Anuj Sehgal

Anuj Sehgal
Jacobs University · CASE - Center for Advanced Systems Engineering

M.Sc. Computer Science

About

47
Publications
31,646
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
721
Citations
Introduction
I am currently a doctoral candidate within the Smart Systems program, under the supervision of Prof. Dr. Jürgen Schönwälder, at Jacobs University Bremen in Germany. My work at the university is mostly within the Computer Networks and Distributed Systems group, but my interests extend beyond networking, encompassing robotics, computer vision, wireless sensor networks, underwater acoustic systems, autonomous marine vehicles and computer science education.
Additional affiliations
August 2011 - January 2011
Jacobs University
Position
  • Automatic Failure Analysis of IPv6 Transition Mechanisms
Description
  • Evaluation of application failures when using IPv6 transition mechanisms like (NAT64, DS-Lite, etc.) through IP network flow analysis.
October 2009 - May 2010
Jacobs University
Position
  • Service Discovery in the Internet of Things
Description
  • Oversaw the implementation of mDNS service discovery on embedded devices, using Contiki, within an IPv6 network. Implemented ntp and syslog as part of project.
January 2009 - August 2009
Jacobs University
Position
  • Simulating Underwater Acoustic Networks
Description
  • Worked on researching and improving underwater acoustic communication models. Implemented extensions for ns2 networking simulator and created a plugin for USARSIM real-time AUV communication simulation.
Education
September 2009 - December 2013
Jacobs University
Field of study
  • Computer Science
September 2007 - August 2009
Jacobs University
Field of study
  • Computer Science
January 2002 - August 2004
Brigham Young University - Provo Main Campus
Field of study
  • Computer Science

Publications

Publications (47)
Article
The RPL is a routing protocol for low-power and lossy networks. A malicious node can manipulate header options used by RPL to create topological inconsistencies, thereby causing denial of service attacks, reducing channel availability, increasing control message overhead, and increasing energy consumption at the targeted node and its neighborhood....
Technical Report
Full-text available
This document discusses use cases concerning the management of networks in which constrained devices are involved. A problem statement, deployment options, and the requirements on the networks with constrained devices can be found in the companion document on "Management of Networks with Constrained Devices: Problem Statement and Requirements" (RFC...
Technical Report
Full-text available
This document defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs).
Conference Paper
Full-text available
RPL is a routing protocol for low-power and lossy constrained node networks. A malicious node can manipulate header options used by RPL to track DODAG inconsistencies, thereby causing denial of service attacks, increased control message overhead, and black-holes at the targeted node. RPL counteracts DODAG inconsistencies by using a fixed threshold,...
Conference Paper
Full-text available
The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) as a candidate for use in constrained networks. Keeping in mind the different requirements of such networks, the protocol was designed to support multiple routing topologies, called DODAGs, constructed using different objective functions, so as to optimize routing based o...
Conference Paper
Full-text available
The Internet of Things is expected to network a large number of constrained devices. The variety of services these devices would deliver and the access they may need to preexisting services introduces a need for an efficient and simple device and service discovery solution. Using standardized and widely adopted solutions would allow for faster inte...
Conference Paper
Full-text available
Quality of Service (QoS) metrics have been traditionally used to evaluate the perceived quality of services delivered by network operators. However, these metrics are not suitable for evaluating the experience of an end-user. The experience of a user is quantified based upon activities such as speed of web page loading, quality of video streaming,...
Conference Paper
Full-text available
Cyber Physical Systems (CPSs) are widely expected to be formed of networked resource constrained devices. To suit the constraints of such networks, the IETF developed the RPL routing protocol for Low-power and Lossy Networks (LLNs). Security in CPSs is important for maintaining the integrity and privacy of data, while also improving network resilie...
Conference Paper
Full-text available
With the growth of the mobile Internet customer base we expect that mobile operators may feel tempted to apply certain traffic shaping techniques. Mobile operators may view such traffic shaping techniques as a quick and a cost-effective way of ensuring more “equalized" Quality of Service (QoS). A situation when a more bandwidth hungry application i...
Conference Paper
Full-text available
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in the Internet community. In particular, it defines objects for managing the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL).
Article
Full-text available
The embedded computing devices deployed within the Internet of Things are expected to be resource constrained. This resource constraint not only applies to memory and processing capabilities, but the low-power radio standards utilized further constrain the network interfaces. The IPv6 protocol provides a suitable basis for interoperability in the I...
Conference Paper
Full-text available
Telemetry is an important function of the Internet of Things as it is being developed and deployed today. Of particular interest within this area are energy monitoring services. In this paper we describe WattsApp, a social teleme- try gathering and comparison platform, which was built as a demonstrator that integrates technologies from embedded sys...
Conference Paper
Full-text available
TheIETFhasdevelopedseveralsolutionsthatpromoteIPv4andIPv6 co-existence, but they need to be thoroughly tested on a large scale, before they can actually be considered as viable solutions. In the following study we present an experimental evaluation of the two popular transitioning technologies: NAT64 and Dual-Stack Lite. Our first goal is to identi...
Conference Paper
Full-text available
The IETF developed the RPL routing protocol for Low power and Lossy Networks (LLNs). RPL allows for automated setup and maintenance of the routing tree for a meshed network using a common objective, such as energy preservation or most stable routes. To handle failing nodes and other communication disturbances, RPL includes a number of error correct...
Conference Paper
Full-text available
Energy-efficiency in underwater networks is essential since nodes are mostly battery powered and it is difficult to replenish their supply. Furthermore, since underwater acoustic sensor networks are effected by ambient environmental conditions leading to volatile network dynamics, large propagation delays and a high probability of error in transmis...
Conference Paper
Full-text available
Frequent partitions, intermittent connectivity and message delivery delay are the commonly observed characteristics of disruption tolerant networks (DTNs). These networks often operate over extended periods since they are regularly deployed in harsh and constrained environments. Efficient energy conservation is therefore necessary to prolong networ...
Conference Paper
The maximum potential for underwater exploration rests within the use of multiple Autonomous Underwater Vehicles (AUVs) and tasks involving human diver-AUV coordination. Such missions are gaining increasing popularity with the advent of better control mechanisms and availability of acoustic modems. However, high costs and the lack of useful tools t...
Conference Paper
Full-text available
The maximum potential for underwater exploration rests within the use of multiple Autonomous Underwater Vehicles (AUVs) and tasks involving human diver-AUV coordination. Such tasks require dependable underwater wireless communications, which normally utilize the rapidly varying acoustic channel. Rigorous testing of underwater acoustic communication...
Conference Paper
Full-text available
Global climate change is a widely accepted phenomenon and it is well understood that it is also leading to changes in the oceanic conditions. Increased industrial activities have also led to anthropogenic ocean acidification, the effects of which, on marine ecosystems, is a vigorously investigated topic. However, the impact of these phenomenon on u...
Conference Paper
Full-text available
Missions involving multiple Autonomous Underwater Vehicles (AUVs) are gaining increasing popularity with the advent of better control mechanisms and availability of acoustic modems that allow for cooperative networked tasks to be carried out by Unmanned Underwater Vehicles (UUVs). However, high costs associated with offshore testing and the lack of...
Conference Paper
Full-text available
Underwater wireless networks consist of mobile and static nodes, which usually communicate using the acoustic channel since radio transmissions attenuate rapidly and optical communication is only suitable for short distances. The underwater acoustic channel is plagued with issues of high transmission power requirements, rapidly changing channel cha...
Conference Paper
Full-text available
Stereo cameras, laser rangers and other time-of-flight ranging devices are utilized with increasing frequency as they can provide information in the 3D plane. The ability to perform real-time registration of the 3D point clouds obtained from these sensors is important in many applications. However, the tasks of locating accurate and dependable corr...
Conference Paper
Full-text available
Disruption tolerant networks (DTNs) is a research area aiming at developing network communication when connectivity is intermittent and prone to disruptions. DTNs have many applications in remote and hazardous areas where they need to operate over long time periods under energy constraints. Therefore, efficient energy conservation schemes are neces...
Conference Paper
Full-text available
As a result of the large area to be monitored in most underwater sensor network applications, many acoustic networks have a sparse topology. The underwater acoustic channel characteristics can cause power consumption of nodes to be quite high. This paper presents information on a work in progress to design a power management scheme for asynchronous...
Conference Paper
Full-text available
It is well established that path loss in the underwater acoustic channel is dependent on the transmission distance and signal frequency utilized, thereby causing the capacity to be dependent on transmission distance. It has been demonstrated that this dependence of capacity can lead to significant effects on the design of topologies for underwater...
Conference Paper
Full-text available
Sensing systems for AUVs are deeply researched but post mission deployment recovery systems for these vehicles are equally important. This paper presents a low-cost recovery system designed to provide post mission recovery location discovery capabilities to AUVs. The recovery system discussed relies on inter-aural time differentiation of sonar puls...
Conference Paper
This paper presents, CoViS, a low-cost real-time amphibious optical computer vision system based on a modified 4-connectivity approach that scans acquired frames from a video stream for a target hue range and then applies a few advanced techniques of image processing to the video as well. The relatively fast and inexpensive system provides Cartesia...
Conference Paper
Full-text available
Sensing systems for AUVs are deeply researched but post mission deployment recovery systems for these vehicles are equally important. This paper presents a low-cost recovery system designed to provide post mission recovery location discovery capabilities to AUVs. The recovery system discussed relies on inter-aural time differentiation of sonar puls...
Conference Paper
Full-text available
This paper presents, CoViS, a low-cost real-time amphibious optical computer vision system based on a modified 4-connectivity approach that scans acquired frames from a video stream for a target hue range and then applies a few advanced techniques of image processing to the video as well. The relatively fast and inexpensive system provides Cartesia...
Conference Paper
Full-text available
The US Navy's Office of Naval research and the Association for Unmanned Vehicles Systems International organize an annual autonomous underwater vehicle competition where vehicles must attempt to perform simulated real-world tasks. This paper describes Jal, the new AUV designed by the student team of IURS for the purpose of competing in this competi...
Conference Paper
Full-text available
Even though a lot of research has been devoted towards AUVs in the West, the developing Eastern nations like India lack programs for development of AUV technologies that would better position them to understand their oceans. As such, the Indian Underwater Robotics Society started development of the first Indian AUV that would be portable and low co...
Conference Paper
TOUCH is a real-time computer vision system that has been developed in order to aid the operation of autonomous underwater vehicles (AUVs) and remotely operated vehicles (ROVs). The algorithm is based on a modified 4-connectivity approach that scans the incoming frames for a target hue range and based upon the largest connected blobs of hue, tracks...
Article
Full-text available
Power management for nodes in a sensor network is a topic of great interest due to the limited resources available on sensor devices and the need to maximize the network lifetime and delivery ratios. This problem is further compounded in Disruption Tolerant Networks (DTNs) since they are characterized with frequent partitions and intermittent conne...

Network

Cited By

Projects

Projects (2)