Sanku Sinha is a highly accomplished DevOps Engineer with over 10 years of technical experience. For the past 3 years, he is working with a UK based Technical Consulting and product company primarily focused on Cloud migration, automation, and optimization.
A MANET (Mobile Ad hoc Network) is a wireless network which is mobile and is deployed for an imme... more A MANET (Mobile Ad hoc Network) is a wireless network which is mobile and is deployed for an immediate or short term purpose. MANETs operate by sharing information among its neighbours and each node in a MANET takes responsibility for information propagation since central coordination is absent. Hence, each node in a MANET implicitly trusts its neighbours for information sharing. Nodes in a MANET are vulnerable to various security threats which seek to exploit the weaknesses of the network. A Black Hole attack is one such attack which seeks to compromise the network by dropping information that is meant for a certain destination. This paper looks at utilizing the inherent trust relationship among the nodes in a MANET by formulating a trust model to recognize the trustworthiness of a node. This trust model makes use of intrusion detection to detect, identify and mitigate Black hole attacks.
File System is a way used by operating systems to store and organize files so that the files can ... more File System is a way used by operating systems to store and organize files so that the files can be accessed efficiently. File system is a component of operating system and it interacts with the abstraction of the underlying hardware known as Block Layer. An open source environment like Linux has over 50 different file systems since its existence. Though, in recent years, the speed of CPUs have been increased and the Hard drive technology have tremendous growth, the file systems have also been evolved so that operating system can provide better performance to the user. To measure the performance of the file systems there are different benchmarks used by different developers. In this work, a study of Linux file system evolution has been carried out. As there are several file systems for different Linux Distributions and different Linux kernel versions, some popular versions of extended file systems like ext, ext2, ext3 and ext4 has been considered. The features and differences on the...
The Zone Routing Protocol (ZRP) is a hybrid routing protocol for MANET which combines the advanta... more The Zone Routing Protocol (ZRP) is a hybrid routing protocol for MANET which combines the advantages of the proactive and reactive approaches by maintaining an up-to-date topological map of a zone centered on each node. Routes within a routing zone are usually maintained by a table driven proactive routing approach whereas for destinations outside the routing zone, ZRP employs a Reactive Routing mechanism thus making an attempt to utilize both the features of proactive as well as reactive routing policy. In this work, a simulation based study has been carried out to explore the behavior of Zone Routing Protocol (ZRP) under an environment where the density of the nodes in the network and more importantly the radius of the routing zone vary considerably. This will throw an insight on the operation of the protocol and understand its sensitivity on varying and fast changing network topology which is most common in any form of wireless networks.
A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network, and is a selfconfiguring n... more A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network, and is a selfconfiguring network of mobile nodes where the mobile nodes are free to move randomly, thus making the network topology dynamic. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. This study is a comparison of two routing protocols proposed for mobile ad-hoc networks. The protocols are: Ad-hoc On demand Distance Vector (AODV) and Protocol Routing (ZRP). The performance of the protocols are analyzed in terms of throughput, average end-to-end delay and normalized routing load which shall provide an insight about the sensitivity of the protocols. Simulation based analysis of the protocols have been carried out using NS-2, an open source simulator. KeywordsAODV, ZRP, MANET, NS-2
A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network which allows mobile compute... more A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network which allows mobile computer users for wireless communication to set up a short lived network for communication needs during movement. The mobile nodes are free to move randomly, thus making the network topology dynamic. Each node operates as a router to forward packets and also acts as an end system. Therefore routing is one of the most concerned areas in these networks. Normal routing protocols which work well in fixed networks do not show the same performance in Mobile Ad Hoc Networks because the requirements differ in the two scenarios. In wireless networks, routing protocols should be more dynamic so that they quickly respond to topological changes which occur frequently in these networks. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. This study is a comparison of three routing protocols proposed for mobile ad-hoc netwo...
Wireless network is the network which is easy to deploy and very easy to access that network and ... more Wireless network is the network which is easy to deploy and very easy to access that network and that network is user friendly. The main reason behind of getting popular is because it provide benefits, like as easy to installation, flexibility, mobility, scalability and reduced cost-of-ownership. But drawback in these wireless networks is that it doesn't provide security as much as required, due to that user faces attacks of various types which are damageable to user informations. One of the serious attack is Identity based attacks which steals the identity of some other user in that network and performed some other attack. The available present security tools to detect such these identity(spoofed MAC) based attacks are quite limited. The proposed wireless Intrusion Detection System (IDS) is Signature based and leveraging the discreet size of the Raspberry Pi. The overall premise of the wireless intrusion system is placing a Raspberry Pi running Kali Linux on a host network. The...
Face recognition is one of the most demanding problems of computer vision and pattern recognition... more Face recognition is one of the most demanding problems of computer vision and pattern recognition. The complexity in face recognition arises because of large variations in the facial appearance variations which are caused by different factors, such as expression, partial face occlusion, illumination, and time difference between training and testing data capture. The performance of face recognition algorithms totally depends on preceding facial feature localization process, i.e. every face image in the training set and testing set needs to be aligned very well before they can be are fed into a face recognition algorithm, which requires particular type of facial feature localization. There are two problems in face recognition system; one is about facial appearance variations due to changes in illumination, expression, partial occlusion, time difference, and another one is inaccurate face alignment due to different localized facial features. For these two problems a number of algorithm...
Advances in Intelligent Systems and Computing, 2018
MANETs (Mobile Ad hoc Networks) are wireless networks that are deployed for a particular purpose ... more MANETs (Mobile Ad hoc Networks) are wireless networks that are deployed for a particular purpose or short-term use. Because of the lack of central coordination, MANETs share an inherent trust relationship among the nodes forming the network. Each node implicitly trusts its neighbour to forward packets in the network till the packets reach their destination. Further, each node in a MANET can monitor its neighbours by keeping track of the packets passing through the neighbours. This characteristic ability of a node in MANET makes it possible to develop a trust model that can correlate with the innate trust shared among the nodes. This paper looks at developing such a trust model which is applied to all the nodes in the network. The trust model works like an Intrusion Detection System (IDS), which seeks to detect blackhole attacks in the system, and then identify and mitigate the malicious attacker.
A Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized multi-hop network where ... more A Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized multi-hop network where the mobile nodes are free to move randomly, thus making the network topology dynamic. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. In this work, an attempt has been made to understand the characteristics/behavior of Ad hoc On Demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) routing protocols when operating in more challenging environment such as frequent change in network topology and node density. The performance differentials are analyzed using throughput, average endto-end delay and normalized routing load which shall provide an insight about the sensitivity of the protocols under consideration when exposed in more challenging environment. Simulation based analysis of the protocols have been done using NS-2.
A MANET (Mobile Ad hoc Network) is a wireless network which is mobile and is deployed for an imme... more A MANET (Mobile Ad hoc Network) is a wireless network which is mobile and is deployed for an immediate or short term purpose. MANETs operate by sharing information among its neighbours and each node in a MANET takes responsibility for information propagation since central coordination is absent. Hence, each node in a MANET implicitly trusts its neighbours for information sharing. Nodes in a MANET are vulnerable to various security threats which seek to exploit the weaknesses of the network. A Black Hole attack is one such attack which seeks to compromise the network by dropping information that is meant for a certain destination. This paper looks at utilizing the inherent trust relationship among the nodes in a MANET by formulating a trust model to recognize the trustworthiness of a node. This trust model makes use of intrusion detection to detect, identify and mitigate Black hole attacks.
File System is a way used by operating systems to store and organize files so that the files can ... more File System is a way used by operating systems to store and organize files so that the files can be accessed efficiently. File system is a component of operating system and it interacts with the abstraction of the underlying hardware known as Block Layer. An open source environment like Linux has over 50 different file systems since its existence. Though, in recent years, the speed of CPUs have been increased and the Hard drive technology have tremendous growth, the file systems have also been evolved so that operating system can provide better performance to the user. To measure the performance of the file systems there are different benchmarks used by different developers. In this work, a study of Linux file system evolution has been carried out. As there are several file systems for different Linux Distributions and different Linux kernel versions, some popular versions of extended file systems like ext, ext2, ext3 and ext4 has been considered. The features and differences on the...
The Zone Routing Protocol (ZRP) is a hybrid routing protocol for MANET which combines the advanta... more The Zone Routing Protocol (ZRP) is a hybrid routing protocol for MANET which combines the advantages of the proactive and reactive approaches by maintaining an up-to-date topological map of a zone centered on each node. Routes within a routing zone are usually maintained by a table driven proactive routing approach whereas for destinations outside the routing zone, ZRP employs a Reactive Routing mechanism thus making an attempt to utilize both the features of proactive as well as reactive routing policy. In this work, a simulation based study has been carried out to explore the behavior of Zone Routing Protocol (ZRP) under an environment where the density of the nodes in the network and more importantly the radius of the routing zone vary considerably. This will throw an insight on the operation of the protocol and understand its sensitivity on varying and fast changing network topology which is most common in any form of wireless networks.
A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network, and is a selfconfiguring n... more A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network, and is a selfconfiguring network of mobile nodes where the mobile nodes are free to move randomly, thus making the network topology dynamic. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. This study is a comparison of two routing protocols proposed for mobile ad-hoc networks. The protocols are: Ad-hoc On demand Distance Vector (AODV) and Protocol Routing (ZRP). The performance of the protocols are analyzed in terms of throughput, average end-to-end delay and normalized routing load which shall provide an insight about the sensitivity of the protocols. Simulation based analysis of the protocols have been carried out using NS-2, an open source simulator. KeywordsAODV, ZRP, MANET, NS-2
A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network which allows mobile compute... more A Mobile Ad hoc Network (MANETs) is a kind of wireless ad-hoc network which allows mobile computer users for wireless communication to set up a short lived network for communication needs during movement. The mobile nodes are free to move randomly, thus making the network topology dynamic. Each node operates as a router to forward packets and also acts as an end system. Therefore routing is one of the most concerned areas in these networks. Normal routing protocols which work well in fixed networks do not show the same performance in Mobile Ad Hoc Networks because the requirements differ in the two scenarios. In wireless networks, routing protocols should be more dynamic so that they quickly respond to topological changes which occur frequently in these networks. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. This study is a comparison of three routing protocols proposed for mobile ad-hoc netwo...
Wireless network is the network which is easy to deploy and very easy to access that network and ... more Wireless network is the network which is easy to deploy and very easy to access that network and that network is user friendly. The main reason behind of getting popular is because it provide benefits, like as easy to installation, flexibility, mobility, scalability and reduced cost-of-ownership. But drawback in these wireless networks is that it doesn't provide security as much as required, due to that user faces attacks of various types which are damageable to user informations. One of the serious attack is Identity based attacks which steals the identity of some other user in that network and performed some other attack. The available present security tools to detect such these identity(spoofed MAC) based attacks are quite limited. The proposed wireless Intrusion Detection System (IDS) is Signature based and leveraging the discreet size of the Raspberry Pi. The overall premise of the wireless intrusion system is placing a Raspberry Pi running Kali Linux on a host network. The...
Face recognition is one of the most demanding problems of computer vision and pattern recognition... more Face recognition is one of the most demanding problems of computer vision and pattern recognition. The complexity in face recognition arises because of large variations in the facial appearance variations which are caused by different factors, such as expression, partial face occlusion, illumination, and time difference between training and testing data capture. The performance of face recognition algorithms totally depends on preceding facial feature localization process, i.e. every face image in the training set and testing set needs to be aligned very well before they can be are fed into a face recognition algorithm, which requires particular type of facial feature localization. There are two problems in face recognition system; one is about facial appearance variations due to changes in illumination, expression, partial occlusion, time difference, and another one is inaccurate face alignment due to different localized facial features. For these two problems a number of algorithm...
Advances in Intelligent Systems and Computing, 2018
MANETs (Mobile Ad hoc Networks) are wireless networks that are deployed for a particular purpose ... more MANETs (Mobile Ad hoc Networks) are wireless networks that are deployed for a particular purpose or short-term use. Because of the lack of central coordination, MANETs share an inherent trust relationship among the nodes forming the network. Each node implicitly trusts its neighbour to forward packets in the network till the packets reach their destination. Further, each node in a MANET can monitor its neighbours by keeping track of the packets passing through the neighbours. This characteristic ability of a node in MANET makes it possible to develop a trust model that can correlate with the innate trust shared among the nodes. This paper looks at developing such a trust model which is applied to all the nodes in the network. The trust model works like an Intrusion Detection System (IDS), which seeks to detect blackhole attacks in the system, and then identify and mitigate the malicious attacker.
A Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized multi-hop network where ... more A Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized multi-hop network where the mobile nodes are free to move randomly, thus making the network topology dynamic. Various routing protocols have been designed which aims at establishment of correct and efficient routes between a pair of mobile nodes. In this work, an attempt has been made to understand the characteristics/behavior of Ad hoc On Demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) routing protocols when operating in more challenging environment such as frequent change in network topology and node density. The performance differentials are analyzed using throughput, average endto-end delay and normalized routing load which shall provide an insight about the sensitivity of the protocols under consideration when exposed in more challenging environment. Simulation based analysis of the protocols have been done using NS-2.
Uploads
Papers by Sanku Sinha