Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Railway Bridge Health Monitoring is of prime importance as damages in bridges can lead to heavy c... more Railway Bridge Health Monitoring is of prime importance as damages in bridges can lead to heavy casualties. Hence, monitoring is necessary to provide safety services to the millions of people around the world. Recently, wireless sensor network (WSN) has come up as a promising technology for health monitoring. However, memory and energy constraints of WSN, and extracting intelligible information from signals obtained from complex bridge structures are the technical challenges in this domain. In this paper, we give a brief overview of a novel railway bridge health monitoring system using smart WSN.
In this work, we have aimed at developing a new source location privacy preserving protocols to a... more In this work, we have aimed at developing a new source location privacy preserving protocols to achieve uniform privacy privacy irrespective of the location of the source in the network with enhanced privacy and network lifetime. This is done without the use of fake packets and fake source. The proposed technique falls under the category of Phantom-based Random Walk Technicues.
Till date source location privacy preserving techniques have aimed at fake backed or fake source ... more Till date source location privacy preserving techniques have aimed at fake backed or fake source approaches. Also, the work is concentrated to a single source scenarios. In this work, aim to explore the random-walk approach to mitigate passive eavesdropping attacker who backtracks to the source of information. Random-walk based solutions have proven to be effective for energy constrained WSNs. However, there is very little work that has worked for the case of multiple asset (sources) scenario till date. To understand the effect of the random-walk based solutions on level of location privacy in WSN intended IoT systems, for the multiple asset scenario, we developed two solutions. Through simulations we show the performance of the proposed two solutions by comparing them with existing random-walk based solutions. Our findings suggest that mere presence of multiple sources in the network alone does not provide location privacy, as one is intended to expect. It rather, need careful planning and designing of routing protocols to provide better privacy in presence of multiple-assets.The work also presents future research direction for prospective researcher.
Long distance communication links may severely affect the cyber-physical systems (CPSs) in 5G (an... more Long distance communication links may severely affect the cyber-physical systems (CPSs) in 5G (and future 6G) networks and degrade its reliability and resilience by disrupting the quality index of network latency. Further, centralized network architectures have low fault tolerance and are prone to security threats. Virtualized software defined network (vSDN)-enabled 5G networks closely monitor these facts and redefine the existing network topology to find potential locations for deploying controller and hypervisor instances. In this article, we propose an approach of dynamically deploying controller-hypervisor (C-H) pair(s) to provide a variety of network functions like differentiation between control and data signals, various translation functions, etc., with ultra low latency (ULL). The system model deals with real network topology and four well-defined network latency matrices with a mixed integer linear programming model to optimize latency objectives. A reverse path-flow mechanism (RPFM) has been proposed to provide feasible solutions by keeping the network load, and controller capacity under a tolerance limit. We have further minimized the H-plane load by distributing the network resources based on the arrival time of SERVICE_IN requests from the users. Simulation results show that our proposed technique achieves significant reduction in latency and an evolved-ULL (e-ULL) experience, where all real-time user demands are handled efficiently. The proposed approach can also be used for similar critical localization problems like service chain mapping in 5G-NR, baseband unit deployment in 5G C-RAN and firewall deployment in distributed CPS.
2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
Softwarized Network Function Virtualization (sNFV) is driving the next generation 5G telecommunic... more Softwarized Network Function Virtualization (sNFV) is driving the next generation 5G telecommunication networks to fulfill all the real time service demands of mobile users. Seamless connectivity with ultra low latency (ULL) in high mobility scenarios is one of the most necessary and challenging areas where researchers are working intensively. Thanks to Network Function Softwarization that helps to optimize the user data plane and control plane characteristics very easily with the help of Software Defined Networking (SDN). Inside a 5G network architecture the Serving Gateways (SGW) and Packet Data Gateways (PGW) are responsible for handing over the control functions (e.g signaling and tunnel creation) from one controller to another. SDN brakes SGW to make S/PGW-C at control plane and S/PGW-U at data plane. The UE traffic forwarding decisions are taken at S/PGW-C and further it instructs the S/PGW-U to execute the required data transferring operations. Dynamic up-gradations for uninterrupted signal flow are done at SGW-C using virtual machines running on a federated cloud. In this paper, we focus on a unique and novel SGW Controller Placement Problem (CPP) where a trade off has been made in between the controller load and handover frequency within a restricted network latency constraint. The problem formulations are done based on a Mixed Integer linear Optimization Programming model. The Pareto optimal algorithmic solution shows the suitable control plane distributions of SGW-C satisfying all the necessary objectives.
Journal of Open Innovation: Technology, Market, and Complexity
Vehicular Ad Hoc Network (VANET) is a subclass of Mobile Ad Hoc Network that mainly consists of m... more Vehicular Ad Hoc Network (VANET) is a subclass of Mobile Ad Hoc Network that mainly consists of moving and/or stationary vehicles, connected through wireless protocols such as IEEE 802.11p and wireless access in vehicular environments (WAVE). With the evolution of the Internet of Things (IoT), ordinary VANET has turned to the Internet of Vehicles (IoV), with additional social aspects, a novel extension themed SIoV has become common in urban areas. However vehicular wireless communication paradigms exhibit short radio communication. This problem has always been approached by supplementing moving vehicles with stationary Road Side Infrastructures, commonly known as roadside units (RSUs). The penetration of such RSUs on the global market is very low; furthermore, their procurement, deployment, and maintenance costs are prohibitively very high. All mentioned challenges have discouraged the widespread deployment of roadside infrastructure especially within large urban scenarios. With thi...
In this paper we propose a game theoretic framework for stochastic multipath routing in mobile ad... more In this paper we propose a game theoretic framework for stochastic multipath routing in mobile ad hoc networks (MANETs). In a MANET, intelligent and adaptive attackers may try to hijack, jam or intercept data packets traveling from source to destination. In our proposed game, at each stage the source node keeps track of the available multiple paths, the residual bandwidth of the paths and the strategy of the attackers from the information gathered during the previous stage. Based on these observations, the source node selects a path for data communication and switching strategy among the multiple established paths between the source node and the destination node. Accordingly, it selects an optimal routing strategy to send data packets to the destination at each stage of the game. Using minimax-Q learning, the selected routing strategy maximizes the expected sum of per stage discounted payoff, which is the utilization of residual bandwidth between a source–destination pair along with the probability that the path is safe. Performance analysis and numerical results show that our proposed scheme achieves significant performance gains in terms of residual bandwidth utilization, average end-to-end delay, packet delivery ratio, routing overhead and security.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Railway Bridge Health Monitoring is of prime importance as damages in bridges can lead to heavy c... more Railway Bridge Health Monitoring is of prime importance as damages in bridges can lead to heavy casualties. Hence, monitoring is necessary to provide safety services to the millions of people around the world. Recently, wireless sensor network (WSN) has come up as a promising technology for health monitoring. However, memory and energy constraints of WSN, and extracting intelligible information from signals obtained from complex bridge structures are the technical challenges in this domain. In this paper, we give a brief overview of a novel railway bridge health monitoring system using smart WSN.
In this work, we have aimed at developing a new source location privacy preserving protocols to a... more In this work, we have aimed at developing a new source location privacy preserving protocols to achieve uniform privacy privacy irrespective of the location of the source in the network with enhanced privacy and network lifetime. This is done without the use of fake packets and fake source. The proposed technique falls under the category of Phantom-based Random Walk Technicues.
Till date source location privacy preserving techniques have aimed at fake backed or fake source ... more Till date source location privacy preserving techniques have aimed at fake backed or fake source approaches. Also, the work is concentrated to a single source scenarios. In this work, aim to explore the random-walk approach to mitigate passive eavesdropping attacker who backtracks to the source of information. Random-walk based solutions have proven to be effective for energy constrained WSNs. However, there is very little work that has worked for the case of multiple asset (sources) scenario till date. To understand the effect of the random-walk based solutions on level of location privacy in WSN intended IoT systems, for the multiple asset scenario, we developed two solutions. Through simulations we show the performance of the proposed two solutions by comparing them with existing random-walk based solutions. Our findings suggest that mere presence of multiple sources in the network alone does not provide location privacy, as one is intended to expect. It rather, need careful planning and designing of routing protocols to provide better privacy in presence of multiple-assets.The work also presents future research direction for prospective researcher.
Long distance communication links may severely affect the cyber-physical systems (CPSs) in 5G (an... more Long distance communication links may severely affect the cyber-physical systems (CPSs) in 5G (and future 6G) networks and degrade its reliability and resilience by disrupting the quality index of network latency. Further, centralized network architectures have low fault tolerance and are prone to security threats. Virtualized software defined network (vSDN)-enabled 5G networks closely monitor these facts and redefine the existing network topology to find potential locations for deploying controller and hypervisor instances. In this article, we propose an approach of dynamically deploying controller-hypervisor (C-H) pair(s) to provide a variety of network functions like differentiation between control and data signals, various translation functions, etc., with ultra low latency (ULL). The system model deals with real network topology and four well-defined network latency matrices with a mixed integer linear programming model to optimize latency objectives. A reverse path-flow mechanism (RPFM) has been proposed to provide feasible solutions by keeping the network load, and controller capacity under a tolerance limit. We have further minimized the H-plane load by distributing the network resources based on the arrival time of SERVICE_IN requests from the users. Simulation results show that our proposed technique achieves significant reduction in latency and an evolved-ULL (e-ULL) experience, where all real-time user demands are handled efficiently. The proposed approach can also be used for similar critical localization problems like service chain mapping in 5G-NR, baseband unit deployment in 5G C-RAN and firewall deployment in distributed CPS.
2020 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
Softwarized Network Function Virtualization (sNFV) is driving the next generation 5G telecommunic... more Softwarized Network Function Virtualization (sNFV) is driving the next generation 5G telecommunication networks to fulfill all the real time service demands of mobile users. Seamless connectivity with ultra low latency (ULL) in high mobility scenarios is one of the most necessary and challenging areas where researchers are working intensively. Thanks to Network Function Softwarization that helps to optimize the user data plane and control plane characteristics very easily with the help of Software Defined Networking (SDN). Inside a 5G network architecture the Serving Gateways (SGW) and Packet Data Gateways (PGW) are responsible for handing over the control functions (e.g signaling and tunnel creation) from one controller to another. SDN brakes SGW to make S/PGW-C at control plane and S/PGW-U at data plane. The UE traffic forwarding decisions are taken at S/PGW-C and further it instructs the S/PGW-U to execute the required data transferring operations. Dynamic up-gradations for uninterrupted signal flow are done at SGW-C using virtual machines running on a federated cloud. In this paper, we focus on a unique and novel SGW Controller Placement Problem (CPP) where a trade off has been made in between the controller load and handover frequency within a restricted network latency constraint. The problem formulations are done based on a Mixed Integer linear Optimization Programming model. The Pareto optimal algorithmic solution shows the suitable control plane distributions of SGW-C satisfying all the necessary objectives.
Journal of Open Innovation: Technology, Market, and Complexity
Vehicular Ad Hoc Network (VANET) is a subclass of Mobile Ad Hoc Network that mainly consists of m... more Vehicular Ad Hoc Network (VANET) is a subclass of Mobile Ad Hoc Network that mainly consists of moving and/or stationary vehicles, connected through wireless protocols such as IEEE 802.11p and wireless access in vehicular environments (WAVE). With the evolution of the Internet of Things (IoT), ordinary VANET has turned to the Internet of Vehicles (IoV), with additional social aspects, a novel extension themed SIoV has become common in urban areas. However vehicular wireless communication paradigms exhibit short radio communication. This problem has always been approached by supplementing moving vehicles with stationary Road Side Infrastructures, commonly known as roadside units (RSUs). The penetration of such RSUs on the global market is very low; furthermore, their procurement, deployment, and maintenance costs are prohibitively very high. All mentioned challenges have discouraged the widespread deployment of roadside infrastructure especially within large urban scenarios. With thi...
In this paper we propose a game theoretic framework for stochastic multipath routing in mobile ad... more In this paper we propose a game theoretic framework for stochastic multipath routing in mobile ad hoc networks (MANETs). In a MANET, intelligent and adaptive attackers may try to hijack, jam or intercept data packets traveling from source to destination. In our proposed game, at each stage the source node keeps track of the available multiple paths, the residual bandwidth of the paths and the strategy of the attackers from the information gathered during the previous stage. Based on these observations, the source node selects a path for data communication and switching strategy among the multiple established paths between the source node and the destination node. Accordingly, it selects an optimal routing strategy to send data packets to the destination at each stage of the game. Using minimax-Q learning, the selected routing strategy maximizes the expected sum of per stage discounted payoff, which is the utilization of residual bandwidth between a source–destination pair along with the probability that the path is safe. Performance analysis and numerical results show that our proposed scheme achieves significant performance gains in terms of residual bandwidth utilization, average end-to-end delay, packet delivery ratio, routing overhead and security.
Uploads
Papers by Raja Datta