Learn More
—The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability ; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single(More)
Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage owing to its efficiency. The current flash cache technology stores all files with the largest possible "expiry date," i.e., the files are written in the memory so that they are retained for as long as possible. This, however, does not suit the CCN data(More)
—We consider a scenario where the communication nodes in a sensor network have limited energy, and the objective is to maximize the aggregate bits transported from sources to respective destinations before network partition due to node deaths. This performance metric is novel, and captures the useful information that a network can provide over its lifetime.(More)
In-network function computation (INFC) is becoming an essential aspect of large database systems where the data is distributed over the network. Such situations arise often in resource constrained wireless sensor network making them a natural candidate for INFC. We study the problem of maximizing the rate of INFC in wireless networks. In this paper, we(More)
Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage. The current flash cache technology stores all files with the largest possible “expiry date,” i.e., the files are written in the memory so that they are retained for as long as possible. This, however, does not leverage the CCN data characteristics(More)
We consider the problem of proactive retention aware caching in a heterogeneous wireless edge network consisting of mobile users connected to a server and associated to one or more edge caches. Our goal is to design a caching policy that minimizes the sum of content storage costs and server access transmissions costs over two design variables: the retention(More)
Research Interests My interests center on the design and analysis of algorithms, focusing mainly on algorithmic game theory and approximation algorithms. I am especially interested in algorithms for large decentralized networks, including networks involving strategic agents. In particular, I am interested in: • Strategic agents in networks, and influencing(More)
We consider a structured sensor network in which sensors and relays are arranged in a regular grid. Sources S<sub>1</sub>, S<sub>2</sub>, ..., S<sub>K</sub> are located sequentially at the top row, and destinations D<sub>1</sub>, D<sub>2</sub>, ..., D<sub>K</sub> are arranged in an arbitrary order at the bottom row; data from S<sub>i</sub> is required at(More)
—Caches in Content-Centric Networks (CCN) are increasingly adopting flash memory based storage. The current flash cache technology stores all files with the largest possible " expiry date, " i.e. the files are written in the memory so that they are retained for as long as possible. This, however , does not leverage the CCN data characteristics where content(More)
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single(More)