Harsh K. Verma

Work place: B.R. Ambedkar National Institute of Technology, Jalandhar 144011, Punjab, India

E-mail: vermah@nitj.ac.in

Website:

Research Interests: Computer Science & Information Technology, Computer systems and computational processes, Computer Networks, Information Security, Network Security

Biography

Dr Harsh Kumar Verma is currently working as Head of the Department of Computer Science and Engineering at Dr B R Ambedkar National Institute of Technology Jalandhar. He has done his Bachelor’s degree in Computer Science and Engineering in May 1993. He did a Master’s degree in Software Systems from Birla Institute of Technology Pilani in Feb 1998 and Ph.D. from Punjab Technical University Jalandhar India in May 2006. He is presently working in the area of Information Security, Computer Networks and Scientific Computing. He has many publications of international national level to his credit.

Author Articles
Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting

By Nischay Bahl Ajay K. Sharma Harsh K. Verma

DOI: https://doi.org/10.5815/ijcnis.2012.07.06, Pub. Date: 8 Jul. 2012

This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.

[...] Read more.
Other Articles