Vishwas Lakkundi

Learn More
—In this paper, we present the implementation and performance evaluation of security functionalities at the link layer of IEEE 802.15.4-compliant IoT devices. Specifically, we implement the required encryption and authentication mechanisms entirely in software and as well exploit the hardware ciphers that are made available by our IoT platform. Moreover, we(More)
—This paper considers compressed sensing (CS) techniques for signal reconstruction and channel estimation in OFDM-based high-rate ultra wideband (UWB) communication systems. We employ a parallel CS structure that exploits frequency domain sparsity. We also consider multipath UWB channels in both the line-of-sight and non line-of-sight environments. UWB(More)
It is estimated that the number of Internet connected physical devices will grow to 50 billion by 2020. Moreover, the growing adoption of social media (e.g. Twitter, Facebook) on the Web has become a key source of information about the physical world and corresponding events. Data generated from all these information sources (e.g. IoT devices, social media)(More)
—The emergence of Internet of Things and the availability of inexpensive sensor devices and platforms capable of wireless communications enable a wide range of applications such as intelligent home and building automation, mobile health-care, smart logistics, distributed monitoring, smart grids, energy management, asset tracking to name a few. These devices(More)
—Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper(More)
—Security is emerging as a key area of focus in the Internet of Things. Lightweight implementations of the required security features are the need of the hour considering the resource constrained nature of the underlying nodes and networks. At the same time, it is essential to ensure that such implementations are robust, reliable and efficient. This paper(More)
This paper emphasises on the implementation of the flow control and resource allocation mechanisms of the Medium Access Control (MAC) layer of GPRS. Also, its design for adaptability to the satellite network has been considered. In addition, the two systems have been compared in terms of transmission-time, for different data sizes. The results obtained show(More)
  • 1