Krishna K. Venkatasubramanian

ORCID: 0000-0001-7593-2513
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Body Area Networks
  • Healthcare Technology and Patient Monitoring
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • ECG Monitoring and Analysis
  • Molecular Communication and Nanonetworks
  • Access Control and Trust
  • Security and Verification in Computing
  • Context-Aware Activity Recognition Systems
  • Security in Wireless Sensor Networks
  • Safety Systems Engineering in Autonomy
  • EEG and Brain-Computer Interfaces
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Smart Grid Security and Resilience
  • Electrostatic Discharge in Electronics
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Authentication Protocols Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Heart Rate Variability and Autonomic Control
  • Bluetooth and Wireless Communication Technologies
  • Network Security and Intrusion Detection
  • Mobile Crowdsensing and Crowdsourcing
  • Systems Engineering Methodologies and Applications
  • Energy Efficient Wireless Sensor Networks

Worcester Polytechnic Institute
2012-2019

Vellore Institute of Technology University
2015

Arizona State University
2004-2014

California University of Pennsylvania
2012-2013

University of Pennsylvania
2009-2012

Medical cyber-physical systems (MCPS) are life-critical, context-aware, networked of medical devices. These increasingly used in hospitals to provide high-quality continuous care for patients. The need design complex MCPS that both safe and effective has presented numerous challenges, including achieving high assurance system software, intoperability, context-aware intelligence, autonomy, security privacy, device certifiability. In this paper, we discuss these challenges developing MCPS,...

10.1109/jproc.2011.2165270 article EN Proceedings of the IEEE 2011-10-18

A body area network (BAN) is a wireless of health monitoring sensors designed to deliver personalized healthcare. Securing intersensor communications within BANs essential for preserving not only the privacy data, but also ensuring safety healthcare delivery. This paper presents physiological-signal-based key agreement (PSKA), scheme enabling secure communication BAN in usable (plug-n-play, transparent) manner. PSKA allows neighboring nodes agree symmetric (shared) cryptographic key, an...

10.1109/titb.2009.2037617 article EN IEEE Transactions on Information Technology in Biomedicine 2009-12-11

Cyber-physical systems (CPSs) couple their cyber and physical parts to provide mission-critical services, including automated pervasive health care, smart electricity grid, green cloud computing, surveillance with unmanned aerial vehicles (UAVs). CPSs can use the information available from environment such ubiquitous, energy-efficient low-cost functionalities. Their operation needs ensure three key properties, collectively referred as S3: 1) safety: avoidance of hazards; 2) security:...

10.1109/jproc.2011.2165689 article EN Proceedings of the IEEE 2011-10-26

Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring inaccessible environments. Health monitoring, telemedicine, military environmental are some applications where used. The implanted inside human body monitor parts called biosensors. These biosensors form a network collectively health condition their carrier or host. involves collection data about vital parameters from different making...

10.1109/icppw.2003.1240399 article EN 2004-03-02

Preserving a person's privacy in an efficient manner is very important for critical, life-saving infrastructures like body sensor networks (BSN). This paper presents novel key agreement scheme which allows two sensors BSN to agree common generated using electrocardiogram (EKG) signals. EKG-based (EKA) aims bring the "plug-n-play" paradigm security whereby simply deploying on subject can enable secure communication, without requiring any form of initialization such as pre-deployment. Analysis...

10.1109/infocom.2008.4544608 article EN 2008-04-01

Embedded computing and sensor systems are increasingly becoming an integral part of today's infrastructure. From jet engines to vending machines, our society relies on embedded support numerous applications seamlessly reliably. This is especially true with respect autonomous such as unmanned aircraft, ground vehicles, robotics, medical operations, industrial automation. However, given society's increasing reliance well the they support, this introduces a new form vulnerability into critical...

10.1109/mm.2013.18 article EN IEEE Micro 2013-01-01

Body area networks (BAN) can play a major role in monitoring the health of soldiers battlefield. Securing BANs is essential to ensure safety soldiers. This paper presents novel key agreement protocol called Photoplethysmogram PPGbased based (PKA) which allows sensors BAN agree common using PPG values obtained from subject (soldier) they are deployed on. Using stimuli designed monitor directly for cryptographic purposes, enables administrators provide security with minimal initial setup. The...

10.1109/milcom.2008.4753199 article EN 2008-11-01

A Body Sensor Network (BSN) is a network of economically powered, wireless, wearable, and implanted health monitoring sensors, designed to continually collect communicate information from the host they are deployed on. Due sensitive nature data collected, securing BSNs important for privacy preservation protecting bodily harm. In this article, we present Physiological Value-based Security (PVS), usable efficient way intersensor communication schemes BSNs. The PVS scheme distributes key used...

10.1145/1777406.1777410 article EN ACM Transactions on Sensor Networks 2010-07-01

Maintaining security of wearable networked health monitoring sensors (body sensor networks (BSN)) is very important for the acceptance and long term viability technology. Sensors in BSNs organize themselves into different topologies efficiency purpose. Securing these topology formation process prime importance. In this paper we present two schemes which rely on novel technique using physiological values from wearer's body securing a cluster formation. Traditional (one most commonly used...

10.1109/icisip.2006.4286096 article EN 2006-12-01

A head-mounted display (HMD) is a device, worn by person, which has in front of one or both eyes. HMDs have applications variety domains including gaming, virtual reality, and medicine. In this paper we present an approach that can identify user, from among group users, synchronously capturing their unconscious blinking head-movements using integrated HMD sensors. We ask each user the to view series rapidly changing images numbers letters on display. Simultaneously, blinks are captured...

10.1145/2802083.2808391 article EN 2015-01-01

Access control policies define the rules for accessing system resources. Traditionally, these are designed to take a reactive view providing access, based on explicit user request. This methodology may not be sufficient in case of critical events (emergencies) where automatic and timely access resources required facilitate corrective actions. paper introduces novel concept criticality which measures level responsiveness taking such The further incorporates an framework facilitating...

10.1109/percom.2006.19 article EN 2006-03-30

Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) networks are ephemeral, short-duration wireless designed for improving the overall driving experience through exchange of multitude information among vehicles infrastructure. Real-time incident report is an important application domain that can leverage advantage vehicular to greatly improve safety. However, given presence malicious entities, blindly trusting such (even one received a cryptographically secure channel) lead...

10.1109/wivec.2013.6698224 article EN 2013-06-01

Medical devices have been changing in revolutionary ways recent years. One is their form-factor. Increasing miniaturization of medical has made them wearable, light-weight, and ubiquitous; they are available for continuous care not restricted to clinical settings. Further, increasingly becoming connected external entities through both wired wireless channels. These two developments tremendous potential make healthcare accessible everyone reduce costs. However, also provide increased...

10.1109/iembs.2011.6090663 article EN Annual International Conference of the IEEE Engineering in Medicine and Biology Society 2011-08-01

The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, infrastructure) into unstable state. They require the execution specific response actions order to bring them under control. principal aim CAAC is grant right set privileges (to facilitate action execution), at time, subjects, duration, criticalities within...

10.1145/2555614 article EN ACM Transactions on Autonomous and Adaptive Systems 2014-01-01

This paper discussed interoperable biomedical devices. topics environmental functional architecture, MDIE communication protocol, operational attack vectors for IMD communication, system model, threat secure channel establishment, physical security, access control, evaluation metrics, regulatory aspects and other related topics.

10.1109/mpul.2010.937905 article EN IEEE Pulse 2010-09-01

Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors BAN have to be energy-efficient ensure longevity and safety of the network. Recent years seen emergence new class security solutions for BANs, called cyber-physical solutions, which enable plug-n-play secure communication within using environment derived features. However, due this environment-coupled nature, they require signal processing...

10.1109/bsn.2009.47 article EN 2009-06-01

Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and corresponding infrastructure. Introducing networking coordination functionalities fundamentally alters systems' security properties. Understanding is an important first step in eventually designing solutions for such systems. Part 1 of this two-part article provides overview IMD environment attacks that can be mounted on it.

10.1109/msp.2012.128 article EN IEEE Security & Privacy 2012-09-01

Medical device interoperability is an increasingly prevalent example of how computing and information technology will revolutionize streamline medical care. The overarching goal interoperable devices (IMDs) increased safety, usability, decision support, a decrease in false alarms clinician cognitive workload. One aspect that has not been considered thus far ensuring IMDs do inadvertently harm patients the presence malicious adversaries. Security for gained some traction recent years...

10.1145/2566468.2566482 article EN 2014-04-15

Ensuring security of private health data over the communication channel from sensors to back-end medical cloud is crucial in a mHealth system. This end-to-end (E2E) enabled by distributing cryptographic keys between sensor and so that can be encrypted its integrity protected. Further, key also used for mutually authenticating communication. The distribution one biggest overheads enabling secure needs done transparent way minimizes cognitive load on users (patients). Traditional approaches...

10.1145/2534088.2534109 article EN 2013-11-01

Background/Objectives: This paper deals about the designing and development of a driver alert system based on EKG signals to detect drowsiness thus reduce accident rate. Methods: Conductive sensor attached hand which continuously monitor driver’s heart rate disseminate warning message through mail SMS owner or respective authority. The structure contains four parts including signal acquisition unit, conditioning unit processing Message delivery system. Findings: acquired from conductive...

10.17485/ijst/2015/v8i19/77014 article EN Indian Journal of Science and Technology 2015-08-05

In this paper, we propose a proximity based automated access control (PBAC) model for smart-ED environments which improves the existing ED work-flow by automating mundane administrative procedure secure information access, allowing caregivers to focus on treatment of patients. The proposed builds traditional role-based and extends it including multiple authentication levels preventing unauthorized access. We also provide semi-formal specification PBAC model. further validate using...

10.1109/percomw.2006.113 article EN 2006-01-01

Interoperable medical devices (IMDs) face threats due to the increased attack surface presented by interoperability and corresponding infrastructure. Introducing networking coordination functionalities fundamentally alters systems' security properties. Understanding is an important first step in eventually designing solutions for such systems. Part 2 of this two-part article defines a failure model, or specific ways which IMD environments might fail when attacked. An attack-consequences...

10.1109/msp.2012.153 article EN IEEE Security & Privacy 2012-11-01
Coming Soon ...