- Wireless Networks and Protocols
- Mobile Ad Hoc Networks
- Advanced Wireless Network Optimization
- Network Traffic and Congestion Control
- Wireless Communication Networks Research
- Bluetooth and Wireless Communication Technologies
- Opportunistic and Delay-Tolerant Networks
- Vehicular Ad Hoc Networks (VANETs)
- Simulation Techniques and Applications
- Advanced Queuing Theory Analysis
- IPv6, Mobility, Handover, Networks, Security
- Advanced MIMO Systems Optimization
- Traffic control and management
- IoT and Edge/Fog Computing
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Green IT and Sustainability
- Cooperative Communication and Network Coding
- Privacy-Preserving Technologies in Data
- Big Data and Business Intelligence
- ICT Impact and Policies
- Energy Efficient Wireless Sensor Networks
- Stochastic Gradient Optimization Techniques
Sardar Vallabhbhai National Institute of Technology Surat
2025
Indian Institute of Technology Delhi
2002-2024
University of Delhi
2023
NIIT University
2011-2022
Analytical Services
2020
Tata Consultancy Services (India)
2015-2019
Harvard University
2015
General Motors (India)
2006-2013
NIIT (India)
2011-2013
IBM Research - India
2001-2006
Owing to the absence of any static support structure, ad-hoc networks are prone link failures. The 'shortest path seeking' routing protocols may not lead stable routes. consequent route failures that ensue, degradation system throughput. This paper suggests a protocol wherein selection is done on basis an intelligent residual lifetime assessment candidate Schemes for performance enhancement with TCP and non-TCP traffic in proposed. backed by simulations ns show excellent adaptation...
Emerging technologies such as Bluetooth are expected to become a ubiquitous solution for providing short range, low power, cost, pico-cellular wireless connectivity. is master driven time division duplex (TDD) system that supports an asynchronous channel data traffic well synchronous channels voice traffic. Data applications running over http, ftp and real audio will need transport layer protocols TCP UDP send packets the links. In this paper we study several schemes designed improve...
In this paper, we address the applicability of Blockchain technology to ensure security data transmitted and received by nodes in an Internet Things (IoT) network. We propose a consensus model that is suitable for resource constrained devices. also implementing IoT on top model. simulate our proposed understand its feasibility.
Motivated by the emerging standards for indoor pico-cellular wireless systems, such as Bluetooth, we propose and study scheduling policies master driven time division duplex (TDD) networks. In these networks, frequency band is divided into slots, each end (i.e., or slave) takes turns in using slots. a slave transmits packets reverse slot only after polls forward (by sending data to it). The conventional round robin do not perform well systems they are suited tight coupling of...
We propose and study data scheduling segmentation reassembly (SAR) policies in Bluetooth. In such systems, the conventional as round robin perform poorly they are not suited to tight coupling of uplink-downlink result slot wastage unfairness. Scheduling Bluetooth is complex due (i) reserved slots for voice traffic, and, (ii) variable sized packets. The reservation at regular intervals results non-contiguous TDD available data. two new that utilize information about size head-of-the-line...
In this paper, we aim to address the major problem of correct image attribution for photos being uploaded on stock photo websites and peer-to-peer sharing marketplaces, ensuring that original photographers are rightfully recognized credited their works. There now millions royalty-free images shared every week websites. is a discontent among graphics designers who share such regarding widespread malpractice where others try take credit benefit from author's work. This happens when someone...
TCP/IP is the standard networking protocol on Internet and also most widely used. Due to these reasons, its use over mobile ad-hoc networks a certainty. Ad-hoc are prone link failures due mobility. TCP unable distinguish between losses route congestion. As result, throughput degrades significantly when nodes move. It therefore essential study how performs networks. We have used simulations in cmu extension ns analyse performance of Tahoe set routing protocols including signal stability...
Physically Unclonable Functions (PUFs) have proved to be an effective and low-cost measure against counterfeiting by providing device authentication secure key storage services. Memory-based PUF implementations are attractive option due the ubiquitous nature of memory in electronic devices requirement minimal (or no) additional circuitry. Dynamic Random Access Memory-- (DRAM) based PUFs particularly advantageous their large address space multiple controllable parameters during response...
The rampant increase in the number of available cyber attack vectors and frequency attacks necessitates implementation robust cybersecurity systems. Malicious websites are a significant threat to cybersecurity. Miscreants hackers use malicious for illegal activities such as disrupting functioning systems by implanting malware, gaining unauthorized access systems, or illegally collecting personal information. We propose implement an approach classifying benign given their Uniform Resource...
In indoor wireless communication networks, mobile computing devices need to be handed off different base stations based on certain criteria. this paper, a fuzzy logic scheme for selection of station at the time handoff is presented. The considers three criteria, namely, received power levels, user population and used bandwidth each arrive decision regarding any particular station. For comparison, conventional level schemes are also considered. It shown through simulation that results in...
The authors model a parallel processing system comprising several homogeneous computers interconnected by communication network. Jobs arriving to this have linear fork-join structure. Each fork of the job gives rise random number tasks that can be processed independently on any computers. Since exact analysis models is known intractable, resort obtaining analytical bounds mean response time job. For jobs with single and, probabilistic allocation N processors, they obtain upper and lower...
Internet of Things (IoT) promises to be a key enabler in Smart Manufacturing and Supply Chain. The IoT systems are responsible for enabling improving the operational efficiencies factories, plant floors, including assembly plants. These characterized by reliable sensing reporting multiple parameters within factory floor. Such activities offer safe, efficient optimized performance not only machines manufacturing products, but also workforce operating them. Industrial (IIoT) could suffer from...
This paper solves the problem of modeling scheme for developing software systems, which can be used in building solutions secure energy networks. A development is proposed a set representations through each program complex passes, namely following representations: idea, conceptual model, architecture, algorithm, source code, graphic abstract syntax tree, assembler machine byte executed code. The main properties representation are indicated, such as form (text, graphic, programming language,...
We study the performance metrics associated with TCP-regulated traffic in multi-hop wireless networks that use a common physical channel (e.g., IEEE 802.11). In contrast to earlier analyses, we focus simultaneously on two key operating - energy efficiency and session throughput. Using analysis simulations, show how these are strongly influenced by radio transmission range of individual nodes. Due tradeoffs between packet likelihood retransmissions, total consumption is convex function number...
We consider the problem of modeling TCP over multi-hop wireless networks using IEEE 802.11 protocol. By identifying suitable regeneration instants, we are able to apply standard technique regenerative processes compute long term average throughput achieved by a single session. Simulation results show that proposed model predicts very high level accuracy. then discuss how extend this more general situations.
Bluetooth/sup TM/ wireless technology is a proposed publicly available specification for radiofrequency (RF), short-range, point-to-multipoint voice and data transfer. It also supports point-to-point connections. operates in the 2.4 GHz ISM (industrial, scientific medical) band based on low-cost, short-range radio link that facilitates ad-hoc connections stationary mobile communication environments. There has been much interest Bluetooth since it could enable users to connect wide range of...
Secure communication of time critical information in V2V networks is expected to be achieved via a robust infrastructure that provides security related services at all times. This paper explores the dependence performance secure communications on mechanisms used by infrastructure. We propose and analyze metric termed confidence (CoS) can assist accepting/dropping message each node communications.
CNNs (Convolutional Neural Networks) can have a large number of parameters, thereby having high storage and computational requirements. These requirements are not typically satisfied by resource-constrained edge devices. Thus, current industry practice for making decisions at include transferring visual data from to cloud nodes, prediction on that with CNN processed in the return output There two problems this approach - Sending requires bandwidth between cloud, we use resources available...
In indoor pico-cellular wireless systems, power is limited and therefore communication protocols need to be properly designed conserve energy at the mobile stations. The existing schemes heuristics devices by reducing activity period of do not work effectively in a master driven TDD based systems such as Bluetooth. We propose new policies that use an low mode Bluetooth for optimization MAC layer. define measure utilization. show each proposed are improved compared naive scheduling...
An interesting feature of IEEE 802.11 wireless LAN cards is that they support multiple transmission modes. For example, the 802.11b four modes I, 2, 5.5 and 11 Mbps, whereas, 802.11a eight modes, up to a maximum 54 Mbps. In this paper, we study layer protocols over multi-rate multi-hop networks attempt answer question whether higher bandwidth links necessarily outperform lower in these networks. We examine by taking into account transport such as TCP UDP. While network capacity topic active...
Internet of things (IoT) encompass a plethora connected smart devices and support diverse applications. IoT is likely to be an integral feature next generation cellular systems. In the manufacturing supply chain industry, Industrial (IIoT), which consists sensors, actuators machinery, deployed for monitoring, data collection analysis, asset management, maintenance planning, plant control optimization. this work, we consider uplink transmission IIoT system, in transmit their Base Station (BS)...
In indoor pico-cellular wireless systems, such as Bluetooth, a pico-cell has master-slave configuration. Bluetooth is centralized master driven system that supports time division duplex medium access control. A limit on the maximum number of active slaves. can have seven slaves in state (capable transmitting and receiving data). The remaining remain an inactive state. Having more than connected to be advantageous many situations. large one compared forming new pico-cells lead lower power...