Bakkiam David Deebak

Learn More
For Multimedia Medical Information System (MMIS), security and privacy are the significant measures. For the guarantee of MMIS significant measures, several authentication schemes have been proposed, though the authentication schemes fail to offer the measurable features, like Repetitive Registration, Verification Table, Mutual Authenticity with(More)
Recently, Session Initiation Protocol (SIP) has become a prime signaling protocol for the multimedia communication systems, though none of the researchers have analyzed its promising features, namely access independence, authentication scheme verification, AKA (Authentication and Key Agreement) security properties, 3GPP security properties, signal(More)
Recently, several biometric and tele-care based user authentication schemes have been proposed to enhance the safe and security of the systems. In 2013, the authors, namely Das et al. improved the authentication scheme of Chang et al. to overcome the severe security flaws, such as failed to protect man-in-the-middle attack, failed to provide the reliable(More)
This paper scrutinizes the authentication and key agreement protocol adopted by the Universal Mobile Telecommunication System to meet the standards of a fourth-generation network. Lately, communication of multimedia (CoM) has drawn the attention of researchers for the future of secure wireless mobile communication. However, the CoM has not had any defensive(More)
Over few decades, the Transmission Control Protocol (TCP) has been employed for developing the major Internet applications. Eventhough of which TCP has some major challenging issues when it operates in the Wireless Networks (WN). Some of the issues are identified from the existing techniques which are Packet Dropping Rate (PDR) and Packet Reception Time(More)
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless / wireline for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to interpret the(More)
Authenticated key agreement (AKA) is useful to preserve the secret (private) key for the data being transmitted over an insecure Thus, this paper proposes the strategies, such as short-term and long-term private keys for the three party authentication and key agreement (3PAKA) protocol. Recently, the IP Multimedia server and client systems have been sprung(More)