Prakash Krishnamurthy

Learn More
Due to broadcast nature of wireless radio transmission, security services are of paramount importance to protect information exchanged in a wireless network. However, providing security services increases the computation and hence energy consumption due to cryptographic algorithms. Energy tends to be a very limited resource for wireless devices operating on(More)
<i>There are two basic parts to the behavioral specification of distributed systems: safety and progress. In earlier work, we developed a tool to monitor progress properties of CORBA components specified using the temporal operator</i> transient. <i>In this paper, we address the specification and testing of transient properties that are quantified (over(More)
Due to the scarce resources of small devices in wireless networks, it is preferable that security protocols be lightweight and energy efficient while being secure. In this paper, we describe the existing WLAN standard for authentication and key management (AKM), namely, IEEE 802.11i. The AKM protocol in 802.11i can be fairly energy hungry especially when(More)
ii ABSTRACT User-level network interface protocols such as GM, FM, VIA have become increasingly popular to achieve low latency in cluster computing. However, communication with most of these protocols is restricted to a System Area Network (SAN) and the wide area interconnectivity of clusters remains under-explored. In spite of demonstrably superior(More)
  • 1