Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amiya Bhattacharya is active.

Publication


Featured researches published by Amiya Bhattacharya.


international conference on parallel and distributed systems | 2004

On using reputations in ad hoc networks to counter malicious nodes

Prashant Dewan; Partha Dasgupta; Amiya Bhattacharya

Nodes in mobile ad hoc networks have a limited transmission range. Hence the nodes expect their neighbors to relay packets meant for far off destinations. These networks are based on the fundamental assumption that if a node promises to relay a packet, it relays it and does not cheat. This assumption becomes invalid when the nodes in the network have tangential or contradictory goals. The reputations of the nodes, based on their past history of relaying packets, can be used by their neighbors to ensure that the packet is relayed by the node. This paper introduces a reputation scheme for ad hoc networks. Instead of choosing the shortest path to the destination, the source node chooses a path whose next hop node has the highest reputation. This policy, when used recursively, in the presence of 40% malicious nodes, improves the throughput of the system to 65%, from 22 % throughput provided by AODV. This improvement is obtained at the cost of a higher number of route discoveries with a minimal increase in the average hop length according S. Bansal and M. Baker (2003).


IEEE Pervasive Computing | 2009

Location-Aware Computing, Virtual Networks

Mark S. Ackerman; Tao Dong; Scott Gifford; Jungwoo Kim; Mark W. Newman; Atul Prakash; Sarah Qidwai; David García; Paulo Villegas; Alejandro Cadenas; Antonio Sánchez-Esguevillas; Javier M. Aguiar; Belén Carro; Sean Mailander; Ronald Schroeter; Marcus Foth; Amiya Bhattacharya; Partha Dasgupta

This issue includes four works in process on issues and applications in location-aware computing: letting users set and control privacy policies when they use location-aware applications, cold-starting recommender systems for mobile location-aware services, aggregating contextual information for location-based applications, and applying location-based services to public transportation environments. The department also includes a report on lightweight virtualization of low-power wireless personal area networks.


international conference on information systems security | 2010

Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation

Raghunathan Srinivasan; Partha Dasgupta; Tushar Gohad; Amiya Bhattacharya

Integrity of computing platforms is paramount. A platform is as secure as the applications executing on it. All applications are created with some inherent vulnerability or loophole. Attackers can analyze the presence of flaws in a particular binary and exploit them. Traditional virus scanners are also binaries which can be attacked by malware. This paper implements a method known as Remote Attestation entirely in software to attest the integrity of a process using a trusted external server. The trusted external server issues a challenge to the client machine which responds to the challenge. The response determines the integrity of the application.


Mobile Computing and Communications Review | 2007

Obfuscating temporal context of sensor data by coalescing at source

Abhishek RayChaudhuri; Ujwal K. Chinthala; Amiya Bhattacharya

Contextual privacy threat arises from divulging the location and time of the triggering events to adversaries. Since, the context of the triggering events serve as useful information to the eavesdropper, data encryption alone renders inadequate for protecting total privacy of a sensing task. Obfuscation of the contextual information is a natural solution to the contextual privacy problem. Since both location and time of a sensed event constitute its context, obfuscation can be performed both spatially and temporally. In [1], the authors employ spatial obfuscation techniques (controlled flooding, probabilistic flooding and fake messaging) by focusing mainly on the location component of the contextual information. Nevertheless, increased message transmissions place an additional burden on the power constrained sensor nodes.


International Journal of Information and Computer Security | 2009

Mitigating routing vulnerabilities in ad hoc networks using reputations

Prashant Dewan; Partha Dasgupta; Amiya Bhattacharya

Nodes in mobile ad hoc networks have limited transmission ranges that necessitate multihop communication. Hence the nodes expect their neighbours to relay the packets meant for nodes out of the transmission range of the source. Ad hoc networks are based on the fundamental assumption that if a node promises to relay a packet, it will relay the packet and will not cheat. This assumption becomes invalid when the nodes in the network have contradictory goals. As a result, routing protocols for ad hoc networks become vulnerable to rogue nodes. The reputations of the intermediate nodes, based on their past history of relaying packets, can be used by their neighbours to ensure that the packet will be relayed by the intermediate nodes. This paper introduces a reputation scheme for ad hoc networks that can motivate the intermediate nodes to relay packets. The source performs a route discovery (using Ad hoc on Demand Distance Vector Routing Protocol (AODV)) and finds a set of routes to the destination. Instead of choosing the shortest route to the destination, the source node chooses a path whose next hop node has the highest reputation. This policy, when used recursively, in the presence of 40% rogue nodes, improves the throughput of the system to 65%, from the 22% throughput provided by AODV with same number of rogue nodes. This improvement is obtained at the cost of a higher number of route discoveries with a minimal increase in the average hop length.


real world wireless sensor networks | 2010

Virtual sensor WPAN on demand

Meddage S. Fernando; Harie S. Bangalore Ramthilak; Amiya Bhattacharya; Partha Dasgupta

Virtualization of wireless sensor PANs would be useful for general purpose networked sensing with application concurrency, for community-based sensor sharing, and for supporting platform heterogeneity as well as robustness. This abstract presents a snapshot of the preliminary design and implementation of a middleware for lightweight sensor network virtualization that makes use of the latest developments in TinyOS.


military communications conference | 2008

SDDA: Sparse and dynamic in-network data aggregation in sensor nets

Venkata Kodali; Hong Huang; Yughandhar Katuru; Amiya Bhattacharya

In-network data aggregation is an effective method to reduce the amount of data transmitted and therefore saves energy consumption in sensor networks. However, data aggregation removes the integrity of original data and thus increases the damage of data falsification attack. This paper proposes four new methods that select a subset of nodes as aggregators in a sparse and dynamic fashion to frustrate the adversary. The criteria for selecting aggregators include security risk, aggregation efficiency gain, and trust relationship among nodes. Simulation results are presented that demonstrate the new methods can effectively make tradeoffs between security risk and communications cost.


international conference on mobile systems, applications, and services | 2008

Community sensor grids: virtualization for sharing across domains

Amiya Bhattacharya; Meddage S. Fernando; Partha Dasgupta


computer and communications security | 2011

Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices

Xuxian Jiang; Amiya Bhattacharya; Partha Dasgupta; William Enck


international conference on mobile systems, applications, and services | 2011

Demo: spanning an underlay over a host WPAN cluster

Meddage S. Fernando; Pushkar M. Mulay; Michael A. Cartwright; Daming D. Chen; Amiya Bhattacharya; Partha Dasgupta

Collaboration


Dive into the Amiya Bhattacharya's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

William Enck

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar

Xuxian Jiang

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daming D. Chen

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hong Huang

New Mexico State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge