S. Venkatesan

ORCID: 0000-0002-1367-0420
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Distributed systems and fault tolerance
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • User Authentication and Security Systems
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Optimization and Search Problems
  • Advanced Authentication Protocols Security
  • Parallel Computing and Optimization Techniques
  • Cooperative Communication and Network Coding
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Software System Performance and Reliability
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Energy Harvesting in Wireless Networks
  • Wireless Networks and Protocols
  • Advanced Malware Detection Techniques
  • Advanced Optical Network Technologies
  • Advanced Data Storage Technologies
  • Cloud Computing and Resource Management
  • Privacy, Security, and Data Protection
  • Interconnection Networks and Systems

Indian Institute of Information Technology Allahabad
2015-2025

Madurai Kamaraj University
2021-2024

Saveetha University
2024

Indraprastha Institute of Information Technology Delhi
2024

Indian Institute of Technology Indore
2023

Jaypee Institute of Information Technology
2022

KIIT University
2022

The University of Texas at Dallas
2005-2019

Tejas Networks (India)
2019

The University of Texas at Austin
2006-2010

One of the main design issues for a sensor network is conservation energy available at each node. We propose to deploy multiple, mobile base stations prolong lifetime network. split into equal periods time known as rounds. Base are relocated start round. Our method uses an integer linear program determine new locations and flow-based routing protocol ensure efficient during four metrics evaluate our solution using these metrics. Based on simulation results we show that employing in...

10.1109/glocom.2003.1258265 article EN 2004-07-08

We consider the issue of designing a generic transport layer protocol for energy-constrained sensor networks. present requirements such and propose transmission control (STCP). STCP is generic, scalable reliable where majority functionalities are implemented at base station. offers controlled variable reliability, congestion detection avoidance, supports multiple applications in same network. design implementation evaluate with different scenarios network characteristics.

10.1109/icccn.2005.1523908 article EN 2006-10-11

In a cognitive radio (CR) network, MAC-layer configuration involves determining common set of channels to facilitate communication among participating nodes. Further, the availability multiple and frequent channel switches add complexity route selection. Knowledge global network topology can be used solve above-described problems. this paper, we propose distributed algorithm for gathering information CR network. We outline approaches that utilize gathered efficient routing packets. addition,...

10.1109/milcom.2005.1605725 article EN 2006-03-22

10.1016/j.pmcj.2019.101050 article EN Pervasive and Mobile Computing 2019-07-11

In this article, we propose an efficient lattice-based ring signature scheme for message authentication in vehicular ad-hoc networks (VANETs). It provides unconditional identity privacy preservation, authentication, and location the sender vehicle. The of messages is extremely vital as it gives motivation vehicles to accept, act, further transmit other network well remain a member network. Any unauthorized vehicle cannot fraud into if are authenticated. public key cryptography-based methods...

10.1109/jsyst.2020.2980297 article EN IEEE Systems Journal 2020-04-09

Wireless sensor networks have become increasingly common in everyday applications due to decreasing technology costs and improved product performance. An ideal application for wireless is a biomedical patient monitoring tool. systems improve quality of life the subject by granting them more freedom continue their daily routine, which would not be feasible if wired equipment were used. This paper explores an networks, attempts monitor patients specific condition completely non-invasive,...

10.1145/1248054.1248073 article EN 2007-06-11

Cognitive radio (CR) technology is a promising emerging that enables more efficient usage of already assigned spectrum. However, before CR networks can be deployed, new algorithms and protocols need to developed. When forming an ad-hoc cognitive network (CRN), one the fundamental tasks determine neighbors each node channels used communicate among neighbors. The nature CRN makes this challenging problem. Specifically in CRN, not only multi-channel, but available at different nodes may...

10.1109/dyspan.2008.78 article EN 2008-10-01

10.1007/s12652-022-03834-9 article EN Journal of Ambient Intelligence and Humanized Computing 2022-04-18

Recovering from processor failures in distributed systems is an important problem the design and development of reliable systems. Two solutions to this which involve very little overhead are presented. Without appending any information messages application program, it shown that possible recover using O( mod V E ) where number processors communication links system. The second algorithm can be used without forcing nonfaulty roll back under certain conditions.< <ETX...

10.1109/icdcs.1991.148709 article EN 2002-12-10

We consider a wireless sensor network made of nodes capable sensing and communication, relay base stations responsible for collecting data generated by nodes, to be deployed in field. address the problem placing field such that (i) each point interest is covered subset sensors desired cardinality (ii) resulting connected (iii) has sufficient bandwidth. propose several deployment strategies determine optimal placements guaranteed coverage, connectivity, bandwidth robustness. study different...

10.1109/pccc.2005.1460641 article EN 2005-07-06

10.1016/0743-7315(90)90099-b article EN Journal of Parallel and Distributed Computing 1990-03-01

Testing and debugging programs are more involved in distributed systems than uniprocessor because of the presence communication medium inherent concurrency. Past research has established that predicate testing is an approach can alleviate some problems this area. However, checking whether a general true particular execution appears to be computationally hard problem. This paper considers class predicates called conjunctive form (CFP) quite useful program development, but tested efficiently....

10.1109/32.345831 article EN IEEE Transactions on Software Engineering 1995-01-01

There is a growing trend towards using mobile computing environment for several applications, and it important that the systems are given adequate support both at level communication level. Causal ordering useful property, particularly in applications involve human interactions. (Such common environments.) In this paper, we present three algorithms causal systems. The first algorithm handles resource constraints of hosts, but system not easily scalable with respect to number hosts graceful...

10.1109/12.580430 article EN IEEE Transactions on Computers 1997-03-01

Body Sensor Networks are rapidly expanding to everyday applications due recent advancements in Micro-Electro-Mechanical Systems (MEMS) sensing, wireless communication and power management technologies. We leverage these develop a framework for the use of MEMS inertial sensors as low-cost putting coach golf. Accurate requires substantial control precision that is acquired via significant practice. Unfortunately, many golfers not aware they practicing flawed mechanics. An electronic has...

10.1109/bsn.2010.46 article EN 2010-06-01

Most researchers conduct wireless networking experiments in their laboratory or similar indoor environments. Such environments are veritable RF jungles, especially when we consider the ISM bands. In this paper examine and test several common explicit implicit assumptions that tend to make about environment. Although these acknowledged by most researchers, extent of impact is often underestimated. We find because environment always flux, it almost impossible reproduce results an experiment....

10.1109/icc.2009.5199421 article EN IEEE International Conference on Communications 2009-06-01
Coming Soon ...