Arijit Banerjee

Learn More
We present our work on MOCA, a lightweight Mobile Cloud Offloading Architecture, which uses an in-network cloud platform to provide offloading resources. MOCA integrates with existing mobile network architectures without requiring significant changes, and utilizes software defined networking techniques in the data plane to redirect appropriate traffic to(More)
We present Ringo, a system for analysis of large graphs. Graphs provide a way to represent and analyze systems of interacting objects (people, proteins, webpages) with edges between the objects denoting interactions (friendships, physical interactions, links). Mining graphs provides valuable insights about individual objects as well as the relationships(More)
The PhantomNet facility allows experimenters to combine mobile networking, cloud computing and software-defined networking in a single environment. It is an <i>end-to-end testbed</i>, meaning that it supports experiments not just with mobile end-user devices but also with a cellular core network that can be configured and extended with new technologies.(More)
The popularity of smartphones and smartphone applications means that data is the dominant traffic type in current mobile networks. In this paper we present our work on a systematic investigation into facets of the LTE/EPC architecture that impact the performance of TCP as the predominant transport layer protocol used by applications on mobile networks. We(More)
We present our Software-defined network Mobile Offloading aRchitecturE (SMORE). SMORE realizes traffic offloading in mobile networks without requiring any changes to the functionality of existing mobile network nodes. At the same time, it is fully aware of mobile network functionality, including mobility.
—Measurements of received signal strength (RSS) on wireless links provide position information in various localization systems, including multilateration-based and fingerprint-based positioning systems, and device-free localiza-tion systems. Existing localization schemes assume a fixed or known transmit power. Therefore, any variation in transmit power can(More)
We investigate the ability of an attacker to passively use an otherwise secure wireless network to detect moving people through walls. We call this attack on privacy of people a "monitoring radio windows" (MRW) attack. We design and implement the MRW attack methodology to reliably detect when a person crosses the link lines between the legitimate(More)
In addition to growth of data traffic, mobile networks are bracing for a significant rise in the control-plane signaling. While a complete re-design of the network to overcome inefficiencies may help alleviate the effects of signaling, our goal is to improve the design of the current platform to better manage the signaling. To meet our goal, we combine two(More)
The peer-to-peer (P2P) architecture and the mobile network architecture have conflicting designs. P2P can take advantage of peers being in close proximity to decrease latency. However, the mobile network is hierarchical as routing is directed through centralized gateways. Because of network state needed to establish connections in the mobile network, user(More)