Neeli R. Prasad
Aalborg University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Neeli R. Prasad.
international conference on ubiquitous information management and communication | 2008
Kwang-Cheng Chen; Yu-Jeng Peng; Neeli R. Prasad; Ying-Chang Liang; Sumei Sun
Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. We note the cognitive radios can form cognitive radio networks (CRN) by extending the radio link features to network layer functions and above. We categorize CRN architecture into several structures and classify the unidirectional links in such structures, to pave the way for future systematic CRN research.
The Third International Conference on Network Security & Applications (CNSA-2010) | 2010
Sachin D. Babar; Parikshit N. Mahalle; Antonietta Stango; Neeli R. Prasad; Ramjee Prasad
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.
international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011
Sachin D. Babar; Antonietta Stango; Neeli R. Prasad; Jaydip Sen; Ramjee Prasad
IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.
international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011
Vandana Milind Rohokale; Neeli R. Prasad; Ramjee Prasad
Internet of Things (IoT) concept enables the possibility of information discovery about a tagged object or a tagged person by browsing an internet addresses or database entry that corresponds to a particular active RFID with sensing capability. It is a media for information retrieval from physical world to a digital world. With cooperative wireless communication, the wireless node entities can increase their effective quality of service (QoS) via cooperation. In developing countries the death rates due to lack of timely available medical treatments are quite high as compared to other developed countries. The majority of these deaths are preventable through quality care. This paper proposes a cooperative IoT approach for the better health monitoring and control of rural and poor human beings health parameters like blood pressure (BP), hemoglobin (HB), blood sugar, abnormal cellular growth in any part of the body, etc.
international conference on ubiquitous information management and communication | 2008
Kwang-Cheng Chen; Yu-Jeng Peng; Neeli R. Prasad; Ying-Chang Liang; Sumei Sun
Cognitive radios shall form cognitive radio network (CRN) to complete the packets delivery. As cognitive radio network is a general multihop wireless heterogeneous network, trust becomes a critical factor for network layer functions and network operation. We explore and develop the mathematical framework of trust in CRN, to further develop trusted routing with relevant explorations on network layer and above functions.
Vitae-revista De La Facultad De Quimica Farmaceutica | 2013
Parikshit N. Mahalle; Pravin A. Thakre; Neeli R. Prasad; Ramjee Prasad
In the Internet of thing (IoT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control model are not suitable to the nomadic, decentralized and dynamic scenarios in the IoT where identities are not known in advance. This makes the trust management in IoT more promising to address the access control issues .This paper present a Fuzzy approach to the Trust Based Access Control (FBAC) with the notion of trust levels for identity management. The presented fuzzy approach for trust calculations deals with the linguistic information of devices to address access control in the IoT. The simulation result shows that the fuzzy approach for trust based access control guarantees scalability ad it is energy efficient. This paper also proposes FTBAC framework or trust based dynamic access control in distributed IoT. FTBAC framework i a flexible and scalable a increasing number o devices do not affect the functioning and performance.
telecommunications forum | 2014
Slavica Tomovic; Neeli R. Prasad; Igor Radusinovic
This paper presents new Software Defined Networking (SDN) control framework for Quality of Service (QoS) provisioning. The proposed SDN controller automatically and flexibly programs network devices to provide required QoS level for multimedia applications. Centralized control monitors state of the network resources and performs smart traffic management according to collected information. Beside QoS provisioning for priority flows, the proposed solution aims at minimizing degradation of best-effort traffic. The experimental results show significant performance improvement under high traffic load compared to traditional best-effort and IntServ service models.
Computer and Information Science | 2010
Parikshit N. Mahalle; Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.
vehicular technology conference | 2009
Hung-Bin Chang; Kwang-Cheng Chen; Neeli R. Prasad; Chih-Wei Su
Cognitive radio (CR) technology is considered to be an effective solution to enhance overall spectrum efficiency, whereas a primary radio network (PRN) typically does not fully utilize an available spectrum. However, to realize the CR concept, it is essential to provide enough incentives to PRNs and extra revenue to the service provider such that CR mobile stations (CR-MSs) may accordingly utilize PRN spectrum bands, which provides a new challenge for spectrum management. In this paper, we consider a PRN consisting of a primary system base station (PS-BS) and multiple primary system mobile stations (PS-MSs), and we, therefore, construct a CR network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum-management policy framework based on the Vickrey auction such that CR-MSs can compete for utilization of the PRN spectrum bands available for opportunistic transmission of CR-MSs. PRN users are granted incentives at a discounting factor to access spectrum bands and are being compensated for possible operating interference from CR-MSs, whereas the interference is constrained under a tolerance level without losing satisfaction for the PS-MSs. Once CR-MSs are granted spectrum bands, they can utilize the spectrum bands for a certain duration with no spectrum handoff. Consequently, in addition to incentives to the PRN, the overall spectrum utilization, the profit of the service provider, and the opportunity to access the spectrum for the CR-MSs are enhanced to achieve a co-win situation for every involved party in CRNs. Realistic simulations by incorporating pretty bad channel conditions into system operations show the robust operation of our proposed system, which enables the CR concept.
2009 IEEE Mobile WiMAX Symposium | 2009
Fillipo Meucci; Orlando Cabral; Fernando J. Velez; Albena D. Mihovska; Neeli R. Prasad
This paper seeks to explore the integration of spectrum and network resource management functionalities to the benefit of achieving higher performance and capacity gains in an IMT-A scenario. In particular, we investigate the allocation of users over two frequency bands (i.e., 2 GHz and 5 GHz ones) for a single operator scenario. The same type of RAT is considered for both frequency bands. It is assumed that the operator considered in this work has gained access to the frequency pool with a certain portion of the available spectrum. The operator has access to a non-shared 2 GHz band and to part (or all) of the frequency pool band at 5 GHz. The performance gain is analyzed in terms of higher data throughput, reduced delay and lower blocking probability. The performance is heavily dependent on the channel quality for each user in the considered bands which, in turn, is a function of the path loss and the distance from the base station (BS). The operator will have relevant improvements when user terminals are heterogeneously distributed on the cell, with variable distances from the BS. A gain up to 400 kbps (22%) was obtained with the proposed suboptimal solution.