Raghav V. Sampangi

Learn More
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the(More)
With organizations around the world increasingly adopting wireless local area networks (WLAN), addressing the security needs of wireless networks becomes a top priority task. Particularly, the issue of "intruders" or the presence of undesired entities, in the network is of utmost importance. Being "friendly", as they usually are,(More)
The emphasis on security in Radio Frequency Identification (RFID) systems is increasing with each passing day, owing to their corresponding increase in popularity in defence, anti-counterfeiting, logistics and medical applications. However, resource restrictions on RFID tags curtail the use of sophisticated algorithms to achieve better security, and(More)
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics(More)
Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit its widespread deployment. Security in passive RFID tag based systems is a challenge owing to the severe resource restrictions. In this(More)
Radio Frequency Identification (RFID) is a technology made popular by the ability of RFID tags to uniquely represent objects. However, they are severely resource-constrained due to design restrictions. This limits their ability to perform complex computations for security. In RFID systems, the priority is to ensure the integrity of messages and entity(More)
The advent of the Internet of Things (IoT) has prioritized development in unique identification and sensing technologies, which facilitate IoT's automated and intelligent vision. Data security is critical to the success of such applications, more so with the communication over a wireless channel. However, IoT devices are resource limited and lack the(More)
In this paper, we explore the use of multimodal interfaces (tangible and gestural) in collaborative gameplay. In our setup, gestural interaction is performed to perform tasks with reference content on a wall display, in support of a main activity involving tangible interaction on a tabletop display. We designed two games using this configuration, in order(More)
Cryptographic algorithms rely on the strengths of all their fundamental components and expect them to be harmonious in accomplishing desired levels of security in applications. In order for a security solution to be sophisticated and to provide high security (measured in terms of the security goals it satisfies), the solution needs to typically involve(More)