swapnil patil - Profile on Academia.edu (original) (raw)

Mohd Fahmi Mohamad Amran related author profile picture

Dr. Mohd Fahmi bin Mohamad Amran | Faculty of Computer Science and Information Technology related author profile picture

Riza  Sulaiman related author profile picture

Dr. D. P. Mishra related author profile picture

Adnan Hamzic related author profile picture

Soha Samir related author profile picture

Giovanni Pau related author profile picture

Saman Barakat related author profile picture

Jerome Soumagne related author profile picture

Judicael Zounmevo related author profile picture

Uploads

Papers by swapnil patil

Research paper thumbnail of An Architecture for Internet Data Transfer

This paper presents the design and implementation of DOT, a flexible architecture for data transf... more This paper presents the design and implementation of DOT, a flexible architecture for data transfer. This architecture separates content negotiation from the data transfer itself. Applications determine what data they need to send and then use a new transfer service to send it. This transfer service acts as a common interface between applications and the lower-level network layers, facilitating innovation both above and below. The transfer service frees developers from re-inventing transfer mechanisms in each new application. New transfer mechanisms, in turn, can be easily deployed without modifying existing applications.

Research paper thumbnail of NSDI '06: 3rd Symposium on Networked Systems Design & Implementation

NSDI '06: 3rd Symposium on Networked Systems Design & Implementation

Research paper thumbnail of Serial data fusion using space-filling curves in wireless sensor networks

Many applications require that sensor observations in a given geographic region be aggregated or ... more Many applications require that sensor observations in a given geographic region be aggregated or fused in a serial fashion. This requires a routing path to be constructed through all sensors in that region. This paper investigates efficient network traversal techniques to construct such routing paths using the novel concept of space-filling curves.

Research paper thumbnail of Serial data aggregation using space-filling curves in wireless sensor networks

In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key managem... more In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observation that different types of messages exchanged between sensor nodes have different security requirements, and that a single keying mechanism is not suitable for meeting these different security requirements. LEAP supports the establishment of four types of keys for each sensor node -an individual key shared with the base station, a pairwise key shared with another sensor node, a cluster key shared with multiple neighboring nodes, and a group key that is shared by all the nodes in the network. The protocol used for establishing and updating these keys is communication-and energy-efficient, and minimizes the involvement of the base station. LEAP also includes an efficient protocol for inter-node traffic authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing and passive participation. We analyze the performance and the security of our scheme under various attack models and show our schemes are very efficient in defending against many attacks.

Research paper thumbnail of Poster abstract: serial data aggregation using space-filling curves in wireless sensor networks

Poster abstract: serial data aggregation using space-filling curves in wireless sensor networks

ABSTRACT Many applications require that sensor observations in a given geographic region be aggre... more ABSTRACT Many applications require that sensor observations in a given geographic region be aggregated or fused in a serial fashion. This requires a routing path to be constructed through all sensors in that region. This paper investigates efficient net-work traversal techniques ...

Research paper thumbnail of An Architecture for Internet Data Transfer

This paper presents the design and implementation of DOT, a flexible architecture for data transf... more This paper presents the design and implementation of DOT, a flexible architecture for data transfer. This architecture separates content negotiation from the data transfer itself. Applications determine what data they need to send and then use a new transfer service to send it. This transfer service acts as a common interface between applications and the lower-level network layers, facilitating innovation both above and below. The transfer service frees developers from re-inventing transfer mechanisms in each new application. New transfer mechanisms, in turn, can be easily deployed without modifying existing applications.

Research paper thumbnail of NSDI '06: 3rd Symposium on Networked Systems Design & Implementation

NSDI '06: 3rd Symposium on Networked Systems Design & Implementation

Research paper thumbnail of Serial data fusion using space-filling curves in wireless sensor networks

Many applications require that sensor observations in a given geographic region be aggregated or ... more Many applications require that sensor observations in a given geographic region be aggregated or fused in a serial fashion. This requires a routing path to be constructed through all sensors in that region. This paper investigates efficient network traversal techniques to construct such routing paths using the novel concept of space-filling curves.

Research paper thumbnail of Serial data aggregation using space-filling curves in wireless sensor networks

In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key managem... more In this paper, we describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observation that different types of messages exchanged between sensor nodes have different security requirements, and that a single keying mechanism is not suitable for meeting these different security requirements. LEAP supports the establishment of four types of keys for each sensor node -an individual key shared with the base station, a pairwise key shared with another sensor node, a cluster key shared with multiple neighboring nodes, and a group key that is shared by all the nodes in the network. The protocol used for establishing and updating these keys is communication-and energy-efficient, and minimizes the involvement of the base station. LEAP also includes an efficient protocol for inter-node traffic authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing and passive participation. We analyze the performance and the security of our scheme under various attack models and show our schemes are very efficient in defending against many attacks.

Research paper thumbnail of Poster abstract: serial data aggregation using space-filling curves in wireless sensor networks

Poster abstract: serial data aggregation using space-filling curves in wireless sensor networks

ABSTRACT Many applications require that sensor observations in a given geographic region be aggre... more ABSTRACT Many applications require that sensor observations in a given geographic region be aggregated or fused in a serial fashion. This requires a routing path to be constructed through all sensors in that region. This paper investigates efficient net-work traversal techniques ...

Log In