Raghav V. Sampangi

Learn More
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the(More)
With organizations around the world increasingly adopting wireless local area networks (WLAN), addressing the security needs of wireless networks becomes a top priority task. Particularly, the issue of "intruders" or the presence of undesired entities, in the network is of utmost importance. Being "friendly", as they usually are,(More)
The emphasis on security in Radio Frequency Identification (RFID) systems is increasing with each passing day, owing to their corresponding increase in popularity in defence, anti-counterfeiting, logistics and medical applications. However, resource restrictions on RFID tags curtail the use of sophisticated algorithms to achieve better security, and(More)
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics(More)
Radio Frequency Identification (RFID) is a technology made popular by the ability of RFID tags to uniquely represent objects. However, they are severely resource-constrained due to design restrictions. This limits their ability to perform complex computations for security. In RFID systems, the priority is to ensure the integrity of messages and entity(More)
Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit its widespread deployment. Security in passive RFID tag based systems is a challenge owing to the severe resource restrictions. In this(More)
With its flexibility in deployment and data/lifecycle management, radio frequency identification (RFID) technology has potential for application in a wide variety of areas. However, RFID tags suffer from severe resource restrictions. This makes systems employing such tags vulnerable to several attacks, often resulting in the loss of privacy of the tag(More)