Select Publications

Journal articles

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162

Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391

Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731

Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816

Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162

Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998

Ni W; Liu RP; Biswas J; Wang X; Collings IB; Jha SK, 2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973

Javali C; Revadigar G; Libman L; Jha S, 2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5

Mehmood T; Libman L; Dehkordi HR; Jha SK, 2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004

Misra P; Kottege N; Kusy B; Ostry D; Jha S, 2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981

Ahmed N; Kanhere SS; Jha S, 2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum

Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825

Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432

Misra P; Ahmed N; Jha SK, 2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290

Tu W; Sreenan C; Chou CT; Misra A; Jha SK, 2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103

Ahmed N; Kanhere SS; Jha S, 2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913

Sivaraman V; Ostry D; Shaheen J; Hianto AJ; Jha SK, 2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171

Tan H; Zic J; Jha SK; Ostry D, 2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140

Hu W; Bulusu N; Dang T; Taylor A; Chou CT; Jha S; Tran VN, 2010, 'Cane toad monitoring: Data reduction in a high rate application', , pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7

Ahmed N; Kanhere S; Jha SK, 2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913

Ahmed N; Rutten M; Bessell T; Kanhere S; Gordon N; Jha SK, 2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83

Tan H; Hu W; Corke P; SHIH W; Jha SK, 2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900

Tan H; Ostry D; Zic J; Jha S, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308

Hu W; Bulusu N; Chou CT; Jha SK; Tran VN; Taylor AJ, 2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, 5

Srivastava MB; Bagchi S; Corner M; Jha SK; Krishnamachari B; Martonosi M; Poovendran R; Raghunathan A; Ramanathan R; Santi P; Rosing TS; Snoeren AC; Trappe W; Venkatasubramanian N, 2008, 'EIC Editorial', IEEE Transactions on Mobile Computing, 7, pp. 529 - 532, http://dx.doi.org/10.1109/TMC.2008.45

Hota C; Jha S; Raghurama G, 2008, 'ADAPTIVE BANDWIDTH MANAGEMENT AND QoS PROVISIONING IN IPVPNs', International Journal of Computers and Applications, 30, http://dx.doi.org/10.2316/journal.202.2008.2.202-2223

Hassan M; Das S; Mohapatra P; Perkins C, 2007, 'Wireless mesh networks', IEEE Communications Magazine, 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322

Hu W; Chou CT; Jha SK; Bulusu N, 2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, 4, pp. 749 - 767

Sohail S; Jha SK; Kanhere S; Chou CT, 2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144

Hu W; Bulusu N; Jha SK, 2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, 12, pp. 47 - 59

Moors T; Jha SK, 2005, 'Advances and directions in quality of service management.', Journal of Computer Communications, 28, pp. 1701 - 1702

Pathirana PN; Bulusu N; Savkin AV; Jha SK, 2005, 'Node localization using mobile robots in delay-tolerant sensor networks', IEEE Transactions on Mobile Computing, 4, pp. 285 - 296

Sabrina F; Nguyen C; Jha SK; Platt D; Safaei F, 2005, 'Processing resource scheduling in programmable networks', Computer Communications, 28, pp. 676 - 687

Ahmed N; Kanhere S; Jha SK, 2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992

Jha SK; Fry M, 2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, 25, pp. 305 - 321

Lau W; Jha S, 2004, 'Failure-Oriented Path Restoration Algorithm for Survivable Networks', IEEE Transactions on Network and Service Management, 1, pp. 11 - 20, http://dx.doi.org/10.1109/TNSM.2004.4623690

Al-Ali R; Sohail S; Rana O; Hafid A; Von Laszewski G; Amin K; Jha S; Walker D, 2004, 'Network QoS provision for distributed grid applications', International Journal of Simulation: Systems, Science and Technology, 5, pp. 13 - 28

Jha SK; Mukherjee A, 2004, 'Advances in future mobile/wireless networks and services', Computer Communications, 27, pp. 695 - 696

Hassan J; Jha SK, 2004, 'Design and Analysis of Location Management Schemes for a New light-weight Wireless Network', Computer Communications, 27(8), pp. 743 - 750

Lau CW; Jha SK, 2004, 'Failure Oriented Path Restoration Algorithm for Survivable Networks', Etransactions on Network Service and Management, 1, pp. 2 - 10

Pathirana PN; Savkin AV; Jha SK, 2004, 'Location Estimation and Trajectory Prediction for Cellular Networks with Mobile Base Stations', IEEE Transactions on Vehicular Technology, 53, pp. 1903 - 1913

Pathirana PN; Savkin AV; Jha SK, 2004, 'Robust Extended Kalman Filter Based Technique for Location Management in PCS Networks', Computer Communications, 27(5), pp. 502 - 512

Sabrina F; Jha SK, 2003, 'An Adaptive Resource Management Architecture for Active Networks', Telecommunication Systems, 24:, pp. 139 - 166

Sohail S; Jha SK, 2003, 'Bandwidth broker extension optimal resource management', Journal of Telecommunications and Information Technology, 3, pp. 77 - 82

Hassan J; Jha SK, 2003, 'Cell Hoping: A Lightweight Architecture for Wireless Communications', IEEE Wireless Communications, 10, pp. 16 - 21

Rosenbaum GF; Jha SK; Hassan M, 2003, 'Empirical Study of Traffic Trunking in Linux-Based MPLS Test-Bed', International Journal of Network Management, 13, pp. 277 - 288

Jha SK; Hassan M, 2003, 'Java Implementation of Policy-Based Bandwidth Management', International Journal of Network Management, 13, pp. 249 - 258


Back to profile page