Skip to main content

Showing 1–7 of 7 results for author: Bhattasali, T

.
  1. arXiv:2112.02634  [pdf

    cs.CR

    SCMCI: Secured Click and Mortar Commercial Interaction

    Authors: Mausumi Das Nath, Tapalina Bhattasali

    Abstract: The wide spread of click-and-mortar model offers an opportunity to consider a universal commercial interaction method. However, issues like privacy protection resist the widespread acceptance. Traditional SET and SSL protocols are designed using Public Key Infrastructure (PKI) where extensive computations are carried out. Our aim is here to design a protocol to secure any type of commercial intera… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  2. arXiv:1406.4941  [pdf

    cs.NI cs.CR

    Study of Security Issues in Pervasive Environment of Next Generation Internet of Things

    Authors: Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki

    Abstract: Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current secu… ▽ More

    Submitted 19 June, 2014; originally announced June 2014.

    Comments: 12 pages, CISIM 2013

  3. arXiv:1209.6262  [pdf

    cs.NI

    SEGNET: Secure Geo-Sensor Network Model

    Authors: Tapalina Bhattasali

    Abstract: Wireless Geo-Sensor Networks (GEONET) are suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor nodes from going into low-power slee… ▽ More

    Submitted 27 September, 2012; originally announced September 2012.

  4. arXiv:1203.1777  [pdf

    cs.NI

    AMC Model for Denial of Sleep Attack Detection

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is… ▽ More

    Submitted 8 March, 2012; originally announced March 2012.

    Comments: 4 pages,Journal Paper

    Journal ref: Journal of Recent Research Trends (JRRT), February 2012 edition, ISSN: 2250-3951[Online], 2250-3943[Print]

  5. arXiv:1203.0240  [pdf

    cs.NI

    A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is the sleep deprivation attack, wh… ▽ More

    Submitted 1 March, 2012; originally announced March 2012.

    Comments: 10 pages,5 figures,proceedings of CNSA 2011 conference held in Chennai

    Journal ref: Advances in Network Security and Applications: Conference Proceedings of Fourth International Conference on Network Security and Applications (CNSA 2011), Chennai, July 15-17, 2011, pp. 268-280, ISBN: 978-3-642-22539-0

  6. Sleep Deprivation Attack Detection in Wireless Sensor Network

    Authors: Tapalina Bhattasali, Rituparna Chaki, Sugata Sanyal

    Abstract: Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most danger… ▽ More

    Submitted 1 March, 2012; originally announced March 2012.

    Comments: 7 pages,4 figures, IJCA Journal February 2012

    Journal ref: International Journal of Computer Applications 40(15):19-25, February 2012. Published by Foundation of Computer Science, New York, USA

  7. Lightweight Hierarchical Model for HWSNET

    Authors: Tapalina Bhattasali, Rituparna Chaki

    Abstract: Heterogeneous wireless sensor networks (HWSNET) are more suitable for real life applications as compared to the homogeneous counterpart. Security of HWSNET becomes a very important issue with the rapid development of HWSNET. Intrusion detection system is one of the major and efficient defensive methods against attacks in HWSNET. Because of different constraints of sensor networks, security solutio… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: 14 pages, 7 figures, AIRCC Journal