Learn More
—The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability ; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single(More)
Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage owing to its efficiency. The current flash cache technology stores all files with the largest possible "expiry date," i.e., the files are written in the memory so that they are retained for as long as possible. This, however, does not suit the CCN data(More)
—We consider a scenario where the communication nodes in a sensor network have limited energy, and the objective is to maximize the aggregate bits transported from sources to respective destinations before network partition due to node deaths. This performance metric is novel, and captures the useful information that a network can provide over its lifetime.(More)
In-network function computation (INFC) is becoming an essential aspect of large database systems where the data is distributed over the network. Such situations arise often in resource constrained wireless sensor network making them a natural candidate for INFC. We study the problem of maximizing the rate of INFC in wireless networks. In this paper, we(More)
Research Interests My interests center on the design and analysis of algorithms, focusing mainly on algorithmic game theory and approximation algorithms. I am especially interested in algorithms for large decentralized networks, including networks involving strategic agents. In particular, I am interested in: • Strategic agents in networks, and influencing(More)
Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage. The current flash cache technology stores all files with the largest possible “expiry date,” i.e., the files are written in the memory so that they are retained for as long as possible. This, however, does not leverage the CCN data characteristics(More)
We consider a structured sensor network in which sensors and relays are arranged in a regular grid. Sources S<sub>1</sub>, S<sub>2</sub>, ..., S<sub>K</sub> are located sequentially at the top row, and destinations D<sub>1</sub>, D<sub>2</sub>, ..., D<sub>K</sub> are arranged in an arbitrary order at the bottom row; data from S<sub>i</sub> is required at(More)
—Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage. The current flash cache technology stores all files with the largest possible " expiry date, " i.e. the files are written in the memory so that they are retained for as long as possible. This, however , does not leverage the CCN data characteristics where content(More)
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single(More)
Much work has been done on understanding and predicting human mobility in time. In this work, we are interested in obtaining a set of users who are spatio-temporally most similar to a query user. We propose an efficient way of user data representation called Spatio-Temporal Signatures to keep track of complete record of user movement. We define a measure(More)
  • 1