Work place: Department of Computer Science & Engineering; National Institute of Technology (NIT) Puducherry, Karaikal, India
E-mail: p.arunrajkumar@nitpy.ac.in
Website:
Research Interests: Computer systems and computational processes, Computational Learning Theory, Computer Networks, Network Security
Biography
Dr. Arun Raj Kumar, P. is an Assistant Professor in the Computer Science and Engineering Department at National Institute of Technology (NIT) Puducherry, Karaikal. He obtained his Doctoral degree in Computer Science and Engineering from National Institute of Technology (NIT) Tiruchirappalli, India. His research interests include Computer Networks, Network Security, Machine Learning and Wireless Sensor Networks. He has published 12 papers in reputed and refereed International Journals and IEEE Conferences. He is also invited reviewer for publications / Journals at International Conferences and International Journal of Network Security (IJNS), etc.
By Chidanandan V. Arun Raj Kumar P.
DOI: https://doi.org/10.5815/ijcnis.2018.02.04, Pub. Date: 8 Feb. 2018
Long Term Evolution (LTE) emerges as the promising communication technology for data and voice service in Human to Human Communication (H2H). Currently, LTE network also includes Machine to Machine (M2M) communication. Combining the legacy systems and evolving Machine type devices, increases the access rate to a particular base station leading to congestion in Access network. Congestion in Random Access Network (RAN) that occurs during the Random Access Process affects the performance of H2H communication. The objective of the paper is to analyze the existing congestion control techniques and to provide a comprehensive summary on classified poll and event based mechanisms.
[...] Read more.By Keerthi Vasan K. Arun Raj Kumar P.
DOI: https://doi.org/10.5815/ijcnis.2016.02.02, Pub. Date: 8 Feb. 2016
Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM) attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.
[...] Read more.By Maria Sebastian Arun Raj Kumar P.
DOI: https://doi.org/10.5815/ijcnis.2013.08.04, Pub. Date: 8 Jun. 2013
Nowadays, the computing and communication services are accessed while on the move. Setting up of fixed access points and backbone infrastructure is not always viable. So in order to provide communication where there is lack of infrastructure or inconvenience in using the existing infrastructure, Mobile Adhoc Networks (MANETs) are used. This inherent flexibility allows MANETs to be used for a wide range of applications such as rescue operations, military applications, vehicular communication, and business meetings. As there is no apriori trust relationship between the nodes of an ad hoc network and basic network functions like packet forwarding and routing are performed by the available nodes, security is an essential component in MANETs. Various attacks in MANETs are blackhole attack, byzantine attack, resource consumption attack, rushing attack, and wormhole attack. Wormhole attack is a severe threat among the other threats in MANET. Existing solutions to detect wormhole attacks include Packet Leashes, SECTOR, DelPHI, RTT-TC, TTM, etc. These solutions require special hardware or strict synchronized clocks or cause message overhead. Some solutions do not locate the wormhole, and some other may generate false alarms or does not consider network congestion into account. In this paper, wormhole attack detection is proposed based on RTT between successive nodes and congestion detection mechanism. If the RTT between two successive nodes is higher than the threshold value, a wormhole attack is suspected. If a wormhole is suspected, node's transitory buffer is probed to determine whether the long delay between the nodes is due to wormhole or not, as delays can be caused due to congestion or by queuing delays. The proposed method prevents both the hidden and the exposed attack. Advantage of our proposed solution is that it does not require any specialized hardware or synchronized clocks.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals