Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Suparna Biswas is active.

Publication


Featured researches published by Suparna Biswas.


international conference on advanced computing | 2016

A Novel Cluster Head Selection Algorithm for Energy-Efficient Routing in Wireless Sensor Network

Suparna Biswas; Jayita Saha; Tanumoy Nag; Chandreyee Chowdhury; Sarmistha Neogy

Wireless sensor networks consist of low power lightweight sensor nodes that are often placed remotely for applications like wildlife monitoring, rainforest monitoring, military surveillance, forest fire detection etc. Here energy is a critical issue as nodes cannot be recharged and/or replaced frequently. In this paper we propose an energy efficient hierarchical routing protocol for Wireless Sensor Networks to increase network lifetime. Here the cluster head is selected based on the residual energy, distance of the node from the base station, how recently the node was selected as cluster-head etc. Along with this, the proposed solution can also detect malicious nodes in the network and can prevent them from becoming cluster heads. The simulation results show that proposed solution provides good performance in terms of extending network lifetime, uniform selection of nodes as cluster head that eliminates the probability of a single node from draining away its power by its repetitive selection as a cluster head.


Archive | 2018

Implementation of Cloud-Assisted Secure Data Transmission in WBAN for Healthcare Monitoring

Sohail Saif; Rajni Gupta; Suparna Biswas

This work presents the cloud-assisted secure WBAN for healthcare application. There are various security issues associated with WBAN, which need to be solved to provide a secure real-time health monitoring system. Through this implementation, the patient’s vital signals can be accessed in a secure manner in real time remotely by sensors and networks without visiting doctor’s clinic or hospital. Here, we provide the cost-effective solution for the transmission of the patient’s health data to doctor with proper confidentiality, authenticity, freshness, and security using cloud computing. In this work, the biosignals of patients and doctors are used to provide authenticity and vital signals are encrypted by using Advanced Encryption Standard (AES) for the secure m-health application. We have experimentally analyzed the average end-to-end delay for secure healthcare application is 14.59 and 19.31 ms in off-peak hours and peak hours respectively. This delay is only 5.84% in off-peak hours and 7.72% in peak hours of permissible delay of 250 ms for medical application.


Archive | 2019

Secure Data Transmission Beyond Tier 1 of Medical Body Sensor Network

Sohail Saif; Suparna Biswas

Medical body sensor network (MBSN), a three-tier architectural network, has been in wide use on demand for remote health monitoring and support in both urban and rural areas. Primary concern of such system is security of sensitive health data along with low end-to-end delay and energy consumption among others. This paper implements secure patient data transmission between tier 2 and tier 3 by ensuring confidentiality and integrity. Man-in-middle attack and distributed denial of service attack can be detected based on end-to-end delay in data transmission. Hash-based secret key is used for encryption which is generated using extracted biological information of user at coordinator PDA of MBSN. Using shared extracted biological information, secret key is regenerated at cloud-based medical server for decryption of data. Experimental results show using different symmetric key encryption techniques, maximum end-to-end delay is only 11.82% of 250 ms which is the maximum permissible delay limit for healthcare application.


Information-an International Interdisciplinary Journal | 2018

An Ensemble of Condition Based Classifiers for Device Independent Detailed Human Activity Recognition Using Smartphones

Jayita Saha; Chandreyee Chowdhury; Ishan Roy Chowdhury; Suparna Biswas; Nauman Aslam

Human activity recognition is increasingly used for medical, surveillance and entertainment applications. For better monitoring, these applications require identification of detailed activity like sitting on chair/floor, brisk/slow walking, running, etc. This paper proposes a ubiquitous solution to detailed activity recognition through the use of smartphone sensors. Use of smartphones for activity recognition poses challenges such as device independence and various usage behavior in terms of where the smartphone is kept. Only a few works address one or more of these challenges. Consequently, in this paper, we present a detailed activity recognition framework for identifying both static and dynamic activities addressing the above-mentioned challenges. The framework supports cases where (i) dataset contains data from accelerometer; and the (ii) dataset contains data from both accelerometer and gyroscope sensor of smartphones. The framework forms an ensemble of the condition based classifiers to address the variance due to different hardware configuration and usage behavior in terms of where the smartphone is kept (right pants pocket, shirt pockets or right hand). The framework is implemented and tested on real data set collected from 10 users with five different device configurations. It is observed that, with our proposed approach, 94% recognition accuracy can be achieved.


International Journal of Trust Management in Computing and Communications | 2014

Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing – recovery

Suparna Biswas; Priyanka Dey; Sarmistha Neogy

In this work, we have proposed a mobility-based secure checkpointing and log-based rollback recovery technique to provide fault tolerance to mobile hosts (MHs) in infrastructured wireless/mobile computing system, like, wireless cellular network. This work has been modified accordingly to be applicable in infrastructure less network, i.e., mobile ad hoc network (MANET) in which MHs save checkpoint adaptively based on their energy and mobility. Transient failures in cluster-based mobile ad hoc network (MANET) may be caused by insufficient energy of mobile hosts, among other reasons. To prevent data loss due to transient failure caused by lack of sufficient energy, mobile hosts save checkpoint if remaining energy becomes equal to a predefined threshold. A trust-based recovery technique is used for successful recovery of failed mobile hosts. To make checkpoints secure, only trusted mobile hosts participate in the proposed checkpoint-recovery process.


International Journal of Wireless & Mobile Networks | 2012

MOBILITY BASED CHECKPOINTING AND TRUST BASED RECOVERY IN MANET

Suparna Biswas; Sarmistha Neogy; Priyanka Dey


International Journal of Computer Applications | 2015

A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network

Suparna Biswas; Subhajit Adhikari


International Journal of Network Security & Its Applications | 2012

HANDOFF BASED SECURE CHECKPOINTING AND LOG BASED ROLLBACK RECOVERY FOR MOBILE HOSTS

Priyanka Dey; Suparna Biswas


international conference on emerging applications of information technology | 2018

WBAN Security: study and implementation of a biological key based framework

Koushik Karmakar; Sohail Saif; Suparna Biswas; Sarmistha Neogy


Microsystem Technologies-micro-and Nanosystems-information Storage and Processing Systems | 2018

Two phase ensemble classifier for smartphone based human activity recognition independent of hardware configuration and usage behaviour

Jayita Saha; Chandreyee Chowdhury; Suparna Biswas

Collaboration


Dive into the Suparna Biswas's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Priyanka Dey

West Bengal University of Technology

View shared research outputs
Top Co-Authors

Avatar

Koushik Karmakar

Narula Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge