Sriram Chellappan

Learn More
In this paper, we study the issue of sensor networks deployment using limited mobility sensors. By limited mobility, we mean that the maximum distance that sensors are capable of moving to is limited. Given an initial deployment of limited mobility sensors in a field clustered into multiple regions, our deployment problem is to determine a movement plan for(More)
— In this paper, we study the issue of mobility based sensor networks deployment. The distinguishing feature of our work is that the sensors in our model have limited mobilities. More specifically, the mobility in the sensors we consider is restricted to a flip, where the distance of the flip is bounded. Given an initial deployment of sensors in a field,(More)
—An important phase of sensor networks operation is deployment of sensors in the field of interest. Critical goals during sensor networks deployment include coverage, connectivity, load balancing, etc. A class of work has recently appeared, where mobility in sensors is leveraged to meet deployment objectives. In this paper, we study deployment of sensor(More)
Keywords: P2P systems Active worm attacks Internet security a b s t r a c t Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromise hosts in the Internet. Due to the recent surge of peer-to-peer (P2P) systems with large numbers of users(More)
—Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. Due to the recent surge of Peer-to-Peer (P2P) systems with large numbers of users, P2P systems can be a potential vehicle for the active worms to achieve fast worm propagation in the Internet. In this paper,(More)
— Depression is a mental health problem affecting a large population of college students. Since college students are active users of the Internet today, investigating associations between symptoms of depression and Internet usage has been an active area of research. While existing studies do provide critical insights, they are limited due to the fact that(More)
—In this paper, we address a Resource Constrained Lifetime Problem in sensor networks in an operating environment subject to physical node destructions. Specifically, given a limited number of sensors, our goal is to maximize the network lifetime and derive the deployment plan of the nodes to maximize the lifetime under physical node destructions. The(More)
— The small form factor of the sensors, coupled with the unattended and distributed nature of their deployment expose sensors to Physical Attacks that physically destroy sensors in the network. In this paper, we study the modeling and analysis of Search-based Physical Attacks in sensor networks. We define a search-based physical attack model, where the(More)
—Many wireless sensor network (WSN) applications demand secure communications. The random key predistribution ðRKP Þ protocol has been well accepted in achieving secure communications in WSNs. A host of key management protocols have been proposed based on the RKP protocol. However, due to the randomness in key distribution and strong constraint in key path(More)