Rudra Dutta

Rudra Dutta
North Carolina State University | NCSU · Department of Computer Science

Ph.D., Computer Science, North Carolina State University, 2001

About

179
Publications
20,862
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,798
Citations

Publications

Publications (179)
Preprint
Full-text available
Peer-to-peer (P2P) botnets use decentralized command and control networks that make them resilient to disruptions. The P2P botnet overlay networks manifest structures in mutual-contact graphs, also called communication graphs, formed using network traffic information. It has been shown that these structures can be detected using community detection...
Preprint
Full-text available
National radio dynamic zone (NRDZs) are intended to be geographically bounded areas within which controlled experiments can be carried out while protecting the nearby licensed users of the spectrum. An NRDZ will facilitate research and development of new spectrum technologies, waveforms, and protocols, in typical outdoor operational environments of...
Article
The Aerial Experimentation and Research Platform for Advanced Wireless (AERPAW) has been recently funded by the National Science Foundation (NSF)’s Platforms for Advanced Wireless Research (PAWR) program. The AERPAW platform will enable experiments with programmable radios and programmable unmanned aerial vehicles (UAVs), conducted in a safe and re...
Article
The 5G mobile communications systems merge traditionally separate communications and networking systems and services to effectively support a myriad of heterogeneous applications. Researchers and industry working groups are investigating the integration of aerial nodes, shared spectrum techniques, and new network architectures, which are gradually...
Article
Full-text available
Interconnection between our existing optical packet and circuit integrated network (OPCInet) and an ecosystem for network service provisioning named ChoiceNet enables network service providers to provide diverse services and realize control driven by the providers. In this paper, we design and implement control interfaces for the interconnection, w...
Article
Full-text available
Network administration and management tasks play an integral role in Information Technology (IT) operations; which are utilized across a diverse set of organizations. The reliability of networks is therefore of crucial importance for ensuring effective business processes. All IT networks are administered and managed by human administrators. As the...
Article
Network service orchestration across heterogeneous networks needs an open marketplace where the services advertised by the providers in different domains can be purchased for short-term or long-term time scales. The authors present two design paradigms and evaluate two corresponding prototypes which provide a framework for network services to be pu...
Article
In various resource sharing networks, opportunistic resources with dynamic quality are often present for the users to exploit. As many user tasks are delay-tolerant, this favorably allows the network users to wait for and access the opportunistic resource at the time of its best quality. For such delay-tolerant and opportunistic resource sharing ne...
Article
Full-text available
Communication networks and services play a vital role in our modern lives. This importance is expected to continue to grow in future decades. More and more business, healthcare or government organizations will become increasingly dependent on the communication between their offices and people. Not only does modern society depend on these services i...
Article
Zero-determinant (ZD) strategies that allow a player to unilaterally control the linear combinations of its own and other players' expected rewards in iterated games have recently found wide applications. However, existing ZD strategies mainly focus on some specific scenarios with restrictions on the number of players or actions a player can take....
Article
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection. However, this increase of security may come at the expense of increased vulnerabilities in another...
Article
Full-text available
Software obfuscation is a commonly used technique to protect software, especially against reverse-engineering attacks. It is a form of security through obscurity and is commonly used for intellectual property and Digital Rights Management protection. However, this increase of security may come at the expense of increased vulnerabilities in another...
Article
Full-text available
Computer and communication networks form part of the critical infrastructure of planetary society, and much work has gone into making the technology for such networks reliable. However, such networks have to be administered and managed by human administrators. The process of such administration, as it becomes increasingly complex, itself poses a ch...
Article
Optical networks continue to provide the highperformance, high-bandwidth substrate of the planetary communication networks. The rapidly increasing and changing variety of demands placed on such networks requires that optical networks be increasingly agile and responsive to end-consumer traffic needs. Because of multiple levels of aggregation, the o...
Article
The problem of providing an agile, energy-aware, flexible optical network architecture is one of the challenges in optical networking in the coming decade. A key element in this challenge is the balancing of the benefits to customer and provider, and creating an agile system capable of reflecting both provider and customer interests on an ongoing b...
Article
Motivated by information-theoretic security, link signature (LS)-based security mechanisms exploit the ample channel characteristics between wireless devices for security establishment. Nevertheless, LS is originated from wireless environments and hence may exhibit potential vulnerabilities that can be exploited by adversary in the vicinity. As to...
Conference Paper
Full-text available
Wireless multihop networks have a wide variety of applications, due to their rapid deployment times and minimal configuration requirements. Transmissions in wireless networks may require performance guarantees, which can be achieved by using advanced routing strategies. We examine one such performance metric, namely reliability, or packet delivery...
Conference Paper
Wireless multihop networks such as ad hoc and mesh networks are susceptible to both random uncertainty of radio links and malicious jamming. Traditional unipath routing techniques reduce the overall packet delivery ratio in presence of network failures. Being able to predict the reliability of a transmission a priori can be useful in designing reli...
Conference Paper
Software Defined Networking (SDN) offers traffic characterization and resource allocation policies to change dynamically, while avoiding the obsolescence of specialized forwarding equipment. Open Flow, a SDN standard, is currently the only standard that explicitly focuses on multi-vendor openness. Unfortunately, it only provides for traffic enginee...
Article
The Internet has been a key enabling technology for many new distributed applications and services. However, the deployment of new protocols and services in the Internet infrastructure itself has been sluggish, especially where economic incentives for network providers are unclear. In our work, we seek to develop an "economy plane" for the Internet...
Conference Paper
In this study, we present a control theoretic technique to model routing in wireless multihop networks. We model ad hoc wireless networks as stochastic dynamical systems where, as a base case, a centralized controller pre-computes optimal paths to the destination. The usefulness of this approach lies in the fact that it can help obtain bounds on...
Article
Full-text available
In this paper, we make an initial attempt to employ Grounded Theory approach to gather the corpus of common human errors in the current process of network administration and management over a large variety of organizations and working environments; categorize such errors regarding their potential impact on the security of future script-based manage...
Conference Paper
In this work, we demonstrate the real world results of a verification service that verifies the performance of a set of network providers by measuring the user flows, using GENI experimental facility. We first give an overview of the architectural components and their interactions to enable such a verification capability. We then give the experimen...
Conference Paper
We articulate how the area of traffic grooming may be combined with the ChoiceNet Future Internet architecture, to create an agile system capable of reflecting both provider and customer interests on an ongoing basis as network conditions change.
Chapter
While the mesh network paradigm does not constrain the physical and medium layer realizations, some technologies emerge over time as clearly being better suited. This becomes especially true when considering service continuity issues, and therefore robustness of enabling technologies. In recent times, Multiple Input Multiple Output (MIMO) technolog...
Book
Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and i...
Chapter
At the beginning of our research, we identified that there are very limited research is being done on SIP proxy server performance and VoIP in general. In a very fast phase, due to the growth of Internet based technologies, IP telephony quickly became a direct replacement for PSTN. Lack of any SIP proxy server performance study is mainly because of...
Chapter
With our detailed comparative study of M ∕ M ∕ 1 model with the experimental results with the open source SIP proxy server software (IPTEL 2002) and also with our proposed analytical M ∕ D ∕ 1 model, we continued our study more on the internal details of SPS software components, processes and complete software implementations. During the course of...
Chapter
This book focused on studying the performance characteristics and scalability aspects of SIP proxy server, which plays a vital role in the SIP architecture based network. Since it is not realistically possible to simulate or emulate the real world SIP network and study the performance characteristics of the SIP proxy server, significant effort was...
Chapter
Both academia and telecommunication industries did several studies and published many literatures on the performance and reliability of PSTN based SS7 signaling. Authors in Wang (1991) studied the performance analysis of link sets on the CCS7 network based on SS7 signaling with complete derivation on the analytical queuing and delay models. Several...
Chapter
During the 1990s, the telecommunication industries provided various PSTN services to the subscribers using an Intelligent Network (IN) called Signaling System Number 7 (SS7). SS7 was considered one of the most reliable and capable signaling protocols. IN is defined as an architectural concept for the operation and provision of services as recommend...
Chapter
Security to SIP network is of foremost important, since SIP is deployed in a large scale in various industries, universities, Department of Defense, banks, Wall Street and other areas where they use Internet telephony. Very little research has been focused so far in evaluating the SPS when different non-secure and secure transport protocols are use...
Chapter
Statistical definitions and formulae references from Matthews (2002) and Yan and Su (2009). ANOVA stands for Analysis Of Variance. In general, this statistical procedure compares the variance of scores in each of the groups of an experiment. With the two sample t-tests, we can have experiments with only two groups. With ANOVA, we can have as many g...
Chapter
During the course of this research, we realized that the performance of the proxy server, which is fundamentally a software entity, depends heavily on the software architecture of the system (that is, how the functionality is factored, and apportioned between various threads of execution, and various ways to communicate between functional modules)....
Chapter
In applications, it is often important to forecast the value of a random variable Y (which can be difficult or impossible to measure directly) using the observations of another random variable X (which can be more accessible for direct measurements). An important result of the probability theory is that when the two random variables are normal the...
Chapter
The core idea for this part of research is to investigate the multi proxy environment, so that the SIP calls can pass through multiple proxy servers and latency is considered. We investigated the impact of Call Hold Time (CHT) in SPS performance with the help of a separate empirical study in the lab. For this study, we considered a multi-hop proxy...
Conference Paper
In this paper, we propose a service architecture for verification, a necessary component of a choice-based economy architecture of the future Internet. Such a verification architecture motivates and addresses the task of enabling users to verify, or obtain third-party verification of, whether the service components offered by various network servic...
Conference Paper
The problem of providing an agile, energy-aware, flexible optical network architecture is one of the challenges in optical networking in the coming decade. A key element in this challenge is the balancing of the benefits to customer and provider, and creating an agile system capable of reflecting both provider and customer interests on an ongoing b...
Article
Full-text available
Network virtualization refers to a broad set of technologies. Commercial solutions have been offered by the industry for years, while more recently the academic community has emphasized virtualization as an enabler for network architecture research, deployment, and experimentation. We review the entire spectrum of relevant approaches with the goal...
Conference Paper
Computer networks, in particular the Internet, represent essential infrastructure for business, government, military, and personal communication. Several recent trends in technology and network use have pushed the capabilities required of the Internet beyond what can be provided by the currently deployed infrastructure. To address these limitations...
Chapter
The general concept of fault tolerance can be quantified in various different metrics, reflecting different needs, concerns and perceived risks. We start with a short primer on the general concept of survivability, and introduce some of these metrics. We argue that availability and performability are useful metrics to reflect the goal of service co...
Chapter
Having described individual problems of design in mesh networks in an earlier chapter, we now describe design problems that more recent literature has focused on, which address the problem of jointly designing more than one functional or operational aspect of the network, such as joint routing and power control. As before, we survey solution approa...
Chapter
We continue our discussion of traditional design problems in mesh networks, preparatory to the discussion of joint design in a following chapter. In this chapter, we focus on network-wide issues in mesh design, or issues that in some sense emerge at the network level. In particular, we focus on routing, deployment planning, performance modeling, ra...
Chapter
To enable the discussion of joint design in a following chapter, we introduce and discuss the more traditional design problems in this chapter. We focus on organizing our discussion by the fundamental problems and operations in the network. In particular, in this chapter, we focus on issues closer to the physical medium, such as the modeling of int...
Chapter
The recently emerged paradigm of Wireless Mesh Networks (WMN) is finding applicability in last few miles and last hop connectivity, and the study of WMNs is useful in understanding multihop wireless networks for more specific application domains as well as mesh networks themselves. We briefly introduce the mesh paradigm, and remark on the very gene...
Article
Full-text available
There has been a great interest in defining a new network architecture that can meet the needs of a future Internet. One of the main challenges in this context is how to realize the many different technical solutions that have developed in recent years in a single coherent architecture. In addition, it is necessary to consider how to ensure economi...
Article
Full-text available
With recent advances in Software-defined Radios (SDRs), it has indeed became feasible to dynamically adapt the channel widths at smaller time scales. Even though the advantages of varying channel width (e.g. higher link throughput with higher width) have been explored before, as with most of the physical layer settings (rate, transmission power etc...
Article
Full-text available
The back-pressure based scheduling policy originally proposed by Tassiulas et al. in [1] has shown the potential of solving many fairness and network utilization related problems of wireless multi-hop networks. Recently, the scheduling policy has been adapted in random medium access protocols such as CSMA/CA using prioritization of MAC layer transm...
Conference Paper
Optical networks are widely used in communication systems. Finding optimal converter placement for broadcast on optical networks has been an important area of research. In this problem, the free wavelengths on different links of a optical network are used to support network-wide broadcast, which is useful as a control channel or other OAM tasks. Pr...
Conference Paper
Full-text available
Ad hoc wireless networks are characterized by frequent node mobility, limited power reserves and interfering transmissions. On-demand routing proves to be more successful in such networks, as it reduces the traffic overhead of sending periodic updates, but they may be susceptible to both random uncertainty in radio links, and malicious jamming. We...
Conference Paper
Full-text available
Wireless networks are susceptible to localized dis-ruptions, due to the shared nature of the medium. Radio jamming, the most common type of localized disruption causes wireless link failures. Jamming mitigation has been traditionally addressed in the physical and MAC layers. Such approaches come with added complexity and often require specialized h...
Article
In recent years, Internet Protocol (IP) telephony has been a real alternative to the traditional Public Switched Telephone Networks (PSTN). IP telephony offers more flexibility in the implementation of new features and services. The Session Initiation Protocol (SIP) is becoming a popular signalling protocol for Voice over IP (VoIP) based applicatio...