N Sivasankari's research while affiliated with Institute of Science & Technology for Advanced Studies & Research and other places

Publications (4)

Article
Security is the primary concern in any IoT application or network. Due to the rapid increase in the usage of IoT devices, data privacy becomes one of the most challenging issue to the researcher. In IoT applications, such as health care, smart homes or any wearables, transmission of human's personal data is more frequent. Man-in-the-Middle attack i...
Article
Full-text available
Internet of Things (IoT) is a network of devices which can sense, accumulate and transfer data over the internet without any human intervention. The IoT is an ever-growing network of devices which connect to each other using various networking standards and protocols. But the infrastructure can be viewed as a hierarchy, where endpoint devices conne...

Citations

... To improve routing efficiency and security, in [12] Sivasankari and Kamalakannan propose a Fuzzy Logic based Man-in-the-Middle attack detection and Cuckoo Search Algorithm (FLCSA). Fuzzy logic is used to detect intrusion nodes based on factors like node degree, energy, and delay, while the Cuckoo Search Algorithm optimizes routing by selecting efficient relays considering node energy, link lifetime, and bandwidth. ...
... A Man in the Middle (MITM) attack is a cyberattack in which the attacker places oneself between two parties who believe they are directly communicating with each other without any third-party involvement, and then secretly transmits or modifies their messages. Active eavesdropping is one type of MITM attack in which the attacker establishes separate connections with the victims and relays messages between them to give the impression that they are speaking directly to one another over a private connection when in reality the attacker is in control of the entire conversation (Sivasankari and Kamalakkannan 2022). All essential messages sent between the two victims must be intercepted by the attacker, who must then introduce fresh and malicious messages. ...
... 1,2 IoT connects intelligent objects and devices used in people's daily lives to the internet. 3 WSNs have recently experienced rapid growth in the IoT era. 4 WSNs are becoming an emerging technology for potential applications, such as surveillance systems, agriculture, environmental monitoring, domestic, disaster management, and health care. 5 Figure 1 depicts the general structural design of WSNs. ...