Rajan Shankaran

ORCID: 0000-0002-9248-4158
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Body Area Networks
  • Mobile Ad Hoc Networks
  • Mobile Agent-Based Network Management
  • User Authentication and Security Systems
  • Energy Efficient Wireless Sensor Networks
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Biometric Identification and Security
  • Advanced MIMO Systems Optimization
  • Access Control and Trust
  • Wireless Networks and Protocols
  • Data Visualization and Analytics
  • Age of Information Optimization
  • Smart Grid Security and Resilience
  • Advanced Wireless Network Optimization
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Power Line Communications and Noise
  • Peer-to-Peer Network Technologies
  • Network Traffic and Congestion Control

Macquarie University
2014-2023

University of East London
2022

Wayne State University
2022

University of Warwick
2022

Western Sydney University
1997-2013

The University of Sydney
2002

Western University
2002

Information Technology University
1999

Nepean Hospital
1997

Different from the traditional device-to-device (D2D) communication, vehicle-to-everything (V2X) communication is characterized by high mobility of vehicles, which introduces fast variations channel state information (CSI) such that accurate CSI difficult to be obtained. Unlike other previous work focuses on perfect CSI, in this article, we investigate joint power control and resource allocation problem for D2D-based V2X a more practical case where imperfect. We aim at maximizing sum ergodic...

10.1109/jiot.2020.2973267 article EN IEEE Internet of Things Journal 2020-02-11

Generating random binary sequences (BSes) is a fundamental requirement in cryptography. A BS sequence of $N$ bits, and each bit has value 0 or 1. For securing sensors within wireless body area networks (WBANs), electrocardiogram (ECG)-based generation methods have been widely investigated which interpulse intervals (IPIs) from heartbeat cycle are processed to produce BSes. Using these IPI-based generate 128-bit real time normally takes around half minute. In order improve the efficiency such...

10.1109/jbhi.2016.2546300 article EN IEEE Journal of Biomedical and Health Informatics 2016-03-24

Safety-related vehicle-to-everything (V2X) communication plays an essential role in road safety and requires stringent high reliability low latency. In this paper, we propose a novel approach of joint power control resource allocation mode selection to solve the problem mixed centralized/distributed V2X system under different network load conditions. Two major modes are considered for communication: scheduled (centralized system) UE autonomous (distributed system). order meet specific...

10.1109/tvt.2019.2921352 article EN IEEE Transactions on Vehicular Technology 2019-06-06

As an emerging paradigm, device-to-device (D2D) communication has the capability to complement and enhance conventional cellular network by offering high spectral energy efficiency. However, problem of cochannel interference makes resource allocation very complex challenging in underlay D2D networks. This paper proposes a novel joint power control scheduling scheme both throughput users' fairness Unlike other previous work this area, our aims at maximizing sum all proportional functions,...

10.1109/tvt.2018.2817613 article EN IEEE Transactions on Vehicular Technology 2018-03-21

We present an electrocardiogram (ECG)-based data encryption (EDE) scheme for implantable medical devices (IMDs). IMDs, including pacemakers and cardiac defibrillators, perform therapeutic or even life-saving functions store sensitive data; therefore, it is important to prevent adversaries from having access them. The EDE designed with the ability provide information-theoretically unbreakable where two well-known techniques of classic one-time pads (OTPs) error correcting codes are combined...

10.1109/access.2015.2445336 article EN cc-by-nc-nd IEEE Access 2015-01-01

Any proposal to provide security for implantable medical devices (IMDs), such as cardiac pacemakers and defibrillators, has achieve a trade-off between accessibility doctors gain access an IMD, especially in emergency scenario. In this paper, we propose finger-to-heart (F2H) IMD authentication scheme address accessibility. This utilizes patient's fingerprint perform gaining the IMD. Doctors can treatment by scanning finger tip instead of asking patient passwords/security tokens, thereby,...

10.1109/jbhi.2018.2864796 article EN IEEE Journal of Biomedical and Health Informatics 2018-08-10

Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical management scheme that minimizes communication storage overheads. Our takes into account direct indirect (group) in evaluation as well energy associated with nodes service selection. It also considers dynamic aspect by introducing varying function which could give greater weight most recently obtained values calculation. The proposed...

10.1109/lcn.2010.5735718 article EN 2010-10-01

Sensor networks are increasingly being used in the development and application of military surveillance systems. Small size battery-powered sensor devices deployed unattended hostile environments, such as battlefields to detect any physical intrusion. Energy efficiency, coverage, connectivity three major quality-of-service requirements mission critical applications. Energy-efficient communication is required prolong network lifetime. Better coverage intrusion attempts all kinds. Similarly,...

10.1109/jsen.2019.2894899 article EN IEEE Sensors Journal 2019-01-24

Wearable and implantable medical devices (WIMDs) perform critical health monitoring therapeutic functions. However, current WIMD products lack security safeguards to protect patients from fatal cyber attacks. In the recent past, electrocardiogram (ECG) signals-based techniques have been widely explored secure such by using two cryptographic primitives, fuzzy commitment vault, respectively. Nonetheless, differences, as well similarities between these not investigated, making it difficult...

10.1109/jsen.2018.2879929 article EN IEEE Sensors Journal 2018-11-09

In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The network architecture consider consists of collection nodes, cluster heads base station arranged hierarchically. encompasses schemes establishing managing between these different entities. We demonstrate that the proposed helps to minimize memory, computation communication overheads involved in Our takes into account direct indirect (group) evaluation as well energy...

10.1109/euc.2010.80 article EN 2010-12-01

The security of wireless communication module for Implantable Medical Devices (IMDs) poses a unique challenge that doctors in any qualified hospital should have the access to IMDs an emergency treatment while IMD be protected from adversaries during patient's daily life. In this paper, we present non-key based scheme IMDs, named BodyDouble. This employs external authentication proxy embedded gateway authenticate identity programmer. here transmitting antenna send data and jamming signals....

10.1109/icc.2014.6883392 article EN 2014-06-01

Healthcare sectors are increasingly facing cyber security challenges and threats from adversaries due to numerous flaws the lack of safeguards in medical devices. Among these devices systems, issues that concern implantable (IMDs) have attracted attention both academia industry. In this paper, we discuss vulnerabilities current IMD products by presenting tests demonstrations performed researchers. Based on this, three critical trade-offs design analyzed, namely vs. accessibility emergencies,...

10.1109/iscit.2017.8261228 article EN 2017-09-01

Recent advances in wireless technologies have led to an increased deployment of Wireless Sensor Networks (WSNs) for a plethora diverse surveillance applications such as health, military, and environmental. However, sensor nodes WSNs usually suffer from short device lifetime due severe energy constraints therefore, cannot guarantee meet the Quality Service (QoS) needs various applications. This is proving be major hindrance widespread adoption Therefore, extend WSNs, it critical optimize...

10.1109/access.2020.3046619 article EN cc-by IEEE Access 2020-12-22

Node scheduling provides an effective way to prolong the network lifetime of Internet-of-Things (IoT) networks comprising energy-constrained sensor nodes. Barrier is a special type node scheme that targets IoT-based surveillance applications. An efficient barrier must address key Quality-of-Service (QoS) requirements smart applications, such as coverage, connectivity, and energy efficiency. Moreover, be capable dynamically adapting its execution strategy in event failures caused due faults...

10.1109/jiot.2020.3022941 article EN IEEE Internet of Things Journal 2020-09-08

The security issue of wireless Implantable Medical Devices (IMD) is an emerging area research. unique challenge here that IMD should be accessed by doctors with no authorization for emergency treatments while it still has to protected from adversaries. In this paper, we propose a novel ECG-based Secret Data Sharing (ESDS) scheme in order protect the data privacy against eavesdropping and other active attacks establishes secure channel wherein secret encrypted random ECG bit string generated...

10.1109/wpmc.2014.7014892 article EN 2014-09-01

Wireless Implantable Medical Devices (IMDs), including pacemakers and cardiac defibrillators, often have built-in wireless modules in order to facilitate non-invasive programming data read-out; however, most IMDs lack a security mechanism. The unique challenge is that should be able accessed by doctors at any legitimate hospital for emergency purposes, but conventional mechanisms using keys or credentials cannot guarantee could obtain timely situations. To address this challenge, we present...

10.1109/iscit.2014.7011935 article EN 2014-09-01

Mobile ad hoc networks (MANETs) are self-organizing and adaptive, securing such is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of participating hosts underlying networking systems without presenting any definite scheme trust establishment. If MANET achieve same level acceptance as traditional wired wireless network, then a formal specification framework management must become an intrinsic part its...

10.1109/compsac.2009.132 article EN 2009-01-01

As defined by IEEE 802.15.6 standard, channel sharing is a potential method to coordinate inter-network interference among Medical Body Area Networks (MBANs) that are close one another. However, opens up new vulnerabilities as selfish MBANs may manipulate their online requests gain unfair advantage over others. In this paper, we address issue proposing truthful algorithm and companion protocol allocates efficiently truthfully punishing for misreporting request parameters such time, duration...

10.1371/journal.pone.0148376 article EN cc-by PLoS ONE 2016-02-04

With the unprecedented demand of location-based services in indoor scenarios, wireless localization is emerging as an essential application for mobile users. While line-of-sight GPS signal not available at spaces, WiFi fingerprinting using received strength (RSS) has become popular with its ubiquitous accessibility. Although data can be easily collected by portable devices, to achieve robust and efficient remains challenging two constraints. First, accuracy will degraded random fluctuation...

10.1109/icc40277.2020.9148933 article EN 2020-06-01

Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) activated to meet the key Quality Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden unexpected node failures barrier due security attacks Denial (DoS) poses challenge for maintaining desired QoS levels. In this paper, we propose secure SEC <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tgcn.2021.3067606 article EN IEEE Transactions on Green Communications and Networking 2021-03-22
Coming Soon ...