1. M. Khatua, S. H. Safavi and N.M. Cheung, "Sparse Laplacian Component Analysis for Internet Traffic Anomalies Detection", IEEE Transactions on Signal and Information Processing over Networks, Vol. xx, No. xx, pp. xx, March 2018.
  2. S. Misra and M. Khatua "Packet-Centric Trade-off and Unfair Success Region in IEEE 802.11 WLANs", IEEE Transactions on Vehicular Technology, Vol. 66, No. 5, pp. 4223–4230, May 2017.
  3. S. Das, M. Khatua, and S. Misra "Cheating-Resilient Bandwidth Distribution in Mobile Cloud Computing", IEEE Transactions on Cloud Computing, Vol. xx, No. xx, pp. xx, December 2016.
  4. M. Khatua and S. Misra "Exploiting Anomalous Slots for Multiple Channel Access in IEEE 802.11 Networks", Journal of Network and Computer Applications, Vol. 74, pp. 56–65, August 2016.
  5. S. Misra, S. Singh and M. Khatua, "MIRACLE: Mobility Prediction Inside a Coverage Hole Using Stochastic Learning Weak Estimator", IEEE Transactions on Cybernetics, Vol. 46, No. 7, pp. 1486–1497, July 2016.
  6. M. Khatua and S. Misra, "D2D: Delay-aware Distributed Dynamic Adaptation of Contention Window in Wireless Networks", IEEE Transactions on Mobile Computing, Vol. 15, No. 2, pp. 322–335, February 2016.
  7. S. Das, M. Khatua, S. Misra and M. S. Obaidat, "Quality-assured Secured Load Sharing in Mobile Cloud Networking Environment", IEEE Transactions on Cloud Computing, Vol. xx, No. xx, pp. xx, July 2015.
  8. S. Misra and M. Khatua, "Semi-Distributed Backoff: Collision-Aware Migration from Random to Deterministic Backoff", IEEE Transactions on Mobile Computing, Vol. 14, No. 5, pp. 1071–1084, May 2015.
  9. S. Misra, S. Mishra, and M. Khatua, "Social Sensing-based Duty Cycle Management for Monitoring Rare Events in Wireless Sensor Networks", IET Wireless Sensor Systems, Vol. 5, No. 2, pp. 68–75, April 2015.
  10. S. Misra, S. Singh, M. Khatua and M. S. Obaidat "Extracting Mobility Pattern from Target Trajectory in Wireless Sensor Networks", International Journal of Communication Systems, Vol. 28, No. 2, pp. 213–230, January 2015.
  11. M. Khatua and S. Misra, "CURD: Controllable Reactive Jamming Detection in Underwater Sensor Networks", Pervasive and Mobile Computing, Vol. 13, pp. 203–220, August 2014.
  12. S. Misra, S. Das, M. Khatua and M. S. Obaidat, "QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment", IEEE Transactions on Cloud Computing, Vol. 2, No. 2, pp. 181–193, April-June 2014.
  13. T. Ojha, M. Khatua and S. Misra, "Tic-Tac-Toe-Arch: A Self-organizing Virtual Architecture for Underwater Sensor Networks", IET Wireless Sensor Systems, Vol. 3, No. 4, pp. 307–316, December 2013.
  14. S. Misra, S. Dash, M. Khatua, A. V. Vasilakos and M. S. Obaidat, "Jamming in Underwater Sensor Networks: Detection and Mitigation", IET Communications, Vol. 6, No. 14, pp. 2178–2188, September 2012.

Conference Proceedings

  1. D. Thakur and M. Khatua, "Cellular Learning Automata-based Virtual Network Embedding in Software-Defined Networks", in Proc. of the ICCCN 2018, NITTTR Chandigarh, India, March 29–30, 2018, pp.
  2. T. Trivedi, V. Parihar, M. Khatua, and B. M. Mehtre, "Threat Intelligence Analysis of Onion Websites using Sublinks and Keywords", in Proc. of the IEMIS 2018, UEM Kolkata, India, February 23–25, 2018, pp.
  3. M. Khatua, S. H. Safavi and N.M. Cheung, "Detection of Internet Traffic Anomalies using Sparse Laplacian Component Analysis", in Proc. of the IEEE GLOBECOM 2017, Singapore, December 4–8, 2017, pp. 1-6.
  4. S. Das, S. Misra, M. Khatua and Joel J. P. C. Rodrigues, "Mapping of Sensor Nodes with Servers in a Mobile Health-Cloud Environment", in Proc. of the Healthcom 2013, Lisbon, October 9–12, 2013, pp. 481–485.
  5. S. Misra, A. Mondal, S. Banik, M. Khatua, S. Bera and M. S. Obaidat, "Residential Energy Management in Smart Grid: A Markov Decision Process-Based Approach", in Proc. of the IEEE iThings 2013, Beijing, August 20–23, 2013, pp. 1152–1157.
  6. M. Khatua and S. Misra, "Exploiting Partial-Packet Information for Reactive Jamming Detection: Studies in UWSN Environment", in Proc. of the ICDCN 2013, TIFR, Mumbai, January 3–6, 2013, pp. 118–132.

Book Chapter

  1. S. Misra and M. Khatua, "Cross-Layer Techniques and Applications in Wireless Sensor Networks", In: H. F. Rashvand and Y. S. Kavian (Eds.), Using Cross-Layer Techniques for Communication Systems, pp. 94–119, 2012, USA, IGI Global.


  1. M. Khatua and S. Misra, "Realizing Virtual MIMO through Opportunistic Parallelism for Increasing Revenue in Enterprise Wireless Local Area Networks", The Second IDRBT Doctoral Colloquium, IDRBT, Hyderabad, December 20–21, 2012.

Research Experience

Collaborative Research Works

Post-Doctoral Research

Project Title: Cross-functional Information System for Decision Making (CISDeM)

Sponsor: Ministry of Defence, Government of Singapore.

Project Overview: CISDeM is a cyber-information research program for decision making against network security threats. It adopts an inter-disciplinary research view — spanning security, natural language processing, machine learning, signal processing, and networking — to protect mission-critical network infrastructures. It stresses an experimental approach supported by a laboratory for sensing, computing, networking, visualization, and command-and-control. The synergistic research tracks will integrate to achieve holistic decision support for agile and proactive security informed by multi-modal and multi-layer empirical data.

  • CISDeM Testbed
  • Internet Text Mining
  • Hidden Knowledge Inference
  • Network & System Level Anomaly Detection
  • Network level Trace-Back & Attribution
  • IP Geolocation
  • Network Control and Response to Attacks

Doctoral Thesis

Thesis Title: Analysis of Collisions in Contention-Based Wireless Networks

The objective of the research work was to analyse different aspects of frame collision in wireless MAC protocol design, specifically in the area of Wireless Local Area Network (WLAN). For achieving this, it was required to analyse the theoretical performance of the standard IEEE 802.11 MAC protocol followed by the design and analysis of performance tuning mechanisms from the frame collision view point. It was also important to analyse frame collision from the network security view point.

  • Proposed an absorbing Markov chain-based model to evaluate the packet-centric delay, fairness, trade-offs, and the scope of performance improvement of the IEEE 802.11 DCF multiple channel access protocol form the packet-centric viewpoint.
  • Designed a new backoff scheme, namely semi-distributed backoff (SDB), for performing on-demand sender- and receiver-centric backoff counter selection. Receiver-centric backoff always selects a disjoint set of optimal backoffs for the colliding stations, and, thus, helps in avoiding successive collision in WLANs.
  • Proposed Semi-DCF MAC protocol for delay sensitive applications in WLANs. In Semi-DCF, on-the-fly migration from random to deterministic backoff provides guaranteed channel access in random access MAC.
  • Identified the advantages of anomalous slot, which is in general considered as a cause of performance degradation, in the DCF protocol.
  • Proposed an anomalous transmission scheme for exploiting the opportunities created by anomalous slots, which, in turn, helps in performance improvement.
  • Proposed an ad-hoc, distributed, and runtime estimation approach, namely delay deviation ratio, for observing the experienced delay status of a station.
  • Proposed an approach for avoiding blind update of CW by introducing channel observation-based probabilistic update of CW in the backoff algorithm of the DCF protocol.
  • Proposed a joint optimization scheme, named delay-aware distributed dynamic adaptation of CW, for improving the saturation throughput and channel access delay of the MAC protocol at runtime.
  • Proposed a partial-packet-based channel observation metrics for capturing frame collision effect due to unauthorized activities in energy-constrained wireless network.
  • Established that the correct detection of controllable reactive jamming is possible in energy-constrained wireless networks.
  • Finally, theoretical performance analysis of all the proposed solution schemes have been performed using Markov chain model as it suits better for channel access protocols in WLANs.

Research Project

Project Title: Towards Robust Efficient and Secure Data Acquisition in Underwater Sensor Networks (TRE)

Sponsor: DIT (presently known as MeitY), Government of India.

Project Overview: Under the surface of water, networks of sensors can be used for different applications such as submarine monitoring, oil exploration, seismic monitoring and ocean mapping. Data acquisition scheme for those applications using underwater sensor networks (UWSNs) faces many challenges due to dynamic behavior of aquatic environment and acoustic communication. These behaviors include the varying levels of salinity, temperature and pressure under the surface of water, large and variable propagation delay, node mobility due to underwater current, frequent loss of connection among the nodes, very less bandwidth for communication, ambient noise of marine life, and error prone communication medium. Therefore, the objective of the project is to investigate the following issues.

  • Design and development of the following schemes for UWSNs
    • Delay Tolerant Routing Protocol
    • Fault Tolerant Routing Protocol
    • Jamming Detection Scheme
    • Robust Architecture
  • Development of UWSN simulator using MATLAB
  • Development of UWSN simulator using NS-3

Master's Thesis

Thesis Title: GSPIN: Gradient-based Sensor Protocol for Information via Negotiation in WSNs

The objective of the project work was to reduce communication activity and energy consumption during information dissemination among sensor nodes in wireless sensor networks (WSNs). Heinzelman et al. proposed Sensor Protocols for Information via Negotiation (SPIN), a family of adaptive protocol, that solves the classic problem of flooding by finalizing communication decision of sensor nodes based upon application-specific knowledge of the data and knowledge of the resources that are available to them. However, the SPIN protocol has some shortcomings. Therefore, the specific objective of the Thesis work was to improve the performance of the SPIN protocol.

  • The proposed solution GSPIN improved the performance of SPIN protocol by utilizing the relative positioning information of sensor nodes specifically the position of a sink w.r.t. the source.

Google Scholar Profile

A summary of publications till date in Google Scholar Profile.