scispace - formally typeset
S

Sipra Das Bit

Researcher at Indian Institute of Engineering Science and Technology, Shibpur

Publications -  54
Citations -  1045

Sipra Das Bit is an academic researcher from Indian Institute of Engineering Science and Technology, Shibpur. The author has contributed to research in topics: Wireless sensor network & Routing protocol. The author has an hindex of 10, co-authored 49 publications receiving 576 citations.

Papers
More filters
Journal ArticleDOI

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

TL;DR: A taxonomy of the security research areas in IoT/IIoT along with their corresponding solutions is designed and several open research directions relevant to the focus of this survey are identified.
Journal ArticleDOI

Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes

TL;DR: A location-wise pre-determined heterogeneous node deployment strategy based on the principle of energy balancing derived from this analysis is developed, leading to an enhancement of network lifetime.
Journal ArticleDOI

A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network

TL;DR: This work has investigated the problem of uniform node distribution and shown its incapability to deal with the energy hole problem, and derived the principle of non-uniform node distribution that ensures energy balancing, and developed a non- uniform, location-wise pre-determined node deployment strategy leading to an increase in network lifetime.
Proceedings ArticleDOI

An Enhanced Energy-Efficient Protocol with Static Clustering for WSN

TL;DR: Based on the experimental results, it has been found that E3PSC outperforms EEPSC in terms of network lifetime and energy consumption.
Journal ArticleDOI

A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0

TL;DR: A secure fog-based IIoT architecture is proposed by suitably plugging a number of security features into it and by offloading some of the tasks judiciously to fog nodes, respectively, to secure the system alongside reducing the trust and burden on the cloud and resource-constrained devices.