Arun Saha

Senior Research Software Engineer
Fujitsu Network Communications
Sunnyvale, CA, 94086
Email: saha at cs . ucr . edu (without the blanks)

Research Interests

Localization in wireless networks, Security in Localization, Authentication techniques, Ethernet switching, Metro Ethernet, Embedded Systems, Sofware Engineering


Jadavpur University

2006     Ph.D., Computer Science
             University of California, Riverside
             (Advisor: Professor Mart Molle)

1999     B.E., Computer Science
             Jadavpur University, India




I pursued Ph.D. in Computer Science at University of California, Riverside. I worked on some security and accuracy issues in wireless localization. My dissertation, "Cross Layer Techniques to Secure Peer-to-Peer Protocols for Location, Adjacency, and Identity Verification." can be found here. Prior to that, I pursued Bachelors in Computer Science at Jadavpur University and worked at Hughes Software Systems (now renamed to Aricent).

Subsequently, I worked at Cisco (San Jose) and currently working at Fujitsu Network Communications (Sunnyvale). At these places, my focus is in the area of Metro Ethernet (also known as Carrier Ethernet). I work on how IEEE 802.1 Ethernet bridging technologies and Metro Ethernet Forum (MEF) recommendations can be knitted to cater needs of different types service definitions, e.g. residential, corporate, service providers. In paritcular, the goal is to coalesce existing ethernet switches and bridging technologies like IEEE 802.1D, 802.1Q (including 802.1ad and 802.1ah) with service oriented concepts like Ethernet Virtual Connection (EVC) of different types (E-LINE, E-LAN, E-TREE).

Graduate research

Localization is the technique to determine the location (position) of a mobile object. If the target device, the device which is being localized, is dishonest (the device or the agent carrying it) then it attempts to claim itself in a location different from where it actually is. There are several attacks in that genre. So, localization methods need to employ security mechanisms.

The location is computed by making multiple distance measurements from observers to the the target device. The distance measurements are derived from timing measurements of the sent and the received messages. Now, since the communication medium uses elctromagnetic signals (3 * 10^8 m/s), a small error in timing measurement leads to large error in distance. This leads to accuracy requirements in localization methods.

Our research tries to meet the security goals and accuracy goals together. And that too using general off-the-shelf technologies, e.g. IEEE 802.11 packet based wireless networks. We propose a solution (MergeECHO) to breakdown the localization procedure into two phases. First, a MAC layer assisted online phase making use of the physical layer Rx/Tx clock for fine-grain time measurement. Second, an offline phase at application layer for cryptographic and geometric computations.

Separately, I worked with port-based network authentication (IEEE 802.1X). We proposed a network topology to be used in areas with high LAN-port density to make the port layout easy and flexible. We proposed small ethernet switches (called splitters) to use in conjunction with standard ethernet switches. Each splitter does incrementally authenticates the next one.

  • Arun Saha, Runtime flow debugging a network device by examining packet counters at internal points (filed with USPTO)
  • Arun Saha and Mart Molle, Localization with witnesses. In Proceedings of 1st International Conference on  New  Technologies,  Mobility and Security (NTMS 2007), Paris, France, May 2-4 2007. Full text (in pdf) Conference Presentation slides (in ppt)
  • Arun Saha, Cross Layer Techniques to Secure Peer-to-Peer Protocols for Location, Adjacency, and Identity Verification, Ph.D. Thesis, University of California, Riverside, September 2006. (pdf)
  • Arun Saha and Mart Molle. Thinking Outside the Box: Extending 802.1x Authentication to Remote Splitter Ports by Combining Physical and Data Link Layer Techniques. In Proceedings  of 28th Annual IEEE International Conference on Local Computer Networks. Germany, October 20 - 24, 2003. Abstract (in html), Full text (in pdf). Conference presentation slides (in ppt).

Notice: The logos present in this page are owned by respective institutions.

Notice: The documents contained in these directories and files are included by the contributing authors as a means to ensure timely dissemination of technical work on a non-commercial basis. Copyright and all rights therein are retained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's or owner's copyright. These works may not be reposted without the explicit permission of the copyright holder.