Dulal C. Kar

Learn More
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key(More)
Network security, administration and management: advancing technology and practice / Dulal Chandra Kar and Mahbubur Rahman Syed, editors. p. cm. Includes bibliographical references and index. Summary: " This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and(More)
It is challenging to secure a wireless sensor network (WSN) because its inexpensive, tiny sensor nodes do not have the necessary processing capability, memory capacity, and battery life to take advantage of the existing security solutions for traditional networks. Existing security solutions for wireless sensor networks are mostly based on symmetric key(More)
Research in Underwater Wireless Sensor Networks (UWSNs) has flourished in recent past. Routing in underwater wireless sensor networks differs from routing in terrestrial wireless sensor networks. This is due to issues such as limited bandwidth in water, node mobility due to water currents, and potential delay in data packet transmission. A novel(More)
Wireless networks are inherently insecure due to the fact that information on the network can be passively retrieved by an eavesdropper using off-the-shelf network hardware and free software applications. The most common solution for this vulnerability is the Wireless Protected Access (WPA) protocol. This protocol provides data encryption and access control(More)
There is increasing demand worldwide , from government agencies and the private sector for cutting-edge biometric security technology that is difficult to breach but user-friendly at the same time. Some of the older tools, such as fingerprint, retina and iris scanning, and facial recognition software have all been found to have flaws and often viewed(More)