Select Publications
Journal articles
2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162
,2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
,2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731
,2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
,2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
,2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
,2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162
,2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
,2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973
,2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5
,2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004
,2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981
,2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum
,2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
,2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
,2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290
,2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103
,2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
,2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171
,2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140
,2010, 'Cane toad monitoring: Data reduction in a high rate application', , pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7
,2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913
,2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83
,2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900
,2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308
,2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, 5
,2008, 'EIC Editorial', IEEE Transactions on Mobile Computing, 7, pp. 529 - 532, http://dx.doi.org/10.1109/TMC.2008.45
,2008, 'ADAPTIVE BANDWIDTH MANAGEMENT AND QoS PROVISIONING IN IPVPNs', International Journal of Computers and Applications, 30, http://dx.doi.org/10.2316/journal.202.2008.2.202-2223
,2007, 'Wireless mesh networks', IEEE Communications Magazine, 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322
,2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, 4, pp. 749 - 767
,2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144
,2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, 12, pp. 47 - 59
,2005, 'Advances and directions in quality of service management.', Journal of Computer Communications, 28, pp. 1701 - 1702
,2005, 'Node localization using mobile robots in delay-tolerant sensor networks', IEEE Transactions on Mobile Computing, 4, pp. 285 - 296
,2005, 'Processing resource scheduling in programmable networks', Computer Communications, 28, pp. 676 - 687
,2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992
,2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, 25, pp. 305 - 321
,2004, 'Failure-Oriented Path Restoration Algorithm for Survivable Networks', IEEE Transactions on Network and Service Management, 1, pp. 11 - 20, http://dx.doi.org/10.1109/TNSM.2004.4623690
,2004, 'Network QoS provision for distributed grid applications', International Journal of Simulation: Systems, Science and Technology, 5, pp. 13 - 28
,2004, 'Advances in future mobile/wireless networks and services', Computer Communications, 27, pp. 695 - 696
,2004, 'Design and Analysis of Location Management Schemes for a New light-weight Wireless Network', Computer Communications, 27(8), pp. 743 - 750
,2004, 'Failure Oriented Path Restoration Algorithm for Survivable Networks', Etransactions on Network Service and Management, 1, pp. 2 - 10
,2004, 'Location Estimation and Trajectory Prediction for Cellular Networks with Mobile Base Stations', IEEE Transactions on Vehicular Technology, 53, pp. 1903 - 1913
,2004, 'Robust Extended Kalman Filter Based Technique for Location Management in PCS Networks', Computer Communications, 27(5), pp. 502 - 512
,2003, 'An Adaptive Resource Management Architecture for Active Networks', Telecommunication Systems, 24:, pp. 139 - 166
,2003, 'Bandwidth broker extension optimal resource management', Journal of Telecommunications and Information Technology, 3, pp. 77 - 82
,2003, 'Cell Hoping: A Lightweight Architecture for Wireless Communications', IEEE Wireless Communications, 10, pp. 16 - 21
,2003, 'Empirical Study of Traffic Trunking in Linux-Based MPLS Test-Bed', International Journal of Network Management, 13, pp. 277 - 288
,2003, 'Java Implementation of Policy-Based Bandwidth Management', International Journal of Network Management, 13, pp. 249 - 258
,