Kulothungan Kanagasabai

Kulothungan Kanagasabai
Anna University, Chennai · Department of Information Science and Technology

Doctor of Philosophy

About

45
Publications
6,725
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,522
Citations

Publications

Publications (45)
Article
The Internet of Things and Quantum Computing raise concerns, as Quantum IoT defines security that exploits quantum security management in IoT. The security of IoT is a significant concern for ensuring secure communications that must be appropriately protected to address key distribution challenges and ensure high security during data transmission....
Chapter
Mechanical testing and procedures are employed in this present work to investigate the material properties of a Casuarina filler biocomposite that has been developed with particle reinforcement. The major goal of this work is to change the material composition and investigate the mechanical properties of the generated composite material. Specimens...
Article
This article proposes a Taylor ant lion optimization‐based generative adversarial method (TaylorALO‐based GAN) for predicting renewable energy. The proposed renewable energy prediction mechanism involves four different modules, namely, data transformation, extraction of technical indicator, feature selection, and the prediction. At first, the time‐...
Article
A network of real time devices that can sense and transmit the information from the deployed environment by using multi hop communication is called as Wireless Sensor Network (WSNs). Despite the rapid advancement of WSN, where an increasing number of physical devices so called as sensors nodes are connected with each other, providing the improved s...
Preprint
A network of real time devices that can sense and transmit the information from the deployed environment by using multi hop communication is called as Wireless Sensor Network (WSNs). Despite the rapid advancement of WSN, where an increasing number of physical devices so called as sensors nodes are connected with each other, providing the improved s...
Preprint
Full-text available
A network of real time devices that can sense and transmit the information from the deployed environment by using multi hop communication is called as Wireless Sensor Network (WSNs). Despite the rapid advancement of WSN, where an increasing number of physical devices so called as sensors nodes are connected with each other, providing theimproved se...
Patent
A tree spade system for providing a vehicle-mounted system capable of excavating large and heavy plants and transporting them while locking the system into place to prevent damage to the vehicle and plant the tree spade system includes a vehicle with a tilting mechanism, lifting mechanism, and digging apparatus. The digging apparatus utilizes dual...
Article
Full-text available
Data security in cloud data sharing system is effectively ensured by data access control mechanism. Data access control becomes more challenging because of intruders and malicious cloud servers. Most of the traditional approaches do not consider the issues in controlling user accessing cloud data storage and sharing. Ciphertext policy attribute-bas...
Article
Full-text available
The growing requirement for real-time Internet of Things (IoT) applications has ended with Quality of Service (QoS) communication protocols. where heterogeneous IoT data collection and communication processing contains specific requirements in terms of energy, reliability, latency, and priority. Due to energy constraints, a proper estimation model...
Article
WSN plays a major role in the design of IoT system. In today’s internet era IoT integrates the digital devices, sensing equipment and computing devices for data sensing, gathering and communicate the data to the Base station via the optimal path. WSN, owing to the characteristics such as energy constrained and untrustworthy environment makes them t...
Article
Trust‐aware clustering plays a vital role in addressing the security issues faced by mobile ad‐hoc networks (MANETs). The trust worthiness of each participated node is to be estimated for ensuring the secure communications in MANETs. In this article, we propose a new trust‐based secure energy‐aware clustering (TSEAC) model to mitigate the malicious...
Article
Full-text available
In wireless sensor networks (WSNs), energy optimization and the provision of security are the major design challenges. Since the wireless sensor devices are energy constrained, the issue of high energy consumption by the malicious nodes must be addressed well in order to enhance the network performance by making increased network lifetime, reduced...
Article
Full-text available
Internet of Things (IoT) is connected to heterogeneous devices. Efficient adaptive scheduling with encoding and decoding of data is an unaddressed issue in IoT. This paper processes the data under three major hierarchy: namely, adaptability, scheduling of data, and network coding for that data. The reliable access to the information is ensured by a...
Article
Full-text available
De-duplication technology is commonly used to decrease the space and bandwidth requirements of services by eliminating repeated data and store only a single copy of them. Unfortunately, it raises issues relating to security and ownership such as, unauthorized users may claim as owner of that file and security threat from curious server itself. To o...
Article
Full-text available
In Wireless Sensor Network (WSN), the lifetime optimization based on minimal energy consumption and security are the crucial issues for the effective design of protocols to perform multi-hop secure routing. In order to address these issues, we propose a new routing protocol called Secured Quality of Service (QoS) aware Energy Efficient Routing Prot...
Chapter
There is rapid development in technologies of both Cloud Computing and Internet of Things, regarding the field of integrating Cloud-based IoT services. IoT services address the seamless integration of IoT and dynamic interaction with cloud services. In that, most of the services are accessed through the cloud which also responds to the request in a...
Article
Full-text available
Mobile Ad-hoc Networks have distinct characteristics namely lack of centralized control and management, severe resource constraints in terms of energy level of nodes, computing power, frequent mobility and frequent change of topology. This dynamic nature of mobile adhoc networks lead to additional overhead in the provision of secured and stable rou...
Article
The tremendous growth of the pervasive network and its utilization, in the Internet of Things (IoT), is purposefully explored around the world. The Internet of things has an enormous attraction for contender, and is effortlessly attacked due to destitute resource and imperfect distribution of things. The distributed denial of service attacks are fe...
Article
Full-text available
Abstract The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to va...
Article
Full-text available
Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as mi...
Article
Wireless Sensor Networks (WSNs) are used in the design of Internet of Things (IoT) for sensing the environment, collecting the data and to send them to the base station and the locations used for analysis. In WSNs for IoT, intelligent routing is an important phenomena that is necessary to enhance the Quality of Service (QoS) in the network. Moreove...
Conference Paper
Full-text available
Abstract Internet of Things (IoT) is virtually connecting object in the physical world to the internet, where a huge number of embedded devices relays on communication service offered by the internet protocols and these devices are termed as smart objects. Since the smart devices have low configuration it has constrained communication. During the c...
Article
Data anonymisation in cloud is used for enhancing the security which is effectively implemented using vertical fragmentation along with encryption and compression techniques. In the existing cloud databases, distributed storage and processing of data are performed by applying fragmentation and search techniques. In order to improve the performance...
Conference Paper
Internet of Things (IoT) is considered as an advanced version of machine — to-machine technology where the communication between intelligent things is possible with internet connectivity. Security and privacy issues of these things are more prominent since it is widely used in IoT related applications. Even though several authentication schemes whi...
Conference Paper
WSN is a collection of tiny nodes that used to absorb the natural phenomenon from the operational environment and send it to the control station to extract the useful information. In most of the Existing Systems, the assumption is that the operational environment of the sensor nodes deployed is trustworthy and secure by means of some cryptographic...
Article
Full-text available
Mobile Ad hoc Networks (MANET) are infrastructure less networks which provide multi-hop wireless links between nodes. The main applications of MANET in real time environment are military and emergency areas where the fixed infrastructure is not required. It is a temporary communication infrastructure network for quick communication with minimal con...
Article
Full-text available
Predicting user interest based on their browsing pattern is useful in relevant information retrieval. In such a scenario, queries must be unambiguous and precise. For a broad-topic and ambiguous query, different users may with different interests may search for information from the internet. The inference and analysis of user search goals using rul...
Article
Wireless Sensor Network (WSN) consists of a group of sensor nodes that enables the monitoring event under different environments like home security, machine failure diagnosis and biological detection. Due to the high compactness of nodes in networks, it is probable that repetition of data will be discovered by nearby nodes. Wireless Sensor Network...
Article
Full-text available
Wireless sensor nodes are usually embedded in the physical environment and report sensed data to a central base station. Clustering is one of the most challenging issues in wireless sensor networks. This paper proposes a new cluster scheme for wireless sensor network by modified the K means clustering algorithm. Sensor nodes are deployed in a harsh...
Article
Full-text available
In wireless networks, spoofing attack is one of the most common and challenging attacks. Due to these attacks the overall network performance would be degraded. In this paper, a medoid based clustering approach has been proposed to detect a multiple spoofing attacks in wireless networks. In addition, a Enhanced Partitioning Around Medoid (EPAM) wit...
Article
Full-text available
Rapid growth in the Internet usage and diverse military applications have led researchers to think of intelligent systems that can assist the users and applications in getting the services by delivering required quality of service in networks. Some kinds of intelligent techniques are appropriate for providing security in communication pertaining to...
Article
Full-text available
In this paper, we propose a new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. In addition, we used an enhanced MSVM classification algorithm that wa...
Article
Full-text available
In this paper, we propose a fuzzy clustering model to find the proper cluster structures from a dataset used for intrusion detection. Since, genetic algorithm is an effective technique to improve the classification accuracy. In this paper, we propose a Novel Weighted Fuzzy C-Means clustering method based on Immune Genetic Algorithm (IGA-NWFCM) and...
Conference Paper
Intrusion Detection Systems (IDS) are necessary to provide security to ad hoc networks. It helps to detect and prevent Denial of Service (DoS) attacks and hence will reduce power consumption occurring during the transmission of message. Data preprocessing plays a major role in Intrusion Detection System (IDS), since it provides the optimal and valu...
Article
In a Wireless Sensor Network (WSN) data dissemination and data gathering are involved during the transmission of data from the source to the destination.Data dissemination is the process of routing data or queries throughout the network and data gathering is the collection of observed data from individual sensor node to sink. Routing is the process...

Network

Cited By