Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content

    Santosh Soni

    Abstract-- When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information... more
    Abstract-- When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.
    Presently wireless personal area networks have made the practical deployment of various services possible, which until a few years ago was considered extremely costly or labor intensive. We build such a wireless sensor network for... more
    Presently wireless personal area networks have made the practical deployment of various services possible, which until a few years ago was considered extremely costly or labor intensive. We build such a wireless sensor network for precision agriculture where real time data of the climatologically and other environmental properties are sensed and relayed to a central repository. The architecture comprises of three distinct sections – (a) the sensor-nodes (b) the wireless mesh network and (c) the actuation components. The sensors are selected based on the properties suited for the most common crops and we identify four such attributes. The sensor network is based on the IEEE-802.15.4 standard and we develop a new static routing algorithm suited for the sensing application. The algorithm overrides the deficiency of the Hierarchical Routing scheme inherent in the ZigBee specification where the Cskip addressing algorithm limits the possible depth of the network topology due to address wa...
    This paper presents Energy analysis of Wireless Sensor Network. Energy is the main concern of any node including cluster heads. We have measured mainly LEACH & DIRECTED DIFFUSION protocols with their associated energy models on different... more
    This paper presents Energy analysis of Wireless Sensor Network. Energy is the main concern of any node including cluster heads. We have measured mainly LEACH & DIRECTED DIFFUSION protocols with their associated energy models on different values. We observed the lifetime of wireless sensor nodes and cluster heads in the maximum capacity of their performances in the form of their lifetime (Number of Rounds). We found that LEACH protocol is better than DIRECTED DIFFUSION. KeywordsWireless Sensor Network, LEACH, DIRECTED DIFFUSION, NS2.34
    Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network... more
    Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network localization algorithms are vulnerable and can be compromised for their security. There are various network security attacks like wormhole, impersonation, compromise, and duplicate attacks which degrade the performance of WSNs. In this research paper, under various network security attacks, we have tested wireless sensor network localization algorithms under certain performance matrices like mobility of WSN node’s, size of packets, temperature, and node density to find out the compromised WSN node’s residual energy. The simulation result shows how these localization algorithms are vulnerable to network security attacks.
    Mobile Ad Hoc Network (MANET) is a self-organized and infrastructure-less mobile network. Wireless Mesh Networks is self-configuration; self-healing and low cost adhoc network. Ad-hoc On-demand Distance Vector (AODV), in MANETs is an... more
    Mobile Ad Hoc Network (MANET) is a self-organized and infrastructure-less mobile network. Wireless Mesh Networks is self-configuration; self-healing and low cost adhoc network. Ad-hoc On-demand Distance Vector (AODV), in MANETs is an on-demand variation of the distance vector routing protocol. This protocol initiate route discovery only when a route is needed and maintain active routes only while they are in use. Unused routes are deleted. We proposed an approach control power and improve the performance in Wireless mesh multipath network in AODV. Our proposed approach may improve the packet delivery ratio and lower the latency of the network and also provide reliable gratuitous routes.
    Generally, wireless sensor network is a group of sensor nodes which is used to continuously monitor and record the various physical, environmental, and critical real time application data. Data traffic received by sink in WSN decreases... more
    Generally, wireless sensor network is a group of sensor nodes which is used to continuously monitor and record the various physical, environmental, and critical real time application data. Data traffic received by sink in WSN decreases the energy of nearby sensor nodes as compared to other sensor nodes. This problem is known as hot spot problem in wireless sensor network. In this research study, two novel algorithms are proposed based upon reinforcement learning to solve hot spot problem in wireless sensor network. The first proposed algorithm RLBCA, created cluster heads to reduce the energy consumption and save about 40% of battery power. In the second proposed algorithm ODMST, mobile sink is used to collect the data from cluster heads as per the demand/request generated from cluster heads. Here mobile sink is used to keep record of incoming request from cluster heads in a routing table and visits accordingly. These algorithms did not create the extra overhead on mobile sink and s...
    Presently Wireless Sensor Network used to deploy at various critical locations where heavy traffic load situations along with priority-based data routing are always occurred. Under these situations...