Sanjay Silakari

Work place: CSE Department, University Institute of Technology, RGPV, Bhopal

E-mail: ssilakari@yahoo.com

Website:

Research Interests: Computational Engineering, Engineering

Biography

Dr. Sanjay Silakari: received his Bachelor’s degree in Computer Science & Engineering from SATI, Vidisha in 1991, M.E. (Computer Science & Engineering) from DAVV, Indore in 1998) and Ph.D. (Computer Science & Engineering) in 2006 from B.U. Bhopal (M.P.) India. He has published more than hundreds Research Papers in various International & National Journals & Conferences.  He is Dean of Faculty of CSE & IT in RGPV. Currently He is working as Joint Director in UIT-RGPV and Prof.  & Head in CSE Department, UIT-RGPV Bhopal. He is also member of various Academic Societies.

Author Articles
Helper Feedback based Medium Access Control Protocol: A Reliable Co-operative MAC Scheme for MANET

By Nidhi Newalkar Piyush Kumar Shukla Sanjay Silakari

DOI: https://doi.org/10.5815/ ijcnis.2015.02.06, Pub. Date: 8 Jan. 2015

A novel multirate media access control based co-operative scheme has been proposed. It has been observed that any co-operative scheme gives a better performance only if the helper nodes selected to, relay the transmission from source to destination are reliable enough. Murad Khalid et.al has already proposed a protocol [24] where more than one helper nodes are selected to improve the reliability, so that if one fails the other can be used as a backup. But in this paper focus is on selection of reliable helpers. If a helper node has a high data rate, has successfully relayed traffic in the past and also has some minimum amount of energy left , not only for relaying traffic for others but also to conduct its own transmissions, then it acts as a suitable candidate to be chosen as a helper node. Such a co-operatives scheme enhances the throughput, reliability and overall performance of the network.Simulation has been conducted to show that the proposed scheme performs better than the

[...] Read more.
Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

By Bhavana Butani Piyush Kumar Shukla Sanjay Silakari

DOI: https://doi.org/10.5815/ijcnis.2014.11.04, Pub. Date: 8 Oct. 2014

Wireless sensor networks (WSNs) are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

[...] Read more.
Trust Formulization in Dynamic Source Routing Protocol Using SVM

By Priya Kautoo Piyush Kumar Shukla Sanjay Silakari

DOI: https://doi.org/10.5815/ijitcs.2014.08.06, Pub. Date: 8 Jul. 2014

In an advanced wireless network, trust is desirable for all routing protocols to secure data transmission. An enormous volume of important information communicates over the wireless network using trusted dynamic routing protocol, which is the enhancement of the DSR (Dynamic Source Routing) protocol to improve trust. Previously fuzzy logic, genetic algorithm, neural network has been used to modify DSR and good result has been obtained in few performance indicators and parameters. In this work an SVM based trusted DSR have been developed and better results have been presented. This new novel on demand trust based routing protocol for MANET is termed as Support vector machine based Trusted Dynamic Source Routing protocol, performance of STDSR has been improved in term of the detection ratio (%) at different mobility and no. of malicious node variation.

[...] Read more.
Other Articles