Select Publications

Journal articles

Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, vol. 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952

Kim JY; Hu W; Sarkar D; Jha S, 2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, vol. 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015

Xu W; Jha S; Hu W, 2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, vol. 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553

Tan H; Tsudik G; Jha S, 2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, vol. 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008

Rezvani M; Rajaratnam D; Ignjatovic A; Pagnucco M; Jha S, 2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, vol. 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5

Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, vol. 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384

Jahan M; Seneviratne S; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency Computation, http://dx.doi.org/10.1002/cpe.4736

Jahan M; Rezvani M; Zhao Q; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, vol. 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253

Kim JY; Hu W; Shafagh H; Jha S, 2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, vol. 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503

Tu W; Sreenan CJ; Jha S; Zhang Q, 2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, vol. 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706

Revadigar G; Javali C; Xu W; Vasilakos AV; Hu W; Jha S, 2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, vol. 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690

misra P; Hu W; jha S, 2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, vol. 16, pp. 2037 - 2050, http://dx.doi.org/10.1109/TMC.2016.2605689

Ahmed N; Kanhere SS; Jha S, 2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, vol. 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935

Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, vol. 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381

Li K; Ahmed N; Kanhere SS; Jha S, 2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, vol. 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005

Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, vol. 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002

Rezvani M; Sekulic V; Ignjatovic A; Bertino E; Jha S, 2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, vol. 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414

Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, vol. 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, vol. 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162

Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, vol. 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731

Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162

Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, vol. 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542

Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, vol. 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816

Javali C; Revadigar G; Libman L; Jha S, 2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5

Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, vol. 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998

Ni W; Liu RP; Biswas J; Wang X; Collings IB; Jha SK, 2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, vol. 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973

Ahmed N; Kanhere SS; Jha S, 2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, vol. 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum

Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432

Misra P; Kottege N; Kusy B; Ostry D; Jha S, 2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, vol. 10, http://dx.doi.org/10.1145/2529981

Mehmood T; Libman L; Dehkordi HR; Jha SK, 2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, vol. 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004

Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, vol. 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825

Tu W; Sreenan C; Chou CT; Misra A; Jha SK, 2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, vol. 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103

Misra P; Ahmed N; Jha SK, 2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, vol. 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290

Tan H; Zic J; Jha SK; Ostry D, 2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, vol. 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140

Ahmed N; Kanhere SS; Jha S, 2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, vol. 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913

Sivaraman V; Ostry D; Shaheen J; Hianto AJ; Jha SK, 2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, vol. 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171

Ahmed N; Kanhere SS; Jha S, 2011, 'Link characterization for Aerial Wireless Sensor Networks', 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, pp. 1274 - 1279, http://dx.doi.org/10.1109/GLOCOMW.2011.6162388

Hu W; Bulusu N; Dang T; Taylor A; Chou CT; Jha S; Tran VN, 2010, 'Cane toad monitoring: Data reduction in a high rate application', Wireless Sensor Networks: Deployments and Design Frameworks, pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7

Tan H; Hu W; Corke P; SHIH W; Jha SK, 2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, vol. 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900

Ahmed N; Rutten M; Bessell T; Kanhere S; Gordon N; Jha SK, 2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, vol. 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83

Ahmed N; Kanhere S; Jha SK, 2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, vol. 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913

Hu W; Bulusu N; Chou CT; Jha SK; Tran VN; Taylor AJ, 2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, vol. 5, pp. 503 - 508, http://dx.doi.org/10.1109/IPSN.2005.1440984

Tan H; Ostry D; Zic J; Jha S, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308

Hassan M; Das S; Mohapatra P; Perkins C, 2007, 'Wireless mesh networks', IEEE Communications Magazine, vol. 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322

Sohail S; Jha SK; Kanhere S; Chou CT, 2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, vol. 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144

Hu W; Chou CT; Jha SK; Bulusu N, 2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, vol. 4, pp. 749 - 767

Hu W; Bulusu N; Jha SK, 2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, vol. 12, pp. 47 - 59, http://dx.doi.org/10.1007/s10776-005-5154-5

Landfeldt B; Moors T; Jha S; Hoang D, 2005, 'Advances and directions in quality of service management', COMPUTER COMMUNICATIONS, vol. 28, pp. 1701 - 1702, http://dx.doi.org/10.1016/j.comcom.2004.12.013

Jha SK; Fry M, 2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, vol. 25, pp. 305 - 321, http://dx.doi.org/10.1007/s11042-005-5609-9

Sabrina F; Nguyen C; Jha SK; Platt D; Safaei F, 2005, 'Processing resource scheduling in programmable networks', Computer Communications, vol. 28, pp. 676 - 687, http://dx.doi.org/10.1016/j.comcom.2004.08.011


Back to profile page