• Publications
  • Influence
Combined Routing and Node Replacement in Energy-Efficient Underwater Sensor Networks for Seismic Monitoring
Ocean-bottom seismic systems are emerging as superior information-acquisition methods in seismic monitoring of petroleum reservoirs beneath ocean beds. These systems use a large network of sensorExpand
  • 48
  • 2
  • PDF
SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
TLDR
A secured energy-efficient mutual authentication, and key agreement scheme (SEEMAKA) for two-tier WBAN is propounded that achieves superior efficiency concerning processing overhead, energy dissipation, and security features. Expand
  • 10
  • 1
A proposed scheme to achieve node authentication in military applications of wireless sensor network
TLDR
This paper proposes a certificate less asymmetric key based cryptographic scheme which is build on the concept of Elliptic curve cryptography and Identity Based Public Key Cryptography. Expand
  • 4
  • 1
Secret Key Generation Using OFDM Samples
TLDR
We propose a novel key exchange mechanism based on the concept of self-jamming and exploits the properties of Orthogonal Frequency Division Multiplexing (OFDM). Expand
  • 7
  • 1
The CMS trigger system
This paper describes the CMS trigger system and its performance during Run 1 of the LHC. The trigger system consists of two levels designed to select events of potential physics interest from a GHzExpand
  • 385
  • PDF
Performance Analysis of QoS Parameters During Vertical Handover Process Between Wi-Fi and WiMAX Networks
TLDR
The paper showcases the effects of Hard Handover and Predictive Handover on the QoS parameters with different data rates of application running on the mobile node at different mobile node speeds between Wi-Fi and WiMAX networks. Expand
  • 6
Towards a taxonomy of cyber threats against target applications
TLDR
In this paper, Taxonomy of Cyber Threats is prepared in terms of Industrial, OS, Mobile OS, Web Browser, Network and Social Network applications which will assist Information Security bodies such as CERT in describing and categorizing the attacks consistently. Expand
  • 14
An Improved Framework for Incident Handling
TLDR
In this paper, an Internet traffic monitoring framework has been proposed which handles incidents in a better way and consists of three interdependent layers. Expand
  • 6
Authentication protocols for wireless body area network with key management approach
TLDR
This paper provides a survey of multilevel authentication protocols for Body Area Networks and provides the direction for future research on advancement of WBANs. Expand
  • 12