K. P. Subbalakshmi

Learn More
Spectrum is one of the most precious radio resources. With the increasing demand for wireless communication, efficiently using the spectrum resource has become an essential issue. With the Federal Communications Commission's (FCC) spectrum policy reform, secondary spectrum sharing has gained increasing interest. One of the policy reforms introduces the(More)
In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with any dedicated(More)
Encryption is one of the fundamental technologies that is used in digital rights management. Unlike ordinary computer applications, multimedia applications generate large amounts of data that has to be processed in real time. So, a number of encryption schemes for multimedia applications have been proposed in recent years. We analyze the following proposed(More)
In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no(More)
We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Wald's sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies(More)
The increase in computational abilities of current electronic devices, and recent developments in computer science and artificial intelligence have permitted researchers to start thinking about introducing cognitive functionalities in wireless networks and devices. These functionalities allow wireless systems to become more flexible. They also enable(More)
This paper proposes an optimal maximum a posteriori probability decoder for variable-length encoded sources over binary symmetric channels that uses a novel state-space to deal with the problem of variable-length source codes in the decoder. This sequential, finite-delay, joint source-channel decoder delivers substantial improvements over the conventional(More)
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between(More)
1389-1286/$ see front matter 2011 Elsevier B.V doi:10.1016/j.comnet.2011.08.011 ⇑ Corresponding author. E-mail addresses: ziqian.dong@nyit.edu (Z. Don edu (R.D.W. Perera), mouli@stevens.edu (R. Chand stevens.edu (K.P. Subbalakshmi). IP geolocation plays a critical role in location-aware network services and network security applications. Commercially(More)