Rakesh Matam
Rakesh Matam
Indian Institute of Information Technology Guwahati
Verified email at iiitg.ac.in - Homepage
Title
Cited by
Cited by
Year
Security and privacy in fog computing: Challenges
M Mukherjee, R Matam, L Shu, L Maglaras, MA Ferrag, N Choudhury, ...
IEEE Access 5, 19293-19304, 2017
3462017
Reduced out-of-band radiation-based filter optimization for UFMC systems in 5G
M Mukherjee, L Shu, V Kumar, P Kumar, R Matam
2015 international wireless communications and mobile computing conference …, 2015
762015
WRSR: wormhole-resistant secure routing for wireless mesh networks
R Matam, S Tripathy
EURASIP Journal on Wireless Communications and Networking 2013 (1), 1-12, 2013
362013
Beacon synchronization and duty-cycling in IEEE 802.15. 4 cluster-tree networks: A review
N Choudhury, R Matam, M Mukherjee, L Shu
IEEE internet of things journal 5 (3), 1765-1788, 2018
192018
Impact of packet dropping attacks on RPL
A Kumar, R Matam, S Shukla
2016 Fourth International Conference on Parallel, Distributed and Grid …, 2016
192016
Latency-driven parallel task data offloading in fog computing networks for industrial applications
M Mukherjee, S Kumar, CX Mavromoustakis, G Mastorakis, R Matam, ...
IEEE Transactions on Industrial Informatics 16 (9), 6050-6058, 2019
162019
Secure multicast routing algorithm for wireless mesh networks
R Matam, S Tripathy
Journal of Computer Networks and Communications 2016, 2016
132016
Improved heuristics for multicast routing in wireless mesh networks
R Matam, S Tripathy
Wireless networks 19 (8), 1829-1837, 2013
132013
Task data offloading and resource allocation in fog computing with multi-task delay guarantee
M Mukherjee, S Kumar, Q Zhang, R Matam, CX Mavromoustakis, Y Lv, ...
IEEE Access 7, 152911-152918, 2019
122019
Provably Secure Routing Protocol for Wireless Mesh Networks.
R Matam, S Tripathy
IJ Network Security 16 (3), 168-178, 2014
122014
Computation offloading strategy in heterogeneous fog computing with energy and delay constraints
M Mukherjee, V Kumar, S Kumar, R Matamy, CX Mavromoustakis, ...
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-5, 2020
102020
Adaptive duty cycling in IEEE 802.15. 4 cluster tree networks using MAC parameters
N Choudhury, R Matam, M Mukherjee, L Shu
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc …, 2017
102017
Transmission and latency-aware load balancing for fog radio access networks
M Mukherjee, Y Liu, J Lloret, L Guo, R Matam, M Aazam
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
92018
Storage vs repair bandwidth for network erasure coding in distributed storage systems
SM Singal, N Rakesh, R Matam
2015 International Conference on Soft Computing Techniques and …, 2015
72015
Distributed beacon synchronization mechanism for 802.15. 4 cluster-tree topology
N Choudhury, R Matam, M Mukherjee, L Shu
International Wireless Internet Conference, 10-20, 2016
62016
Distributed beacon scheduling for IEEE 802.15. 4 cluster-tree topology
N Choudhury, R Matam
2016 IEEE Annual India Conference (INDICON), 1-6, 2016
62016
A performance-to-cost analysis of IEEE 802.15. 4 MAC with 802.15. 4e MAC modes
N Choudhury, R Matam, M Mukherjee, J Lloret
IEEE Access 8, 41936-41950, 2020
52020
LBS: A Beacon synchronization scheme with higher schedulability for IEEE 802.15. 4 cluster-tree-based IoT applications
N Choudhury, R Matam, M Mukherjee, J Lloret
IEEE Internet of Things Journal 6 (5), 8883-8896, 2019
52019
Secure peer-link establishment in wireless mesh networks
S Bhumireddy, S Tripathy, R Matam
Advances in Computing and Information Technology, 189-198, 2012
52012
THWMP: trust based secure routing for wireless mesh networks
R Matam, S Tripathy
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20