Key Management Schemes in MANET-A Detailed Review: Dr.S.Sekar

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

RESEARCH ARTICLE OPEN ACCESS

Key Management Schemes in MANET- A Detailed Review


Dr.S.Sekar
Assistant Professor (Sel.Gr), SRM Valliammai Engineering College
Kattankulathur, Kanchipuram
ABSTRACT
A Mobile Ad Hoc Network (MANET) is a hotchpotch of nodes with mobility functionality, dynamically outlining the existing
network usage based on temporary architecture. Within MANETs, the performance factors of the routing protocols under
various conditions and environments play a demanding and critical role. The routing protocols are responsible for managing
several resource-limited nodes. MANETs exits several routing protocols, one of the keynotes to be considered when designing
a routing protocol is to notice that the routing protocol being implemented has a proportionate impact on network
performance. In this paper, MANET uses different approaches and technologies. The various technologies used for MANET
are brought together to find out which approaches are providing more value. The proposed (TSGKM) was simulated in NS2
and contrasted with the Novel Key Management Scheme (FTNKM) based on Fast Transmission.

I. INTRODUCTION

Over the last few years, due to the proliferation of monitoring of different attacks would be difficult. Therefore
affordable, readily available wireless devices, a massive MANET is vulnerable to assault [6].
expansion in the field of mobile computing has occurred. In MANET, all networking tasks, such as routing and packet
Recent second-generation (2G) cellular systems have forwarding, are carried out in a self-organizing way by nodes
achieved a high rate of penetration and enabled mobile themselves. Of these reasons, it is very difficult to secure a
connectivity worldwide. Mobile users can check emails and mobile ad-hoc network [7]. Since multicast routing needs
browse the internet. With 2 G upgrades, 3 G networks now more channels for transmitting the data, it can be subjected
deliver higher data speeds, infotainment, and location-based to multiple attacks. Multicast transmissions in MANET will
or customized services in mobile devices. This evolution fulfil the basic security requirements such as confidentiality,
motivates a novel alternative method, called an ad hoc authentication, and integrity [8]. IDS refer to the approach of
mobile network [1]. The contact between the mobile nodes tracking every node operation in a network [9]. IDS is used
will support the network providing the essential role of to detect various forms of attacks in a network and to defend
control and administration. MANET's biggest advantages are the network against external attacks [10]. Throughout
flexibility, ease of installation and robustness. Mobile nodes MANETs, support for group-oriented applications such as
are fitted with wireless radio, memory, power source, and audio/video conferencing and one-to-many distribution of
processor. Wireless ad hoc networks have more unique data throughout battlefield or disaster rescue scenarios is
features, and some drawbacks compared to wired networks important [11]. A trivial solution is that each member should
[2]. MANET is specified with purpose-specific, autonomous, publish a public key and hold the respective secret key, such
and dynamic characteristics. There is no master or slave that the message can be encrypted independently under the
relationship in a mobile ad hoc network, similar to fixed public keys of all users. This trivial solution is highly
wireless networks. Costs associated with network creation inefficient, however, since the cipher text increases linearly
are negligible due to the avoidance of fixed infrastructure. with the group size, and the sender must hold the public keys
Each node serves as a communications router [3]. In multi- of all group members [12]. By default, in MANETs the
casting, a node can at any time, randomly join or leave a nodes have the mobility function that they do not transmit on
group. A node may concurrently become a member of networks, and nodes communicate and interact with each
multiple classes. It can serve as a forwarding agent for other through the interfaces wireless [13]. The Ad-Hoc
transmitting data to other groups. Multicasting technique Mobile Networks are independent, open Wi-Fi systems.
where a several redundant messages should be sent to a MANETs consist of free-shifting cell nodes in and out of the
collection of receivers [4] can be implemented. Routing network. Nodes are the devices or units that communicate in
protocols in MANET typically presume the nodes are the network and are cell, i.e. mobile phones, tablets, non-
truthful and cooperative. But an attacker may be acting as a public digital assistance, MP3 players, and private laptops
router during routing and disrupting the routing process. It [14]. Fuzzy logic is a computational model that gives the
can communicate with any node. The battery power can be ambiguity and imprecision involved in human reasoning a
drained by an egoistic node. Such internal assaults are more logical system that is also known as indirect reasoning [15].
vulnerable than external assaults [5]. Because MANET has
no fixed infrastructure and a highly complex topology,

ISSN: 2347-8578 www.ijcstjournal.org Page 62


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

II. LITERATURE REVIEW This research introduces IDS strategies according to IDS
distributed architecture [27].
An optimized AODV protocol based on trust that detects A pyramidal security model to safeguard the
packing drop attacks that occur during data transmission has exchange of knowledge a multi-security level is used within
been proposed. Using the Ant Colony Optimization (ACO) one cooperation domain[58]. A pyramidal security model as
technique [16], a trust-based routing is performed and a popular function includes a collection of hierarchical
optimized. A scheme to strengthen current on-demand security groups and multicast groups [28]. A secure
routing protocols by implementing the energy-conscious construction of multicast tree is used with the help of the
routing concept for the backbone. The proposed protocol is Bacterial Foraging Optimization (BPO) algorithm to build a
an improvement of the current routing protocol for Ad hoc secure construction of multicast tree in MANET[59]. During
On- Request Distance Vector (AODV), which provides routing, the proposed algorithm uses the public routing proxy
considerably good routing services [17]. In DRMS nodes are to conceal sender and receiver identity from other nodes to
monitored and observed for malicious and selfish maintain confidentiality [29]. A two-step, secure
behaviours. Because of these attacks, it reduces the risk of multicasting authentication method is used in MANETs. A
network performance degradation. However, no technique Markov chain model was used to evaluate the confidence
was provided for raising the energy consumption involved in value of one-hoe neighbors based on historical confidence
packet forwarding [18]. An Optimized Multicast Backbone values [30]. A MANET intrusion detection method and
Routing for MANET was introduced in 2015. This improves compared IDSs to identify nodes that were misbehaving[56].
node residual energy and provides stability by enhancing The author described the Intrusion Detection Systems
access to the network. This routing protocol achieves a Architecture that has been implemented for MANETs until
greater packet distribution ratio [19]. With the problem of now and then presented and compared the current intrusion
group access for wireless ad hoc networks in secure detection techniques in MANET [31]. A theoretical online
multicast communication. We have integrated the network fuzzy risk assessment is used for distributed intrusion
topology (node location), the "power proximity" between prediction and prevention (DIPPS) systems[57]. This
network nodes, and the medium’s path loss characteristics in program senses potential intrusions and avoids them. DIPPS
key distribution tree design to conserve energy [20]. A novel can foresee possible intrusions within a distributed network
anonymous distributed secure routing protocol in ad hoc [32].
mobile wireless networks. Their protocol 's purpose is not An improvement of the MANET Intrusion
only to protect the privacy and private information of the Detection Watchdog / Pathrater model is proposed[55]. In
communicating nodes, but also to protect the protection of promiscuous mode, if the message is not transmitted within a
the discovery of the route and to prevent certain malicious certain timeframe, the participating nodes are permitted to
behaviours during the two-way conversation [21]. listen to the nodes they have communicated to, and then the
Artificial Neural Networks (ANN) to make multicast routing node is suggested to be marked as a misbehaving node [33].
in MANETs efficient and stable. The approach considers the A new intrusion-detection system called Enhanced Adaptive
selection of input variables for ANN, evaluating the optimal ACKnowledge (EAACK) developed specifically for
number of neurons for Multicasting's hidden Layer MANET[54]. The results showed good output against
collection with supporting node routing function [22]. A Watchdog, TWOACK, and AACK in cases of collision with
novel scheme for protecting delay sensitive data against the receiver, reduced transmitting capacity, and false
erroneous packet injection attacks on network-coded reporting of misbehaviour [34]. A novel method is used for
multicast. In particular, they proposed an efficient detecting attacks on port scanning using Fuzzy logic. To
authentication mechanism based on the null-space properties improve the efficiency of port scanning detection a fuzzy
of coded packets, to enable recipients to detect any high- logic controller is designed and integrated with Snort.
probability bogus packets [23]. A self-organized hash-based, Experiments are performed in wired as well as wireless
secure routing scheme is used for ad hoc multicast networks. networks [35]. A Monitoring Device used for Co-Operative
For main distribution, it uses the Diffie-Hellman group form. Intrusion in MANET. This system can be divided into three
Authentication of the route and credibility, both by modules, based on Normal and Attack mode packet transfer
generating local flag codes and global hash values is ensured [36]. A Grammatical Approach used for Detecting Attack on
[24].A suggested Hierarchical Cooperative IDS on MANETs MANETs. The author investigates the implementation of a
which incorporates the features of anomaly-based learning technique focused on artificial intelligence to
identification techniques and signature-based techniques to explore this challenging design space [37]. A Divulged IDS
guarantee an accurate and scalable IDS. In MANET various (DIDS) consists of rules for detecting intrusions, constructed
techniques of machine learning (ML) were used to provide from activity logs. The information obtained from the logs of
effective IDS [25]. A distributed, cooperative MANET IDS various devices was correlated [38].
focused on trust ties. The Network monitors the attacks A new scheme for detecting such malicious behaviour, based
locally and internationally. Whenever an anomaly is on statistical process control (SPC) borrowed from the
observed, a message of warning was transmitted among the industrial field in the context of quality management [39]. A
network nodes. The nodes watch adjacent nodes of confidence setting scheme for MANETs aimed at improving
suspicious activities [26]. A research has been made on the reliability of packet transmission over multi-hop routes in
Stable MANETs for an Intrusion Detection System (IDS). the presence of potentially malicious nodes [40]. An overlay
network solution incorporating mechanisms for routing and

ISSN: 2347-8578 www.ijcstjournal.org Page 63


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

reliability is proposed. It has two main components: protocol has been simulated in NS2 and compared with the Fast
EOR and protocol RTCP[53]. The Emergency Overlay Transmission based Novel Key Management (FTNKM)
Routing (EOR) protocol is a reactive protocol built into scheme. Simulation results show that TSGKM outperforms
architecture for the store-carry-forward [41]. A time-slotted FTNKM in terms of delivery in terms of communication
distributed protocol to improve ad-hoc network overhead, computational overhead, and detection accuracy.
transmissions. It is done by using the well-known multiple-
output (MIMO) computer cooperative technique [42]. An REFERENCES
Optimized and Reliable MANET AODV (ORAODV)
protocol is proposed. It adapts itself quickly according to the [1]. Dr.N.Krishnaraj, Kiranmai Bellam, “Improved
changing MANET topology conditions[51]. To retransmit Distributed Frameworks to Incorporate Big Data
the data, it uses the Blocking Expanding Ring Search through Deep Learning”, Journal of Advanced
(Blocking-ERS) method[52]. ORAODV has been shown to Research in Dynamical & Control Systems, Vol. 12,
have better performance in terms of PDR, routing overhead, 03-Special Issue, 2020.pp:332-338
and delay under different network sizes and node speeds [2]. Shankar, K., Lakshmanaprabu, S. K., Gupta, D.,
[43]. A novel method for detecting attacks on port scanning Khanna, A., & de Albuquerque, V. H. C. (2020).
using Fuzzy logic is proposed. To improve the functionality Adaptive optimal multi key based encryption for
of port scanning detection a fuzzy logic controller is digital image security. Concurrency and
designed and integrated with Snort[50]. Experiments are Computation: Practice and Experience, 32(4), e5122.
performed in wired as well as wireless networks [44]. An [3]. G. Keethana , P.Anandan “A Survey on Security
Improved Location assisted Cluster Based Routing Protocol Issues and Challenges in Mobile Ad-hoc Network”
(ILCRP) with the Mobile Ad Hoc Networks Intrusion The Energy Green, Intelligent in Computing &
Detection System. In MANETs with malicious nodes, Communication Technologies in Journal of Energy
ILCRP for GPS-enabled MANETs was analyzed, and an Web and Information
Intrusion Detection System was used to increase the packet Technologies,Vol5,Issue20,2018.
delivery ratio [45]. A changed ROUTE REQ packet in Fuzzy [4]. Chi-Hua Chen, “A Cell Probe-based Method for
enhanced ADRP to achieve security in multicast routing. By Vehicle Speed Estimation,” IEICE Transactions on
doing this even though the number of paths is decreased and Fundamentals of Electronics, Communications and
simulation time increases, protected paths are found out Computer Sciences, vol. E103-A, no. 1, pp. 265-267,
between sources to destination [46]. January 2020.
A novel, stable, MAODV based S-MAODV routing [5]. R. Meera, P.Anandan “A Review On Automatic
protocol. S-MAODV takes full advantage of trusted Detection of Brain Tumor Using Computer Aided
computing technologies, combined with the Bit-set Diagnosis System Through MRI” The Energy Green,
framework for Secure Node Authentication and Safety Intelligent in Computing & Communication
Indicator. Their SMAODV is an anonymous protocol, with Technologies in Journal of Energy Web and
no Trusted Third Party (TTP) requirement [47]. A trust Information Technologies, Vol5, Issue20, 2018.
model is used which identifies the attackers and isolates [6]. J.Sangeetha,T.Jayasankar,“ A Novel Whispered
them from the network. The attackers are identified using the Speaker Identification System Based on Extreme
energy consumption component, based on direct trust Learning Machine”, International Journal of Speech
values[48]. Nevertheless, watchdog scheme could be Technology, Springer,(2018) ,21 (1), pp.157–165.
included in the supervisor module to make the network more [7]. N.Krishnaraj, Mohamed Elhoseny,
secure [60]. A suggested Security Improvements for Mobile M.Thenmozhi,Mahmoud M.Selim , K.Shankar ,
Ad Hoc Networks use Unclear Logic for Trust “Deep Learning Model for real- time image
Management[49]. In the proposed methodology, a compression in Internet of Underwater
combination of the uncertain logic, Bayesian inference, and Things(IoUT)”, Journal of Real-time Image
Dempster-Shafer theory estimates the trust value of the Processing ,2019
monitored node [61]. A trust-enhanced, lightweight on- [8]. Chi-Hua Chen, Fangying Song, Feng-Jang Hwang,
demand multi-path routing is used in MANET. Developing a Ling Wu, “A Probability Density Function Generator
reliable routing protocol is given top priority in the proposed Based on Neural Networks,” Physica A: Statistical
technique [62]. Mechanics and its Applications, vol. 541, Article
ID 123344, March 2020.
III. CONCLUSION [9]. K.Dhanasekaran , P.Anandan, A.Manju “A
Computational Approach of Highly Secure Hash
A cross-layer based lightweight reliable and secure Algorithm For Color Image Steganography Using
multicast routing (CLR-SMR) protocol has been developed Edge Detection And Honey Encryption Algorithm”
in which a multicast tree is established. It is hierarchically International Journal of Engineering & Technology,
divided into clusters based on the depth of the tree. Then 7 PP. 239-242, 2018.
Cluster Heads (CHs) are selected based on the link stability, [10]. N.Krishnaraj,M.G.Kavitha,T.Jayasankar,K.Vinoth
residual energy power, and remaining bandwidth and Kumar , “A Glove based approach to recognize
gateway nodes are chosen depending on their residual Indian Sign Languages”, International Journal of
energy, and packet delivery rate. The proposed (TSGKM)

ISSN: 2347-8578 www.ijcstjournal.org Page 64


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

Recent Technology and Engineering (IJRTE) [22]. P.Anandan, N.Mohankumar,V.Saranya


Volume-7, Issue-6, March 2019, pp.1419-1425. “Characterization of Flicker noise in Dual Material
[11]. Dr.N.Krishnaraj ,Dr P Kiran Kumar, Mr K Subash Gate Silicon Nanowire Transistors” Journal of
Bhagahavn , “Conceptual Semantic Model for Web Nanoelectronics and Optoelectronics, 12, 72–75
Document Clustering Using Term Frequency”, EAI (2017) (Impact Factor 0.369)
Endorsed Transactions on Energy Web and [23]. Hsu-Yang Kung, Chi-Hua Chen, Mei-Hsien Lin,
Information Technologies, Volume 5, Issue Tai-Yang Wu, “Design of Seamless Handoff Control
20,2018,pp.1-4. Based on Vehicular Streaming
[12]. Mingyang Pan, Yisai Liu, Jiayi Cao, Yu Li, Chao Communications,” Journal of Internet Technology,
Li, Chi-Hua Chen, “Visual Recognition Based on vol. 20, no. 7, pp. 2083-2097, December 2019.
Deep Learning for Navigation Mark [24]. N.Mohankumar, A.Mohanbabu, S.Baskaran,
Classification,” IEEE Access, vol. 8, pp. 32767- P.Anandan, N.Anbuselvan and P.Bharathivikkiraman
32775, February 2020. “Modeling of Sheet Carrier Density, DC and
[13]. K.Vijayalakshmi,P.Anandan “A Multi Objective Transconductance of Novel InxAl1-XN/GaN-Based
Tabu Particle Swarm Optimization for Effective HEMT Structures” Advanced Materials Research
Cluster Head Selection in WSN” Cluster Computing, Vol. 1105 (2015) pp 99-104.
Vol. 22,Issue5,12275–12282,2019. [25]. Shankar, K., Zhang, Y., Liu, Y., Wu, L., & Chen, C.
[14]. N. Krishnaraj, P. Ezhilarasu, X Z Gao ,”Hybrid Soft H. (2020). Hyperparameter Tuning Deep Learning
Computing Approach for Prediction of Cancer in for Diabetic Retinopathy Fundus Image
Colon Using Microarray Gene Data” , Current Signal Classification. IEEE Access.
Transduction Therapy Vol.11 (2),pp71-75,June 2016. [26]. Dhanapal, R & Visalakshi, P 2016, Real Time Health
[15]. N. Krishnaraj, P. Ezhilarasu, S.Karthik , Manoj Care Monitoring System for Driver Community
Prabhakar.J, ,”Enhancing Security in Mobile Devices Using Adhoc Sensor Network‟, Journal of Medical
through Multimodal biometrics” , Middle-East Imaging and Health Informatics, ISSN 2156-7018,
Journal of Scientific Research 23 (8) ,pp. 1598- vol. 6, no. 3, pp. 811-815.
1603,Jun 2016. [27]. Shankar, K., & Elhoseny, M. (2019). Trust Based
[16]. Shankar, K., Lakshmanaprabu, S. K., Khanna, A., Cluster Head Election of Secure Message
Tanwar, S., Rodrigues, J. J., & Roy, N. R. (2019). Transmission in MANET Using Multi Secure
Alzheimer detection using Group Grey Wolf Protocol with TDES. Journal of Universal Computer
Optimization based features with convolutional Science, 25(10), 1221-1239.
classifier. Computers & Electrical Engineering, 77, [28]. “Distributed Security Model for Remote Healthcare
230-243. (DSM-RH) Services in Internet of Things
[17]. B.Senthilraja, P.Anandan, A.Manju “The Survey to Environment” Cyril Mathew, R. Dhanapal, P.
Implement Recent Reversible Watermarking Visalakshi, K. G. Parthiban, S. Karthik, Journal of
Techniques In Medical Images And Other Medical Imaging and Health Informatics, Volume
Applications” Journal of Advanced Research in 10, Number 1, January 2020, pp. 185-193(9).
Dynamical & Control Systems, Vol.10-Special Issue [29]. Manickam, P., Shankar, K., Perumal, E., Ilayaraja,
03, May 2018. M., & Kumar, K. S. (2019). Secure data transmission
[18]. Krishnaraj,N.,Ezhilarasu,p., Dharun, V.S.,” Smart through reliable vehicles in VANET using optimal
Phone Application For Automatic Public lightweight cryptography. In Cybersecurity and
Transportation Though Providing Intelligent Bus secure information systems (pp. 193-204). Springer,
Status Information To The Users” International Cham.
Journal of Applied Engineering Research (IJAER), [30]. “Hybrid Dragonfly Optimization-Based Artificial
Vol 59, pp.163-167, Jun -2015, Neural Network for the Recognition of Epilepsy” R.
[19]. Ling Wu, Qishan Zhang, Chi-Hua Chen, Kun Guo, Dhanapal K. G. Parthiban, S. Vijayachitra,
Deqin Wang, “Deep Learning Techniques for International Journal of Computational Intelligence
Community Detection in Social Networks,” IEEE Systems,Volume 12, Issue 2, 2019, Pages 1261 -
Access, vol. 8, pp. 96016-96026, May 2020. 1269.
[20]. P.Vinayagam, P.Anandan “A Review on Pixel [31]. Shankar, K. (2017). Prediction of most risk factors in
Performance in CMOS Image Sensors” Journal of hepatitis disease using apriori algorithm. Research
Advanced Research in Dynamical & Control Journal of Pharmaceutical Biological and Chemical
Systems, 05-Special Issue, July 2017. Sciences, 8(5), 477-484.
[21]. Chin-Ling Chen, Tsai-Tung Yang, Yong-Yuan [32]. “A Cost-Aware Method for Tasks Allocation on the
Deng, Chi-Hua Chen, “A Secure IoT Medical Internet of Things by Grouping the Submitted
Information Sharing and Emergency Notification Tasks”R Dhanapal, T Akila, SS Hussain, D
System Based on Non-repudiation Mavaluru - Journal of Internet Technology, Volume
Mechanism,” Transactions on Emerging 20 (2019) No.7,Pages 2055-2062.
Telecommunications Technologies, Accepted [33]. Chi-Hua Chen, “An Arrival Time Prediction Method
Manuscript. for Bus System,” IEEE Internet of Things Journal,
vol. 5, no. 5, pp. 4231-4232, October 2018.

ISSN: 2347-8578 www.ijcstjournal.org Page 65


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

[34]. “Real Time Health Care Monitoring System for Compression Scheme Using Neighborhood
Driver Community Using Adhoc Sensor Network” Correlation Sequence Algorithm in WSN. IEEE
Dhanapal, R.; Visalakshi, P.Journal of Medical Transactions on Reliability.
Imaging and Health Informatics, Volume 6, Number [46]. G.S.S.S.S.V. Krishna Mohan & Yarravarapu
3, June 2016, pp. 811-815(5) Srinivasa Rao: “Optimal Order of the Differentiator
[35]. Elhoseny, M., Shankar, K., &Uthayakumar, J. Selection in Noise Removal of ECG Signals”,
(2019). Intelligent diagnostic prediction and International Journal of Recent Technology and
classification system for chronic kidney Engineering (IJRTE),Volume-7, Issue-6, 260-267,
disease. Scientific reports, 9(1), 1-14. March 2019.
[36]. “A Sector Based Energy Efficient Adaptive Routing
Protocol for Large Scale MANET” R Dhanapal, P [47]. Lydia, E. L., Raj, J. S., PandiSelvam, R., Elhoseny,
Visalakshi - Research Journal of Applied Sciences, M., & Shankar, K. (2019). Application of discrete
Engineering and Technology,volume 9(7): pages transforms with selective coefficients for blind image
478-484,2015. watermarking. Transactions on Emerging
[37]. Elhoseny, M., Bian, G. B., Lakshmanaprabu, S. K., Telecommunications Technologies, e3771.
Shankar, K., Singh, A. K., & Wu, W. (2019). [48]. GSSSSV.Krishna Mohan and Yarravarapu Srinivasa
Effective features to classify ovarian cancer data in Rao, “An efficient design of fractional order
internet of medical things. Computer Networks, 159, differentiator using hybrid Shuffled frog leaping
147-156. algorithm for handling noisy electrocardiograms”,
[38]. Dhanapal, R & Visalakshi, P 2016, “Optimizing International Journal of Computers and
Trust Based Secure Routing for Unified Efficient Applications,Feb 2019.
Resource Sharing for Large Scale MANET-TSRRS‟, [49]. Sivaram, A. M., Lydia, E. L., Pustokhina, I. V.,
Asian Journal of Information Technology, ISSN Pustokhin, D. A., Elhoseny, M., Joshi, G. P., &
:1682-3915, vol. 15, no. 19, pp. 3756-3762. Shankar, K. (2020). An Optimal Least Square
[39]. Elhoseny, M., & Shankar, K. (2020). Energy Support Vector Machine Based Earnings Prediction
efficient optimal routing for communication in of Blockchain Financial Products. IEEE Access.
VANETs via clustering model. In Emerging [50]. GSSSSV.Krishna Mohan and K.Venkata Lakshmi
Technologies for Connected Internet of Vehicles and Narayana, “Design Of A Fractional Order PID For A
Intelligent Transportation System Networks (pp. 1- Three Tank System”, International Journal of
14). Springer, Cham. Applied Engineering Research, Volume 10, Number
[40]. Dhanapal, R & Visalakshi, P 2015, “Efficient 2 (2015) pp. 3133-3148, Research India Publications,
Clustering Protocol on Ant-Bee agent for Large April 2015.
Scale Manet‟, International Journal of Applied [51]. Elhoseny, M., Selim, M. M., & Shankar, K. (2020).
Engineering Research, ISSN 0973-4562, vol. 10, no. Optimal Deep Learning based Convolution Neural
52, pp. 349-361. Network for digital forensics Face Sketch Synthesis
[41]. Krishnaraj, N., Elhoseny, M., Lydia, E. L., Shankar, in internet of things (IoT). International Journal of
K., &ALDabbas, O. (2020). An efficient radix Machine Learning and Cybernetics, 1-12.
trie‐based semantic visual indexing model for [52]. D.V.L.N.Sastry, B.Anil Kumar, P. Kameswara Rao,
large‐scale image retrieval in cloud G.S.S.S.S.V.Krishna Mohan “Tuning Of Fractional
environment. Software: Practice and Experience. Order PID Controller For Interacting Systems By
[42]. G.S.S.S.S.V.Krishna Mohan and Komanapalli Different Methods”, i--manager’s Journal on
Venkata Lakshmi Narayana, “Auto Tuning Smith- Instrumentation & amp; Control Engineering Vol.2
Predictive Control of Delayed Processes Based on No.2 May July 2014.
Model Reference Adaptive Controller”, Jour of Adv [53]. Chi-Hua Chen, Feng-Jang Hwang, Hsu-Yang Kung,
Research in Dynamical & Control Systems,Vol. 12, “Travel Time Prediction System Based on Data
04-Special Issue, p.p.1224-1230, 2020. Clustering for Waste Collection Vehicles,” IEICE
[43]. Mohanty, S. N., Lydia, E. L., Elhoseny, M., Al Transactions on Information and Systems, vol. E102-
Otaibi, M. M. G., & Shankar, K. (2020). Deep D, no. 7, pp.1374-1383, July 2019.
learning with LSTM based distributed data mining [54]. A,Venkata Naga Vamsi, G.S.S.S.S.V.Krishna
model for energy efficient wireless sensor Mohan, S.S.S.Srikanth, “Simplified Thermocouple
networks. Physical Communication, 101097. Interface For Hot Only Or Cold Only Measurement
[44]. GSSSSV.Krishna Mohan and Yarravarapu Srinivasa With Linearization Circuit”, (IJERA) International
Rao, “An efficient design of finite impulse response Journal of Engineering Research and Applications,
— Fractional-order differentiator using shuffled frog Vol. 2, Issue5, September- October 2012, pp.1663-
leaping algorithm heuristic”, International Journal of 1667.
Wavelets, Multiresolution and Information [55]. Lakshmanaprabu, S. K., Shankar, K., Ilayaraja, M.,
Processing, World Scientific Publishing Company, Nasir, A. W., Vijayakumar, V., & Chilamkurti, N.
Vol. 17, No. 2 March 2019. (2019). Random forest for big data classification in
[45]. Uthayakumar, J., Elhoseny, M., & Shankar, K. the internet of things using optimal
(2020). Highly Reliable and Low-Complexity Image

ISSN: 2347-8578 www.ijcstjournal.org Page 66


International Journal of Computer Science Trends and Technology (IJCST) – Volume 8 Issue 4, Jul-Aug 2020

features. International journal of machine learning


and cybernetics, 10(10), 2609-2618.
[56]. D.V.L.N.Sastry, G.S.S.S.S.V.Krishna Mohan,
M.S.R.Naidu, N.Mohana Rao, “An Implementation
of different non-linear PID controllers on a single
tank level control using Matlab”, (IJCA)
International Journal of Computer Applications
(0975 – 8887) Volume 54– No.1, September 2012.
[57]. Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta,
D., Shankar, K., Lakshmanaprabu, S. K., & Khanna,
A. (2020). An efficient Lightweight integrated
Blockchain (ELIB) model for IoT security and
privacy. Future Generation Computer Systems, 102,
1027-1037.
[58]. Kathiresan, S., Sait, A. R. W., Gupta, D.,
Lakshmanaprabu, S. K., Khanna, A., & Pandey, H.
M. (2020). Automated detection and classification of
fundus diabetic retinopathy images using synergic
deep learning model. Pattern Recognition Letters.

[59]. Sankhwar, S., Gupta, D., Ramya, K. C., Rani, S. S.,


Shankar, K., &Lakshmanaprabu, S. K. (2020).
Improved grey wolf optimization-based feature
subset selection with fuzzy neural classifier for
financial crisis prediction. Soft Computing, 24(1),
101-110.
[60]. Pustokhina, I. V., Pustokhin, D. A., Gupta, D.,
Khanna, A., Shankar, K., & Nguyen, G. N. (2020).
An Effective Training Scheme for Deep Neural
Network in Edge Computing Enabled Internet of
Medical Things (IoMT) Systems. IEEE Access, 8,
107112-107123.
[61]. Raj, R. J. S., Shobana, S. J., Pustokhina, I. V.,
Pustokhin, D. A., Gupta, D., & Shankar, K. (2020).
Optimal Feature Selection-Based Medical Image
Classification Using Deep Learning Model in
Internet of Medical Things. IEEE Access, 8, 58006-
58017.
[62]. Pustokhina, I. V., Pustokhin, D. A., Rodrigues, J. J.,
Gupta, D., Khanna, A., Shankar, K., & Joshi, G. P.
(2020). Automatic Vehicle License Plate
Recognition using Optimal K-Means with
Convolutional Neural Network for Intelligent
Transportation Systems. IEEE Access.

ISSN: 2347-8578 www.ijcstjournal.org Page 67

You might also like