Niranjan K. Ray

Niranjan Kumar Ray received his PhD in Computer Science and Engineering (CSE) from National Institute of Technology Rourkela in 2014. He did his Masters in Computer Science and engineering from Utkal University Bhubaneswar in 2007. He is a Sr. Assistant Professor in the Department of Computer Science and Engineering, Silicon Institute of Technology, Bhubaneswar. His area of interest includes mobile ad hoc networks, wireless sensor networks, Internet of Things(IoT) and software defined network. He was the publication chair of International Conference on Information Technology (ICIT-2015). He is listed in Marquis Whos Who in Science and Engineering, 12th Edition (2016) and Who’s Who in World, 32nd Edition (2015). He is a member of IEEE.

Publications

A Comprehensive Study of Security in Cloud Computing
Prasanta K. Manohari, Niranjan K. Ray. © 2018. 27 pages.
Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store...
Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures
Niranjan K. Ray, Ashok Kumar Turuk. © 2017. 502 pages.
The implementation of wireless sensor networks has wide-ranging applications for monitoring various physical and environmental settings. However, certain limitations with these...
Intrusion Detection in MANET for Network Layer
Sambhu Dahal, Niranjan K. Ray. © 2017. 27 pages.
Mobile Ad Hoc Networks (MANETs) has become a major next generation wireless networking technology. MANETs are vulnerable to attacks in network layer. MANETs are...
A Comprehensive Study of Security in Cloud Computing
Prasanta K. Manohari, Niranjan K. Ray. © 2017. 27 pages.
Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store...
Security Aspect in Multipath Routing Protocols
Prasanta K. Manohari, Niranjan K. Ray. © 2015. 21 pages.
In the absence of central authority, dynamic topology, limited bandwidth and the different types of vulnerabilities secured data transmission is more challenging in Mobile Ad hoc...