Qualification: 
Ph.D, MS, B-Tech
srirams@am.amrita.edu

Dr. Sriram Sankaran currently serves as an Assistant Professor at the Center for Cybersecurity Systems and Networks at Amrita Vishwa Vidyapeetham, India. He obtained M. S and Ph. D degrees in Computer Science and Engineering at the University at Buffalo, The State University of New York, USA. Previously, he received B. Tech (Hons) in Computer Science and Engineering from Malaviya National Institute of Technology, Jaipur formerly known as Regional Engineering College

 

 

Publications

Publication Type: Conference Proceedings

Year of Conference Publication Type Title

2018

Conference Proceedings

J. J and Sankaran, S., “Towards a Decision-Centric approach for securing Cyber Physical Systems”, 10th International Conference on Communication Systems and Networks (COMSNETS) 2018. p. 500‐502, 2018.

2018

Conference Proceedings

S. Sankaran, Sanju, S., and Dr. Krishnashree Achuthan, “Towards Realistic Energy Profiling of Blockchains for securing Internet of Things”, IEEE International Conference on Distributed Computing Systems (ICDCS) 2018. pp. 1454-1459, 2018.[Abstract]


Internet of Things (IoTs) offers a plethora of opportunities for remote monitoring and communication of everyday objects known as things with applications in numerous domains. The advent of blockchains can be a significant enabler for IoTs towards conducting and verifying transactions in a secure manner. However, applying blockchains to IoTs is challenging due to the resource constrained nature of the embedded devices coupled with significant delay incurred in processing and verifying transactions in the blockchain. Thus there exists a need for profiling the energy consumption of blockchains for securing IoTs and analyzing energy-performance trade-offs. Towards this goal, we profile the impact of workloads based on Smart Contracts and further quantify the power consumed by different operations performed by the devices on the Ethereum platform. In contrast to existing approaches that are focused on performance, we characterize performance and energy consumption for real workloads and analyse energy-performance trade-offs. Our proposed methodology is generic in that it can be applied to other platforms. The insights obtained from the study can be used to develop secure protocols for IoTs using blockchains.

More »»

2018

Conference Proceedings

S. Roy, Sankaran, S., Singh, P., and Sridhar, R., “Modeling Context-Adaptive Energy-Aware Security in Mobile Devices (Accepted)”, 43rd Conference on Local Computer Networks Workshops (LCN Workshops). 2018.

2018

Conference Proceedings

S. Sankaran and Gupta, M., “Towards a Hybrid Model for CPU Usage Prediction of Smartphone Users(Accepted)”, International Conference on Advanced Computing and Communications (ADCOM) 2018 . 2018.

2018

Conference Proceedings

S. Roy, Sankaran, S., Singh, P., Sridhar, R., and , “CONTEXT-SEC: Balancing Energy Consumption and Security of Mobile Devices (Accepted) ”, 2018 Ninth International Green and Sustainable Computing (IGSC) Workshops. 2018.

2017

Conference Proceedings

A. Raj, Jithish, J., and Sankaran, S., “Modelling The Impact Of Code Obfuscation On Energy Usage”, CEUR Workshop Proceedings, vol. 1819. CEUR-WS, 2017.[Abstract]


Advancements in computing and communication technologies have given rise to low-cost embedded devices with applications in diverse domains such as Smarthome, industrial automation, healthcare, transportation etc. These devices are power-constrained which emphasizes the need for lightweight security solutions. Code obfuscation has been demonstrated to provide time-limited protection of source code from inference or tampering attacks. However, size of the obfuscated code increases with increase in code size which can have a negative impact on energy consumption. In particular, different transformations of the source code result in varying amounts of energy consumption for embedded devices. In this work, we model the impact of algorithms for code obfuscation on energy usage for embedded devices and analyze the energy-security-performance trade-offs. The insights from our analysis can be used to develop techniques depending on the needs of the applications thus facilitating efficient energy usage. Copyright ©2017 for the individual papers by the papers' authors.

More »»
PDF iconModeling-the-Impact-of-Code-Obfuscation-on-Energy-Usage.pdf

2017

Conference Proceedings

J. J and Sankaran, S., “A Neuro-Fuzzy Approach for Domestic Water Usage Prediction”, Proceedings of IEEE Region 10 Symposium (TENSYMP). 2017.

2017

Conference Proceedings

J. Jithish and Sankaran, S., “A Rule-Based System for Smart Home Energy Prediction”, Development Aspects of Intelligent Systems (DIAS) co-located with Innovations in Software Engineering 2017. 2017.

2017

Conference Proceedings

J. Jithish and Sankaran, S., “Securing networked control systems: Modeling attacks and defenses”, 2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). IEEE, Bangalore, India, 2017.[Abstract]


Networked Control Systems (NCS) have emerged as a viable solution to effectively manage critical infrastructures in smart cities and modern industrial settings. The networked architecture of NCS that facilitates the communication between its distributed components makes them vulnerable to cyber attacks. The vulnerabilities in the communication network coupled with safety critical nature of data necessitates the need to develop models to analyze the impact of cyber attacks on system stability and performance. In this work, we develop an analytical model for Denial of Service (DoS) and Deception attacks in NCS. Based on the insights from the model, we propose a mechanism based on symmetric key encryption to secure NCS from such attacks. The comparison of our security mechanism with the standard reference signal demonstrates that our approach is successful in securing the NCS with minimal performance overhead.

More »»

2017

Conference Proceedings

A. Rajan, Jithish, J., and Sankaran, S., “Sybil attack in IOT: Modelling and defenses”, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, Udupi, India, 2017.[Abstract]


Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact on performance. We also develop a defense mechanism based on behavioural profiling of nodes. We develop an enhanced AODV (EAODV) protocol by using the behaviour approach to obtain the optimal routes. In EAODV, the routes are selected based on the trust value and hop count. Sybil nodes are identified and discarded based on the feedback from neighbouring nodes. Evaluation of our protocol in ns-2 simulator demonstrates the effectiveness of our approach in identifying and detecting sybil nodes in IoT network.

More »»

2017

Conference Proceedings

T. V. Ram and Sankaran, S., “Towards policy-driven power management for cloud computing”, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, Bhubaneswar, India, 2017.[Abstract]


Cloud computing enables users to rent computing resources on-demand towards meeting the needs of diverse applications. However, scaling of resources may incur significant impact on performance and power consumption which are the two key concerns for cloud service providers. The major goal of cloud providers is to develop policies for balancing the conflicting objectives of maximizing performance and minimizing energy consumption. Towards this goal, we analyze the impact of scale-up and scale-out techniques for varying cloud workloads through an OpenStack implementation. Our analysis reveals that these techniques vary with the nature of applications that run on the cloud as a result of which policies need to be developed on a per-application basis. We develop a threshold-based policy which determines the optimal trade-off depending on the application profile. Our proposed policy is generic and can be applied to other workloads thus facilitating efficient management of resources.

More »»

2017

Conference Proceedings

S. Sankaran and Gupta, M., “Towards Modeling Vehicular Networks with Power-Performance trade-offs”, IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS) . 2017.

2017

Conference Proceedings

S. Anil Kumar, J, J., and Sankaran, S., “Towards efficient resource provisioning in Vehicular Networks”, IEEE Biennial International Conference on Technological Advancements in Power & Energy (TAPEnergy) 2017. 2017.

2016

Conference Proceedings

S. Sankaran, “Predictive Modeling based Power Estimation for Embedded Multicore Systems”, ACM International Conference on Computing Frontiers (CF). ACM Digital Library, Como, Italy, pp. 370-375, 2016.[Abstract]


The increasing number of cores in embedded devices results in improved performance compared to single-core systems. Further, the unique characteristics of these systems provide numerous opportunities for power management which require models for power estimation. In this work, a statistical approach that models the impact of the individual cores and memory hierarchy on overall power consumed by Chip Multiprocessors is developed using Performance Counters. In particular, we construct a per-core based power model using SPLASH2 benchmarks by leveraging concurrency for multicore systems. Our model is simple and technology independent and as a result executes faster incurring lesser overhead. Evaluation of the model shows a strong correlation between core-level activity and power consumption and that the model predicts power consumption for newer observations with minimal errors. In addition, we discuss a few applications where the model can be utilized towards estimating power consumption.

More »»
PDF iconPredictive-Modeling-based-Power-Estimation-for-Embedded-Multicore-Systems.pdf

2016

Conference Proceedings

S. Sankaran, “Lightweight Security Framework For IoTs Using Identity Based Cryptography”, International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, Jaipur, India, 2016.[Abstract]


Internet of Things (IoTs) is gaining increasing significance due to real-time communication and decision making capabilities of sensors integrated into everyday objects. Securing IoTs is one of the foremost concerns due to the ubiquitous nature of the sensors coupled with the increasing sensitivity of user data. Further, power-constrained nature of the IoTs emphasizes the need for lightweight security that can tailor to the stringent resource requirements of the sensors. In this work, we propose a lighweight security framework for IoTs using Identity based Cryptography. In particular, we develop a hierarchical security architecture for IoTs and further develop protocols for secure communication in IoTs using identity based cryptography. Our proposed mechanism has been evaluated using simulations conducted using Contiki and RELIC. Evaluation shows that our proposed mechanism is lightweight incurring lesser overhead and thus can be applied in IoTs.

More »»
PDF iconLightweight-Security-Framework-For-IoTs-Using-Identity-Based-Cryptography.pdf

2016

Conference Proceedings

S. Sankaran, “Modeling the Performance of IoT Networks”, IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS). IEEE, Bangalore, India, 2016.[Abstract]


Internet of Things (IoTs) is gaining increasing significance due to real-time communication and decision making capabilities of sensors integrated into everyday objects. Predicting performance in IoTs is critical for detecting performance bottlenecks, designing optimal sleep/wake-up schedules and application-aware performance tuning. However, performance prediction becomes a significant challenge in IoTs due to varying needs of applications coupled with the resource constrained nature of sensors. In this work, we analyze the impact of factors affecting performance in IoT networks using simulation based models. Further, an analytical framework is developed to model the impact of individual node behavior on overall performance using Markov chains. In particular, we derive steady state transition probabilities of transmit and receive states using protocol execution traces and further utilize them towards predicting per-flow throughput. Our proposed model is generic in that it can be applied across domains. Accuracy of the model is evaluated by comparing the predictions with the actual estimates obtained using simulations.

More »»
PDF iconModeling-the-Performance-of-IoT-Networks.pdf

2015

Conference Proceedings

S. Sankaran and Sridhar, R., “Modeling and Analysis of Routing for IoT Networks”, International Conference on Computing and Network Communications (CoCoNet). IEEE, Trivandrum, India, 2015.[Abstract]


Internet of Things (IoTs) is gaining increasing significance due to real-time communication and decision making capabilties of sensors integrated into everyday objects. IoTs are power and bandwidth-constrained with applications in smarthome, healthcare, transportation and industrial domains. Routing bears significant importance in IoTs where sensors acting as hosts deliver data to the gateways which in turn impacts power consumption. Thus there exists a need for modeling and analysis of routing in IoT networks towards predicting power consumption. In this work, we develop an analytical model of a naive flooding based routing protocol using Markov chains. In particular, we derive steady state transition probabilities of transmit and receive states using protocol execution traces and further utilize them towards predicting power consumption. Our approach to modeling is generic in that it can be applied to routing protocols across domains. Evaluation of the model shows that the predicted values for power consumption lie closer to the actual observations obtained using ns-2 simulation thus resulting in minimal mean square errors.

More »»
PDF iconModeling-and-Analysis-of-Routing-in-IoT-Networks.pdf

2013

Conference Proceedings

S. Sankaran and Sridhar, R., “User-Adaptive Energy-aware Security for Mobile Devices”, IEEE Conference on Communications and Network Security (CNS). IEEE, National Harbor, MD, USA, 2013.[Abstract]


Advancements in computing and communication technologies have given rise to low-cost embedded devices with applications in diverse domains such as Smarthome, industrial automation, healthcare, transportation etc. These devices are power-constrained which emphasizes the need for lightweight security solutions. Code obfuscation has been demonstrated to provide time-limited protection of source code from inference or tampering attacks. However, size of the obfuscated code increases with increase in code size which can have a negative impact on energy consumption. In particular, different transformations of the source code result in varying amounts of energy consumption for embedded devices. In this work, we model the impact of algorithms for code obfuscation on energy usage for embedded devices and analyze the energy-security-performance trade-os. The insights from our analysis can be used to develop techniques depending on the needs of the applications thus facilitating efficient energy usage.

More »»
PDF iconUser-Adaptive-Energy-aware-Security-for-Mobile-Devices.pdf

2013

Conference Proceedings

S. Sankaran and R, S., “Energy Modeling for Mobile Devices Using Performance Counters”, 56th International Midwest Symposium on Circuits and Systems. IEEE , Columbus, OH; United States, pp. 441-444, 2013.[Abstract]


The increasing complexity of mobile applications coupled with growing user demands lead to rapid battery drain in mobile devices. However, battery technology cannot keep up with these trends thus making power management one of the foremost concerns. While system-level approaches to power management exist, the energy impact of applications on individual system components needs to be better understood for energy efficient system design. In this work, we develop energy models for mobile devices using performance counters and estimate the power consumption of system components for numerous embedded applications. Our models provide enhancements in I/O towards estimating I/O energy and cache to incorporate energy consumed during cache refill and write-back in the energy estimation process. We further compare our power estimates with existing models and demonstrate the uniqueness of our model.

More »»
PDF iconEnergy-Modeling-of-Mobile-Devices-using-Performance-Counters.pdf

2009

Conference Proceedings

S. Sankaran, Husain, M. Iftekhar, and Sridhar, R., “IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks”, Proceedings of Annual Symposium on Information Assurance (ASIA). 2009.[Abstract]


Wireless Ad hoc Body Area Networks are primarily used in health-care applications for patient monitoring purposes. Publisher-Subscriber driven Body Area Networks enable publishers (medical sensors attached to patients) to disseminate medical data to numerous mobile heterogeneous subscribers (doctors or caregivers) through a subscription mechanism. Such an environment raises serious security concerns due to the privacy critical medical data coupled with the resource constraints of individual body sensors. To address this problem, we present an identity based key management scheme using Identity-Based Encryption (IBE). IBE facilitates faster key set-up in addition to being lightweight and energy-efficient. The proposed scheme uses IBE to set up pair-wise symmetric keys to preserve data confidentiality and integrity. Our prototype and evaluation of the proposed model validate the approach.

More »»
PDF iconIDKEYMAN-An-Identity-Based-Key-Management-Scheme-for-Wireless-Ad-Hoc-Body-Area-Networks.pdf
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS