Work place: Department of Computer Science & Engineering, DIT School of Engineering, Plot -48A, Knowledge Park – III, Greater Noida, Uttar Pardesh, India
E-mail: vimalbibhu@gmail.com
Website:
Research Interests: Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science
Biography
Mr. Vimal Bibhu is M.Tech is Computer Science & Engineering and Pursuing Doctor of Philosophy in Computer Science from B.R.A Bihar University Muzaffarpur, Bihar, India. He has published many papers in different International Journals. He is also member of different professional organizations like - IACSIT, IEANG and SERC.
By Vimal Bibhu Kumar Roshan Kumar Balwant Singh Dhirendra Kumar Singh
DOI: https://doi.org/10.5815/ijcnis.2012.11.06, Pub. Date: 8 Oct. 2012
Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.
[...] Read more.By Anish Gupta Vimal Bibhu Md. Rashid Hussain
DOI: https://doi.org/10.5815/ijieeb.2012.03.05, Pub. Date: 8 Jul. 2012
Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2012.06.07, Pub. Date: 8 Jun. 2012
Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.
[...] Read more.By Vimal Bibhu Dhirendra Kumar Singh
DOI: https://doi.org/10.5815/ijitcs.2012.02.02, Pub. Date: 8 Mar. 2012
Vehicular Ad Hoc Network is currently challenge for the wireless networking and its researchers. In this paper we have proposed the survey of the different MAC Layer protocols of the wireless medium those can be implemented in the Vehicular Ad Hoc Networking. The survey is based upon the study of the different protocol on their MAC level and its performance factors is evaluated. The performance factor is extracted from the studied materials and current working conditions of the protocols. These all factors are mobility, accuracy, privacy and confidentiality, safety critical message priority, delay control and suitability on vehicle and roadside. According to analyzed performance factor the IEEE 802.11p Wave is most suitable protocol for the Vehicular Ad Hoc Network but it does not cover up all conditional requirements.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals