Trishita Ghosh - Academia.edu (original) (raw)
Papers by Trishita Ghosh
Lecture notes in electrical engineering, 2022
SECOND INTERNATIONAL CONFERENCE ON INNOVATIONS IN SOFTWARE ARCHITECTURE AND COMPUTATIONAL SYSTEMS (ISACS 2022)
Lecture notes in electrical engineering, 2022
Studies in Autonomic, Data-driven and Industrial Computing, 2021
The main objective of congestion control in VANET is to best exploit the available network resour... more The main objective of congestion control in VANET is to best exploit the available network resources and to minimize the congestion in the network. In this context, we present a congestion control approach, based on time synchronization approach reducing number of messages, to ensure reliable and safe communication within VANET. It supports discarding of similar types of messages and time synchronization.
Vehicular Ad Hoc Networks (VANET) is a special class of Mobile Ad Hoc Network (MANET) which provi... more Vehicular Ad Hoc Networks (VANET) is a special class of Mobile Ad Hoc Network (MANET) which provides communication between vehicles intelligently via vehicle to vehicle communication or vehicle to roadside communication. VANETs is an essential and emerging area of research in the field of Ad Hoc Networks. The main objective of deploying VANET is to improve the road safety and reduce the number of accidents. Existing routing protocols are not sufficient to meet all the issues in routing. To provide best routing protocol, it is necessary to make an analysis of routing protocols in VANET. This paper starts with the basic challenges of VANET and provides a detailed description of various existing routing techniques with its advantages and disadvantages. Finally, this paper discusses and compare the emerging routing protocols for VANET. Index Terms – Intelligent transportation system (ITS), Zone of Relevance (ZOR), Geo Cast Routing, Position based Routing Protocol, OBU.
Regular, 2020
Today organizations face a challenge while recruiting candidates, who provide forged mark sheets ... more Today organizations face a challenge while recruiting candidates, who provide forged mark sheets in order to get a job. To prevent wrong hiring a detailed and thorough approach is needed to verify the authentication of both the candidate and the marks obtained by him/her. There are so many modern cryptographic protocols available which can be used for authenticating individual’s academic achievement certificates. Visual Cryptography is a simple and secure way to allow the secret sharing of images without any cryptographic computations or the use of encryption or decryption keys. The novelty of the visual secret sharing scheme is in its decryption process where human visual system (HVS) is employed for decryption of secret shares. In this paper we have discussed (3, 3) visual cryptography scheme which can be used to generate shares and distributes them among three parties, i.e. the Job Seeker, Certificate Issuance Authority and the Organization conducting Job interview. Secret messag...
The prime goal of Vehicular Ad hoc Network (VANET) is to provide life safety on the road. To achi... more The prime goal of Vehicular Ad hoc Network (VANET) is to provide life safety on the road. To achieve this, vehicles make use of two types of safety messages one is Periodic safety messages (beacons) to exchange status information e.g. position, speed etc. and second one is Event-driven messages to broadcast in case of an emergency situations e.g. accidents, hardbraking etc. The main objective of congestion control in VANET is to best exploit the available network resources while preventing sustained overloads of network nodes and links. Appropriate congestion control mechanisms are essential to provide efficient operation of a network. Ensuring congestion control within vehicular ad hoc networks faces special challenges, due to the specificities of such environment (high mobility of nodes, high rate of topology changes, high variability in nodes density and neighborhood configuration, broadcast communication nature, etc.). In this context, we present a congestion control approach, t...
Studies in Autonomic, Data-driven and Industrial Computing
2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2015
The main essence of this proposed method for the control of congestion in VANET is exploiting the... more The main essence of this proposed method for the control of congestion in VANET is exploiting the already existing resources of the network and at the same time preventing the unnecessary overheads of nodes as well as links of a network. The control of congestion in the networks such as vehicular ad hoc suffers through a special kind of challenges. These challenges are the consequences of the environmental specificities such as frequently changing of the topology, large amount of variations in the nodes density, nature of the communication in broadcasting and the configurational characteristics of the neighbor etc. Keeping above described point into mind, we proposed a technique for the control of unnecessary congestion by reducing the number of transmitting messages in VANET. It supports discarding of similar types of messages. Here each node consists of a neighbor table for comparing the incoming messages with the previous messages. The information from the message is extracted and the values are compared with the values of neighbor table using a database query. If a match is found then the corresponding message field in the table is updated else a new entry is added in the table and the message is transferred to control queue (CQ) or the service queue (SQ).After being processed the entry is deleted from the queue as well as table. The working efficiency of this developed method is determined on the ground of the average delay of these three main types of messages v/s its mean message size.
2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), 2012
Lecture notes in electrical engineering, 2022
SECOND INTERNATIONAL CONFERENCE ON INNOVATIONS IN SOFTWARE ARCHITECTURE AND COMPUTATIONAL SYSTEMS (ISACS 2022)
Lecture notes in electrical engineering, 2022
Studies in Autonomic, Data-driven and Industrial Computing, 2021
The main objective of congestion control in VANET is to best exploit the available network resour... more The main objective of congestion control in VANET is to best exploit the available network resources and to minimize the congestion in the network. In this context, we present a congestion control approach, based on time synchronization approach reducing number of messages, to ensure reliable and safe communication within VANET. It supports discarding of similar types of messages and time synchronization.
Vehicular Ad Hoc Networks (VANET) is a special class of Mobile Ad Hoc Network (MANET) which provi... more Vehicular Ad Hoc Networks (VANET) is a special class of Mobile Ad Hoc Network (MANET) which provides communication between vehicles intelligently via vehicle to vehicle communication or vehicle to roadside communication. VANETs is an essential and emerging area of research in the field of Ad Hoc Networks. The main objective of deploying VANET is to improve the road safety and reduce the number of accidents. Existing routing protocols are not sufficient to meet all the issues in routing. To provide best routing protocol, it is necessary to make an analysis of routing protocols in VANET. This paper starts with the basic challenges of VANET and provides a detailed description of various existing routing techniques with its advantages and disadvantages. Finally, this paper discusses and compare the emerging routing protocols for VANET. Index Terms – Intelligent transportation system (ITS), Zone of Relevance (ZOR), Geo Cast Routing, Position based Routing Protocol, OBU.
Regular, 2020
Today organizations face a challenge while recruiting candidates, who provide forged mark sheets ... more Today organizations face a challenge while recruiting candidates, who provide forged mark sheets in order to get a job. To prevent wrong hiring a detailed and thorough approach is needed to verify the authentication of both the candidate and the marks obtained by him/her. There are so many modern cryptographic protocols available which can be used for authenticating individual’s academic achievement certificates. Visual Cryptography is a simple and secure way to allow the secret sharing of images without any cryptographic computations or the use of encryption or decryption keys. The novelty of the visual secret sharing scheme is in its decryption process where human visual system (HVS) is employed for decryption of secret shares. In this paper we have discussed (3, 3) visual cryptography scheme which can be used to generate shares and distributes them among three parties, i.e. the Job Seeker, Certificate Issuance Authority and the Organization conducting Job interview. Secret messag...
The prime goal of Vehicular Ad hoc Network (VANET) is to provide life safety on the road. To achi... more The prime goal of Vehicular Ad hoc Network (VANET) is to provide life safety on the road. To achieve this, vehicles make use of two types of safety messages one is Periodic safety messages (beacons) to exchange status information e.g. position, speed etc. and second one is Event-driven messages to broadcast in case of an emergency situations e.g. accidents, hardbraking etc. The main objective of congestion control in VANET is to best exploit the available network resources while preventing sustained overloads of network nodes and links. Appropriate congestion control mechanisms are essential to provide efficient operation of a network. Ensuring congestion control within vehicular ad hoc networks faces special challenges, due to the specificities of such environment (high mobility of nodes, high rate of topology changes, high variability in nodes density and neighborhood configuration, broadcast communication nature, etc.). In this context, we present a congestion control approach, t...
Studies in Autonomic, Data-driven and Industrial Computing
2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2015
The main essence of this proposed method for the control of congestion in VANET is exploiting the... more The main essence of this proposed method for the control of congestion in VANET is exploiting the already existing resources of the network and at the same time preventing the unnecessary overheads of nodes as well as links of a network. The control of congestion in the networks such as vehicular ad hoc suffers through a special kind of challenges. These challenges are the consequences of the environmental specificities such as frequently changing of the topology, large amount of variations in the nodes density, nature of the communication in broadcasting and the configurational characteristics of the neighbor etc. Keeping above described point into mind, we proposed a technique for the control of unnecessary congestion by reducing the number of transmitting messages in VANET. It supports discarding of similar types of messages. Here each node consists of a neighbor table for comparing the incoming messages with the previous messages. The information from the message is extracted and the values are compared with the values of neighbor table using a database query. If a match is found then the corresponding message field in the table is updated else a new entry is added in the table and the message is transferred to control queue (CQ) or the service queue (SQ).After being processed the entry is deleted from the queue as well as table. The working efficiency of this developed method is determined on the ground of the average delay of these three main types of messages v/s its mean message size.
2012 12th International Conference on Intelligent Systems Design and Applications (ISDA), 2012