Manjusha Pandey

Work place: Indian Institute of Information Technology, Allahabad, India



Research Interests: Computer Architecture and Organization, Data Structures and Algorithms


Manjusha Pandey is pursuing Ph.D. from Indian Institute of Information Technology, Allahabad, India in Information and Technology, has done her M. Tech in Computer Science. Her research interest areas include Wireless Sensor Networks, Privacy in Wireless Communication, Privacy and security in Digital & Mobile Communication, Signal Processing and Vehicular Technology.

Author Articles
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks

By Manjusha Pandey Shekhar Verma

DOI:, Pub. Date: 8 Jun. 2012

The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k-anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.

[...] Read more.
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

By Manjusha Pandey Shekhar Verma

DOI:, Pub. Date: 8 May 2012

Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes. Core functionality of WSN includes routing of the sensed data through predetermined optimized routes to the base station thus producing pronounced traffic near the sink node adding up to the revelation of either location of direction of location of base station. To overcome this revelation of base station the traffic patterns may be disguised by introducing fake packets to the generated traffic of original data. Many anti traffic analysis strategies have been proposed and implements with the objective of attaining traffic uniformity in network. But the inclusion of fake packets adds up communication overhead in the network as a whole. Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.

[...] Read more.
Other Articles