Neeli R. Prasad

Learn More
Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security algorithms to be designed especially for those tags. In this(More)
Cognitive radio has been considered as a key technology for future wireless communications and mobile computing. We note the cognitive radios can form cognitive radio networks (CRN) by extending the radio link features to network layer functions and above. We categorize CRN architecture into several structures and classify the unidirectional links in such(More)
In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology and weak physical security of low power devices in IoT(More)
In the Internet of things (loT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control models are not suitable to the nomadic, decentralized and dynamic scenarios in the loT where identities are not known in advance. This makes the trust management in loT more promising to(More)
IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially(More)
Cognitive radios shall form cognitive radio network (CRN) to complete the packets delivery. As cognitive radio network is a general multihop wireless heterogeneous network, trust becomes a critical factor for network layer functions and network operation. We explore and develop the mathematical framework of trust in CRN, to further develop trusted routing(More)
86 Abstract Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that encompasses many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad-hoc network, making it having no hierarchal structure, complicating(More)
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices. Equally, it is difficult to get receipt of their(More)