DSpace logo

Department of Computer Science and Information Systems : [637] Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 637
Issue DateTitleAuthor(s)
2019Performance study of node wakeup rate on the privacy enabled addressing scheme in duty-cycled 6LoWPANMavani, Monali
2019-08Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addressesMavani, Monali
2018-10In unsecured 6LoWPANs, the nodes can be easily identified by their IPv6 as well as MAC addresses. An adversary can snoop (and later, spoof) these addresses, thereby posing a major threat against the node’s identity and communication integrity. Such threats necessitate enabling privacy by obscuring the node’s addresses. This study proposes a protocol for dynamic, auto-configuring and conflict-free IPv6 addressing scheme that attempts to ensure privacy of nodes. In the proposed protocol, each node obtains a three-level hierarchical IPv6 address space which is dynamically generated on basis of congruence classes. Use of congruence classes, along with hierarchical addressing, facilitates generation of inter-leaved (and hence, disjoint) and non-fragmented address space for each node, resulting in conflict free address auto-generation. Nodes auto-configure their address sets independently with congruence seeds shared by routers, potentially reducing router complexity. To ensure the MAC address privacy, MAC address also changes when IPv6 address changes and it is derived from the interface identification (IID) part of the IPv6 address. The proposed protocol runs on Contiki operating system, simulated in Cooja. Simulated results highlight lower latency and optimal communication costs when compared with existing protocols.Mavani, Monali
2018-10Privacy enabled disjoint and dynamic address auto-configuration protocol for 6LowpanMavani, Monali
2017Modeling and analyses of IP spoofing attack in 6LoWPAN networkMavani, Monali
1998Efficient algorithms for delay-bounded minimum cost path problem in communication networksNarang, Nishit
1999Efficient Algorithms for Delay-bounded Multicast Tree Generation for Multimedia ApplicationsNarang, Nishit
2018Utilizing Social Networks Data for Trust Management in a Social Internet of Things NetworkNarang, Nishit
2020An Analysis on the Effectiveness of Utilizing Facebook Graph Structure for Trust Management in a Social Iot NetworkNarang, Nishit
2020-01A Neighborhood Overlap Based Approach for Service Provider Prioritization in a Directed Social IoT Service NetworkNarang, Nishit
2021-06Your Tribe Decides Your Vibe: Analyzing Local Popularity in the US Patent Citation NetworkNarang, Nishit
2021-04A hybrid trust management framework for a multi-service social IoT networkNarang, Nishit
2006ATM Networks: Concepts and ProtocolsNarang, Nishit
20082.5G MOBILE NETWORKS: GPRS and EDGENarang, Nishit
20072G Mobile Networks Gsm & HscsdNarang, Nishit
2005Communication Networks: Principles and PracticeNarang, Nishit
20043G Mobile Networks: Architecture, Protocols and ProceduresNarang, Nishit
2011Error Level Fusion of Multimodal BiometricsGrover, Jyotsana
2011-10Score level fusion of multimodal biometrics using triangular normsGrover, Jyotsana
2015-06Hybrid fusion of score level and adaptive fuzzy decision level fusions for the finger-knuckle-print based authenticationGrover, Jyotsana
Collection's Items (Sorted by Submit Date in Descending order): 101 to 120 of 637