Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–19 of 19 results for author: Kasbekar, G S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.09279  [pdf, other

    cs.NI

    Whittle Index Based User Association in Dense Millimeter Wave Networks

    Authors: Mandar R. Nalavade, Gaurav S. Kasbekar, Vivek S. Borkar

    Abstract: We address the problem of user association in a dense millimeter wave (mmWave) network, in which each arriving user brings a file containing a random number of packets and each time slot is divided into multiple mini-slots. This problem is an instance of the restless multi-armed bandit problem, and is provably hard to solve. Using a technique introduced by Whittle, we relax the hard per-stage cons… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: 16 pages, 7 figures

  2. arXiv:2310.18664  [pdf, other

    cs.NI

    Node Cardinality Estimation in the Internet of Things Using Privileged Feature Distillation

    Authors: Pranav S. Page, Anand S. Siyote, Vivek S. Borkar, Gaurav S. Kasbekar

    Abstract: The Internet of Things (IoT) is emerging as a critical technology to connect resource-constrained devices such as sensors and actuators as well as appliances to the Internet. In this paper, we propose a novel methodology for node cardinality estimation in wireless networks such as the IoT and Radio-Frequency IDentification (RFID) systems, which uses the privileged feature distillation (PFD) techni… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

    Comments: 15 pages, 17 figures, journal paper

  3. Node Cardinality Estimation in a Heterogeneous Wireless Network Deployed Over a Large Region Using a Mobile Base Station

    Authors: Sachin Kadam, Kaustubh S. Bhargao, Gaurav S. Kasbekar

    Abstract: We consider the problem of estimation of the node cardinality of each node type in a heterogeneous wireless network with $T$ types of nodes deployed over a large region, where $T \ge 2$ is an integer. A mobile base station (MBS), such as that mounted on an unmanned aerial vehicle, is used in such cases since a single static base station is not sufficient to cover such a large region. The MBS moves… ▽ More

    Submitted 25 October, 2023; v1 submitted 15 June, 2023; originally announced June 2023.

    Comments: Accepted for publication at the 'Journal of Network and Computer Applications' (https://www.sciencedirect.com/journal/journal-of-network-and-computer-applications). It is an expanded version of the paper, which was presented at the IEEE SPCOM 2020 conference. DOI: 10.1109/SPCOM50965.2020.9179541

  4. arXiv:2209.08565  [pdf, other

    cs.NI

    Distributed Probabilistic Congestion Control in LEO Satellite Networks

    Authors: Pranav S. Page, Kaustubh S. Bhargao, Hrishikesh V. Baviskar, Gaurav S. Kasbekar

    Abstract: In a dense Low Earth Orbit (LEO) satellite constellation, using a centralized algorithm for minimum-delay routing would incur significant signaling and computational overhead. In this work, we exploit the deterministic topology of the constellation to calculate the minimum-delay path between any two nodes in a satellite network. We propose a distributed probabilistic congestion control scheme to m… ▽ More

    Submitted 6 December, 2022; v1 submitted 18 September, 2022; originally announced September 2022.

    Comments: 5 pages, 5 figures, conference, poster

  5. arXiv:2206.09133  [pdf, other

    cs.CR eess.SY

    Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers

    Authors: M. Surendra Kumar, Gaurav S. Kasbekar, Arnab Maity

    Abstract: The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) signals. In prior work, simplistic or asynchronous GPS spoofing was found to be a simple, efficient, and effective cyber attack against L1 GPS or GNSS dep… ▽ More

    Submitted 18 June, 2022; originally announced June 2022.

    Comments: 10 pages,

  6. arXiv:2205.08240  [pdf, other

    cs.NI

    Scheduling in Wireless Networks using Whittle Index Theory

    Authors: Karthik GVB, Vivek S. Borkar, Gaurav S. Kasbekar

    Abstract: We consider the problem of scheduling packet transmissions in a wireless network of users while minimizing the energy consumed and the transmission delay. A challenge is that transmissions of users that are close to each other mutually interfere, while users that are far apart can transmit simultaneously without much interference. Each user has a queue of packets that are transmitted on a single c… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 6 pages, 9 figures. arXiv admin note: substantial text overlap with arXiv:1910.04402

  7. arXiv:2203.09325  [pdf, ps, other

    cs.CR cs.NI

    Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm

    Authors: Nitesh Kumar, Gaurav S. Kasbekar, D. Manjunath

    Abstract: Traditionally, security systems for enterprises have implicit access based on strong cryptography, authentication and key sharing, wherein access control is based on Role Based Access Control (RBAC), in which roles such as manager, accountant and so on provide a way of deciding a subject's authority. However, years of post-attack analysis on enterprise networks has shown that a majority of times,… ▽ More

    Submitted 17 March, 2022; originally announced March 2022.

    Comments: 3 pages

  8. arXiv:2110.04259  [pdf, other

    cs.CR cs.NI

    A Wireless Intrusion Detection System for 802.11 WPA3 Networks

    Authors: Neil Dalal, Nadeem Akhtar, Anubhav Gupta, Nikhil Karamchandani, Gaurav S. Kasbekar, Jatin Parekh

    Abstract: Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification for 802.11 standards, has recently been shown to be vulnerable to several attacks. In this paper, we first describe the attacks on WPA3 networks that have been reported in prior work; additionally, we sh… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: Nine pages including one page of references

  9. arXiv:2107.09153  [pdf, other

    cs.IT eess.SY

    User Association in Dense mmWave Networks as Restless Bandits

    Authors: S. K. Singh, V. S. Borkar, G. S. Kasbekar

    Abstract: We study the problem of user association, i.e., determining which base station (BS) a user should associate with, in a dense millimeter wave (mmWave) network. In our system model, in each time slot, a user arrives with some probability in a region with a relatively small geographical area served by a dense mmWave network. Our goal is to devise an association policy under which, in each time slot i… ▽ More

    Submitted 28 April, 2022; v1 submitted 16 July, 2021; originally announced July 2021.

    Comments: 11 pages, 7 figures

  10. arXiv:2105.09687  [pdf, other

    cs.CR cs.NI

    Secure, Anonymity-Preserving and Lightweight Mutual Authentication and Key Agreement Protocol for Home Automation IoT Networks

    Authors: Akash Gupta, Gaurav S. Kasbekar

    Abstract: Home automation Internet of Things (IoT) systems have recently become a target for several types of attacks. In this paper, we present an authentication and key agreement protocol for a home automation network based on the ZigBee standard, which connects together a central controller and several end devices. Our scheme performs mutual authentication between end devices and the controller, which is… ▽ More

    Submitted 27 July, 2021; v1 submitted 20 May, 2021; originally announced May 2021.

  11. arXiv:2008.06890  [pdf, other

    cs.NI cs.CR

    Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

    Authors: Adhirath Kabra, Sumit Kumar, Gaurav S. Kasbekar

    Abstract: Many Internet of Things (IoT) scenarios require communication to and data acquisition from multiple devices with similar functionalities. For such scenarios, group communication in the form of multicasting and broadcasting has proven to be effective. Group Key Management (GKM) involves the handling, revocation, updation and distribution of cryptographic keys to members of various groups. Classical… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

  12. arXiv:1912.12001  [pdf, ps, other

    eess.SP cs.IT

    Achieving Arbitrary Throughput-Fairness Trade-offs in the Inter Cell Interference Coordination with Fixed Transmit Power Problem

    Authors: Vaibhav Kumar Gupta, Gaurav S. Kasbekar

    Abstract: We study the problem of inter cell interference coordination (ICIC) with fixed transmit power in OFDMA-based cellular networks, in which each base station (BS) needs to decide as to which subchannel, if any, to allocate to each of its associated mobile stations (MS) for data transmission. In general, there exists a trade-off between the total throughput (sum of throughputs of all the MSs) and fair… ▽ More

    Submitted 27 December, 2019; originally announced December 2019.

    Comments: Submitted to IEEE TVT, 15 pages

  13. arXiv:1912.06975  [pdf, other

    cs.IT cs.SI

    Coalitional Game Framework for Content Distribution Using Device-to-device Communication

    Authors: Aditya MVS, Chitrarth Shrivastava, Gaurav S. Kasbekar

    Abstract: We consider a set of cellular users associated with a base station (BS) in a cellular network that employs Device-to-device (D2D) communication. A subset of the users request for some files from the BS. Now, some of the users can potentially act as relays and forward the requested files, or partitions of files, from the BS to some of the requesting users (destination nodes) over D2D links. However… ▽ More

    Submitted 14 December, 2019; originally announced December 2019.

    Comments: 12 pages, 4 figures, Preliminary version appeared in the proc. of IEEE VTC2019-Spring

  14. Design and Implementation of a Wireless SensorNetwork for Agricultural Applications

    Authors: Jobish John, Gaurav S Kasbekar, Dinesh K Sharma, V. Ramulu, Maryam Shojaei Baghini

    Abstract: We present the design and implementation of a shortest path tree based, energy efficient data collection wireless sensor network to sense various parameters in an agricultural farm using in-house developed low cost sensors. Nodes follow a synchronized, periodic sleep-wake up schedule to maximize the lifetime of the network. The implemented network consists of 24 sensor nodes in a 3 acre maize farm… ▽ More

    Submitted 22 October, 2019; originally announced October 2019.

    Journal ref: EAI Endorsed Transactions on Internet of Things 4.16 (2018)

  15. arXiv:1910.09793  [pdf, ps, other

    cs.NI

    Maximum Lifetime Convergecast Tree in Wireless Sensor Networks

    Authors: Jobish John, Gaurav S Kasbekar, Maryam Shojaei Baghini

    Abstract: We study the problem of building a maximum lifetime data collection tree for periodic convergecast applications in wireless sensor networks. We experimentally observe that if two nodes transmit same number of data packets, the amount of energy consumption of the nodes is approximately the same even if the payload lengths of the transmitted packets are different. This is because the major energy co… ▽ More

    Submitted 8 June, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

  16. arXiv:1910.04402  [pdf, ps, other

    eess.SP cs.NI

    Scheduling in Wireless Networks with Spatial Reuse of Spectrum as Restless Bandits

    Authors: Vivek S. Borkar, Shantanu Choudhary, Vaibhav Kumar Gupta, Gaurav S. Kasbekar

    Abstract: We study the problem of scheduling packet transmissions with the aim of minimizing the energy consumption and data transmission delay of users in a wireless network in which spatial reuse of spectrum is employed. We approach this problem using the theory of Whittle index for cost minimizing restless bandits, which has been used to effectively solve problems in a variety of applications. We design… ▽ More

    Submitted 8 June, 2020; v1 submitted 10 October, 2019; originally announced October 2019.

    Comments: Revision

  17. arXiv:1906.00379  [pdf, other

    cs.GT cs.NI

    Beyond the VCG Mechanism: Truthful Reverse Auctions for Relay Selection with High Data Rates, High Base Station Utility and Low Interference in D2D Networks

    Authors: Aditya MVS, Harsh Pancholi, Priyanka P., Gaurav S. Kasbekar

    Abstract: Device-to-Device communication allows a cellular user (relay node) to relay data between the base station (BS) and another cellular user (destination node). We address the problem of designing reverse auctions to assign a relay node to each destination node, when there are multiple potential relay nodes and multiple destination nodes, in the scenarios where the transmission powers of the relay nod… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

    Comments: 16 pages, 7 figures. Preliminary work published in Proc. of IEEE NCC 2017. Draft Submitted to IEEE TMC

  18. Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous Machine-to-Machine Networks

    Authors: Sachin Kadam, Chaitanya S. Raut, Amandeep Meena, Gaurav S. Kasbekar

    Abstract: Machine-to-Machine (M2M) networks are an emerging technology with applications in numerous areas including smart grids, smart cities, vehicular telematics, and healthcare. In this paper, we design two estimation protocols for rapidly obtaining separate estimates of the number of active nodes of each traffic type in a heterogeneous M2M network with $T$ types of M2M nodes (e.g., those that send emer… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

    Journal ref: Wireless Networks, vol. 26, pp. 3929-3952, 2020

  19. arXiv:1710.11471  [pdf, other

    cs.PF eess.SY

    Distributed Server Allocation for Content Delivery Networks

    Authors: Sarath Pattathil, Vivek S. Borkar, Gaurav S. Kasbekar

    Abstract: We propose a dynamic formulation of file-sharing networks in terms of an average cost Markov decision process with constraints. By analyzing a Whittle-like relaxation thereof, we propose an index policy in the spirit of Whittle and compare it by simulations with other natural heuristics.

    Submitted 9 February, 2019; v1 submitted 28 October, 2017; originally announced October 2017.

    Comments: 22 pages, 10 figures