scispace - formally typeset
Author

Suchetana Chakraborty

Bio: Suchetana Chakraborty is an academic researcher from Indian Institutes of Information Technology. The author has contributed to research in topic(s): Wireless sensor network & Key distribution in wireless sensor networks. The author has an hindex of 6, co-authored 25 publication(s) receiving 105 citation(s). Previous affiliations of Suchetana Chakraborty include Indian Institute of Technology Guwahati.

Papers
More filters
Proceedings ArticleDOI
01 Dec 2018
TL;DR: A blockchain based novel architecture for vehicle authentication and privacy preservation with seamless access control for IoV and the proposed BlockAPP protocol also supports an optional traceability feature.
Abstract: Recent proliferation in disruptive technologies has opened up a new horizon for Internet of Vehicles (IoV). The success of IoV highly depends on the robustness of vehicular information system as a dispute among the service providers on data rights or any kind of security violation could disrupt the transport services altogether. In this work we propose a blockchain based novel architecture for vehicle authentication and privacy preservation with seamless access control for IoV. Proposed architecture is decentralized, robust and scalable. Along with privacy preserving authentication and conflict-free access-log maintenance, the proposed BlockAPP protocol also supports an optional traceability feature. Performance evaluation using smart contact over Ethereum Blockchain validates the effectiveness of the proposed architecture.

16 citations

Proceedings ArticleDOI
24 Aug 2011
TL;DR: A novel scheme has been proposed to locally repair the tree with constant round of message transmissions to ensure the correct delivery of messages in a query-response based application.
Abstract: Query driven Broadcast through wireless sensor nodes also leads to the domain of event driven converge cast. A query-response based application in Wireless Sensor Networks(WSN) demands the correct delivery of data message at each sensor node. A Breadth-First Search(BFS) tree rooted at the base station offers shortest path traversal for each data message which utilizes the sensor resources efficiently. Resource constrained sensor nodes are highly prone to sudden crash. So the application demands a quick and smart approach to repair the tree when a node dies. In this paper a novel scheme has been proposed to locally repair the tree with constant round of message transmissions. Each node piggybacks a few bytes of extra information along with each query and response messages. Based on these piggybacked values each node calculates its alternate parent. When a parent node fails, its children can contact their respective alternate parents immediately to establish an alternate path to the root. Reduced communication cost in terms of extra message transmissions saves battery power at each node. Efficient query-response message handler ensures the correct delivery of messages. Fast repairing offers good Quality of Service(QoS). Simulation result shows that no message is lost except the one holding by the crashed node.

13 citations

Proceedings ArticleDOI
01 Sep 2018
TL;DR: B2VDM, a novel architecture for vehicular data management at RSUs, that provides a seamless access control using Blockchain technology is introduced that maintains the reliability by minimizing the number of packet drops at a heavily loaded RSU during peak hours.
Abstract: Smart interconnected vehicles generate a huge amount of data to be used by a wide range of applications. Although cloud based data management is currently in practice, for many applications serving road safety or traffic regulation, it is utmost important that applications access these data at the site itself for improved quality of service. Road side units (RSUs) play a crucial role in handling these vast amount of vehicular data and serving the running applications in turn. In this current era of edge computing, in-place data access is also proven to be advantageous from cost point of view. As multiple applications from different service providers are interested to access different fragments of these data, a robust access control mechanism is needed to ensure desired level of security as well as reliability for these data. In this paper, we introduce B2VDM, a novel architecture for vehicular data management at RSUs, that provides a seamless access control using Blockchain technology. The proposed B2VDM framework also implements a simple load distribution module, which maintains the reliability by minimizing the number of packet drops at a heavily loaded RSU during peak hours. An extensive evaluation using Etherium Blockchain validates the effectiveness of the proposed architecture.

12 citations

Proceedings ArticleDOI
10 Nov 2011
TL;DR: A tree based broadcast mechanism is proposed that constructs a spanning tree out of all nodes in the network rooted at the source of the broadcast that saves the battery power at each node by reducing the number of packet transmissions.
Abstract: A reliable broadcast demands that each data packet forwarded from the source node is received by all other nodes in the network without any loss A flooding based Broadcast scheme incurs significant overhead due to explosion of packets in the network So an efficient way of routing packets in order to broadcast saves the energy of resource constrained sensor nodes The delivery of broadcast packets at each node in correct sequence is also crucial for certain applications In this paper a tree based broadcast mechanism is proposed that constructs a spanning tree out of all nodes in the network rooted at the source of the broadcast The broadcast tree eventually becomes a Breadth-First Search(BFS) tree where each node maintains the shortest path to the root So packets routed through the shortest paths reduce transmission delay and packet loss BFS tree based broadcast saves the battery power at each node by reducing the number of packet transmissions The proposed scheme for broadcast is also crash tolerant Each node computes a maintenance plan during the broadcast tree construction for future requirement If a node dies, all the nodes in neighborhood repairs the tree locally within constant round of message transmissions Each broadcast packet is assured to be delivered at each node without redundancy and maintaining the correct order

8 citations

Proceedings ArticleDOI
25 Nov 2013
TL;DR: This paper proposes an improved opportunistic path selection protocol over HWMP for multi-radio support that goes beyond the traditional routing mechanisms, operates either in proactive, reactive or hybrid mode and is analyzed using simulation results.
Abstract: IEEE 802.11s provides Hybrid Wireless Mesh Protocol (HWMP) to find out the forwarding path in a mesh network based on mesh peering and MAC layer scheduling information. However, both proactive and reactive modes of HWMP perform poorly for multi-radio mesh network because of inefficient radio selection, time-varying channel conditions and interference among the radios. This paper proposes an improved opportunistic path selection protocol over HWMP for multi-radio support that goes beyond the traditional routing mechanisms, operates either in proactive, reactive or hybrid mode. The efficiency of the proposed scheme is analyzed using simulation results.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A state-of-art survey on the integration of blockchain with 5G networks and beyond, including discussions on the potential of blockchain for enabling key 5G technologies, including cloud/edge computing, Software Defined Networks, Network Function Virtualization, Network Slicing, and D2D communications.
Abstract: The fifth generation (5G) wireless networks are on the way to be deployed around the world. The 5G technologies target to support diverse vertical applications by connecting heterogeneous devices and machines with drastic improvements in terms of high quality of service, increased network capacity and enhanced system throughput. However, 5G systems still remain a number of security challenges that have been mentioned by researchers and organizations, including decentralization, transparency, risks of data interoperability, and network privacy vulnerabilities. Furthermore, the conventional techniques may not be sufficient to deal with the security requirements of 5G. As 5G is generally deployed in heterogeneous networks with massive ubiquitous devices, it is quite necessary to provide secure and decentralized solutions. Motivated from these facts, in this paper we provide a state-of-the-art survey on the integration of blockchain with 5G networks and beyond. In this detailed survey, our primary focus is on the extensive discussions on the potential of blockchain for enabling key 5G technologies, including cloud computing, edge computing, Network Function Virtualization, Network Slicing, and D2D communications. We then explore and analyse the opportunities that blockchain potentially empowers important 5G services, ranging from spectrum management, data sharing, network virtualization, resource management to interference management, federated learning, privacy and security provision. The recent advances in the applications of blockchain in 5G Internet of Things are also surveyed in a wide range of popular use-case domains, such as smart healthcare, smart city, smart transportation, smart grid and UAVs. The main findings derived from the comprehensive survey on the cooperated blockchain-5G networks and services are then summarized, and possible research challenges with open issues are also identified. Lastly, we complete this survey by shedding new light on future directions of research on this newly emerging area.

105 citations

Journal ArticleDOI
TL;DR: This work proposes two vehicle detection algorithms based on a cross-correlation technique in wireless magnetic sensor networks for on-street parking detection and vehicle speed estimation (VSE).
Abstract: Vehicle detections are an important research field and attract many researchers. Most research efforts have been focused on vehicle parking detection (VPD) in indoor parking lot. For on-street parking, strong noise disturbances affect detection accuracy. To deal with vehicle detections in on-street environment, we propose two vehicle detection algorithms based on a cross-correlation technique in wireless magnetic sensor networks. One is for VPD, and the other one is for vehicle speed estimation (VSE). The proposed VPD algorithm combines the state-machine detection and the cross-correlation detection. In the VSE, speed estimation is based on the calculation of the normalized cross correlation between the signals of two sensors along the road with a certain spacing. Experimental results show that the VPD has an accuracy of 99.65% for arrival and 99.44% for departure, while the VSE has an accuracy of 92%.

39 citations

Journal ArticleDOI
01 Sep 2015
TL;DR: A survey of SDN and NFV focusing in virtualisation projects and the use cases where a synergy between these technologies is possible and the basic concepts of network virtualisation, NFV and SDN are included.
Abstract: Software defined networking (SDN) and network function virtualisation (NFV) have become hot topics in recent years. On one hand, SDN decouples the control plane from the data plane allowing the rapid innovation and the introduction of new services in an easy way. On the other hand, currently proprietary appliances such as load balancers and firewalls are implemented in hardware, NFV aims to change these network functions to an open software environment using virtualisation and cloud technologies. This means a reduction of spends in the provisioning and management of telecom services. SDN and NFV are two different concepts but these can coexist and help each other. In this study, the authors present a survey of SDN and NFV focusing in virtualisation projects and the use cases where a synergy between these technologies is possible. This study includes the basic concepts of network virtualisation, NFV and SDN, current research and the relation between both technologies.

26 citations

Journal ArticleDOI
TL;DR: The simulation results demonstrate that the proposed RODAA algorithm is capable of completing the panel cleaning mission faster than other auction-based task allocation algorithms and has lower overall resource consumption.
Abstract: This paper proposes a resource-oriented, decentralized auction algorithm (RODAA) for multirobot task allocation considering multiple resources of the robots and limited robot communication range. The resources that this paper focuses on are the expendable supplies that a robot consumes and recharges while performing tasks, such as energy. In the proposed algorithm, each robot generates its cost for the task in a probabilistic manner considering multiple paths that visit none or different combinations of refill stations for performing the task based on the robot's residual resources. For robust and time-efficient task allocation with limited robot communication range in a dynamic network, a multihop-based auction algorithm is proposed. This paper also introduces a solar panel cleaning mission as a new application for multirobot systems and the proposed algorithm is implemented in the simulation of the mission. The simulation results demonstrate that the proposed algorithm is capable of completing the panel cleaning mission faster than other auction-based task allocation algorithms and has lower overall resource consumption.

26 citations