Awakash Mishra

  • Citations Per Year
Learn More
The spectrum of deployed wireless cellular communication systems is found to be under-utilized, even though licensed spectrum is at a premium. To efficiently utilize the band-width left unused in a cellular system, which we denote as the primary system (PRI), we design a system with an ad hoc/mesh overlay network, which we denote as the secondary system(More)
The low-power communication in wireless sensor networks can be impacted by severe channel impairments. In this paper, to address this problem and achieve high network goodput, we propose that the medium access control protocol takes into consideration the error performance of the underlying wireless links. We combine a distributed back-off strategy(More)
The spectrum of deployed wireless cellular communication systems is found to be under-utilized, even though licensed spectrum is at a premium. In this paper, we design a system with an ad hoc overlay network, which we denote as the secondary system (SEC), to efficiently utilize the bandwidth left unused in a cellular system, which we denote as the primary(More)
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of information. The identity of key is a essential part of data encryption and decryption process. The base of this proposed scheme is by generating(More)
In this paper we propose a cross-layer design for IEEE 802.15.4 MAC protocol that is based on a distributed backoff strategy governed by the wireless link quality measurements which are part of the standard. Our performance evaluation indicates that our scheme is more effective, achieving up to 69% higher goodput, and more efficient, delivering up to 154%(More)
Today’s era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic schemeEHDES (Enhanced Data Encryption Standard). Stagnographic(More)
In this paper, we presents an efficient manner, which provide us a secure, compress transmission of message. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we(More)
  • 1