Shekhar Verma

Work place: Indian Institute of Information Technology, Allahabad, India

E-mail: sverma@iiita.ac.in

Website:

Research Interests: Computer Architecture and Organization, Computer Networks, Information Security, Network Architecture, Network Security, Information Systems

Biography

Shekhar Verma received his Ph.D. degree from IT, Banaras Hindu University, Varanasi, India in Computer Science and Engg. He is Associate Professor in Information Technology at Indian Institute of Information Technology, Allahabad, India. His research interest areas are Computer Networks, Wireless Sensor Networks, Vehicular Technology, Cryptography, Information and Network Security.

Author Articles
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

By Manjusha Pandey Shekhar Verma

DOI: https://doi.org/10.5815/ijcnis.2012.06.02, Pub. Date: 8 Jun. 2012

The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k-anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.

[...] Read more.
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

By Manjusha Pandey Shekhar Verma

DOI: https://doi.org/10.5815/ijcnis.2012.04.03, Pub. Date: 8 May 2012

Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.

[...] Read more.
Other Articles