Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ankit Singh Rawat is active.

Publication


Featured researches published by Ankit Singh Rawat.


IEEE Transactions on Signal Processing | 2011

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks

Ankit Singh Rawat; Priyank Anand; Hao Chen; Pramod K. Varshney

Cognitive radio (CR) has emerged as a solution to the problem of spectrum scarcity as it exploits transmission opportunities in the under-utilized spectrum bands of primary users. Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness. The data fusion scheme is a key component of collaborative spectrum sensing. In this paper, we analyze the performance limits of collaborative spectrum sensing under Byzantine Attacks where malicious users send false sensing data to the fusion center leading to increased probability of incorrect sensing results. We show that above a certain fraction of Byzantine attackers in the CR network, data fusion scheme becomes completely incapable and no reputation based fusion scheme can achieve any performance gain. We present optimal attacking strategies for given attacking resources and also analyze the possible counter measures at the fusion center (FC). Based on these analyses, we also propose a novel and easy to implement technique to counter Byzantine attacks in CRNs. In this approach, the FC identifies the attackers and removes them from the data fusion process. Our analysis indicates that the proposed scheme is robust against Byzantine attacks and can successfully remove the Byzantines in a short time span.


IEEE Transactions on Information Theory | 2014

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

Ankit Singh Rawat; Onur Ozan Koyluoglu; Natalia Silberstein; Sriram Vishwanath

This paper aims to go beyond resilience into the study of security and local-repairability for distributed storage systems (DSSs). Security and local-repairability are both important as features of an efficient storage system, and this paper aims to understand the trade-offs between resilience, security, and local-repairability in these systems. In particular, this paper first investigates security in the presence of colluding eavesdroppers, where eavesdroppers are assumed to work together in decoding the stored information. Second, this paper focuses on coding schemes that enable optimal local repairs. It further brings these two concepts together to develop locally repairable coding schemes for DSS that are secure against eavesdroppers. The main results of this paper include: 1) an improved bound on the secrecy capacity for minimum storage regenerating codes; 2) secure coding schemes that achieve the bound for some special cases; 3) a new bound on minimum distance for locally repairable codes; 4) code construction for locally repairable codes that attain the minimum distance bound; and 5) repair-bandwidth-efficient locally repairable codes with and without security constraints.


international symposium on information theory | 2013

Optimal locally repairable codes via rank-metric codes

Natalia Silberstein; Ankit Singh Rawat; Onur Ozan Koyluoglu; Sriram Vishwanath

This paper presents a new explicit construction for locally repairable codes (LRCs) for distributed storage systems which possess all-symbol locality and the largest possible minimum distance, or equivalently, can tolerate the maximum number of node failures. This construction, based on maximum rank distance (MRD) Gabidulin codes, provides new optimal vector and scalar LRCs. In addition, the paper also discusses mechanisms by which codes obtained using this construction can be used to construct LRCs with efficient local repair of failed nodes by combination of LRCs with regenerating codes.


IEEE Transactions on Information Theory | 2016

Locality and Availability in Distributed Storage

Ankit Singh Rawat; Dimitris S. Papailiopoulos; Alexandros G. Dimakis; Sriram Vishwanath

This paper studies the problem of information symbol availability in codes: we refer to a systematic code as code with


communication systems and networks | 2010

Collaborative spectrum sensing in the presence of Byzantine attacks in Cognitive Radio Networks

Priyank Anand; Ankit Singh Rawat; Hao Chen; Pramod K. Varshney

(r, t)


international symposium on information theory | 2014

Locality and availability in distributed storage

Ankit Singh Rawat; Dimitris S. Papailiopoulos; Alexandros G. Dimakis; Sriram Vishwanath

-availability if every information (systematic) symbol can be reconstructed from


international conference on acoustics, speech, and signal processing | 2010

Countering byzantine attacks in cognitive radio networks

Ankit Singh Rawat; Priyank Anand; Hao Chen; Pramod K. Varshney

t


allerton conference on communication, control, and computing | 2012

Error resilience in distributed storage via rank-metric codes

Natalia Silberstein; Ankit Singh Rawat; Sriram Vishwanath

disjoint groups of other code symbols, each of the sizes at most


international symposium on information theory | 2013

Explicit MBR all-symbol locality codes

Govinda M. Kamath; Natalia Silberstein; N. Prakash; Ankit Singh Rawat; V. Lalitha; Onur Ozan Koyluoglu; P. Vijay Kumar; Sriram Vishwanath

r


conference on information sciences and systems | 2014

On cooperative local repair in distributed storage

Ankit Singh Rawat; Arya Mazumdar; Sriram Vishwanath

. This paper shows that it is possible to construct codes that can support a scaling number of parallel reads while keeping the rate to be an arbitrarily high constant. It further shows that this is possible with the minimum Hamming distance arbitrarily close to the Singleton bound. This paper also presents a bound demonstrating a tradeoff between rate, minimum Hamming distance, and availability parameters. Our codes match the aforementioned bound, and their constructions rely on certain combinatorial structures. Resolvable designs provide one way to realize these required combinatorial structures. The two constructions presented in this paper require field sizes, which are linear and exponential in the code length, respectively. From a practical standpoint, our codes are relevant for distributed storage applications involving hot data, i.e., the information, which is frequently accessed by multiple processes in parallel.

Collaboration


Dive into the Ankit Singh Rawat's collaboration.

Top Co-Authors

Avatar

Sriram Vishwanath

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Natalia Silberstein

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Alexandros G. Dimakis

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Arya Mazumdar

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anna Gál

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Christos Thrampoulidis

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hao Chen

Boise State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge