Pranab Banerjee
Jadavpur University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pranab Banerjee.
International Journal of Service Science, Management, Engineering, and Technology | 2014
Swati Chowdhuri; Sayan Chakraborty; Nilanjan Dey; Ahmad Taher Azar; Mohammed A.-M. Salem; Sheli Sinha Chaudhury; Pranab Banerjee
Mobile ad hoc Network (MANET) and Multi Input Multi Output (MIMO) communication are emerging techniques in modern communication system. MIMO and MANET have various applications in the wireless communication system. This paper presents a survey on recent advancement of MIMO implemented mobile ad hoc network. A review of more than 40 papers on MIMO communication based mobile ad hoc network and most of the related topics is presented in this work. This paper shows the significant contribution in the field of MIMO communication and mobile ad hoc network. Previous works in this domain can be categorized into four major areas: (a) Mathematical modeling of MIMO channel and Ad hoc networks, (b) Physical Scattering Model of MIMO channel considering fading (c) Spatial multiplexing (OFDM) technique with MIMO channel, (d) Analysis of transmission efficiency of packet radio network. The review paper establishes the advancement in these four areas as well as recent changes in advance communication and networking environments.
ACITY (1) | 2012
Dipayan Bose; Arnab Banerjee; Aniruddha Bhattacharyya; Himadri Nath Saha; Debika Bhattacharyya; Pranab Banerjee
In MANET secure routing is an important issue because of its self organizing and cooperative nature, capable of autonomous operation, rapid changing topologies, limited physical security and limited energy resource. So our proposal is a new scheme which significantly differs from other available schemes dealing with security attacks against mobile ad hoc networks. In this paper, our proposed scheme, Efficient Secure Routing Protocol in MANET (ESRP) provides a new routing scheme based on trust, which is an integer value that helps to select administrator inside the network for routing. The comparison between our proposed protocol and parameters of ad hoc network shows the performance according to secure protocol. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation result shows the robustness, reliability and trustworthiness of our scheme.
computational science and engineering | 2012
Himadri Nath Saha; Debika Bhattacharyya; Pranab Banerjee
Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So we proposed a new scheme which is significantly different from others available schemes to provide security during routing in mobile ad hoc networks. In this paper, our proposed scheme, Secure Multipoint Relay based Routing in MANET (SMRR) provides routing based on trust, which is an integer value that helps to select Multipoint Relay (administrator) inside the network for routing. We have also implemented the message confidentiality and integrity in our proposed scheme. Our simulation results show the robustness, reliability and trustworthiness of our scheme.
International Conference on Parallel Distributed Computing Technologies and Applications | 2011
Himadri Nath Saha; Debika Bhattacharyya; Pranab Banerjee
Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. The lack of static infrastructure causes several issues in mobile Ad Hoc network (MANET) environment, such as node authentication and secure routing. In this paper we propose a new approach for secure routing of data packets in MANET. This approach will reduce the computational overhead to a lot extent. The protocol is based on a specific criterion of the nodes called “fidelity Index”. We first explain what fidelity index is and give a comprehensively detailed description of the scheme. Then we exemplify and simulate the scheme with several case studies and lastly discuss the security strengthening aspects of this simple yet robust scheme under some scenarios.
Foundations of Computing and Decision Sciences | 2015
Himadri Nath Saha; Rohit Singh; Debika Bhattacharyya; Pranab Banerjee
Abstract With advent of technology MANET is becoming more and more ubiquitous, and so is the vulnerability of such networks to attacks. In this paper, we propose a secure, lightweight, on-demand routing protocol for MANETs. It uses the concept of fidelity to allocate trust to a neighbor, thereby taking the decision whether to send data via that neighbor or not. To combat attacks efficiently new packets like report and recommendation are used. After receiving a few of these packets a node can conclude about the behavior of a node, thereby identifying and blacklisting the malicious nodes. We try to impose bounds for the fidelity with reference to the battery of the node, which restricts a node to increase its fidelity to infinity and become dominant in the network. This protocol not only finds a secure route to transmit data, but also identifies the malicious nodes in the network. Our protocol exhibits high packet delivery fraction, with low normalized routing load and low end to end delay; which has been observed while simulating in GloMoSim platform. We have observed that our protocol performs not only better than other existing secure routing protocol in a malicious environment, but also combats, many attacks which have not been dealt with these protocols.
international conference on computer science and information technology | 2012
Himadri Nath Saha; Debika Bhattachayya; Pranab Banerjee
Many security schemes for mobile ad-hoc network(MANET) have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA). Our simulation results show how cellular automata(CA) is implemented for user authentication and secure transmission in MANET.
International Journal of Information and Communication Technology | 2016
Swati Chowdhuri; Sayan Chakraborty; Nilanjan Dey; Sheli Sinha Chaudhuri; Pranab Banerjee
Developing applications, especially real time ones mobile ad hoc network MANET requires a reasonable assurance of the likely performance of the network. MANET is realised by mobile nodes which communicate difficult task. Amongst many important properties of radio propagation model has to be selected carefully. This paper presents a hybrid propagation model of ad hoc network with multiple numbers of antennas. The hybrid technique ensures improved accuracy and practicality of the entire modelling environment. Currently study a modelled network consisting of ad hoc nodes with multiple antennas in different terrain and the propagation loss is calculated of the modelled network for the each ad hoc node. A loss less routing algorithm is implemented here and finally minimum loss route is selected for propagation in different terrain.
Archive | 2014
Sangita Roy; Dola Gupta; Sheli Sinha Chaudhuri; Pranab Banerjee
In the last 40 years a number of coding techniques for analog sources (speech and images) has been employed. Subband coding, a kind of transform coding, splits analog speech signal into a number of different smaller frequency bands. By subbanding data rate has been reduced to 12.13804 Kbps [Sangita et al. Studies and implementation of subband coder and decoder of speech signal, Proceedings of national conference on electronics, communication and signal processing, 8–16, 1] on 64 Kbps telephone line. In this paper a method has been proposed by which data rate has been reduced to 9.4875 Kbps using Rayleigh distribution where data rate can be reduced to 9.6 Kbps [Crochiere et al. Digital coding of speech in subbands, The BELL System Technical Journal, 2]. Proposed method can save data rate which in turn saves bandwidth as well as spectrum. Moreover this proposed method provides acceptable probability of error and quantization noise i.e. SNR.
Archive | 2012
Himadri Nath Saha; Debika Bhattacharyya; Pranab Banerjee
The lack of static infrastructure causes several issues in mobile Ad Hoc network, such as energy utilization, node authentication and secure routing. In this paper we propose a new scheme for energy efficient secure routing of data packets in MANET. This approach will reduce the computational overhead to make it more energy efficient than existing schemes. As there is no stationary infrastructure,each node in MANET acts a router that forwards data packets to other nodes. Therefore selection of effective, suitable, adaptive and robust routing scheme is of utmost importance. We have reduced the amount of network activity for each node required to route a data packet. This leads to lesser wastage of energy and increases security.Our simulation results will show how this is energy efficient and secure. Finally we have discussed how this scheme prevents various attacks which may jeopardize any wireless network.
International Journal of Computer Applications | 2011
Himadri Nath Saha; Debika Bhattacharyya; Pranab Banerjee
As an emerging new technology a wireless communication allows users to access services electronically, wherever they might geographically be positioned. A MANET (M obile Ad Hoc Network )is a special wireless network without any fixed infrastructure and It has dynamic topology. In this paper we have discussed a new secure routing protocol named as minimized overhead and admsinistrator based secure routing protocol(MOAP) for data packets, which is signifiacndly different from existing routing protocol. We have reduced the amount of network activity for each node required to route a data packet. We have utilized our algorithm to implement this protocol and then simulate with diffentent test cases. Finally we have discussed how this protocol prevents various attacks which may jeopardize any wireless network.