Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sandeep K. S. Gupta is active.

Publication


Featured researches published by Sandeep K. S. Gupta.


IEEE Pervasive Computing | 2002

Reconfigurable context-sensitive middleware for pervasive computing

Stephen S. Yau; Fariaz Karim; Yu Wang; Bin Wang; Sandeep K. S. Gupta

Context-sensitive applications need data from sensors, devices, and user actions, and might need ad hoc communication support to dynamically discover new devices and engage in spontaneous information exchange. Reconfigurable Context-Sensitive Middleware facilitates the development and runtime operations of context-sensitive pervasive computing software.


IEEE Transactions on Parallel and Distributed Systems | 2008

Energy-Efficient Thermal-Aware Task Scheduling for Homogeneous High-Performance Computing Data Centers: A Cyber-Physical Approach

Qinghui Tang; Sandeep K. S. Gupta; Georgios Varsamopoulos

High-performance computing data centers have been rapidly growing, both in number and size. Thermal management of data centers can address dominant problems associated with cooling such as the recirculation of hot air from the equipment outlets to their inlets and the appearance of hot spots. In this paper, we show through formalization that minimizing the peak inlet temperature allows for the lowest cooling power needs. Using a low-complexity linear heat recirculation model, we define the problem of minimizing the peak inlet temperature within a data center through task assignment (MPIT-TA), consequently leading to minimal cooling-requirement. We also provide two methods to solve the formulation: Xlnt-GA, which uses a genetic algorithm, and Xlnt-SQP, which uses sequential quadratic programming. Results from small-scale data center simulations show that solving the formulation leads to an inlet temperature distribution that, compared to other approaches, is 2 degC to 5 degC lower and achieves about 20 to 30 percent cooling energy savings at common data center utilization rates. Moreover, our algorithms consistently outperform the minimize heat recirculation algorithm, a recirculation-reducing task placement algorithm in the literature.


international conference on parallel processing | 2003

Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body

Sriram Cherukuri; Krishna K. Venkatasubramanian; Sandeep K. S. Gupta

Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring of inaccessible environments. Health monitoring, telemedicine, military and environmental monitoring are some of the applications where sensors can be used. The sensors implanted inside the human body to monitor parts of the body are called biosensors. These biosensors form a network and collectively monitor the health condition of their carrier or host. Health monitoring involves collection of data about vital body parameters from different parts of the body and making decisions based on it. This information is of personal nature and is required to be secured. Insecurity may also lead to dangerous consequences. Due to the extreme constraints of energy, memory and computation securing the communication among the biosensors is not a trivial problem. Key distribution is central to any security mechanism. In this paper we propose an approach wherein, biometrics derived from the body are used for securing the keying material. This method obviates the need for expensive computation and avoids unnecessary communication making our approach novel compared to existing approaches.


international conference of the ieee engineering in medicine and biology society | 2010

PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks

Krishna K. Venkatasubramanian; Ayan Banerjee; Sandeep K. S. Gupta

A body area network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized healthcare. Securing intersensor communications within BANs is essential for preserving not only the privacy of health data, but also for ensuring safety of healthcare delivery. This paper presents physiological-signal-based key agreement (PSKA), a scheme for enabling secure intersensor communication within a BAN in a usable (plug-n-play, transparent) manner. PSKA allows neighboring nodes in a BAN to agree to a symmetric (shared) cryptographic key, in an authenticated manner, using physiological signals obtained from the subject. No initialization or predeployment is required; simply deploying sensors in a BAN is enough to make them communicate securely. Our analysis, prototyping, and comparison with the frequently used Diffie-Hellman key agreement protocol shows that PSKA is a viable intersensor key agreement protocol for BANs.


international conference on intelligent sensing and information processing | 2006

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters

Qinghui Tang; Tridib Mukherjee; Sandeep K. S. Gupta; Phil C. Cayton

In this work, we propose an abstract heat flow model which uses temperature information from onboard and ambient sensors, characterizes hot air recirculation based on these information, and accelerates the thermal evaluation process for high performance datacenters. This is critical to minimize energy costs, optimize computing resources, and maximize computation capability of the datacenters. Given a workload and thermal profile, obtained from various distributed sensors, we predict the resulting temperature distribution in a fast and accurate manner taking into account the recirculation characterization of a datacenter topology. Simulation results confirm our hypothesis that heat recirculation can be characterized as cross interference in our abstract heat flow model. Moreover, fast thermal evaluation based on cross interference can be used in online thermal management to predict temperature distribution in real-time.


IEEE Transactions on Biomedical Engineering | 2005

Communication scheduling to minimize thermal effects of implanted biosensor networks in homogeneous tissue

Qinghui Tang; Naveen Tummala; Sandeep K. S. Gupta; Loren Schwiebert

A network of biosensors can be implanted in a human body for health monitoring, diagnostics, or as a prosthetic device. Biosensors can be organized into clusters where most of the communication takes place within the clusters, and long range transmissions to the base station are performed by the cluster leader to reduce the energy cost. In some applications, the tissues are sensitive to temperature increase and may be damaged by the heat resulting from normal operations and the recharging of sensor nodes. Our work is the first to consider rotating the cluster leadership to minimize the heating effects on human tissues. We explore the factors that lead to temperature increase, and the process for calculating the specific absorption rate (SAR) and temperature increase of implanted biosensors by using the finite-difference time-domain (FDTD) method. We improve performance by rotating the cluster leader based on the leadership history and the sensor locations. We propose a simplified scheme, temperature increase potential, to efficiently predict the temperature increase in tissues surrounding implanted sensors. Finally, a genetic algorithm is proposed to exploit the search for an optimal temperature increase sequence.


wireless communications and networking conference | 2003

On tree-based convergecasting in wireless sensor networks

Valliappan Annamalai; Sandeep K. S. Gupta; Loren Schwiebert

A wireless sensor network (WSN) consists of sensors implanted in an environment for collecting and transmitting data regarding changes in the environment based on the requests from a controlling device (called base station) using wireless communication. WSNs are being used in medical, military, and environment monitoring applications. Broadcast (dissemination of information from a central node) and convergecast (gathering of information towards a central node) are important communication paradigms across all application domains. Most sensor applications involve both convergecasting and broadcasting. The time taken to complete either of them has to be kept minimal. This can be accomplished by constructing an efficient tree for both broadcasting as well as convergecasting and allocating wireless communication channels to ensure collision-free communication. There exist several works on broadcasting in multihop radio networks (a.k.a. ad hoc networks), which can also be used for broadcasting in WSNs. These algorithms construct a broadcast tree and compute a schedule for transmitting and receiving for each node to achieve collision-free broadcasting. In this paper, we show that we need a new algorithm for applications, which involve both convergecasting and broadcasting since the broadcast tree may not be efficient for convergecasting. So we propose a heuristic algorithm (convergecasting tree construction and channel allocation algorithm (CTCCAA)), which constructs a tree with schedules assigned to nodes for collision free convergecasting. The algorithm is capable of code allocation (direct sequence spread spectrum (DSSS)/ frequency hopping spread spectrum (FHSS)), in case multiple codes are available, to minimize the total duration required for convergecasting. We also show that the same tree can be used for broadcasting and is as efficient as a tree exclusively constructed for broadcasting.


Proceedings of the IEEE | 2012

Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber–Physical Systems

Ayan Banerjee; Krishna K. Venkatasubramanian; Tridib Mukherjee; Sandeep K. S. Gupta

Cyber-physical systems (CPSs) couple their cyber and physical parts to provide mission-critical services, including automated pervasive health care, smart electricity grid, green cloud computing, and surveillance with unmanned aerial vehicles (UAVs). CPSs can use the information available from the physical environment to provide such ubiquitous, energy-efficient and low-cost functionalities. Their operation needs to ensure three key properties, collectively referred to as S3: 1) safety: avoidance of hazards; 2) security: assurance of integrity, authenticity, and confidentiality of information; and 3) sustainability: maintenance of long-term operation of CPSs using green sources of energy. Ensuring S3 properties in a CPS is a challenging task given the spatio-temporal dynamics of the underlying physical environment. In this paper, the formal underpinnings of recent CPS S3 solutions are aligned together in a theoretical framework for cyber-physical interactions, empowering CPS researchers to systematically design solutions for ensuring safety, security, or sustainability. The general applicability of this framework is demonstrated with various exemplar solutions for S3 in diverse CPS domains. Further, insights are provided on some of the open research problems for ensuring S3 in CPSs.


international conference on cluster computing | 2007

Thermal-aware task scheduling for data centers through minimizing heat recirculation

Qinghui Tang; Sandeep K. S. Gupta; Georgios Varsamopoulos

The thermal environment of data centers plays a significant role in affecting the energy efficiency and the reliability of data center operation. A dominant problem associated with cooling data centers is the recirculation of hot air from the equipment outlets to their inlets, causing the appearance of hot spots and an uneven inlet temperature distribution. Heat is generated due to the execution of tasks, and it varies according to the power profile of a task. We are looking into the prospect of assigning the incoming tasks around the data center in such a way so as to make the inlet temperatures as even as possible; this will allow for considerable cooling power savings. Based on our previous research work on characterizing the heat recirculation in terms of cross-interference coefficients, we propose a task scheduling algorithm for homogeneous data centers, called XInt, that minimizes the inlet temperatures, and leads to minimal heat recirculation and minimal cooling energy cost for data center operation. We verify, through both theoretical formalization and simulation, that minimizing heat recirculation will result in the best cooling energy efficiency. XInt leads to an inlet temperature distribution that is 2degC to 5degC lower than other approaches, and achieves about 20%-30% energy savings at moderate data center utilization rates. XInt also consistently achieves the best energy efficiency compared to another recirculation minimized algorithm, MinHR.


international conference on communications | 2003

Reliable multicast MAC protocol for wireless LANs

Sandeep K. S. Gupta; Vikram Shankar; Suresh Lalwani

Reliable multicast in wireless applications is gaining importance with the development in technology. Applications like multicast file transfer, distributed computing, chat and whiteboard applications need reliability. However, due to mobility and wireless channel characteristics, obtaining reliability in data transfer is a difficult and challenging task. IEEE 802.11 does not support reliable multicast due to its inability to exchange RTS/CTS and ACKS with multiple recipients. However, several MAC layer protocols have been proposed that provide reliable multicast. For example, J. Kuri et al. [July 2001] have proposed the leader-based, probability-based, and delay-based protocols. These protocols work around the problem of multiple CTSs/ACKs colliding by providing ways to have only one of the multicast recipient nodes respond with a CTS or an ACK. These protocols perform well in low mobility wireless LANs but the performance degenerates as the mobility of nodes increases. In this paper, we discuss the inherent drawbacks of these protocols and provide an alternative approach. We present an extension to the IEEE 802.11 MAC layer protocol to provide the link level reliability to both unicast as well as multicast data communications. The extension is NAK based and uses tones, instead of conventional packets, to signal a NAK. We also incorporate dual tones, proposed by J. Deng et al. [Oct. 1998], to prevent an incoming mobile node from interrupting an ongoing transmission. Simulation results suggest that our MAC performs better than those proposed by J. Kuri et al. [July 2001] in terms of both data throughput as well as reliability.

Collaboration


Dive into the Sandeep K. S. Gupta's collaboration.

Top Co-Authors

Avatar

Ayan Banerjee

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zahra Abbasi

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bin Wang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Koosha Sadeghi

Arizona State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge