Search For:

Displaying 1-26 out of 26 total
Semi-Distributed Backoff: Collision-Aware Migration from Random to Deterministic Backoff
Found in: IEEE Transactions on Mobile Computing
By Sudip Misra,Manas Khatua
Issue Date:August 2014
pp. 1
Collision is imminent in wireless networks (WNs) capacitated with randomized distributed channel access. In such networks, the probability of frame drop (Pdrop) is greater than zero due to successive collisions with a finite retry limit m. The IEEE 802.11 ...
 
Game-theoretic Topology Control for Opportunistic Localization in Sparse Underwater Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Sudip Misra,Tamoghna Ojha,Ayan Mondal
Issue Date:July 2014
pp. 1
In this paper, we propose a localization scheme named Opportunistic Localization by Topology Control (OLTC), specifically for sparse Underwater Sensor Networks (UWSNs). In a UWSN, an unlocalized sensor node finds its location by utilizing the spatiotempora...
 
Distributed Information-Based Cooperative Strategy Adaptation in Opportunistic Mobile Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Sudip Misra,Sujata Pal,Barun Saha
Issue Date:April 2014
pp. 1
Cooperation among nodes is a fundamental necessity in Opportunistic Mobile Networks (OMNs), where the messages are transferred using the store-carry-and-forward mechanism, due to sporadic inter-node wireless connectivity. While multiple works have addresse...
 
A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Sudip Misra,P. Venkata Krishna,Harshit Agarwal,Antriksh Saxena,Mohammad S. Obaidat
Issue Date:October 2011
pp. 114-122
Internet of Things (IoT) refers to the networked interconnection of everyday objects. IoT is an upcoming research field and is being regarded as the revolution in the world of communication because of its extensible applications in numerous fields. Due to ...
 
Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Sudip Misra, Ashim Ghosh, A. P. Sagar P., Mohammad S. Obaidat
Issue Date:December 2010
pp. 35-41
A number of green technologies such as Smart Power Grids, Smart Buildings, Smart Industrial Process and Smart Transportation rely on sensor technology. Sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sens...
 
An adaptive learning-like solution of random early detection for congestion avoidance in computer networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sudip Misra, B. John Oommen, Sreekeerthy Yanamandra, Mohammad S. Obaidat
Issue Date:May 2009
pp. 485-491
In this paper, we<sup>1</sup> present an Adaptive Learning (specifically, Learning Automata) Like (LAL) mechanism for congestion avoidance in wired networks. Our algorithm, named as Learning Automata Like Random Early Detection (LALRED), is fou...
 
Adaptive learning solution for congestion avoidance in wireless sensor networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sudip Misra, Vivek Tiwari, Mohammad S. Obaidat
Issue Date:May 2009
pp. 478-484
One of the major challenges in wireless sensor network (WSN) research is to curb down congestion in the network's traffic, without compromising with the energy of the sensor nodes. In this work, we address the problem of congestion in the nodes of a WSN us...
 
Simulating Peer-to-Peer networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Sudip Misra, Mohammad S. Obaidat, Inderpreet Singh, Raghu Agarwal, Bhuvnesh Bhambhani
Issue Date:May 2009
pp. 336-341
The Gnutella protocol of Peer-to-Peer (P2P) networks has undergone several changes since its inception in the beginning of this century. However, despite the large number of revisions to the original version of the protocol, Gnutella suffers from serious p...
 
An efficient 802.11 medium access control method and its simulation analysis
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By P. Venkata Krishna, Mohammad S. Obaidat, Sudip Misra, V. Saritha
Issue Date:May 2009
pp. 330-335
This paper presents a technique called as Virtual Back off Algorithm (VBA), based on the sequencing technique for efficient media access control. The proposed method minimizes the number of collisions as well as reduces delays during back off periods. We p...
 
A Swarm Intelligence-based P2P file sharing protocol using Bee Algorithm
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Shubham Singhal, Saurabh Aggarwal, Puneet Pruthi, Sudip Misra, Isaac Woungang
Issue Date:May 2009
pp. 690-696
A P2P file sharing system implementation on mobile ad-hoc networks is quite tricky to implement as compared to that on a wired network. With the use of Swarm Intelligence, the P2P file Sharing methodology not only has an optimized search process involving ...
 
Dividing PKI in strongest availability zones
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang
Issue Date:May 2009
pp. 963-969
Key management involves two aspects: key distribution and key revocation. This paper presents the geographic server distributed model for key revocation which concerns about the security and performance of the system. The concept presented in this paper is...
 
Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks
Found in: Computer Systems and Applications, ACS/IEEE International Conference on
By Sanjay K. Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang
Issue Date:May 2009
pp. 492-497
Wireless sensor networks suffer from the problems of congestion, which lead to packet loss and excessive energy consumption. In this paper, we address both node-level and link-level congestion and propose a new routing protocol namely Ant based Routing wit...
 
Survivability in Existing ATM-Based Mesh Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn
Issue Date:May 2009
pp. 719-724
This paper addresses the survivability in existing ATM mesh networks with the goal to (1) compare the network survivability for link and path restorations, (2) to determine the effect of spare capacity distribution schemes on the restoration ratio, and (3)...
 
Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks
Found in: Systems and Networks Communication, International Conference on
By Sanjay K. Dhurandher, Sudip Misra, Deepansh Agrawal, Avanish Rayankula
Issue Date:October 2008
pp. 197-201
The advent of wireless networks has brought anew set of security issues with it. The most feared of these is a jamming based attack. This is because with the existing network architecture, there is very little that can be done to overcome a jamming attack....
 
Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Sudip Misra, Kiran Isaac Abraham, Mohammad S. Obaidat, P. Venkata Krishna
Issue Date:October 2008
pp. 603-607
In this paper, we address the problem of intrusion detection in Wireless Sensor Networks (WSNs) using a Learning Automata (LA)-based approach.??We are not aware of any LA-based intrusion detection systems (IDSs) solutions for WSNs. Additionally, the S-mode...
 
QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Sanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Nidhi Gupta
Issue Date:October 2008
pp. 598-602
In wireless sensor networks (WSNs), message security is an important concern. The protection of integrity and confidentiality of information and the protection from unauthorized access are important issues. However, due to factors such as resource limitati...
 
An Efficient Approach for Location Updating in Mobile Ad Hoc Networks
Found in: Simulation Symposium, Annual
By Sanjay K. Dhurandher, Sudip Misra, Namit Nangia, Nitin Bhardwaj, Pankaj Goyal, Sumit Aggarwal, Mohammad S. Obaidat
Issue Date:April 2008
pp. 61-67
In this paper, we consider the problem of location updating in mobile ad-hoc networks (MANETs). We propose a node stability-based location updating approach. In order to optimize the routing, most of the existing routing algorithms use some mechanism for d...
 
Routing Bandwidth-Guaranteed Paths in MPLS Traffic Engineering: A Multiple Race Track Learning Approach
Found in: IEEE Transactions on Computers
By B. John Oommen, Sudip Misra, Ole-Christoffer Granmo
Issue Date:July 2007
pp. 959-976
This paper presents an efficient adaptive online routing algorithm for the computation of bandwidth-guaranteed paths in Multiprotocol Label Switching (MPLS)-based networks by using a learning scheme that computes an optimal ordering of routes. The contribu...
 
The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sudip Misra, B. John Oommen
Issue Date:May 2007
pp. 124-129
This paper presents a new solution to the Dynamic All-Pairs Shortest Path Routing Problem, using a pursuit estimator learning approach. It involves finding the shortest path in a stochastic network, where there are continuous probabilistically-based update...
 
An Efficient Dynamic Algorithm for Maintaining All-Pairs Shortest Paths in Stochastic Networks
Found in: IEEE Transactions on Computers
By Sudip Misra, B. John Oommen
Issue Date:June 2006
pp. 686-702
This paper presents a new solution to the Dynamic All-Pairs Shortest Path Routing Problem, using a linear reinforcement learning scheme. The particular instance of the problem that we have investigated concerns finding the all-pairs shortest paths in a sto...
 
New Algorithms for Maintaining All-Pairs Shortest Paths
Found in: Computers and Communications, IEEE Symposium on
By Sudip Misra, B. John Oommen
Issue Date:June 2005
pp. 116-121
This paper presents a new solution to the Dynamic All-Pairs Shortest Path Routing Problem, using a linear reinforcement learning scheme. It involves finding the shortest path in a stochastic network, where there are continuous probabilistically-based updat...
 
Cloud Computing Applications for Smart Grid: A Survey
Found in: IEEE Transactions on Parallel and Distributed Systems
By Samaresh Bera,Sudip Misra,Joel J.P.C. Rodrigues
Issue Date:May 2014
pp. 1
The fast-paced development of power systems necessitates smart grids to facilitate real-time control and monitoring with bidirectional communication and electricity flows. Future smart grids are expected to have reliable, efficient, secured, and cost-effec...
 
D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
Found in: IEEE Transactions on Parallel and Distributed Systems
By Sudip Misra,Samaresh Bera,Tamoghna Ojha
Issue Date:April 2014
pp. 1
Future large-scale deployment of plug-in hybrid electric vehicles (PHEVs) will render massive energy demand on the electric grid during peak-hours. We propose an intelligent distributed dynamic pricing (D2P) mechanism for the charging of PHEVs in a smart g...
 
Could human intelligence enhance communication opportunities in mission-oriented opportunistic networks?
Found in: Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking (MiSeNet '12)
By Barun Kumar Saha, Sudip Misra
Issue Date:August 2012
pp. 15-20
Mission-oriented networks change the network communications paradigm with the involvement of human beings in the network. In a mission-oriented network, nodes may exhibit purposeful mobility in order to achieve mission goals. Additionally, human beings, un...
     
Localized policy-based target tracking using wireless sensor networks
Found in: ACM Transactions on Sensor Networks (TOSN)
By Sudip Misra, Sweta Singh
Issue Date:July 2012
pp. 1-30
Wireless Sensor Networks (WSN)-based surveillance applications necessitate tracking a target's trajectory with a high degree of precision. Further, target tracking schemes should consider energy consumption in these resource-constrained networks. In this w...
     
Bird Flight-Inspired Routing Protocol for Mobile Ad Hoc Networks
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Gopidi Rajesh, Sudip Misra
Issue Date:October 2011
pp. 1-37
One of the major challenges in the research of mobile ad hoc networks is designing dynamic, scalable, and low cost (in terms of utilization of resources) routing protocols usable in real-world applications. Routing in ad hoc networks has been explored to a...
     
 1