Faculty Dr Manjula R

Dr Manjula R

Assistant Professor

Department of Computer Science and Engineering

Contact Details

manjula.r@srmap.edu.in

Office Location

J C Bose Block, Level 2, Cabin No: 204, Nano Communications and Networking Lab

Education

2018
Indian Institute of Technology Kharagpur
India
2006
M. Tech
Visvesvaraya Technological University
India
2002
B. E.
Visvesvaraya Technological University
India

Personal Website

Experience

  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2016 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka

Research Interest

  • Present Research Work: At present, my focus is towards the development of cross-layer design techniques i.e., protocols for internet of bio nano things (IoBNT). Nanonetworks consists of tiny devices of the order of few cubic micrometers encompassing sensing, actuating, processing and transceiver units. They form either star or mesh topology, collect the data from the nanoscale environment at molecular level and transmit the data either to the nano-controller or nano-macro device based on the application scenario. These networks are envisioned in the next few years and find applications in various fields such as medical healthcare, agriculture, environmental monitoring etc. The preliminary work is on channel modeling, particularly, the path loss model for in-vivo communication using nanosensor networks operating at terahertz frequency for human heart monitoring
  • Past Research (still working on it): Traditionally, content secrecy and privacy of information i.e., the text or images is achieved through the use of cryptographic primitives such as encryption and decryption techniques. However, concealing contextual information, in networks, such as packet flow rate, frequency of the EM signals, timing of the network traffic, location of some important events etc., is not possible through cryptographic primitives. A separate treatment is necessary to secure such contextual information. Our research focuses on concealing all such contextual information so that it is hard to discern by the adversary, an application of Wireless Sensor Networks for monitoring endangered species. The emphasis is on developing novel techniques to obfuscate the network traffic so as to mitigate adversarial traffic analysis attacks

Awards

  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.

Memberships

  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)

Publications

  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.

Patents

  • Dual band micro-strip patch antenna for electromagnetic nano- communications.

    Dr Manjula R

    Patent Application No: 202441011916, Date Filed: 20/02/2024, Date Published: 08/03/2024, Status: Published

  • System for determining and predicting scattering coefficients of myocardium tissue in near-infrared-band for in-vivo communications

    Dr Manjula R

    Patent Application No: 202441090535, Date Filed: 21/11/2024, Date Published: 29/11/2024, Status: Published

Projects

Scholars

Doctoral Scholars

  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan

Interests

  • Cyber Security
  • LOT
  • Networking

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Research Area

No research areas found for this faculty.

Recent Updates

No recent updates found.

Education
2002
B. E.
Visvesvaraya Technological University
India
2006
M. Tech
Visvesvaraya Technological University
India
2018
Indian Institute of Technology Kharagpur
India
Experience
  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2016 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
Research Interests
  • Present Research Work: At present, my focus is towards the development of cross-layer design techniques i.e., protocols for internet of bio nano things (IoBNT). Nanonetworks consists of tiny devices of the order of few cubic micrometers encompassing sensing, actuating, processing and transceiver units. They form either star or mesh topology, collect the data from the nanoscale environment at molecular level and transmit the data either to the nano-controller or nano-macro device based on the application scenario. These networks are envisioned in the next few years and find applications in various fields such as medical healthcare, agriculture, environmental monitoring etc. The preliminary work is on channel modeling, particularly, the path loss model for in-vivo communication using nanosensor networks operating at terahertz frequency for human heart monitoring
  • Past Research (still working on it): Traditionally, content secrecy and privacy of information i.e., the text or images is achieved through the use of cryptographic primitives such as encryption and decryption techniques. However, concealing contextual information, in networks, such as packet flow rate, frequency of the EM signals, timing of the network traffic, location of some important events etc., is not possible through cryptographic primitives. A separate treatment is necessary to secure such contextual information. Our research focuses on concealing all such contextual information so that it is hard to discern by the adversary, an application of Wireless Sensor Networks for monitoring endangered species. The emphasis is on developing novel techniques to obfuscate the network traffic so as to mitigate adversarial traffic analysis attacks
Awards & Fellowships
  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.
Memberships
  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)
Publications
  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.
Contact Details

manjula.r@srmap.edu.in

Scholars

Doctoral Scholars

  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan

Interests

  • Cyber Security
  • LOT
  • Networking

Education
2002
B. E.
Visvesvaraya Technological University
India
2006
M. Tech
Visvesvaraya Technological University
India
2018
Indian Institute of Technology Kharagpur
India
Experience
  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2016 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
Research Interests
  • Present Research Work: At present, my focus is towards the development of cross-layer design techniques i.e., protocols for internet of bio nano things (IoBNT). Nanonetworks consists of tiny devices of the order of few cubic micrometers encompassing sensing, actuating, processing and transceiver units. They form either star or mesh topology, collect the data from the nanoscale environment at molecular level and transmit the data either to the nano-controller or nano-macro device based on the application scenario. These networks are envisioned in the next few years and find applications in various fields such as medical healthcare, agriculture, environmental monitoring etc. The preliminary work is on channel modeling, particularly, the path loss model for in-vivo communication using nanosensor networks operating at terahertz frequency for human heart monitoring
  • Past Research (still working on it): Traditionally, content secrecy and privacy of information i.e., the text or images is achieved through the use of cryptographic primitives such as encryption and decryption techniques. However, concealing contextual information, in networks, such as packet flow rate, frequency of the EM signals, timing of the network traffic, location of some important events etc., is not possible through cryptographic primitives. A separate treatment is necessary to secure such contextual information. Our research focuses on concealing all such contextual information so that it is hard to discern by the adversary, an application of Wireless Sensor Networks for monitoring endangered species. The emphasis is on developing novel techniques to obfuscate the network traffic so as to mitigate adversarial traffic analysis attacks
Awards & Fellowships
  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.
Memberships
  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)
Publications
  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.
Contact Details

manjula.r@srmap.edu.in

Scholars

Doctoral Scholars

  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan