Swastik Brahma

Learn More
The cognitive radio based IEEE 802.22 wireless regional area network (WRAN) is designed to operate in the under–utilized TV bands by detecting and avoiding primary TV transmission bands in a timely manner. Such networks, deployed by competing wireless service providers, would have to selfcoexist by accessing different parts of the available spectrum in a(More)
The IEEE 802.22 standard for wireless regional area network is the first standard for cognitive radio that tries to harness the idle or under-utilized spectrum allocated for TV bands. Two major challenges that are faced by IEEE 802.22 are (i) the issue of self co-existence and (ii) the hidden incumbent problem. In this paper, we discuss these two challenges(More)
In this paper we propose a distributed congestion control algorithm for tree based communications in wireless sensor networks, that seeks to adaptively assign a fair and efficient transmission rate to each node. In our algorithm, each node monitors its aggregate output and input traffic rates. Based on the difference of the two, a node then decides either(More)
IEEE 802.22 is a cognitive radio based Wireless Regional Area Network (WRAN) standard that allows opportunistic access to idle or under-utilized sub–900 MHz TV bands by unlicensed (secondary) networks. Though most of the standard has been laid out, there is still no consensus on the channel access policies for the uncoordinated secondary networks. Hence,(More)
This paper considers the problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks. By considering the attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC).We first(More)
0140-3664/$ see front matter 2011 Elsevier B.V. A doi:10.1016/j.comcom.2011.09.014 q Approved for Public Release; Distribution Unlim Sep 11. ⇑ Corresponding author. Tel.: +1 4078235793. E-mail addresses: sbrahma@eecs.ucf.edu (S. Br (M. Chatterjee), kevin.kwiat@rl.af.mil (K. Kwiat), varsh In this paper, we propose a distributed congestion control algorithm(More)
This paper presents a Game Theoretic framework for the analysis of distributed spectrum sharing in a Cognitive Radio Network (CRN) prone to jamming attacks. We consider competitive interactions between a selfish secondary user (SU) transmitter-receiver pair and a jammer under realistic physical interference constraints. Assuming incomplete knowledge of the(More)
In this paper, we propose a framework for target location estimation by designing an incentive-compatible mechanism in a wireless sensor network containing sensors that are selfish and profit-motivated. To accomplish the task, the fusion center (FC) conducts an auction by soliciting bids from the selfish sensors, where the bids reflect the information(More)
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distributed detection mechanism in tree-based topologies. First, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. Second, under the assumption that there is a cost(More)
In this paper, we propose a crowdsourcing-based framework for myopic target tracking by designing an optimal incentive-compatible mechanism in a wireless sensor network (WSN) containing sensors that are selfish and profit-motivated. In typical WSNs which have limited bandwidth, the fusion center (FC) has to distribute the total number of bits that can be(More)