Raghav V. Sampangi

Learn More
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the(More)
The emphasis on security in Radio Frequency Identification (RFID) systems is increasing with each passing day, owing to their corresponding increase in popularity in defence, anti-counterfeiting, logistics and medical applications. However, resource restrictions on RFID tags curtail the use of sophisticated algorithms to achieve better security, and(More)
With organizations around the world increasingly adopting wireless local area networks (WLAN), addressing the security needs of wireless networks becomes a top priority task. Particularly, the issue of "intruders" or the presence of undesired entities, in the network is of utmost importance. Being "friendly", as they usually are,(More)
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often(More)
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics(More)
With its flexibility in deployment and data/lifecycle management, radio frequency identification (RFID) technology has potential for application in a wide variety of areas. However, RFID tags suffer from severe resource restrictions. This makes systems employing such tags vulnerable to several attacks, often resulting in the loss of privacy of the tag(More)
Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit its widespread deployment. Security in passive RFID tag based systems is a challenge owing to the severe resource restrictions. In this(More)
In this paper, we explore the use of multimodal interfaces (tangible and gestural) in collaborative gameplay. In our setup, gestural interaction is performed to perform tasks with reference content on a wall display, in support of a main activity involving tangible interaction on a tabletop display. We designed two games using this configuration, in order(More)
Cryptographic algorithms rely on the strengths of all their fundamental components and expect them to be harmonious in accomplishing desired levels of security in applications. In order for a security solution to be sophisticated and to provide high security (measured in terms of the security goals it satisfies), the solution needs to typically involve(More)