Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Sudip Misra"'
Autor:
Sudip Misra, Sumana Maiti
Publikováno v:
Computer Communications. 157:369-380
In this paper, we propose GROSE — a scheme to determine the optimal group size of the receiver in Broadcast Proxy Re-encryption. GROSE uses the Rubinstein–Stahl bargaining approach, so that both the sender and the receiver are mutually benefited
Publikováno v:
Computer Communications. 154:204-215
In this paper, we propose a Se lf-adaptive A UV-based L ocalization (SEAL) scheme, which is specifically designed to provide network-wide localization service to sensor nodes in sparsely deployed Underwater Sensor Networks (UWSN) using a high-speed A
Autor:
Sudip Misra, Sujata Pal
Publikováno v:
Computer Communications. 71:119-128
The distributed nature of routing protocols in Opportunistic Mobile Networks (OMNs) allows nodes to behave non-cooperatively for forwarding other nodes’ messages. So, the identification of different behaviors of nodes is one of the important issues
Publikováno v:
Computer Communications. 35:1871-1881
Worldwide interoperability for microwave access (WiMAX) is one of the most challenging forthcoming technologies providing broadband wireless access (BWA) which promises its users high Quality of Service (QoS) for supporting interactive real-time mult
Publikováno v:
Computer Communications. 34:1484-1496
Efficient network coverage and connectivity are the requisites for most Wireless Sensor Network (WSN) deployments, particularly those concerned with area monitoring. Due to the resource constraints of the sensor nodes, redundancy of coverage area mus
Autor:
Sudip Misra, Ankur Vaish
Publikováno v:
Computer Communications. 34:281-294
Wireless sensor networks (WSNs) typically consist of large number of sensor nodes, which, depending on the application, are mostly left unattended in open environments for moderately long periods of time. Due to the wireless nature of the medium, it
Publikováno v:
Computer Communications. 31:3855-3869
In this paper, we introduce FORK, a novel two-pronged strategy to an agent-based intrusion detection system for ad-hoc networks. We follow two different but complementary approaches for intrusion detection in our proposed scheme. We perform intrusion
Publikováno v:
Computer Communications. 31:722-733
Hybrid cellular and wireless ad-hoc network architectures are currently considered to be promising alternative solutions to the standalone cellular or ad-hoc network architectures. In this paper, we propose an efficient Hash Table-Based Node Identifi
Publikováno v:
Computer Communications. 31:760-769
Due to their applications in situations such as emergencies, crisis management, military and healthcare, message security is of paramount importance in mobile ad-hoc networks. However, because of the absence of a fixed infrastructure with designated
Publikováno v:
Computer Communications. 31:655-658