Collection's Items (Sorted by Submit Date in Descending order): 521 to 540 of 1064
Issue Date | Title | Author(s) |
2019-04 | Variation-aware parameter based analog yield optimization methods | Naidu, S.R. |
2021-03 | A convex programming solution for gate-sizing with pipelining constraints | Naidu, S.R. |
2013 | MapReduce Frame Work: Investigating Suitability for Faster Data Analytics | Mavani, Monali |
2013 | Security implication and detection of threats due to manipulating IPv6 extension headers | Mavani, Monali |
2014 | Covert channel in IPv6 Destination option Extension header | Mavani, Monali |
2017 | Experimental study of IP spoofing attack in 6LoWPAN network | Mavani, Monali |
2018 | Privacy Preserving IPv6 Address Auto-Configuration for Internet of Things | Mavani, Monali |
2019 | Performance study of node wakeup rate on the privacy enabled addressing scheme in duty-cycled 6LoWPAN | Mavani, Monali |
2019-08 | Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses | Mavani, Monali |
2018-10 | In unsecured 6LoWPANs, the nodes can be easily identified by their IPv6 as well as MAC addresses. An adversary can snoop (and later, spoof) these addresses, thereby posing a major threat against the node’s identity and communication integrity. Such threats necessitate enabling privacy by obscuring the node’s addresses. This study proposes a protocol for dynamic, auto-configuring and conflict-free IPv6 addressing scheme that attempts to ensure privacy of nodes. In the proposed protocol, each node obtains a three-level hierarchical IPv6 address space which is dynamically generated on basis of congruence classes. Use of congruence classes, along with hierarchical addressing, facilitates generation of inter-leaved (and hence, disjoint) and non-fragmented address space for each node, resulting in conflict free address auto-generation. Nodes auto-configure their address sets independently with congruence seeds shared by routers, potentially reducing router complexity. To ensure the MAC address privacy, MAC address also changes when IPv6 address changes and it is derived from the interface identification (IID) part of the IPv6 address. The proposed protocol runs on Contiki operating system, simulated in Cooja. Simulated results highlight lower latency and optimal communication costs when compared with existing protocols. | Mavani, Monali |
2018-10 | Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan | Mavani, Monali |
2017 | Modeling and analyses of IP spoofing attack in 6LoWPAN network | Mavani, Monali |
1998 | Efficient algorithms for delay-bounded minimum cost path problem in communication networks | Narang, Nishit |
1999 | Efficient Algorithms for Delay-bounded Multicast Tree Generation for Multimedia Applications | Narang, Nishit |
2018 | Utilizing Social Networks Data for Trust Management in a Social Internet of Things Network | Narang, Nishit |
2020 | An Analysis on the Effectiveness of Utilizing Facebook Graph Structure for Trust Management in a Social Iot Network | Narang, Nishit |
2020-01 | A Neighborhood Overlap Based Approach for Service Provider Prioritization in a Directed Social IoT Service Network | Narang, Nishit |
2021-06 | Your Tribe Decides Your Vibe: Analyzing Local Popularity in the US Patent Citation Network | Narang, Nishit |
2021-04 | A hybrid trust management framework for a multi-service social IoT network | Narang, Nishit |
2006 | ATM Networks: Concepts and Protocols | Narang, Nishit |
Collection's Items (Sorted by Submit Date in Descending order): 521 to 540 of 1064