R. Rajashree's research while affiliated with GKM College of Engineering and Technology and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (9)


Energy-Efficient Elliptic Curve Cryptography-Based DTLS Key Establishment Protocol for IoT Communication
  • Chapter

January 2019

·

17 Reads

·

1 Citation

P. N. V. Karthik

·

R. Rajashree

·

·

Ganesan Veerappan
Share

IOT based smart kitchen system

November 2018

·

107 Reads

·

7 Citations

International Journal of Civil Engineering and Technology

M.G. Perumal

·

K. Srivatsan

·

·

[...]

·

R. Rajashree

In India almost all the peoples are using Liquefied Petroleum Gas (LPG) as a fuel for cooking. But in this field the steps taken for safety purpose is very less. LPG is flammable gas, it has the potential to cause fire accidents heavily. In order to avoid fire accident, many researchers are applied their effort to design new prototype model. IoT based gas leakage detection and monitor system uses different sensors and gas knob to avoid the fire accident in the kitchen. It will acquire input from the sensor and control the gas knob automatically either from High ignition to Medium or from Medium to Low. Gas leakage and presents of moisture will enable the DC motor to rotate the gas stove knob automatically to stop the gas flow in the gas stove. If gas leakage is detected then it will be intimated to the end user by using pushing box option in the cloud environment. The proposed model also enables the user to analysis the usage of gas throughout the year.


Increased level of security using DNA steganography

January 2018

·

74 Reads

·

15 Citations

International Journal of Advanced Intelligence Paradigms

Security has become one of the important fields of concern when the scenario of information transport is viewed. Cryptology is a traditional technique that hides the message by encoding it. Nevertheless, now it is not only demanded that the data that is being transmitted is encoded, but the very existence of knowledge of data transmission should be concealed. Steganography is thus a technique where the data are not only encoded, but hidden within a carrier. This therefore provides a two-level security. The proposed paper describes a highly secured steganography technique using DNA sequence. The report suggests a technique of hiding an image in an image using DNA sequence.



A Secure Route Discovery Protocol for AODV Based Mobile Adhoc Networks Using Hyperelliptic Curve Cryptography

November 2017

·

36 Reads

·

2 Citations

A Mobile Adhoc Network (MANET) consists of numerous number of nodes, neighbor nodes are connected by means of radio links. Each node is constrained with limited power, bandwidth and scalability. Many researchers lay their effort to develop various techniques for providing a secure route in MANET. As a result, an Elliptic Curve Cryptography (ECC) technique is used to develop a secure shortest algorithm for routing the packet from source node to destination node, since ECC is famous due to its shorter key length and less computational overhead for encryption and decryption operation. ECC is more suitable for power constrained devices. But ECC based secure routing protocol requires a large number of Route Request (RREQ) packet in Adhoc on Demand Distance Vector (AODV) protocol and consumes more power. In order to reduce the number of RREQ packet and power consumption, a proposed secure energy efficient routing protocol is implemented. Finally, discuss the improvement of the proposed approach with the existing systems using GloMoSim software tool.


A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography

March 2016

·

27 Reads

·

3 Citations

Indian Journal of Science and Technology

Background/Objectives: The terrorism threat caused by terrorist who posses forged passport and identities due to insecure environment which could be more serious imminent. Traditional scheme and techniques available to protect the information from unauthorized user is not enough for the current environment. Methods/Statistical Analysis: So, a hybrid multilevel DNA computing based Color Code Cryptographic scheme combined with Elliptic Curve Cryptography is proposed to protect the passport data from the eavesdropper. Proposed data encryption algorithm consists of two level of security, first level of security is provided by convert the personal details (Plain Text) of the customer into Unicode and RGB color code and then map the color code with DNA nucleotide. The mapped DNA molecules converted into ASCII values for encryption process. DNA molecules help to store enormous amount of data intended to allow more number of user to access the system. Second level of security is provided by encrypt the ASCII values using Elliptic Curve Cryptography techniques which require very less key size compared with traditional schemes. Resultant Cipher Text is hidden in the personal image of the customer using LSB steganographic method. Findings: Compared with traditional scheme, proposed scheme provides multilevel of security with less communication and computational overhead due to its lesser key size. ECC-80 bit key size based encryption scheme provides same level of security as RSA-1024 scheme with less number of operations involved in the passport verification system. Applications/Improvements: Since the proposed scheme require very less key size, consumes very less power, it will be more suitable for power constrained devices such as smart card, sensors, mobile phones, PDA's, RFID tags, etc.




A hybrid secure architecture for passport verification system using visual cryptography and steganography

July 2015

·

19 Reads

The privacy is the main concern in the present days and especially in biometrics verification of passport using individual's personal data. Many researchers have put forward various solutions for biometric verification system. The existing visual cryptographic scheme for biometric verification system provides security to the face image present in the biometric template during the storage and transmission of data. The proposed hybrid architecture employs the advantages of visual cryptography and steganography for passport verification. It extends the privacy to the image as well as the personal information with less communication complexity. It also provides greater level of security.

Citations (7)


... K. Sakthisudhan et al. used an ultrasonic sensor to detect the current quantity of objects in each vessel and alert the consumer through a mobile app when an item fell below a predefined threshold level [1]. M. Gopi Perumal et al. used a gas sensor to detect a gas leak [2]. When the sensor detects a gas leak, it sends a high pulse to the Microcontroller. ...

Reference:

IoT Based Smart Kitchen Using Fuzzy Intelligence and Signal Processing
IOT based smart kitchen system
  • Citing Article
  • November 2018

International Journal of Civil Engineering and Technology

... After the addition of DTLS, MAC and higher layer headers 75 bytes are left beyond for payload [17]. To make DTLS friendlier towards the aid restricted networks its activities have to be recorded [18]. To set up a unicast channel for communication a light weight authentication scheme and in order to reduce the power and computation price of IoT device a symmetric encryption algorithm was proposed by Bhattacharyya et al [19]. ...

Energy-Efficient Elliptic Curve Cryptography-Based DTLS Key Establishment Protocol for IoT Communication
  • Citing Chapter
  • January 2019

... Though, it is time-consuming during the message extraction phase. In [53], a combination of image and DNA-based steganography is applied. A secret image is embedded in another image with the same pixel size by converting its pixel values to DNA triplet based on a lookup table. ...

Increased level of security using DNA steganography
  • Citing Article
  • January 2018

International Journal of Advanced Intelligence Paradigms

... These products are often proteins, which usually perform different functions such as hormones and enzymes. However nonprotein coding genes such as transfer RNA (tRNA) or small nuclear RNA (snRNA) are functional RNA products [2,3]. ...

Increased Level of Security using DNA Steganography
  • Citing Article
  • January 2018

International Journal of Advanced Intelligence Paradigms

... Each of these schemes has its advantages and limitations. The suitable key management scheme should satisfy three important metrics [11][12][13]: security, efficiency, and flexibility. The main motivation of the proposed work is as follows: The rising need of new in-formation processing paradigm such as health monitoring, environment monitoring and surveillance tasks have led to massive active research in the fields of highly distributed sensor networks. ...

An energy efficient routing protocol using hybrid evolutionary algorithm in wireless sensor networks
  • Citing Article
  • January 2016

International Journal of Knowledge Engineering and Soft Data Paradigms

... To ensure vehicle authentication and privacy, CH monitors all the to check that only authenticated vehicle are using the allocated time slot. All the encryption and digital signature schemes use in this phase are based on ECC 31,32 , so as to achieve high provides the high level of security with smaller key length and have less computation time 33,34 . ...

A Hybrid Multilevel Security Scheme using DNA Computing based Color Code and Elliptic Curve Cryptography
  • Citing Article
  • March 2016

Indian Journal of Science and Technology