Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Neeli R. Prasad is active.

Publication


Featured researches published by Neeli R. Prasad.


international conference on ubiquitous information management and communication | 2008

Cognitive radio network architecture: part I -- general structure

Kwang-Cheng Chen; Yu-Jeng Peng; Neeli R. Prasad; Ying-Chang Liang; Sumei Sun

Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. We note the cognitive radios can form cognitive radio networks (CRN) by extending the radio link features to network layer functions and above. We categorize CRN architecture into several structures and classify the unidirectional links in such structures, to pave the way for future systematic CRN research.


The Third International Conference on Network Security & Applications (CNSA-2010) | 2010

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

Sachin D. Babar; Parikshit N. Mahalle; Antonietta Stango; Neeli R. Prasad; Ramjee Prasad

IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.


international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011

Proposed embedded security framework for Internet of Things (IoT)

Sachin D. Babar; Antonietta Stango; Neeli R. Prasad; Jaydip Sen; Ramjee Prasad

IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.


international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011

A cooperative Internet of Things (IoT) for rural healthcare monitoring and control

Vandana Milind Rohokale; Neeli R. Prasad; Ramjee Prasad

Internet of Things (IoT) concept enables the possibility of information discovery about a tagged object or a tagged person by browsing an internet addresses or database entry that corresponds to a particular active RFID with sensing capability. It is a media for information retrieval from physical world to a digital world. With cooperative wireless communication, the wireless node entities can increase their effective quality of service (QoS) via cooperation. In developing countries the death rates due to lack of timely available medical treatments are quite high as compared to other developed countries. The majority of these deaths are preventable through quality care. This paper proposes a cooperative IoT approach for the better health monitoring and control of rural and poor human beings health parameters like blood pressure (BP), hemoglobin (HB), blood sugar, abnormal cellular growth in any part of the body, etc.


international conference on ubiquitous information management and communication | 2008

Cognitive radio network architecture: part II -- trusted network layer structure

Kwang-Cheng Chen; Yu-Jeng Peng; Neeli R. Prasad; Ying-Chang Liang; Sumei Sun

Cognitive radios shall form cognitive radio network (CRN) to complete the packets delivery. As cognitive radio network is a general multihop wireless heterogeneous network, trust becomes a critical factor for network layer functions and network operation. We explore and develop the mathematical framework of trust in CRN, to further develop trusted routing with relevant explorations on network layer and above functions.


Vitae-revista De La Facultad De Quimica Farmaceutica | 2013

A fuzzy approach to trust based access control in internet of things

Parikshit N. Mahalle; Pravin A. Thakre; Neeli R. Prasad; Ramjee Prasad

In the Internet of thing (IoT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control model are not suitable to the nomadic, decentralized and dynamic scenarios in the IoT where identities are not known in advance. This makes the trust management in IoT more promising to address the access control issues .This paper present a Fuzzy approach to the Trust Based Access Control (FBAC) with the notion of trust levels for identity management. The presented fuzzy approach for trust calculations deals with the linguistic information of devices to address access control in the IoT. The simulation result shows that the fuzzy approach for trust based access control guarantees scalability ad it is energy efficient. This paper also proposes FTBAC framework or trust based dynamic access control in distributed IoT. FTBAC framework i a flexible and scalable a increasing number o devices do not affect the functioning and performance.


telecommunications forum | 2014

SDN control framework for QoS provisioning

Slavica Tomovic; Neeli R. Prasad; Igor Radusinovic

This paper presents new Software Defined Networking (SDN) control framework for Quality of Service (QoS) provisioning. The proposed SDN controller automatically and flexibly programs network devices to provide required QoS level for multimedia applications. Centralized control monitors state of the network resources and performs smart traffic management according to collected information. Beside QoS provisioning for priority flows, the proposed solution aims at minimizing degradation of best-effort traffic. The experimental results show significant performance improvement under high traffic load compared to traditional best-effort and IntServ service models.


Computer and Information Science | 2010

Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges

Parikshit N. Mahalle; Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad

One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.


vehicular technology conference | 2009

Auction Based Spectrum Management of Cognitive Radio Networks

Hung-Bin Chang; Kwang-Cheng Chen; Neeli R. Prasad; Chih-Wei Su

Cognitive radio (CR) technology is considered to be an effective solution to enhance overall spectrum efficiency, whereas a primary radio network (PRN) typically does not fully utilize an available spectrum. However, to realize the CR concept, it is essential to provide enough incentives to PRNs and extra revenue to the service provider such that CR mobile stations (CR-MSs) may accordingly utilize PRN spectrum bands, which provides a new challenge for spectrum management. In this paper, we consider a PRN consisting of a primary system base station (PS-BS) and multiple primary system mobile stations (PS-MSs), and we, therefore, construct a CR network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum-management policy framework based on the Vickrey auction such that CR-MSs can compete for utilization of the PRN spectrum bands available for opportunistic transmission of CR-MSs. PRN users are granted incentives at a discounting factor to access spectrum bands and are being compensated for possible operating interference from CR-MSs, whereas the interference is constrained under a tolerance level without losing satisfaction for the PS-MSs. Once CR-MSs are granted spectrum bands, they can utilize the spectrum bands for a certain duration with no spectrum handoff. Consequently, in addition to incentives to the PRN, the overall spectrum utilization, the profit of the service provider, and the opportunity to access the spectrum for the CR-MSs are enhanced to achieve a co-win situation for every involved party in CRNs. Realistic simulations by incorporating pretty bad channel conditions into system operations show the robust operation of our proposed system, which enables the CR concept.


2009 IEEE Mobile WiMAX Symposium | 2009

Spectrum Aggregation with Multi-band User Allocation over Two Frequency Bands

Fillipo Meucci; Orlando Cabral; Fernando J. Velez; Albena D. Mihovska; Neeli R. Prasad

This paper seeks to explore the integration of spectrum and network resource management functionalities to the benefit of achieving higher performance and capacity gains in an IMT-A scenario. In particular, we investigate the allocation of users over two frequency bands (i.e., 2 GHz and 5 GHz ones) for a single operator scenario. The same type of RAT is considered for both frequency bands. It is assumed that the operator considered in this work has gained access to the frequency pool with a certain portion of the available spectrum. The operator has access to a non-shared 2 GHz band and to part (or all) of the frequency pool band at 5 GHz. The performance gain is analyzed in terms of higher data throughput, reduced delay and lower blocking probability. The performance is heavily dependent on the channel quality for each user in the considered bands which, in turn, is a function of the path loss and the distance from the base station (BS). The operator will have relevant improvements when user terminals are heterogeneously distributed on the cell, with variable distances from the BS. A gain up to 400 kbps (22%) was obtained with the proposed suboptimal solution.

Collaboration


Dive into the Neeli R. Prasad's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

António Rodrigues

Technical University of Lisbon

View shared research outputs
Top Co-Authors

Avatar

Parikshit N. Mahalle

Savitribai Phule Pune University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge