6 results on '"Mahariya, Satish Kumar"'
Search Results
2. Strategies for detecting and mitigating of Vampire attack in WSN network: A review.
- Author
-
Mahariya, Satish Kumar, Pandey, Mukesh, Malav, Anuraj, Rana, Arti, Ramnarayan, Vaqur, Musheer, and Bisht, Yashwant Singh
- Subjects
- *
WIRELESS sensor nodes , *VAMPIRES , *SENSOR networks , *ENERGY consumption , *INVENTORY control , *INTRUSION detection systems (Computer security) , *AD hoc computer networks - Abstract
In this study we discussed Challenges and Constraints of WSN and different types of attack in the Wireless Sensor Node (WSN) networks. WSN is an ad-hoc low-cost and low-power wireless network in which sensor nodes work together to track and collect data from their surroundings before broadcasting it to other nodes. WSN's sensing and ubiquitous computational capabilities opened up a slew of new uses, expanding research opportunities. WSN has been used in a variety of settings, should include military, land, hygiene, and inventory management. Although energy is a significant factor for sensor nodes, a new form of attack has been identified that destroys the networks by draining the sensor network's battery life. This kind of power draining attack is referred to as a "Vampire attack", and it is not exclusive to any routing protocol. This study examines several strategies for detecting and mitigating this attack, which increases network energy usage, as well as principles for limiting the harm caused by vampires. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Fog and edge computing: State-of-art, application and challenges in IoT.
- Author
-
Verma, Sudhani, Joshi, Pooja, Pandey, Mahima Shankar, Baloni, Dev, Malav, Anuraj, and Mahariya, Satish Kumar
- Subjects
TECHNOLOGICAL innovations ,INTERNET of things ,EDGE computing ,CLOUD computing ,BIG data - Abstract
With the developments of the Internet of Things (IoT), the number of connected devices has increased and hasbecome an integral part of our daily lives and environment. The data generated from these devices is huge, hence conventional cloud computing paradigm has become inadequate in addressing challenges such as excessive latency, bandwidth limitations, and resource limitations. As a result, new computational paradigms such as Fog Computing (FC) and Edge Computing (EC) have been proposed to address the former's challenges in processing large amounts of data generated from safety-critical and time-sensitivesystems. The goal of these novel computing solutions is to deliver storage and computing power at the network's edge, reducing network traffic and overcoming many of cloud computing's disadvantages. This paper outlines the state-of-art fog and edgecomputing followed by a comprehensive analysis of their characteristics. A comparative analysis of these emerging technologies with Cloud Computing (CC) is also presented. Fog and edge computing are very important for emerging technologies like IoT, Big data analytics, we conclude this article by outlining the applications and security challenges of both computing paradigms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Smart target tracking and localization protocol in WSNs.
- Author
-
Vaqur, Musheer, Chaudhary, Prashant, Gupta, Somil Kumar, Mahariya, Satish Kumar, Memoria, Minakshi, and Pandey, Mukesh
- Subjects
WIRELESS sensor nodes ,LOCALIZATION (Mathematics) ,WIRELESS sensor networks ,MULTIPLE target tracking ,ROUTING algorithms ,FAILURE (Psychology) ,ARTIFICIAL satellite tracking - Abstract
Detecting and multiple target object tracking plays a vital role in the field of surveillance applications such as agriculture, forest, and military applications. Detecting and tracking the moving object using the wireless sensor networks is an intrinsic challenge due to the limited battery backup of the wireless node has the main impact on life time of networks. enhancing the overall life span of wireless sensor node while maintaining the sensing coverage is the key challenges in the construction of wireless sensor node specially the harsh environment. So, to enhance the efficiency of network, there are various routing algorithm to minimize the usage of the active sensor node. However, these existing algorithms mainly oriented towards the target for covering the node and avoiding the failure. In this paper, we are proposing Smart target tracking and localization protocol STTLP algorithm for wireless sensor node that coverage the target node while minimizing the battery consumption. The proposed STTLP algorithms ensure to preserve sensing coverage while achieving energy efficiency by maximizing the network battery backup. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Air pollution monitoring system by LoRa-IoT enabled smart sensors.
- Author
-
Rana, Arti, Rawat, Arvind Singh, Raiwani, Y. P, Kirola, Madhu, Singh, Devendra, Mahariya, Satish Kumar, Rajput, Kapil, and Priyadarshi, Neeraj
- Subjects
AIR pollution monitoring ,INTELLIGENT sensors ,INDUSTRIAL gases ,GREENHOUSE effect ,SOCIAL problems - Abstract
Over decade industrial gases across the world have a high-risk index, becoming considered one of the most worrisome environmental problems in the world. On the consequences of concern these industrial gases that emit the greenhouse effect and that in the long term they harm the environment. These are some factors that are dangerous to humans, causing respiratory problems, as well as death fromvarious diseases originated by these gases, on other hand, the soil is also affected causing the ability to absorb nutrients to decrease or become non-fertile soil or dead. Therefore, there is a necessity to analyze the possible solutions. Under this study evaluation of the parameters to prevent these environmental variants using Long Range-IoT based components to be able to process the information and visualize them through graphics using an application to avoid and warn the effects of harmful gasses using sensors. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Optimal resource management in cloud computing.
- Author
-
Malav, Anuraj, Gupta, Somil Kumar, Mahariya, Satish Kumar, Joshi, Kapil, Bhauguna, Rajesh, and Verma, Sudhani
- Subjects
RESOURCE management ,VIRTUAL machine systems ,CLOUD computing ,RESOURCE allocation ,SERVER farms (Computer network management) ,TIME management - Abstract
In modern days, various tools and technologies of cloud computing are widely used in different domains that are offered by cloud service providers on a usage-based payment method. As the number of resources availed may vary from tens to hundreds, it is very challenging to appraise the performance of resource management policies of the cloud computing arena. There are many tools in the form of kits available to simulate and model the cloud environment. Some of them are Green Cloud, Cloud Analyst, GridSim and CloudSim etc. In this research, we have used CloudSim as a simulator which is helpful to do a simulation in Data Center. With the help of scheduling policies, this toolkit may build several virtual machines on a single Data Center node, as well as assign user requests in the form of Cloudlets to virtual machines. In this paper, a study of scheduling of cloudlets using Time โ Shared and Space โ Shared policies using FCFS, and Round Robin resource allocation algorithms have been done and there is a comparison of the results obtained from both the processes based on the different variables like total execution time, the total number of resources etc. The compared result yields the optimized resource management at the end. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.