Qualification: 
Ph.D
n_radhika@cb.amrita.edu

Dr. N. Radhika has done her Post Doctorate in the Department of Computer Science and Engineering, Indian Institute of Technology, Madras, in the domain of Wireless Sensor Networks (Smart grids), and her Doctorate from Government College of Technology, Coimbatore in the area of Mobile Adhoc Network. She is currently working as Professor in the Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore and also holds the position of Academic Co-ordinator at the School of Engineering, Coimbatore Campus. She has around 60 papers in National, International Journals and Conferences to her credit. Her patent named “Multi secured dropping of spoofed packet at the gateway of unauthorized networks” – is filed and under second stage of evaluation. She is a reviewer of several Scopus indexed journals including Springer. She has received best paper award for her research papers. Her thrust area of research includes Mobile Adhoc networks, Wireless Sensor Networks, Smart Grids and Software Defined Networks. Dr.Radhika is currently guiding B. Tech. and M. Tech. students, as well as Research Scholars in her thrust areas.

Publications

Publication Type: Journal Article

Year of Publication Publication Type Title

2017

Journal Article

Dr. Radhika N. and Menon, D. M., “A secure deep belief network architecture for intrusion detection in smart grid home area network”, IIOAB Journal, vol. 7, pp. 479-483, 2017.[Abstract]


The Deployment of Smart Grid requires consideration of all the security parameters in the entire architecture of Smart Grid. Data Security and Communication Security are the major milestones in security that need to be addressed in the present scenario in Smart Grid. In this paper we model a Deep Belief Network to detect the normal and abnormal behaviors in the traffic pattern of Smart Grid data. Deep belief Network has been deployed to identify the anomalies in the Smart Grid data traffic thereby detecting intrusion .Support Vector Machine has been used for intrusion classification after creating the Deep Belief Network Model. Using SVM model with deep belief networks has helped in reduction of data complexity and also in identifying the core features to be considered for the implementation of Intrusion detection in Smart Grid Model. More »»

2016

Journal Article

V. Manjusha and Dr. Radhika N., “A performance analysis of black hole detection mechanisms in ad HOC networks”, Advances in Intelligent Systems and Computing, vol. 398, pp. 433-443, 2016.[Abstract]


A continuous infrastructure-less, self-configured collection of mobile devices connected as a network without wires is termed as mobile ad hoc network (MANET). Dynamic topology, shared physical medium, and distributed operations are some of the characteristics of MANETs due to which they are highly vulnerable to security threats. Black hole attack is a kind of attack that compromises security by redirecting the entire traffic to a node that is not actually present in the network. This paper aims to detect black hole using three detection schemes, i.e., Time-based threshold detection schemes, DRI table with cross checking scheme, and distributed cooperative mechanism. Comparative analyses on all three schemes are done to find out which one detects black hole more accurately. The measurements are taken on the light of packet delivery ratio, throughput, energy consumption and end-to-end delay. Simulation is performed using Network Simulator-2 (NS2). © Springer India 2016.

More »»

2016

Journal Article

and Dr. Radhika N., “Greedy hop Algorithm for detecting shortest path in vehicular Networks”, International Journal of Control Theory and Applications, vol. 9, pp. 1125-1133, 2016.

2016

Journal Article

H. B. Balakrishnan and Dr. Radhika N., “Performance analysis of range free localization schemes in WSN-a survey”, International Journal of Control Theory and Applications, vol. 9, pp. 5921-5925, 2016.[Abstract]


In order to design an efficient sensor network, localization of nodes is an important aspect. Nodes present in the sensor network need to send and receive data in order to carry out the communication. For the communication to be carried out in an effective manner each and every node should be aware of the location of all the nodes present in the sensor network. Various localization schemes has been devised. In this paper, the comparative analysis of range free localization techniques are studied, discussing about its basic terminology and how the future work could be carried out.

More »»

2015

Journal Article

Ka Vignesh and Dr. Radhika N., “Energy and location aware cluster routing protocol for wireless sensor networks (ELACRP)”, International Journal of Applied Engineering Research, vol. 10, pp. 12733-12744, 2015.[Abstract]


<p>This paper proposes an ensemble protocol called Energy and Location Aware Cluster Routing Protocol (ELACRP) for wireless sensor networks. The location information model and energy consumption model are adapted. The neighbor node election operation is initiated once when the network is deployed. The cluster head selection mechanism is performed based on the residual energy of sensor nodes. The cluster head mechanism chooses the sensor node having maximum residual energy. Clustering is performed based on the nodes location information conceived from the GPS location information. The metrics number of packets delivered to the sink, energy utilization rate, the energy standard deviation and average hops are taken to compare the performance of the ELACRP with AELAR protocol [13]. Simulations are performed using NS2 and the outcome results depicts that the proposed ELACRP performs better than that of AELAR protocol [13] in terms of the chosen performance metrics. © Research India Publications</p>

More »»

2015

Journal Article

S. K. Raj, Thanudas, B., Dr. Radhika N., and Smitha, V. S., “Satellite-TCP: A Flow Control Algorithm for Satellite Network”, Indian Journal of Science and Technology, vol. 8, no. 17, 2015.[Abstract]


Objective: In this world of advanced technology, satellite communication is the basis for all data communications. TCP was designed to be flexible and robust but it cannot perform efficiently over the satellite links with long delay. The major objective of our work is to propose a novel flow control algorithm for satellite network to prevent the heavy degradation in the network performance due to long propagation delay, high bit error rate and bandwidth asymmetry. Methods: A strong flow control mechanism is necessary to eliminate the network performance degradation due to the satellite link characteristics like long propagation delay, high bit error rate and bandwidth asymmetry. Satellite-TCP is a flow control mechanism based on the negative acknowledgement strategy and connection splitting. The satellite link utilization is monitored and the active connections are assigned with the window values. The window values were considered as it can easily reflect the available bandwidth in the satellite links. Findings: The major problems affecting the performance in satellite links are long propagation delay, high bit error rate and bandwidth asymmetry. The proposed Flow Control Algorithm called Satellite-TCP is based on controlling the flow of Negative Acknowledgement packets (NACK), according to the level of congestion at the network. The two main modules in the proposed system include an enhanced TCP flow control mechanism and a data loss recovery mechanism. Among this the flow control is based on link utilization measurements and throughput calculation techniques. Data loss recovery strategy is based on Negative Acknowledgements coming from the receiver side. In this way, we can decrease the amount of packet loss in the network and even eliminate the packet loss, sometimes. Satellite-TCP adopts a window growth strategy to accelerate the speed of increase in the size of congestion window. The flow control mechanism not only enhanced the throughput of forward link but also greatly reduced the bandwidth occupancy rate in back-ward link in the satellite network. This in turn increases the overall performance of the satellite link. Improvements: If we add a priority based strategy to the new flow control mechanism, it can judge the network performance according to the data loss. Moreover we are expecting that, if we add a priority bit based strategy to the new flow control mechanism, it will help to distinguish the specific reasons for data loss and can take corresponding flow control strategies. While considering the throughput and loss rate, Satellite –TCP is showing excellent performance in the case of forward link but it performs poor in the case of backward link. So we are planning to extend our work in such a way that it will perform well in the case of backward link also. More »»

2015

Journal Article

K. Sheetal, Menon, D. M., and Dr. Radhika N., “Design of secure smart grid Architecture model using Damgardjurik cryptosystems”, Research Journal of Applied Sciences, Engineering and Technology, vol. 9, no. 10, pp. 895-901, 2015.[Abstract]


Smart grid is a paradigm shift from the traditional Power grid which promises to make the electric grid both energy efficient and Fault tolerant. Trade-off between Energy savings and Security is a critical issue in Smart grid architecture. Smart grid architecture requires a high level secure data exchanges between sensors like Phasor Measurement Units and Advanced Metering Infrastructures like Smart Meters. In this study a Secure Smart grid Architecture model is proposed for the Smart grid network. Initially DamgardJurik encryption algorithm is applied on the data from the Phasor Measurement Units and a digital signature is then attached to the encrypted text to provide further authentication. The digitally signed data is collected in Data centre where it is decrypted. The proposed architecture has been implemented in both software and hardware. The effectiveness of the system is verified by introducing an intruder in hardware implementation

More »»

2015

Journal Article

V. K. and Dr. Radhika N., “An Improved role based trust management system based on Artificial bee Algorithms in wireless Networks,”, International journal of Applied sciences , Engineering and Technology, vol. 10, pp. 1175-1184, 2015.[Abstract]


The aim of this research study is to propose an improved role based trust management system for wireless
sensor networks. The objective is attained using an interactive artificial bee colony algorithm which is used for path
optimization. Also the purpose is to guarantee to provide robust and trustworthiness among the clusters formed in the wireless sensor network. The reputation among the sensor nodes is assured using the trust model. One of the main concerns of WSN, that have attracted research scholars, is the property to guarantee a less amount of security in a limited environment. Trust among the communicative nodes is one of the major issues that have to be given importance in wireless sensor network. A number of research works have concentrated on only Trust Management (TM) techniques without considering their roles. Existing trust management schemes do not provide significant reliability in all environments. In order to overcome these issues, Role Trust (RT) framework is presented, to select role for each nodes representing policies in a distributed authorized environment. RT integrates the features of rolebased access control and TM schemes. This feature is particularly applicable for attribute based access control. Role trust management schemes generate rules, identify and assure roles based on the rules generation process and then clusters are identified for each trust model. Along with the trust model, this study focuses on efficient data path with
reduced data loss. Hence, this study presents a novel Swarm Intelligence based Role Trust and Reputation Model (SIRTRM) to provide trust and reputation in WSNs. Simulations are carried out in NS2 environment and the results portrays the accuracy, robustness and lightness of the proposed model.

More »»

2015

Journal Article

V. V.V., Dr. Radhika N., and Vanitha, V., “Intruder Detection and Prevention in a Smart Grid Communication System”, ICSGT 2015 Procedia Technology, vol. 21, pp. 393 - 399, 2015.[Abstract]


Abstract Smart Grid is an electrical network that uses digital and other advanced technology to monitor and manage the transport of electricity from all generating sources to meet the varying demand of the end-users. The important nodes of the Smart Grid are the phasor measurement unit(PMU),Smart meter(SM) and phasor data concentrator(PDC). All PMU's within substation will form a communication network with a gate-way node called phasor data concentrator which updates data from PMU's within the cluster range. Proper management of data exchange between PMU's and PDC's are an essential thing to meet in the concept of Smart Grid. In this paper we are considering \{PMU\} as a sensor node and \{PDC\} as a central node and the data is exchanged between this nodes. Proposed intrusion detection algorithm, Packet loss avoidance using Time Division Multiple Access (TDMA) protocol and security algorithm improves system security in response to malicious attacks. Network simulator \{NS2\} is used to create simulation scenario for detecting attacks. Hardware is tested using \{LPC2148\} microcontrollers and Zigbee.

More »»

2015

Journal Article

G. N., V.V., V., and Dr. Radhika N., “A Novel Approach in Demand Side Management for Smart Home”, ICSGT 2015 Procedia Technology, vol. 21, pp. 526 - 532, 2015.[Abstract]


Abstract The development of smart grid technology acts as new brain to the power generation and distribution network. Through this technology, the network is not only going to get integrated and turn communicable all over the country but also the demand will be monitored by the control centers and at peak time the usage of electricity is going to cost higher than the nominal rate with intimation given to the customer through sms and mail. Hence it's time for the consumers to act smart or else they will end up receiving highly billed statements. This project presents an idea of having a power hub which has control over all the loads individually. The hub detects the peak time demand and reduces the load usage by switching off unwanted loads with a priority that is being set by the consumer based on game theory's algorithm which schedules load usage by creating several possible schedule vector for consumers such that demand is never raised. This could be done both individually and among multiple users of a community or area. The power hub can also monitor our energy usage and creates an order of importance among the loads, thus providing intelligence to the consumers.

More »»

2015

Journal Article

A. Devi T. Amma, Dr. Radhika N., and Pramod, V. R., “Major Cloud Computing Threats-An ISM Approach”, International Journal of Applied Engineering Research, vol. 10, pp. 36895-36899, 2015.[Abstract]


Cloud services enable continent on demand network access to a shared pool of configurable computing resources. Data migration within cloud is complicated. Cloud computing strategy is subjected to many threats. This paper deals with the deployment of Interpretive Structural Modeling (ISM) to model the interrelationships among the major threads of cloud computing. The model is made based on SSIM, initial reachability matrix and final reachability matrix Major threats are classified into four clusters.ISM diagraph is constructed. Interpretive structural model of the threads are also constructed. More »»

2014

Journal Article

V. Sureshkumar, T. Reddy, S., Malepati, A., and Dr. Radhika N., “A query adaptive fuzzy based dynamic sampling algorithm to manage power consumption in wireless sensor networks”, International Journal of Applied Engineering Research, vol. 9, pp. 4283-4296, 2014.[Abstract]


<p>Wireless sensor networks (WSNs) have received a great deal of researcher's attention in recent years due to its wide applications. These low-powered sensing devices are to be deployed densely and randomly in application environment. Since nodes are powered by batteries, the lifetime of the sensor node is strongly dependent on its battery lifetime. Hence energy saving in sensor nodes has received great amount of interest, thereby increasing the lifetime of the nodes. This paper includes various approaches to solve the drawbacks of SMAC and also to optimize the energy consumption of sensor nodes. This could be achieved by using dynamic sampling algorithm based on the application of the sensor nodes. This proposed algorithm reduces the energy consumption in S-MAC by addressing to its problem which indirectly increases the lifetime of sensor nodes. © Research India Publications.</p>

More »»

2014

Journal Article

V. Sureshkumar and Dr. Radhika N., “Energy Efficient Mobility Prediction Based Localization Algorithm for Mobile Sensor Networks”, Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 4, pp. 571-577, 2014.[Abstract]


Aim of study is to develop energy efficient mobility prediction based localization algorithm for mobile sensor networks. Mobile sensors are being deployed in the environment like underwater sea monitoring, where they can move to any location to meet coverage requirements. Sensor networks choose to follow data centric approach to track the exact location of the nodes. Location information should be identified for application tasks and network operations. Novel localization algorithms need to be developed for mobile sensor networks with high accuracy and minimal energy consumption. The proposed localization algorithm for mobile sensor networks uses the mobility prediction localization and Mobility Prediction Localization (MPL) algorithm with Maximum Likelihood Estimation (MLE) technique for low and high accuracy respectively. The performance analysis shows that proposed MPL and MPL along with MLE achieve accuracy above 95.5% in the simulated environment. This study also analyses the number of anchor nodes to be deployed to achieve desired level of accuracy. The proposed algorithm uses minimal number of nodes for tracking while rest are in sleep mode for energy saving, thereby increasing lifetime of the nodes.

More »»

2014

Journal Article

Dr. Radhika N. and K Raj, S., “Link Failure Localization in All-Optical Network”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 5, 2014.

2014

Journal Article

Dr. Radhika N. and Thejiya, V., “Trust based Solution for Mobile Ad-hoc Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, 2014.

2014

Journal Article

Dr. Radhika N. and Pramod, V. R., “Modeling Structural Behaviour of Inhibitors of Cloud Computing: A TISM Approach”, Transactions on Networks and Communications, vol. 2, no. 5, pp. 60–74, 2014.[Abstract]


Cloud computing is the delivery of computer resources over a network through web browsers, while the actual physical location and organization of the equipment hosting these resources are hidden from the users. Some of the IT organizations are undergoing severe budgetary constraints depends on clouds for the infrastructure and services. The major attributes of cloud computing are multitenency, massive scalability, elasticity, pay as you use and self provisioning of resources of the cloud. Cloud computing strategy is subjected to many inhibitors. For finding the interrelationship among inhibitors ISM (interpretive structural modeling) is used which a well is proved technology for finding the interrelationship among elements. An innovative version of interpretive structural model is known as Total Interpretive Structural Model (TISM). In Total Interpretive Structural Modeling (TISM), influence/enhancement of inhibitors and their interrelationship is considered. Total interpretive structural model consists of the following steps. They are identification of elements, pair-wise comparison, level partition, interaction formation, diagraph representation and diagrammatic representation of total interpretive structural model. The methodology of TISM is used to delineate the hierarchical relationship of inhibitors of cloud computing.

More »»

2014

Journal Article

A. Ambikadevi, Dr. Radhika N., and V.R., P., “FISM and FMICMAC analysis on enablers of cloud computing”, International journal of computer Applications, vol. 91, pp. 9-16, 2014.[Abstract]


Cloud computing is an automatic multitenant pay-as-you go service accessed through web browsers. . The main services of cloud computing are software as a service, infrastructure as a service and platform as a service. These services are very much helpful and beneficial to IT organizations undergoing severe budgetary constraints. In this paper the major enablers of cloud computing services are taken by discussing with experts and through literature survey. An interrelation ship among the enablers are done with FISM(Fuzzy Interpretive Structural Modeling and FMICMAC(Fuzzy MICMAC) analysis. An initial reachability set is constructed from structural self interaction matrix (SSIM) and final reachability set by considering a scale 0-1 instead of binary condition. Enablers chosen are classified into four clusters based on their driving power and dependence power. From MATLAB FISM model is derived. This paper highlights the most sensitive enablers of cloud computing services.

More »»

2014

Journal Article

V. M. M.R.M. and Dr. Radhika N., “A smart E-learning for social Networking”, International Journal of Electrical and Computer Engineering, vol. 4, pp. 447-455, 2014.[Abstract]


With the development of Cloud Computing, the popularity of E learning, the increasing of social networking services, Smart Cloud E-Learning System with Social Networking has become a research topic. The characteristics of E learning and requirements of Social networking services in environments raise a challenge on building an Architecture and Implementation quite strong. In this paper, we elaborate a Smart Cloud E-Learning System with Social Networking based on architecture level of social networking and E learning cloud system to support E learning interactions in worldwide environments. A prototype of Cloud E-Learning System with Social Networking is developed on cloud, and several applications features are described based on the proposed architecture to demonstrate the effectiveness
of the architecture.

More »»

2013

Journal Article

R. Iyer Natarajan and Dr. Radhika N., “A study on the benefits of dynamics switching between Adhoc routing protocols”, International journal of Advances in Engineering Research, vol. 3, no. 10, 2013.

2013

Journal Article

A. Ambikadevi, Pramod, V. R., and Dr. Radhika N., “Modeling the interrelationship between the enablers of cloud computing”, International Journal of computer Applications, vol. 67, 2013.

2013

Journal Article

A. Devi Amma. T, R, P. V., and Dr. Radhika N., “MCDM Approach for the Adoption of Best Cloud”, International Journal of Computer Applications, vol. 63, pp. 20-26, 2013.[Abstract]


ANP is a powerful tool in multi-criteria decision making. In this research, the performances of public cloud, private cloud and hybrid clouds are analyzed. This tool is used to encapsulate the interdependences in different level of decision attribute. The decision problem is structured in a hierarchical manner and the enablers, determinants and dimensions are linked with the alternatives. The current study is based on the adoption of the best cloud computing i. e. Public cloud, private cloud and hybrid cloud. Based on the literature survey the determinants, dimensions and enablers have been derived. Super matrices have been formed and then the overall weighted effectiveness of cloud computing has been found out, which will give an indication of the performances of the cloud computing. Overall weighted effectiveness was highest for public cloud and then hybrid cloud followed by private cloud

More »»

2013

Journal Article

V. Vanitha, Dr. Radhika N., and Mohan, M., “Implementation of Network Coded Wireless Transmission Scheme for Smart Grids Applications”, International journal on innovative research in electrical, electronics, instrumentation and control engineering, vol. 1, no. 7, 2013.[Abstract]


Network Coding' is the proven technology used in internet data transfer and satellite communications, which can use the available bandwidth to the maximum as well as ensure data security. In this paper, the concepts of Network Coding is implemented and tested for Smart Grid applications using the wireless protocols namely Zigbee, Bluetooth and Wifi. The performance parameters were studied for each protocol by transmitting multiple data packets stored in a database.
Further, an algorithm is developed to run at the destination end which determines, from the data it has received, whether the load demand exceeds the generation or there is a surplus of generated power available. This was demonstrated using Wi-Fi protocol.

More »»

2013

Journal Article

A. Ambikadevi, Dr. Radhika N., and V.R., P., “Synergic impact of inhibitors of cloud computing - FISM and FMICMAC Approach”, International journal of Computer Applications, vol. 87, pp. 24-79, 2013.[Abstract]


Cloud services enable continent on demand network access to a shared pool of configurable computing resources. Data migration within cloud is complicated. Cloud computing strategy is subjected to many inhibitors. This paper deals with the deployment of Fuzzy Interpretive Structural Modeling (FISM) to model the interrelationships among the inhibitors of cloud computing. The model is made based on SSIM, Fuzzy initial reachability matrix, fuzzy final reachability matrix and stagnation matrix. From MICMAC analysis the most sensitive inhibitors are identified.

More »»

2012

Journal Article

A. Ambikadevi, Pramod, V. R., and Dr. Radhika N., “ISM for analysing the interrelationship between the inhibitors of cloud computing”, International journal of computer applications in engineering services, vol. 2, no. 3, 2012.[Abstract]


Interpretive structural model (ISM) is well proven for establishing the interrelationship between the variables influencing the system. The strategy of clouding
is subjected to many inhibitors. This paper deals with the deployment of ISM to model the interrelationships between the inhibitors of cloud computing. The model is
made which is based on SSIM, initial reachability matrix, final reachability matrix and diagraph. Finally the Inhibitors are classified into four clusters based on their
driving power and dependence. In this way action plan has been formulated for mitigating the most sensitive inhibitors.

More »»

2011

Journal Article

Dr. Radhika N. and Antony, T., “Image Denoising Techniques Preserving Edges”, ACEEE Int. J. on Information Technology, vol. 1, 2011.[Abstract]


The objective of this work is to propose an image denoising technique and compare it with image denoising using ridgelets. The proposed method uses slantlet and transform instead of wavelets in ridgelet transform. Experimental result shows that the proposed method is more effective than ridgelets in noise removal. The proposed method is effective in compressing images while preserving edges. Index Terms—ridgelet, slantlet transform, image denoising, compression, huffman, edge. More »»

2009

Journal Article

Dr. Radhika N., Anand, V., and Arumugam, S., “A Cross-Layer Context Aware Middleware Architecture for Ad Hoc Wireless Networks”, CIIT International Journal of Wireless Communication, vol. 1, pp. 1–7, 2009.[Abstract]


Is work we design a reflective context aware middleware for interoperability of protocols in adhoc smart spaces. The middleware is termed reflective since many context and services may be added to it simultaneously at any instant of time. Context typically refers to three different aspects – the environment, activity and location of the user. The profile of the user is sensed by sensor nodes, and depending on the profile appropriate services are offered to the user. Smart spaces may consist of various heterogeneous mobile devices, sensors, atteuators, smart and dummy nodes. The context aware middleware is designed in the middleware layer – a new layer between the routing and the transport layer. All the nodes in the smart space are mobile and the middleware provides the functionality of interoperability. Seamless interoperability is obtained among the service discovery protocols in the middleware. The service discovery protocols considered in our work are Pervasive Discovery Protocol (PDP), Service Location Protocol (SLP) and the Universal plug and play Protocols (UPnP). Our middleware design is efficient since it does not use any interfaces or plug-ins. Interoperation makes all services in different smart spaces available seamlessly to the user irrespective of the location. The middleware can serve multiple users simultaneously on varying and fixed context at the same time. To test the feasibility and efficiency of our proposed design, we simulate the middleware and its various components in a mobile adhoc environment under various network conditions using the network simulator NS-2. More »»

2008

Journal Article

Dr. Radhika N. and S., A., “Mobile Dynamic Reconfigurable Context Aware Middleware for Adhoc Smart Spaces”, Academic Open Internet Journal, vol. 22, 2008.[Abstract]


The aim of our paper is to design a mobile dynamic middleware for protocol interoperability in adhoc smart spaces. Smart spaces are composed of mobile devices, sensors, attenuators, both smart and dummy nodes and other wireless devices. The Protocols considered are service discovery protocols that seamlessly interoperate in the middleware. The purpose of interoperation is to make all the services on different smart spaces available to the user. The system considered here is a personalized system where the profile of the user is analyzed. and the request is seamlessly flooded in to the middleware. Among the available service the best matching service depending on the context of the user gets seamlessly adapted to the device of the user. The middleware has the feature to serve multiple users simultaneously on varying as well as on fixed context at the same time. The Middleware is termed mobile Adhoc as it is not attached to any infrastructure and is movable. More »»

Publication Type: Conference Paper

Year of Publication Publication Type Title

2016

Conference Paper

D. M. Menon and Dr. Radhika N., “Anomaly detection in smart grid traffic data for home area network”, in 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2016.[Abstract]


Strengthening of Smart Grid functionalities has become the need of the 21st Century. Security evolves to be the primary concern at the deployment level of Smart Grids. Cyber security threats and vulnerabilities in Smart grid Network needs to be addressed before the deployment of the Smart Grid. Our proposed intrusion detection scheme identifies anomalies in the Smart Grid traffic and detects attacks like flooding which causes Denial of Service in Smart Grid Networks. This paper applies k-Means algorithm for clustering of traffic data and outlier detection for the data transmitted between utility Centre and the Smart Homes. Performance of the algorithm has been compared with other clustering algorithms and the results were found to have higher percentage in anomaly detection. More »»

2015

Conference Paper

M. R. M. Veeramanickam and Dr. Radhika N., “A study on educational games application model in E-learning cloud system”, in 2014 International Conference on Information Communication and Embedded Systems, ICICES 2014, S.A.Engineering College Chennai ,India, 2015.[Abstract]


Professional students are having experience of what they find more enjoyable in using Android games using internet and how they are learning through various application gives valuable information for the design of new model intended for them. In this paper, we explore new concept consist of games application design model in E-learning cloud using Cloud as a medium to reach end user students. What will be outcomes in regard to the user interface and contents of the learning environments under E-learning cloud development. In Addition, we present importance related to designing new Games application model in E-learning cloud through Simulation. So, we need to focus on what we want them to learn through games application. This gives is main concept of games application design model. © 2014 IEEE.

More »»

2015

Conference Paper

M. Divya M. and Dr. Radhika N., “Design of secure Multilevel Architecture for last Mile communication in smart grid systems”, in ICSGT, 2015.

2015

Conference Paper

A. Athavan and Dr. Radhika N., “Memory optimized lifetime vehicle data acquisition framework”, in 2015 International Conference on Computing and Network Communications, CoCoNet 2015, 2015, pp. 602-606.[Abstract]


Data acquisition is done from road vehicles by many service providers for delivering various services to the end user. Apart from this, car manufacturers also collect a fair share of data which allows them to design better components and robust systems in future. But, the lifetime data acquisition, storage and processing leads to huge costs and lot of resources. Existing data collection procedure in road vehicles has limitations like huge memory requirements to store such volume of data, delay in accessing the data from vehicle for analysis and etc. Although remote connectivity and cloud storage facilities look promising, the transfer of large volume of data from vehicle to cloud storage is still a challenge. This paper describes a life-time data acquisition and storage framework for automobiles with reduced memory consumption and with possibility of quick access to data for analysis. The framework is tested using a sample application which collects lifetime data from OBD Socket of a car and stores it at a remote storage space. From this sample application, the memory requirements & efficiency of system are analyzed, compared with existing system and proven to be effective. © 2015 IEEE.

More »»

2011

Conference Paper

Dr. Radhika N., Chithra, K. Rb, Jacob, Ab, and Anjitha, Sb, “QoS based performance analysis of VoWLAN for emergency calls using qualnet”, in ACM digital lib, ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief, Amritapuri, 2011, pp. 527-530.[Abstract]


Voice over WLAN (VoWLAN) has been emerging as an infrastructure to provide low-cost wireless voice services. Reaping the profits of voice over WLAN, we can enhance the underlying technologies behind emergency call to improve the QoS parameters. Nowadays, the researchers have been focusing to bring in new technologies like VoIP for variety of applications. Healthcare is one of the major area where emergency calls are extensively required. Hospitals are one of the first users of VoWLAN solutions, mainly because of the significant need for effective communication among high-valued medical staff. In case of a medical emergency, VoWLAN can mean the difference between life and death. The emphasize of the paper is to analyze the resource and cost effective utilization of VoWLAN, particularly for reduced delay based emergency call routing. More »»

2011

Conference Paper

Dr. Radhika N., Sivalingam, Kb, and Anand, Vc, “Network architecture for smart grids”, in 2011 International Conference on Computer, Communication and Electrical Technology, ICCCET 2011, Maruthakulam , National college of Engineering, Tirunelveli , 2011, pp. 24-26.[Abstract]


Smart grid is designed to make the existing power grid system function spontaneously and independently without human intervention. Sensors are deployed to detect faults in the flow of power. In the proposed work, smart monitoring and controls are done by intelligent electronic devices. IED's (Intelligent electronic devices) monitors and records the value of power generated, and its corresponding voltage and frequency, which in turn is fed in to the demand-supply chain. Network architecture is designed to determine the flow of power from the generation end to the consumers. Demand-supply curve is embedded in architecture to map the power generated with the supply. If the demand at a particular instant of time is higher than the supply, then tariff is fixed and warning is given to the users regarding the rate of payment, to meet the higher tariff. Trust based authencity is provided for security. © 2011 IEEE. More »»

2010

Conference Paper

Dr. Radhika N. and Vishal, A., “A Novel Dynamic Context Aware Middleware for Efficient Service Delivery in Heterogeneous Mobile Environments”, in IEEE International Conference, ACEEE, 2010.

Publication Type: Conference Proceedings

Year of Publication Publication Type Title

2012

Conference Proceedings

S. Nithin, Dr. Radhika N., and Dr. Vanitha V., “Smart grid test bed based on GSM”, Procedia Engineering, vol. 30. Elsevier Science direct, Coimbatore, pp. 258-265, 2012.[Abstract]


<p>Modern world demands for more and more electric power, but there is a limit for which nature can provide us. In order to meet the growing demand for energy, we need to find new resources and allocate them efficiently. This is where the concept of smart grid comes into picture. Smart grid consists of a power grid with both renewable and non renewable sources of energy like thermal, hydro, wind turbines and nuclear reactors. It is the duty of the smart grid to reduce losses, and thereby meet the demand in a more efficient way. Smart grid will be an automated grid, which can route the power from different generating stations based on the demand schedule. The evolution into the smart grid is not an easy task. It needs innovation in various aspects like real time demand scheduling, fault detection and self healing. Smart grid will have a sophisticated information network, which is separate from the power lines. This paper presents a smart grid test bed based on GSM technology which is capable of load management, fault detection and self healing. The test bed system consists of automated power switches, smart meters, energy sources and load. The communication for the system is achieved through GSM modules. This test bed will allow the implementation of various protocols and methodologies, which could be used for researching the problems in smart grid.</p>

More »»

Lecture Series

Mr. S. Nithin and Dr. N. Radhika, “Centralized Control Station for Smart Grid Test Bed based on Windows Embedded XP 2007 and Ebox 4861S", the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering series, Vol.0117. [Scopus Indexed]

Patent Filed

Multi secured dropping of spoofed packets at the gateway for unauthorized networks with number 1855/CHE/2010.   Awaiting second stage of Experimental Review this year.

207
PROGRAMS
OFFERED
5
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS