Skip to main content

Showing 51–100 of 120 results for author: Sen, J

.
  1. Computer and Network Security

    Authors: Jaydip Sen, Sidra Mehtab, Michael Ekonde Sone, Veeramreddy Jyothsna, Koneti Munivara Prasad, Rajeev Singh, Teek Parval Sharma, Anton Noskov, Ignacio Velasquez, Angelica Caro, Alfonco Rodriguez, Tamer S. A. Fatayer, Altaf O. Mulani, Pradeep B. Mane, Roshan Chitrakar, Roshan Bhusal, Prajwol Maharjan

    Abstract: In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightwei… ▽ More

    Submitted 31 July, 2020; originally announced July 2020.

    Comments: 175 pages, 87 figures and 44 Tables

  2. arXiv:2004.11697  [pdf

    q-fin.ST cs.LG stat.ML

    A Time Series Analysis-Based Stock Price Prediction Using Machine Learning and Deep Learning Models

    Authors: Sidra Mehtab, Jaydip Sen

    Abstract: Prediction of future movement of stock prices has always been a challenging task for the researchers. While the advocates of the efficient market hypothesis (EMH) believe that it is impossible to design any predictive framework that can accurately predict the movement of stock prices, there are seminal work in the literature that have clearly demonstrated that the seemingly random movement pattern… ▽ More

    Submitted 31 May, 2021; v1 submitted 17 April, 2020; originally announced April 2020.

    Comments: This is the preprint of our paper accepted for publication in the Inderscience Journal International Journal of Business Forecasting and Marketing Intelligence. The paper consists of 53 pages, 26 Tables, and 46 Figures

    Journal ref: International Journal of Business Forecasting and Marketing Intelligence (IJBFMI), Vol 6, No 4, pp. 272 - 335, 2020. Inderscience Publishers

  3. arXiv:2003.01524  [pdf, ps, other

    math.LO

    Filter theory of IL-algebras

    Authors: Safiqul Islam, Arundhati Sanyal, Jayanta Sen

    Abstract: In this paper, we introduce the concept of filter on IL-algebra. It is proved that this concept generalizes the notion of filter on Residuated Lattices. Prime filters on IL-algebra are defined and few interesting properties are obtained. It has been shown that quotient algebra corresponding to IL-algebra is formed with the help of filters also an IL-algebra.

    Submitted 14 February, 2020; originally announced March 2020.

    Comments: arXiv admin note: text overlap with arXiv:2002.12453

  4. arXiv:2001.09769  [pdf

    q-fin.ST cs.LG q-fin.CP

    Stock Price Prediction Using Convolutional Neural Networks on a Multivariate Timeseries

    Authors: Sidra Mehtab, Jaydip Sen

    Abstract: Prediction of future movement of stock prices has been a subject matter of many research work. In this work, we propose a hybrid approach for stock price prediction using machine learning and deep learning-based methods. We select the NIFTY 50 index values of the National Stock Exchange of India, over a period of four years, from January 2015 till December 2019. Based on the NIFTY data during the… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: The paper will be published in the Proceedings of the "National Conference on Machine Learning and Artificial Intelligence" which will be organized in New Delhi, India, during February 1 - 3, 2020. It contains 7 pages, 3 figures, and 19 tables. arXiv admin note: substantial text overlap with arXiv:1912.07700

  5. A Robust Predictive Model for Stock Price Prediction Using Deep Learning and Natural Language Processing

    Authors: Sidra Mehtab, Jaydip Sen

    Abstract: Prediction of future movement of stock prices has been a subject matter of many research work. There is a gamut of literature of technical analysis of stock prices where the objective is to identify patterns in stock price movements and derive profit from it. Improving the prediction accuracy remains the single most challenge in this area of research. We propose a hybrid approach for stock price m… ▽ More

    Submitted 9 December, 2019; originally announced December 2019.

    Comments: 6 pages, 18 Tables

    Report number: Proceedings of the 7th International Conference on Business Analytics and Intelligence (BAICONF, 2019), Indian Institute of Management, Bangalore, INDIA, December 5 -- 7, 2019

  6. arXiv:1903.06858  [pdf, ps, other

    math.FA

    Orthogonality and Numerical radius inequalities of operator matrices

    Authors: Arpita Mal, Kallol Paul, Jeet Sen

    Abstract: We completely characterize Birkhoff-James orthogonality with respect to numerical radius norm in the space of bounded linear operators on a complex Hilbert space. As applications of the results obtained, we estimate lower bounds of numerical radius for $n\times n$ operator matrices, which improve on and generalize existing lower bounds. We also obtain a better lower bound of numerical radius for a… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    MSC Class: Primary 47A12; 15A60; Secondary 47L05

  7. Internet of Things: Technology, Applications and Standardardization

    Authors: Jaydip Sen, Moonkun Lee, Sunghyeon Lee, Yeongbok Choe, Menachem Domb, Arpan Pal, Hemant Kumar Rath, Samar Shailendra, Abhijan Bhattacharyya, Albena Mihovska, Mahasweta Sarkar, Hyun Jung Lee, Myungho Kim, Alexandru Averian

    Abstract: The term "Internet of Things" (IoT) refers to an ecosystem of interconnected physical objects and devices that are accessible through the Internet and can communicate with each other. The main strength of the IoT vision is the high impact it has created and will continue to do so on several aspects of the everyday life and behavior of its potential users. This book presents some of the state-of-th… ▽ More

    Submitted 25 August, 2018; originally announced August 2018.

    Comments: The book contains 137 pages. It is published by IntechOpen, London, United Kingdom in August 2018.Print ISBN 978-1-78923-548-7, Online ISBN 978-1-78923-549-4

  8. arXiv:1710.06333  [pdf, ps, other

    math.DG

    Curvature properties of Vaidya metric

    Authors: Absos Ali Shaikh, Haradhan Kundu, Jayshree Sen

    Abstract: As a generalization of the Schwarzschild solution, Vaidya presented a radiating metric to develop a model of the exterior of a star including its radiation field, called Vaidya metric. The present paper deals with the investigation on the curvature properties of Vaidya metric. It is shown that Vaidya metric can be considered as a model of different pseudosymmetric type curvature conditions, namely… ▽ More

    Submitted 7 May, 2019; v1 submitted 17 October, 2017; originally announced October 2017.

    Comments: It contains 14 pages

    MSC Class: 53B20; 53B25; 53B30; 53B50; 53C15; 53C25; 53C35; 83C15

    Journal ref: Indian Journal of Mathematics, Vol. 61, No. 1, 2019, 41-59

  9. Advances in Security in Computing and Communications

    Authors: Jaydip Sen, Javier Franco-Contreras, Gouenou Coatrieux, Nilay K Sangani, Haroot Zarger, Faouzi Jaidi, Bob Duncan, Alfred Bratterud, Andreas Happe, Chin-Feng Lin, Che-Wei Liu, Walid Elgeanidi, Muftah Fraifer, Thomas Newe, Eoin OConnell, Avijit Mathur, Ruolin Zhang, Eric Filiol

    Abstract: In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protect-ing privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation.… ▽ More

    Submitted 29 July, 2017; originally announced July 2017.

    Comments: 190 pages, 8 Chapters. Published by Intech Open Publishers, Croatia, July 2017

  10. Cloud Computing - Architecture and Applications

    Authors: Jaydip Sen, Shanrong Zhao, Xiaoying Wang, Guo**g Zhang, Mengqin Yang, Jian Wang, Yun Long, Sergey Andreev, Roman Florea, Aleksandr Ometov, Adam Surak, Yevgeni Koucheryavy, Muhammad Ahmad Ashraf, Waleed Tariq Sethi, Abdullah Alfakhri, Saleh Alshebeili, Amr Alasaad

    Abstract: In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Cloud computing provides a cheap source of such computing framework for large volume of data for real-t… ▽ More

    Submitted 29 July, 2017; originally announced July 2017.

    Comments: Edited Volume published by Intech Publishers, Croatia, June 2017. 138 pages. ISBN 978-953-51-3244-8, Print ISBN 978-953-51-3243-1. Link: https://www.intechopen.com/books/cloud-computing-architecture-and-applications

  11. Decomposition of Time Series Data to Check Consistency between Fund Style and Actual Fund Composition of Mutual Funds

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: We propose a novel approach for analysis of the composition of an equity mutual fund based on the time series decomposition of the price movements of the individual stocks of the fund. The proposed scheme can be applied to check whether the style proclaimed for a mutual fund actually matches with the fund composition. We have applied our proposed framework on eight well known mutual funds of varyi… ▽ More

    Submitted 14 May, 2017; originally announced June 2017.

    Comments: 15 pages, 2 figures, 9 tables. The paper was published in the Proceedings of 4th International Conference on Business Analytics and Intelligence (ICBAI 2016), December 19 - 21, 2016, Indian Institute of Science (IISc), Bangalore, INDIA

  12. An Investigation of the Structural Characteristics of the Indian IT Sector and the Capital Goods Sector: An Application of the R Programming in Time Series Decomposition and Forecasting

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: Time series analysis and forecasting of stock market prices has been a very active area of research over the last two decades. Availability of extremely fast and parallel architecture of computing and sophisticated algorithms has made it possible to extract, store, process and analyze high volume stock market time series data very efficiently. In this paper, we have used time series data of the tw… ▽ More

    Submitted 14 May, 2017; originally announced June 2017.

    Comments: 64 pages, 34 figures, 33 tables

    Journal ref: Journal of Insurance and Financial Management, Vol 1, Issue 4 (2016), pp. 68 - 132

  13. A Proposed Architecture for Big Data Driven Supply Chain Analytics

    Authors: Sanjib Biswas, Jaydip Sen

    Abstract: Advancement in information and communication technology (ICT) has given rise to explosion of data in every field of operations. Working with the enormous volume of data (or Big Data, as it is popularly known as) for extraction of useful information to support decision making is one of the sources of competitive advantage for organizations today. Enterprises are leveraging the power of analytics in… ▽ More

    Submitted 14 May, 2017; originally announced May 2017.

    Comments: 24 pages, 4 figures, 3 tables

    Journal ref: ICFAI University Press (IUP) Journal of Supply Chain Management, Vol XIII, No 3 (2016), pp. 7 - 34

  14. arXiv:1705.01144  [pdf

    q-fin.ST

    A Time Series Analysis-Based Forecasting Framework for the Indian Healthcare Sector

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: Designing efficient and robust algorithms for accurate prediction of stock market prices is one of the most exciting challenges in the field of time series analysis and forecasting. With the exponential rate of development and evolution of sophisticated algorithms and with the availability of fast computing platforms, it has now become possible to effectively and efficiently extract, store, proces… ▽ More

    Submitted 25 April, 2017; originally announced May 2017.

    Comments: 23 pages, 10 figures, 8 tables. The paper is accepted for publication in "Journal of Insurance and Financial Management" Vol 3, No 1, 2017

    Journal ref: Journal of Insurance and Financial Management, Vol 3, No 1, pp. 1- 29, 2017

  15. arXiv:1605.03930  [pdf

    cs.OH

    An Alternative Framework for Time Series Decomposition and Forecasting and its Relevance for Portfolio Choice: A Comparative Study of the Indian Consumer Durable and Small Cap Sectors

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: One of the challenging research problems in the domain of time series analysis and forecasting is making efficient and robust prediction of stock market prices. With rapid development and evolution of sophisticated algorithms and with the availability of extremely fast computing platforms, it has now become possible to effectively extract, store, process and analyze high volume stock market time s… ▽ More

    Submitted 11 May, 2016; originally announced May 2016.

    Comments: 30 pages, 6 figures, 16 tables. The paper is accepted for publication in the "Journal of Economics" Vol 3, No 2, June 2016. arXiv admin note: text overlap with arXiv:1604.04044

    Journal ref: Journal of Economics Library, Vol 3, No 2, June 2016

  16. arXiv:1604.04044  [pdf

    cs.OH

    A Framework for Predictive Analysis of Stock Market Indices : A Study of the Indian Auto Sector

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: Analysis and prediction of stock market time series data has attracted considerable interest from the research community over the last decade. Rapid development and evolution of sophisticated algorithms for statistical analysis of time series data, and availability of high-performance hardware has made it possible to process and analyze high volume stock market time series data effectively, in rea… ▽ More

    Submitted 14 April, 2016; originally announced April 2016.

    Comments: 19 Pages, 2 Figures, 8 Tables. in Calcutta Business School (CBS) Journal of Management Practices, Volume 2, Number 2, December 2015 Edition, pp 1 -19. ISBN: 2349-5073

  17. Decomposition of Time Series Data of Stock Markets and its Implications for Prediction: An Application for the Indian Auto Sector

    Authors: Jaydip Sen, Tamal Datta Chaudhuri

    Abstract: With the rapid development and evolution of sophisticated algorithms for statistical analysis of time series data, the research community has started spending considerable effort in technical analysis of such data. Forecasting is also an area which has witnessed a paradigm shift in its approach. In this work, we have used the time series of the index values of the Auto sector in India during Janua… ▽ More

    Submitted 11 January, 2016; originally announced January 2016.

    Comments: 14 pages, 2 figures, 4 tables. The paper is published in the Proceedings of the 2nd National Conference on Advances in Business Research and Management Practices (ABRMP'2016), January 8-9, 2016, Kolkata, INDIA

  18. arXiv:1308.0682  [pdf

    cs.CR cs.NI

    A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: Wireless sensor networks have emerged as an important and new area in wireless and mobile computing research because of their numerous potential applications that range from indoor deployment scenarios in home and office to outdoor deployment in adversary's territory in tactical battleground. Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sens… ▽ More

    Submitted 3 August, 2013; originally announced August 2013.

    Comments: 31 pages, 4 figures, 2 tables. The paper is accepted for publication in Journal of Information and Network Security, Vol 1, Issue 1, August 2013. This paper is an extended version of author's already existing paper in arXiv archive with identifier arXiv:1302.2253. There are some text overlap with this current paper with the previous version arXiv:1302.2253

  19. Homomorphic Encryption: Theory & Applications

    Authors: Jaydip Sen

    Abstract: The goal of this chapter is to present a survey of homomorphic encryption techniques and their applications. After a detailed discussion on the introduction and motivation of the chapter, we present some basic concepts of cryptography. The fundamental theories of homomorphic encryption are then discussed with suitable examples. The chapter then provides a survey of some of the classical homomorphi… ▽ More

    Submitted 25 May, 2013; originally announced May 2013.

    Comments: Book Chapter accepted for publication in the book entitled: Theory and Practice of Cryptography and Network Security Protocols and Technologies, ISBN: 980-953-307-848-4, Sen, J. (Ed.), to be published by INTECH Publishers, Croatia. Expected month of publication: June 2013. This book chapter is a state of the art survey on homomorphic encryption mechanisms

  20. Security and Privacy Issues in Cloud Computing

    Authors: Jaydip Sen

    Abstract: Cloud computing transforms the way information technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing mode… ▽ More

    Submitted 19 March, 2013; originally announced March 2013.

    Comments: 42 pages, 2 Figures, and 5 Tables. The book chapter is accepted for publication and is expected to be published in the second half of 2013

    Journal ref: Book Chapter in the book: Architectures and Protocols for Secure Information Technology Infrastructures, Editors: Antonio Ruiz Martínez, Fernando Pereñíguez García, Rafael Marin-López, IGI Global, 2014

  21. Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks

    Authors: Jaydip Sen

    Abstract: A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and… ▽ More

    Submitted 20 February, 2013; originally announced February 2013.

    Comments: 8 pages, 14 figures, 2 tables. This journal paper is an extended version of the already published conference paper of the author which is having arXiv identifier: arXiv:1111.0387. arXiv admin note: the majority of this single-authored submission is identical to arXiv:1111.0387, co-authored with two others

    Journal ref: International Journal of Simulation,Systems,Science and Technology. Vol 12, No 4, August 2011

  22. Security and Privacy Challenges in Cognitive Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: Wireless sensor networks (WSNs) have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks are vulnerable to numerous security… ▽ More

    Submitted 9 February, 2013; originally announced February 2013.

    Comments: 36 pages, 4 figures, 2 tables. The book chapter is accepted for publication in 2013

    Journal ref: Book Chapter in Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Natarajan Meghanathan and Y. B. Reddy (Eds.), IGI-Global, USA, 2013

  23. Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Authors: Jaydip Sen

    Abstract: This book chapter identifies various security threats in wireless mesh network (WMN). Kee** in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities i… ▽ More

    Submitted 5 February, 2013; originally announced February 2013.

    Comments: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submission

    Journal ref: Book Chapter in Wireless Networks and Security- Issues, Challenges and Research Trends, Editors: Shafiullah Khan, Al-Sakib Khan Pathan. Springer, 2013, pp. 189-27, February 2013

  24. arXiv:1301.5065  [pdf

    cs.CR cs.NI

    Security in Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: Wireless sensor networks have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of these networks are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary's territory in a tactical battleground. However, due to distributed nature and their deployment in remote ar… ▽ More

    Submitted 21 January, 2013; originally announced January 2013.

    Comments: 51 pages. 5 Figures and 7 Tables. Book Chapter in the book "Wireless Sensor Networks: Current Status and Future Trends", A.S.K. Pathan et al. (eds.), CRC Press USA, November 2012; This book chapter is an extended version of author's earlier arXiv submission: arXiv:1011.1529 and also has substantial text overlap with arXiv:1101.2759

  25. arXiv:1209.1803  [pdf

    cs.CR cs.NI

    Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

    Authors: Jaydip Sen

    Abstract: Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers. As WMNs become an increasingly popular replacement technology for last-mile connectivity to the home networking, community and neighborhood ne… ▽ More

    Submitted 9 September, 2012; originally announced September 2012.

    Comments: 32 pages, 10 figures. The work is an extended version of the author's previous works submitted in CoRR: arXiv:1107.5538v1 and arXiv:1102.1226v1

    Journal ref: Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks - Book Chapter in Applied Cryptography and Network Security, Editor: Jaydip Sen, pp. 3 - 34, April 2012, published by INTECH, Croatia

  26. arXiv:1203.1175  [pdf

    cs.CR cs.NI

    Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: This chapter discusses the need of security and privacy protection mechanisms in aggregation protocols used in wireless sensor networks (WSN). It presents a comprehensive state of the art discussion on the various privacy protection mechanisms used in WSNs and particularly focuses on the CPDA protocols proposed by He et al. (INFOCOM 2007). It identifies a security vulnerability in the CPDA protoco… ▽ More

    Submitted 6 March, 2012; originally announced March 2012.

    Comments: 32 pages, 7 figures, 3 tables

    Journal ref: Book Chapter in IntechOpen Published Book: Cryptography and Security in Computing, 2012

  27. Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: Data aggregation in intermediate nodes (called aggregator nodes) is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs). However, in-network processing poses a problem for the privacy of the sensor data since individual data of sensor nodes need to be known to the aggregator node before the aggregation process can be car… ▽ More

    Submitted 4 March, 2012; originally announced March 2012.

    Comments: 7 pages, 3 figures. In Proceedings of the 2nd National Conference on Computational Intelligence and Signal Processing (CISP 2012), March 2- 3, Guwahati, India.(IEEE Technically Sponsored)

  28. arXiv:1201.4536  [pdf

    cs.CR cs.NI

    A Multi-Path Certification Protocol for Mobile Ad Hoc Networks

    Authors: Jaydip Sen

    Abstract: A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and… ▽ More

    Submitted 22 January, 2012; originally announced January 2012.

    Comments: 4 pages, 6 figures, 4 pages. In Proceedings of the 4th International Conference on Computers & Devices for Communications (CODEC), December 14 -- 16, 2009, Kolkata, India

  29. arXiv:1201.4532   

    cs.CR cs.NI

    An Attack on Privacy Preserving Data Aggregation Protocol for Wireless Sensor Networks

    Authors: Jaydip Sen, Subhamoy Maitra

    Abstract: In-network data aggregation in Wireless Sensor Networks (WSNs) provides efficient bandwidth utilization and energy-efficient computing.Supporting efficient in-network data aggregation while preserving the privacy of the data of individual sensor nodes has emerged as an important requirement in numerous WSN applications. For privacy-preserving data aggregation in WSNs, He et al. (INFOCOM 2007) have… ▽ More

    Submitted 30 April, 2012; v1 submitted 22 January, 2012; originally announced January 2012.

    Comments: The paper is withdrawn

  30. arXiv:1111.0387  [pdf

    cs.CR cs.NI

    A Mechanism for Detection of Cooperative Black Hole Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, Sripad Koilakonda, Arijit Ukil

    Abstract: A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms,absence of centralized monitoring points, and l… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 6 pages, 10 figures, 2 tables. In Proceedings of the 2nd International Conference on Intelligent Systems, Modeling and Simulation (ISMS'11), pp. 338-343, Phnom Penh, Cambodia, January 25-27, 2011

  31. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, Harihara S. G., Harish Reddy, P. Balamuralidhar

    Abstract: Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. A gray hole is a node that selectively drops and forwards data packets after it advertises itself as having the short… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 5 pages, 5 figures, 3 tables. In Proceedings of the 6th International Conference on Information, Communications and Signal Processing (ICICS '07), Singapore, December 10-13, 2007, Paper ID: 0458, Track: Th2.5- Network Security. ISBN: 1-4244-0983-7

  32. arXiv:1111.0385  [pdf

    cs.CR cs.NI

    A Distributed Protocol for Detection of Packet Drop** Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy

    Abstract: In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Amon… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 7 pages, 9 figures, 1 table. In Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocols. ISBN: 1-4244-1094-0

  33. arXiv:1111.0382  [pdf

    cs.CR cs.NI

    A Distributed Intrusion Detection System Using Cooperating Agents

    Authors: Jaydip Sen

    Abstract: The current intrusion detection systems have a number of problems that limit their configurability, scalability and efficiency. There have been some propositions about distributed architectures based on multiple independent agents working collectively for intrusion detection. However, these distributed intrusion detection systems are not fully distributed as most of them centrally analyze data col… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 10 pages, 4 figures, 1 table. In Proceedings of the 3rd International Conference on Information Processing (ICIP'09), August 7 - 9, Bangalore, 2009, pp. 559 - 568

  34. arXiv:1111.0380   

    cs.CR cs.NI

    An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks

    Authors: Jaydip Sen, Sripad Krishna

    Abstract: Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Unfortunately, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Rando… ▽ More

    Submitted 19 June, 2012; v1 submitted 2 November, 2011; originally announced November 2011.

    Comments: withdrawn by author. arXiv admin note: v1 substantial text overlap with arXiv:1012.2516

  35. Secure and Privacy- Aware Searching in Peer-to-Peer Networks

    Authors: Jaydip Sen

    Abstract: The existing peer-to-peer networks have several problems such as fake content distribution, free riding, white-washing and poor search scalability, lack of a robust trust model and absence of user privacy protection mechanism. Although, several trust management and semantic community-based mechanisms for combating free riding and distribution of malicious contents have been proposed by some resear… ▽ More

    Submitted 2 October, 2011; originally announced October 2011.

    Comments: 17 pages, 11 figures. In the Pre-proceedings of the 6th International Workshop on Data Privacy Management (DPM) - colocated with 16th European Symposium on Research in Computer Security (ESORICS 2011), Paper ID: 10, September 15 - 16, 2011, Leuven, Belgium

  36. arXiv:1110.0147   

    cs.NI cs.MM

    Cross-Layer Protocols for Multimedia Communications over Wireless Networks

    Authors: Jaydip Sen

    Abstract: In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a… ▽ More

    Submitted 19 June, 2012; v1 submitted 1 October, 2011; originally announced October 2011.

    Comments: withdrawn by author. arXiv admin note: v1 substantial text overlap with arXiv:1012.2518

    Journal ref: Book Chapter in "Advanced Communication Protocol Technologies: Solutions, Methods and Applications", Editors: Katalin Tarnay, Guzstav Adamis and Tibor Dulai, pp. 318 - 354, IGI-Global Publishers, 2010

  37. arXiv:1110.0146   

    cs.CR cs.NI

    Reputation- and Trust-Based Systems for Wireless Self-organizing Networks

    Authors: Jaydip Sen

    Abstract: Traditional approach of providing network security has been to borrow tools and mechanisms from cryptography. However, the conventional view of security based on cryptography alone is not sufficient for the defending against unique and novel types of misbehavior exhibited by nodes in wireless self-organizing networks such as mobile ad hoc networks and wireless sensor networks. Reputation-based fra… ▽ More

    Submitted 19 June, 2012; v1 submitted 1 October, 2011; originally announced October 2011.

    Comments: withdrawn by author. arXiv admin note: v1 substantial text overlap with arXiv:1012.2529

    Journal ref: Book Chapter No 5, pp. 91- 122, in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, Editor: Al-Shakib Khan Pathan, Aurbach Publications, CRC Press, Taylor & Francis Group, USA, 2010

  38. arXiv:1107.5538  [pdf

    cs.CR cs.NI

    An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks

    Authors: Jaydip Sen

    Abstract: Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselve… ▽ More

    Submitted 27 July, 2011; originally announced July 2011.

    Comments: 13 pages, 6 figures. First International Conference on Advances in Computing and Communication (ACC 2011), Kochi, India, July 22 - 24, 2011

  39. arXiv:1107.1038  [pdf

    cs.NI

    Dynamic OFDMA Resource Allocation for QoS Guarantee and System Optimization of Best Effort and Non Real-time Traffic

    Authors: Arijit Ukil, Jaydip Sen, Debasish Bera

    Abstract: To achieve the requirement of high data rate, low latency, user fairness for next generation wireless networks, proper designing of cross-layer optimized dynamic resource allocation algorithm is prerequisite. In this paper, we propose a dynamic resource allocation scheme in Orthogonal Frequency Division Multiple Access (OFDMA) systems to optimize the non real-time (NRT) traffic, which requires all… ▽ More

    Submitted 6 July, 2011; originally announced July 2011.

    Comments: 5 pages, 4 figures; National Conference on Communications, 2009

  40. arXiv:1106.0969  [pdf

    cs.NI cs.IT

    Long-Term Proportional Fair QoS Profile Follower Sub-carrier Allocation Algorithm in Dynamic OFDMA Systems

    Authors: Arijit Ukil, Jaydip Sen, Debasish Bera

    Abstract: In this paper, Long-Term Proportional Fair (LTPF) resource allocation algorithm in dynamic OFDMA system is presented, which provides long-term QoS guarantee (mainly throughput requirement satisfaction) to individual user and follows every user's QoS profile at long-term by incremental optimization of proportional fairness and overall system rate maximization. The LTPF algorithm dynamically allocat… ▽ More

    Submitted 6 June, 2011; originally announced June 2011.

    Comments: 5 pages, 5 figures

  41. arXiv:1105.1693  [pdf, ps, other

    cs.CY cs.NI

    Internet of Things: Applications and Challenges in Technology and Standardization

    Authors: Debasis Bandyopadhyay, Jaydip Sen

    Abstract: The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it leading to innovative services and… ▽ More

    Submitted 9 May, 2011; originally announced May 2011.

    Comments: 24 pages, 3 figures; Special Issue: Distributed and Secure Cloud Clustering (DISC)

    Journal ref: Springer International Journal of Wireless Personal Communications, Vol. 58, No. 1, pp. 49 -- 69, May 2011

  42. arXiv:1105.1572   

    cs.CR cs.NI

    Some Aspects of Quantum Cryptography and Network Security

    Authors: Jaydip Sen, Piyali Roy Chowdhury, Indranil Sengupta

    Abstract: Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic prot… ▽ More

    Submitted 1 June, 2011; v1 submitted 8 May, 2011; originally announced May 2011.

    Comments: This was withdrawn because the key distribution figures Figure 1 and 3 in the paper are technically incorrect

    Journal ref: International Journal HIT Transaction on ECCN (Electronics, Communication, Computers and Networking), pp. 27-36. Volume 1, No: 1, January 2006

  43. arXiv:1105.1541   

    cs.CR cs.NI

    An Analysis of Routing Disruption Attack on Dynamic Source Routing Protocol

    Authors: Jaydip Sen

    Abstract: Dynamic Source Routing (DSR) is a well known source routing protocol for ad hoc networks. The algorithm depends on the cooperative participation of the nodes that enables route discovery from a source node to a destination node. However, if a group of nodes do not cooperate, the performance of the DSR protocol may be severely degraded. This paper presents a probabilistic attack model on the DSR pr… ▽ More

    Submitted 9 June, 2011; v1 submitted 8 May, 2011; originally announced May 2011.

    Comments: This paper is withdrawn since the results of simulations presented are found to erroneous under certain network topologies. We have corrected the mathematical model and have submitted the corrected version to a journal.)

  44. arXiv:1104.0991   

    cs.CR cs.NI

    An Efficient Algorithm for Detection of Selfish Packet Drop** Nodes in Wireless Mesh Networks

    Authors: Jaydip Sen

    Abstract: In a wireless mesh network (WMN), high speed routers equipped with advanced antennas, communicate with each other in a multi-hop fashion over wireless channels and form a broadband backhaul. WMNs provide reliable connectivity and fault-tolerance, as each node is connected to several other nodes. If a node fails due to hardware problems, its neighbors can find another route. Extra capacity can be a… ▽ More

    Submitted 16 June, 2012; v1 submitted 5 April, 2011; originally announced April 2011.

    Comments: This paper is withdrawn since the results presented in Figure 7 are not found to be holding good under certain network conditions. We have made a mathematical analysis of the false alarm rate and are trying to cross-correlate the simulation results with the mathematical model

    Journal ref: International Journal of Computer Information Systems and Industrial Management Applications, Vol 3 (2011), pp. 363 - 370

  45. A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers

    Authors: Jaydip Sen

    Abstract: Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current inadequate sate of any viable defense mechanism, have made them one of the top threats to the Internet community today. Since the increasing popularity of… ▽ More

    Submitted 17 March, 2011; originally announced March 2011.

    Comments: 18 pages, 3 figures, 5 tables

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, pp. 162 - 179, March 2011

  46. arXiv:1102.1226  [pdf

    cs.CR cs.NI

    Secure Routing in Wireless Mesh Networks

    Authors: Jaydip Sen

    Abstract: Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be… ▽ More

    Submitted 6 February, 2011; originally announced February 2011.

    Comments: 44 pages, 17 figures, 5 tables

    Journal ref: Book Chapter: Jaydip Sen (2011). Secure Routing in Wireless Mesh Networks, Wireless Mesh Networks, Nobuo Funabiki (Ed.), InTech. Available from: http://www.intechopen.com/articles/show/title/secure-routing-in-wireless-mesh-networks

  47. arXiv:1101.3076  [pdf

    cs.CR cs.NI

    A Robust and Secure Aggregation Protocol for Wireless Sensor Networks

    Authors: Jaydip Sen

    Abstract: The purpose of a wireless sensor network (WSN) is to provide the users with access to the information of interest from data gathered by spatially distributed sensors. Generally the users require only certain aggregate functions of this distributed data. Computation of this aggregate data under the end-to-end information flow paradigm by communicating all the relevant data to a central collector no… ▽ More

    Submitted 16 January, 2011; originally announced January 2011.

    Comments: 6 pages, 3 figures, 1 table. In Proceedings of the 6th International Symposium on Electronic Design, Test and Applications (DELTA 2011), Queenstown, New Zealand, 17 - 19 January 2011

  48. arXiv:1101.2759  [pdf

    cs.NI

    Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses

    Authors: Jaydip Sen

    Abstract: Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adver… ▽ More

    Submitted 14 January, 2011; originally announced January 2011.

    Comments: 32 pages, 5 figures, 4 tables 4. arXiv admin note: substantial text overlap with arXiv:1011.1529

    Journal ref: Book Chapter in Sustainable Wireless Sensor Networks, Yen Kheng Tan (Ed.), ISBN: 978-953-307-297-5, INTECH Publishers, Croatia, December 2010. Chapter 12, pp. 279 - 309

  49. arXiv:1101.2753  [pdf, ps, other

    cs.CR

    An Efficient and User Privacy-Preserving Routing Protocol for Wireless Mesh Networks

    Authors: Jaydip Sen

    Abstract: Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless broadband networks showing rapid progress and inspiring numerous compelling applications. A WMN comprises of a set of mesh routers (MRs) and mesh clients (MCs), where MRs are connected to the Internet backbone through the Internet gateways (IGWs). The MCs are wireless devices and communicate among themselve… ▽ More

    Submitted 14 January, 2011; originally announced January 2011.

    Comments: 14 pages, 10 figures, i table

    Journal ref: International Journal of Scalable Computing: Practice and Experience. Vol. 11, No. 4, pp. 345-358, 2011

  50. A Novel Mechanism for Detection of Distributed Denial of Service Attacks

    Authors: Jaydip Sen

    Abstract: The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the resources of the network and denying services to legitimate users. This paper has presented a mechanism for protecting a web-server against a distributed denial o… ▽ More

    Submitted 13 January, 2011; originally announced January 2011.

    Comments: 11 pages, 5 tables. In Proceedings of the First International Conference on Computer Science and Information Technology (CCSIT 2011). Springer CCIS Series Vol 133, Advanced Computing, Part 3, pp. 247-257, Bangalore, 2011, India