Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Prodipto Das is active.

Publication


Featured researches published by Prodipto Das.


Archive | 2019

Sensor Selection and Data Fusion Approach for IoT Applications

Ishita Chakraborty; Anannya Chakraborty; Prodipto Das

The wireless sensors which are used in IoT applications are battery powered, which imposes extreme energy constraints on their operations. Therefore, a fundamental challenge lies in designing a sensor network which can maximize its lifetime. To address this issue in WSNs, data aggregation techniques have come up as a novel approach that minimizes the number of transmissions in the network, which in turn can optimize the network and increase its lifetime. In this paper, we have discussed a simple hierarchical data aggregation method for energy optimized data transmission in wireless sensor networks.


Archive | 2018

A Modified RSA Cryptography Algorithm for Security Enhancement in Vehicular Ad Hoc Networks

Debasish Roy; Prodipto Das

Secure the communication over network is an important task. Security of Vehicular Ad hoc Networks (VANET) is prime concern due to the numbers of attacker’s existence. We can protect information by using different cryptography methods. The Rivest–Shamir–Adleman (RSA) is one of the asymmetric key cryptography systems to protect information. In asymmetric key cryptography system from the generated key pair, one key is used for information to encrypt and the another key is used for information to decrypt. In RSA, the value of n is computed through the multiplication of two prime numbers p and q. If the factors of n can be found by the intruder using brute force attack, therefore, the security level will reduce. In this paper, we proposed a modified RSA algorithm called MRSA with three prime numbers j, k, and l for VANETs to increase the level of security in vehicular communication. RSA algorithm is with one more prime number, i.e., three prime numbers are used rather than two prime numbers, for increasing the brute force attack time. The lifetime of a message in VANETs may be less. Therefore, MRSA may provide us better result by enhancing the level of security with small key size. The experimental results and analyses are shown for both the RSA and MRSA cryptography algorithms.


Archive | 2018

Trust-Based Routing for Mitigating Grayhole Attack in MANET

Kefayat Ullah; Prodipto Das

MANET is a temporary network without having any pre-existing network setup. In this network, each node participating in the network act both as host and router. Due to the dynamicity and mobility of the network, connections in the network change frequently. Since each participating node in the MANETs is mobile and distributive and also the nodes are resource restricted, traditional networks security systems cannot be applied directly. Also, due to MANET various features like mobility, dynamicity, distributive, cooperative nature, MANETs are vulnerable to various attacks like blackhole, wormhole, grayhole, flooding. This paper explores trust and security challenges to improve security level for MANET. In this study, a new dynamic source routing protocol for MANET based on trust model is developed to mitigate grayhole attack. Trust is calculated based on trust function. Nodes are selected based on the values of trust function and threshold value. The modified DSR protocol can effectively detect the grayhole nodes and isolates them from taking part on routing.


International Journal of Scientific Research in Network Security and Communication | 2017

Data Fusion in Wireless Sensor Network-A Survey

Ishita Chakraborty; Prodipto Das

Wireless Sensor Network is a network with a number of sensor nodes deployed in a geographical area. These nodes are deployed to various kinds of environmental conditions like humidity, noise, temperature etc. The sensors are used for collecting data related to varying environmental conditions where they are deployed in. The primary constraint in a WSN is energy. Since the sensor nodes are battery operated, collecting and transmitting data will cost a lot of energy resources. Therefore, to maximize the lifetime of sensor networks, aggressive energy optimization techniques have to be used for ensuring that energy is conserved for the sensor nodes. This paper discusses about wireless sensor network, its architecture, data aggregation or fusion related algorithms. Keywords— WSN, data aggregation, data fusion, sensor network, IoT


International Journal of Information Science and Computing | 2016

Trust Based Routing for Mitigating Greyhole Attack in MANET: A Rethinking Approach

Kefayat Ullah; Prodipto Das

Mobile Adhoc Network (MANET) is a temporarily formed network created and operated by the nodes themselves without having any centralized infrastructure. Nodes cooperate with each other by passing data and packets from one hop to another. Every nodes act as a router itself for communication. Different protocols have been developed for such type of network. Since the network is dynamic, the topology changes frequently and the network are open to attack and unreliability. Nodes misbehavior due to malicious intention could significantly degrade the performance of MANET. This study reveals with a new Dynamic Source Routing Protocol for MANET based on trust model to mitigate Greyhole attack. Trust is calculated based on trust function. Nodes are selected based on the values of trust function and threshold value. The modified DSR protocol can effectively detect the Greyhole nodes and isolate them from taking part on routing.


2015 International Symposium on Advanced Computing and Communication (ISACC) | 2015

Trusted and secured routing in MANET: An improved approach

Kefayat Ullah; Rajib Das; Prodipto Das; Ananya Roy

A mobile ad-hoc network (or simply a MANET) is a type of infrastructure-less as well as wireless network. MANET depends mainly on mobile nodes for its functionality. Since nodes are mobile and distributive in nature and also communicating devices or nodes are resource-restricted and equipped with micro or bio sensors to acknowledge the signals where only traditional security systems based on cryptography and encryption are not sufficient for promising level security assurance. Hence in this paper we explore trust and security challenges to improve security assurance for MANET. In winding up, we put our efforts to present a secure trusted model to influence the security assurance and significant adaptation of trustworthy communication. We propose a trust computation metric based on nodes impulsive behavior to become malicious in dynamic scenario and proposed algorithms for trust evaluation of every node. Here we proposed a trust based security model (TSRM) for authenticating the new nodes as well as the nodes which are active in current communication network. TSRM captures the evidence of trust worthiness for other nodes from the security model and in return assists them to make better security decision. Unlike other trust model TSRM captures recommendation from neighboring nodes also. Then we have integrated the TSRM into the existing Dynamic Source Routing (DSR) protocol. The performance of TSRM is evaluated by comparing the simulation result of it with the existing DSR.


international conference on computer engineering and applications | 2010

Large Size File Transfer over Wireless Environment

Prodipto Das; Bipul Syam Purkayastha; Ashit Debnath

In the paper, a system known as FTWN (File Transfer in Wireless Networks Environment) is developed. In wireless networks, sending a large file above 100 MB is a big issue. The problem is solved by the system developed using JAVA. In this system FTP is used to transfer file. The transfer time is recorded and found to be very useful in wireless system.


2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC) | 2010

Developing telepathic power of network using neural network approach

Prodipto Das; Bipul Syam Purkayastha

In this paper, a new technique based on telepathy is used to design a Telepathy-based Network System (TNS). The main objective of the system is to perform secured data communication in wireless networks. A point to point (P2P) Ad Hoc network with two nodes- sender and receiver are used in the system. It is seen that if the receiver is trained enough, it starts learning the pattern of the bit stream sent by sender and gradually it starts predicting the bit stream before sending. A neural network is designed to train, learn and predict the bit streams. If a receiver can predict the bit stream, there will be less chance of errors. It will also enhance data security. In the last part the performance of TNS is measured.


arXiv: Networking and Internet Architecture | 2012

Security Measures for Black Hole Attack in MANET: An Approach

Rajib Lochan Das; Bipul Syam Purkayastha; Prodipto Das


Archive | 2011

Biomedical research methodology

Ranjan Das; Prodipto Das

Collaboration


Dive into the Prodipto Das's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kishore Sarma

Assam Agricultural University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

P. P. Mandal

National Centre for Medium Range Weather Forecasting

View shared research outputs
Top Co-Authors

Avatar

Ranjita Das

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Sushma Kundu

Tata Institute of Fundamental Research

View shared research outputs
Researchain Logo
Decentralizing Knowledge