- Cryptography and Data Security
- Distributed systems and fault tolerance
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- User Authentication and Security Systems
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Optimization and Search Problems
- Advanced Authentication Protocols Security
- Parallel Computing and Optimization Techniques
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- IoT and Edge/Fog Computing
- Software System Performance and Reliability
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Energy Harvesting in Wireless Networks
- Wireless Networks and Protocols
- Advanced Malware Detection Techniques
- Advanced Optical Network Technologies
- Advanced Data Storage Technologies
- Cloud Computing and Resource Management
- Privacy, Security, and Data Protection
- Interconnection Networks and Systems
Indian Institute of Information Technology Allahabad
2015-2025
Madurai Kamaraj University
2021-2024
Saveetha University
2024
Indraprastha Institute of Information Technology Delhi
2024
Indian Institute of Technology Indore
2023
Jaypee Institute of Information Technology
2022
KIIT University
2022
The University of Texas at Dallas
2005-2019
Tejas Networks (India)
2019
The University of Texas at Austin
2006-2010
One of the main design issues for a sensor network is conservation energy available at each node. We propose to deploy multiple, mobile base stations prolong lifetime network. split into equal periods time known as rounds. Base are relocated start round. Our method uses an integer linear program determine new locations and flow-based routing protocol ensure efficient during four metrics evaluate our solution using these metrics. Based on simulation results we show that employing in...
We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. present requirements such and propose transmission control (STCP). STCP is generic, scalable reliable where majority functionalities are implemented at base station. offers controlled variable reliability, congestion detection avoidance, supports multiple applications in same network. design implementation evaluate with different scenarios network characteristics.
In a cognitive radio (CR) network, MAC-layer configuration involves determining common set of channels to facilitate communication among participating nodes. Further, the availability multiple and frequent channel switches add complexity route selection. Knowledge global network topology can be used solve above-described problems. this paper, we propose distributed algorithm for gathering information CR network. We outline approaches that utilize gathered efficient routing packets. addition,...
In this article, we propose an efficient lattice-based ring signature scheme for message authentication in vehicular ad-hoc networks (VANETs). It provides unconditional identity privacy preservation, authentication, and location the sender vehicle. The of messages is extremely vital as it gives motivation vehicles to accept, act, further transmit other network well remain a member network. Any unauthorized vehicle cannot fraud into if are authenticated. public key cryptography-based methods...
Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product performance. An ideal application for wireless is a biomedical patient monitoring tool. systems improve quality of life the subject by granting them more freedom continue their daily routine, which would not be feasible if wired equipment were used. This paper explores an networks, attempts monitor patients specific condition completely non-invasive,...
Cognitive radio (CR) technology is a promising emerging that enables more efficient usage of already assigned spectrum. However, before CR networks can be deployed, new algorithms and protocols need to developed. When forming an ad-hoc cognitive network (CRN), one the fundamental tasks determine neighbors each node channels used communicate among neighbors. The nature CRN makes this challenging problem. Specifically in CRN, not only multi-channel, but available at different nodes may...
Recovering from processor failures in distributed systems is an important problem the design and development of reliable systems. Two solutions to this which involve very little overhead are presented. Without appending any information messages application program, it shown that possible recover using O( mod V E ) where number processors communication links system. The second algorithm can be used without forcing nonfaulty roll back under certain conditions.< <ETX...
We consider a wireless sensor network made of nodes capable sensing and communication, relay base stations responsible for collecting data generated by nodes, to be deployed in field. address the problem placing field such that (i) each point interest is covered subset sensors desired cardinality (ii) resulting connected (iii) has sufficient bandwidth. propose several deployment strategies determine optimal placements guaranteed coverage, connectivity, bandwidth robustness. study different...
Testing and debugging programs are more involved in distributed systems than uniprocessor because of the presence communication medium inherent concurrency. Past research has established that predicate testing is an approach can alleviate some problems this area. However, checking whether a general true particular execution appears to be computationally hard problem. This paper considers class predicates called conjunctive form (CFP) quite useful program development, but tested efficiently....
There is a growing trend towards using mobile computing environment for several applications, and it important that the systems are given adequate support both at level communication level. Causal ordering useful property, particularly in applications involve human interactions. (Such common environments.) In this paper, we present three algorithms causal systems. The first algorithm handles resource constraints of hosts, but system not easily scalable with respect to number hosts graceful...
Body Sensor Networks are rapidly expanding to everyday applications due recent advancements in Micro-Electro-Mechanical Systems (MEMS) sensing, wireless communication and power management technologies. We leverage these develop a framework for the use of MEMS inertial sensors as low-cost putting coach golf. Accurate requires substantial control precision that is acquired via significant practice. Unfortunately, many golfers not aware they practicing flawed mechanics. An electronic has...
Most researchers conduct wireless networking experiments in their laboratory or similar indoor environments. Such environments are veritable RF jungles, especially when we consider the ISM bands. In this paper examine and test several common explicit implicit assumptions that tend to make about environment. Although these acknowledged by most researchers, extent of impact is often underestimated. We find because environment always flux, it almost impossible reproduce results an experiment....