Loading...

About Centre

Indian Institute of Technology Guwahati, the sixth member of the IIT fraternity, was established in 1994. The academic programme of IIT Guwahati commenced in 1995. At present the Institute has eleven departments and three inter-disciplinary academic centres covering all the major engineering, science and humanities disciplines, offering BTech, BDes, MA, MDes, MTech, MSc and PhD programmes. Within a short period of time, IIT Guwahati has been able to build up world class infrastructure for carrying out advanced research and has been equipped with state-of-the-art scientific and engineering instruments.Indian Institute of Technology Guwahati's campus is on a sprawling 285 hectares plot of land on the north bank of the river Brahmaputra around 20 kms. from the heart of the city. With the majestic Brahmaputra on one side, and with hills and vast open spaces on others, the campus provides an ideal setting for learning.

 

Introduction

Indian Institute of Technology Guwahati:
    The Department of Computer Science and Engineering at the Indian Institute of Technology Guwahati was formed in the year 1995 and provides an outstanding research environment complemented by excellence in teaching.

    The Department offers B.Tech., M.Tech., Ph.D. and Dual (M.Tech. + Ph.D.) degrees. The Department has a comprehensive curriculum on topics related to all aspects of Computer Hardware and Software with an emphasis on practical learning. The course structure is up-to-date and includes courses on nascent topics to equip our students with the latest developments in Computer Science and Engineering.

    The Department has state-of-the-art infrastructure and computing equipment supported by high speed Ethernet and wireless networks. Various student organisations like ACM Chapter, ACS Chapter, CSEA, Linux and Open Solaris Community are active throughout the year.

    Our faculty members aim at delivering top class education blending their rich research experience with classroom teaching. The Department has undertaken many research projects funded both by multinationals and government agencies. For more information regarding research activities please visit the faculty and research pages.

Responsibilities

Responsibilities of Information Security Research and Development Centre (ISRDC)
 

  • To carryout research – starting from basic/fundamental research leading to applied research and development of products and solutions in identified thematic areas leading to building indigenous capability of strategic importance.
  • To identify Graduation/Post Graduation students with potential to become faculty / core researchers and provide a platform for carrying out research work.
  • To mentor as well as monitor the RCs & PIs attached to them.
  • To guide the researcher and faculty from different colleges / institutes and professional from the industries.
  • To collaborate with international research community in the identified thematic areas.
  • To conduct post-doctoral, PhD, and MS by research and also attract research scholars from other subject streams.
  • To provide facilities for the industrial professionals to carry out the research for the market issues/ live problem in the industry.
  • To carryout research in critical areas of government sector pertaining to national security.
  • Organise Annual Appraisal Workshop for the RC-PI cluster attached to the thematic lab – ISRDC.
  • Organizing international conferences/seminar/workshops
  • Development of Learning Material, Virtual labs, etc. in identified areas
  • Build capabilities to develop indigenous products and solutions by creating a network of ISRDC, RCs, PIs with C-DAC. The mandate of Academic and Research institutions would be to carryout research at basic/fundamental/applied levels and generate new knowledge, while the C-DAC would provide the interface converting this knowledge into viable products and solutions which could be deployed successfully.

Advanced Faculty/ISEA Member

Coming Soon!!!

Research

Coming Soon!!!

Faculty Training Program

  • Each ISRDC would conduct Advance Faculty Training Programs in line with their thematic research area through short duration modular courses for the benefit of RCs and PIs.
  • As the Information Security is constantly evolving with emergence of newer technologies and new research area, there is a need to continuously revise the syllabus. But, the syllabus revision cannot be undertaken until two batches pass out. This would lay a restriction of five years tenure for under graduate level syllabus and three years tenure for masters. However, this limitation could be overcome by ensuring that the minor/major project works undertaken by the students are of current /emerging topics.
  • Each ISRDC, RC could announce a Faculty Training Program calendar well in advance. These training programs could be of short duration modular courses and would be aimed at the faculty of the PIs. Each cluster could identify and nurture a pool of experts from academic institution, industries etc. Technology enhanced learning including virtual laboratory could be extensively deployed for wider spread of such Faculty Training Program.

Paper Publication

S.No Title of the Paper Presented by (Authors) Conference / Journal Conference / Journal Name Dates Remarks
1 Energy Efficient Secure Communication Architecture for Wireless Sensor Network S Mondal, S Mohanty and S Nandi
 
Journal Security and Communication Networks 2016 Accepted
2 Intrusion Detection System for PS-Poll DoS Attack in 802.11 Networks using Real Time DES M. Agarwal, S Purwar, S. Biswas and S. Nandi   IEEE/CAA Journal of AutomaticaSinica 2016 Accepted
3 Impact of Redundant Sensor Deployment over Data Gathering Performance: A Model Based Approach S Chakraborty, S Chakraborty, S Nandi, S Karmakar   Journal of Network and Computer Applications    
4 Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks SandipChakraborty, Sukumar Nandi and SubhrenduChattopadhyay   IEEE Transactions on Wireless Communications    
5 Influence of edge weight on node proximity based link prediction methods: An empirical analysis N Sett, S R Singh, S Nandi   Neurocomputing    
6 Deciding Handover Points based on Context Aware Load Balancing in a WiFi-WiMAX Heterogeneous Network Environment A Sarma, S Chakraborty, S Nandi   IEEE Transactions on Vehicular Technology    
7 Fault resilience in sensor networks: distributed node-disjoint multi-path multi-sink forwarding S Chakraborty, S Chakraborty, S Nandi, S Karmakar   Journal of Network and Computer Applications 2015  
8 Data rate, path length and network contention trade-off in IEEE 802.11 s mesh networks: A dynamic data rate selection approach S Chakraborty, S Nandi   Computer Networks    
9 Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks S Chakraborty and S Nandi   IEEE Transactions on Mobile Computing    
10 Application of Stochastic Discrete Event System Framework for Detection of Induced Low Rate TCP Attack F A Barbhuiya, M. Agarwal, S.Purwar, S. Biswas and S. Nandi   ISA Transactions    
11 Performance Modelling and Analysis of IEEE 802.11 IBSS PSM in Different Traffic Conditions P. Swain, S Chakraborty, S Nandi, and P Bhaduri,   IEEE Transactions on Mobile Computing    
12 A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data B K Patra, R Launonen, V Ollikainen and S. Nandi   Knowledge-Based Systems    
13 Advanced Stealth Man in the Middle Attack in WPA2 Encrypted Wi-Fi Networks M. Agarwal, S. Biswas and S. Nandi   IEEE Communications Letters    
14 MAC Layer Channel Access and Forwarding in a Directional Multi-Interface Mesh Network S Chakraborty, S Sarma and S Nandi   IEEE Transactions on Mobile Computing    
15 Effective data summarization for hierarchical clustering in large datasets B K Patra, and S. Nandi   Knowledge and Information Systems    
16 Dynamic Tree Switching for Distributed Message-Passing Applications S Chakraborty, S Chakraborty, S Karmakar and S Nandi   Journal of Network and Systems Management   2015
17 A time agnostic method for predicting dull nodes and links in evolving networks for data cleaning N Sett, S Chattopadhyay, S R Singh and S Nandi Conference IEEE/WIC/ACM International Conference on Web Intelligence   2016
18 Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures KeshabNath, Swarup Roy and Sukumar Nandi   6th International Conference on Model & Data Engineering (MEDI)    
19 A Comparative Survey of Approximate Adders S Dutt, S Nandi and G Trivedi   26th International Conference Radioelektronika    
20 Intrusion Detection System for Identification of Throughput Degradation Attack on TCP A Bhandari, M Agarwal, S Biswas and S Nandi   Twenty Second National Conference on Communications    
21 Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters Ronald Ashley Dkhar, KeshabNath, Sukumar Nandi, Dhruba K Bhattacharyya, Swarup Roy   Proc. Second International Conference on Information and Communication Technology for Competitive Strategies    
22 Leveraging the Trade-off Between Spatial Reuse and Channel Contention in Wireless Mesh Networks SubhrenduChattopadhyay, SandipChakraborty and Sukumar Nandi   Proc. of the Eighth International Conference on Communication Systems and Networks (COMSNETS 2016)    
23 Exploring Approximate Computing for Yield Improvement via Re-design of Adders for Error-resilient Applications S Dutt, Harsh Patel, S Nandi and G Trivedi   28th International Conference on VLSI Design 2016  
24 A Neural Network Based System for Intrusion Detection and Attack Classification S. Basant, S. Biswas, S.Karmakar   NCC 2016    
25 Adaptive Path Selection for High Throughput Heterogeneous Wireless Mesh Networks A B Paul, S Chakraborty, S De, S Nandi and S Biswas   IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) 2015  
26 Detection of De-authentication DoS attacks in Wi-Fi Networks: A Machine Learning Approach M Agarwal, S Biswas and S Nandi   IEEE SMC 2015. 2015  
27 I2-Diagnosability Framework for Detection of Advanced Stealth Man in The Middle Attack in Wi-Fi Networks M Agarwal, S Biswas and S Nandi   23rd Mediterranean Conference on Control and Automation (MED)    
28 A Discrete Event System Based Approach for Obfuscated Malware Detection Chinmaya K Patanaik, Ferdous A Barbhuiya, SantoshBiswas, Sukumar Nandi   Advances in Communication and Computing, Volume 347 (Lecture Notes in Electrical Engineering)    
29 Multihop Balanced Energy Clustering for Wireless Sensor Network M Pant, B Dey and S Nandi   Applications and Innovations in Mobile Computing (AIMoC 2015) 2015  
30 Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks S Chakraborty and S Nandi   16th International Conference on Distributed Computing and Networking 2015    
31 A High-performance Energy-efficient Hybrid Redundant MAC for Error-resilient Applications S Dutt, A Chauhan, R Bhadoriya, S Nandi and G Trivedi   28th International Conference on VLSI Design and 14th International Conference on Embedded Systems 2015    
32 Intrusion Detection Systems using Linear Discriminant Analysis and Logistic Regression S. Basant, S. Biswas, S.Karmakar   INDICON 2015    

Coursewise Design

Coming Soon!!!

Download

Coming Soon!!!

Conference/Workshop

Coming Soon!!!

Style Switcher

Predefined Colors

Layout Style

Header Color

Footer Top Color

Footer Bottom Color