardware design procedure (principles and practices) required to convert ... more This paper presents the hardware design procedure (principles and practices) required to convert a specification in the hardware representation of the given design. The paper first examines general design principles required to guarantee optimum performance of the system to be designed such as pipelining and sequencing using finite state machines (FSM). The general hardware design methodology is then presented after which the hardware implementation of the designed system will be discussed. Finally, the procedure to be used for verifying and validating the implemented system has been presented.
2008 Second Asia International Conference on Modelling & Simulation (AMS), 2008
... GS Tomar; Member IEEE Rustamji Institute of Technology, Tekanpur, Gwalior 475005 India E-mail... more ... GS Tomar; Member IEEE Rustamji Institute of Technology, Tekanpur, Gwalior 475005 India E-mail:[email protected] ... 2001. 6. Rajiv Misra, CR Mandal, Performance Comparison of AODV/DSR On Demand Routing Protocols for Ad hoc Networks in Constrained situation IEEE ...
2011 International Conference on Communication Systems and Network Technologies, 2011
Shreyansh Jain Automation and Control System Lab Honeywell Technolgy Solutions Lab, Bangalore, In... more Shreyansh Jain Automation and Control System Lab Honeywell Technolgy Solutions Lab, Bangalore, India e-mail: [email protected] ... Geetam S Tomar Machine Intelligence Research Labs 223 New Jiwaji Nagar, Thatipur Gwalior 474011 India e-mail: ...
Uploads
Papers by Geetam Tomar