Mayank Verma - Academia.edu (original) (raw)
Papers by Mayank Verma
We investigate different formulations of the multi item, multi period capacitated lot sizing prob... more We investigate different formulations of the multi item, multi period capacitated lot sizing problem with inclusions of backorders, setup times and setup costs into it. The problem is closer to the realistic situations and is abbreviated as CLSP_BS in this work. Apart from the classical formulation, we give two variants of the transportation formulation of CLSP_BS. Objective values of these three formulations are exactly equivalent to each other, but they rank different in terms of computational times. When we compare the bounds obtained by LP relaxation of the classical and the two transportation formulations, it is observed that classical and one of the two transportation formulations are exactly equivalent; however the other transportation formulation generates a comparatively better bound. Based on this information on strength of bounds, we earmark the formulations of CLSP_BS as strong and weak. This knowledge about strong and weak formulations can prove to be fruitful while solving real life large sized problems. Limited computational experiences are shown here which establish the stated claims.
The current Internet architecture was designed at a time when many of the current network applica... more The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to de-ploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the ...
In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for R... more In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for RFID tags, which allows the tags to use pseudonyms instead of their true identity for authentication. Using SEAS, a tag generates random numbers and uses them to create a pseudonym as its identity for authentication. The pseudonym does not reveal the identity of the tag and the pseudonyms of multiple authentications appear random and uncorrelated to the adversary. A pseudonym can only be deciphered by the back-end authentication authority to identify the tag. No other entity in the network can link the pseudonym to the identity of the tag. Our scheme is efficient, with a tag needing to perform only simple operations such as XOR, bits shifting, bits concatenation, and random number generation. We perform security analysis of our scheme to show its effectiveness against different forms of attacks. We also perform comparison of our scheme with existing schemes in terms of efficiency in the use of resources. Our scheme performs effectively, while at the same time being better than the other popular schemes in the literature in terms of cost and computation efficiency.
Ad Hoc Networks, 2009
Vehicular ad hoc networks (VANETs) are usually operated among vehicles moving at high speeds, and... more Vehicular ad hoc networks (VANETs) are usually operated among vehicles moving at high speeds, and thus their communication relations can be changed frequently. In such a highly dynamic environment, establishing trust among vehicles is difficult. To solve this problem, ...
Current ePedigree creation and discovery services rely on a centralized framework, i.e., EPCgloba... more Current ePedigree creation and discovery services rely on a centralized framework, i.e., EPCglobal network. The centralized system has several restrictions to prevent it from being widely adopted. For example, it is unscalable when ePedigree service requests are increased dramatically due to the item-level product tracking; it has little privacy protection since the product historical information can be easily derived from the object name service (ONS) provided by the centralized EPCglobal network; it is cumbersome since the ePedigree information will be amplified in the local databases along with the product transportation stops; and so on. To overcome the above mentioned problems, we propose a distributed EPC information service (EPC-IS), which makes the ePedigree creation and discovery more robust, scaleable, and secure. Using our approach, the ePedigree historical records of a product is created and stored in the ePedigree creating parties' EPC-IS servers; in addition, each EPC-IS server maintains a look up table that stores the EPC-IS providers' one-hop up/down stream information. In this way, the ePedigree service creation and discovery are processed following a chain of processes with a distributed manner. The distributed ePedigree architecture and a set of EPC-IS service protocols are described in this paper
IEEE Transactions on Intelligent Transportation Systems, 2011
We investigate different formulations of the multi item, multi period capacitated lot sizing prob... more We investigate different formulations of the multi item, multi period capacitated lot sizing problem with inclusions of backorders, setup times and setup costs into it. The problem is closer to the realistic situations and is abbreviated as CLSP_BS in this work. Apart from the classical formulation, we give two variants of the transportation formulation of CLSP_BS. Objective values of these three formulations are exactly equivalent to each other, but they rank different in terms of computational times. When we compare the bounds obtained by LP relaxation of the classical and the two transportation formulations, it is observed that classical and one of the two transportation formulations are exactly equivalent; however the other transportation formulation generates a comparatively better bound. Based on this information on strength of bounds, we earmark the formulations of CLSP_BS as strong and weak. This knowledge about strong and weak formulations can prove to be fruitful while solving real life large sized problems. Limited computational experiences are shown here which establish the stated claims.
The current Internet architecture was designed at a time when many of the current network applica... more The current Internet architecture was designed at a time when many of the current network applications did not even exist. As a result, it has become increasingly difficult to de-ploy new and secure services on the Internet. Hence, a new Internet architecture is required to address the ...
In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for R... more In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for RFID tags, which allows the tags to use pseudonyms instead of their true identity for authentication. Using SEAS, a tag generates random numbers and uses them to create a pseudonym as its identity for authentication. The pseudonym does not reveal the identity of the tag and the pseudonyms of multiple authentications appear random and uncorrelated to the adversary. A pseudonym can only be deciphered by the back-end authentication authority to identify the tag. No other entity in the network can link the pseudonym to the identity of the tag. Our scheme is efficient, with a tag needing to perform only simple operations such as XOR, bits shifting, bits concatenation, and random number generation. We perform security analysis of our scheme to show its effectiveness against different forms of attacks. We also perform comparison of our scheme with existing schemes in terms of efficiency in the use of resources. Our scheme performs effectively, while at the same time being better than the other popular schemes in the literature in terms of cost and computation efficiency.
Ad Hoc Networks, 2009
Vehicular ad hoc networks (VANETs) are usually operated among vehicles moving at high speeds, and... more Vehicular ad hoc networks (VANETs) are usually operated among vehicles moving at high speeds, and thus their communication relations can be changed frequently. In such a highly dynamic environment, establishing trust among vehicles is difficult. To solve this problem, ...
Current ePedigree creation and discovery services rely on a centralized framework, i.e., EPCgloba... more Current ePedigree creation and discovery services rely on a centralized framework, i.e., EPCglobal network. The centralized system has several restrictions to prevent it from being widely adopted. For example, it is unscalable when ePedigree service requests are increased dramatically due to the item-level product tracking; it has little privacy protection since the product historical information can be easily derived from the object name service (ONS) provided by the centralized EPCglobal network; it is cumbersome since the ePedigree information will be amplified in the local databases along with the product transportation stops; and so on. To overcome the above mentioned problems, we propose a distributed EPC information service (EPC-IS), which makes the ePedigree creation and discovery more robust, scaleable, and secure. Using our approach, the ePedigree historical records of a product is created and stored in the ePedigree creating parties' EPC-IS servers; in addition, each EPC-IS server maintains a look up table that stores the EPC-IS providers' one-hop up/down stream information. In this way, the ePedigree service creation and discovery are processed following a chain of processes with a distributed manner. The distributed ePedigree architecture and a set of EPC-IS service protocols are described in this paper
IEEE Transactions on Intelligent Transportation Systems, 2011