Jayaraj Poroor

Learn More
Minimizing handoff latency and achieving near-zero packet loss is critical for delivering multimedia infotainment applications to fast-moving vehicles that are likely to encounter frequent handoffs. In this paper, we propose a dual-radio cross-layer handoff scheme for infrastructure-mode 802.11 Wireless Networks that achieve this goal. We present(More)
Quality of service (QoS) is critical for delivering real-time media services (RTMSs). The authors identify a new class of denial-of-service attacks against RTMSs - indirect contention-in-hosts (ICiH). Here, attackers attempt to indirectly degrade RTMS QoS by directing packets at other concurrent services, thereby inducing resource contention between RTMS(More)
Providing a usable and secure mechanism for admitting guest devices into enterprise 802.11 WLANs with minimal human intervention is a challenging problem. Several collaborative mechanisms that may be applied to this problem have been proposed in the past. However none of the existing mechanisms can be made to work in an enterprise environment without either(More)
Multimedia Information delivery in public transportation systems is gaining increasing prominence. This paper proposes mesh-tree architecture for low latency and highthroughput data transfer to mobile vehicles along approach roads in and around a bus station. Prior works have demonstrated 802.11b-based wireless chain topology for mobile vehicle connectivity(More)
Vehicular networking is an important emerging area having immense applications, ranging from road-safety to emergency communications in disaster situations. As more applications begin to take advantage of vehicular networks, correctness of the underlying protocols must be subjected to rigorous analysis. The π-calculus is a formal language for specifying(More)
Providing a usable and secure mechanism for the registration of guest-phones to enterprise VoIP networks is a challenging problem. There are many security mechanisms that have been proposed to prevent the various attacks that occur during the registration of a SIP based VoIP phone to VoIP network. However, none of these mechanisms work for an enterprise(More)