M. Prabu Kumar

Learn More
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level,(More)
— Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several(More)
We state the discovery, threat posed, resolution of vulnerabilities analyzed and modus operandi of the mass attack implemented. Finally presented is a new idea currently being worked on, involving the use of cryptographic primitives that intend to bypass the theoretically naive "user-administrator" trust assumption as a novel attempt to mould into the(More)
  • 1