Sukumar Nandi

Sukumar Nandi
Indian Institute of Technology Guwahati | IIT Guwahati · Department of Computer Science and Engineering

Ph D

About

432
Publications
73,063
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,687
Citations
Citations since 2016
142 Research Items
2578 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
Additional affiliations
September 2009 - present
Indian Institute of Technology Guwahati
Position
  • Professor (Full)

Publications

Publications (432)
Article
The volume of video traffic as infotainment service over vehicular ad hoc network (VANET) has rapidly increased for past few years. Providing video streaming as VANET infotainment service is very challenging because of high mobility and heterogeneity of vehicular networks. While the number of mobile gateways (vehicles connected to the Internet) nee...
Article
Full-text available
In this paper, the performance of the millimeter-wave (mmWave) massive multiple-input multiple-output (mMIMO) non-orthogonal multiple access (NOMA) systems is investigated under multiple user scenarios. The performance of the system has been analyzed in terms of spectral efficiency (SE), energy efficiency (EE), and computational complexity. In the...
Preprint
Full-text available
We present the AsNER, a named entity annotation dataset for low resource Assamese language with a baseline Assamese NER model. The dataset contains about 99k tokens comprised of text from the speech of the Prime Minister of India and Assamese play. It also contains person names, location names and addresses. The proposed NER dataset is likely to be...
Conference Paper
We present the AsNER, a named entity annotation dataset for low resource Assamese language with a baseline Assamese NER model. The dataset contains about 99k tokens comprised of text from the speech of the Prime Minister of India and Assamese play. It also contains person names, location names and addresses. The proposed NER dataset is likely to be...
Article
Full-text available
Reduplication is a productive morphological process widely used in a substantial number of languages in the world. Reduplication is a well-studied phenomenon, and several typological works have provided evidence for different types of reduplication in most of the languages around the world. Addressing reduplication plays a vital role in the efficie...
Chapter
With a significant increase in the compute-intensive mobile applications in recent times, the seamless integration of the cloud platform with mobile devices becomes essential. As a result, the mobile cloud computing (MCC) and mobile edge computing (MEC) paradigm become prominent in today’s era. At the same time, scheduling user applications in thes...
Chapter
Aadhaar is one of the largest biometric identity systems in the world which aims to assign a unique digital identity to each resident of India. A resident can authenticate himself using his Aadhaar number and a biometric. Biometric is a very sensitive data, and registered devices were introduced to eliminate the use of stored biometrics. Each regis...
Preprint
The Internet of Vehicles (IoV) is flourishing and offers various applications relating to road safety, traffic and fuel efficiency, and infotainment. Dealing with security and privacy threats and managing the trust (detecting malicious and misbehaving peers) in IoV remains the most significant concern. Artificial Intelligence is one of the most rev...
Article
Video traffic over Internet of vehicles is increasing day by day to provide passengers on-board infotainment services. A video streaming service over Internet of vehicles involves design challenges of vehicular gateway selection, and vehicle to vehicle collaboration. Vehicular gateway selection is challenging due to high vehicle mobility and time-v...
Article
Full-text available
Millimeter wave communication and massive MIMO technology are important ingredients for the future generation communication system. In this context, hybrid precoding (HP) is one of the most promising solutions, and it becomes utterly important in the case of the multi‐user scenario. In this paper, authors have analyzed the performance of the lattic...
Article
Full-text available
To leverage the performance of vehicular communication, hybrid dedicated short-range communications (DSRC) /WiMAX technology plays a major role in today's scenario. By establishing interoperability between DSRC and WiMAX technologies, communications between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) have been achieved in moving co...
Chapter
The Internet of Things (IoT) is one of the largest technological evolutions of computing. With the rapid development of communication, there was a tremendous growth of IoT technology across various fields. IoT devices might be resource-constrained like sensors, actuators, and embedded devices with the IEEE 802.15.4. IoT enables widespread and ubiqu...
Article
Recent studies have revealed that the energy hole problem caused by multi-hop data collection in a static data collector based wireless sensor network(WSN) is a major threat to the lifetime of the network. With the advancement of mobile terminal technology, the application of mobile data collectors (MDCs) has gained popularity in a large scale WSN....
Article
The primary issue in Wireless Sensor Network (WSN) based monitoring applications is the preservation of the sensing coverage under the harsh physical environment. WSN forms the monitoring infrastructure, where a large set of energy-constrained sensor nodes are deployed to collect the physical parameters of the environment. The sensor nodes communic...
Chapter
Named Data Networking (NDN) is a clean slate Future Internet Architecture that incorporates the visionary idea of focusing on contents instead of its location/host. It is mainly designed to address long-standing problems in current IP architecture such as security, mobility, and content distribution inefficiency. NDN introduces one specific layer c...
Book
This book comprises the select proceedings of the International Conference on Emerging Global Trends in Engineering and Technology (EGTET 2020), held in Guwahati, India. The chapters in this book focus on the latest cleaner, greener, and efficient technologies being developed for the implementation of smart cities across the world. The broader topi...
Article
Without an effective vaccine, treatment, or therapy, the COVID-19 spreading like fire and claiming lives. Countries began to adopt various strategies such as lockdown, mass testing, tracing, quarantine, sanitization, isolation, and treatment to contain COVID-19. However, it was soon realized that we need to take the help of powerful technologies to...
Preprint
Recently, Government of India has taken several initiatives to make India digitally strong such as to provide each resident a unique digital identity, referred to as Aadhaar, and to provide several online e-Governance services based on Aadhaar such as DigiLocker. DigiLocker is an online service which provides a shareable private storage space on pu...
Article
Design of the power grid network (PGN) of a VLSI chip is a challenging task because of the increase in network complexity. Due to the presence of resistances of the metal lines of the PGN, voltage drops occur in the form of IR drop, which can change the voltage level of underlying logic circuits, resulting in malfunction of the System-on-Chip (SoC)...
Conference Paper
Management of virtual network function (VNF) service chaining for a large scale network spanning across multiple administrative domains is difficult due to the decentralized nature of the underlying system. Existing session-based and software-defined networking (SDN) oriented approaches to manage service function chains (SFCs) fall short to cater t...
Article
A major impediment to the adoption of vehicular ad-hoc networks (VANETs) today is their privacy and security concerns. In this paper, we address the privacy aspects of VANETs. Specifically we build a scheme that provides non-repudiation, message authentication, integrity, and non-traceability (or source location privacy) while maintaining low overh...
Article
In the Internet of Vehicles (IoV), vehicles communicate wirelessly with other vehicles, sensors, pedestrians, and roadside units. IoV is aimed at improving road safety, driving comfort, and traffic efficiency. However, IoV is exposed to a range of threats to security and privacy. The presence of dishonest and misbehaving peers in the system is of a...
Preprint
Full-text available
One of the biggest challenges associated with connected and autonomous vehicles (CAVs) is to maintain and make use of vehicles health records (VHR). VHR can facilitate different entities to offer various services in a proactive, transparent, secure, reliable and in an efficient manner. The state-of-the-art solutions for maintaining the VHR are cent...
Article
Internet of Things (IoT) platforms use a large number of low-cost resource constrained devices and generates millions of short-flows. In-network processing is gaining popularity day by day to handle IoT applications and services. However, traditional software-defined networking (SDN) based management systems are not suitable to handle the plug and...
Article
With the advancement of technology nodes, Electromigration (EM) signoff has become increasingly difficult, which requires a considerable amount of time for an incremental change in the power grid (PG) network design in a chip. The traditional Black’s empirical equation and Blech’s criterion are still used for EM assessment, which is a time-consumin...
Preprint
With the increase in the complexity of chip designs, VLSI physical design has become a time-consuming task, which is an iterative design process. Power planning is that part of the floorplanning in VLSI physical design where power grid networks are designed in order to provide adequate power to all the underlying functional blocks. Power planning a...
Chapter
With the rapid advancement in connected and automated vehicle technologies, a widespread use case cooperative adaptive cruise control (CACC)‐based platooning is gaining momentum. The CACC‐based platooning can enhance safety and driving comfort, increase traffic throughput, and reduce fuel consumption and pollutant emissions. Various platooning mane...
Article
Real-world networks, such as biological, biomedical and social networks, often contain overlapping and intrinsic communities. More significantly, such networks are growing or evolving over time, which leads to a continuous alteration of community structures. Detecting overlapping community together with intrinsic structures in evolving scenarios is...
Article
Recently, social media has been considered the fastest medium for information broadcasting and sharing. Considering the wide range of applications such as viral marketing, political campaigns, social advertisement, and so on, influencing characteristics of users or tweets have attracted several researchers. It is observed from various studies that...
Article
Named Data Networking (NDN) is a promising candidate of Future Internet Architecture (FIA) designed to solve many long-standing issues in current IP architecture such as security, mobility, and content distribution inefficiency. Pending Interest Table (PIT) is one of the essential building blocks of NDN, which is used in the successful delivery of...
Chapter
Vehicle-to-infrastructure (V2I) communication enables a variety of applications and services, including safety, infotainment, mobility, payment, and so on, to be accessed and consumed. However, V2I requires seamless connectivity without having to worry about transitions between and across heterogeneous networks. In the next generation 5G heterogene...
Chapter
MPTCP aggregates multiple network interfaces for a single TCP session for enhanced transfer rates and improved reliability to applications. Due to this property, MPTCP has the potential to provide better end-user viewing experience (QoE) for DASH video when used instead of TCP on a multi-homed device. This paper evaluates the performance of DASH on...
Chapter
Cooperative Intelligent Transportation Systems (C-ITS) is one of the most prominent solutions to facilitate many new exciting applications concerning road safety, mobility, environment, and driving comfort. This technology is now on the verge of actual deployments. However, security threats, privacy, and trust management remain the most significant...
Chapter
Power grid network (PGN) of a VLSI system-on-chip (SoC) occupies a significant amount of routing area in a chip. As the number of functional blocks is increasing in an SoC chronologically, the need of the hour is to have more power lines in order to provide adequate power connections to the extra-added functional blocks. Therefore, to accommodate m...
Article
Full-text available
VoIP traffic classification plays a major role towards network policy enforcements. Characterization of VoIP media traffic is based on codec behaviour. With the introduction of variable bit rate codecs, coding, compression and encryption present different complexities with respect to the classification of VoIP traffic. The randomness tests do not e...
Article
Community members which are highly connected with each other inside a community tends to create sub-communities, commonly termed as intrinsic or hierarchical communities. Finding intrinsic communities help us to reach out specific user needs, understanding the network dynamics and unveiling the functional and hidden aspects in the network, which is...
Book
This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups...
Article
This paper proposes a scalable, energy-efficient and scalable, energy efficient, delay bounded intra and inter cluster routing framework viz. GIICCF (Generalized Intra and Inter cluster chaining framework) for efficient data gathering in large scale wireless sensor networks. This approach extricates the benefits of both pure chain-based as well as...
Article
Full-text available
Steganography deals with concealing of some messages via some media, which in digital domain is made over speech, image, or video. In the current generation, privacy-related matters are of concern to every individual that makes steganography to have an imperative role in real-world applications. Audio signals are used as covers more frequently as c...
Chapter
Full-text available
Internet of Things (IoT) is a network of tangible objects forming a Low-Power Network with each connected device having limited resources and computing power, and each entrusted with a task of data acquisition and transmission to controller devices or users. IoTs are taking over the networking world fast and are bringing the physical and the virtua...
Chapter
Full-text available
As the number of Internet-of-Things (IoT) devices increases, ensuring the reliability of the IoT system has become a challenging job. Apart from the emerging security issues, reliable IoT system design depends on many other factors. In this work, for the first time, we have shown all the reliability challenges of an IoT system in details, which may...
Chapter
In social-based delay tolerant network (DTN) applications, hand-held mobile devices exchange information. The inherent social property of DTN has encouraged contemporary researchers in exploiting social metrics to devise forwarding techniques for efficient routing. This work observes evidence of seasonal behavior in contacts between node-pairs in r...
Chapter
Delay Tolerant Network (DTN) is an infrastructure-less wireless network characterized with sporadic link connectivity and probable co-existence of high end-to-end delay. It relies on opportunistic contacts for message forwarding and builds an overlay atop disconnected networks to combat network disruptions through persistence storage. The lack of i...
Chapter
With its application ranging from smart homes and wearables to smart vehicles and smart cities, Internet of Things(IoT) devices have become an integral part of our lives. These devices are enabled with sensing and networking facilities and generate an enormous amount of data, which can be highly valuable for various stakeholders of the system. Enab...
Chapter
Full-text available
The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilities into them. A smartphone, a smartwatch can be utilized for various tasks other than calling and timekeeping. Even home appliances also in...
Article
Full-text available
Swarm robotics is an emerging robotic domain that aims to accomplish complex tasks with the cooperative effort of a group of simple robots. These robots communicate and share information to coordinate their actions for achieving a common goal. However, existing mechanisms of control and communications are not very secure, efficient, and also rely o...
Article
In VANETs, vehicles exchange information to/from the surrounding entities (vehicles, infrastructure, network, device, pedestrian) in wireless mode for various safety and non-safety applications. This Vehicle-to-Everything (V2X) wireless communication poses privacy risks because it can be exploited to collect the vehicle's trajectories. Preserving t...
Chapter
Full-text available
Chatbots are computer programs capable to carry a conversation with human. They can be seen as an artificial agent designed to serve the purpose of conversation with the end user. Chatbots are gaining popularity especially in business and health sector as they have the potential to automate service and reduce human efforts. Widespread use of Apps,...