Select Publications

Books

Jha SK; Hassan M, 2002, Engineering Internet QoS, Original, Artech House, Boston

Book Chapters

Javali C; Revadigar G; Ding M; Lin Z; Jha S, 2021, 'Cooperative Physical Layer Secret Key Generation by Virtual Link Estimation', in Physical Layer Security, Springer International Publishing, pp. 99 - 128, http://dx.doi.org/10.1007/978-3-030-55366-1_5

Javali C; Revadigar G; Libman L; Ding M; Lin Z; Jha S, 2021, 'Secure Device Pairing Protocol Based on Wireless Channel Characteristics for Body Area Networks', in Physical Layer Security, Springer International Publishing, pp. 151 - 179, http://dx.doi.org/10.1007/978-3-030-55366-1_7

Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14

Naveed A; Kanhere S; Jha SK, 2008, 'Attacks and Security Mechanism', in Zhang Y; Zheng J; Ma M (ed.), Security in Wireless Mesh Networks, edn. Wireless Networks and Mobile Communications Series, Auerbach Publications, pp. 111 - 144, http://www.crcpress.com/product/isbn/9780849382505

Savkin AV; Pathirana PN; Bulusu N; Jha SK; Dang TX, 2007, 'Node Localization Using Mobile Robots in delay-Tolerant Sensor Networks', in Poovendran R; Wang C; Roy S (ed.), Secure localization and time synchronization for wireless sensor and ac hoc networks, Springer Publishing Company, United States of America, pp. 83 - 102

Sabrina F; Jha SK, 2004, 'Fair Queuing in Active and Programmable Networks', in Wysocki TA; Dadje A; Wysocki BJ (ed.), Advanced wired and Wireless Networks Series, edn. 26, Springer Publishing Company, New York, pp. 247 - 264

Jha SK, 2004, 'TCP/IP Fundamentals', in Hassan M; Jain R (ed.), High Performance TCP/IP Networking Concepts, Issues and Solutions, edn. First, Pearson Prentice Hall, New Jersey, pp. 12 - 31

Mukherjee A; Saha D; Jha S, 2003, 'Location management in mobile wireless networks', in Wireless Internet Handbook: Technologies, Standards, and Applications, pp. 351 - 380, http://dx.doi.org/10.1201/9780203011690

Hassan M; Jha SK, 2002, 'Voice over IP: Protocols and Technical Hurdles', in Theoharakis V; Serpanos D (ed.), Enterprise Networking: Multilayer Switching and Applications, edn. Original, Idea Group Publishing, Hershey, PA, USA, pp. 123 - 143

Jha SK; Wright PA; Fry M, 1997, 'Playout management of interactive video — an adaptive approach', in Building QoS into Distributed Systems, Springer US, pp. 149 - 160, http://dx.doi.org/10.1007/978-0-387-35170-4_16

Edited Books

Bulusu N; Jha S, (ed.), 2005, Wireless sensor network systems: a systems perspective, Artech House, Norwood, MA

Journal articles

Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, vol. 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, vol. 202, pp. 103356 - 103356, http://dx.doi.org/10.1016/j.jnca.2022.103356

Purwanto R; Pal A; Blair A; Jha S, 2022, 'PHISHSIM: Aiding Phishing Website Detection with a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2022.3164212

Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, vol. 3, pp. 100050 - 100050, http://dx.doi.org/10.1016/j.bcra.2021.100050

Xue W; Luo C; Shen Y; Rana R; Lan G; Jha S; Seneviratne A; Hu W, 2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, vol. 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737

Purwanto R; Pal A; Blair A; Jha S, 2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1

Jiang J, 2021, 'Network Growth From Global and Local Influential Nodes', arXiv

Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, vol. 58, http://dx.doi.org/10.1016/j.ipm.2020.102426

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, vol. 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615

Ma S; Li J; Nepal S; Ostry D; Lo D; Jha S; Deng RH; Bertino E, 2021, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2021.3050188

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, vol. 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226

Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, vol. 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900

Jahan M; Seneviratne S; Roy PS; Sakurai K; Seneviratne A; Jha S, 2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, vol. 31, http://dx.doi.org/10.1002/cpe.4736

Rezvani M; Rajaratnam D; Ignjatovic A; Pagnucco M; Jha S, 2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, vol. 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5

Xu W; Jha S; Hu W, 2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, vol. 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553

Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, vol. 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952

Kim JY; Hu W; Sarkar D; Jha S, 2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, vol. 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015

Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, vol. 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384

Tan H; Tsudik G; Jha S, 2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, vol. 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008

Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., vol. 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384

Kim JY; Hu W; Shafagh H; Jha S, 2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, vol. 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503

Jahan M; Rezvani M; Zhao Q; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, vol. 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253

Tu W; Sreenan CJ; Jha S; Zhang Q, 2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, vol. 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706

Revadigar G; Javali C; Xu W; Vasilakos AV; Hu W; Jha S, 2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690

misra P; Hu W; jha S, 2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, vol. 16, pp. 2037 - 2050, http://dx.doi.org/10.1109/TMC.2016.2605689

Li K; Ahmed N; Kanhere SS; Jha S, 2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, vol. 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005

Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, vol. 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381

Ahmed N; Kanhere SS; Jha S, 2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, vol. 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935

Rezvani M; Sekulic V; Ignjatovic A; Bertino E; Jha S, 2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, vol. 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162

Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, vol. 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391

Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, vol. 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731

Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, vol. 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816

Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, vol. 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162

Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, vol. 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998


Back to profile page