Virender Ranga received his Ph.D. degree in Computer Engineering from National Institute of technology, Kurukshetra in 2016 and M.Tech in Computer Science and Engineering from Guru Jambeshwar Govt. Technical University Hissar in 2004 respectively. Currently, he is Associate Professor in Information Technology Department of Delhi Technological University, Delhi. Earlier he was associated with Computer Engineering Department, NIT Kurukshetra Haryana, India as Assistant Professor. He has published more than 100 research papers in various International / National referred journals and conferences like IEEE, Elsevier, Springer, T Supervisors: Prof. & Dr. Mayank Dave and Dr. Anil Kumar Verma
ACM transactions on the internet of things, May 12, 2023
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integra... more Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integra... more Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A se...
Wireless sensor networks which are formed by sensor nodes are used widely for sensing the environ... more Wireless sensor networks which are formed by sensor nodes are used widely for sensing the environment and observing useful information from the data gathered. Due to harsh environmental conditions, the network can be disconnected. Restoring the network’s lost connectivity is crucial for future functioning of the network and is done by placing relay nodes, which are small devices used for transmission of sensed data. This problem of reconnecting the network in an optimal manner is shown to be NP-hard; therefore, we practice meta-heuristics to this problem. In this paper, we propose Federating Network using Particle Swarm Optimization (FN-JPSO), which can be applied efficiently for restoring the lost connectivity. Our proposed approach first finds the representative node for each disconnected segment and then creates Steiner points for reconnection. These Steiner points are further used to create random spanning trees, which are used as particles in FN-JPSO to provide an optimal inter...
Advances in Intelligent Systems and Computing, 2018
In the modernized era, numerous types of attacks are espied on the Internet, along with the utmos... more In the modernized era, numerous types of attacks are espied on the Internet, along with the utmost destructive attacks, Distributed Denial of Service (DDoS) Attacks. After these types of attacks, legitimate users are not able to access the authorized services. IP Traceback scheme is the only way to trace the original source of the attack. Researchers have been implemented various traceback schemes in the past, but none are able to provide comprehensive efficient results in terms of marking rate and traceback rate. In this paper, we proposed a hybrid approach based on star coloring with autonomous systems, which depicts improved results in terms of marking rate and traceback rates. The simulation results are shown and compared with previous dataset CAIDA.
ACM transactions on the internet of things, May 12, 2023
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integra... more Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A session key pool randomizer is used to avoid network probabilistic attacks. Our hybrid model is capable of generating secure session keys that can be used for mutual authentication and reliable data transferring tasks. Cyber-attacks resistance and performance results were verified using standard tools, which gave industry level promising results in terms of efficiency, light weightiness, and practical applications.
Over the past decade, IoT has gained huge momentum in terms of technological exploration, integra... more Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. IoT network nodes need peer-to-peer security, which is possible if there exists proper mutual authentication among network devices. A secure session key needs to be established among source and destination nodes before sending the sensitive data. To generate these session keys, a strong cryptosystem is required to share parameters securely over a wireless network. In this article, we utilize a Rubik's cube puzzle-based cryptosystem to exchange parameters among peers and generate session key(s). Blockchain technology is incorporated in the proposed model to provide anonymity of token transactions, on the basis of which the network devices exchange services. A se...
Wireless sensor networks which are formed by sensor nodes are used widely for sensing the environ... more Wireless sensor networks which are formed by sensor nodes are used widely for sensing the environment and observing useful information from the data gathered. Due to harsh environmental conditions, the network can be disconnected. Restoring the network’s lost connectivity is crucial for future functioning of the network and is done by placing relay nodes, which are small devices used for transmission of sensed data. This problem of reconnecting the network in an optimal manner is shown to be NP-hard; therefore, we practice meta-heuristics to this problem. In this paper, we propose Federating Network using Particle Swarm Optimization (FN-JPSO), which can be applied efficiently for restoring the lost connectivity. Our proposed approach first finds the representative node for each disconnected segment and then creates Steiner points for reconnection. These Steiner points are further used to create random spanning trees, which are used as particles in FN-JPSO to provide an optimal inter...
Advances in Intelligent Systems and Computing, 2018
In the modernized era, numerous types of attacks are espied on the Internet, along with the utmos... more In the modernized era, numerous types of attacks are espied on the Internet, along with the utmost destructive attacks, Distributed Denial of Service (DDoS) Attacks. After these types of attacks, legitimate users are not able to access the authorized services. IP Traceback scheme is the only way to trace the original source of the attack. Researchers have been implemented various traceback schemes in the past, but none are able to provide comprehensive efficient results in terms of marking rate and traceback rate. In this paper, we proposed a hybrid approach based on star coloring with autonomous systems, which depicts improved results in terms of marking rate and traceback rates. The simulation results are shown and compared with previous dataset CAIDA.
Relay node placement in wireless sensor network for constrained environment is a critical task d... more Relay node placement in wireless sensor network for constrained environment is a critical task due to various unavoidable constraints. Unpredictable obstacles are one of the most important constraints. Handling obstacles during relay node placement is complicated because of complexity involved in shape and size estimation of obstacles. This paper presents an Obstacle-resistant relay node placement strategy (ORRNP) which handles obstacles as well estimates best locations for relay node placement in the network. The approach does not require any additional hardware to estimate node locations thus can significantly reduce the deployment costs. Simulations are presented to show effectiveness of our proposed approach.
Uploads
Papers by Dr. Virender Ranga