Dr. Sajal K. Das
Professor and Daniel St. Clair Endowed Chair
Department of Computer Science
315 Computer Science Bldg.
Missouri University of Science and Technology
Rolla, MO 65409
(573) 341-7708
Personal Web-Site: Sajal Das

Ph.D., University of Central Florida, Orlando, Computer Science, 1988
M.S., Indian Institute of Science, Bangalore, Computer Science, 1984
B.S., Calcutta University, India, Computer Science and Engineering, 1983

Please also visit ORCID ID:  https://orcid.org/0000-0002-9471-0868

Full CV

Areas of Interest

Cyber-Physical Systems; Security and Privacy; Smart Environments (Smart City, Smart Grid, Smart Healthcare); Wireless and Sensor Networks; Mobile and Pervasive Computing; Data Analytics; Parallel, Distributed, and Cloud Computing; Social Networks; Systems Biology; Applied Graph Theory and Game Theory.

Selected Recent Publications

Journals

  1. S. Saha, S. Nandi, R. Verma, S. Sengupta, V. Sinha, and S. K. Das, “Design of Efficient Lightweight Strategies to Combat DoS Attack in Delay Tolerant Network Routing,” Wireless Networks, 24(1): 173-194, 2018.
  2. S. Khalifa, G. Lan, M. Hassan, A. Seneviratne, and S. K. Das, “HARKE: Human Activity Recognition from Kinetic Energy Harvesting Data in Wearable Devices,” IEEE Transactions on Mobile Computing, to appear, 2018.
  3. A. De Paola, P. Ferraro, S. Gaglio, G. Lo Re, and S. K. Das, "An Adaptive Bayesian System for Context-Aware Data Fusion in Smart Environments," IEEE Transactions on Mobile Computing, 16(6): 1505-1512, June 2017.
  4. M. Tiloca, D. De Guglielmo, G. Dini, G. Anastasi, and S. K. Das, “JAMMY: A Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs,” IEEE Transactions on Dependable and Secure Computing, 14(4): 392-405, July-Aug 2017.
  5. N. Marchang, R. Dutta, and S. K. Das, “A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks,” IEEE Trans. on Vehicular Technology, 66(2): 1684-1695, 2017.
  6. S. Tan, D. De, W.-Z. Song, J. Yang, and S. K. Das, “Survey of Security Advances in Smart Grid: A Data Driven Approach,” IEEE Communications Surveys and Tutorials, 18(1): 397-422, 2017.
  7. F. Restuccia, N. Ghosh, S. Bhattacharjee, S. K. Das, and T. Melodia, “Quality of Information in Mobile Crowdsensing: Survey and Research Challenges” ACM Transactions on Sensor Networks, 13(4): 34:1-34:43, 2017.
  8. W. Liang, Z. Xu, W. Xu, J. Shi, G. Mao, and S. K. Das, “Approximation Algorithms for Charging Reward Maximization in Rechargeable Sensor Networks via A Mobile Charger,” IEEE/ACM Transactions on Networking, 25(5): 3161-3174, Oct 2017.
  9. M. Conti, A. Passarella, and S. K. Das, " The Internet of People (IoP): A New Wave in Pervasive Computing," Pervasive and Mobile Computing, 41: 1-27, Oct 2017.
  10. N. Ghosh, D. Chatterjee, S. K. Ghosh, and S. K. Das, “Securing Loosely-coupled Collaboration in Cloud Environment through Dynamic Detection and Removal of Access Conflicts,” IEEE Transactions on Cloud Computing, 4(3): 349-362, July-Sept 2016.
  11. N. Roy, A. Misra, S. K. Das, and C. Julien, “Determining Quality- and Energy-Aware Multiple Contexts in Pervasive Computing Environments,” IEEE/ACM Transactions on Networking, 24(5): 3026-3042, Oct 2016.
  12. T. Luo, S. S. Kanhere, S. K. Das, and H.-P. Tan, “Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests,” IEEE Trans. on Mobile Computing, 15(9): 2234-2246, 2016.
  13. T. Luo, S. K. Das, H.-P. Tan, and L. Xia, “Incentive Mechanism Design for Crowdsourcing: An All-Pay Auction Approach,” ACM Transactions on Intelligent Systems and Technology, 7(3): 1-26, 2016.
  14. S. K. A. Imon, A.Khan, M. Di Francesco, and S. K. Das, "Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree-based Wireless Sensor Networks," IEEE/ACM Transactions on Networking, 23(5): 1401-1415, Oct. 2015.
  15. F. Ye, Y. Qian, R. Q. Hu, and S. K. Das, “Reliable Energy-Efficient Uplink Transmission for Neighborhood Area Networks in Smart Grid,” IEEE Transactions on Smart Grid (special issue on Cyber Physical Systems and Security for Smart Grid), 6(5): 2179-2188, May 2015.
  16. M. Raj, N. Li, D. Liu, M. Wright, and S. K. Das, “Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks,” Pervasive and Mobile Computing, 11(2): 244-260, 2014.
  17. N. Li and S. K. Das, “A Trust-based Framework for Data Forwarding in Opportunistic Networks,” Ad Hoc Networks (Special Issue on Wireless Communication in Challenged Environments), 11(4): 1497-1509, 2013.
  18. Y. Sun, H. Luo, and S. K. Das, “A Trust-based Framework for Fault-tolerant Data Aggregation in Wireless Multimedia Sensor Networks,” IEEE Transactions on Dependable and Secure Computing, 9(6): 785-797, 2012.
  19. Y. Xu, F. Ren, T. He, C. Lin, C. Chen, and S. K. Das, “Real-time Routing in Wireless Sensor Networks: A Potential Field Approach,” ACM Transactions on Sensor Networks, 9(3), pp. 35, 2013.
  20. G. Ghidini and S. K. Das, “Energy-efficient Markov Chain-based Duty Cycling Schemes for Greener Wireless Sensor Networks,” ACM Journal of Emerging Technologies in Computing Systems (special issue on Green Computing), Vol. 8, No. 4, Dec 2012.
  21. S. Roy, M. Xue, and S. K. Das, “Security and Discoverability of Spread Dynamics in Cyber-Physical Networks,” IEEE Transactions on Parallel and Distributed Systems (special issue on Cyber-Physical Systems), Vol. 23, No. 9, pp. 1694-1707, Sept 2012.
  22. J.-W. Ho, M. Wright, and S. K. Das, “ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Transactions on Dependable and Secure Computing (special issue on Learning, Games and Security), 9(4): 494-511, July-Aug 2012.
  23. N. Li, N. Zhang, and S. K. Das, “Preserving Relation Privacy in Online Social Network Data,” IEEE Internet Computing (Special Issue on Security and Privacy in Social Networks), 15(3): 35-42, 2011.
  24. J.-W. Ho, M. Wright, and S. K. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Transactions on Mobile Computing, 10(6): 767-782, 2011.
  25. N. Zhang, W. Yu, X. Fu, and S. K. Das, “Maintaining Defender’s Reputation in Anomaly Detection against Insider Attacks,” IEEE Transactions on Systems, Man and Cybernetics (Special issue in Computational Game Theory and Security), 40(3): 597-611, June 2010.
  26. P. De, Y. Liu, and S. K. Das, “An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks,” IEEE Trans. Mobile Computing, 8(3): 413-425, Mar 2009.
  27. A. Agah and S. K. Das, “Prevention of DoS Attack in Sensor Networks Using Repeated Game Theory,” Inter­national Journal on Network Security, 5(2): 145-153, Feb 2007.
  28. P. De, Y. Liu, and S. K. Das, “Deployment Aware Modeling of Node Compromise Spread in Sensor Networks,” ACM Transactions on Sensor Networks, 5(3): 413-425, May 200

    Conference Papers

    1. S. Bhattacharjee, A. Thakur, S. Silvestri, and S. K. Das, “Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure,” ACM Conference on Data and Applications Security and Privacy (CODASPY), pp. 35-45, Mar 2017.
    2. Y. Ren, J. Li, Y. Ji, S. K. Das, and Z. Li, “A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments, International Conference on Communications (ICC), Cloud Communications and Networking Track, Kansas City, May 2018.
    3. S. Bhattacharjee, N. Ghosh, V. K. Shah, and S. K. Das, “QnQ: A Reputation Model to Secure Mobile Crowdsourcing Applications from Incentive Losses,” IEEE Conference on Communications and Network Security (CNS), p. 1-9, Oct 2017.
    4. S. Roy, A. Tamimi, A. Hahn, M. Xue, S. K. Das, H. Van Dongen, A. Vosughi, and S. Warnick, “A Modeling Framework for Assessing Cyber Disruptions and Attacks to the National Airspace System,” AIAA Modeling and Simulation Technologies Conference, Kissimmee, FL, Jan 2018.
    5. V. K. Shah, S. Bhattacharjee, S. Silvestri, and S. K. Das, “Designing Sustainable Smart Connected Communities using Dynamic Spectrum Access via Band Selection,” 4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys), Delft, The Netherlands, Nov 2017.
    6. F. Restuccia, A. Saracino, S. K. Das, and F. Martinelli, “LVS: A WiFI-based System to Tackle Location Spoofing in Location-based Services,” IEEE Symposium on a World of Wireless Mobile Multimedia Networks (WoWMoM), Coimbra, Portugal, June 2016.
    7. S. Das, S. K. Das, and S. Ghosh, “Inferring Future Links in Large Scale Networks,” 41st Annual IEEE Conference on Local Computer Networks (LCN), Dubai, pp. 244-252, 2016.
    8. A. Nazi, M. Raj, M. Di Francesco, P. Ghosh, and S. K. Das, “Efficient Communications in Wireless Sensor Networks Based on Biological Robustness,” IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington DC, pp. 161-168, May 2016.
    9. S. K. A. Imon, A. Khan, M, Di Francesco, and S. K. Das, “RaSMaLai: A Randomized Switching Algorithm for Maximizing Lifetime in Tree-based Wireless Sensor Networks,” Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM), Turin, Italy, Apr 2013. 
    10. Y. Rahulamathavan, M. Rajarajan, O. F. Rana, M. S. Awan, P. Burnap, and S. K. Das, “Assessing Data Breach Risk in Cloud Systems,” 7th IEEE International Conference on Cloud Computing Technology and Science, (CloudCom) Vancouver, Canada, pp. 363-370, Nov 2015.
    11. A. Nazi, M. Raj, M. Di Francesco, P. Ghosh and S. K. Das, “Robust Deployment of Wireless Sensor Networks using Gene Regulatory Networks,” Proceedings of International Conference on Distributed Computing and Networking (ICDCN), pp. 192-207, Jan 2013.
    12. N. hang, W. Yu, X. Fu, and S. K. Das, “gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity,” 1st Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, pp. 58-71, Nov 2010.
    Books
    1. S. Roy and S. K. Das, Principles of Cyber-Physical Systems: An Interdisciplinary Approach, Cambridge University Press, to appear, 2018.
    2. S. K. Das, K. Kant and N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Morgan Kauffman, 2012.
    3. J. Cao and S. K. Das, Mobile Agents in Networking and Distributed Computing, John Wiley, July 2012.
    4. D. J. Cook and S. K. Das, Smart Environments: Technology, Protocols and Applications, John Wiley, 2005.
    Selected Grants (2001 - Present; for collaborative proposals with other institutions, only my share of the funding is shown here.)

    1. CPS: Breakthrough: Securing Smart Grid by Understanding Communications Infrastructure Dependencies, NSF, $310,476, 2015-2019 (PI).
    2. CPS: Synergy: Threat Assessment Tools for Management-Coupled Cyber- and Physical- Infrastructures, NSF, $194,799, 2015-2018 (PI).
    3. SPX: SANDY: Sparsification-based Approach for Analyzing Network Dynamics, NSF, $250,000), 2017-2020 (PI).
    4. IIP: I-Corps Sites: Journey to Innovation and Entrepreneurship at Missouri S&T, NSF, $299,967, 2016-2018 (Co-PI).
    5. STTR: Phase I: Advanced and Remote Screening, Monitoring and Rehabilitation of Cognitive Health,” NSF, $225,000, Jan-Dec 2017, (co-PI).
    6. SCC-RCN: MOHERE: Mobility, Health, and Resilience in SCC: Building Capacities and Expanding Impact, NSF, $500,000, 2017-2020 (collaborator).
    7. CDS&E: ParCell: A Parallel Computation Framework for Scalable and Mechanistic Modeling and Simulation of Multi-cellular Systems, NSF, $349,995, 2016-2018 (co-PI).
    8. SC2: US-India Smart and Connected Communities Workshop, NSF, $77,698, 2016-2018 (PI).
    9. XPS: SPANDAN: Scalable Parallel Algorithms for Network Dynamics Analysis, NSF, $153,248, 2015-2018 (PI).
    10. Building Recruiting and Inclusion for Diversity (BRAID) Initiative, Anita Borg Institute, $120,000, 2015-2018 (PI).
    11. SHB: Medium: Collaborative Research: Crafting a Human-Centric Environment to Support Human Health Needs, NSF, $332,453, 2013-2017 (PI).
    12. I-Corps: Health-Beacons: Flexible Wearable Health and Activity Tracker for Smart Living, NSF, $50,000, May-Dec 2015 (PI).
    13. MASTER: Missouri Advanced Security Teaching, Education and Research, NSF, $3,001,744, 2014-2019 (co-PI).
    14. BISON: Bio-Inspired Approach to Robust Wireless Sensor Networking, NSF, $115,984, 2013-2016 (PI).
    15. CNS: Mobile Security through Remote Sandboxing and Cloud Computing, NSF, $231,942, 2012-2016 (PI).
    16. I-Corps: E2Home: Web-based Application for Home Energy Efficiency Using Contextual Information from Smart Meters and Smartphones, NSF, $50,000, 2012-2013. (PI).
    17. ITR: Pervasively Secure Infrastructures (PSI): Integrating Smart Sensing, Data Mining, Pervasive Networking and Community Computing, NSF, $1.2M, 2003-2012 (PI).
    18. EAGER: Collaborative Research: Improving the Efficiency of Wireless Sensor Networks Using Principles of Genomic Robustness, NSF, $117,600, 2010 -2013 (PI)
    19. TwC: Towards Trustworthy Intrusion Monitoring Using Wireless Sensor Networks, NSF, $499,000, 2009-2012. (co-PI).
    20. Secure Information Grid for NCES and Border Security Applications, AFOSR, $800,000, 2008-2012. (PI).
    21. CSR: ARCADIA: Asynchronous Communication Architecture toward Novel Networking and Computation Paradigms in Wireless Sensor Networks, NSF, $450,000, 2007-2010 (co-PI).
    22. Defending Against Compromised Nodes in Wireless Sensor Networks: A Multi-Layer Security Framework, Texas Advanced Research Program, $100,000, 2006-2008 (PI).
    23. Wireless Audio-Visual System for Police and Law Enforcement Agencies, Department of Justice, $500,000, 2004–2008.
    24. MRI: Acquisition of Instrumentation for Engineering Research in Advanced Security Detection Systems, NSF, $250,000, 2004-2007 (Co-PI).
    25. ITR: MavHome: An Intelligent Home Environment, NSF, $1,159,959, 2001-06 (Co-PI).