Qualification: 
Ph.D, M.E, BE
a_rajakumar@blr.amrita.edu

Dr. Rajakumar Arul currently serves as an Assistant Professor at the department of Computer Science and Engineering, Amrita School of Engineering, Bengaluru. He pursued his Bachelor and Master’s in Computer Science and Engineering from Anna University, Chennai. He completed his Doctorate of Philosophy requirements in Full Time under the Faculty of Information and Communication, Department of Computer Technology, Anna University - MIT Campus. He is a recipient of Anna Centenary Research Fellowship (ACRF) for his doctoral studies. His research interests include Security in Broadband Wireless Networks, WiMAX, LTE, Robust resource allocation schemes in Mobile Communication Networks. He is a member of IEEE and Professional member of ACM.

Education

  • 2018: Ph. D. 
    Anna University, Chennai
  • 2013: M. E. 
    Anna University, MIT Campus, Chennai
  • 2011: B. E.
    Anna University, Chennai

Publications

Publication Type: Journal Article

Year of Publication Publication Type Title

2018

Journal Article

Rajakumar Arul, Raja, G., Bashir, A. K., Chaudry, J., and Ali, A., “A Console GRID Leveraged Authentication and Key Agreement Mechanism for LTE/SAE”, IEEE Transactions on Industrial Informatics, vol. 14, pp. 2677-2689, 2018.[Abstract]


Growing popularity of multimedia applications, pervasive connectivity, higher bandwidth, and euphoric technology penetration among bulk of the human race that happens to be cellular technology users, has fueled the adaptation to long-term evolution (LTE)/system architecture evolution. The LTE fulfills the resource demands of the next generation applications for now. We identify security issues in authentication mechanism used in LTE that without countermeasures might give super user rights to unauthorized users. The LTE uses static LTE key to derive the entire key hierarchy, i.e., LTE follows Evolved Packet System-Authentication and Key Agreement based authentication, which discloses user identity, location, and other personally identifiable information. To counter this, we propose a public key cryptosystem named “International mobile subscriber identity Protected Console Grid based Authentication and Key Agreement (IPG-AKA) protocol” to address the vulnerabilities related to weak key management. From the data obtained from threat modeling and simulation results, we claim that the IPG-AKA scheme not only improves security of authentication procedures, but also shows improvements in authentication loads and reduction in key generation time. The empirical results and qualitative analysis presented in this paper prove that IPG-AKA improves security in authentication procedure and performance in the LTE.

More »»

2017

Journal Article

G. Raja and Rajakumar Arul, “Simple & Secure Mechanism for Establishing Connection between D2D Communication in 5G Scenario”, International Journal of Engineering Research in Computer Science and Engineering, vol. 4, no. 8, pp. 173-178, 2017.

2017

Journal Article

R. Jayaraman, Raja, G., Ghosal, D., Rajakumar Arul, and A, S. Kumar, “A Compatibility Vector Technique for Cooperative Scheduling and Channel Assignment Algorithm in Broadband Wireless Networks”, Mobile Networks and Applications, vol. 22, pp. 730–742, 2017.[Abstract]


Broadband Wireless Networks is growing rapidly due to the increased number of mobile users. The greatest challenge is to achieve maximum throughput with minimal or no interference while performing concurrent transmission. To reduce the interference problem, this paper proposes a cooperative scheduling and channel assignment algorithm for multi-channel wireless mesh networks. In scheduling algorithm, to avoid the primary interference, the proper time slot is assigned through centralized scheduling for the packet and link in a network. The objective of using the scheduling algorithm is to reduce the transmission delay for uplink/downlink networks. Channel assignment algorithm helps to avoid secondary interference and to perform concurrent transmission with an optimal number of channels. In scheduling, the priority of packets contributes to preventing the accumulation of packets and transmission delay in a multi-hop network. Simulation analysis shows that our channel assignment algorithm avoids both interferences with an optimal number of channels.

More »»

2017

Journal Article

Rajakumar Arul, Raja, G., Kottursamy, K., Sathiyanarayanan, P., and Venkatraman, S., “User Path Prediction Based Key Caching and Authentication Mechanism for Broadband Wireless Networks”, Wireless Personal Communications, vol. 94, pp. 2645–2664, 2017.[Abstract]


Broadband wireless networks namely wireless interoperability for microwave access and long term evolution utilizes the EAP and EPS mechanisms for authentication. However, these mechanisms incur considerable delay during handoffs. This delay during handoffs results in service disruption which becomes a severe bottleneck. To overcome this delay, our article proposes (UPP-KC) a key caching mechanism based on user path prediction. If the user follows the predicted path, he/she bypasses the normal authentication mechanism and obtains the necessary authentication keys directly. Through analytical and simulation modeling, we have proved that our mechanism effectively decreases the handoff delay, thereby achieving fast authentication without compromising on the security standards

More »»

2016

Journal Article

Rajakumar Arul, Raja, G., Kottursamy, K., and Jayaraman, R., “Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 10, no. 6, 2016.[Abstract]


Broadband Wireless NetworN (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using networN coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop networN. Using networN coding, a secure way of transmission is performed which helps in improving throughput and reduces the pacNet loss in the multicast networN. At the outset, improved networN coding is proposed in multicast wireless mesh networN. Considering the problem of performance overhead, degree distribution maNes a decision while performing buffer in the encoding/decoding process. Consequently, BuS (Buffer Scheme) based on networN coding is proposed in the multi-hop networN. Here the encoding process introduces buffer for temporary storage to transmit pacNets with proper degree distribution.

More »»

2016

Journal Article

Rajakumar Arul, Raja, G., Anbalagan, S., Kumar, D., and Bashir, A. Kashif, “The Future Usage of Smart Phones”, Newsletter, 2016.[Abstract]


The proposed I3 model in Figure1 will adapt any short-run change of user voice, and an alteration in usage of words must also be learned by the learning network (artificial intelligence) that is inculcated in the device. Difference and distribution of voice is being identified by the energy at different frequencies. As per the neuro-heuristic voice recognition [10], the speech recognition system is under research and there exists a synchronism of voice as our brain stimulus responds immediately to recognition of voice (i.e., to find if the particular voice belongs to a known person or not). Not only the human brain, but even animals/birds can find their young ones among groups using voice as a primary mode and vice versa. So there is strong evidence seen that each and every voice possesses a unique pattern [21]. Owing to the enormous and tremendous improvements in all fields, designing a circuit which recognizes uniqueness among various voices will be developed in the near future.

More »»

2014

Journal Article

Rajakumar Arul, Sheeba S, J, R., and Raja, G., “A Survey on Scheduling Mechanisms in Broadband Wireless Networks”, Lecture Notes on Information Theory, vol. 2, no. 3, pp. 214-219, 2014.

2014

Journal Article

Rajakumar Arul, K, C. H. I. T. H. R. A. A., and Raja, G., “An Enhanced Coordina Ted Distributed Sche Duling Mechanism For IEEE 8 02.16 Wireless Mesh Networks”, International Journal of Advanced Computational Engineering and Networking, vol. 2, no. 7, 2014.

2014

Journal Article

Rajakumar Arul, Gunasekaran, R., Raja, K., Ramkumar, J., Kumar, S. K. Sudhir, and Umapathy, S., “An Efficient Handover Prediction & Initiation Algorithm for Vehicular Communication in 4G Wireless Networks”, Lecture Notes on Information Theory, vol. 2, 2014.[Abstract]


The main motto behind the 4G wireless epoch is to provide a mobile ultra-broadband internet access with the help of a completely standardized Internet Protocol (IP) for video, Voice over IP (VoIP) and other multimedia services. It also requires the existing mobile services to pullulate into an open Mobile Cloud which can be used by all the providers. Vehicular networks can also be used to obtain information from the Internet which is not directly related to travelling. So numerous number of applications like surfing, email, gaming etc. can find its way into these wireless vehicular networks. In this paper we discuss the network mobility mechanism used to support the movement of nodes which changes its point of attachment to a fixed infrastructure from time to time, thus developing an efficient handover prediction and initiation algorithm for vehicular communication in 4G wireless networks. Here the handover is predicted using the route travelled (database) and it is initiated with the help of threshold values in both the scenarios. Until the threshold value is reached, the handover initiation can be postponed (made to sleep), without any need to check whether we are within the boundary of the current Access Router (AR) or not, thus saving a substantial amount of resource usage. By this way, the Mobile Router (MR) forebodes the handover, even if the current connection with the AR is still active.

More »»

Publication Type: Conference Proceedings

Year of Publication Publication Type Title

2016

Conference Proceedings

G. Raja, Kottursamy, K., Raja, G., Jayaraman, R., Rajakumar Arul, and Baskaran, S. B. M., “BAY- RACE: Bayesian-Resource Allocation Conditional Entities algorithm under uncertainty in distributed WMN”, International Conference on Innovations in Engineering and Technology. pp. 66-74, 2016.

2016

Conference Proceedings

Rajakumar Arul, Raja, G., Kottursamy, K., Jayaraman, R., and Arulappan, A., “Fault-tolerant Interworking Authentication Model for Non 3GPP – 3GPP Access”, International Conference on Innovations in Engineering and Technology. pp. 75-82, 2016.

Faculty Research Interest: