Search For:

Displaying 1-50 out of 54 total
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency
Found in: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Mohsen Rezvani,Aleksandar Ignjatovic,Sanjay Jha
Issue Date:May 2013
pp. 286-288
Discovering high risk network flows and hosts in a high throughput network is a challenging task of network monitoring. Emerging complicated attack scenarios such as DDoS attacks increase the complexity of tracking malicious and high risk network activitie...
 
Flexible resource allocation for multicast in OFDMA based wireless networks
Found in: 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)
By Xin Zhao,Sanjay Jha
Issue Date:October 2012
pp. 445-452
This paper studies an efficient resource allocation scheme for multicast in OFDMA based wireless networks. Apart from the conventional resource allocation schemes for multicast which allocate exactly the same subcarriers to the users in a multicast group, ...
 
Mitigating the effect of interference in Wireless Sensor Networks
Found in: 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010)
By Nadeem Ahmed,Salil S Kanhere,Sanjay Jha
Issue Date:October 2010
pp. 160-167
Performance of a deployed Wireless Sensor Network (WSN) is greatly influenced by the interference it is subject to during operation. Degradation happens due to interference resulting in packet drops, retransmissions, link instability and inconsistent proto...
 
A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha
Issue Date:October 2007
pp. 213-214
Wireless mesh network (WMN) is a promising technology for deploying wireless infrastructure to provide wireless broadband access. High-speed wireless meshes will enable a whole new range of exciting broadcast/multicast applications, such as IP-TV and video...
   
Reliable communications in aerial sensor networks by using a hybrid antenna
Found in: 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012)
By Kai Li,Nadeem Ahmed,Salil S. Kanhere,Sanjay Jha
Issue Date:October 2012
pp. 156-159
An AWSN composed of bird-sized Unmanned Aerial Vehicles (UAVs) equipped with sensors and wireless radio, enables low cost high granularity three-dimensional sensing of the physical world. The sensed data is relayed in real-time over a multi-hop wireless co...
 
Outdoor Sensornet Design and Deployment: Experiences from a Sugar Farm
Found in: IEEE Pervasive Computing
By Wen Hu,Tuan Dinh Le,Peter Corke,Sanjay Jha
Issue Date:April 2012
pp. 82-91
A wireless sensor network collected real-time water-quality measurements to investigate how current irrigation practices—in particular, underground water salination—affect the environment. New protocols provided high end-to-end packet...
 
Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Nadeem Ahmed, Mark Rutten, Travis Bessell, Salil S. Kanhere, Neil Gordon, Sanjay Jha
Issue Date:September 2010
pp. 1332-1345
The work reported in this paper investigates the performance of the Particle Filter (PF) algorithm for tracking a moving object using a wireless sensor network (WSN). It is well known that the PF is particularly well suited for use in target tracking appli...
 
Probabilistically reliable on-demand multicast in wireless mesh networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha, Archan Misra
Issue Date:June 2008
pp. 1-9
This paper studies probabilistically reliable multicast in wireless mesh networks (WMNs), utilizing MAC layer re-transmission and wireless broadcast advantage to improve both the multicast throughput and the delivery rate. We first present a new multicast ...
 
Non-Cooperative Coexistence of Co-located Independent Wireless Mesh Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Joo Ghee Lim, Chun Tung Chou, Sanjay Jha
Issue Date:October 2007
pp. 1-9
As more wireless networks are being deployed in a given geographic area, the problem of interference and coexistence of these independently operated networks is becoming an increasing problem. This paper looks at the coexistence of independent multihop Wir...
 
A Graph Drawing Approach to Sensor Network Localization
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Sarfraz Nawaz, Sanjay Jha
Issue Date:October 2007
pp. 1-12
In this paper, we propose an anchor free localization mechanism for wireless sensor networks. Our algorithm is based on a graph drawing approach and uses inter-node distances to localize sensor nodes in a local coordinate system up to a global translation,...
 
Placing Multicast Proxies for Internet Live Media Streaming
Found in: Local Computer Networks, Annual IEEE Conference on
By Jun Guo, Sanjay Jha
Issue Date:October 2007
pp. 149-156
Placing multicast proxies on the Internet can largely reduce the delivery delay of Internet live media streaming using overlay multicast mechanisms. In this paper, we propose a new approach to address the issue of proxy placement in an overlay multicast ne...
 
RRAND: A New Requirement Aware RAND based Flexible Slot Allocation Mechanism Optimized For Spatial Reuse Of Slots
Found in: Local Computer Networks, Annual IEEE Conference on
By Yuvraj Krishna Rana, Sanjay Jha
Issue Date:October 2007
pp. 3-9
Schedule based MAC schemes do not perform well for dynamic network and traffic conditions. Their inflexibility makes them unsuitable for most real life applications. This inflexibility is due to the nature of schedule based approach. However, it depends ma...
 
Design, Analysis and Implementation of a Novel Multiple Resource Scheduler
Found in: IEEE Transactions on Computers
By Fariza Sabrina, Salil Kanhere, Sanjay Jha
Issue Date:August 2007
pp. 1071-1086
Over the past decade, the problem of achieving fair bandwidth allocation on a link shared by multiple traffic flows has been extensively researched. However, as these flows traverse a computer network, they share many different kinds of resources such as l...
 
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By T. Zauner, L. Haslett, Wen Hu, Sanjay Jha, C.J. Sreenan
Issue Date:November 2006
pp. 97-104
This paper investigates the problem of how to improve TCP performance in multi-rate ad-hoc networks with congested links. To improve network performance, different rate adaptation algorithms, such as automatic rate fallback (ARF) and receiver-based autorat...
 
Efficient Boundary Estimation for Practical Deployment of Mobile Sensors in Hybrid Sensor Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Nadeem Ahmed, Salil Kanhere, Sanjay Jha
Issue Date:October 2006
pp. 662-667
We address the deployment issues in a hybrid sensor network consisting of both static and mobile sensor nodes. Existing deployment schemes often assume either known regular boundaries of the region, or that mobile sensors are able to detect the region boun...
 
On the Fading and Shadowing Effects for Wireless Sensor Networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Bao Liu, Brian Otis, Subhash Challa, Paul Axon, Chun Chou, Sanjay Jha
Issue Date:October 2006
pp. 51-60
Most ad hoc and sensor network research assumes idealized radio propagation models without considering fading and shadowing effects. Experimental results have shown that many well-designed protocols will fail simply because of fading and shadowing experien...
 
Resilience Provisioning in Provider-Based Overlay Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Gustav Rosenbaum, Sanjay Jha
Issue Date:November 2005
pp. 427-432
<p>Guaranteed levels of network resilience are essential for many emerging and future Internet services. Currently, the only network model that can support stringent resilience requirements is a provider-based overlay network. In such an environment,...
 
Dynamic Routing of Restorable QoS Connections in MPLS Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Gustav Rosenbaum, Chun Tung Chou, Sanjay Jha
Issue Date:November 2005
pp. 418-426
<p>In this paper we consider dynamic routing of restorable Quality of Service (QoS) connections in multi-protocol label switched (MPLS) networks under a single link failure model. To route a restorable QoS connection, two link disjoint label switched...
 
Probabilistic Coverage in Wireless Sensor Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha
Issue Date:November 2005
pp. 672-681
<p>The sensing capabilities of networked sensors are affected by environmental factors in real deployment and it is imperative to have practical considerations at the design stage in order to anticipate this sensing behavior. We investigate the cover...
 
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor
Found in: Local Computer Networks, Annual IEEE Conference on
By Fariza Sabrina, Salil S. Kanhere, Sanjay Jha
Issue Date:November 2005
pp. 242-249
<p>The problem of achieving fairness in the allocation of the bandwidth resource on a link shared by multiple flows of traffic has been extensively researched over the last decade. However, as these flows traverse a computer network, they share many ...
 
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Pubudu N. Pathirana, Nirupama Bulusu, Andrey V. Savkin, Sanjay Jha
Issue Date:May 2005
pp. 285-296
We present a novel scheme for node localization in a Delay-Tolerant Sensor Network (DTN). In a DTN, sensor devices are often organized in network clusters that may be mutually disconnected. Some mobile robots may be used to collect data from the network cl...
 
An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Bao Hua Liu, Yang Gao, Chun Tung Chou, Sanjay Jha
Issue Date:November 2004
pp. 626-633
In this paper, we propose two location-aware select optimal neighbor (SON) algorithms that are suitable for CSMA/CA based MAC protocols for wireless ad hoc networks. Both algorithms optimize the energy efficiency by reducing the effective number of neighbo...
 
Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations
Found in: Local Computer Networks, Annual IEEE Conference on
By Fariza Sabrina, Sanjay Jha
Issue Date:October 2003
pp. 2
In active and programmable networks, packet processing could be accomplished in the router within the data path. For efficient resource allocation in such networks, the packet scheduling schemes should consider multiple resources such as CPU and memory in ...
 
Optimized Allocation of Distributed Applications Across Local Area Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Bao Hua Liu, Sanjay Jha, Chun Tung Chou, Pradeep Ray
Issue Date:October 2003
pp. 291
No summary available.
   
Reducing Signalling Overhead in Cell-Hopping Mobile Wireless Networks using Location Caches
Found in: Local Computer Networks, Annual IEEE Conference on
By Jahan Hassan, Sanjay Jha
Issue Date:October 2003
pp. 753
In this paper, we propose and analyze a timer-based location caching scheme to reduce the signalling cost of on-demand location management in the context of a lightweight cellular wireless network architecture, called a cell-hopping network. The timer valu...
 
Parallelized File Transfer Protocol (P-FTP)
Found in: Local Computer Networks, Annual IEEE Conference on
By Shaleeza Sohail, Sanjay Jha, Hossam ElGindy
Issue Date:October 2003
pp. 624
Parallelized FTP (P-FTP) approach, attempts to solve the problem of slow downloads of large multimedia files while optimizing the utilization of mirror servers. The approach presented in this paper downloads a single file from multiple mirror servers simul...
 
SBM+: Enhanced SBM for Managing Bandwidth in Multiple Access Subnets
Found in: Local Computer Networks, Annual IEEE Conference on
By Sanjay Jha, Mahbub Hassan
Issue Date:November 2001
pp. 432
This paper proposes an extension to the standard Sub- net Bandwidth Manager (SBM). The extension controls the best effort traffic on the subnet to minimize its impact on the QoS of the RSVP flows. The extension is achieved by adding extra messages to the s...
 
Implementing Bandwidth Broker Using COPS-PR in Java
Found in: Local Computer Networks, Annual IEEE Conference on
By Sanjay Jha, Mahbub Hassan
Issue Date:November 2001
pp. 178
This paper describes a bandwidthbroker implementation in Java that is capable of managing and provisioning resource of a Diffserv domain. Both COPS and COPS-PR are implemented using Java language. Diffserv kernel package for Linux i extended to support ban...
 
Current Directions in Active Programmable Network
Found in: Networks, IEEE International Conference on
By William Lau, Sanjay Jha, Mahbub Hassan
Issue Date:October 2001
pp. 240
Active Programmable Network (APN) has begun a new phenomenon in the logical view towards network in the Internet domain. Traditional technologies based on IP have viewed the network as a lack box where the network is hidden from the upper layers. The advan...
 
High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks
Found in: IEEE Transactions on Mobile Computing
By XIN ZHAO,Jun Guo,Chun Tung Chou,Archan Misra,Sanjay Jha
Issue Date:July 2014
pp. 1
This paper presents a cross-layer approach for enabling high-throughput reliable multicast in multi-hop wireless mesh networks. The building block of our approach is a multicast routing metric, called the expected multicast transmission count (EMTX). EMTX ...
 
Trajectory Approximation for Resource Constrained Mobile Sensor Networks
Found in: 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Ghulam Murtaza,Salil S. Kanhere,Aleksandar Ignjatovic,Raja Jurdak,Sanjay Jha
Issue Date:May 2014
pp. 59-66
Low-power compact sensor nodes are being increasingly used to collect trajectory data from moving objects such as wildlife. The size of this data can easily overwhelm the data storage available on these nodes. Moreover, the transmission of this extensive d...
 
An end-to-end delay metric for multi-rate wireless mesh networks with cooperative retransmission
Found in: 2013 IEEE 38th Conference on Local Computer Networks (LCN 2013)
By Bipul Sen,Lavy Libman,Xin Zhao,Sanjay Jha
Issue Date:October 2013
pp. 296-299
The IEEE 802.11 MAC protocol performance degrades severely as the number of stations in the collision domain increases in a saturated network. Employing cooperative retransmission at the MAC layer provides a way to work around the performance limitations b...
   
Received signal strength indicator and its analysis in a typical WLAN system (short paper)
Found in: 2013 IEEE 38th Conference on Local Computer Networks (LCN 2013)
By Yogita Chapre,Prasant Mohapatra,Sanjay Jha,Aruna Seneviratne
Issue Date:October 2013
pp. 304-307
Received signal strength based fingerprinting approaches have been widely exploited for localization. The received signal strength (RSS) plays a very crucial role in determining the nature and characteristics of location fingerprints stored in a radio-map....
   
ECTX: A high-throughput path metric for multi-hop wireless routing exploiting MAC-layer cooperative retransmission
Found in: 2012 IEEE Thirteenth International Symposium on
By Bipul Sen, Jun Guo,Xin Zhao, Sanjay Jha
Issue Date:June 2012
pp. 1-9
We present a cross-layer approach for enabling high-throughput routing in multi-hop wireless networks. This approach builds on a MAC-layer cooperative retransmission mechanism, which is explicitly designed to exploit the benefits of MAC-layer retransmissio...
   
An Analysis of Virtual Private Network Solutions
Found in: Local Computer Networks, Annual IEEE Conference on
By Gustav Rosenbaum, William Lau, Sanjay Jha
Issue Date:October 2003
pp. 395
VPN services have been available for decades but not widely used until recently. A combination of new VPN technologies, network technologies and business communication requirements is the driving force behind the take-up of VPN services. This paper gives a...
 
Acoustical ranging techniques in embedded wireless sensor networked devices
Found in: ACM Transactions on Sensor Networks (TOSN)
By Branislav Kusy, Diethelm Ostry, Navinda Kottege, Prasant Misra, Sanjay Jha
Issue Date:November 2013
pp. 1-38
Location sensing provides endless opportunities for a wide range of applications in GPS-obstructed environments, where, typically, there is a need for a higher degree of accuracy. In this article, we focus on robust range estimation, an important prerequis...
     
Securing data provenance in body area networks using lightweight wireless link fingerprints
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Sanjay Jha, Vijay Sivaraman, Diethelm Ostry, Syed Taha Ali
Issue Date:November 2013
pp. 1-2
Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. In this paper, we demonstrate a mechanism to secure data provenance for these devices by exploiting symmetric spatio-temporal char...
     
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Aleksandar Ignjatovic, Elisa Bertino, Mohsen Rezvani, Sanjay Jha
Issue Date:November 2013
pp. 1-2
In this paper we introduce a novel sophisticated collusion attack scenario against a number of existing iterative filtering algorithms. To address this security issue, we propose an improvement for iterative filtering techniques by providing an initial app...
     
Securing data provenance in body area networks using lightweight wireless link fingerprints
Found in: Proceedings of the 3rd international workshop on Trustworthy embedded devices (TrustED '13)
By Vijay Sivaraman, Diethelm Ostry, Sanjay Jha, Syed Taha Ali
Issue Date:November 2013
pp. 65-72
Wireless bodyworn sensing devices are becoming popular for fitness, sports training and personalized healthcare applications. Securing the data generated by these devices is essential if they are to be integrated into the current health infrastructure and ...
     
A fast gradient projection algorithm for efficient cross-correlation via sparse representation in sensor networks
Found in: Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys '12)
By Mingrui Yang, Prasant Misra, Sanjay Jha, Wen Hu
Issue Date:November 2012
pp. 333-334
Cross-correlation is a popular signal processing technique used for obtaining reliable range information. Recently, a practical and efficient implementation of cross-correlation (via sparse approximation) was demonstrated on resource constrained wireless s...
     
Relay-aided high-throughput path selection in multi-rate wireless mesh networks
Found in: Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '12)
By Bipul Sen, Lavy Libman, Sanjay Jha, Xin Zhao
Issue Date:October 2012
pp. 223-228
This paper proposes an opportunistic rate-adaptive expected transmission time (ORETT) metric, which exploits cooperative (relay-aided) retransmissions to achieve high-throughput routing in multi-rate wireless mesh networks. This metric captures the combine...
     
Efficient cross-correlation via sparse representation in sensor networks
Found in: Proceedings of the 11th international conference on Information Processing in Sensor Networks (IPSN '12)
By Mingrui Yang, Prasant Misra, Sanjay Jha, Wen Hu
Issue Date:April 2012
pp. 13-24
Cross-correlation is a popular signal processing technique used in numerous localization and tracking systems for obtaining reliable range information. However, a practical efficient implementation has not yet been achieved on resource constrained wireless...
     
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
Found in: Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks (PM2HW2N '11)
By Hailun Tan, Sanjay Jha, Wen Hu
Issue Date:October 2011
pp. 9-16
Given the limited resources and computational power of current embedded sensor devices, memory protection is difficult to achieve and generally unavailable. Hence, the software run-time buffer overflow that is used by the worm attacks in the Internet could...
     
TWEET: an envelope detection based broadband ultrasonic ranging system
Found in: Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '11)
By Diethelm Ostry, Navinda Kottege, Prasant Kumar Misra, Sanjay Jha
Issue Date:October 2011
pp. 409-416
Fine-grained location information at long range can benefit many applications of embedded sensor networks and robotics. In this paper, we focus on range estimation - an important prerequisite for fine-grained localization - in the ultrasonic domain for bot...
     
Toward trusted wireless sensor networks
Found in: ACM Transactions on Sensor Networks (TOSN)
By Hailun Tan, Peter Corke, Sanjay Jha, Wen Chan Shih, Wen Hu
Issue Date:August 2010
pp. 1-25
This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a stand...
     
Characterization of link asymmetry in wireless sensor networks
Found in: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys '09)
By Diet Ostry, Nadeem Ahmed, Prasant Misra, Sanjay Jha
Issue Date:November 2009
pp. 373-374
Recent experimental studies in wireless sensor networks (WSNs) have confirmed that asymmetry in the wireless links has a significant effect on the performance of WSN network protocols. Protocols which work in simulation studies often fail when link asymmet...
     
Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission
Found in: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys '09)
By Diet Ostry, Prasant Misra, Sanjay Jha
Issue Date:November 2009
pp. 361-362
Ultrasound (US) based Cricket indoor location system has limited range when the transmitter and receiver motes are not in the line-of-sight (LOS) positions. It uses narrowband US transducers which are unidirectional and require tilting of the motes in orde...
     
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment
Found in: Proceedings of the 12th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '09)
By Chun Tung Chou, Joo Ghee Lim, Sanjay Jha
Issue Date:October 2009
pp. 155-162
The increasing number of independent IEEE 802.11 WLANs owned and managed by autonomous users has led to increased interference, resulting in performance degradation and unfairness. Performance can be improved by allowing these networks to operate on differ...
     
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks
Found in: Proceedings of the second ACM conference on Wireless network security (WiSec '09)
By Diethelm Ostry, Hailun Tan, John Zic, Sanjay Jha
Issue Date:March 2009
pp. 1-24
Code dissemination protocols provide a convenient way to update program images via wireless communication. Due to the open environment in which Wireless Sensor Networks (WSNs) are typically deployed, it is important that a code dissemination protocol ensur...
     
Design and evaluation of a hybrid sensor network for cane toad monitoring
Found in: ACM Transactions on Sensor Networks (TOSN)
By Andrew Taylor, Chun Tung Chou, Nirupama Bulusu, Sanjay Jha, Van Nghia Tran, Wen Hu
Issue Date:February 2009
pp. 1-28
This article investigates a wireless acoustic sensor network application—monitoring amphibian populations in the monsoonal woodlands of northern Australia. Our goal is to use automatic recognition of animal vocalizations to census the populations of ...
     
 1  2 Next >>