Biplab Sikdar

According to our database1, Biplab Sikdar authored at least 168 papers between 2000 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks.
IEEE Trans. Information Forensics and Security, 2020

Consumer IoT: Security Vulnerability Case Studies and Solutions.
IEEE Consumer Electronics Magazine, 2020

2019
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication.
IEEE Trans. Smart Grid, 2019

Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication.
IEEE Trans. Smart Grid, 2019

Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids.
IEEE Trans. Information Forensics and Security, 2019

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices.
IEEE Internet of Things Journal, 2019

Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff.
IEEE Internet of Things Journal, 2019

Data Provenance for IoT With Light Weight Authentication and Privacy Preservation.
IEEE Internet of Things Journal, 2019

Two-Factor Authentication for IoT With Location Information.
IEEE Internet of Things Journal, 2019

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures.
IEEE Access, 2019

DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Detecting Selective Modification in Vehicular Edge Computing.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Transient Model-Based Detection Scheme for False Data Injection Attacks in Microgrids.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Detection of Stealthy attacks on Electric Grids Using Transient Analysis.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

An Efficient Privacy-Friendly Multi-Hop Data Aggregation Scheme for Smart Grids.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

Impact of GPS Time Spoofing Attacks on Cyber Physical Systems.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Detecting RSU Misbehavior in Vehicular Edge Computing.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Achieving Fairness in IEEE 802.11ah Networks for IoT Applications with Different Requirements.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

BlockCom: A Blockchain Based Commerce Model for Smart Communities using Auction Mechanism.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Data Provenance for IoT using Wireless Channel Characteristics and Physically Unclonable Functions.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Machine Learning-based Jamming Detection in Wireless IoT Networks.
Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium, 2019

2018
Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters.
IEEE Trans. Smart Grid, 2018

An Online Mechanism for Detection of Gray-Hole Attacks on PMU Data.
IEEE Trans. Smart Grid, 2018

Green Energy and Delay Aware Downlink Power Control and User Association for Off-Grid Solar-Powered Base Stations.
IEEE Systems Journal, 2018

An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids.
IEEE Internet of Things Journal, 2018

Low Power Data Integrity in IoT Systems.
IEEE Internet of Things Journal, 2018

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication.
IEEE Internet of Things Journal, 2018

Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments.
Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, 2018

Detecting Forwarding Misbehavior In Clustered IoT Networks.
Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2018

Mitigating loT Device based DDoS Attacks using Blockchain.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids.
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018

Fair Scheduling of Concurrent Transmissions in Directional Antenna Based WPANs/WLANs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Adaptive N-Policy Queueing System Design for Energy Efficient and Delay Sensitive Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Opportunistic MAC protocol for co-existence of M2M and Wi-Fi network.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Delay Aware Resource Management for Grid Energy Savings in Green Cellular Base Stations With Hybrid Power Supplies.
IEEE Trans. Communications, 2017

Mutual Authentication in IoT Systems Using Physical Unclonable Functions.
IEEE Internet of Things Journal, 2017

O-MAC: Opportunistic MAC Protocol for M2M Communication in WiFi White Spaces.
IEEE Communications Letters, 2017

STDMA scheduling for WLANs and WPANs with non-uniform traffic demand.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

Hop-Count Based Forwarding for Seamless Producer Mobility in NDN.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Light-Weight Mutual Authentication Protocol for IoT Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Physically secure mutual authentication for IoT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Efficient detection of false data injection attacks on AC state estimation in smart grids.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Secure Data Provenance for the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
Characterization of White Spaces in Wi-Fi Networks for Opportunistic M2M Communications.
IEEE Trans. Communications, 2016

Power Outage Estimation and Resource Dimensioning for Solar Powered Cellular Base Stations.
IEEE Trans. Communications, 2016

An Energy and Delay Aware Downlink Power Control Strategy for Solar Powered Base Stations.
IEEE Communications Letters, 2016

Solar powered cellular base stations: current scenario, issues and proposed solutions.
IEEE Communications Magazine, 2016

Detecting data integrity attacks on SCADA systems using limited PMUs.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Downlink power control for latency aware grid energy savings in green cellular networks.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Detecting data tampering attacks in synchrophasor networks using time hopping.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2016

Anomaly detection in diurnal CPS monitoring data using a local density approach.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Position Paper: Physical Unclonable Functions for IoT Security.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

2015
On the Feasibility of Using WiFi White Spaces for Opportunistic M2M Communications.
IEEE Wireless Commun. Letters, 2015

A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications.
IEEE Internet of Things Journal, 2015

Detecting malicious manipulation of synchrophasor data.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On exploiting white spaces in WiFi networks for opportunistic M2M communications.
Proceedings of the 2015 IEEE International Workshop on Local and Metropolitan Area Networks, 2015

Outage estimation for solar powered cellular base stations.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Optimal parameter selection for discrete-time throughput-optimal MAC protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Efficient packet recovery in wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Real-time detection of packet drop attacks on synchrophasor data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Queue-aware optimal frequency selection for energy minimization in wireless networks.
Proceedings of the IEEE Latin-America Conference on Communications, 2014

A wireless MAC protocol with efficient packet recovery.
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014

A mechanism for detecting data manipulation attacks on PMU data.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Dimensioning stand-alone cellular base station using series-of-worst-months meteorological data.
Proceedings of the IEEE International Conference on Communication Systems, 2014

A mechanism for detecting gray hole attacks on synchrophasor data.
Proceedings of the IEEE International Conference on Communications, 2014

Addressing the energy-delay tradeoff in wireless networks with load-proportional energy usage.
Proceedings of the IEEE International Conference on Communications, 2014

Resource provisioning and dimensioning for solar powered cellular base stations.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An Analytical Approach to the Design of Energy Harvesting Wireless Sensor Nodes.
IEEE Trans. Wireless Communications, 2013

An Energy Saving Throughput-Optimal MAC Protocol for Cooperative MIMO Transmissions.
IEEE Trans. Communications, 2013

A study of the environmental impact of wired and wireless local area network access.
IEEE Trans. Consumer Electronics, 2013

A mechanism for load proportional energy use in wireless local area networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Comparison of Broadcasting Schemes for Infrastructure to Vehicular Communications.
IEEE Trans. Intelligent Transportation Systems, 2012

Queueing Analysis of Polling Based Wireless MAC Protocols with Sleep-Wake Cycles.
IEEE Trans. Communications, 2012

A Queueing Model for Polled Service in WiMAX/IEEE 802.16 Networks.
IEEE Trans. Communications, 2012

A CART based mechanism for collision detection in IEEE 802.11.
Proceedings of the IEEE Latin-America Conference on Communications, 2012

An analytical approach towards cooperative relay scheduling under partial state information.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Collision detection in IEEE 802.11 networks by error vector magnitude analysis.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Distinguishing between channel errors and collisions in IEEE 802.11.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Relay Scheduling for Cooperative Communications in Sensor Networks with Energy Harvesting.
IEEE Trans. Wireless Communications, 2011

Defending Synchrophasor Data Networks Against Traffic Analysis Attacks.
IEEE Trans. Smart Grid, 2011

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Throughput Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays.
IEEE Trans. Communications, 2011

2010
A mechanism for detecting session hijacks in wireless networks.
IEEE Trans. Wireless Communications, 2010

A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems.
IEEE Trans. Parallel Distrib. Syst., 2010

Characterization and Abatement of the Reassociation Overhead in Vehicle to Roadside Networks.
IEEE Trans. Communications, 2010

Energy Efficient Transmission Strategies for Body Sensor Networks with Energy Harvesting.
IEEE Trans. Communications, 2010

Environmental impact of IEEE 802.11 access points: a case study.
SIGMETRICS Performance Evaluation Review, 2010

A population based approach to model the lifetime and energy distribution in battery constrained wireless sensor networks.
IEEE Journal on Selected Areas in Communications, 2010

Performance Modeling of Transmission Schedulers for Sensor Networks Capable of Energy Harvesting.
Proceedings of IEEE International Conference on Communications, 2010

Relay Usage Scheduling in Sensor Networks with Energy Harvesting.
Proceedings of IEEE International Conference on Communications, 2010

A Performance Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays.
Proceedings of the Global Communications Conference, 2010

Cooperative Relay Scheduling under Partial State Information in Energy Harvesting Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Queueing analysis of polled service classes in the IEEE 802.16 MAC protocol.
IEEE Trans. Wireless Communications, 2009

Multicasting with Localized Control in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2009

A distributed coordination scheme to improve the performance of IEEE 802.11 in multi-hop networks.
IEEE Trans. Communications, 2009

A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms.
IEEE Trans. Computers, 2009

An Online Mechanism for BGP Instability Detection and Analysis.
IEEE Trans. Computers, 2009

A Threshold Based MAC Protocol for Cooperative MIMO Transmissions.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A Framework for Modeling the Lifetime and Residual Energy Distribution in Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Scalable Peer-to-Peer Video Streaming in WiMAX Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks.
IEEE/ACM Trans. Netw., 2008

An online scheme for the isolation of BGP misconfiguration errors.
IEEE Trans. Network and Service Management, 2008

A Swarm-Intelligence-Based Protocol for Data Acquisition in Networks with Mobile Sinks.
IEEE Trans. Mob. Comput., 2008

Classification and Evaluation of Examples for Teaching Probability to Electrical Engineering Students.
IEEE Trans. Education, 2008

Design and Analysis of a MAC Protocol for Vehicle to Roadside Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Real-Time Algorithm for Long Range Signal Strength Prediction in Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Medium Access Control in Vehicle to Roadside Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Wavelet Based Long Range Signal Strength Prediction in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Mobility Based Architecture for Underwater Acoustic Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Broadcasting Scheme for Infrastructure to Vehicle Communications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Distributed System for Cooperative MIMO Transmissions.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols.
IEEE Trans. Wireless Communications, 2007

An Analytic Model for the Delay in IEEE 802.11 PCF MAC-Based Wireless Networks.
IEEE Trans. Wireless Communications, 2007

Distributed Mobility Transparent Broadcasting in Vehicle-to-Vehicle Networks.
IEEE Trans. Vehicular Technology, 2007

A Wireless MAC Protocol with Collision Detection.
IEEE Trans. Mob. Comput., 2007

Modeling Seed Scheduling Strategies in BitTorrent.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Optimal Cluster Head Selection in the LEACH Architecture.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Performance Analysis of Polling based TDMA MAC Protocols with Sleep and Wakeup Cycles.
Proceedings of IEEE International Conference on Communications, 2007

On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics.
Proceedings of IEEE International Conference on Communications, 2007

Real Time Detection of Link Failures in Inter Domain Routing.
Proceedings of IEEE International Conference on Communications, 2007

A MAC Protocol for Cooperative MIMO Transmissions in Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Wavelet Based Detection of Shadow Fading in Wireless Networks.
Proceedings of the Global Communications Conference, 2007

2006
On randomizing the sending times in TCP and other window based algorithms.
Comput. Networks, 2006

Analysis of Contention-Based Multi-Channel Wireless MAC for Point-to-Multipoint Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Modeling malware propagation in Gnutella type peer-to-peer networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

SIMPLE: Using Swarm Intelligence Methodology to Design Data Acquisition Protocol in Sensor Networks with Mobile Sinks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Enhancing MAC Coordination to Boost Spatial Reuse in IEEE 802.11 Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006

Distributed Mobility Transparent Broadcast in Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A New MAC Protocol for Wireless Packet Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Statistical Approach to Anomaly Detection in Interdomain Routing.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
An efficient and scalable loss-recovery scheme for video multicast.
IEEE Trans. Multimedia, 2005

A population based approach to model network lifetime in wireless sensor networks.
SIGMETRICS Performance Evaluation Review, 2005

An analytic framework for modeling peer to peer networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Delay analysis of IEEE 802.11 PCF MAC based wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Analysis of 802.16 based last mile wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Multilayer multicast congestion control in satellite environments.
IEEE Journal on Selected Areas in Communications, 2004

A dynamic query-tree energy balancing protocol for sensor networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Queueing Analysis and Delay Mitigation in IEEE 802.11 Random Access MAC based Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A queueing model for finite load IEEE 802.11 random access MAC.
Proceedings of IEEE International Conference on Communications, 2004

Distance-aware virtual carrier sensing for improved spatial reuse in wireless networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Early detection of BGP instabilities resulting from Internet worm attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

On the impact of route processing and MRAI timers on BGP convergence times.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK.
IEEE/ACM Trans. Netw., 2003

On the impact of IEEE 802.11 MAC on traffic characteristics.
IEEE Journal on Selected Areas in Communications, 2003

Multicast loss recovery with active injection.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

Scalable and distributed GPS free positioning for sensor networks.
Proceedings of IEEE International Conference on Communications, 2003

Improving spatial reuse of IEEE 802.11 based ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

A multicast congestion control scheme for mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Input queued switches for variable length packets: analysis for Poisson and self-similar traffic.
Comput. Commun., 2002

Routing-Based Video Multicast Congestion Control.
Proceedings of the Management of Multimedia on the Internet, 2002

Modeling and analysis of traffic characteristics in IEEE 802.11 MAC based networks.
Proceedings of the Global Telecommunications Conference, 2002

On reducing the degree of second-order scaling in network traffic.
Proceedings of the Global Telecommunications Conference, 2002

2001
Integral expressions for the numerical evaluation of product form expressions over irregular multidimensional integer state spaces.
Telecommunication Systems, 2001

An integrated model for the latency and steady-state throughput of TCP connections.
Perform. Evaluation, 2001

On the Contribution of TCP to the Self-Similarity of Network Traffic.
Proceedings of the Evolutionary Trends of the Internet, 2001

A Multiplicative Multifractal Model for TCP Traffic.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Traffic management and network control using collaborative on-line simulation.
Proceedings of the IEEE International Conference on Communications, 2001

Variable Length Packet Switches: Input Queued Fabrics with Finite Buffers, Speedup, and Parallelism.
Proceedings of the High Performance Computing - HiPC 2001, 8th International Conference, 2001

Analytic models and comparative study of the latency and steady-state throughput of TCP Tahoe, Reno and SACK.
Proceedings of the Global Telecommunications Conference, 2001

2000
Queueing analysis of scheduling policies in copy networks of space-based multicast packet switches.
IEEE/ACM Trans. Netw., 2000

Variable Length Packet Switches: Delay Analysis of Crossbar Switches under Poisson and Self Similar Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000


  Loading...