S. V. N. Santhosh Kumar
YOU?
Author Swipe
View article: A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs
A Dickson polynomial based group key agreement authentication scheme for ensuring conditional privacy preservation and traceability in VANETs Open
View article: A fuzzy based chicken swarm optimization algorithm for efficient fault node detection in Wireless Sensor Networks
A fuzzy based chicken swarm optimization algorithm for efficient fault node detection in Wireless Sensor Networks Open
Wireless Sensor Networks (WSN) are built with miniature sensor nodes (SN), which are deployed into the geographical location being sensed to monitor environmental conditions, which transfer the sensed physical information to the base stati…
View article: Energy Efficient Secured PSO Optimized Clustering and Data Aggregation Routing Protocol for Wireless Sensor Networks
Energy Efficient Secured PSO Optimized Clustering and Data Aggregation Routing Protocol for Wireless Sensor Networks Open
In Wireless Sensor Networks (WSNs), sensor nodes are placed to sense and collect data. Due to the energy constraint nature of WSN, optimising the energy during the data dissemination is a major concern. To solve this problem, data aggregat…
View article: Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN
Retraction Note: Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN Open
View article: A Novel Transfer Learning Based Kidney Stone Detection Using ResNet50
A Novel Transfer Learning Based Kidney Stone Detection Using ResNet50 Open
The kidneys are essential for human health because they maintain vital functions such as blood filtration and electrolyte balance.Detecting kidney stones is a significant medical imperative, requiring precise diagnosis to ensure timely int…
View article: A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems
A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems Open
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data trans…
View article: Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things
Energy Efficient Trust Aware Secured Lightweight Authentication Protocol for Efficient Reprogramming in Internet of Things Open
Internet of Things (IoT) is the collection of physical things that consist of integrated technologies to interact, sense and collaborate in the deployed environment. Data dissemination is a network management service that is provided to no…
View article: An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks
An Intrusion Detection System for Securing IoT Based Sensor Networks from Routing Attacks Open
View article: A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things
A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things Open
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as …
View article: An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things
An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things Open
The Internet of Things (IoT) is an important and a major key component to support human life. Sensors are the sensing devices that play an important role in IoT to detect environmental conditions. The significance of IoT is increasing due …
View article: CAPSO: Chaos Adaptive Particle Swarm Optimization Algorithm
CAPSO: Chaos Adaptive Particle Swarm Optimization Algorithm Open
As an influential technology of swarm evolutionary computing (SEC), the particle swarm optimization (PSO) algorithm has attracted extensive attention from all walks of life. However, how to rationally and effectively utilize the population…
View article: Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks
Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks Open
Intrusion detection systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known types of attacks. However, it neglects to recog…
View article: Energy Efficient and Secured Data Dissemination in Wsn
Energy Efficient and Secured Data Dissemination in Wsn Open
Data dissemination is a high level application service, provided to WSN to update the configuration parameter to make the node perform intended services. The configuration parameters of the nodes are updated by means of reprogramming and r…
View article: Energy Efficient Secured Ring Based Clustering Protocol for WSN
Energy Efficient Secured Ring Based Clustering Protocol for WSN Open
WSN is a gathering of small autonomous nodes that are used to function the Natural Phenomenon. The sensed events are transmitted to the base station for processing the system. Given the Resource Constrained Nature of WSN, Optimizing the en…
View article: Energy Efficient Fuzzy Based Dynamic Routing Protocol in Wireless Sensor Network
Energy Efficient Fuzzy Based Dynamic Routing Protocol in Wireless Sensor Network Open
A wireless sensor network is a collection of tiny nodes, which are deployed in the given environment to sense the events. The sensed events are transmitted to the base sensor through multi hop communication for the energy efficient purpose…
View article: Energy Efficient Rule based intelligent routing using Fitness Functions in Wireless Sensor Networks
Energy Efficient Rule based intelligent routing using Fitness Functions in Wireless Sensor Networks Open
Wireless Sensor Networks (WSNs) is a distributed collection of tiny wireless nodes which forms an ad hoc network dynamically to sense the natural phenomenon and sent it to the control station. Due to the resource constrained nature of WSN,…
View article: Comparison of Routing Convention in Manet: a Survey
Comparison of Routing Convention in Manet: a Survey Open
MANET is a truncation for a special versatile appointed system.It is additionally alluded to as a remote impromptu system and it is a continuous self-designing, framework-free system of phones that are associated with no utilizing wires.In…
View article: Privacy Preserving with Enhanced Access Control for Distributed Data Dissemination in WSN
Privacy Preserving with Enhanced Access Control for Distributed Data Dissemination in WSN Open
Dissemination is a service provided for WSN to update the deployed sensor nodes online by using over air programming through radio communication. Since centralized data dissemination approach suffers from the limitations of single point of…