Rupayan Das

Rupayan Das
  • Doctor of Philosophy
  • Professor (Associate) at INSTITUTE OF ENGINEERING & MANAGEMENT

About

33
Publications
11,702
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
196
Citations
Introduction
I am currently working on Data gathering and Recharging in Wireless Rechargeable Sensor Network.
Current institution
INSTITUTE OF ENGINEERING & MANAGEMENT
Current position
  • Professor (Associate)
Additional affiliations
August 2013 - present
University of Engineering & Management
Position
  • Professor (Assistant)
August 2013 - November 2015
Institute of Engineering & Management
Position
  • Professor (Assistant)
Education
July 2019 - July 2024
National Institute of Technology Patna
Field of study
  • Computer Science & Engineering

Publications

Publications (33)
Article
To make the data gathering process smooth and efficient, the use of static sink (SS) and mobile sink (MS) become popular in wireless sensor network (WSN). But it has been observed that, the SS-based data gathering process consumes more energy compare to MS-based data gathering process and that is why, in recent years, the use of mobile sink (MS) in...
Article
Full-text available
A speckle suppression approach for ultrasound images is presented in this research. An initial image is first enhanced using image enhancement techniques, which is used to change the image's intensities. The image is smoothed, and the noise is removed in the next stage, which is accomplished through image preprocessing with median filters. The thre...
Article
Full-text available
The state of the art trust management techniques especially designed for wireless sensor network, are not well suited due to less battery power and less memory of sensor nodes. In this work, we propose a fuzzy based hierarchical trust management scheme which includes direct trust calculation on real time past experience and credit based calculation...
Article
Full-text available
This article proposes a solution to the factorization problem in cryptographic systems by leveraging the steps of the Toom‐Cook algorithm for large‐number multiplication. This approach can factor a 200‐bit number, with performance varying depending on memory and processing power. Experiments demonstrate that the factorization problem in cryptograph...
Article
In recent times, there has been a significant surge in research interest in security, driven by the continuous growth of threats and cyber attacks. Recognizing that existing state-of-the-art security schemes may not adequately address the requirements for lightweight properties and enhanced security measures, the aim of this research is to contribu...
Article
Full-text available
The drone sector is witnessing a surge in demand for advanced models tailored to address critical applications such as disaster management and intelligent warehouse deliveries. Employing simulation-based experiments with virtual drone navigation is considered a best practice before deploying physical models. Nonetheless, the current state-of-the-ar...
Article
Full-text available
Many cutting‐edge studies on collaborative data gathering and charging (CDAC) assume that the mobile vehicle (MV) has enough energy to charge the sensors as well as collect data from them. The current studies also took into account that the sensors always receive full charge from the MV, resulting in a wireless rechargeable sensor network (WRSN) wi...
Article
Full-text available
The primary objective of this work is to develop an algorithm for detecting the secret round key used in encryption by analyzing a collection of plaintexts and ciphertexts encrypted with the three-round Kuznyechik algorithm. In addition, the fundamentals of using the integral cryptanalysis method for the Substitution-permutation (SP) network-based...
Article
Numerous state-of-the-art works on joint data gathering and charging (DGAC) believe that the mobile vehicle (MV) has sufficient energy to charge the sensors and collect data from them by travelling across the path. The existing works also considered that the sensors always get full charge from MV which produces negligible dead period and minimum da...
Article
Full-text available
Very soon, trillions of wireless gadgets will be linked to billions of people, resulting in an overloaded spectrum. Device-to-device (D2D) wireless communication offers a new paradigm for addressing these impending issues by permitting the transmission of data between proximity devices. However, if the D2D communication system is not secured, the q...
Article
Full-text available
Most of the existing works on periodic charging consider that the mobile charger (MC) has enough energy to charge the sensors by travelling across the charging path. The existing works also assumed that the sensors always get full charge from MC and hence negligible dead period occurs for sensors in wireless sensor network (WSN). However, the above...
Conference Paper
Full-text available
Abstract— In recent years, wireless charging technology (WCT) has gained huge popularity among the researchers for charging the sensors in wireless rechargeable sensor networks (WRSN). In most of the existing literatures, the MC does not work perfectly and increases the chance of improper energy utilization and further responsible for early death o...
Article
Full-text available
The fact that falling is often accepted as a natural part of the aging process is of little surprise. In fact, it is the impact that is of greatest concern rather than the occurrence of falls in the elderly. Typically aging people are frailer, more unstable, and have slower reactions, so they are more likely to fall and get injured than younger peo...
Chapter
Full-text available
Internet of Things (IoT) has appeared as a current and vigor-ous research area where security in terms of trust management plays a major role. IoT network is established with some heterogeneous devic-es like smart sensor, smart phone, laptop etc. Apart from group com-munication every smart devices communicate with its nearest Fog node in order to s...
Conference Paper
Full-text available
Clustering is one of the important topics in the network lifetime in wireless sensor networks (WSNs). It comprises of grouping of sensor nodes of same nature and choosing appropriate cluster heads (CHs) for respective groups. In Clustered WSN CHs accumulate the data from respective cluster members (CM) and forward the filtered data directly to the...
Conference Paper
Full-text available
In recent trends Ultra wide-band Wireless Body Area Networks have rapidly progressed in biotelemetry system which is most dominant field in today's research work. In hyperthermia and biotelemetry needs the concept of implemented antenna in human body. To construct practical use of antennas inside a human body, resonance characteristics of the impla...
Article
Full-text available
The air and ambience of Wireless Sensor Network (WSN) are always suitable for intruders and they always gear up to hit this network. So the safety of WSN is very much essential and extremely challenging. Lots of intrusion detection schemes have been proposed and trust management is a significant part of them. The traditional trust management scheme...
Conference Paper
Full-text available
Multiplier is the basic key of most of the high performance and complex systems like Digital Signal Processors, Microprocessors, and Filters etc. Multiplier design using ancient Vedic mathematics is recent trends of the designers. Recently proposed digital multiplier using the popular sutra “Ekanyunena Purvena” of Vedic mathematics has been analyse...
Chapter
Full-text available
Multiplication is the fundamental operation in mathematics as well as in the field of engineering. Multiplier is the core part of Digital Signal Processor. In this paper a new approach of multiplier design using the Vedic mathematics has been proposed. The procedure of multiplication using Vedic mathematics is very simple, easy and time saving. The...
Article
Full-text available
This paper proposes a hybrid approach to enhanced data security using special matrices in conjunction with Steganography. The special matrices are used for mapping the actual characters to numbers which are actually pointers to the location of the characters in the matrices. The generated numbers corresponding to each character of the message are e...
Article
Full-text available
Vigenere Cipher is an encrypting method of alphabetic text using different Shift ciphers or additive based on letter of keywords [1]. It works on the set of 26 alphabets; however its scope is not just limited to English alphabets. Being an old method it’s been vulnerable to many attacks. The proposed algorithm is to add a new dimension to this trad...
Conference Paper
Full-text available
Now days, the information processing system plays crucial part in the internet. Barcodes have been used as an effective way to securely share information .In this paper we proposed a new and robust technique called ‘Bar Cipher’ to hide any number in our computers in an image form. This image form is known as Barcode and the process of hiding or enc...
Article
Full-text available
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tu...

Questions

Questions (6)
Question
Wireless Sensor Network (WSN) is a sensor network where all the sensor devices (motes) are connected using wireless link. Security of various wireless link is a major concern in this network because wireless network is highly affected by intruder than wired network. And trust management issue is the part of security which ensure the trust of a system.
Question
IS THERE ANY SCOPUS INDEXED JOURNAL WITH ZERO PUBLICATION CHARGE IN COMPUTER SCIENCE?
Question
I am Working with Trust Management Scheme in Wireless Sensor Network. My question is how to implement or simulate this scheme through simulator? .

Network

Cited By