Yogachandran Rahulamathavan

ORCID: 0000-0002-1722-8621
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced MIMO Systems Optimization
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Cooperative Communication and Network Coding
  • Advanced Wireless Network Optimization
  • Cloud Data Security Solutions
  • Wireless Communication Networks Research
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Cognitive Radio Networks and Spectrum Sensing
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • Face and Expression Recognition
  • Complexity and Algorithms in Graphs
  • Advanced Wireless Communication Technologies
  • Energy Harvesting in Wireless Networks
  • Privacy, Security, and Data Protection
  • Access Control and Trust
  • Chaos-based Image/Signal Encryption
  • Authorship Attribution and Profiling
  • Data Quality and Management
  • Full-Duplex Wireless Communications
  • Spam and Phishing Detection

Loughborough University
2012-2024

City, University of London
2012-2016

London Business School
2014

The Internet of Things (IoT) has penetrated deeply into our lives and the number IoT devices per person is expected to increase substantially over next few years. Due characteristics (i.e., low power battery), usage these in critical applications requires sophisticated security measures. Researchers from academia industry now increasingly exploit concept blockchains achieve applications. basic idea blockchain that data generated by users or past are verified for correctness cannot be...

10.1109/ants.2017.8384164 article EN 2017-12-01

Facial expression recognition forms a critical capability desired by human-interacting systems that aim to be responsive variations in the human's emotional state. Recent trends toward cloud computing and outsourcing has led requirement for facial performed remotely potentially untrusted servers. This paper presents system addresses challenge of performing when test image is encrypted domain. More specifically, best our knowledge, this first known result performs Such solves problem needing...

10.1109/t-affc.2012.33 article EN IEEE Transactions on Affective Computing 2012-10-24

Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads the requirement for data classification be performed by potentially untrusted servers in cloud. Within this context, classifier built server can utilized order classify their own samples over In paper, we study a privacy-preserving (PP) technique where is unable learn any knowledge about clients' input while side also...

10.1109/tdsc.2013.51 article EN IEEE Transactions on Dependable and Secure Computing 2014-01-31

The proliferation of IoT in various technological realms has resulted the massive spurt unsecured data. use complex security mechanisms for securing these data is highly restricted owing to low-power and low-resource nature most devices, especially at Edge. In this article, we propose blockchains extending such implementations. We deploy a Ethereum blockchain consisting both regular constrained devices connecting through wired wireless heterogeneous networks. additionally implement secure...

10.1109/tpds.2020.3013892 article EN IEEE Transactions on Parallel and Distributed Systems 2020-08-04

A clinical decision support system forms a critical capability to link health observations with knowledge influence choices by clinicians for improved healthcare. Recent trends toward remote outsourcing can be exploited provide efficient and accurate in In this scenario, use the located servers via Internet diagnose their patients. However, fact that these are third party therefore potentially not fully trusted raises possible privacy concerns. paper, we propose novel privacy-preserving...

10.1109/jbhi.2013.2274899 article EN IEEE Journal of Biomedical and Health Informatics 2013-07-25

Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any attribute authority (AA) can independently join and leave the system without collaborating with existing AAs. In this paper, we propose user collusion avoidance scheme which preserves user's privacy when they interact multiple authorities to obtain decryption credentials. The proposed mitigates well-known security vulnerability found in previous schemes. We show that our relies on standard...

10.1109/tc.2015.2510646 article EN IEEE Transactions on Computers 2015-12-22

As the world calls it, data is new oil. With vast installments of Industrial Internet Things (IIoT) infrastructure, produced at a rate like never before. Similarly, artificial intelligence (AI) and machine learning (ML) solutions are getting integrated to numerous services, making them "smarter." However, remain fragmented in individual organizational silos inhibiting value extraction its full potential. Digital marketplaces emerging allow owners monetize these data. Yet concerns, such as...

10.1109/jiot.2021.3120640 article EN IEEE Internet of Things Journal 2021-10-15

Searchable Encryption is an emerging cryptographic technique that enables searching capabilities over encrypted data on the cloud. In this paper, a novel searchable encryption scheme for client-server architecture has been presented. The exploits properties of modular inverse to generate probabilistic trapdoor which facilitates search secure inverted index table. We propose indistinguishability achieved by using property trapdoor. design and implement proof concept prototype test our with...

10.1109/tetc.2017.2737789 article EN IEEE Transactions on Emerging Topics in Computing 2017-08-09

The UAV is emerging as one of the greatest technology developments for rapid network coverage provisioning at affordable cost. aim this paper to outsource a specific area according desired quality service requirement and enable various entities in have intelligence make autonomous decisions using blockchain auction mechanisms. In regard, by considering multiple-UAV where each associated its own controlling operator, addresses two major challenges: selection development distributed real-time...

10.1109/access.2020.3003894 article EN cc-by IEEE Access 2020-01-01

In this paper, we investigate energy harvesting capabilities of non-orthogonal multiple access (NOMA) scheme integrated with the conventional time division (TDMA) scheme, which is referred to as hybrid TDMA-NOMA system. a such users are divided into number groups, total allocated for transmission shared between these groups through slots. particular, slot assigned serve each group, whereas in corresponding group served based on power-domain NOMA technique. Furthermore, simultaneous wireless...

10.1109/globecom38437.2019.9013805 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2019-12-01

In multi-authority attribute based encryption (MA-ABE) schemes, multiple authorities monitor different set of attributes and the corresponding shared-decryption-keys. such schemes encrypt or can a message upload to cloud, whereas only users who satisfy from each authority decrypt that message. We extend well-known Chase Chow's scheme \cite{imaabe} for mobile by introducing cloud semi-trusted-authority (STA) between user authorities. this work, substantial amount communications computations...

10.1109/sose.2013.12 article EN 2013-03-01

This paper proposes an efficient algorithm to perform privacy-preserving (PP) facial expression classification (FEC) in the client-server model. The server holds a database and offers service clients. client uses classify (FaE) of subject. It should be noted that are mutually untrusted parties they want without revealing their inputs each other. In contrast existing works, which rely on computationally expensive cryptographic operations, this lightweight based randomization technique....

10.1109/tdsc.2015.2453963 article EN IEEE Transactions on Dependable and Secure Computing 2015-01-01

This paper introduces an efficient algorithm to develop a privacy-preserving voice verification based on iVector and linear discriminant analysis techniques. research considers scenario in which users enrol their biometric access different services (i.e., banking). Once enrolment is completed, can verify themselves using print instead of alphanumeric passwords. Since unique for everyone, storing it with third-party server raises several privacy concerns. To address this challenge, proposes...

10.1109/taslp.2018.2882731 article EN IEEE/ACM Transactions on Audio Speech and Language Processing 2018-11-21

Physical layer security (PLS) is considered as a promising technique to prevent information eavesdropping in wireless systems. In this context, cooperative relaying has emerged robust solution for achieving PLS due multipath diversity and relatively lower transmission power. However, relays or the relay operators practical environment are unwilling service provisioning unless they incentivized their cost of services. Thus, it required jointly consider network economics cooperation improve...

10.1109/access.2019.2929136 article EN cc-by IEEE Access 2019-01-01

We propose an adaptive radio resource allocation algorithm for cognitive underlay networks. The proposed optimally allocates power and the available subcarriers in OFDMA environment while ensuring interference leaked to primary users is below a specific value. formulate problem network into integer linear programming framework. This yields optimal solution problem. Simulation results have been provided validate performance of algorithm.

10.1109/ssp.2009.5278582 article EN IEEE/SP 13th Workshop on Statistical Signal Processing, 2005 2009-08-01

We propose a transmitter beamformer design technique for spectrum-sharing network with mixed quality-of-service requirement. In particular, the proposed algorithm has ability to jointly multiple beamformers, so that specific subset of users attains certain target signal-to-interference-plus-noise ratios (SINRs) whereas SINRs remaining are balanced subject linear constraints. The framework considered is applicable both overlay cognitive radio (CRN) and underlay CRN; however, described example...

10.1109/tvt.2011.2171200 article EN IEEE Transactions on Vehicular Technology 2011-10-12

In this paper, we propose a scheme, criticality-aware data transmission (CARE) in CPS-based healthcare systems, for increasing the processing rate of sensed physiological parameters' value any patient. The criticality patient may vary at instant time, and thus, continuous monitoring quick parameter is essential. Therefore, order to reduce latency critical patient, consider fog computing our architecture. Based on parameters, Local Processing Unit (LPU) transmits sensor either aggregation...

10.1109/iccw.2018.8403540 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2018-05-01

In this paper, we propose a robust minimum mean square error (MMSE)-based beamforming technique for multiantenna relay broadcast channels, where base station transmits signal to single antenna users with the help of relay. The transmission from is completed in two time slots, receives first slot, and it then forwards received different based on amplify forward (AF) protocol. We sum-power minimization problem an imperfect channel state information (CSI) between users. This scheme developed...

10.1109/tvt.2016.2601344 article EN IEEE Transactions on Vehicular Technology 2016-01-01

In this paper we propose SmartARM — a Smartphone-based group Activity Recognition and Monitoring (ARM) scheme, which is capable of recognizing centrally monitoring coordinated individual member activities soldiers in the context military excercises. implementation, specifically consider operations, where members perform similar motions or manoeuvres on mission. Additionally, remote administrators at command center receive data from smartphones central server, enabling them to visualize...

10.1109/ants.2017.8384149 article EN 2017-12-01
Coming Soon ...