Papers by Dr Vidushi Sharma

Attacks and challenges in wireless sensor networks
International Conference on Computing for Sustainable Global Development, Mar 16, 2016
The advances and developments in Wireless Communication technology have made the deployment of sm... more The advances and developments in Wireless Communication technology have made the deployment of small, low cost wireless sensor nodes connected through wireless medium, known as Wireless Sensor Networks (WSNs), technically and economically feasible. These WSNs have got numerous applications in various fields like military, environmental monitoring, health, industry etc. The nature of the data gathered by WSNs is sensitive so it is essential to prevent this data from malicious attacks and threats. Security has already become a major concern for WSNs because of the wide application of WSNs in security-critical areas. In this paper network security issues in WSNs are discussed. It provides a review of attacks performed typically on sensor networks and an in-depth survey of the existing security mechanisms. It also discourses certain security challenges relevant to the WSNs for future directions.
Power-aware Aggregated SEARCH: Enhancing Spectrum and Energy Efficiency of Sensor Networks
Stochastic Election of Appropriate Range Cluster Heads (SEARCH) represents a semi-centralized, cl... more Stochastic Election of Appropriate Range Cluster Heads (SEARCH) represents a semi-centralized, cluster head selection method that provides significant number of cluster heads in each round in a cost effective manner. The algorithm has been further refined for reduced energy consumption, higher throughput, improved stable period and therefore improved network lifetime by proposing Power-aware Aggregated SEARCH. Balancing the power requirement in the network along with local aggregation of data at the level of sensor nodes, result in significant improvement in throughput, reduced energy consumption and prolongs the lifetime of sensor network. The proposed technique paves a way to attain spectrum efficient IoT networks based on data aggregation at level of collector sensor nodes.
A Stochastic Model for Performance Evaluation of Hybrid Network Architectures of IoT with an Improved Design
Iete Journal of Research, Feb 12, 2023
Design and Performance Evaluation of Mqtt Based Stimulus Communication System for Iot
Social Science Research Network, 2022
CRC Press eBooks, Jul 28, 2017
Wireless sensor networks consist of sensor nodes with sensing and communication capabilities. Eff... more Wireless sensor networks consist of sensor nodes with sensing and communication capabilities. Efficient aggregation of data collected by sensors is crucial for a successful application of wireless sensor networks (WSNs). Both minimizing the energy cost and reducing the time duration of data aggregation have been extensively studied for WSNs. Algorithms with theoretical performance guarantees are only known under the protocol interference model, or graph-based interference models generally. A fundamental challenge in the design of Wireless Sensor Network (WSNs) is to maximize their lifetimes. Data aggregation has emerged as a basic approach in WSNs in order to reduce the number of transmissions of sensor nodes, and hence minimizing the overall power consumption in the network.

Sensor Network Security
.in Abstract - Recent advancements in wireless communication and electronics have led to the deve... more .in Abstract - Recent advancements in wireless communication and electronics have led to the development of low-cost wireless sensor networks (WSNs). A wireless sensor network consists of a large deployment of sensor nodes across a geographical area. When radio applications are considered, the sensor nodes sense the data and broadcast the sensed data to the destination or access point. In most applications, the sensor nodes are powered using batteries which are not rechargeable. In remote applications, it is even impossible to replace the batteries. Hence it is important to extend the network lifetime by minimizing the energy consumption of sensor nodes. It is essential to develop energy-efficient strategies to minimize the usage of battery power. Cooperative Multiple-Input-Multiple- Output (CMIMO) is a technique which is adopted in cluster-based WSN to bring in cooperation among the sensor nodes in a particular cluster. This technique exploits the multiple antennas present and cooperatively transmits the data to access point, thereby reducing the transmission energy. Data Aggregation is a technique which is combined with CMIMO to reduce the energy cost further by reducing the amount of data in transit. It is believed that closely spaced sensor nodes sense data that are spatially correlated. Thus redundancy exists in the data, which can be removed by data aggregation. The amount of data transmitted to the access point is thus reduced and the transmission cost is also reduced.
Polynomial based key management security schemes in wireless sensor networks: A review
Context Aware Hybrid Network Architecture for Iot with Machine Learning Based Intelligent Gateway
SN computer science, Mar 30, 2023
Adaptive Batching Schme for Multicast Near Video-On-Demand (Nvod) System
DOAJ (DOAJ: Directory of Open Access Journals), Mar 1, 2006
Letters in Drug Design & Discovery, Jun 1, 2008
We describe the case of a patient with refractory bipolar II depression who developed tolerance t... more We describe the case of a patient with refractory bipolar II depression who developed tolerance to lamotrigine and after failing to respond to dose escalation showed a robust response to a retrial of lamotrigine following a two week drug holiday.

Procedia Computer Science, 2018
Internet of Things (IoT) allow connection among devices using internet with the ability to gather... more Internet of Things (IoT) allow connection among devices using internet with the ability to gather and exchange data. These devices are usually attached with micro-controllers like Arduino, sensors, actuators and internet connectivity. In this context, Message Queuing Telemetry Transport protocol (MQTT) plays an important role to exchange the data or information between the devices in IoT without knowing the identities of each other. This paper presents different service models for communication in Internet of Things(IoT). Model A presents use of serial USB as transmission medium while Model B uses the Message Queuing Telemetry Transport protocol (MQTT) which deploy a Wi-Fi module (ESP8266-12) to connect the system to internet. For communication, concept of publisher and subscriber is used. Messages are published or subscribed with the help of a broker or server. This agent is in charge of dispersing messages to intent clients depending on the choice of the topic of a message. Broker in MQTT is also called server. Some brokers used in MQTT are:-Mosquitto, Adafruit, hiveMQ

A Critical Analysis of Sensor based IoT Architectures using Fuzzy TOPSIS
Internet of Things (IoT), a buzzword in Information and Communication Technology, offers a number... more Internet of Things (IoT), a buzzword in Information and Communication Technology, offers a number of promising and attractive applications in various fields like automation, monitoring and control, healthcare etc. These applications have equipped the people with convenience, ease of remote monitoring and control, increased productivity and reduced human intervention making the systems more autonomous. The capabilities of IoT architectures are limited by resource constrained sensor networks (limited bandwidth and power). This calls for the need to develop techniques and architectures that are efficient in terms of bandwidth and power. Hybridization (integration of wired and wireless technology) of sensor based IoT networks has been analyzed for different applications. The possible sensor network architectures (wired, wireless and hybrid) for IoT applications have been discussed along with the critical analysis of application specific requirements. Fuzzy TOPSIS (Technique for Order Preference by Similarity to Ideal Situation) has been used to determine the type of network that offers tailor made solution to a particular application. Also, generalized hybrid architecture has been proposed for IoT applications.

Trivariate Polynomial Based Key Management Scheme (TPB-KMS) in Hierarchical Wireless Sensor Networks
Advances in intelligent systems and computing, 2018
When wireless sensor network (WSN) is applied in defence like applications, the security of the n... more When wireless sensor network (WSN) is applied in defence like applications, the security of the network becomes a necessity as confidential information is being processed and communicated amongst nodes. In this paper, taking confidentiality and security of the remotely managed WSNs into consideration, a trivariate polynomials based key management scheme (TPB-KMS) is being proposed. This scheme utilises the multivariate polynomial here trivariate polynomials to generate keys for secure communication between the cluster heads and amongst sensor nodes also. The base station generates the polynomials and transmitted to the cluster head. In addition to this a particular emphasis is given to the key establishment between two nodes. The proposed scheme provides better security and reduced computational overhead in terms of keys generated and shared. The main feature of this scheme is scalability, as the WSN adapts with the new nodes joining into the network.
Context Aware Hybrid Network Architecture for Iot with Machine Learning Based Intelligent Gateway
SN Computer Science

Heuristic Load Balancing Algorithms in Vulnerable Cloud Computing Environment
2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Rapid innovation in IT sector has led to the development of cloud computing. Cloud Computing is a... more Rapid innovation in IT sector has led to the development of cloud computing. Cloud Computing is a general term for giving access to set of administrations over the web. Those administrations incorporate networks, servers, storage, applications, compute power other IT related assets. As cloud computing is sought after now-a-days, with the expansion for the cloud services, load on cloud is increasing excessively. So to lesser the unfriendly impacts of vulnerable computing condition, we have to adjust the load. In this paper, Honey bee behavior inspired load balancing (HBB-LB) is implemented. Further, to lesser the effect of drawbacks of HBB, we have proposed Ant Colony Optimization based Load Balancing Algorithm. Also, we have performed comparison for the algorithms considering some QoS factors.
Hidden Game Theory Based Trust Strategic Approach for Trustworthy Communication in the Internet of Things
International Journal of Sensor Networks
A robust and trusted framework for IoT networks
Journal of Ambient Intelligence and Humanized Computing

Light-Weight Hidden Markov Trust Evaluation Model for IoT network
2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
The open-ended nature of the Internet of Things (IoT) had whipped them vulnerable to a variety of... more The open-ended nature of the Internet of Things (IoT) had whipped them vulnerable to a variety of attacks, therefore the need of securing and stabilizing the network while keeping the integrity intact has become the most prominent requirement. Traditionally cryptographic methods were employed to secure networks but the demand of undesirable code size and processing time had given rise to trust-based schemes for addressing the misbehavior of attacks in the IoT networks. With reference to it, several trust-based schemes have been proposed by researchers. However, the prevailing schemes require high computational power and memory s pace; which weakens the network integrity and control. In this context, the paper presents a Light-weight Hidden Markov Model (L/W- HMT) for trust evaluation to alleviate the effect of compromised nodes and restricts the storage of unnecessary data to reduce overhead, memory, and energy consumption. This research work has presented a 2state HMM with Trusted state and compromised state together with essential and unessential output as observation state. Amount of packets forwarded, dropped, modified, and received are the parameters for state transition and emission matrices while the forward likelihood function evaluates the trust value of the node. Simulation performed on MATLAB indicates that the intended L/W-HMT scheme outperforms in connection with detection rate, packet delivery rate and energy consumption, on an average by 6% , 8% and 70% respectively when compared to the similar OADM trus t model.
Coded cooperative trust derivation for internet of things
International Journal of Internet Technology and Secured Transactions

A Novel RF Energy Harvester for Event-Based Environmental Monitoring in Wireless Sensor Networks
IEEE Internet of Things Journal
Perpetual energy source is the major research issue in the research community for energy-constrai... more Perpetual energy source is the major research issue in the research community for energy-constrained wireless sensor network (WSN) and IoT applications. Radio-frequency (RF) energy harvesting has become a technology available round the clock due to increased communication activities. However, efficient RF energy harvesting for low-power regions [<inline-formula> <tex-math notation="LaTeX">$PRF \leq (0 {\mathrm{ dBm}})$ </tex-math></inline-formula>] is still a challenge. This article proposes a novel RF energy harvesting technique along with an intelligent dynamic energy flow control algorithm. The algorithm works with dedicated energy flow control hardware. It is also able to provide perpetual life time to the ultralow power sensor nodes. A close approximation of the size of the RF energy harvester array is proposed for the perpetual lifetime of the WSN node deployed with wake-up radio for event-based monitoring applications. The model is verified by mathematical analysis, simulation, and fabricated prototype results for the operability in the given system. It is found that the circuit provides improved dc output voltage over the previous benchmark at low power in the range of −20 to 0 dBm. The system can charge a 2.7 V, 350 F supercapacitor with the rate <inline-formula> <tex-math notation="LaTeX">$0.16~\mu \text{V}$ </tex-math></inline-formula>/s at 0 dBm, <inline-formula> <tex-math notation="LaTeX">$0.125~\mu \text{V}$ </tex-math></inline-formula>/s at −6 dBm, and <inline-formula> <tex-math notation="LaTeX">$0.08~\mu \text{V}$ </tex-math></inline-formula>/s at −20 dBm. To prove the utility of the proposed idea, an RF field survey is also conducted and found that the proposed circuit can harvest energy from high power region (≥ −6 dBm) for LTE850 and LTE 900 bands.
Uploads
Papers by Dr Vidushi Sharma