ELOS 2022

Subir Kumar Sarkar

Subir Kumar Sarkar, Speaker at Optics Conferences
Jadavpur University, India
Title : Wireless Self-Organizing Networks and Trust Management System


Ad hoc networks are autonomous systems which comprise a collection of mobile nodes that use wireless transmission for communication. They are self-organized , self-configured , and self-controlled infrastructure-less networks. In the last few years , mobile ad hoc networks (MANET) and wireless sensor networks(WSN) have seen increased adaption in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. This type of network can be set up or deployed anywhere and anytime because it poses very simple infrastructure setup and no or minimal central administration. In particular , the development of MANET and WSN provides tremendous opportunities in areas including disaster recovery , defense , health care, researchers , students, and industrial environments. A self-organizing network is a network that can automatically extend, change, configure and optimize its topology, coverage, capacity, cell size, and channel allocation, based on changes in location, traffic pattern, interference, and the situation or environment. Each node in these networks acts as transreceiver and communicates via hops when some nodes are out of coverage area. Due to high mobility the topology of the networks changes dynamically, thus making routing very challenging. Only sender, intends that receiver should “understand” message contents. But because of universal electronic connectivity electronic eavesdropping , viruses, hackers and electronic fraud can threaten thereby putting special importance on security. However because of proper attention on the area of network security there is significant development of practical , available applications to enforce network security. In MANETs and WSNs, nodes may exhibit various types of misbehavior. Node’s misbehavior may be categorized into two broad types: Malicious behavior? intention is to attack and damage the network, Selfish behavior? intention is to save power, memory and CPU cycle. A malicious node delays packet forwarding to ensure that time-to-live (TTL) of the packets are expired so that the packets do not reach the destination. In order to prevent various attacks, which WSNs and MANET suffers, the possible solutions can be adapted. Trust tells the degree of reliability of other node in performing actions. It can be evaluated by maintaining a record of the transactions with other nodes directly as well as indirectly.


Prof. Subir Kumar Sarkar has completed his B. Tech, M. Tech and PhD (Tech) from Institute of Radiophysics and Electronics, University of Calcutta and Post Doctoral from Virginia Commonwealth University (VCU), USA . He has worked around 10 years in industry like Oil and Natural Gas Corporation (ONGC) as Executive Engineer , 25 years in Universities (8 Years in IIEST and 17 Years in Jadavpur University) in different capacities. He was the Head of the Department of Electronics and Telecommunication Engineering, Jadavpur University during 2011-2013, coordinator of the Evening course of M. Tech in “VLSI Design and Microelectronics Technology” 2009 -2013 & 2016- till date and Co-ordinator of IC Design & Fabrication Centre , Jadavpur University from 2016 to till date. He has authored 5 Engineering text books published by CRC Press USA, Artech House USA, PAN STANFOPRD USA, S.Chand & Company Pvt. Ltd., Inda . He has already guided 43 PhD scholars ( 8 more registered and currently working), 18 R&D projects sponsored by different Govt. of India funding agencies have been completed/ongoing, published more than 600 technical research papers in archived International/ National journals and peer reviewed conferences. His research Areas include Nanodevices and low power VLSI circuits, Computer networks( MANET & WSN) , Digital Watermarking and RFID. He has visited several countries like USA, France, the United Kingdom, Switzerland, Japan , Thailand and Bangladesh as Keynote speaker, Special Guest of Honour and Invited speaker for training, presenting papers and visiting sophisticated laboratories as a part of his collaborative research activities. He is a Senior Member of IEEE, IEEE Electron Device Society Distinguished Lecturer, Life fellow of The Institution of Engineers(India) and Life fellow of Institution of Electronics and Telecommunication Engineers, Life member of ISTE and Life member of Indian Association for the Cultivation of Science (IACS). He has successfully organized two IEEE sponsored International Conferences as Convener (2004) and as General Chair (2012). He has filed one Indian Patent vide file No: 669/KOL/2013 dated 5th June, 2013.