publications: - title: "A distributed intrusion detection system for wireless ad hoc networks" author: - name: "Jaydip Sen" link: "http://" - name: "Arijit Ukil" link: "http://" - name: "Debasish Bera" link: "https://researchr.org/alias/debasish-bera" - name: "Arpan Pal" link: "http://in.linkedin.com/in/arpanpal" year: "2008" doi: "http://dx.doi.org/10.1109/ICON.2008.4772624" abstract: "In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion detection algorithms designed for these networks are insecure, inefficient, and have high rates of false positives. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and intrusion detection for developing an intrusion detection protocol for ad hoc networks. The redundancy of routing information in ad-hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network partitioning and Byzantine failure of nodes. The proposed mechanism is fully cooperative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the protocol." links: doi: "http://dx.doi.org/10.1109/ICON.2008.4772624" tags: - "redundancy" - "protocol" - "source-to-source" - "security" - "routing" - "partitioning" - "mobile" - "systematic-approach" - "open-source" researchr: "https://researchr.org/publication/SenUBP08" cites: 0 citedby: 0 pages: "1-6" booktitle: "Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India" publisher: "IEEE" kind: "inproceedings" key: "SenUBP08" - title: "A Scheme of Certificate Authority for Ad Hoc Networks" author: - name: "Jaydip Sen" link: "http://" - name: "M. Girish Chandra" link: "https://researchr.org/alias/m.-girish-chandra" - name: "P. Balamuralidhar" link: "https://researchr.org/alias/p.-balamuralidhar" - name: "Harihara S. G." link: "https://researchr.org/alias/harihara-s.-g." - name: "Harish Reddy" link: "https://researchr.org/alias/harish-reddy" year: "2007" doi: "http://doi.ieeecomputersociety.org/10.1109/DEXA.2007.22" abstract: "The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need for adequate security mechanism is increasingly becoming important. Key management is an essential cryptographic primitive upon which other security protocols are built. However, most of the existing key management schemes are not feasible in ad hoc networks because public key infrastructures with a centralized certification authority are hard to deploy there. In this paper, we propose and evaluate a security mechanism based on distributed certification authority based on threshold cryptography that is suited to wireless ad hoc networks. A collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified by some simulation studies. The results show the effectiveness of the scheme." links: doi: "http://doi.ieeecomputersociety.org/10.1109/DEXA.2007.22" tags: - "rule-based" - "deployment" - "protocol" - "certification" - "security" researchr: "https://researchr.org/publication/SenCBGR07" cites: 0 citedby: 0 pages: "615-619" booktitle: "18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany" publisher: "IEEE Computer Society" isbn: "0-7695-2932-1" kind: "inproceedings" key: "SenCBGR07" - title: "An Efficient Certificate Authority for Ad Hoc Networks" author: - name: "Jaydip Sen" link: "http://" - name: "Harihara Subramanyam" link: "https://researchr.org/alias/harihara-subramanyam" year: "2007" doi: "http://dx.doi.org/10.1007/978-3-540-77115-9_10" abstract: "The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need for adequate security mechanism is increasingly becoming important. Key management is an essential cryptographic primitive upon which other security protocols are built. However, most of the existing key management schemes are not feasible in ad hoc networks because public key infrastructures with a centralized certification authority are hard to deploy there. In this paper, we propose and evaluate a mechanism of distributed certification authority based on threshold cryptography that is suited for wireless ad hoc networks. In the proposed scheme, a collection of nodes acts as the certificate authority and provides the certification service. The feasibility of the proposed scheme is verified by simulation. The results show the effectiveness of the scheme." links: doi: "http://dx.doi.org/10.1007/978-3-540-77115-9_10" tags: - "rule-based" - "deployment" - "protocol" - "certification" - "security" researchr: "https://researchr.org/publication/SenS07%3A0" cites: 0 citedby: 0 pages: "97-109" booktitle: "Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20, Proceedings" editor: - name: "Tomasz Janowski" link: "https://researchr.org/alias/tomasz-janowski" - name: "Hrushikesha Mohanty" link: "https://researchr.org/alias/hrushikesha-mohanty" volume: "4882" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-540-77112-8" kind: "inproceedings" key: "SenS07:0" - title: "Autonomous Agent Based Distributed Fault-Tolerant Intrusion Detection System" author: - name: "Jaydip Sen" link: "http://" - name: "Indranil Sengupta" link: "https://researchr.org/alias/indranil-sengupta" year: "2005" doi: "http://dx.doi.org/10.1007/11604655_16" abstract: "Because all vulnerabilities of a network cannot be realized, and penetration of the system cannot always be prevented, intrusion detection systems have become necessary to ensure the security of a network. The intrusion detection systems need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today’s network environments, the design of an intrusion detection system has become a very challenging task. A great deal of research has been conducted on intrusion detection in a distributed environment to circumvent the problems of centralized approaches. However, distributed intrusion detection systems suffer from a number of drawbacks e.g., high rates of false positives, low efficiency etc. In this paper, we propose the architecture of a fully distributed intrusion detection system that uses a set of autonomous but cooperating agents. The system has also the capability of isolating compromised nodes from intrusion detection activity thereby ensuring fault-tolerance in computation." links: doi: "http://dx.doi.org/10.1007/11604655_16" tags: - "rule-based" - "design complexity" - "architecture" - "design research" - "security" - "Meta-Environment" - "design" - "systematic-approach" researchr: "https://researchr.org/publication/SenS05%3A0" cites: 0 citedby: 0 pages: "125-131" booktitle: "Distributed Computing and Internet Technology, Second International Conference, ICDCIT 2005, Bhubaneswar, India, December 22-24, 2005, Proceedings" editor: - name: "Goutam Chakraborty" link: "https://researchr.org/alias/goutam-chakraborty" volume: "3816" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "3-540-30999-3" kind: "inproceedings" key: "SenS05:0" - title: "A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network" author: - name: "Jaydip Sen" link: "http://" year: "2010" abstract: "Wireless mesh networks (WMNs) are evolving as a key technology for next-generation wireless networks showing rapid progress and numerous applications. These networks have the potential to provide robust and high-throughput data delivery to wireless users. In a WMN, high speed routers equipped with advanced antennas, communicate with each other in a multi-hop fashion over wireless channels and form a broadband backhaul. However, the throughput of a WMN may be severely degraded due to presence of some selfish routers that avoid forwarding packets for other nodes even as they send their own traffic through the network. This paper presents an algorithm for detection of selfish nodes in a WMN that uses statistical theory of inference for reliable clustering of the nodes based on local observations. Simulation results show that the algorithm has a high detection rate and a low false positive rate. " note: "10.1007/978-3-642-14478-3_53" links: "url": "http://dx.doi.org/10.1007/978-3-642-14478-3_53" tags: - "rule-based" - "data-flow" - "source-to-source" - "peer-to-peer" - "routing" - "open-source" researchr: "https://researchr.org/publication/springerlink%3A10.1007-978-3-642-14478-353" cites: 0 citedby: 0 booktitle: "Recent Trends in Network Security and Applications" volume: "89" series: "Communications in Computer and Information Science" publisher: "Springer Berlin Heidelberg" isbn: "978-3-642-14478-3" kind: "incollection" key: "springerlink:10.1007-978-3-642-14478-353" - title: "A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks" author: - name: "Jaydip Sen" link: "http://" - name: "Piyali Roy Chowdhury" link: "https://researchr.org/alias/piyali-roy-chowdhury" - name: "Indranil Sengupta" link: "https://researchr.org/alias/indranil-sengupta" year: "2007" doi: "http://doi.ieeecomputersociety.org/10.1109/ICCTA.2007.3" abstract: "Wireless ad hoc networks have generated much interest, both in research literature and the telecommunication industry. The attractiveness of these networks lies in the fact that unlike other wireless networks, ad hoc networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on centralized or specialized entities such as base stations. As these networks find more application, the need for adequate security mechanism is increasingly becoming important. Trust establishment and management are essential for any security framework of these networks. In this paper, we present a trust establishment scheme for ad hoc networks based on distributed trust model. A trust initiator is introduced only in the system-bootstrapping phase to initiate the protocol. A fully self-organized trust establishment approach is then adopted to handle the dynamic topology of the network and the membership changes of the nodes, while ensuring trust establishment among the nodes with shorter trust chains and very high probability. The simulation results show that our scheme is highly robust and scalable in the dynamic environment of ad hoc networks." links: doi: "http://doi.ieeecomputersociety.org/10.1109/ICCTA.2007.3" tags: - "rule-based" - "application framework" - "meta-model" - "protocol" - "security" - "Meta-Environment" - "mobile" - "systematic-approach" researchr: "https://researchr.org/publication/SenCS07" cites: 0 citedby: 0 pages: "51-58" booktitle: "2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 5-7 March 2007, Kolkata, India" publisher: "IEEE Computer Society" isbn: "978-0-7695-2770-3" kind: "inproceedings" key: "SenCS07" - title: "An Efficient and Reliable Routing Protocol for Wireless Mesh Networks" author: - name: "Jaydip Sen" link: "http://" year: "2010" month: "March" doi: "http://dx.doi.org/10.1007/978-3-642-12179-1" abstract: "Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks showing rapid progress and inspiring numerous applications. The persistence driving force in the development of WMNs comes from their envisioned advantages including extended coverage, robustness, self-configuration, easy maintenance, and low cost. However, to support real-time applications with stringent quality of support (QoS), WMNs must be equipped with a robust, reliable and extremely efficient routing protocol so that packets can be routed through them with minimum delay. In this paper, we focus on the critical factors in designing a routing protocol for WMNs, and propose an efficient and reliable routing protocol. The protocol is based on a reliable estimation of available bandwidth in a wireless path and end-to-end delay measurements. Simulations carried out on the protocol demonstrate that it is more efficient than some of the current routing protocols. Keywords: Wireless mesh networks - quality of service - routing - end-to-end delay - bandwidth estimation - selfish nodes " links: doi: "http://dx.doi.org/10.1007/978-3-642-12179-1" tags: - "rule-based" - "protocol" - "maintenance" - "routing" - "coverage" researchr: "https://researchr.org/publication/DBLP%3Aconf-iccsa-Sen10" cites: 0 citedby: 0 booktitle: "ICCSA (3)" volume: "6018" series: "Lecture Notes in Computer Science, Springer" address: "Fukuoka, Japan" publisher: "Springer, Lecture Notes in Computer Science, Volume 6018, " kind: "inproceedings" key: "DBLP:conf-iccsa-Sen10" - title: "A Mechanism for Detection and Prevention of Distributed Denial of Service Attacks" author: - name: "Jaydip Sen" link: "http://" - name: "Piyali Roy Chowdhury" link: "https://researchr.org/alias/piyali-roy-chowdhury" - name: "Indranil Sengupta" link: "https://researchr.org/alias/indranil-sengupta" year: "2006" doi: "http://dx.doi.org/10.1007/11947950_16" abstract: "With several critical services being provided over the Internet it has become imperative to monitor the network traffic to prevent malicious attackers from depleting the resources of the network. In this paper, we propose a mechanism to protect a web-server against a Distributed Denial of Service (DDoS) attack. Incoming traffic to the server is continuously monitored to immediately detect any abnormal rise in the inbound traffic. This detection activates a traffic-filtering rule that pushes down the network traffic to an acceptable level by discarding packets according to measured relative traffic levels of each of the active sources. The proposed mechanism does not affect legitimate users and is thus more effective and robust. We have presented simulation results to demonstrate the effectiveness of the proposed mechanism. Keywords: DDoS, Buffer overflow, Security, Traffic level measurement." links: doi: "http://dx.doi.org/10.1007/11947950_16" tags: - "rule-based" - "web service" - "source-to-source" - "rules" - "security" - "web services" - "open-source" researchr: "https://researchr.org/publication/SenCS06" cites: 0 citedby: 0 pages: "139-144" booktitle: "Distributed Computing and Networking, 8th International Conference, ICDCN 2006, Guwahati, India, December 27-30, 2006" editor: - name: "Soma Chaudhuri" link: "https://researchr.org/alias/soma-chaudhuri" - name: "Samir R. Das" link: "https://researchr.org/alias/samir-r.-das" - name: "Himadri S. Paul" link: "https://researchr.org/alias/himadri-s.-paul" - name: "Srikanta Tirthapura" link: "https://researchr.org/alias/srikanta-tirthapura" volume: "4308" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "3-540-68139-6" kind: "inproceedings" key: "SenCS06" - title: "A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks" author: - name: "Jaydip Sen" link: "http://" year: "2010" abstract: "In a multi-hop mobile ad hoc network (MANET), mobile nodes cooperate to form a network without using any infrastructure such as access points or base stations. The mobility of the nodes and the fundamentally limited capacity of the wireless medium, together with wireless transmission effects such as attenuation, multi-path propagation, and interference combine to create significant challenges for security in MANETs. Traditional cryptographic mechanisms such as authentication and encryption are not capable of handling some kinds of attacks such as packet dropping by malicious nodes in MANETs. This paper presents a mechanism for detecting malicious packet dropping attacks in MANETs. The mechanism depends on a trust module on each node, which is based on the reputation value computed for that node by its neighbors. The reputation value of a node is computed based on its packet forwarding behavior in the network. The reputation information is gathered, stored and exchanged between the nodes, and computed under different scenario. The proposed protocol has been simulated in a network simulator. The simulation results show the efficiency of its performance. " note: "10.1007/978-3-642-14478-3_54" links: "url": "http://dx.doi.org/10.1007/978-3-642-14478-3_54" tags: - "rule-based" - "protocol" - "security" - "reputation" - "mobile" researchr: "https://researchr.org/publication/springerlink%3A10.1007-978-3-642-14478-354" cites: 0 citedby: 0 booktitle: "Recent Trends in Network Security and Applications" volume: "89" series: "Communications in Computer and Information Science" publisher: "Springer Berlin Heidelberg" isbn: "978-3-642-14478-3" kind: "incollection" key: "springerlink:10.1007-978-3-642-14478-354" - title: "A Secure Routing Protocol for Wireless Sensor Networks" author: - name: "Jaydip Sen" link: "http://" - name: "Arijit Ukil" link: "http://" year: "2010" month: "March " doi: "http://dx.doi.org/10.1007/978-3-642-12179-1_25" abstract: "Wireless sensor networking has been a subject of extensive research efforts in the recent years, and has been well recognized as a ubiquitous and general approach for some emerging applications such as a real-time traffic monitoring, ecosystem and battlefield surveillance. Since these networks deal with sensitive data, it is imperative that they are made secure against various types of attacks such as node capture, physical tampering, eavesdropping, denial of service etc. This paper presents a secure routing mechanism for wireless sensor networks. The protocol is resilient in the presence of malicious nodes that may launch selective packet dropping attack on the routing path. The scheme employs single-path routing, and therefore, it is energy-efficient. While the packets are forwarded towards the base station, if any node fails to forward a packet, it is isolated immediately. Packets are then routed around the node. Simulation conducted on the scheme clearly demonstrates that it is more efficient than some of the existing similar schemes. Keywords: Wireless sensor networks - routing - malicious packet dropping - neighborhood watch - energy-efficiency - reliability." links: doi: "http://dx.doi.org/10.1007/978-3-642-12179-1_25" tags: - "rule-based" - "protocol" - "wireless sensor networks" - "data-flow" - "routing" - "reliability" - "systematic-approach" researchr: "https://researchr.org/publication/DBLP%3Aconf-iccsa-SenU10" cites: 0 citedby: 0 booktitle: "ICCSA (3)" volume: "6019" number: "3" series: "Lecture Notes in Computer Science, Springer" address: "Fukuoka, Japan" organization: "Kyushu University, Japan" publisher: "Springer-Verlag, Heidelberg, Germany" kind: "inproceedings" key: "DBLP:conf-iccsa-SenU10" - title: "A QoS-aware end-to-end connectivity management algorithm for mobile applications" author: - name: "Jaydip Sen" link: "http://" - name: "Arijit Ukil" link: "https://researchr.org/alias/arijit-ukil" year: "2010" doi: "http://doi.acm.org/10.1145/1754288.1754292" abstract: "In a dynamic heterogeneous environment, such as pervasive and ubiquitous computing, context-aware adaptation is a key concept to meet the varying requirements of different users. Context-awareness is the most promising way to manage the user information and to provide the means of communication at the right time in the right way. Connectivity and quality of service (QoS) of applications are two most important considerations that should be taken into account for designing a context-aware system. This paper presents connectivity from the view point of context awareness, identifies various relevant raw connectivity contexts, and discusses how high-level context information can be abstracted from the raw context information. It also presents a QoS-and context-aware algorithm for supporting mobile applications in a heterogeneous network environment. The unified approach towards connectivity information and QoS-awareness makes the algorithm more practical than most of the currently existing algorithms which consider connectivity and QoS separately. Simulation results show that the use of context information helps to improve the delivered application QoS." links: doi: "http://doi.acm.org/10.1145/1754288.1754292" tags: - "context-aware" - "Meta-Environment" - "mobile" - "systematic-approach" researchr: "https://researchr.org/publication/SenU10" cites: 0 citedby: 0 booktitle: "Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010" editor: - name: "R. K. Shyamasundar" link: "https://researchr.org/alias/r.-k.-shyamasundar" - name: "Prasad Deshpande" link: "https://researchr.org/alias/prasad-deshpande" publisher: "ACM" isbn: "978-1-4503-0001-8" kind: "inproceedings" key: "SenU10"