publications

R. Biswas and J. Wu, Minimizing The Number of Channel Switches of Mobile Users in Cognitive Radio Ad-Hoc Networks. J. Sens. Actuator Netw. 2020, 9, 23. https://doi.org/10.3390/jsan9020023

Minimizing The Number of Channel Switches of Mobile Users in Cognitive Radio Ad-Hoc Networks Download PDF    MDPI Link Abstract Cognitive radio (CR) technology is envisioned to use wireless spectrum opportunistically when the primary user (PU) is not using it. In cognitive radio ad-hoc networks (CRAHNs), the mobile users form a distributed multi-hop network using …

R. Biswas and J. Wu, Minimizing The Number of Channel Switches of Mobile Users in Cognitive Radio Ad-Hoc Networks. J. Sens. Actuator Netw. 2020, 9, 23. https://doi.org/10.3390/jsan9020023 Read More »

Preserving source and destination location privacy with controlled routing protocol. Int. J. Secur. Netw. 13, 3 (January 2018), 187–198. DOI:https://doi.org/10.1504/IJSN.2018.10014320

Preserving source and destination location privacy with controlled routing protocol Download PDF  Insider Science Link   Abstract Efficiency in routing and security are two competitive design issues in wireless sensor networks. The most efficient and least secure routing protocol is shortest path routing. On the other hand, the most secure and least efficient routing protocol …

Preserving source and destination location privacy with controlled routing protocol. Int. J. Secur. Netw. 13, 3 (January 2018), 187–198. DOI:https://doi.org/10.1504/IJSN.2018.10014320 Read More »

R. Biswas and J. Wu. “Cognitive Radio Network Technologies and Applications.” Emerging Wireless Communication and Network Technologies. Springer, Singapore, 2018. 13-36.

Cognitive Radio Network Technologies and Applications Download PDF   Springer Link   Abstract Mobile devices are advancing every day, creating a need for higher bandwidth. Because both the bandwidth and spectrums are limited, maximizing the utilization of a spectrum is a target for next-generation technologies. Government agencies lease different spectrums to different mobile operators, resulting in …

R. Biswas and J. Wu. “Cognitive Radio Network Technologies and Applications.” Emerging Wireless Communication and Network Technologies. Springer, Singapore, 2018. 13-36. Read More »

R. Biswas, J. Wu and Y. Chen, “Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109/RWS47064.2019.8972010.

Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter Download PDF    IEEEexplore Link   Abstract: A distributed denial-of-service (DDoS) attack is a cyber-attack in which multiple attackers send out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests. In this paper, …

R. Biswas, J. Wu and Y. Chen, “Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109/RWS47064.2019.8972010. Read More »

R. Biswas, J. Wu and A. Srinivasan, “Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109/RWS47064.2019.8972008.

Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack Download PDF   IEEEexplore Link   Abstract: In a denial-of-service (DoS) attack, the attacker sends out a huge number of requests to exhaust the capacity of a server. The victim cannot serve incoming requests and then DoS occurs. When the attacker stops sending requests, the victim gets …

R. Biswas, J. Wu and A. Srinivasan, “Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109/RWS47064.2019.8972008. Read More »

R. Biswas, J. Wu and X. Li, “A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,” 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109/Sarnoff47838.2019.9067822.

A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks Download PDF   IEEEexplore Link   Abstract: Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses …

R. Biswas, J. Wu and X. Li, “A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,” 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109/Sarnoff47838.2019.9067822. Read More »

R. Biswas, J. Wu, W. Chang and P. Ostovari, “Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack,” 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9013985.

Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack Download PDF   IEEEexplore Link   Abstract: A transit-link distributed denial-of- service (DDoS) attack is a special attack in which the attacker sends out a huge number of requests to exhaust the capacity of a link on the path the traffic comes to a server. As a …

R. Biswas, J. Wu, W. Chang and P. Ostovari, “Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack,” 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9013985. Read More »

R. Biswas, J. Wu and X. Du, “Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761089.

Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks Download PDF   IEEEexplore Link Abstract: Cognitive radio networks (CRNs), offering novel network architecture for utilizing spectrum, have attracted significant attention in recent years. In CRNs, secondary users (SUs) first determine the status of a channel; if it is free, they start transmitting. If …

R. Biswas, J. Wu and X. Du, “Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761089. Read More »

R. Biswas and J. Wu, “Co-Existence of LTE-U and Wi-Fi with Direct Communication,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761064.

Co-Existence of LTE-U and Wi-Fi with Direct Communication Abstract: One of the most prominent cellular technologies, Long Term Evolution (LTE), is currently operating on some 800MHz, 2GHz, and 3.5GHz licensed bands. Wi-Fi is currently operating on 2.5GHz and 5GHz unlicensed bands. The declaration stating that 5GHz bands are unlicensed enables LTE to operate on 5GHz …

R. Biswas and J. Wu, “Co-Existence of LTE-U and Wi-Fi with Direct Communication,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761064. Read More »

R. Biswas and J. Wu, “Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109/PADSW.2018.8644584.

Title:  Filter Assignment Policy Against Distributed Denial-of-Service Attack   Abstract: A denial-of-service (DoS) attack is a cyber-attack in which the attacker sends out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests and DoS occurs. The most devastating distributed DoS attack is performed …

R. Biswas and J. Wu, “Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109/PADSW.2018.8644584. Read More »