Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sanjeev Jain is active.

Publication


Featured researches published by Sanjeev Jain.


Journal of Network and Computer Applications | 2017

A survey on device-to-device (D2D) communication

Pimmy Gandotra; Rakesh Kumar Jha; Sanjeev Jain

The number of devices is expected to radically increase in near future, with an estimate of above 50 billion connected devices by 2020. The subscribers demand improved data rates, with reduced latency and increased system capacity. To endure the rising demands, cellular networks need to undergo suitable changes. For fulfillment of the rising needs of users and efficient utilization of the available scarce resources, device-to-device (D2D) communication is being looked upon as an important emerging technology for present and future cellular networks. It allows peer-to-peer communication between users, with improved spectral efficiency, energy efficiency and system throughput. In this paper, a detailed survey on device-to-device (D2D) communications has been offered, along with the challenges which exist for D2D (like resource allocation, security, interference management etc.) to become a successful paradigm of wireless networks. In order to fulfill the subscriber needs, architecture has been proposed which assures overcoming the various implementation challenges of D2D communication. The paper largely focuses on security in D2D communication and the possible attacks to which the direct links are susceptible to. For ensuring a secure D2D communication, solution has been proposed, based upon Internet Protocol Security (IP Sec). The proposed architecture aims at providing optimal amount of resources to all the users in the cellular system, be it cellular user or D2D user, in an adaptive manner. Such an allocation avoids resource wastage and improves system throughput thereby enhancing the overall network performance.Display Omitted Fundamentals of D2D (Fundamental architecture, Classification on the basis of spectrum accessed and degree of involvement of base station , channel models).Proposed architecture for adaptive time slot allocation to all users (cellular as well as D2D users).Security in D2D communication: possible attacks, available literature and proposed solution for securing direct links using IP Sec.


IEEE Access | 2017

Green Communication in Next Generation Cellular Networks: A Survey

Pimmy Gandotra; Rakesh Kumar Jha; Sanjeev Jain

In order to meet the intense user demands, the 5G networks are evolving, and will be available by 2020. The unfolding cellular technology has raised the energy consumption in mobile networks with the carbon footprint surging to alarming rates. This is causing an adverse effect on the environment and human health. Addressing these aspects, this paper presents a survey on techniques for making the next generation cellular networks GREEN. A number of technologies form a part of the 5G networks, in order to support the drastic user demands, and are receiving substantial attention from the perspective of green communication. These include device-to-device communication, spectrum sharing, ultra dense networks, massive MIMO, and the Internet of Things. Also, a prime concern in the current scenario is the battery life of the mobile terminals. For enhancing the battery life of the user terminals, a proposal is given in this paper, with spectrum sharing as its basis, to overcome the energy crunch. Major research challenges have been discussed, and the ongoing projects and standardization activities also stated in this paper.


Journal of Network and Computer Applications | 2017

A survey on ultra-dense network and emerging technologies: Security challenges and possible solutions

Garima Chopra; Rakesh Kumar Jha; Sanjeev Jain

Abstract The recent advancements in the field of next generation mobile communication provides scope to a variety of new areas by connecting various devices through a common platform for data transfer. The addition of several applications like e-health monitoring, smart homes, surveillance etc can be managed from a remote location. It not only opens the door for new researches but also boost the requirement to secure the network from the eye of the potential attackers. In this paper, a detailed survey has been done on security issues and their possible solutions in Ultra Dense Networks for 5G wireless network architecture. With this, a detailed explanation about security issues of physical layer in Massive MIMO, Jamming, VANET and D2D have been provided with best efforts. Also, the description about the security flaws of spectrum shared, IoT devices have been explained. At the end, the architecture for security attacks in UDN has been proposed with proper thought process in the increasing order of their risk factor.


International Journal of Communication Systems | 2017

Attack modeling and intrusion detection system for 5G wireless communication network

Akhil Gupta; Rakesh Kumar Jha; Sanjeev Jain

Summary Research has been going around the globe to overcome the challenges that are associated with the increase in the number of users, such as interference management, load sharing, and increased capacity. 5G is emerging as a budding prospect for fulfilling demand and overcoming these challenges. For meeting the increased demands, new technologies such as relays in device-to-device communication and small cell access points have been introduced. However, these introductions have opened up security issues in the 5G wireless communication networks. This article focuses on security issues of the 5G wireless communication networks and analyzes the effect of a bandwidth spoofing attack using game theory on the small cell access point in 5G wireless communication network. This article also proposes an adaptive intrusion detection system using a hidden Markov Model for detecting an intrusion on small cell access point in a 5G wireless communication networks.


Telecommunication Systems | 2018

Joint power allocation and relay selection strategy for 5G network: a step towards green communication

Akshita Abrol; Rakesh Kumar Jha; Sanjeev Jain; Preetam Kumar

Green communication has emerged as the most important concept for the next generation networks. Along with improved data rate and capacity, the upcoming 5G networks aim at improving energy efficiency without compromising on the user experience. In this paper, we have used amplify and forward relays in the heterogeneous network topology consisting of low power and high power nodes. A three layered system model for power optimization is discussed using a relay selection strategy for power optimization with the aim to improve energy efficiency of the network. Further, we have used Hidden Markov Model for training and maintaining of base station, relay and SCA with the aim of probabilistic power allocation to client nodes in order to solve the power optimization problem. We have also used adaptive modulation schemes for lowering the power consumption of the network to meet our goal of green communication for the next generation network.


Journal of Network and Computer Applications | 2018

RBA: Region Based Algorithm for Secure Harvesting in Ultra Dense Network

Garima Chopra; Rakesh Kumar Jha; Sanjeev Jain

Abstract Wireless Networks are vulnerable to many identity based attacks. However, those attacks are more dominating for 5G Ultra Dense Network (UDN) due to tremendous increase in density of users and small coverage with low power access nodes. In this paper, we investigate the potential weaknesses related to security for UDN environment in picocells especially for handover conditions. We propose a novel scheme for the detection of spoofing attack that examines the probability distributions of Received Power based on the regions for mobile (moving) user. We further investigate the impact on Secrecy Capacity of targeted user in the absence and presence of Eavesdropper. Also, we evaluate our methods through simulation results for three different regions. On the basis of results, we propose an algorithm called Region Based Algorithm (RBA) for the protection of highly sensitive zones i.e. where the probability of attack is maximum. Also, comparison among various security algorithms are made for energy consumption of different patterns. Finally, simulation results further reveal that our proposed algorithm for protection (RBA) proves to be energy efficient (secure harvesting) as it reduces energy requirement for encrypting the data more than 70% and thus, results in low computational time.


IEEE Transactions on Vehicular Technology | 2018

Possible Security Attack Modeling in Ultradense Networks Using High-Speed Handover Management

Garima Chopra; Sanjeev Jain; Rakesh Kumar Jha

The next generation of mobile communication has progressed toward the deployment of small cells to meet the growing demands of increased capacity and QoS as compared to the conventional method, where all the computations were performed by the base station (BS)s only. To reduce burden at the BS side, small cells deployment has been stressed upon, thus resulting in the formation of ultradense networks (UDN) having high concentration of small cells (e.g., picocell, femtocell, hotspots) and as a counter effect of which distance between two small cells is reduced to a greater extent. With such a close association of cells in UDN, the probability of frequent handovers also increases abruptly. As a result, the chances for attacker to spoof the bandwidth also increases many folds. In this paper, we have analyzed SNR, signal-to-interference-plus-noise ratio, and channel quality information channel parameters, such that the position of moving users at which handover is initiated in picocell deployment of UDN can be traced out successfully or region where the probability of attackers presence is high. Through this paper, we have tried to introduce the attacking scenario for the high mobility conditions in UDN.


IEEE Transactions on Vehicular Technology | 2018

Sector-Based Radio Resource Allocation (SBRRA) Algorithm for Better Quality of Service and Experience in Device-to-Device (D2D) Communication

Pimmy Gandotra; Rakesh Kumar Jha; Sanjeev Jain

The mounting content sharing among users has resulted in a considerable rise in wireless data traffic, pressurizing the cellular networks to undergo a suitable upheaval. A competent technology of the fifth-generation (5G) networks for efficiently supporting proximity-based applications is device-to-device (D2D) communication, underlaying cellular networks. Significant advances have been made till date, for allocating resources to D2D users in cellular networks, such that sharing of spectral resources between cellular and D2D users is carried out in a coordinated manner. In this paper, a sector-based radio resource allocation (SBRRA) algorithm for resource block (RB) allocation to D2D pairs has been proposed, where the number of resource blocks (RBs) is allocated to each D2D pair in an adaptive manner, based on the demanded application by each pair. Different applications demand a varying number of RBs, in accordance with their priority. This algorithm focuses on the use of sectored antennas at the base station, for a better performance and low complexity. Extensive simulations are carried out, considering real-time scenario, for ensuring satisfactory quality of service (QoS) and quality of experience (QoE) by the users. The efficiency of the proposed scheme is proved by comparing it with the RB allocation using hidden Markov model.


Aeu-international Journal of Electronics and Communications | 2017

Implementation of Intrusion Detection System using Adaptive Neuro-Fuzzy Inference System for 5G wireless communication network

Reeta Devi; Rakesh Kumar Jha; Akhil Gupta; Sanjeev Jain; Preetam Kumar


IEEE Transactions on Vehicular Technology | 2018

Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network

Akhil Gupta; Rakesh Kumar Jha; Pimmy Gandotra; Sanjeev Jain

Collaboration


Dive into the Sanjeev Jain's collaboration.

Top Co-Authors

Avatar

Rakesh Kumar Jha

Shri Mata Vaishno Devi University

View shared research outputs
Top Co-Authors

Avatar

Garima Chopra

Shri Mata Vaishno Devi University

View shared research outputs
Top Co-Authors

Avatar

Pimmy Gandotra

Shri Mata Vaishno Devi University

View shared research outputs
Top Co-Authors

Avatar

Uday Pratap Singh

Madhav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Akhil Gupta

Shri Mata Vaishno Devi University

View shared research outputs
Top Co-Authors

Avatar

Rajeev Kumar Singh

Madhav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Akhilesh Tiwari

Madhav Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Preetam Kumar

Indian Institute of Technology Patna

View shared research outputs
Top Co-Authors

Avatar

A.V. Dehankar

Priyadarshini College of Engineering

View shared research outputs
Top Co-Authors

Avatar

Ajay Kaul

Shri Mata Vaishno Devi University

View shared research outputs
Researchain Logo
Decentralizing Knowledge