Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Dr. D. P. Mishra
  • Department of computer Science & Engineering
    Bhilai Institute of Technology, Durg
    Chattisgarh, 491001
  • 07898351022
  • • An innovative thinker, initiative taker, multi-dimensional professional having logical & analytical skills with ... moreedit
Rapid technological growth in the area of micro electro-mechanical systems (MEMS) has spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of... more
Rapid technological growth in the area of micro electro-mechanical systems (MEMS) has spurred the development of small inexpensive sensors capable of intelligent sensing. A significant amount of research has been done in the area of connecting large numbers of these sensors to create robust and scalable Wireless Sensor Networks (WSNs). Proposed applications for WSNs include habitat monitoring, battlefield surveillance, and security systems. Although individual sensor nodes have limited capabilities, WSNs aim to be energy efficient, selforganizing, scalable, and robust. Almost all of the research is centered on meeting these challenges, but relatively little work has been done on security issues related to sensor networks. The resource scarcity, ad-hoc deployment, and immense scale of WSNs make secure communication a challenging problem. Since the primary consideration for sensor networks is energy efficiency, security schemes must balance their security features against the communication and computational overhead. Paper will describe the fundamental challenges in the emergent field of sensor network security and the initial approaches to solve them.
Exponential growth in population and indication of declining productivity is a great challenge against the Indian agricultural sector to achieve food and environmental security. To take on this challenge, modern precision technologies... more
Exponential growth in population and indication of declining productivity is a great challenge against the Indian agricultural sector to achieve food and environmental security. To take on this challenge, modern precision technologies involving systems approach towards efficient crop and input management, and scientific land and water use planning, and slowly moving nonorganic farming towards traditional organic farming is an urgent need of our country. Sensor-based agriculture is the best alternative for improving the production capacity of land on a sustainable basis. Geographical Information System (GIS), Remote Sensing, Variable Rate Technology (VRT), crop growth models and ground-based sensors moving from single to multipurpose and collaborative applications interacting across various verticals industries and peoples. Despite several obstacles, there scope to take a part of precision farming technologies in Indian agriculture. The rate of transformation to precision farming depends on the level of commitment of politicians, scientists and technocrats. In this paper we have discussed the present technological components, current status in relevance to organic, nonorganic farming and modern agricultural technologies with GMO.
Big data includes those data sets which are so complex that traditional data mining and data processing application software is not enough to deal with them. Studying of server log data can provide remarkable and useful information and... more
Big data includes those data sets which are so complex that traditional data mining and data processing application software is not enough to deal with them. Studying of server log data can provide remarkable and useful information and facts about logs. Stored information and facts can help to find out user perception and behavior towards the web application. This can improve the effectiveness of the websites by adapting the information structure to the user's behaviour. In this paper, we propose a novel technique for select big data analytics approach since it can enhance the worth of web contents. Several web usage mining methods for extracting useful features are discussed employing all these techniques to cluster users of the domain to study their behaviours comprehensively. Our main aim is to develop a web application that gives web log and access information which will be used further to analyze user behaviour by using BIG DATA HADOOP technology for mining enriched web access log data. The contributions of this research are a data enrichment that is content and source based, and a tree-like visualization of frequent navigational sequences.
Now-a-days, Software-defined networking (SDN) is an ever-growing technology that allows the design and implementation of more flexible and programmable networks. In the past several years, both researchers and vendors have shown... more
Now-a-days, Software-defined networking (SDN) is an ever-growing technology that allows the design and implementation of more flexible and programmable networks. In the past several years, both researchers and vendors have shown tremendous interest on SDN technology. Typical network devices such as switches contain two main components: control plane and data plane. Control plane computes forwarding paths of incoming packets with pre-built network protocols. Data plane sends those packets to the next hop defined in the forwarding paths. This paper gives a detailed explanation of SDN, its planes and architecture. Also what are the aspects in this field too.
Sensor networks are dense wireless networks of tiny, low-cost sensors, which collect and sense parameter. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy.... more
Sensor networks are dense wireless networks of tiny, low-cost sensors, which collect and sense parameter. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. WSN is having applications in a variety of fields such as environmental monitoring; military purposes and gathering sensing information in inhospitable locations. Fault recovery and Network management for Wireless Sensor Network Infrastructure is a challenging area where the management operation is to run on minimal or zero cost. The network data packets routing costs more, hence managing this unstructured network improves the network efficiency and extend the network lifetime. The deployed sensor nodes have a fixed battery life and there are some attempts made to manage this WSN network efficiently to improve the lifetime. In this paper, we focus on different networking parameters and proposed a technique that can be used efficiently for fault recovery and management.
Vo ol lu um me e-9 9 • • N Nu um mb be er r-1 1 J Ja an n-J Ju un ne e 2 20 01 17 7 p pp p.. 1 18 84 4-1 19 92 2 a av va ai il la ab bl le e o on nl li in ne e a at t w ww ww w. .c cs sj jo ou ur rn na al ls s. .c co om m
Wireless Sensor Networks (WSN) possess vulnerable characteristics such as outdoor unattended operations for transmission and selforganized behaviour without a fixed infrastructure leads them to suffer from various challenges including... more
Wireless Sensor Networks (WSN) possess vulnerable characteristics such as outdoor unattended operations for transmission and selforganized behaviour without a fixed infrastructure leads them to suffer from various challenges including lower processing power, low battery life, small memory and wireless communication channel. Security of a communication channel is the major concern to handle such kind of networks. Due to well-known and accepted limitations, overall security of WSN becomes the main concern to deal with. Intrusion Detection Systems (IDSs) can play an important role in detection and prevention of security attacks. In this paper, we propose a hybrid framework for intrusion detection system for wireless sensor networks that would take advantage of cluster-based architecture to optimize energy consumption. Proposed hybrid model uses anomaly detection based on support vector machine (SVM) algorithm and a set of signature rules to detect malicious behaviours and provide and ideal hybrid framework for IDS in WSN. Simulation result shows that the proposed hybrid model can detect abnormal events with higher and efficient detection rate with lower false alarm.
Wireless Sensor Network is special type of Ad-hoc network formed with autonomous motes with power and memory constraint. WSN is used in various applications such as healthcare, Environmental monitoring, habitat monitoring military,... more
Wireless Sensor Network is special type of Ad-hoc network formed with autonomous motes with power and memory constraint. WSN is used in various applications such as healthcare, Environmental monitoring, habitat monitoring military, ecology, home and many more practicable solution for challenging applications of different areas. When wireless sensor networks are deployed in an open, hostile or specific defense environment the security becomes extremely important, since WSN motes are resource constraint there is scope for different types of malicious attacks on them. This paper analyses the security solutions and the security mechanisms that will overcome security issues and attacks and recommends adequate solution for the WSN threats.
Wireless Sensor Networks is gaining importance day by day and they are more and more promising because of the potential and features available with them to revolutionize life and economy, with its wide range of applications. Wireless... more
Wireless Sensor Networks is gaining importance day by day and they are more and more promising because of the potential and features available with them to revolutionize life and economy, with its wide range of applications. Wireless Sensor Networks (WSN) is formed by using large no of motes. Since analyticla modelling of WSN is very complex,itleads to simple analysis. Otherhand, preparing testbeds requires a huge effort. therefore, simulation tools are must to study WSN, and itrequires a suitable model based on solid assumptions and framework. Simulatorsease the way of implementation. In addition, simulation resultare totally dependant on the specific environment, scenario under study, physical layer, hardware consideration and assumptions madeare not equally correct to capture the real parameters and behavior of WSN. In order to work on WSN, simulators plays a very important role by providing simulation environment, that willmeet researchers requirement to conduct experiments in specific area. This paper would discuss the important features and classification of various simulators.
Sensor network is having large number small sensor nodes deployed in some geographical area for sensing different parameter as per the requirement. Purpose of the network is to sense different parameters and report the happenings of the... more
Sensor network is having large number small sensor nodes deployed in some geographical area for sensing different parameter as per the requirement. Purpose of the network is to sense different parameters and report the happenings of the respective area where the nodes were deployed in. Sensor networks are used in variety of applications. In military it is used for surveillance and target tracking. In industrial applications, sensor networks are used for monitoring hazardous chemicals. It is used for monitoring the environment and in early fire warning in forests as well as seismic data collections. Sensor networks face new challenges due to their peculiarities, primarily the stringent energy constraints to which sensing nodes are typically subjected which is not known in cellular and ad-hoc wireless networks. The unique features of sensor networks lead to affect the hardware design of the nodes at least four levels: power source, processor, communication hardware, and sensors. In this paper, we report on currents and new trends in sensor networks. We also present vision and future for wireless sensor networks.
{ \\'ireless Sensor Network (wsN) is an evolving technology and getting significant attention due to '-' unlimited potential starts from domestic application to battlefield. However, it is still very early to-r that the technology is full... more
{ \\'ireless Sensor Network (wsN) is an evolving technology and getting significant attention due to '-' unlimited potential starts from domestic application to battlefield. However, it is still very early to-r that the technology is full proof as it is having several issues and research challenges. sensor :r-rdes deployed in an unattended environment makes the networks vulnerable to a variety of potential r:eck' the inherent power and memory limitations of sensor nodes makes conventional security ;:lutions unfeasible. Though there have been some developments in the field of sensor network sa-urity' the solutions presented thus far address only some of security problems faced. This paper is at eftbrt to introduce the security issues in wireless sensor networks, to highlight the .rr."r,'r"r"ur"h efforts' and to determine the future directions to solve the unresolved issues. Section-l provides a brief overview of wireless sensor networks, their evolution, major research initiatives and future \, applications along with issues of sensor Network. section-2 Different types of Security attacks. Section-3 Security issues & challenges are discussed. section-4 highlights the related work in sensor networks' sectionS concludes the paper by highlighting the problems of sensor networks and future directions.