N Sivasankari's research while affiliated with Institute of Science & Technology for Advanced Studies & Research and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (4)
Security is the primary concern in any IoT application or network. Due to the rapid increase in the usage of IoT devices, data privacy becomes one of the most challenging issue to the researcher. In IoT applications, such as health care, smart homes or any wearables, transmission of human's personal data is more frequent. Man-in-the-Middle attack i...
Internet of Things (IoT) is a network of devices which can sense, accumulate and transfer data over the internet without any human intervention. The IoT is an ever-growing network of devices which connect to each other using various networking standards and protocols. But the infrastructure can be viewed as a hierarchy, where endpoint devices conne...
Citations
... To improve routing efficiency and security, in [12] Sivasankari and Kamalakannan propose a Fuzzy Logic based Man-in-the-Middle attack detection and Cuckoo Search Algorithm (FLCSA). Fuzzy logic is used to detect intrusion nodes based on factors like node degree, energy, and delay, while the Cuckoo Search Algorithm optimizes routing by selecting efficient relays considering node energy, link lifetime, and bandwidth. ...
... A Man in the Middle (MITM) attack is a cyberattack in which the attacker places oneself between two parties who believe they are directly communicating with each other without any third-party involvement, and then secretly transmits or modifies their messages. Active eavesdropping is one type of MITM attack in which the attacker establishes separate connections with the victims and relays messages between them to give the impression that they are speaking directly to one another over a private connection when in reality the attacker is in control of the entire conversation (Sivasankari and Kamalakkannan 2022). All essential messages sent between the two victims must be intercepted by the attacker, who must then introduce fresh and malicious messages. ...
... 1,2 IoT connects intelligent objects and devices used in people's daily lives to the internet. 3 WSNs have recently experienced rapid growth in the IoT era. 4 WSNs are becoming an emerging technology for potential applications, such as surveillance systems, agriculture, environmental monitoring, domestic, disaster management, and health care. 5 Figure 1 depicts the general structural design of WSNs. ...