Mohd Rizwan Beg

Work place: R B Group of Institutions (RBGI), Agra, India

E-mail: rizwanbeg@gmail.com

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Software Engineering, Data Mining, Data Compression, Data Structures and Algorithms

Biography

Mohd Rizwan Beg is working as a Professor and Director of RBGI group, Agra. His areas of expertise are Software Engg., Requirement Engineering, Data Mining, Software Quality, and Software Project Management.  He has delivered expert lectures and contributed in various national and international conferences in India and abroad. He has published more than 40 papers in reputed journals and conferences. Presently 8 research scholars are pursuing their Ph. D in his supervision.

He is Associate Editor in Chief of Advancement in Computing Technology & is also member of editorial board for various other International & National Journals. He is member of large member of International professional societies & also member of Advisory Board for various institutions in India. He chaired a number of workshops, seminars & conference.

Prof. Beg has served for many years as a Head in Department of IT, Integral University, Lucknow, India. He was having various  responsibilities at Integral University like Controller of Examination and discharge other administrative responsibilities within and outside department. He is having teaching experience of more than 25 years.

Author Articles
Monitoring of Military Base Station using Flooding and ACO Technique: An Efficient Approach

By Abdus Samad Mohammed Shuaib Mohd Rizwan Beg

DOI: https://doi.org/10.5815/ijcnis.2017.12.05, Pub. Date: 8 Dec. 2017

Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.

[...] Read more.
Other Articles