Raghav V. Sampangi

ORCID: 0000-0002-7919-8843
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • Wireless Body Area Networks
  • RFID technology advancements
  • Cryptographic Implementations and Security
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Security in Wireless Sensor Networks
  • Online Learning and Analytics
  • Chaos-based Image/Signal Encryption
  • Modular Robots and Swarm Intelligence
  • Intelligent Tutoring Systems and Adaptive Learning
  • Digital and Cyber Forensics
  • Teaching and Learning Programming
  • Innovative Teaching and Learning Methods
  • Coding theory and cryptography
  • Bluetooth and Wireless Communication Technologies
  • E-Learning and Knowledge Management
  • Gender and Technology in Education
  • Network Security and Intrusion Detection
  • Interactive and Immersive Displays
  • Information and Cyber Security
  • Medication Adherence and Compliance
  • QR Code Applications and Technologies
  • Impact of Technology on Adolescents
  • Tactile and Sensory Interactions

Dalhousie University
2012-2024

University of Mysore
2010-2012

Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care.However, as with any wireless communication, data security WBANs is challenging design issue.Since such networks consist small sensors placed on the human body, impose resource computational restrictions, thereby making use sophisticated advanced encryption algorithms infeasible.This calls robust...

10.5121/ijnsa.2012.4110 article EN International Journal of Network Security & Its Applications 2012-01-31

Medication errors are a leading cause of death worldwide and hospitals continuously working on improving methods strategies to prevent medication errors. Multi-morbidity patients who have more than one chronic disease for long period time likely take several medications at once. Consequently, they vulnerable drug interactions allergies. In this paper we present novel solution using smartphone integrated with an NFC reader application detect update allergies people multi-morbidity during...

10.1109/nfc.2013.6482450 article EN 2013-02-01

Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit widespread deployment. Security in passive tag based systems a challenge owing the severe resource restrictions. In this paper, we present lightweight anonymity / mutual authentication protocol that uses unique choice pseudorandom numbers achieve basic goals, i.e....

10.1109/ccnc.2015.7158097 article EN 2015-01-01

Resource-constrained wireless networks are emerging such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources computations can be performed. These technologies increasing in popularity, particularly defence, anti-counterfeiting, logistics medical applications, consumer applications with growing popularity of Internet Things. With communication over channels, it is essential to focus attention securing data. In...

10.3390/s150923145 article EN cc-by Sensors 2015-09-15

Radio Frequency Identification (RFID) is a technology that very popular due to the simplicity in its and high adaptability variety of areas. The technology, however, comes with caveat – RFID tags have severe resource restrictions, which make them vulnerable range security attacks. Such vulnerability often results loss privacy tag owner other attacks on tags. Previous research has mainly focused authenticating entities such as readers / servers, communicate tag. Any mechanism only strong...

10.24138/jcomss.v9i1.157 article EN cc-by-nc Journal of Communications Software and Systems 2013-03-23

In this paper, we explore the use of multimodal interfaces (tangible and gestural) in collaborative gameplay. our setup, gestural interaction is performed to perform tasks with reference content on a wall display, support main activity involving tangible tabletop display. We designed two games using configuration, order how children share these during conducted pilot within-subjects user study, piloting 35 between ages 8 15, considered impact number factors (group size, age range, game type...

10.1145/2992154.2996794 article EN 2016-11-06

Wireless Body Area Networks (WBANs) offer tremendous benefits for remote health monitoring and real-time patient care. However, the success of such a system would primarily depend on reliability data transmitted by WBAN. Two aspects need to be considered, namely, accuracy freshness (or, recentness data). Assuming that sophistication sensors addresses problem accuracy, becomes crucial. The focus this work is ensure reduced delay communication within WBAN, thereby reducing overall network...

10.1109/iswta.2011.6089401 article EN 2011-09-01

With organizations around the world increasingly adopting wireless local area networks (WLAN), addressing security needs of becomes a top priority task. Particularly, issue "intruders" or presence undesired entities, in network is utmost importance. Being "friendly", as they usually are, intruders gain access into an organization, without consent and organization's knowledge. This poses serious threat since large amounts important classified data are exchanged over such regularly. Though...

10.1109/basna.2010.5730300 article EN 2010-12-01

Radio Frequency Identification (RFID) is a technology made popular by the ability of RFID tags to uniquely represent objects. However, they are severely resource-constrained due design restrictions. This limits their perform complex computations for security. In systems, priority ensure integrity messages and entity authentication. We consider message in our work. To (i.e., sent must be same as received message), actual usually hashed transmitted receiver along with encrypted message. it...

10.1109/rfid-ta.2014.6934196 article EN 2014-09-01

The emphasis on security in Radio Frequency Identification (RFID) systems is increasing with each passing day, owing to their corresponding increase popularity defence, anti-counterfeiting, logistics and medical applications. However, resource restrictions RFID tags curtail the use of sophisticated algorithms achieve better security, therefore, privacy. Much current work has focused either creating new lightweight cryptosystems specifically for applications or adapting some existing...

10.1109/softcom.2014.7039120 article EN 2014-09-01

We present the results of our study people's responses to unsafe scenarios with personal safety apps. Several such apps have been developed, offering features as a location-sharing panic button. However, there is little research into how people might respond in different situations, and contribute their response. performed lab 30 participants used semi-structured interviews gather set three increasingly risky scenarios, both before after installation app. From results, stated that they would...

10.1145/3290607.3312781 article EN 2019-04-30

A learning experience comprises several factors and understanding them becomes a crucial first step in developing engaging experiences, considering how is no longer always passive "absorb what told/what you read" exercise. Drawing lessons from designing user we present structured holistic approach to design experiences cater both learners teachers, by the unique attributes of experience. We explore role technology augmenting experiences. Our work attempts understand factors/attributes that...

10.1145/3304221.3325563 article EN 2019-07-02

This paper proposes a hybrid encryption technique that generates key dynamically, along with integrity check parameters. Our approach the stream using chained approach, beginning an initial preshared key. Subsequent keys are derived logical operations on intermediate cipher texts and generated in each stage. is improvement over chaining techniques, which use text to derive successive keys. We validate our algorithm by proof-of-concept implementation security analysis.

10.5220/0005273901240131 article EN 2015-01-01

Android applications may request for users’ sensitive information through the GUI. Developer guidelines designing mandate that must be masked/encrypted before storing or leaving system. However not all adhere to guidelines. As a prerequisite tracking input data, it is essential identify widgets it. Previous research has focused on identifying widgets, but extraction of layouts, including images and unused fundamental. In this paper, we propose an automated framework finds user from...

10.5121/csit.2022.121206 article EN 2022-07-23

For introductory programming courses, it is crucial to create formative and summarized grading practices that foster growth mindset in students. We explore one way reimagine reorient assignment towards feedback-oriented encouragement for ongoing continuous learning. This practice of mastery encompasses the following key features: (1) students are provided with a comprehensive list specifications, (2) evaluation student work centered on attainment specified criteria, employing nominal scale...

10.1145/3626253.3635581 article EN 2024-03-14

Over the years, mobile applications have brought about transformative changes in user interactions with digital services. Many of these apps however, are free and offer convenience at cost exchanging personal data. This convenience, comes inherent risks to privacy security. paper introduces a comprehensive methodology that evaluates associated sharing sensitive data through applications. Building upon Hierarchical Weighted Risk Scoring Model (HWRSM), this proposes an evaluation for HWRSM,...

10.1109/icaic60265.2024.10433804 article EN 2024-02-07

This research paper introduces a Hierarchical Weighted Risk Scoring Model specifically designed to assess the risk levels of mobile applications based on user inputs. Through an extensive review literature score calculation models and term sensitivity identification techniques, this study categorizes terms their sensitivity, particularly in relation sensitive inputs that may potentially lead data leaks. The are defined guidelines from PIPEDA. By integrating these terms, along with test...

10.1109/icaic60265.2024.10433828 article EN 2024-02-07

Radio Frequency Identification (RFID) and Wireless body area network (WBAN) are two of the emerging wireless networks that becoming increasingly popular, owing to their applicability in a variety domains longevity-based designs. However, flexibility they offer reduced manufacturing cost come with trade-off --- have severe implicit hardware restrictions. These restrictions limit ability store large amount data and/or perform sophisticated computation, thereby leading them be classified as...

10.1145/2642687.2642699 article EN 2014-09-17

With its flexibility in deployment and data/lifecycle management, radio frequency identification (RFID) technology has potential for application a wide variety of areas. However, RFID tags suffer from severe resource restrictions. This makes systems employing such vulnerable to several attacks, often resulting the loss privacy tag owner, misuse tags. A minimal requirement secure environment is authentication between server. paper presents mutual scheme, based on concepts genetic mutation...

10.1109/cisda.2012.6291533 article EN 2012-07-01

The purpose of this paper is to present the preliminary findings a larger project that aims at studying concept knowledge city, develop frameworks for city as applicable developing nations, and evaluate Mysore city. This presents framework, index (KCI), developed part our study analyses position in terms indicators KCI. involved literature reviews on cities, diverse aspects metrics, indicators, data knowledge/intellectual capital – both historical current, Based findings, concludes has...

10.1504/ijkbd.2012.047034 article EN International Journal of Knowledge-Based Development 2012-01-01
Coming Soon ...