Network and computing

R & D - Network and Computing (SonaNET)

Publications

Books

Publications

  • Usha, M and Prabhu A , “Performance analysis of Encryption algorithms withPat-fish for Cloud Storage Security”, 5th iCatse International Conference on Mobile and Wireless Technology, 25- 27 June 2018.
  • E. Kirthiga, D. Balamurugan, “Detecting TCP SYNC Flood DDos Attack Using Modified Dendritic Cell Algorithm”, Proceedings of the international conference on intelligent computing systems (ICICS 2017), Feb 2018 Vol: 1, pp:51-56
  • Lavanya, S and Usha, M, “Dynamic key Management in Heterogeneous Wireless Sensor Networks based on Residual Energy”, 5th iCatse International Conference on Mobile and Wireless Technology, 25-27 June 2018.
  • E. Kirthiga, D. Balamurugan, “Detecting TCP SYNC Flood DDos Attack Using Modified Dendritic Cell Algorithm”, Proceedings of the international conference on intelligent computing systems (ICICS 2017), Feb 2018 Vol: 1, pp:51-56
  • Usha, M and Prabhu A , “Performance analysis of Encryption algorithms withPat-fish for Cloud Storage Security”, Lecture Notes in Electrical Engineering (Accepted), https://doi.org/10.1007/978-981-13-1059-1_11
  • Lavanya, S and Usha, M, “Dynamic key Management in Heterogeneous Wireless Sensor Networks based on Residual Energy”, Lecture Notes in Electrical Engineering (Accepted), https://doi.org/10.1007/978-981-13-1059-1_6
  • Usha, M., and P. Kavitha. "Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier." Wireless Networks 23, no. 8 (2017): 2431-2446, Online ISSN 1572-8196.
  • Rathinaprabha, R. L., M. Usha, and S. Lavanya. "Optimizing relay nodes in wireless sensor networks." Advances in Natural and Applied Sciences 11, no. 7 (2017): 628-635.
  • Usha, M., and S. Sridevi. "Zone Based Energy Aware Multi-Level Multi-Hop Clustering Protocol for Heterogeneous Wireless Sensor Networks." Journal of Computational and Theoretical Nanoscience 14, no. 7 (2017): 3246-3259.
  • Vanitha, C. N., and M. Usha. "An Improved Version of Data filtration using Enhanced Routing Control Protocol in Wireless Sensor Networks." International journal of Applied Engineering and Research 10: 32036-32043.
  • Prabhu, A & Usha, M, ‘A Secured best data centre selection in cloud computing using encryption techniques’, International Journal of Business Intelligence and DataMining(Annexure-1, Accepted for publication)  DOI: 10.1504/IJBIDM.2018.10007299.
  • S. Sridevi and M. Usha, "Q-learning based fault tolerant routing with congestion control for Wireless Sensor Networks", International Journal of Control Theory and Applications, Volume : No.10, Issue No. :8 (2017), pp: 257-268
  • Lavanya, S and Usha, Dr.M, “A Survey on Key Management in Internet of Things” (November 15, 2017). Proceedings of the International Conference on Intelligent Computing Systems (ICICS 2017 – Dec 15th - 16th 2017)Available at SSRN: https://ssrn.com/abstract=3134301 or http://dx.doi.org/10.2139/ssrn.3134301
  • Archana, K.T and Usha, M and Lavanya, S, “Amplified Trickle Algorithm in Routing Protocol for Low Power Lossy Networks for Internet of Things”, Proceedings of the International Conference on Intelligent Computing Systems – ICICS 2017. Available at SSRN: https://ssrn.com/abstract=3132964 or http://dx.doi.org/10.2139/ssrn.3132964
  • M Saravanan, A Prithiviraj, “Genetic Based Approach to Optimize the Vertical Handover Performance among Heterogeneous Network”, Proceedings of the International Conference on Intelligent Computing Systems(ICICS 2017-Dec 15th – 16th 2017)-Elsevier’s SSRn eLibrary – Journal of Information Systems & eBusiness Network, ISSN: 1556-5068.
  • R Beatrix Jovita, K Karunambiga, “Dynamic Trust Management System for Internet of Things”, Proceedings of the International Conference on Intelligent Computing Systems (ICICS 2017 – Dec 15th - 16th 2017) organized by Sona College of Technology, Salem, Tamilnadu, India. Available at SSRN:   https:// ssrn.com/ abstract=3125919  or http://dx.doi.org/ 10.2139/ ssrn.3125919
  • S.Lavanya, Dr.M.Usha , “A Middleware for Constrained Devices in IoT with a light weight cryptographic technique to preserve privacy”, International Conference on Applied Mathematics and Informatics, 18-Mar-2017, 17-Mar-2017
  • M. Usha and P. Kavitha, “Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier”, Wireless Networks, Springer, May 2016, Volume 22, Number 4, pp 1-16, DOI: 10.1007/s11276-016-1300-5, Online ISSN 1572-8196.
  • M. Usha and , C. N. Vanitha , “Pruning Route Modifiers in Wireless Sensor Networks”, Wireless Personal Communications, Springer, March 2016, pp. 1-17, DOI 10.1007/s11277-016-3249-1, Print ISSN 0929-6212, Online ISSN 1572-834X
  • M. Usha, and S.Rajesh, “Secured routing by considering Energy, Security and Mobility with Intrusion Detection and Data fusion in MANET”, International Journal of Applied Engineering Research, April 2015, Vol. 10 No.37, pp.28045-28050.
  • Usha Mahalingam and Leela Manju.P, “Towards Building a GPS-free Tracking System on Toll Roads”, International Journal of Applied Engineering Research, April 2015, Vol. 10 No.37, pp.28056-28059.
  • M. Usha and K. Madhana, Analytical Characterization of WLANS for Quality-of-Service with Active Queue Management”,  ICTACT Journal on Communication Technology, September 2014, Volume: 05, Issue: 03. pp. 970-976.
  •  M.Usha , D.BalaMurugan, S.Chandrasekar, and M.Saranraj, “Hybrid Approach for Detection of DDoS Attacks in Ipv6 Networks”, International Journal of Applied Engineering Research, April 2015, Vol. 10 No.37, pp.27992-27999.
  • M. Usha and K.  Madhana, “A Priority-Based Forward Error Correction Mechanism for Multimedia Transmission over Wireless LANs”, International Journal of Applied Research and Studies iJARS, Vol 3, Issue 5, 2014, ISSN: 2278-9840
  • M Usha and Prema Latha D, “Analysis of Key Management Schemes for Secure Transmission in Wireless Sensor Networks”,  International Journal of advanced studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 5, 2014 , ISSN : 2278 7917
  • M. Usha and J. Akilandeswari , “Blended Learning for Nation Building”, 28th Indian Engineering Congress, December 2013.
  • A.Prithiviraj, K.Krishnamoorthy, B.Vinothini, “Fuzzy Logic Based Decision Making Algorithm to Optimize the Handover Performance in Hetnets”, Circuits and Systems (ISSN-2153-1293) Volume 7, Issue 10, September 2016.
  • A.Prithiviraj, K.Krishnamoorthy, M.Usha, A.Maheswari, “A Survey of Vertical Handover Decision Algorithms for PMIPv6 Domain”, Asian Journal of Information Technology (ISSN-1682-3915) (Scopus Indexed), Medwell Journals, Volume 15, Issue 17, Page 3153-3170, December 2016.
  • S.Sridevi, and M.Usha, “Energy Efficient Gateway based Multi hop Routing Protocol for Wireless Sensor Networks”, International Journal of Applied Engineering Research, April 2015, Vol. 10 No.37, pp.27995-27971.
  • A.Prabhu, and M.Usha, “Non- deterministic finite automata to reduce time complexity in cloud virtualization”, International Journal of Applied Engineering Research, April 2015, Vol. 10 No.37, pp.28021-28025.
  • R. Sumathi and M. Usha, Setpoint Weighted PID Controller for the Electromechanical Actuator in Spacecraft, International Journal of Engineering and Technology IJET, Vol 6, No 2, Apr-May 2014, pp 929-938, ISSN: 0975-4024.
  • R. Sumathi and M. Usha, Pitch and Yaw Attitude Control of a Rocket Engine Using Hybrid Fuzzy- PID Controller, The Open Automation and Control System Journal, Vol 6, 2014,  pp 29-39, ISSN: 1874-4443.
  • Usha Mahalingam, Leela Manju.P, Harsha Annadurai, Murale Narayanan and Diwahar S, “A novel Use Case for Mobile Crowdsourcing:Toll Plaza Optimization”, National Conference on Social, Mobile, Analytics and Cloud NCSMAC, , April 2014,pp 61-66
  • M.Usha and B.Prabadevi, “An Efficient Packet Aggregation System for Telemetry Data in Satellite Communication”, Proceedings of 26th Indian Engineering Congress 2011-Abstracts of Technical paper presentations, pp-64, 16-18th December 2011.
  • P. Kavitha and M. Usha, “Anomaly Based Intrusion Detection In Wlan Using Discrimination Algorithm Combined With Naïve Bayesian Classifier”, Journal of Theoretical and Applied Information Technology, April     2014. Vol. 62 No.1, 77-84.
  • S.Sridevi, G. Rumeniya , M. Usha, “ Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey”, International Journal of Computer Science and Business Informatics, ISSN: 1694-2108 |     Vol. 11, No. 1. MARCH 2014, pp. 1-9.
  • S. Sridevi, R. Priyadharshini, M.Usha, “Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks”, International Journal of Computer Science and Business Informatics, ISSN: 1694-2108    | Vol. 11, No. 1. MARCH 2014, pp. 67-79.
  •  Ramakrishnan Sumathi, Mahalingam Usha, “An Adaptive PID Controller for Reinforcement of Carbon Steel:Performance Analysis using MATLAB Sim”,  International Journal of Engineering Research and     Applications (IJERA), Vol. 3, Issue 2, March -April 2013, pp.053-057.
  • A.S.Syed Fiaz, M. Usha and J. Akilandeswari,” A Brokerage Service Model for QoS support in Inter-Cloud Environment “, International Journal of Informatics and Computation Technology Research (IJICT), Vol.3, No. 4, pp 257-260.
  • D.Balamurugan, Jayaprakash S and M.Usha , “Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks, International Journal of Informatics and Computation Technology Research (IJICT), Vol 3, No 10,pp.25-28.
  • A.Prithiviraj, Jithina jose PMIPV6- HC – MIH: An approach for improving Handover performance in NGWN. IEEE International conference on computing, Electronic, and Electrical Technology (ICCEET-2012). Noorul Islam Engineering College, IEEE Conference Publications, Page 910-914.
  • Jose J, Prithiviraj. A presented a paper entitled “PMIPV6-MIH-HC: A SURVEY ON IMPROVING HANDOVER PERFORMANCE IN NGWN” in the International Conference ICICIP’2012 held at Mahendra Engineering College during March 29th – 31st, 2012.
  • S.R.Sharanya, A.Prithiviraj,  “Improving vertical handover performances in network based IPv6 domain” at International Congress on “Innovative Trends in Information Technology and computing science for competitive world (ITITCSWO-2013) at Jawaharlal Nehru University, New Delhi on 2nd March 2013.
  • A.Prithiviraj, K.Krishnamoorthy, K.Jayabharathy, “Handover Performance Improvement among heterogeneous wireless networks”, in the International Conference on “innovative Engineering Skills” ACETIC-2014 held at Aishwarya College of Engineering and Technology, Bhavani on 12th February 2014.
  • B.Vinothini, A.Prithiviraj, K.Krishnamoorthy, “Fuzzy logic based Approach to Improve the  Vertical Handover performance among Heterogeneous Wireless Networks”, in the Proceedings of the IEEE sponsored 3rd International Conference on Electronics and Communication Systems(ICECS'16) held at Karpagam College of Engineering on 25th and 26th February 2016.
  • A.Maheswari, A.Prithiviraj, K.Krishnamoorthy,” Markov based VHO to improve the Handover Performance among Heterogeneous Wireless Networks in PMIPv6 domain”, in the Proceedings of the IEEE sponsored International Conference on Circuit, Power and Computing Technologies (ICCPCT’16) held at Noorul Islam Engineering College on 27th and 28th March 2016.
  • S.R.Sharanya, A.Prithiviraj, “Improving vertical handover performances in network based IPv6 domain”, International Journal of Information and Computation Technology (ISSN-0974-2239) Volume-3, Number-6, 2013, Page 487-490.
  • A.Prithiviraj, K.Krishnamoorthy, K.Jayabharathy, “ Optimizing handover performance for heterogeneous wireless networks in pmipv6”, International Journal of Advanced Research in Computer Science (ISSN – 0976-5697) Volume 5, No.1, Page 89-92, 2014.
  • A.Prithiviraj, K.Krishnamoorthy, K.Jayabharathy, “  Multicast enabled vertical handover technique for heterogeneous wireless networks”, Journal of Theoretical and Applied Information Technology (ISSN – 1992-8645) Volume 67, No.1, Page 111-120,2014.
  • A. Prithiviraj, K. Krishnamoorthy , M.Usha, “A Novel Cohesive and service driven methodology for augmenting the vertical handover performance in heterogeneous wireless networks”, ARPN Journal of Engineering and Applied Sciences (ISSN-1819-6608) Volume 10, No.9, May 2015.
  • A.Prithiviraj, K.Krishnamoorthy, M.Usha, A.Mahewari, “A Survey of Vertical Handover Decision Algorithms for PMIPv6 Domain”, Accepted for publication on March 2016 in Asian Journal of Information Technology.
  • A.Prithiviraj, K.Krishnamoorthy, B.Vinothini, “Fuzzy Logic Based Decision Making Algorithm to Optimize the Handover Performance in Hetnets”, Circuits and Systems (ISSN-2153-1293) Volume 7, Issue 10, 2016.
  • D. Balamurugan, S. Chandrasekar, S. Heyshanthini Pandiyakumari, M. Usha, “Traceback of DDoS attacks using Entropy variation for low rate attacks”, in the proceedings of the ICICP’2012 held at Mahendra Engineering College during March 29th – 31st, 2012.
  • Angelin Shiny. J, Balamurugan. D, Chandrasekar. S, Usha. M, “Traceback of DDoS Attacks using Entropy Variations by Differentiating Flash Crowds”, in the proceedings of the ICICP’2012 held at Mahendra Engineering College during March 29th – 31st, 2012.
  • D. Balamurugan, S. Chandrasekar, D. Jaya Prakash, M.Usha, “Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks”, International Journal of Information and Computation Technology (IJICT), vol 3, No 10,pp. no: (25-28), 2013.
  • P.Shanmugaraja, D. Balamurugan, S. Chandrasekar, “An approach to secure Teredo Tunneling Technology”, International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 3, March – 2013.
  • P. Shanmugaraja, S. Vasanthi, D. Balamurugan, S. Chandrasekar, “Design and Implementation of Transport Relay Translator and its security Mitigations”, International Journal of Engineering and Technology (IJET), Vol 5 No 4 , pp. no: 3439-3442, Aug-Sep 2013
  • P.Shanmugaraja, D. Balamurugan, S. Chandrasekar, “Security Attacks on IPv4 to IPv6 Transitions – Possible Mitagation Techniques”, International Journal of Soft Computing, Vol 9 No 2, pp.no: 79-84, 2014.
  • D. Balamurugan, P. Shanmugaraja, S. Chandrasekar, D.Jayaprakash, “UDP Worm Detection in IPv6 networks Using Entropy Variations”, International Journal of Soft Computing, Vol 9 No 4, pp.no: 219-225, 2014. Murale Narayanan , Usha Mahalingam, Diwahar S, Aswani Kumar.Ch , “Crowdsourcing – A Survey on Collective Intelligence in Action”, National Conference on Social, Mobile, Analytics and Cloud NCSMAC, April 2014,pp 67-69
  • A.S.Syed Fiaz, M. Usha and J. Akilandeswari, “Enhancing Cloud Brokerage Services using Hadoop Distributed File System (HDFS)”, NAC-CISS 2013.
  • Lilly Beaulah, H, Samson Ravindran, R, Suresh, RM & Thangaraj, K  2010, ‘Biomedical Images in Telemedicine using Modified Approaches:Issues and Implementation’, International Journal of Biomedical Engineering and Consumer Health Informatics, vol 2, no 2, pp. 79-85.
  • Thangaraj, K & Chitra, M 2012, ‘Sensors Lifetime Enhancement Techniques In Wireless Visual Sensor Networks - A Survey’, International Journal ofAdvanced Research in Computer Engineering and Technology, vol 1, no.3, pp 292-297.
    Thangaraj, K & Chitra, M 2015, ‘Implementation of Leach and Leach-c using NS2’,International Journal of Applied Engineering Reseach (IJAER), vol.10, no.12 , pp. 30659-30670.
  • Thangaraj, K & Chitra, M 2015, ‘Energy Efficient L4-Leach Protocol for Wireless Sensor Networks’, International Journal of Applied Engineering Reseach (IJAER), vol.10, no. 19, pp.40557-40565.
  • Jeba Emilyn, J, Thangaraj, K, Chitra, M & Ramar, K 2016, ‘A Rough Set Based Rational Clustering Framework For Determining Correlated Genes’, Acta Microbiologica et Immunologica Hungarica, vol. 63, no.7, pp. 1-17
  • Lilly Beaulah, H, Thangaraj, K & Chitra, M 2016, ‘Design of a New Energy Efficient L4 Leach Protocol for Forest Monitoring System’, Asian Journal of Research in Social Sciences and Humanities,  vol. 6, no.7, pp 662-671.