Style Switcher

Predefined Colors

Dr Sandhya Aneja Assistant Professor, Faculty of Integrated Technologies

About Me Publications

Dr Sandhya Aneja

Assistant Professor, Faculty of Integrated Technologies sandhya.aneja@ubd.edu.bn


ABOUT ME

Sandhya Aneja is working as Assistant Professor in System Engineering at Faculty of Integrated Technologies, Universiti Brunei Darussalam (UBD). She joined Universiti Brunei Darussalam in April, 2016. She completed her Masters in Technology (M.Tech.) from IIT Delhi, India in 2002 and Ph.D from University of Delhi, India in 2011. During her Masters, she worked on developing “Parallel algorithm for Non-linear Systems” for Super Computer PARAM 2000 developed by IIT Delhi. Her Ph.D. work is in securing routing protocols of Ad-Hoc Networks. Prior to Universiti Brunei Darussalm, she worked in Institute of Informatics and Communication (IIC), Delhi University, India. She has around 11 years of experience of teaching and guiding for research projects to under graduate and post graduate students at Delhi University, India. Currently, she is guiding three Ph.D. students on design of routing protocols and their security issues for Delay Tolerant Networks and Cognitive Radio Ad-hoc Networks. Two of her students have finished their publication work and are in process of writing PhD thesis. She has published around 30 papers on security issues of wireless networks. Her publications include, 12 Journal papers, 6 SCI indexed, and 19 Scopus indexed. Her Google-scholar H-index is 8 and has 166 citations. She also worked at UBD-IBM Centre of the Universiti Brunei Darussalam during 2013-2015. During her work span at the Centre, she worked on two research projects. First project was Flood Forecasting system for Blue Gene/P (BGP) Super Computer, and second was, Community and Grid Friendly Smart Homes (CGFH). During projects, she was involved in development and deployment of model at BG/P as well as equipment, software developed for CGFH. She has 5 publications from these two projects in area of High Performance Computing and Smart Homes. She has experience of working on software NS2, DTN One, DTN two and parallel computing technologies like OpenMP, MPI. Her primary areas of interest include Security of Wireless Networks, IoTs, High performance computing and Big Data Analytics.

RESEARCH INTERESTS

Wireless Networks; Parallel Computing; Big Data Analytics;IoT

22

Scopus Publications

181

Google Scholar Citations

9

Google Scholar h-index

7

Google Scholar i10-index


FUTURE PROJECTS

End-to-End security of IoTs

There are mainly two types of networks, one is Internet and other is Telecommunication network. IoT devices connects using one of these existing networks. Underlying networks are secure and thus now securing IoT devices end to end means extending the security mechanism where these devices connects. A solution for security where IoT device uses Internet is to be explored in the project.

Application invited for: Ph.D./Masters Programme with Major in Networks, Programming and Linux systems

Communication over wireless peer to peer network

In, a peer-to-peer wireless network, there is no hierarchy among the devices. All the devices are equal and therefore are known as peers. Each device determines what data is to be shared on the network. In peer-to-peer network, each device functions as both a client and a server. How calls may be setup in such a network, is to be explored in this project.

Application invited for: Ph.D/Masters Programme with Major in Networks, Programming and Linux systems

A framwork for smart applications over cloud using SIoTs

The things connected to Internet depends on the social behaviour of humans which are carrying and using them. Also, social behaviour of people determines the usage of devices and software required for those devices. Solutions to many services may be provided using SIoTs towards the goal of smart cities and smart nations. We aim to develop a framework for deployment of SIoTs over which applications may be written to communicate IoTs and can be used in real scenarios.

Application invited for: Ph.D/Masters Programme with Major in Networks, Programming and Linux systems


RECENT PUBLICATIONS

1.Security and privacy solutions for NoSQLdatastores, Sandhya Aneja and Nagender Aneja, Book Chapter, CRC Press, Taylor & Francis Group,UK. March 2017.

2. Seema Nagar, Sandhya Aneja, Harshad Khadilkar, Sampath Dechu, Zainul CharbiwalaI, SMOME: A framework for evaluating the costs and benefits of instrumentation in smart home systems, December 2016 IEEE International Conference on Smart Grid Communications (SmartGridComm).

3. Preeti Nagarath, Sandhya Aneja, Neelima Gupta, and Sanjay Madria, Protocols for Mitigating Blackhole Attacks in Delay Tolerant Networks, Journal of Wireless Networks (Springer), April 2015, impact factor=1.055 (SCI Index).

4. Preeti Nagarath, Sandhya Aneja and G. Purohit, Defending Flooding Attack in Delay Tolerant Networks,  In IEEE International Conference on Information Networking, January 2015.

5. Seema Nagar, Sandhya Aneja, Harshad Khadilkar, Sampath Dechu, Zainul CharbiwalaI, A Framework for Evaluating the Costs and Benefits of Instrumentation in Smart Home Systems (short paper), The sixth International Conference on Future Energy Systems (ACM e-Energy) April 2015.


TOP PUBLICATIONS

1. Sandhya Khurana, Neelima Gupta, ‘End-to-end protocol to secure ad hoc networks against wormhole attacks ’, Wiley Journal of Security AND Communication Networks, volume 4, issue 5, 2011 [SCI Index , impact factor=.806 ].

2. Swati Singhal, Sandhya Aneja, Frank Liu, Lucas Villa Real, and Thomas George, IFM:A Scalable High Resolution Flood Modeling Framework , In international conference of Parallel Processing (Europar-2014), August 2014.

3. Preeti Nagarath, Sandhya Aneja, Neelima Gupta, and Sanjay Madria, Protocols for Mitigating Blackhole Attacks in Delay Tolerant Networks, Journal of Wireless Networks (Springer), April 2015, [SCI Index , impact factor=1.055 ] .

4. Johari, Rahul, Neelima Gupta, and Sandhya Aneja. "CONCOR: context-aware community-oriented routing for intermittently connected network." EURASIP Journal on Wireless Communications and Networking 2015, no. 1 (December 2015): 1-13. [SCI  IF=0.701]

5. Johari, Rahul, Neelima Gupta, and Sandhya Aneja. "POSOP routing algorithm: a DTN routing scheme for information connectivity of health centres in Hilly State of North India." International Journal of Distributed Sensor Networks (June 2015). [SCI IF=0.906]


GRANT DETAILS

1. Design and Implementation of parallel machine learning algorithms (2015-2016)
R&D grant 2015-16
Amount - Rs. 1, 50, 000/-

2. Real Time Deployment of Delay Tolerant Network / Disruption Tolerant Network (DTN)
R&D grant 2011-2012.
Amount - Rs. 1, 00, 000/-


RESEARCH OUTPUTS (PATENTS, SOFTWARE, PUBLICATIONS, PRODUCTS)

1. Patent Application :Anti-fraud computer implemented method for financial card transaction

2. Protocols for WIreless Networks

3. Flood Forecasting Software for BG/P Super Computer

4. OffAt, an instant chat application


Scopus Publications

Total Publications: 22



1. SMOME: A framework for evaluating the costs and benefits of instrumentation in smart home systems, 2016 IEEE International Conference on Smart Grid Communications, SmartGridComm 2016

2. Experimental Evaluation of Routing Schemes for Intermittently Connected Wireless Mobile Networks, Wireless Personal Communications

3. Protocols for mitigating blackhole attacks in delay tolerant networks, Wireless Networks

4. CONCOR: context-aware community-oriented routing for intermittently connected network, Eurasip Journal on Wireless Communications and Networking

5. A framework for evaluating the costs and benefits of instrumentation in smart home systems, e-Energy 2015 - Proceedings of the 2015 ACM 6th International Conference on Future Energy Systems

6. Defending flooding attack in Delay Tolerant Networks, International Conference on Information Networking

7. A comparison study on route stability of on-demand routing protocols in CRAHNs, Proceedings - 2015 5th International Conference on Communication Systems and Network Technologies, CSNT 2015

8. POSOP routing algorithm: A DTN routing scheme for information connectivity of health centres in hilly state of North India, International Journal of Distributed Sensor Networks

9. IFM: A scalable high resolution flood modeling framework, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

10. IFM: A scalable high resolution flood modeling framework, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

11. CACBR: Context aware community based routing for intermittently connected network, PE-WASUN 2013 - Proceedings of the 10th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, Co-located with ACM MSWiM 2013

12. Spread and erase: Efficient routing algorithm based on anti-message info relay hubs for delay tolerant networks, Lecture Notes in Electrical Engineering

13. DSG-PC: Dynamic social grouping based routing for non-uniform buffer capacities in DTN supported with periodic carriers, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

14. A hybrid parallelization approach for high resolution operational flood forecasting, 20th Annual International Conference on High Performance Computing, HiPC 2013

15. Reference based approach to mitigate blackhole attacks in delay tolerant networks, Q2SWinet'12 - Proceedings of the 8th ACM Symposium on QoS and Security for Wireless and Mobile Networks

16. End-to-end protocol to secure ad hoc networks against wormhole attacks, Security and Communication Networks

17. FEEPVR: First end-to-end protocol to secure ad hoc networks with variable ranges against wormhole attacks, Proceedings - 2nd Int. Conf. Emerging Security Inf., Systems and Technologies, SECURWARE 2008, Includes DEPEND 2008: 1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.

18. SEEEP: Simple and efficient end-to-end protocol to secure ad hoc networks against wormhole attacks, Proceedings - The 4th International Conference on Wireless and Mobile Communications, ICWMC 2008

19. Minimum Exposed Path to the Attack (MEPA) in Mobile Ad hoc Network (MANET), Proceedings of the Sixth International Conference on Networking, ICN'07

20. Reliable ad-hoc on-demand distance vector routing protocol, Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies,ICN/ICONS/MCL'06

21. Reflection of P and SV waves at the free surface of a monoclinic elastic half-space, Proceedings of the Indian Academy of Sciences, Earth and Planetary Sciences

22. A note on the dispersion of Love waves in layered monoclinic elastic media, Proceedings of the Indian Academy of Sciences: Mathematical Sciences