Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 637
Issue Date | Title | Author(s) |
2019 | Performance study of node wakeup rate on the privacy enabled addressing scheme in duty-cycled 6LoWPAN | Mavani, Monali |
2019-08 | Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses | Mavani, Monali |
2018-10 | In unsecured 6LoWPANs, the nodes can be easily identified by their IPv6 as well as MAC addresses. An adversary can snoop (and later, spoof) these addresses, thereby posing a major threat against the node’s identity and communication integrity. Such threats necessitate enabling privacy by obscuring the node’s addresses. This study proposes a protocol for dynamic, auto-configuring and conflict-free IPv6 addressing scheme that attempts to ensure privacy of nodes. In the proposed protocol, each node obtains a three-level hierarchical IPv6 address space which is dynamically generated on basis of congruence classes. Use of congruence classes, along with hierarchical addressing, facilitates generation of inter-leaved (and hence, disjoint) and non-fragmented address space for each node, resulting in conflict free address auto-generation. Nodes auto-configure their address sets independently with congruence seeds shared by routers, potentially reducing router complexity. To ensure the MAC address privacy, MAC address also changes when IPv6 address changes and it is derived from the interface identification (IID) part of the IPv6 address. The proposed protocol runs on Contiki operating system, simulated in Cooja. Simulated results highlight lower latency and optimal communication costs when compared with existing protocols. | Mavani, Monali |
2018-10 | Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan | Mavani, Monali |
2017 | Modeling and analyses of IP spoofing attack in 6LoWPAN network | Mavani, Monali |
1998 | Efficient algorithms for delay-bounded minimum cost path problem in communication networks | Narang, Nishit |
1999 | Efficient Algorithms for Delay-bounded Multicast Tree Generation for Multimedia Applications | Narang, Nishit |
2018 | Utilizing Social Networks Data for Trust Management in a Social Internet of Things Network | Narang, Nishit |
2020 | An Analysis on the Effectiveness of Utilizing Facebook Graph Structure for Trust Management in a Social Iot Network | Narang, Nishit |
2020-01 | A Neighborhood Overlap Based Approach for Service Provider Prioritization in a Directed Social IoT Service Network | Narang, Nishit |
2021-06 | Your Tribe Decides Your Vibe: Analyzing Local Popularity in the US Patent Citation Network | Narang, Nishit |
2021-04 | A hybrid trust management framework for a multi-service social IoT network | Narang, Nishit |
2006 | ATM Networks: Concepts and Protocols | Narang, Nishit |
2008 | 2.5G MOBILE NETWORKS: GPRS and EDGE | Narang, Nishit |
2007 | 2G Mobile Networks Gsm & Hscsd | Narang, Nishit |
2005 | Communication Networks: Principles and Practice | Narang, Nishit |
2004 | 3G Mobile Networks: Architecture, Protocols and Procedures | Narang, Nishit |
2011 | Error Level Fusion of Multimodal Biometrics | Grover, Jyotsana |
2011-10 | Score level fusion of multimodal biometrics using triangular norms | Grover, Jyotsana |
2015-06 | Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger-knuckle-print based authentication | Grover, Jyotsana |
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 637