Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Uttam Ghosh is active.

Publication


Featured researches published by Uttam Ghosh.


ad hoc networks | 2011

A secure dynamic IP configuration scheme for mobile ad hoc networks

Uttam Ghosh; Raja Datta

Secure dynamic IP addressing is a prime requirement for unicast communication between authorized hosts in mobile ad hoc networks (MANETs). Recently, several approaches have been proposed for dynamic addressing scheme. However, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In this paper, we present an ID based dynamic IP configuration scheme that can securely allocate IP addresses to the authorized hosts for a mobile ad hoc network without broadcasting over the entire network. Each host in the MANET can generate an unique IP address from its own IP address for a new host. The proposed scheme provides authentication for address configuration without the help of a trusted third party while taking care of the security-threats associated with dynamic IP configuration. Performance analysis shows that even with added security mechanisms our proposed addressing scheme has fairly good addressing latency and control overhead compared to the similar existing schemes. Moreover, the proposed scheme is able to solve the problem of network partitions and mergers along with the arrival and departure of a host efficiently and securely.


International Journal of Ultra Wideband Communications and Systems | 2009

ADIP: an improved authenticated dynamic IP configuration scheme for mobile ad hoc networks

Uttam Ghosh; Raja Datta

Dynamic IP configuration is a major requirement for mobile ad hoc networks that grows from one node to many. Recently, a number of schemes for such IP assignments have been proposed in the literature. But very few of them consider security aspects while assigning the addresses among the nodes. In this paper, we propose an authenticated dynamic IP configuration scheme that can securely allocate IP addresses to the individual nodes of a MANET. In this scheme, each node of a MANET can generate new unique IP address from its own IP address for a new authenticated host. The authentication for address configuration is done with the help of a trusted third party and as such it is capable of handling the security threats associated with a general dynamic IP configuration. Performance analysis and simulation results show that, even while deploying the security attributes, the communication overhead and addressing latency of our proposed addressing scheme are at par with and in some cases much better than some popular similar existing schemes.


wireless communications and networking conference | 2012

A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks

Uttam Ghosh; Raja Datta

Secure distributed IP addressing is a prime requirement in mobile ad hoc networks (MANETs) for unicast communication. Several types of security threats have been observed in most of the proposed dynamic addressing approaches as they rely on broadcasting for address solicitation and/ or duplicate address detection. In this paper, we propose an ID based distributed dynamic IP configuration scheme to securely allocate IP addresses to the authorized hosts for a MANET without broadcasting over the entire network. Each host can generate unique IP addresses from its own IP address and can assign those addresses to the new nodes. In addition, we propose a novel signature scheme that authenticates and lessens the security threats associated with dynamic IP configuration. Proof of correctness of the proposed signature scheme verifies that the scheme is secure against any forgery attack. Extensive simulation results show that the proposed addressing scheme has low overhead and fairly good addressing latency with added security mechanisms as compared to similar existing dynamic configuration schemes. Moreover, the proposed scheme is robust and can efficiently solve the problem of network partitions and mergers.


international conference on wireless technologies for humanitarian relief | 2011

Identity based secure AODV and TCP for mobile ad hoc networks

Uttam Ghosh; Raja Datta

Security is a prime requirement for communication between authorized hosts in mobile ad hoc networks(MANETs). Recently, several approaches have been proposed to secure the routing of MANET. However, most of the approaches do not consider the security aspect on data transmission of transmission control protocol (TCP). As a result, several types of security threats in TCP can be observed. In this paper, we propose an identity (ID) based scheme that secures AODV and transmit TCP data to the authorized hosts. The proposed scheme secures the AODV using sequential aggregate signatures (SAS) based on RSA and also securely generates the session key for the MANET nodes to secure the TCP. In the proposed scheme, each node have an ID which is evaluated from its public key and messages are sent along with signature/MAC for authentication purpose. Following the proposed scheme a node cannot change its ID throughout the lifetime of the MANET. Therefore, the scheme is secure against the attacks that are associated with AODV and TCP in MANET. Performance analysis shows that our proposed scheme is secure and efficient against various types of attacks with fairly good overhead.


IEEE Transactions on Network and Service Management | 2015

A Secure Addressing Scheme for Large-Scale Managed MANETs

Uttam Ghosh; Raja Datta

In this paper, we propose a low-overhead identity-based distributed dynamic address configuration scheme for secure allocation of IP addresses to authorized nodes of a managed mobile ad hoc network. A new node will receive an IP address from an existing neighbor node. Thereafter, each node in a network is able to generate a set of unique IP addresses from its own IP address, which it can further assign to more new nodes. Due to lack of infrastructure, apart from security issues, such type of networks poses several design challenges such as high packet error rate, network partitioning, and network merging. Our proposed protocol takes care of these issues incurring less overhead as it does not require any message flooding mechanism over the entire MANET. Performance analysis and simulation results show that even with added security mechanisms, our proposed protocol outperforms similar existing protocols.


international conference of distributed computing and networking | 2012

An ID based secure distributed dynamic IP configuration scheme for mobile ad hoc networks

Uttam Ghosh; Raja Datta

Secure dynamic IP addressing is a prime requirement in mobile ad hoc networks (MANETs), as the node cannot participate in unicast communications or routing until it is assigned a unique address. Recently, several approaches have been proposed for dynamic address allocation in MANET and most of the these approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats can be observed at the time of address allocation. In this paper, we present an ID based distributed dynamic IP configuration scheme that securely allocate IP addresses to the authorized nodes for a mobile ad hoc network without broadcasting throughout the network. The scheme is distributed among MANET nodes and therefore each node can generate unique IP addresses from its own IP address and can assign that addresses to the new nodes. The proposed scheme provides authentication for address allocation without the help of a trusted third party while taking care of the security-threats associated with dynamic IP allocation protocol. Performance analysis shows that the proposed addressing scheme has low control overhead and fairly good addressing latency with added security mechanisms compared to the similar existing configuration schemes. Moreover, the proposed scheme is efficient and secure to solve the problem of network partitions and mergers along with the arrival and departure of a node.


Wireless Networks | 2014

A trust enhanced secure clustering framework for wireless ad hoc networks

Pushpita Chatterjee; Uttam Ghosh; Indranil Sengupta; Soumya K. Ghosh

Secure clustering in Wireless Ad Hoc Networks is a very important issue. Traditional cryptographic solution is useless against threats from internal compromised nodes. In light of this, we propose a novel distributed secure trust aware clustering protocol that provides secure solution for data delivery. A trust model is proposed that computes the trust of a node using self and recommendation evidences of its one-hop neighbors. Therefore, it is lightweight in terms of computational and communication requirements, yet powerful in terms of flexibility in managing trust. In addition, the proposed clustering protocol organizes the network into one-hop disjoint clusters and elects the most qualified, trustworthy node as a Clusterhead. This election is done by an authenticated voting scheme using parallel multiple signatures. Analysis of the protocol shows that it is more efficient and secure compared to similar existing schemes. Simulation results show that proposed protocol outperforms the popular ECS, CBRP and CBTRP in terms of throughput and packet delivery ratio with a reasonable communication overhead and latency in presence of malicious nodes.


Iete Journal of Research | 2014

Energy Aware Secure Routing for Wireless Ad Hoc Networks

Waleed S. Alnumay; Pushpita Chatterjee; Uttam Ghosh

ABSTRACT In this paper, we present a clustering-based energy aware secure routing protocol that computes trustworthy and energy efficient secure routes for wireless ad hoc networks (WANETs). Clustering in ad hoc networking paradigm is very useful for achieving scalability and robustness as it helps to save the bandwidth, to take simpler routing decisions, thus results in decreased energy dissipation of the network. WANETs are often deployed in such places where recharge or replace of energy sources is difficult. Further, unpredicted mobility and quasi-static nature of nodes and dynamic network topology yield a serious need for battery awareness during routing. In light of this, we first provide a definition of network lifetime based on application-specific criteria. Also a mathematical model for calculating residual battery power has been framed to propose an energy aware routing protocol. Trust-based scheme is used to assure secure end-to-end delivery of packets in the network. Extensive simulation has been carried out to show the efficacy of the proposed protocol to prolong the network lifetime.


International Journal of Network Management | 2013

IDSDDIP: a secure distributed dynamic IP configuration scheme for mobile ad hoc networks

Uttam Ghosh; Raja Datta

SUMMARY In IP-based networks, IP address uniqueness is one of the most important requirements since a node has to participate in unicast communications and routing. Often nodes are assumed to have unique IP addresses configured a priori. However, this is not the case and cannot be achieved easily in mobile ad hoc networks (MANETs). Most of the existing dynamic address allocation schemes of MANET rely on network-wide flooding for address solicitation and/or duplicate address detection. As a result, several types of security threats can be seen at the time of address allocation. In this paper, we present an ID-based distributed dynamic IP configuration scheme that securely allocates IP addresses to the authorized nodes without flooding the entire network. Here each node acquires capability of generating unique IP addresses from its own IP address and can assign those addresses to the new nodes. The proposed scheme provides security against the associated threats with dynamic IP allocation protocol without the help of a trusted third party. It also efficiently handles the network partitioning and merging and reduces the chance of address conflicts. Performance analysis and simulation results are present to show that the proposed addressing scheme has low communication overhead and fairly low addressing latency with added security mechanisms compared to the similar existing dynamic address allocation schemes. Copyright


Iete Journal of Research | 2013

P-TCP: A Prediction-based Secure Transmission Control Protocol for Wireless Ad Hoc Networks

Uttam Ghosh; Raja Datta

AbstractIn this paper, we propose a prediction-based transmission control protocol (P-TCP) for wireless ad hoc networks that takes feedback from network layer to detect different types of packet losses and adjusts its parameters dynamically according to the varying network environment. Our proposed protocol predicts the values of the control parameters congestion window, congestion window limit, round trip time, and retransmission timeout from their previous state values. A security mechanism has been integrated with the protocol to make it usable in the highly vulnerable wireless ad hoc networks. A low complexity identity-based public key cryptography is proposed that generates a secret session key between source and destination nodes. The three-way handshaking process of P-TCP is secured using this secret session key. Performance comparison along with security analysis shows that the scheme is more efficient and secured compared to similar existing schemes. Simulation results show that P-TCP outperforms...

Collaboration


Dive into the Uttam Ghosh's collaboration.

Top Co-Authors

Avatar

Raja Datta

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Pushpita Chatterjee

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Indranil Sengupta

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Soumya K. Ghosh

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Deepak K. Tosh

Norfolk State University

View shared research outputs
Top Co-Authors

Avatar

Kaiqi Xiong

University of South Florida

View shared research outputs
Researchain Logo
Decentralizing Knowledge