Raghav V. Sampangi

Learn More
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the(More)
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics(More)
The advent of the Internet of Things (IoT) has prioritized development in unique identification and sensing technologies, which facilitate IoT's automated and intelligent vision. Data security is critical to the success of such applications, more so with the communication over a wireless channel. However, IoT devices are resource limited and lack the(More)
In this paper, we explore the use of multimodal interfaces (tangible and gestural) in collaborative gameplay. In our setup, gestural interaction is performed to perform tasks with reference content on a wall display, in support of a main activity involving tangible interaction on a tabletop display. We designed two games using this configuration, in order(More)
Cryptographic algorithms rely on the strengths of all their fundamental components and expect them to be harmonious in accomplishing desired levels of security in applications. In order for a security solution to be sophisticated and to provide high security (measured in terms of the security goals it satisfies), the solution needs to typically involve(More)
In this position paper, we present a new mechanism for context-dependent user authentication. We propose an approach in which the type of authentication (single/two factor, two-step, etc.) and the choice of the authentication mechanisms (algorithms/protocols used) vary dynamically, depending on contextual information. Authenticating mechanisms in online and(More)