Vimal Bibhu

Work place: Department of Computer Science & Engineering, DIT School of Engineering, Plot -48A, Knowledge Park – III, Greater Noida, Uttar Pardesh, India



Research Interests: Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science


Mr. Vimal Bibhu is M.Tech is Computer Science & Engineering and Pursuing Doctor of Philosophy in Computer Science from B.R.A Bihar University Muzaffarpur, Bihar, India. He has published many papers in different International Journals. He is also member of different professional organizations like - IACSIT, IEANG and SERC.

Author Articles
Performance Analysis of Black Hole Attack in Vanet

By Vimal Bibhu Kumar Roshan Kumar Balwant Singh Dhirendra Kumar Singh

DOI:, Pub. Date: 8 Oct. 2012

Black hole attack in Vehicular Ad Hoc Network is major problem related with the field of computer networking. In this paper we present the performance analysis of the black hole attack in Vehicular Ad Hoc Network. We elaborate the different types of attacks and their depth in ad hoc network. The performance metric is taken for the evaluation of attack which depends on a packet end to end delay, network throughput and network load. The delay, throughput and load are simulated by the help of OPNET 14.5 modeler. The simulation setup comprises of 30 Vehicular nodes moving with constant speed of 10 meter per second. The data rate of Vehicular nodes is 11 Mbps with default transmitting power of 0.005 watts. With On Demand Distance Vector Routing and Optimized Link State Routing the malicious node buffer size is lowered to a level which increase packet drops.

[...] Read more.
Security Measures in Data Mining

By Anish Gupta Vimal Bibhu Md. Rashid Hussain

DOI:, Pub. Date: 8 Jul. 2012

Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.

[...] Read more.
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network

By Kumar Roshan Vimal Bibhu

DOI:, Pub. Date: 8 Jun. 2012

Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.

[...] Read more.
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

By Vimal Bibhu Dhirendra Kumar Singh

DOI:, Pub. Date: 8 Mar. 2012

Vehicular Ad Hoc Network is currently challenge for the wireless networking and its researchers. In this paper we have proposed the survey of the different MAC Layer protocols of the wireless medium those can be implemented in the Vehicular Ad Hoc Networking. The survey is based upon the study of the different protocol on their MAC level and its performance factors is evaluated. The performance factor is extracted from the studied materials and current working conditions of the protocols. These all factors are mobility, accuracy, privacy and confidentiality, safety critical message priority, delay control and suitability on vehicle and roadside. According to analyzed performance factor the IEEE 802.11p Wave is most suitable protocol for the Vehicular Ad Hoc Network but it does not cover up all conditional requirements.

[...] Read more.
Other Articles