Publications

Journal Papers

[J25] S. Halder, T. Newe, "Radio Fingerprinting for Anomaly Detection Using Federated Learning in LoRa Enabled IIoT," In Future Generation Computer Systems, Elsevier, 143, pp. 322-336, 2023. (JCR IF 2022: 7.307; IT-ANVUR Class: 1) 

[J24] S. Halder, A. Ghosal, M. Conti, "Dynamic Super Round Based Distributed Task Scheduling for UAV Networks" In IEEE Transactions on Wireless Communications, 22(2), pp. 1014-1028,  2023. (JCR IF 2022: 8.346; IT-ANVUR Class: 1) 

[J23] S. Halder, T. Newe, "Enabling Secure Time Series Data Sharing via Homomorphic Encryption in Cloud-Assisted IIoT," In Future Generation Computer Systems, Elsevier, 133, pp. 351-363,  2022. (JCR IF 2022: 7.307; IT-ANVUR Class: 1) 

[J22] A. Ghosal, S. Halder, M. Conti, "Secure Over-the-Air Software Update for Connected Vehicles," In Computer Networks, Elsevier, 218, pp. 1-13, article no. 109394, 2022. (JCR IF 2021: 4.474; IT-ANVUR Class: 1)

[J21] S. Halder, M. Conti, "CrypSH: A Novel IoT Data Protection Scheme Based on BGN Cryptosystem," In IEEE Transactions on Cloud Computing, 10(4), pp. 2437-2450, 2022. (JCR IF 2021: 5.938)

[J20] S. Halder, M. Conti, S. K. Das, "A Holistic Approach to Power Efficiency in a Clock Offset Based Intrusion Detection Systems for Controller Area Networks," In Pervasive and Mobile Computing, Elsevier, 73, pp. 1-20, article no. 101385, 2021. (JCR IF 2021: 3.453; IT-ANVUR Class: 2)

[J19] A. Bhardwaj, V. Mangat, R. Vig, S. Halder, M. Conti, "Distributed Denial of Service Attacks in Cloud: State-of-the-Art Scientific and Commercial Solutions," In Computer Science Review, Elsevier, 39, pp. 1-28, article no. 100332, 2021. (JCR IF 2021: 7.872; IT-ANVUR Class: 2) 

[J18] A. Ghosal, S. U. Sagong, S. Halder, K. Sahabandu, M. Conti, R. Poovendran, L. Bushnell, "Truck Platoon Security: State-of-the-Art and Road Ahead," In Computer Networks, Elsevier, 185, pp. 1-20, article no. 107658, 2021. (JCR IF 2021: 4.474; IT-ANVUR Class: 1)

[J17] S. Halder, A. Ghosal, M. Conti, "Secure Over-The-Air Software Updates in Connected Vehicles: A Survey," In Computer Networks, Elsevier, 178, pp. 1-19, article no. 107343, 2020. (JCR IF 2019: 3.111; IT-ANVUR Class: 1)

[J16] A. Ghosal, S. Halder, S. K. Das, "Distributed On-Demand Clustering Algorithm for Lifetime Optimization in Wireless Sensor Networks," In Journal of Parallel and Distributed Computing, Elsevier, 141, pp. 129-142, 2020. (JCR IF 2019: 1.819; IT-ANVUR Class: 1)

[J15] S. Halder, A. Ghosal, M. Conti, "Efficient Physical Intrusion Detection in Internet of Things: A Node Deployment Approach," In Computer Networks, Elsevier, 154, pp. 28-46, 2019. (JCR IF 2018: 2.522; IT-ANVUR Class: 1)

[J14] S. Halder, A. Ghosal, M. Conti, “LiMCA: An Optimal Clustering Algorithm for Lifetime Maximization of Internet of Things,” In Wireless Networks, ACM/Springer, 25(8), pp. 4459-4477, 2019.  (JCR IF 2017: 1.584; IT-ANVUR Class: 1) Download

[J13] A. Ghosal, S. Halder, “Lifetime Optimizing Clustering Structure using Archimedes’ Spiral based Deployment in WSNs,” In IEEE Systems Journal, 11(2), pp. 1039-1048, 2017. (JCR IF 2017: 3.882; IT-ANVUR Class: 1) Download

[J12] A. Ghosal, S. Halder, “A Survey on Energy Efficient Intrusion Detection in Wireless Sensor Networks,” In Journal of Ambient Intelligence and Smart Environments, IOS press, 9(2), pp. 239-261, 2017. (JCR IF 2017: 0.809; IT-ANVUR Class: 4) Download

[J11] S. Halder, A. Ghosal, “Lifetime Enhancement of Wireless Sensor Networks by Avoiding Energy-Holes with Gaussian Distribution,” In Telecommunication Systems, Springer, 64(1), pp. 113-133, 2017. (JCR IF 2017: 1.542; IT-ANVUR Class: 2) Download

[J10] A. Ghosal, S. Halder, S. Chessa, “Secure Key Design Approaches using Entropy Harvesting in Wireless Sensor Network: A Survey,” In Journal of Network and Computer Applications, Elsevier, 78(2017), pp. 216-230, 2017. (JCR IF 2017: 3.500; IT-ANVUR Class: 2) Download

[J9] S. Halder, A. Ghosal, “A Survey on Mobile Anchor Assisted Localization Techniques in Wireless Sensor Networks,” In Wireless Networks, ACM/Springer, 22(7), pp. 2317-2336, 2016. (JCR IF 2017: 1.584; IT-ANVUR Class: 1) Download

[J8] S. Halder, A. Ghosal, “A Location-wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks,” In IEEE Transactions on Circuits and Systems for Video Technology, 26(6), pp. 1131-1145, 2016. (JCR IF 2017: 3.599; IT-ANVUR Class: 1) Download

[J7] A. Ghosal, S. Halder, “Lifespan Prolonging Location-wise Predetermined Deployment Strategy for Visual Sensor Networks,” In Journal of Network and Computer Applications, Elsevier, 63 (2016), pp. 86-97, 2016. (JCR IF 2017: 3.500; IT-ANVUR Class: 2) Download

[J6] S. Halder, A. Ghosal, “A Survey on Mobility-Assisted Localization Techniques in Wireless Sensor Networks,” In Journal of Network and Computer Applications, Elsevier, 60 (2016), pp. 82-94, 2016. (JCR IF 2017: 3.500; IT-ANVUR Class: 2) Download

[J5] S. Halder, S. DasBit, “Design of an Archimedes’ Spiral based Node Deployment Scheme Targeting Enhancement of Network Lifetime in Wireless Sensor Networks,” In Journal of Network and Computer Applications, Elsevier, 47 (2015), pp. 147-167, 2015. (JCR IF 2017: 3.500; IT-ANVUR Class: 2) Download

[J4] S. Halder, S. DasBit, “Design of a Probability Density Function Targeting Energy-Efficient Node Deployment in Wireless Sensor Networks,” In IEEE Transactions on Network and Service Management, 11(2), pp. 204-219, 2014. (JCR IF 2017: 3.134; IT-ANVUR Class: 2) Download

[J3] S. Halder, S. DasBit, “Enhancement of Wireless Sensor Network Lifetime by Deploying Heterogeneous Nodes,” In Journal of Network and Computer Applications, Elsevier, 38 (2014), pp. 106-124, 2014. (JCR IF 2017: 3.500; IT-ANVUR Class: 2) Download

[J2] A. Ghosal, S. Halder, S. DasBit, “A Dynamic TDMA Based Scheme for Securing Query Processing in WSN,” In Wireless Networks, ACM/Springer, 18(2), pp. 165-184, 2012. (JCR IF 2017: 1.584; IT-ANVUR Class: 1) Download

[J1] S. Halder, A. Ghosal, S. DasBit, “A Pre-determined Node Deployment Strategy to Prolong Network Lifetime in WSN,” In Computer Communication, Elsevier, 34(11), pp. 1294-1306, 2011. (JCR IF 2017: 3.338; IT-ANVUR Class: 2) Download

Conference Papers

[C23] S. Halder, A. Ghosal, T. Newe, S. K. Das, "SmartLens: Robust Detection of Rogue Device via Frequency Domain Features in LoRa-Enabled IIoT," Proc. of 11th Int'l Conf. on Communications and Network Security (IEEE CNS), Accepted, Oct 2023

[C22] S. Halder, T. Newe, "Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT," Proc. of 17th Int'l Conf. on Information Security Practice and Experience (ISPEC), LNCS, vol. 13620, pp. 161-178, Nov 2022. (CORE: B; MA: C) 

[C21] S. Halder, T. Newe, "Secure Time Series Data Sharing with Fine-Grained Access Control in Cloud-Enabled IIoT," Proc. of 18th IIEEE/IFIP Network Operations and Management Symposium (IEEE/IFIP NOMS), pp. 1-9, Apr 2022. (GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B) 

[C20] S. Halder, T. Newe, "SmartCrypt: Secure Storing and Sharing of Time Series Data Streams in IIoT," Proc. of 19th IEEE Consumer Communications and Networking Conference (IEEE CCNC), pp. 248-251, Jan 2022. (GGS: 3/B; CORE: B; LiveSHINE: A-; MA: B) 

[C19] A. Ghosal, S. Halder, M. Conti, "STRIDE: Scalable and Secure Over-The-Air Software Update Scheme for Autonomous Vehicles," Proc. of 54th IEEE Int'l Conf. on Communications (IEEE ICC), pp. 1-6, Jun 2020. (GGS: 2/A; CORE: B; LiveSHINE: A+; MA: A+)

[C18] S. Halder, M. Conti, S. K. Das, "COIDS: A Clock Offset Based Intrusion Detection System for Controller Area Networks," Proc. of 21st ACM Int'l Conf. on Distributed Computing and Networking (ACM ICDCN), pp. 1-10, Jan 2020. (GGS: 3/B-; CORE: B; LiveSHINE: B-; MA: C)

[C17] A. Ghosal, S. Halder, M. Conti, "DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things," Proc. of 28th IEEE Int'l Conf. on Computer Communications and Networks (IEEE ICCCN), pp. 1-9, Jul 2019. (GGS: 2/A-; CORE: A; LiveSHINE: A-; MA: A-)

[C16] S. Halder, M. Conti, “Don't Hesitate to Share! A Novel IoT Data Protection Scheme Based on BGN Cryptosystem,” Proc. of 34th ACM Symposium On Applied Computing (ACM SAC), pp. 282-289, Apr 2019. (GGS: 2/A-; CORE: B; LiveSHINE: A; MA: A-) [ACM-DADS track best paper and runner up for ACM SAC best paper]

[C15] S. Halder, A. Ghosal, “A Predetermined Deployment Technique for Lifetime Optimization in Clustered WSNs,” Proc. of 15th Int’l Conf. on Algorithms and Architectures for Parallel Processing (ICA3PP), LNCS, vol. 9531, pp. 682-696, Nov 2015. (GGS: 3/B; CORE: A; LiveSHINE: B; MA: B) Download

[C14] S. Halder, A. Ghosal, “Lifetime Optimizing Clustering Structure using Archimedes Spiral based Deployment in WSNs,” Proc. of 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IFIP/IEEE IM), pp. 592-598, May 2015. (CORE: B; LiveSHINE: C; MA: C) Download

[C13] A. Ghosal, S. Halder, “Intrusion Detection in a Tailor-Made Gaussian Distribution Wireless Sensor Networks,” Proc. of 11th Int’l Conf. on Distributed Computing and Internet Technology (ICDCIT), LNCS, vol. 8956, pp. 325-330, Feb 2015. (CORE: C; LiveSHINE: C; MA: C) Download

[C12] A. Ghosal, S. Halder, “Tailor-Made Gaussian Distribution for Intrusion Detection in Wireless Sensor Networks,” Proc. of 11th IEEE Int’l Conf. on Ubiquitous Intelligence and Computing (IEEE UIC), pp. 406-411, Dec 2014. (CORE: B; MA: C) Download

[C11] S. Halder, A. Ghosal, “Enhancing the Lifespan of Visual Sensor Networks using a Predetermined Node Deployment Strategy,” Proc. of 19th IEEE Int’l Symposium on Computers and Communications (IEEE ISCC), pp. 1-6, Jun 2014. (GGS: 3/B; CORE: B; LiveSHINE: B; MA: B) Download

[C10] S. Halder, A. Ghosal, “Is Sensor Deployment using Gaussian Distribution Energy Balanced?,” Proc. of 13th Int’l Conf. on Algorithms and Architectures for Parallel Processing (ICA3PP), LNCS, vol. 8285, pp. 58-71, Dec 2013. [Distinguished Paper] (GGS: 3/B; CORE: A; LiveSHINE: B; MA: B) Download

[C9] S. Halder, S. DasBit, “A Lifetime Enhancing Node Deployment Strategy using Heterogeneous Nodes in WSNs for Coal Mine Monitoring,” Proc. of 15th ACM Int’l Conf. on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM MSWiM), pp. 117-124, Oct 2012. (GGS: 3/B; CORE: A; LiveSHINE: B; MA: B) Download

[C8] S. Dan, S. Halder, S. DasBit, “Localization with Enhanced Location Accuracy using RSSI in WSN,” Proc. of 5th IEEE Int’l Conf. on Advanced Networks and Telecommunication Systems (IEEE ANTS), pp. 1-6, Dec 2011. Download

[C7] S. Halder, A. Ghosal, A. Saha, S. DasBit, “Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral,” Proc. of 8th Int’l Conf. on Ubiquitous Intelligence and Computing (UIC), LNCS, vol. 6905, pp. 420-434, Sep 2011. (CORE: B; MA: C) Download

[C6] S. Halder, A. Ghosal, A. Chowdhuty, S. DasBit, “A Probability Density Function for Energy-Balanced Lifetime-Enhancing Node Deployment in WSN,” Proc. of 11th Int’l Conf. on Computational Science and its Application (ICCSA), LNCS, vol. 6785, pp. 472-487, Jun 2011. (GGS: 3/B-; CORE: C; LiveSHINE: B; MA: B) Download

[C5] A. Ghosal, S. Halder, Md. Mobashir, R. K. Saraogi, S. DasBit, “A Jamming Defending Data-Forwarding Scheme for Delay Sensitive Applications in WSN,” Proc. of 2nd Int’l Conf. Wireless VITAE, pp. 1-5, Feb 2011. [Best Paper] Download

[C4] A. Ghosal, S. Halder, S. Sur, A. Dan, S. DasBit, “Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN,” Proc. of 10th Int’l Conf. on Computational Science and its Application (ICCSA), LNCS, vol. 6018, pp. 321-335, Mar 2010. (GGS: 3/B-; CORE: C; LiveSHINE: B; MA: B) Download

[C3] S. Halder, A. Ghosal, S. Sur, S. Dan, S. DasBit, “A Lifetime Enhancing Node Deployment Strategy in WSN,” Proc. of 1st Int’l Conf. on Future Generation Information Technology (FGIT), LNCS, vol. 5899, pp. 296-308, Dec 2009. [Best Paper Nominated] Download

[C2] A. Ghosal, S. Halder, S. Chatterjee, J. Sen, S. DasBit, “Estimating Delay in a Data Forwarding Scheme for Defending Jamming Attack in Wireless Sensor Network,” Proc. of 3rd Int’l Conf. on Next Generation Mobile Applications, Services and Technologies(NGMAST), pp. 351-356, Sep 2009. (MA: C) Download

[C1] A. Ghosal, S. Halder, S. DasBit, “Channel Surfing- A Scheme to Tolerate Jamming in Multiple nodes in Wireless Sensor Network,” Proc. of 1st Int’l Conf. Wireless VITAE, pp. 948-951, May 2009.Download

Book Chapters

[BC5] A. Ghosal, S. Halder, “Building Intelligent System for Smart Cities: Issues, Challenges and Approaches,” In Smart Cities: Development and Governance Frameworks (Editor: Z. Mahmood), Chapter 5, Springer Publication, pp. 107-125, 2018. Download

[BC4] A. Ghosal, S. Halder, “Security in Mobile Wireless Sensor Networks: Attacks and Defenses,” In Cooperative Robots and Sensor Networks-III (Editors: A. Koubaa and J. R. M. Dios), ISBN 978-3-319-18298-8, Chapter 9, Springer Publication, pp. 185-205, 2015. Download

[BC3] S. Halder, A. Ghosal, “Mobility-Assisted Localization Techniques in Wireless Sensor Networks: Issues, Challenges and Approaches,” In Cooperative Robots and Sensor Networks-II (Editors: A. Koubaa and A. Khelil), ISBN: 978-3-642-55029-4, Chapter 3, Springer Publication, pp. 43-64, 2014. Download

[BC2] S. Halder, A. Ghosal, “Cross Layer-Based Intrusion Detection Techniques in Wireless Networks: A Survey,” In The State of the Art in Intrusion Prevention and Detection (Editor: A. S. K. Pathan), ISBN: 978-1-482-20351-6, Chapter 15, CRC Press, Taylor & Francis Group, USA, pp. 361-389, 2014. Download

[BC1] A. Ghosal, S. Halder, “Intrusion Detection in Wireless Sensor Networks: Issues, Challenges and Approaches,” In Wireless Networks and Security (Editors: S. Khan and A. S. K. Pathan), ISBN: 978-3-642-36169-2, Chapter 10, Springer Publication, pp. 329-367, 2013. Download

Patent

[P1] H. Y. Lin, M. Conti, A. Ghosal, S. Halder, Device Upgrade Method and Related Device, CN Patent n. CN2019/117399, EU Patent n. EP3883212A1, WIPO n. WO2021148932A1, 2019.




(Journal ranked according to JCR and Italian-ANVUR-VQR-2012; conference ranked according to CORE/LiveSHINE/MicrosoftAcademic/Italian-GII-GRIN-SCIE)
Copyright policy and disclaimer: The material available for download from this Web page is provided to ensure timely dissemination of educational, research and technical work including work-in-progress on a non-commercial basis and without any warranty. Copyright and all rights therein are maintained by the authors or by other copyright holders (see below), notwithstanding that they have offered their works here electronically. Personal non-commercial use of the publications and papers obtained from this Web page is permitted. All other use of this material requires the written permission of the author. In particular, these works may not be reposted without the explicit permission of the copyright holder. By downloading the material you agree to respect these conditions and adhere to the terms and constraints invoked by each author's copyright.Some of the above publications appear in proceedings published by the IEEE Computer Society. IEEE/CS demands the following copyright notice: Copyright 1997-2010 IEEE. Published in the respective Conference Proceedings. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works, must be obtained from the IEEE. Contact: Manager, Copyrights and Permissions / IEEE Service Center / 445 Hoes Lane / P.O. Box 1331 / Piscataway, NJ 08855-1331, USA. Telephone: + Intl. 732-562-3966.