
Rupayan Das- Doctor of Philosophy
- Professor (Associate) at INSTITUTE OF ENGINEERING & MANAGEMENT
Rupayan Das
- Doctor of Philosophy
- Professor (Associate) at INSTITUTE OF ENGINEERING & MANAGEMENT
About
33
Publications
11,702
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
196
Citations
Introduction
I am currently working on Data gathering and Recharging in Wireless Rechargeable Sensor Network.
Current institution
INSTITUTE OF ENGINEERING & MANAGEMENT
Current position
- Professor (Associate)
Additional affiliations
August 2013 - present
August 2013 - November 2015
Education
July 2019 - July 2024
Publications
Publications (33)
To make the data gathering process smooth and efficient, the use of static
sink (SS) and mobile sink (MS) become popular in wireless sensor network
(WSN). But it has been observed that, the SS-based data gathering
process consumes more energy compare to MS-based data gathering process
and that is why, in recent years, the use of mobile sink (MS) in...
A speckle suppression approach for ultrasound images is presented in this research. An initial image is first enhanced using image enhancement techniques, which is used to change the image's intensities. The image is smoothed, and the noise is removed in the next stage, which is accomplished through image preprocessing with median filters. The thre...
The state of the art trust management techniques especially designed for wireless sensor network, are not well suited due to less battery power and less memory of sensor nodes. In this work, we propose a fuzzy based hierarchical trust management scheme which includes direct trust calculation on real time past experience and credit based calculation...
This article proposes a solution to the factorization problem in cryptographic systems by leveraging the steps of the Toom‐Cook algorithm for large‐number multiplication. This approach can factor a 200‐bit number, with performance varying depending on memory and processing power. Experiments demonstrate that the factorization problem in cryptograph...
In recent times, there has been a significant surge in research interest in security, driven by the continuous growth of threats and cyber attacks. Recognizing that existing state-of-the-art security schemes may not adequately address the requirements for lightweight properties and enhanced security measures, the aim of this research is to contribu...
The drone sector is witnessing a surge in demand for advanced models tailored to address critical applications such as disaster management and intelligent warehouse deliveries. Employing simulation-based experiments with virtual drone navigation is considered a best practice before deploying physical models. Nonetheless, the current state-of-the-ar...
Many cutting‐edge studies on collaborative data gathering and charging (CDAC) assume that the mobile vehicle (MV) has enough energy to charge the sensors as well as collect data from them. The current studies also took into account that the sensors always receive full charge from the MV, resulting in a wireless rechargeable sensor network (WRSN) wi...
The primary objective of this work is to develop an algorithm for detecting the secret round key used in encryption by analyzing a collection of plaintexts and ciphertexts encrypted with the three-round Kuznyechik algorithm. In addition, the fundamentals of using the integral cryptanalysis method for the Substitution-permutation (SP) network-based...
Numerous state-of-the-art works on joint data gathering and charging (DGAC) believe that the mobile vehicle (MV) has sufficient energy to charge the sensors and collect data from them by travelling across the path. The existing works also considered that the sensors always get full charge from MV which produces negligible dead period and minimum da...
Very soon, trillions of wireless gadgets will be linked to billions of people, resulting in an overloaded spectrum. Device-to-device (D2D) wireless communication offers a new paradigm for addressing these impending issues by permitting the transmission of data between proximity devices. However, if the D2D communication system is not secured, the q...
Most of the existing works on periodic charging consider that the mobile charger (MC) has enough energy to charge the sensors by travelling across the charging path. The existing works also assumed that the sensors always get full charge from MC and hence negligible dead period occurs for sensors in wireless sensor network (WSN). However, the above...
Abstract— In recent years, wireless charging technology (WCT) has gained huge popularity among the researchers for charging the sensors in wireless rechargeable sensor networks (WRSN). In most of the existing literatures, the MC does not work perfectly and increases the chance of improper energy utilization and further responsible for early death o...
The fact that falling is often accepted as a natural part of the aging process is of little surprise. In fact, it is the impact that is of greatest concern rather than the occurrence of falls in the elderly. Typically aging people are frailer, more unstable, and have slower reactions, so they are more likely to fall and get injured than younger peo...
Internet of Things (IoT) has appeared as a current and vigor-ous research area where security in terms of trust management plays a major role. IoT network is established with some heterogeneous devic-es like smart sensor, smart phone, laptop etc. Apart from group com-munication every smart devices communicate with its nearest Fog node in order to s...
Clustering is one of the important topics in the network lifetime in wireless sensor networks (WSNs). It comprises of grouping of sensor nodes of same nature and choosing appropriate cluster heads (CHs) for respective groups. In Clustered WSN CHs accumulate the data from respective cluster members (CM) and forward the filtered data directly to the...
In recent trends Ultra wide-band Wireless Body Area Networks have rapidly progressed in biotelemetry system which is most dominant field in today's research work. In hyperthermia and biotelemetry needs the concept of implemented antenna in human body. To construct practical use of antennas inside a human body, resonance characteristics of the impla...
The air and ambience of Wireless Sensor Network (WSN) are always suitable for intruders and they always gear up to hit this network. So the safety of WSN is very much essential and extremely challenging. Lots of intrusion detection schemes have been proposed and trust management is a significant part of them. The traditional trust management scheme...
Multiplier is the basic key of most of the high performance and complex systems like Digital Signal Processors, Microprocessors, and Filters etc. Multiplier design using ancient Vedic mathematics is recent trends of the designers. Recently proposed digital multiplier using the popular sutra “Ekanyunena Purvena” of Vedic mathematics has been analyse...
Multiplication is the fundamental operation in mathematics as well as in the field of engineering. Multiplier is the core part of Digital Signal Processor. In this paper a new approach of multiplier design using the Vedic mathematics has been proposed. The procedure of multiplication using Vedic mathematics is very simple, easy and time saving. The...
This paper proposes a hybrid approach to enhanced data security using special matrices in conjunction with Steganography. The special matrices are used for mapping the actual characters to numbers which are actually pointers to the location of the characters in the matrices. The generated numbers corresponding to each character of the message are e...
Vigenere Cipher is an encrypting method of alphabetic text using different Shift ciphers or additive based on letter of keywords [1]. It works on the set of 26 alphabets; however its scope is not just limited to English alphabets. Being an old method it’s been vulnerable to many attacks. The proposed algorithm is to add a new dimension to this trad...
Now days, the information processing system plays crucial part in the internet. Barcodes have been used as an
effective way to securely share information .In this paper we proposed a new and robust technique called ‘Bar
Cipher’ to hide any number in our computers in an image form. This image form is known as Barcode and the
process of hiding or enc...
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tu...
Questions
Questions (6)
New scope in Trust Management in WSN.
Wireless Sensor Network (WSN) is a sensor network where all the sensor devices (motes) are connected using wireless link. Security of various wireless link is a major concern in this network because wireless network is highly affected by intruder than wired network. And trust management issue is the part of security which ensure the trust of a system.
#Wireless Sensor Network (WSN)
IS THERE ANY SCOPUS INDEXED JOURNAL WITH ZERO PUBLICATION CHARGE IN COMPUTER SCIENCE?
I am Working with Trust Management Scheme in Wireless Sensor Network. My question is how to implement or simulate this scheme through simulator? .