Amar Taggu

  • Citations Per Year
Learn More
Mobile Adhoc NETworks (MANETs) have gained popularity in both research and industrial domains due to their on-demand ad-hoc nature, easy deployment and absence of any central authority for routing. However, MANETs are susceptible to an array of attacks, primarily because of their adhoc and decentralized nature. Most of these attacks are targeted at(More)
Many intrusion detection algorithms have been proposed to detect network attacks on Mobile Ad-Hoc Networks (MANET). Most of such proposals require extensive modifications to routing algorithms or lower layers which might not be always feasible in practice. This paper proposes a simple but non-trivial scheme TraceGray, that uses mobile agents (MA) to carry(More)
Traceroute program is extensively used in wired networks to track the route packets take on their way to a destination. However, traceroute is often less effective in wireless networks where broken routes are too common. In this paper, the design of wtracert is presented that employs optimal timeouts to provide a faster implementation of the traditional(More)
Cognitive Radios (CRs) aim at improving the efficiency of spectrum utilisation by making use of the spectrum holes in the licensed radio spectrum which otherwise would remain unused leading to underutilisation of spectrum resources. The idea is to utilise the unused licensed radio frequencies in the absence of the licensed users called Primary Users (PUs)(More)
Collaborative sensing is preferred to individual sensing in Cognitive Radio Network (CRN) since it helps in achieving a more accurate sensing decision. In infrastructure-based cognitive radio network, each node sends its local sensing report to the fusion center which uses a fusion rule to make the final decision. The decision of the Fusion Center plays a(More)
Cognitive Radio Network (CRN) nodes called the Cognitive Radio (CR) nodes, sense the presence of a Primary User (PU) activity. The sensing reports from all the CR nodes are sent to a Fusion Centre (FC) which aggregates these reports and takes decision about the presence of the PU, based on some decision rules. Such a collaborative sensing mechanism forms(More)
In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for intruders looking for the possible(More)
A cognitive radio may cooperate with others in the spectrum sensing process for a more accurate sensing result. Several of the fusion rules found in the literature such as OR rule, Majority rule and so on are variants of the general k-out-of-n decision rule. In this rule, if the number of local sensing results reporting `channel busy' is at least k out of n(More)
  • 1