Qualification: 
Ph.D, MBA, M.E
Email: 
m_senthil@cb.amrita.edu

Dr. M. Senthilkumar received his BE (Computer Science and Engineering) in 2004 from Bharathiar University, ME degree (Computer Science and Engineering) in 2008 from Anna University Chennai, MBA (Human Resources Management) from Bharathiar University in 2010 and PhD (Under the Faculty of Information and Communication Engineering) in Mobile Internet Protocol in 2014, from Anna University, Chennai, Tamil Nadu, India. He is currently an Assistant Professor (Selection Grade) in the Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore campus, Amrita Vishwa Vidyapeetham, India since 2004.

He has around 14 years of teaching and research experience. He is a member of IETE. He has published research papers in reputed journals and conference proceedings, out of which majority of the papers are indexed in SCOPUS, SCI and Web of Science. He has got best paper awards for his publications. He has guided many B. Tech. and M. Tech. student projects / thesis and currently guiding B. Tech. students and M. Tech. and Ph. D. scholars for their project / research /dissertation work.

Awards, Achievements & Honors

  1. Received "Highly Commended" recognition for Ph. D. thesis by International Examiner.
  2. First Rank Holder in ME Degree (2006 -2008) from Government College of Technology, Coimbatore, Affiliated to Anna University, Chennai, India.
  3. Rank Holder for BE Degree (2000 -2004) from Tamil Nadu College of Engineering, Affiliated to Bharathiar University, Coimbatore, India.
  4. Received "Best Research Paper Award" in the IEEE International Conference on Computational Intelligence and Computing Research, December-2015
  5. Appointed as Program / Review Committee Member in ICCCT- 2014 conducted by Dept. of CSE, University College Engineering, Osmania University, Hyderabad, on December 11-13, 2014.
  6. Awarded recognition for dedicated service rendered for the execution of the ACM International Collegiate Programming Contest - Asia Amritapuri Site 2014 held at Coimbatore campus of Amrita Vishwa Vidyapeetham during December 2014.
  7. Invited as Chief Guest in national level one day workshop sponsored by IETE on 7th February, 2013 at Department of Electronics and Communication Engineering, Trichy Engineering College, Trichy, Tamil Nadu, India.
  8. Invited as Chief Guest in one day seminar at Dr.N.G.P Institute of Technology, Department of Information Technology, Coimbatore, Tamil Nadu, India, on 23rd March, 2010.
  9. Selected for "Young Indian Researcher" mobility to Italy under MIUR scholarship Programme by University of L’Aquila, Italy during June 2009.
  10. Invited as Chief Guest in national level workshop on 6th October, 2009 at Department of Information Technology, Trichy Engineering College, Trichy, Tamil Nadu, India.
  11. Invited as a Session Chair for paper presentation of national level technical Symposium named XPLOSION’09 at Sri Ramakrishna Institute of Technology, Coimbatore, India.
  12. Appointed as a Chief Judge for Sports Day events conducted at Amrita Vishwa Vidyapeetham, India.
  13. Received Best Research Paper Award in the National Conference on Innovations in Information Technology, Karpagam College of Engineering, India, January 2008.

Funded Projects and Research Experience

  • Completed a funded project with internal seed funding from Amrita Vishwa Vidyapeetham, Coimbatore, India for the project titled “An early warning and monitoring system of elephants”, during 2016-2017.
  • Initiated collaboration in research with Kerala Forest Research Institute (KFRI) for Human-Elephant Conflict Project.
  • Research Member of the Next Gen Computing – Thrust Area Group, Amrita Vishwa Vidyapeetham, India.
  • Member of the research group in Network Security Lab supported by Cognizant Technology Solutions as a part of Amrita - Cognizant Innovation Center, Amrita Vishwa Vidyapeetham, India.
  • Research Member of Mobile and Wireless Networks Lab, Amrita Vishwa Vidyapeetham, India.

Reviewer of Journal/ Conference

  • Reviewer in the International journal, “IEEE Transactions on Communications”.
  • Reviewer in the International journal, “SpringerPlus”.
  • Reviewer in the International journal, “Iranian Journal of Science and Technology Transactions of Electrical Engineering”.
  • Served as reviewer for the papers in International Conference on Information Systems – 2016.
  • Served as reviewer for the papers in International Conference on Interdisciplinary Advances in Applied Computing – 2014.
  • Served as reviewer for the papers in International Conference on Computing & Communication Technologies 2014.
  • Served as reviewer for the papers in International Conference on Amrita ACM-W Women in Computing – 2013.
  • Served as reviewer for the papers in International Conference on Amrita ACM-W Women in Computing –2010

Visits and Talks

  • Delivered a lecture on “Network simulator 2” in one day Seminar on 23rd March, 2010 at Dr.N.G.P Institute of Technology, Department of Information Technology, Coimbatore, Tamil Nadu, India.
  • Delivered a technical session on “Mobile Environment Competence using Network simulator” in national level workshop on 6th October 2009 at Department of Information Technology, Trichy Engineering College, Trichy, Tamil Nadu, India.
  • Delivered a technical session on “Usage of Network simulator 2 in wired and wireless networks” in national level one day workshop sponsored by IETE on 7th Feb 2013 at Department of Electronics and Communication Engineering, Trichy Engineering College, Trichy, Tamil Nadu, India.
  • Delivered a lecture on “Network simulator 2 - Applications” in two day workshop on 24th January 2009 at Department of Computer Science and Engineering, Government College of Technology, Coimbatore, Tamil Nadu, India.

Conference/ Workshop/ Seminar Attended

  • Attended the International Conference on Computer Communication and Informatics (sixth edition - ICCCI 2017) and presented two technical papers at Sri Shakthi Institute of Engineering and Technology, during 05-07 January, 2017 at Coimbatore, India
  • Attended a Symposium on Doctoral Research organized by Amrita Vishwa Vidyapeetham on 26 August, 2016 at Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
  • Attended a workshop on Mendeley and Scopus organized by Central library, Amrita School of Engineering on 28 July, 2016 at Amrita Vishwa Vidyapeetham, Coimbatore, India.
  • Attended a workshop on Future Technologies and Design Thinking organized by Amrita Vishwa Vidyapeetham on 15 July, 2016 at Amrita Vishwa Vidyapeetham, Coimbatore, India.
  • Attended an author workshop jointly organized by Spring Nature and Amrita Vishwa Vidyapeetham on 18 March, 2016 at Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
  • Attended a National Workshop on Computer Vision and Image Processing Techniques (NWCVIPT’16) on 19 March, 2016 at Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
  • Attended and completed a course on TA101 - Transactional Analysis on 9-10 July, 2015, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
  • Attended a workshop on Computational Thinking for Problem Solving on 2-4 May, 2015, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
  • Attended the International Conference on Informatics and Communication Technologies for Societal Development and presented a paper on March 13-14, 2014 at Karunya University, Coimbatore, Tamil Nadu, India.
  • Attended a Faculty Development Programme on Mathematical Modeling and Applications to Computing Sciences on 23-24 August, 2013 at Sri Krishna College of Engineering and Technology, Coimbatore, Tamil Nadu, India.
  • Attended and presented the paper in the International Conference - AICWIC 2013 on 9-11 January, 2013 at Amrita School of Engineering, Coimbatore, Tamil Nadu, India.
  • Attended a workshop on Aakash Education on 10-11 November, 2012 conducted by IIT Bombay at Amrita Vishwa Vidyapeethamy E-learning Centre, Coimbatore, Tamil Nadu, India.
  • Participated and presented a paper in International Conference on Security Conference on Internet of Things (IoT) on 17-19 August, 2012 at Amrita School of Engineering, Amritapuri, Kollam, Kerala, India.
  • Participated a Faculty Enablement Program - campus connect on 27 June – 1 July 2011 conducted by Infosys Limited at Mysore, Karnataka, India.
  • Attended a workshop on Design Pattern conducted on February 2011 by Amrita School of Engineering, Coimbatore, Tamil Nadu, India.
  • Attended an AICTE sponsored seminar on Emerging Trends in Wireless Technologies on 16-17 April, 2010 at Paavai Engineering College, Tamil Nadu, India.
  • Attended and presented the paper at the national conference on innovations in information technology on 22nd January, 2008 at Karpagam College of Engineering, Coimbatore, Tamil Nadu, India.
  • Attended training on Intellectual Property & Innovation Management in Knowledge Era sponsored by TEQIP during October 30-31, 2007 organized by Department of Mechanical Engineering and National Research Development Corporation, New Delhi at Government College of Technology, Coimbatore, Tamil Nadu, India.
  • Attended a training programme on Wireless Communications and Networks conducted under TEQIP on 21-22 September, 2007 organized by Department of Computer Science and Engineering, Government College of Technology, Coimbatore, Tamil Nadu, India.
  • Participated a training programme on SAP Software conducted under TEQIP from 14th to 24th of August, 2007 organized by Department of Computer Science and Engineering, Government College of Technology, Coimbatore, Tamil Nadu, India.
  • Participated a programme on Digital imaging and its applications conducted under TEQIP on 4-5 May, 2007 organized by Department of Computer Science and Engineering, Government College of Technology, Coimbatore, Tamil Nadu, India.
  • Participated a workshop on Ethical Hacking and Cryptanalysis conducted under TEQIP on 7th March, 2007 organized by Department of Computer Science and Engineering, Government College of Technology, Coimbatore, Tamil Nadu, India.
  • Attended training in Software division from 6th to 19th November, 2002 at KG Information Systems (P) Limited, Coimbatore, Tamil Nadu, India.
  • Attended internship training in Software division from 28th October, 2002 to 1st November, 2002 at e-Brahma – A Center for IT Excellence Private Limited, Coimbatore, Tamil Nadu, India.
  • Attended and presented a technical paper in the national level technical symposium conducted on 23rd August 2002 at Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India.

Publications

Publication Type: Journal Article

Year of Publication Publication Type Title

2017

Journal Article

Dr. Senthil Kumar M. and .A, K., “Investigation of Home Agent Load Balancing, Failure Detection and Recovery in IPv6 Network-based Mobility”, International Journal on Advanced Science, Engineering and Information Technology [SCOPUS Indexed], vol. 7, no. 2, pp. pp 632-641, 2017.[Abstract]


Mobile IPv6 came as an extensively acknowledged technology to support mobility in networks. Home agents are in charge for the registration of mobile devices and act as a key entity for the tunneling of data packets to the corresponding registered mobile nodes. A single home agent has administrative control over the critical tasks including home agent registration management, maintenance of cache data and tunneling of data packets to the mobile nodes that are away from their home networks and so on. However in this approach, home agent act as the sole failure point, which gave rise to the placement of multiple home agents to overcome this issue. The load balancing mechanism for multiple home agent deployment faces the problem of improper load sharing, signaling overhead and synchronization issues. Moreover, failure detection and recovery mechanism are inefficient in nature. It experiences a significant delay in tunneling of data packets and suffers from disconnection making it incompetent for the use in real time applications. Most of the existing methods for load sharing and failure detection use the concept of exchange of router advertisement message named as "heart beat messages" at a constant rate. The reduction in the interval of router advertisement can result in signaling overhead and synchronization issues. Hence, this paper investigates and analyzes the various load balancing mechanisms of mobile IPv6. In addition, it presents the comparative study of the failure detection and recovery mechanism of existing methods. Finally, it concludes that future work can be extended in the domain of distributed active load sharing mechanism and proactive failure detection.

More »»

2017

Journal Article

Dr. Senthil Kumar M., .P., K., .S, K., and .S, B., “Integrating Non-linear and Linear Diffusion Techniques to Prevent Fault Attacks in Advanced Encryption Standard to Enhance Security of 4G-LTE Networks”, Defense Science Journal [Impact Factor – 0.5, Web of Science and SCOPUS Indexed], vol. 67, no. 3, pp. pp 276-281, 2017.[Abstract]


Long term evolution based fourth generation (4G) mobile technology has provided a platform for fast and efficient wireless communication. The advanced encryption standard (AES) is one of the three cryptographic algorithms used in 4G networks for encryption of sensitive data. In spite of offering high immunity, AES is still vulnerable to few attacks. This weakness in AES algorithm makes 4G susceptible to several security issues. This paper specifically focuses on fault attacks performed on AES. A fault induced in any one of the rounds of AES helps the attacker to derive information about the secret key. In this manner, these fault attacks pose a serious threat to wireless mobile communication as he or she may gain access to any network that is encrypted with AES. In earlier works, various countermeasures have been suggested to prevent them. However, each of these preventive measures has their own limitations and vulnerabilities. This paper proposes an enhanced method of preventing fault attacks in AES by incorporating a combination of non-linear and linear diffusion techniques. This method identifies if a fault has been injected and diffuses the fault well into the matrix, providing no information about the secret key to the attacker. The performance evaluation proves that the proposed prevention method outperforms the others in terms of time, cost and efficiency.

More »»

2016

Journal Article

K. M. Lakshmi Soujanya and Dr. Senthil Kumar M., “Extensible markup language databases: A Study”, Indian Journal of Science and Technology [SCOPUS Indexed], vol. 9, no. 9, 2016.[Abstract]


Recent years have perceived a theatrical increase in the fame and acceptance of XML-eXtensible Markup Language. This impulsive growth is determined by its ability to offer a standardized, extensible means of involving semantic content within documents describing semi-structured data in database management systems. It enables to address the limitations of existing markup languages and support data exchange in relational databases. Most of the information systems that work on relational databases today are to suffer a lack of both performance and inter-operability or migration issues especially when the information systems work on different databases at different nodes of operations. The XML Native Databases also known as NXD cater to this issue, as XML has emerged into the most powerful markup language that can effectively store, carry or even transform data and its unique feature of encoding independent, platform independent nature. Hence, the paper discusses the survey of earlier works and addresses the need for XML databases as compared to relational databases and further, an insight into the document centric feature of the NXD required by present day use case scenarios.

More »»

2015

Journal Article

Dr. Senthil Kumar M. and Veluswamy, S., “An improved method of cryptographically generated address for IPv6 network-based mobility”, International Journal of Applied Engineering Research [SCOPUS Indexed], vol. 10, no. 1, pp. 1925-1937, 2015.[Abstract]


Mobile Internet Protocol version 6 (MIPv6) is designed to support mobility of nodes in the wireless network and allows each mobile node to maintain transparent connections while moving from one network to another. Each node in MIPv6 is identified by either a permanent home-of address or an impermanent care-of address. The MIPv6 network-based node plays a vital role for generating and verifying its own care-of address using a method known as cryptographically generated address (CGA) without relying on a trusted third party. The CGA method is used to prove the address ownership of mobility based nodes and to prevent the theft of prevailing address of the node using owner’s secret key. The earlier works have been investigated for the limitations of the traditional CGA method. However, the present paper proposes an improved CGA method to enhance security and efficacy in terms of computational cost. It adopts hash-based message authentication code for the correspondent node to validate the address ownership of the IPv6 network based mobile node. Finally, the result shows that the proposed CGA method provides better security and significant reduction in computational cost for generating the address. © Research India Publications.

More »»

2015

Journal Article

Dr. Senthil Kumar M., Lavanya, M., and Priyanka, R., “Integrating Dynamic Architecture with Distributed Mobility Management to Optimize Route in Next Generation Internet Protocol Mobility”, Indian Journal of Science and Technology [SCOPUS Indexed], vol. 8, no. 10, pp. 963-974, 2015.[Abstract]


Increasing population of mobile users has lead to the demand of higher mobility support. Many protocols have been standardized for mobility management such as Mobile Internet Protocol version 6, hierarchical mobile IPv6 and proxy mobile IPv6 and so on. The predominantly used approach in the existing mobile networks is the centralized mobility management. In this, the messages transferred between mobile node and correspondent node must pass through each level due to the hierarchical architecture. When a mobile network is implemented with the centralized architecture, the messages are routed to the MN irrespective of its location using mobile IP for continuing services during the handover. But this approach is susceptible to issues such as single point of failure, non-optimized routes, latency issues, wastage of resources and security threats which affect the performance and scalability, demanding a flatter architecture with an efficient mechanism to face the traffic overload from the mobile users. Hence, the paper proposes a new scheme to form a flatter architecture by distributing the mobility management functionalities as distributed access point at the access level. The resistance against security threat such as man-in-the-middle attack, replay attack and false binding update attack has been achieved. Finally, numerical results show that the proposed scheme provides significant reduction in signaling cost and improves efficiency in route optimization.

More »»

2015

Journal Article

L. Dhariruman and Dr. Senthil Kumar M., “A time-invariant scheme for handover key management using identity based encryption in 4G long term evolution networks”, International Journal of Control Theory and Applications, vol. 8, no. 5, pp. 1823-1830, 2015.[Abstract]


The 4G Long Term Evolution (LTE) is used to provide continuous communication for the mobility based users with high data rate in 4G network. However, the security issues are of paramount importance and have been a recent research area in LTE. The desynchronization attack is one of the major security threats in LTE during handover key management that occurs when source node acts as a rogue base station in order to hijack the future session key. The paper addresses the vulnerability of desynchronization attack in 4G LTE and elucidates how the attack jeopardizes the communication. Also, the paper proposes a secured and efficient handover scheme in key management using identity based encryption to authenticate the participating principals in LTE before the node tries to communicate with the target base station. The scheme is validated using a model checker - AVISPA. The analysis of security and performance evaluation shows that the proposed scheme provides an enhanced security and significant reduction in the communication cost for authentication and key generation in LTE. © International Science Press.

More »»

2013

Journal Article

Dr. Senthil Kumar M. and Valarmathi, M. L., “An efficacious and secure registration for internet protocol mobility”, Defence Science Journal [Impact Factor – 0.5, Web of Science and SCOPUS Indexed], vol. 63, no. 5, pp. 502–507, 2013.[Abstract]


For the ample development of mobile internet protocol (IP) technology and the recurrent movement of a mobile device, it is necessary for the mobile device to inform their home network where initially registered through an efficient and secured procedure against any sort of attacks. The procedure of registration for IP mobility by the portable system must have a better performance by providing a certain level of security, such as authentication, integrity, replay attack protection, and location privacy. All at once, the extreme security in the registration of IP mobility may cause long registration time, principally for real-time systems. This paper mainly deals with a balanced effort for secure and efficient registration procedure which gives better security and efficiency in terms of registration delay. The proposed work provides an easy and fast registration procedure and lessens the registration delay through the usage of an identity based authenticated key exchange scheme that eliminates expensive pairing operations. The proposed protocol is verified by using AVISPA tool. The performance evaluation reveals that the proposed protocol significantly outperforms the existing protocols in terms of the registration delay.

More »»

2013

Journal Article

Dr. Senthil Kumar M. and Valarmathi, M. L., “A secure and decentralized registration scheme for IPv6 network-based mobility”, International Journal of Engineering and Technology, vol. 5, no. 5, pp. 4247-4256, 2013.[Abstract]


For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for mobile IPv6 (MIPv6) based network, it is essential to consider the security issues for cryptographic approaches and an infrastructure requirement on the network. If a public key based cryptography is used for improving the security, then the key exchange mechanisms of the communicants must be handled appropriately. The infrastructure based approach increases the complexity of the mobile device and the mobility agents and also requires an additional message exchanges. Hence, this paper deals with an infrastructure-less registration scheme with symmetric key approach that acts upon MIPv6 environment consisting of the mobile node, home agent, and correspondent node. The proposed scheme is simulated and evaluated for security using Murphi checker. The correctness of the signaling/message sequences of the proposed scheme are verified by the finite state machine. Finally, the simulation results reveals that better security and mutual authentication between MIPv6 nodes have been achieved, and further, mitigation for the various attack scenarios have also been addressed

More »»

2013

Journal Article

Dr. Senthil Kumar M., Valarmathi, M. L., and Dhivya, T., “Intra Debit Card System using RFID Technology”, International Journal of Computer Applications [Impact Factor – 0.752], pp. 32 - 35, 2013.[Abstract]


RFID - Radio-Frequency IDentification is one of the technologies that is used for the past few decades for tracking and identification of an object. RFID tag contains unique information wirelessly with computer databases and network for tracking the objects easily. Prior to performing the read/write operation on RFID card, the reader has to make an authentication check. Usually a default key supplied by the manufacturer is used to do the above. This poses a security threat; anyone can now access the contents of the RFID tag. For handling this security threat, we propose a mechanism involving where the RFID reader tag communication has been enhanced by making use of an identity based authentication technology which involves a third party's authentication. We intend to deploy this security mechanism of the RFID reader and tag access in the scenario of educational institutions; an internal debit card system could be set up. This is particularly beneficial for students of small age to be able to carry out transactions involving the purchase of their uniforms, bags, stationary and other requirements at school. Parents wouldn't have to worry about going in person to take care of their ward's monetary needs.

More »»

2012

Journal Article

Dr. Senthil Kumar M. and Valarmathi, M. L., “Mobile IP registration protocols: a survey”, International Journal of Computer Applications, vol. 51, no. 17, pp. 239-243, 2012.[Abstract]


IP Mobility which was established to facilitate mobility within a worldwide system of interconnected computer networks gives a scalable solution for different networks. As the commercial use of the internet becomes common for IP Mobility through the wireless communication, it is necessary to construct a secure IP Mobility in a registration process which informs the location of the portable systems such as mobile devices to the home network. While registering the locality with the packet transmission by the portable system, the security issues are of paramount importance and this registration must be secured against any cruel attacks that might attempt to acquire unauthorized advantages from any participating principals. The need for secure way to do Mobile IP registration has given rise to a number of protocols. This paper discusses the various existing Mobile IP Registration protocols. The simulation and comparisons has been conducted on the different protocols with the security parameters and registration time to evaluate each protocol’s efficiency.

More »»

Publication Type: Conference Paper

Year of Publication Publication Type Title

2017

Conference Paper

Dr. Senthil Kumar M., Ramesh, G., Pulari, S. Raj, and Krishnamoorthy, V., “An Automated Vision-based Method to Detect Elephants for Mitigation of Human-Elephant Conflicts”, in Proceedings of International Conference on Advances in Computing, Communications and Informatics (ICACCI - 2017), Manipal University, India. , 2017.

2017

Conference Paper

Dr. Senthil Kumar M. and Khatri, A., “Active Home Agent Load Balancing for Next Generation Mobility based Distributed Networks”, in Proceedings of EAI International Conference on Ubiquitous Communications and Network Computing – UBICNET 2017, Bengaluru, India, 2017.

2017

Conference Paper

Dr. Senthil Kumar M. and Krishnamoorthy, V., “An Enhanced Method for Object Removal Using Exemplar-based Image Inpainting”, in Proceedings of International Conference on Computer Communication and Informatics - ICCCI-2017 (sixth edition), 2017.

2017

Conference Paper

P. Muraleedharan and Dr. Senthil Kumar M., “An Investigational Testbed Design for Next Generation Internet Protocol Mobility”, in Proceedings of International Conference on Computer Communication and Informatics - ICCCI-2017 (sixth edition), Coimbatore, India, 2017.

2016

Conference Paper

Dr. Senthil Kumar M. and Dharuman, L., “Prevention of Desynchronization Attack in 4G LTE Networks Using Double Authentication Scheme”, in Elsevier Proceedia Computer Science [Web of Science and SCOPUS Indexed], 2016, vol. 89, pp. 170-179.[Abstract]


The core objective of 3GPP Long Term Evolution (LTE) is to provide a secured communication and high data rate for 4G users. Even though 4G network provides security, there are loopholes which lead to several attacks in 4G network. One such attack is desynchronization attack in 3GPP handover key management. This paper deliberates the vulnerability of desynchronization attack that occurs when source acts as rogue base station in 3GPP. In addition, it discusses how this attack jeopardizes the communication in 4G network and subsequently proposes a new scheme to overcome this attack. In the proposed scheme, the target generates its own key rather than using the key generated by source node for future communication with target to achieve a secure communication between the source and target base station in 4G LTE. The proposed scheme is simulated using network simulator 3 (NS-3). The numerical analysis shows that the proposed scheme achieves a significant reduction in the communication cost for key generation and authentication in LTE. © 2016 Elsevier B.V. All rights reserved.

More »»

2015

Conference Paper

Dr. Senthil Kumar M. and Anbarasi, P. N., “A Secure and Efficient Location Update Scheme for Next Generation Proxy Mobile IP in Distributed Environment”, in Procedia Computer Science [Web of Science and SCOPUS Indexed], 2015, vol. 57, pp. 942 - 951.[Abstract]


Usage of wireless networks among the users is apparently high. But, efficiency of the network gets decreased because of the challenges in the network. In proxy mobile IPv6 (PMIPv6), the message exchange for location update by any mobile device is established in centralized environment. Here, the messages are sent and received through local mobility anchor with centralized feature. As a result, there is devastating traffic at local mobility anchor which increases the cost of network. Also, the location update in distributed mobility environment is vulnerable to attacks such as false binding update, man-in-the-middle, replay attack etc. Therefore, the development of location update scheme necessitates the security enhancement and reduction in cost. Hence, the present paper proposes a new secure and efficient location update scheme using tokenization. It eliminates the additional message exchanges such as proxy binding update, binding query and acknowledgements between the hosts required in the earlier works. Here, the traffic overhead is controlled by distributing the token of mobile node with mobile access gateway in distributed mobility environment. The security of the proposed scheme is validated using AVISPA - a security model checker. Finally, the analysis of security and performance evaluation demonstrates that the proposed scheme shows better security and significant reduction in the cost of signaling messages and data packet delivery. © 2015 The Authors. Published by Elsevier B.V.

More »»

2015

Conference Paper

Dr. Senthil Kumar M. and Krishnamoorthy, V., “Security Enhancement of Handover Key Management Based on Media Access Control Address in 4G LTE Networks”, in IEEE International Conference on Computational Intelligence and Computing Research (ICCIC-2015) [Received Best Paper Award, Web of Science and SCOPUS Indexed], Madurai, India, 2015, pp. 1-5.

2014

Conference Paper

Dr. Senthil Kumar M., Aishwarya, M., K. Vaishnavi, S., Sukanya, R., Aiswariya, C., and Dr. Harini N., “An Improved Authentication Scheme Using Colour QR Codes”, in Proceedings of International conference on Adaptive Technologies for Sustainable Growth (ICATS-2014), 2014, pp. 65-72.

2012

Conference Paper

Dr. Senthil Kumar M., Valarmathi, M., and Ramprasath, G., “A secure and efficient registration for IP mobility”, in In Proceedings of First International Conference on Security of Internet of Things (SECURIT-12) [SCOPUS Indexed], 2012, pp. 210-215.[Abstract]


Mobile IP is a protocol, developed by the Mobile IP Internet Engineering Task Force (IETF) working group that allows the delivery of the packets to mobile nodes when they moves to a new network based on its old IP address. Due to the increase of fraudulent activities in the current world, wanted level for the security feature is increased. But usage of security must be provided without compromising the efficiency. In this paper a secure and efficient registration protocol is proposed for IP Mobility, as the security feature adopted is directly proportional to the registration delay time. This protocol provides security between the mobility agents using AES and HMAC algorithm with reduction in registration time. It also secures messages between a mobile node and agents, and analyses the various protocols in the Mobile IP environment with this approach, based on different features. Based on the numerical results, the proposed protocol outfits the existing protocol based on the security issues and registration competency. Here, an attempt has been made to simulate the Mobile IP scenario for the proposed protocol with the use of NS-2 [5] network simulator. Copyright 2012 ACM.

More »»

2009

Conference Paper

Dr. Senthil Kumar M. and Joseph, A., “Video Processing Based Fire Detection Using Statistical Color Model”, in Proceedings of National Conference on Microwave and Optical Communications, Alagappa Chettiyar College of Engineering and Technology, Karaikkudi, India, 2009.

2008

Conference Paper

S. Rathi, Dr. Senthil Kumar M., and Karthick, B. S., “Performance Analysis of Secure Mobile IP Registration protocols”, in Proceedings of National Conference on Innovations in Information Technology [Received Best Paper Award], Karpagam College of Engineering, Coimbatore, India, 2008, pp. 21 - 28.

2008

Conference Paper

Dr. Senthil Kumar M., Karthik, B. S., and Rathi, S., “A Framework for Secure and Efficient Mobile IP Registration”, in Proceedings of National Conference on Innovations in Information Technology, India, 2008, pp. 29 - 35.

Publication Type: Book Chapter

Year of Publication Publication Type Title

2016

Book Chapter

P. N. Anbarasi and Dr. Senthil Kumar M., “A Tokenized Binding Update Scheme for Next Generation Proxy IP Mobility”, in Artificial Intelligence and Evolutionary Computations in Engineering Systems [Web of Science and SCOPUS Indexed], vol. 394, S. Subhransu Dash, Bhaskar, A. M., Panigrahi, K. Bijaya, and Das, S. New Delhi: Springer India, 2016, pp. 193–207.[Abstract]


At present, the users are apparently high for wireless networks. In proxy mobile IPv6, the mobility management among the networks is tedious for the location update of mobile node and the secrecy plays a tremendous role. Here, the messages are exchanged via a localized mobility anchor between the communicants. Consequently, the data traffic is high due to the centralized feature of local mobility anchor. Also there is a single point of failure and increase in the network cost. Therefore, the efficacy of the network is increased by distributing the functionality of local mobility anchor among the mobile access gateways present in the network. However, there are several security challenges such as denial-of-service, man-in-the-middle attack, etc. Thus, the network needs an enhancement for prevention of threat and location update of mobile node. Hence, the presented paper proposes a new tokenized binding update scheme by sharing a routing table. Here, the token of mobile node is incorporated in the routing table and shared among the mobile access gateways. In addition, the proposed scheme decreases the cost of signaling and traffic overhead by eliminating unnecessary queries for binding update and acknowledgment. The security of the scheme is validated using AVISPA—the model checker. From the security and numerical analyses, the proposed scheme shows the enhancement of security and significant reduction in the connection cost and data delivery cost when compared to the existing schemes. © Springer India 2016.

More »»

2015

Book Chapter

Dr. Senthil Kumar M., Valarmathi, M. L., and , “A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Padma Suresh et al, Ed. [Web of Science and SCOPUS Indexed], vol. 324, Springer India, 2015, pp. 423 - 431.[Abstract]


Mobile Internet Protocol version 6 (MIPv6) maintains convergence for communication of mobile technologies with the ability to change their IP address. In MIPv6, a mobile device transmits location update messages which informs the current care-of address to its home agent indirectly, or to correspondent node directly, is termed as binding update. Security issues in MIPv6 are of vital significance, and the binding update messages must be secured against any malicious attacks that might attempt to get unauthorized access from the participating entities. This paper improves binding update scheme using optimal asymmetric encryption, which enhances security without relying on a third party. The proposed scheme achieves mutual authentication between the communicants and significant reduction in computational cost. The scheme is simulated and validated using the security tool AVISPA. Also, mitigation for various malicious attacks, such as replay attack, man-in-the-middle attack, and false binding update attack, have been addressed.

More »»

2014

Book Chapter

Dr. Senthil Kumar M. and Valarmathi, M. L., “An Efficient and Secure Location Update Protocol Using Fractal Based Public keys in Mobile IP Networks”, in Proceedings of Informatics and Communication Technologies for Societal Development, Elijah Blessing Rajsingh et al, Ed., B. Elijah Rajsingh, Bhojan, A., and Peter, D. J. New Delhi: Springer India, 2014, pp. 61–70.[Abstract]


The process of informing the current location of a mobile device to its home network after moving to another network is called a location update or registration in mobile IP networks. This process must be secured as the registration messages can be intercepted and falsified by an intruder. The security provided must also have minimal registration latency, as both are directly proportional. Therefore, it is necessary to design a registration with balanced effort between security and registration latency. Hence, this chapter deals with a new proposal to balance both using fractal-based scheme, which is a substitute to conventional number theory-based schemes. The security properties of the proposed protocol are evaluated and validated using a model checker AVISPA. The performance analysis of the proposed protocol and comparison of numerical results with existing protocols shows that our protocol surpasses the existing protocols in terms of balanced security and registration latency.

More »»
207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
9th
RANK(INDIA):
NIRF 2017
150+
INTERNATIONAL
PARTNERS