S.S. Tyagi

Work place: Department of Computer Science and Engineering, Manav Rachna International University, Faridabad, India

E-mail: shyam.fet@mriu.edu.in

Website: https://scholar.google.com/citations?user=VFo9SdoAAAAJ&hl=en

Research Interests: Mathematics of Computing, Computing Platform, Information Security, Computer Networks, Autonomic Computing

Biography

S. S. Tyagi is presently working as a Professor and Head of the Department of Computer Science Engineering and Information Technology in Manav Rachna International University, Faridabad. He completed his Ph.D. in Computer Engineering from Kurukshetra University, kurukshetra in the year 2010. He did his M.E in software systems from BITS Pilani in the year 2002 and B.Tech in Computer Engineering from Nagpur University, Nagpur in 1992.

He is having 23 years of vast teaching and industrial experience including 4 years into industry. He has been consultant to some multi National software development companies. He has been an examiner and evaluator for M.Tech and Ph.D thesis. He has been a reviewer of books and research papers for some renowned and reputed journals. At present, he is guiding 08 Ph.D. Scholars in the field of Ad hoc networks, Cloud Computing, Wireless Security etc. There are around 50 publications to his credit published in reputed International & National Journals and in the proceedings of International and National Conferences.

Dr. S. S. Tyagi is a member of various professional bodies like IEEE, CSI, QCI, and ASQ.

Author Articles
An Efficient Multi-keyword Symmetric Searchable Encryption Scheme for Secure Data Outsourcing

By Vasudha Arora S.S. Tyagi

DOI: https://doi.org/10.5815/ijcnis.2016.11.08, Pub. Date: 8 Nov. 2016

Symmetric searchable encryption (SSE) schemes allow a data owner to encrypt its data in such a way that it could be searched in encrypted form. When searching over encrypted data the retrieved data, search query, and search query outcome everything must be protected. A series of SSE schemes have been proposed in the past decade. In this paper, we are going to propose our an efficient multi-keyword symmetric searchable encryption scheme for secure data outsourcing and evaluate the performance of our proposed scheme on a real data set.

[...] Read more.
Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs

By Kaebeh Yaeghoobi S.B. M.K.Soni S.S. Tyagi

DOI: https://doi.org/10.5815/ijcnis.2016.01.02, Pub. Date: 8 Jan. 2016

Wireless Sensor Networks are emerging technologies that are diverse on energy consumption from different aspects. In the task mode, energy consumption of sensor nodes is categorized in, data packet transmitting, data processing and idle mode. Fundamentally, higher power is required and utilized at the time of data trans-receive as comparing to idle mode. However, power consumption of sensor in idle mode is necessarily important. To conserve energy, the network must provide quality of service sleep schedule, and use a mechanism to turn off the radio receiver periodically in coordinating method. Moreover, through dynamically round task management of sensors, significant energy saving can be achieved. Based on tasks and sleep schedules, nodes can form their clusters. It is necessary for real-time wireless applications to cogitate data transmit at the actual and response time based on the queries or tasks. This paper proposes Dynamic Immediate Data Report (DIDR) for real-time communication to schedule sleep mode of sensors in the network. Furthermore, to minimize the network energy consumption, Dynamic Schedule Data Report (DSDR) method is proposed. This method shows its efficiency by reducing the active time of nodes in the network. The performance analysis of the proposed works, illustrate effectively more energy efficiency as compared to existing methods.

[...] Read more.
HTTP Packet Inspection Policy for Improvising Internal Network Security

By Kuldeep Tomar S.S. Tyagi

DOI: https://doi.org/10.5815/ijcnis.2014.11.05, Pub. Date: 8 Oct. 2014

Past few years the use of Internet and its applications has increased to a great extent. There is also an enormous growth in the establishment of computer networks by large, medium and small organizations, for data transfer and information exchange. Due to this huge growth, incidents of cyber-attacks and security breaches have also increased. Data on a network is transferred using protocols such as Hyper Text Transfer Protocol, which is very vulnerable. Many types of malicious contents are hidden in packets that are transferred over a network or system, which may can to get it slow, crash or buffer overflow etc. Thus it is very important to secure networks from such types of attacks. There are lots of mechanisms available but still they are not good enough because of dynamic environment. Such kind of attacks can be countered by applying appropriate policies on network edge devices like Adaptive Security Appliance, firewalls, web servers, router etc. Also the packets which are transferred between networks, they should deeply inspect for malicious or any insecure contents. In this paper firstly we would study Network security issues and available mechanism to counter them our focus would be on inspecting the HTTP packets deeply by applying policies on ASA. Finally we would use Graphical Network Simulator (GNS3) to test such a policy.

[...] Read more.
Other Articles