Faculty Dr Manojkumar V

Dr Manojkumar V

Assistant Professor

Department of Computer Science and Engineering

Contact Details

manojkumar.v@srmap.edu.in

Office Location

Education

2021
National Institute of Technology Tiruchirappalli
India
2012
ME
Srinivasan Engineering College, Anna University, Chennai
India
2010
BTech
Bharathidasan Institute of Technology, Bharathidasan University, Trichy
India

Personal Website

Experience

  • 26.05.2021 to 08.01.2021 – Assistant Professor Sr. Grade-I (SCOPE) – VIT-AP University, Andhra Pradesh
  • 17.12.2012 to 02.08.2016 – Assistant Professor (Department of Information Technology) - Anjalai Ammal Mahalingam Engineering College, Tamil Nadu
  • 01.06.2012 to 21.11.2012 – Assistant Professor (Department of Computer Science & Engineering) - Mount Zion College of Engineering and Technology, Tamil Nadu

Research Interest

  • Machine to Machine Security (Robotics)
  • Cryptography
  • Internet of Things
  • Authentication
  • Blockchain
  • Mobile Cloud Computing
  • Lattice based Cryptography

Awards

  • 2004 – 100/100 Marks got in Mathematics subject for SSLC Board Exam (prize received from school) – O. F. T. High School, OFT, Trichy
  • Auguest 2016 to May 2021 – IDRBT Fellowship during Ph.D – IDRBT, Hyderabad, Telangana

Memberships

Publications

  • Blockchain-Based Authentication Protocol for Healthcare Security Using NTRUEncrypt

    Vasigani J.A., Vivekanandan M., Ghatak S.

    Conference paper, Lecture Notes in Networks and Systems, 2026, DOI Link

    View abstract ⏷

    Healthcare is experiencing a rapid increase in medical records, requiring confidentiality and data integrity. Privacy plays a significant role in healthcare security. In general, users used to share data through insecure channels, and attacks may occur. Therefore, the healthcare system should ensure a secure authentication process. The proposed model uses blockchain technology to share and store patient data securely. For secure data access, the authentication process is to be performed between users and the blockchain using cryptographic algorithms. The proposed protocol uses the zero-knowledge proof (ZKP) embedded with the post-quantum cryptography technique NTRUEncrypt for the authenticating process, which is resistant to all attacks. The security analysis of the proposed protocol is performed through formal security verification using the Scyther tool and informal security analysis. The security analysis proves that the proposed protocol is resistant to well-known attacks. In addition, the proposed protocol provides better performance than existing models.
  • Blockchain and IPFS Based Secure File Storage Using Smart Contracts

    Attuluri P.R., Muvva G.S., Likitha A., Raju P.S.K., Vivekanandan M.

    Conference paper, Lecture Notes in Networks and Systems, 2025, DOI Link

    View abstract ⏷

    The Ethereum blockchain was used to create the sophis- ticated decentralized application (DApp) known as Decentralised File Sharing and Storage (DFSS). The programme seeks to deliver a secure, decentralized platform for file sharing and archiving across a decentral- ized network. By utilizing the power of blockchain technology, DFSS offers a perfect substitute for traditional cloud storage platforms by offer- ing improved security, unmatched transparency, and full data integrity. The idea of DFSS is to completely give people control over their data while resolving the issues with centralization and the inherent dangers of third-party control. Users can upload files to the platform, which hashes them and distributes them throughout a decentralized network to dras- tically reduce the likelihood of data compromise, interference, or ser- vice outages. A crucial component of DFSS is the potential to securely share files with other users, which is built-in functionality that is directly contained within the smart contract. To assure user data security, the platform uses the most recent encryption standards and reliable secu- rity testing procedures. Along with careful internal audits and testing, in-depth security analysis and vulnerability detection are performed uti- lizing external tools like MythX and Slither. In essence, DFSS represents a substantial advancement in the field of digital data storage. In contrast to conventional systems, it offers a secure, private, and decentralized op- tion for file storing and sharing by utilizing the Ethereum blockchain’s features. The worldwide march towards a decentralized future is aided by DFSS, which opens up new options for data ownership and sharing. This ground-breaking platform is crucial in setting the way for the path for data sharing and storage that is transparent, safe, and easy to use in the blockchain era.
  • Blockchain based Security Trust Mechanism for Food Supply Chain Management in Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Subhash S.K.C., Yogesh D., Ganta K.S.

    Conference paper, 2024 5th International Conference on Innovative Trends in Information Technology, ICITIIT 2024, 2024, DOI Link

    View abstract ⏷

    Security is a major concern in every domain whose breaches will result in significant loss of commodities and economy. Food supply chain also is one of the sensitive domain where security is a major concern. When considering the food supply chain in smart city environments, the designers need to be more vigil in identifying the loop holes of all the micro transactions. Since trust is a major concern in every offline transactions, the smart cities need to implement these trust ensuring methods in a false safe manner. We propose a block-chain based security mechanism to ensure trust among the participating authorities in a food supply chain of an arbitrary smart city environment. We keep track of the security concerns from the farmers through manufacturers, distributors, local retailers and consumers. In every stage, the transaction is secured using a block-chain mechanism that will ensure the security of transactional data using the credentials of every stake holders. For the ease of customers, we also developed a web and mobile application for tracing the quality of the food, through a series of authenticated signatures stored in a block-chain environment. We have used Flutter mobile application for user end and Remix IDE for Blockchain environment. We have performed a informal security analysis and found that comparatively our method of securing the transactions in a supply food chain exceed the modern state-of-the-art.
  • Smart Commodities Public Distribution System using IoT Sistema inteligente de distribución pública de productos básicos mediante IoT

    Murali N., Palani Murugan S., Sivakumar K., Vivekanandan M., Sushith M., Manikandan S.

    Article, Salud, Ciencia y Tecnologia - Serie de Conferencias, 2024, DOI Link

    View abstract ⏷

    In non-modern countries like India, the approach of allocating basic local goods to plight families is a significant approach to meeting the needs of a large number of people. The ongoing public dissemination system in Allot stores necessitates manual sum evaluation and trade record maintenance. The ongoing system has a ton of issues. One example is the IOT-based shrewd public appropriation framework project, which proposes a programmed method for getting products to verified cardholders. Similar to this, an informational index keeps track of the nuances of trades. Clients should enter their ID and mystery expression to get to their record through the High level cell. They are able to see the stock availability when they are successfully endorsed in. This structure uses a Raspberry Pi as the controller and uses a Specifics extraction-based extraordinary imprint coordinating computation, which has a higher accuracy score than previous versions. DC engines that are directly controlled by a Raspberry Pi for programmed product appropriation are used to open and close the valves. All along, one of the relatives need to enter one of a kind username and secret articulation. Right when client is supported in, he/she can see things that is open for that specific family account. The customer must provide a remarkable finger impression to the next level of confirmation in order to manage the items.
  • A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center

    Sharma N.K., Bojjagani S., Reddy Y.C.A.P., Vivekanandan M., Srinivasan J., Maurya A.K.

    Article, IEEE Access, 2023, DOI Link

    View abstract ⏷

    Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by Virtual Machines (VMs) through the cloud data center. Therefore, energy-aware VMs allocation and migration are essential tasks in the cloud environment. This paper proposes a Branch-and-Price based energy-efficient VMs allocation algorithm and a Multi-Dimensional Virtual Machine Migration (MDVMM) algorithm at the cloud data center. The Branch-and-Price based VMs allocation algorithm reduces energy consumption and wastage of resources by selecting the optimal number of energy-efficient PMs at the cloud data center. The proposed MDVMM algorithm saves energy consumption and avoids the Service Level Agreement (SLA) violation by performing an optimal number of VMs migrations. The experimental results demonstrate that our proposed Branch-and-Price based VMs allocation with VMs migration algorithms saves more than 31% energy consumption and improves 21.7% average resource utilization over existing state-of-the-art techniques with a 95% confidence interval. The performance of the proposed approaches outperforms in terms of SLA violation, VMs migration, and Energy SLA Violation (ESV) combined metrics over existing state-of-the-art VMs allocation and migration algorithms.
  • An Efficient Detection and Classification of Plant Diseases using Deep Learning Approach

    Jagadeesan S., Deepakraj E., Ramalingam V., Venkatachalam I., Vivekanandan M., Manjula R.

    Conference paper, 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023, 2023, DOI Link

    View abstract ⏷

    Crop failure caused by disease-causing pests is an important problem. Farmers struggle with disease management and detection due to inadequate interventions. The goal is to create an automatic system to efficiently identify plant diseases from photos while reducing crop losses and increasing productivity. Machine learning algorithms offer a faster and cheaper alternative to visual inspection by experts. The main goal is to perform image analysis for early diagnosis and effective disease control. The use of CNN architecture for plant disease classification and detection offers a promising solution for plant health monitoring and risk mitigation. Given the threats to crop productivity and global food security, reliable methods for early detection and accurate classification are essential. CNNs enable efficient analysis of vast plant image databases, enabling accurate plant disease identification with speed and accuracy. The multi-layer CNN approach extracts feature and refines the representation, facilitating accurate prediction and accurate diagnosis. Transfer learning methods accelerate system development and allow adaptation to plant disease-specific databases. Combining computer vision algorithms with CNN architecture enables real-time monitoring, early disease detection and targeted intervention, reducing yield losses and improving crop management. This approach uses AI, image analysis, and plant pathology to solve the challenges of sustainable agriculture and plant diseases. System performance is measured by various performance metrics.
  • Blockchain based Secure Erlang Server for Request based Group Communication over XMPP

    Johnpaul C.I., Vivekanandan M., Premkamal P.K., Ramya R.

    Conference paper, 2023 International Conference on Advances in Intelligent Computing and Applications, AICAPS 2023, 2023, DOI Link

    View abstract ⏷

    Many real world activities in computer science scenarios are linked with concurrency and security related issues and have to handle large number of processes to be executed in parallel with false safe security solutions. There are many traditional methods in programming languages to handle concurrency. Concurrency is one of the major issues that need to be addressed by most of the servers when dealing with the group communication operations. Security of the data as well as the credibility of the users are the other aspects when a group of users involve in real-time communication. Many light-weighted servers are designed to carryout elementary operations of request handling, file sharing etc. In design of such servers having large number of clients, the request service handling will be based on the individual server programs. Keeping track of individual credibility and establishing concurrency solutions in server design is challenging. The whole work describes the significance and implementation of an Erlang based XMPP server in comparison with a Python based XMPP server with a view to service the client request handling operations for sending messages, group chatting, buddy-list creation, presence identification integrated with XML messaging pattern as per the XMPP protocol. We also accomplish the security and credibility of the users using a blockchain based interface that keep track of user activities during group communication. The security analysis is also performed for blockchain based interface.
  • Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Ebinazer S.E.

    Conference paper, 2023 International Conference on Innovative Trends in Information Technology, ICITIIT 2023, 2023, DOI Link

    View abstract ⏷

    Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through cloud for smart cities, collaborative actions, remote activities based on the data at the source, etc., need to be secure and free from masquerading and tampering. In most of the cases the data is pushed into the cloud from access points, sensors, or remote access centers. Preventing the data access and identifying anonymous access to these sensors require an enhanced security mechanism that prevents the inconsistent data to be transferred to the cloud. We propose a blockchain based enhanced security system that protects the data from the access point it leaves for the cloud using a distributed ledger. The consensus mechanism ensures the trust of existing sources during the data transfer from the source to the cloud. The trust generated by the subsequent data blocks with the security hash key ensure the integrity of the data and validity of the actual source. This prevent the illegal access to the data sharing points. We have verified the degree of security offered by our proposed model using informal analysis. We found that our method has improved the security of data access.
  • BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

    Vivekanandan M., V. N S., U S.R.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.
  • Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Srinivasulu Reddy U.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    The development in cloud computing platforms has resulted, hosting many day-to-day service applications in the cloud. To avail the services provided by different cloud service providers (CSPs), the mobile user has to register his/her identity with the CSPs. The mobile user (MU) has to remember multiple identities and credentials to access various CSPs. Many single sign-on schemes have been proposed in the literature to eliminate multiple registrations by mobile users to access CSPs. Most of these schemes rely on a trusted third party known as Registration Authority Center (RAC), which is a centralized entity to manage the identity information of all the mobile users registered with it. The centralized RAC has two operational problems, i.e., RAC has full control over the data it possesses, resulting in the possibility of the data breach and increased risk of single-point-of-failure. In this paper, we propose a blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment, which solves these two traditional problems with centralized registration centers. In proposed protocol, the registration of MU and CSP are performed through public blockchain network for MU to access CSPs and the authentication was performed between MU and CSP through public blockchain. The public blockchain network stores MU and CSPs identity information. Public blockchain network provides integrity to the data stored in it and secures the system from single-point-of-failure. In addition, security analysis and performance analysis were also performed for proposed protocol and it showed that the proposed protocol is secure from all-known attacks with better performance efficiency.
  • MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map

    Vivekanandan M., Sastry V.N., SrinivasuluReddy U.

    Article, Telecommunication Systems, 2021, DOI Link

    View abstract ⏷

    Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud services securely is the prime concern of the mobile user. To address the user privacy issue, a secure mutual authentication protocol for mobile cloud environment using chebyshev chaotic map is proposed. The protocol provides Mutual Authentication among Cloud Service Provider (CSP) and Mobile User (MU). In our protocol, Session Key is securely generated among MU and CSP with the help of Registration Center. The proposed protocol was compared with existing ones and proven to be superior in terms of computational performance and security. Further, proposed protocol was analysed using Burrows-Abadi-Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and informal security analysis. Security analysis shows that the proposed protocol can withstand all well-known attacks.
  • Biometric based User Authentication Protocol for Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Reddy U.S.

    Conference paper, ISBA 2019 - 5th IEEE International Conference on Identity, Security and Behavior Analysis, 2019, DOI Link

    View abstract ⏷

    Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo's developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.

Patents

Projects

Scholars

Doctoral Scholars

  • Ms Vasigani Jhansy Archana

Interests

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Research Area

No research areas found for this faculty.

Recent Updates

No recent updates found.

Education
2010
BTech
Bharathidasan Institute of Technology, Bharathidasan University, Trichy
India
2012
ME
Srinivasan Engineering College, Anna University, Chennai
India
2021
National Institute of Technology Tiruchirappalli
India
Experience
  • 26.05.2021 to 08.01.2021 – Assistant Professor Sr. Grade-I (SCOPE) – VIT-AP University, Andhra Pradesh
  • 17.12.2012 to 02.08.2016 – Assistant Professor (Department of Information Technology) - Anjalai Ammal Mahalingam Engineering College, Tamil Nadu
  • 01.06.2012 to 21.11.2012 – Assistant Professor (Department of Computer Science & Engineering) - Mount Zion College of Engineering and Technology, Tamil Nadu
Research Interests
  • Machine to Machine Security (Robotics)
  • Cryptography
  • Internet of Things
  • Authentication
  • Blockchain
  • Mobile Cloud Computing
  • Lattice based Cryptography
Awards & Fellowships
  • 2004 – 100/100 Marks got in Mathematics subject for SSLC Board Exam (prize received from school) – O. F. T. High School, OFT, Trichy
  • Auguest 2016 to May 2021 – IDRBT Fellowship during Ph.D – IDRBT, Hyderabad, Telangana
Memberships
Publications
  • Blockchain-Based Authentication Protocol for Healthcare Security Using NTRUEncrypt

    Vasigani J.A., Vivekanandan M., Ghatak S.

    Conference paper, Lecture Notes in Networks and Systems, 2026, DOI Link

    View abstract ⏷

    Healthcare is experiencing a rapid increase in medical records, requiring confidentiality and data integrity. Privacy plays a significant role in healthcare security. In general, users used to share data through insecure channels, and attacks may occur. Therefore, the healthcare system should ensure a secure authentication process. The proposed model uses blockchain technology to share and store patient data securely. For secure data access, the authentication process is to be performed between users and the blockchain using cryptographic algorithms. The proposed protocol uses the zero-knowledge proof (ZKP) embedded with the post-quantum cryptography technique NTRUEncrypt for the authenticating process, which is resistant to all attacks. The security analysis of the proposed protocol is performed through formal security verification using the Scyther tool and informal security analysis. The security analysis proves that the proposed protocol is resistant to well-known attacks. In addition, the proposed protocol provides better performance than existing models.
  • Blockchain and IPFS Based Secure File Storage Using Smart Contracts

    Attuluri P.R., Muvva G.S., Likitha A., Raju P.S.K., Vivekanandan M.

    Conference paper, Lecture Notes in Networks and Systems, 2025, DOI Link

    View abstract ⏷

    The Ethereum blockchain was used to create the sophis- ticated decentralized application (DApp) known as Decentralised File Sharing and Storage (DFSS). The programme seeks to deliver a secure, decentralized platform for file sharing and archiving across a decentral- ized network. By utilizing the power of blockchain technology, DFSS offers a perfect substitute for traditional cloud storage platforms by offer- ing improved security, unmatched transparency, and full data integrity. The idea of DFSS is to completely give people control over their data while resolving the issues with centralization and the inherent dangers of third-party control. Users can upload files to the platform, which hashes them and distributes them throughout a decentralized network to dras- tically reduce the likelihood of data compromise, interference, or ser- vice outages. A crucial component of DFSS is the potential to securely share files with other users, which is built-in functionality that is directly contained within the smart contract. To assure user data security, the platform uses the most recent encryption standards and reliable secu- rity testing procedures. Along with careful internal audits and testing, in-depth security analysis and vulnerability detection are performed uti- lizing external tools like MythX and Slither. In essence, DFSS represents a substantial advancement in the field of digital data storage. In contrast to conventional systems, it offers a secure, private, and decentralized op- tion for file storing and sharing by utilizing the Ethereum blockchain’s features. The worldwide march towards a decentralized future is aided by DFSS, which opens up new options for data ownership and sharing. This ground-breaking platform is crucial in setting the way for the path for data sharing and storage that is transparent, safe, and easy to use in the blockchain era.
  • Blockchain based Security Trust Mechanism for Food Supply Chain Management in Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Subhash S.K.C., Yogesh D., Ganta K.S.

    Conference paper, 2024 5th International Conference on Innovative Trends in Information Technology, ICITIIT 2024, 2024, DOI Link

    View abstract ⏷

    Security is a major concern in every domain whose breaches will result in significant loss of commodities and economy. Food supply chain also is one of the sensitive domain where security is a major concern. When considering the food supply chain in smart city environments, the designers need to be more vigil in identifying the loop holes of all the micro transactions. Since trust is a major concern in every offline transactions, the smart cities need to implement these trust ensuring methods in a false safe manner. We propose a block-chain based security mechanism to ensure trust among the participating authorities in a food supply chain of an arbitrary smart city environment. We keep track of the security concerns from the farmers through manufacturers, distributors, local retailers and consumers. In every stage, the transaction is secured using a block-chain mechanism that will ensure the security of transactional data using the credentials of every stake holders. For the ease of customers, we also developed a web and mobile application for tracing the quality of the food, through a series of authenticated signatures stored in a block-chain environment. We have used Flutter mobile application for user end and Remix IDE for Blockchain environment. We have performed a informal security analysis and found that comparatively our method of securing the transactions in a supply food chain exceed the modern state-of-the-art.
  • Smart Commodities Public Distribution System using IoT Sistema inteligente de distribución pública de productos básicos mediante IoT

    Murali N., Palani Murugan S., Sivakumar K., Vivekanandan M., Sushith M., Manikandan S.

    Article, Salud, Ciencia y Tecnologia - Serie de Conferencias, 2024, DOI Link

    View abstract ⏷

    In non-modern countries like India, the approach of allocating basic local goods to plight families is a significant approach to meeting the needs of a large number of people. The ongoing public dissemination system in Allot stores necessitates manual sum evaluation and trade record maintenance. The ongoing system has a ton of issues. One example is the IOT-based shrewd public appropriation framework project, which proposes a programmed method for getting products to verified cardholders. Similar to this, an informational index keeps track of the nuances of trades. Clients should enter their ID and mystery expression to get to their record through the High level cell. They are able to see the stock availability when they are successfully endorsed in. This structure uses a Raspberry Pi as the controller and uses a Specifics extraction-based extraordinary imprint coordinating computation, which has a higher accuracy score than previous versions. DC engines that are directly controlled by a Raspberry Pi for programmed product appropriation are used to open and close the valves. All along, one of the relatives need to enter one of a kind username and secret articulation. Right when client is supported in, he/she can see things that is open for that specific family account. The customer must provide a remarkable finger impression to the next level of confirmation in order to manage the items.
  • A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center

    Sharma N.K., Bojjagani S., Reddy Y.C.A.P., Vivekanandan M., Srinivasan J., Maurya A.K.

    Article, IEEE Access, 2023, DOI Link

    View abstract ⏷

    Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by Virtual Machines (VMs) through the cloud data center. Therefore, energy-aware VMs allocation and migration are essential tasks in the cloud environment. This paper proposes a Branch-and-Price based energy-efficient VMs allocation algorithm and a Multi-Dimensional Virtual Machine Migration (MDVMM) algorithm at the cloud data center. The Branch-and-Price based VMs allocation algorithm reduces energy consumption and wastage of resources by selecting the optimal number of energy-efficient PMs at the cloud data center. The proposed MDVMM algorithm saves energy consumption and avoids the Service Level Agreement (SLA) violation by performing an optimal number of VMs migrations. The experimental results demonstrate that our proposed Branch-and-Price based VMs allocation with VMs migration algorithms saves more than 31% energy consumption and improves 21.7% average resource utilization over existing state-of-the-art techniques with a 95% confidence interval. The performance of the proposed approaches outperforms in terms of SLA violation, VMs migration, and Energy SLA Violation (ESV) combined metrics over existing state-of-the-art VMs allocation and migration algorithms.
  • An Efficient Detection and Classification of Plant Diseases using Deep Learning Approach

    Jagadeesan S., Deepakraj E., Ramalingam V., Venkatachalam I., Vivekanandan M., Manjula R.

    Conference paper, 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023, 2023, DOI Link

    View abstract ⏷

    Crop failure caused by disease-causing pests is an important problem. Farmers struggle with disease management and detection due to inadequate interventions. The goal is to create an automatic system to efficiently identify plant diseases from photos while reducing crop losses and increasing productivity. Machine learning algorithms offer a faster and cheaper alternative to visual inspection by experts. The main goal is to perform image analysis for early diagnosis and effective disease control. The use of CNN architecture for plant disease classification and detection offers a promising solution for plant health monitoring and risk mitigation. Given the threats to crop productivity and global food security, reliable methods for early detection and accurate classification are essential. CNNs enable efficient analysis of vast plant image databases, enabling accurate plant disease identification with speed and accuracy. The multi-layer CNN approach extracts feature and refines the representation, facilitating accurate prediction and accurate diagnosis. Transfer learning methods accelerate system development and allow adaptation to plant disease-specific databases. Combining computer vision algorithms with CNN architecture enables real-time monitoring, early disease detection and targeted intervention, reducing yield losses and improving crop management. This approach uses AI, image analysis, and plant pathology to solve the challenges of sustainable agriculture and plant diseases. System performance is measured by various performance metrics.
  • Blockchain based Secure Erlang Server for Request based Group Communication over XMPP

    Johnpaul C.I., Vivekanandan M., Premkamal P.K., Ramya R.

    Conference paper, 2023 International Conference on Advances in Intelligent Computing and Applications, AICAPS 2023, 2023, DOI Link

    View abstract ⏷

    Many real world activities in computer science scenarios are linked with concurrency and security related issues and have to handle large number of processes to be executed in parallel with false safe security solutions. There are many traditional methods in programming languages to handle concurrency. Concurrency is one of the major issues that need to be addressed by most of the servers when dealing with the group communication operations. Security of the data as well as the credibility of the users are the other aspects when a group of users involve in real-time communication. Many light-weighted servers are designed to carryout elementary operations of request handling, file sharing etc. In design of such servers having large number of clients, the request service handling will be based on the individual server programs. Keeping track of individual credibility and establishing concurrency solutions in server design is challenging. The whole work describes the significance and implementation of an Erlang based XMPP server in comparison with a Python based XMPP server with a view to service the client request handling operations for sending messages, group chatting, buddy-list creation, presence identification integrated with XML messaging pattern as per the XMPP protocol. We also accomplish the security and credibility of the users using a blockchain based interface that keep track of user activities during group communication. The security analysis is also performed for blockchain based interface.
  • Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Ebinazer S.E.

    Conference paper, 2023 International Conference on Innovative Trends in Information Technology, ICITIIT 2023, 2023, DOI Link

    View abstract ⏷

    Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through cloud for smart cities, collaborative actions, remote activities based on the data at the source, etc., need to be secure and free from masquerading and tampering. In most of the cases the data is pushed into the cloud from access points, sensors, or remote access centers. Preventing the data access and identifying anonymous access to these sensors require an enhanced security mechanism that prevents the inconsistent data to be transferred to the cloud. We propose a blockchain based enhanced security system that protects the data from the access point it leaves for the cloud using a distributed ledger. The consensus mechanism ensures the trust of existing sources during the data transfer from the source to the cloud. The trust generated by the subsequent data blocks with the security hash key ensure the integrity of the data and validity of the actual source. This prevent the illegal access to the data sharing points. We have verified the degree of security offered by our proposed model using informal analysis. We found that our method has improved the security of data access.
  • BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

    Vivekanandan M., V. N S., U S.R.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.
  • Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Srinivasulu Reddy U.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    The development in cloud computing platforms has resulted, hosting many day-to-day service applications in the cloud. To avail the services provided by different cloud service providers (CSPs), the mobile user has to register his/her identity with the CSPs. The mobile user (MU) has to remember multiple identities and credentials to access various CSPs. Many single sign-on schemes have been proposed in the literature to eliminate multiple registrations by mobile users to access CSPs. Most of these schemes rely on a trusted third party known as Registration Authority Center (RAC), which is a centralized entity to manage the identity information of all the mobile users registered with it. The centralized RAC has two operational problems, i.e., RAC has full control over the data it possesses, resulting in the possibility of the data breach and increased risk of single-point-of-failure. In this paper, we propose a blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment, which solves these two traditional problems with centralized registration centers. In proposed protocol, the registration of MU and CSP are performed through public blockchain network for MU to access CSPs and the authentication was performed between MU and CSP through public blockchain. The public blockchain network stores MU and CSPs identity information. Public blockchain network provides integrity to the data stored in it and secures the system from single-point-of-failure. In addition, security analysis and performance analysis were also performed for proposed protocol and it showed that the proposed protocol is secure from all-known attacks with better performance efficiency.
  • MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map

    Vivekanandan M., Sastry V.N., SrinivasuluReddy U.

    Article, Telecommunication Systems, 2021, DOI Link

    View abstract ⏷

    Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud services securely is the prime concern of the mobile user. To address the user privacy issue, a secure mutual authentication protocol for mobile cloud environment using chebyshev chaotic map is proposed. The protocol provides Mutual Authentication among Cloud Service Provider (CSP) and Mobile User (MU). In our protocol, Session Key is securely generated among MU and CSP with the help of Registration Center. The proposed protocol was compared with existing ones and proven to be superior in terms of computational performance and security. Further, proposed protocol was analysed using Burrows-Abadi-Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and informal security analysis. Security analysis shows that the proposed protocol can withstand all well-known attacks.
  • Biometric based User Authentication Protocol for Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Reddy U.S.

    Conference paper, ISBA 2019 - 5th IEEE International Conference on Identity, Security and Behavior Analysis, 2019, DOI Link

    View abstract ⏷

    Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo's developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.
Contact Details

manojkumar.v@srmap.edu.in

Scholars

Doctoral Scholars

  • Ms Vasigani Jhansy Archana

Interests
Education
2010
BTech
Bharathidasan Institute of Technology, Bharathidasan University, Trichy
India
2012
ME
Srinivasan Engineering College, Anna University, Chennai
India
2021
National Institute of Technology Tiruchirappalli
India
Experience
  • 26.05.2021 to 08.01.2021 – Assistant Professor Sr. Grade-I (SCOPE) – VIT-AP University, Andhra Pradesh
  • 17.12.2012 to 02.08.2016 – Assistant Professor (Department of Information Technology) - Anjalai Ammal Mahalingam Engineering College, Tamil Nadu
  • 01.06.2012 to 21.11.2012 – Assistant Professor (Department of Computer Science & Engineering) - Mount Zion College of Engineering and Technology, Tamil Nadu
Research Interests
  • Machine to Machine Security (Robotics)
  • Cryptography
  • Internet of Things
  • Authentication
  • Blockchain
  • Mobile Cloud Computing
  • Lattice based Cryptography
Awards & Fellowships
  • 2004 – 100/100 Marks got in Mathematics subject for SSLC Board Exam (prize received from school) – O. F. T. High School, OFT, Trichy
  • Auguest 2016 to May 2021 – IDRBT Fellowship during Ph.D – IDRBT, Hyderabad, Telangana
Memberships
Publications
  • Blockchain-Based Authentication Protocol for Healthcare Security Using NTRUEncrypt

    Vasigani J.A., Vivekanandan M., Ghatak S.

    Conference paper, Lecture Notes in Networks and Systems, 2026, DOI Link

    View abstract ⏷

    Healthcare is experiencing a rapid increase in medical records, requiring confidentiality and data integrity. Privacy plays a significant role in healthcare security. In general, users used to share data through insecure channels, and attacks may occur. Therefore, the healthcare system should ensure a secure authentication process. The proposed model uses blockchain technology to share and store patient data securely. For secure data access, the authentication process is to be performed between users and the blockchain using cryptographic algorithms. The proposed protocol uses the zero-knowledge proof (ZKP) embedded with the post-quantum cryptography technique NTRUEncrypt for the authenticating process, which is resistant to all attacks. The security analysis of the proposed protocol is performed through formal security verification using the Scyther tool and informal security analysis. The security analysis proves that the proposed protocol is resistant to well-known attacks. In addition, the proposed protocol provides better performance than existing models.
  • Blockchain and IPFS Based Secure File Storage Using Smart Contracts

    Attuluri P.R., Muvva G.S., Likitha A., Raju P.S.K., Vivekanandan M.

    Conference paper, Lecture Notes in Networks and Systems, 2025, DOI Link

    View abstract ⏷

    The Ethereum blockchain was used to create the sophis- ticated decentralized application (DApp) known as Decentralised File Sharing and Storage (DFSS). The programme seeks to deliver a secure, decentralized platform for file sharing and archiving across a decentral- ized network. By utilizing the power of blockchain technology, DFSS offers a perfect substitute for traditional cloud storage platforms by offer- ing improved security, unmatched transparency, and full data integrity. The idea of DFSS is to completely give people control over their data while resolving the issues with centralization and the inherent dangers of third-party control. Users can upload files to the platform, which hashes them and distributes them throughout a decentralized network to dras- tically reduce the likelihood of data compromise, interference, or ser- vice outages. A crucial component of DFSS is the potential to securely share files with other users, which is built-in functionality that is directly contained within the smart contract. To assure user data security, the platform uses the most recent encryption standards and reliable secu- rity testing procedures. Along with careful internal audits and testing, in-depth security analysis and vulnerability detection are performed uti- lizing external tools like MythX and Slither. In essence, DFSS represents a substantial advancement in the field of digital data storage. In contrast to conventional systems, it offers a secure, private, and decentralized op- tion for file storing and sharing by utilizing the Ethereum blockchain’s features. The worldwide march towards a decentralized future is aided by DFSS, which opens up new options for data ownership and sharing. This ground-breaking platform is crucial in setting the way for the path for data sharing and storage that is transparent, safe, and easy to use in the blockchain era.
  • Blockchain based Security Trust Mechanism for Food Supply Chain Management in Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Subhash S.K.C., Yogesh D., Ganta K.S.

    Conference paper, 2024 5th International Conference on Innovative Trends in Information Technology, ICITIIT 2024, 2024, DOI Link

    View abstract ⏷

    Security is a major concern in every domain whose breaches will result in significant loss of commodities and economy. Food supply chain also is one of the sensitive domain where security is a major concern. When considering the food supply chain in smart city environments, the designers need to be more vigil in identifying the loop holes of all the micro transactions. Since trust is a major concern in every offline transactions, the smart cities need to implement these trust ensuring methods in a false safe manner. We propose a block-chain based security mechanism to ensure trust among the participating authorities in a food supply chain of an arbitrary smart city environment. We keep track of the security concerns from the farmers through manufacturers, distributors, local retailers and consumers. In every stage, the transaction is secured using a block-chain mechanism that will ensure the security of transactional data using the credentials of every stake holders. For the ease of customers, we also developed a web and mobile application for tracing the quality of the food, through a series of authenticated signatures stored in a block-chain environment. We have used Flutter mobile application for user end and Remix IDE for Blockchain environment. We have performed a informal security analysis and found that comparatively our method of securing the transactions in a supply food chain exceed the modern state-of-the-art.
  • Smart Commodities Public Distribution System using IoT Sistema inteligente de distribución pública de productos básicos mediante IoT

    Murali N., Palani Murugan S., Sivakumar K., Vivekanandan M., Sushith M., Manikandan S.

    Article, Salud, Ciencia y Tecnologia - Serie de Conferencias, 2024, DOI Link

    View abstract ⏷

    In non-modern countries like India, the approach of allocating basic local goods to plight families is a significant approach to meeting the needs of a large number of people. The ongoing public dissemination system in Allot stores necessitates manual sum evaluation and trade record maintenance. The ongoing system has a ton of issues. One example is the IOT-based shrewd public appropriation framework project, which proposes a programmed method for getting products to verified cardholders. Similar to this, an informational index keeps track of the nuances of trades. Clients should enter their ID and mystery expression to get to their record through the High level cell. They are able to see the stock availability when they are successfully endorsed in. This structure uses a Raspberry Pi as the controller and uses a Specifics extraction-based extraordinary imprint coordinating computation, which has a higher accuracy score than previous versions. DC engines that are directly controlled by a Raspberry Pi for programmed product appropriation are used to open and close the valves. All along, one of the relatives need to enter one of a kind username and secret articulation. Right when client is supported in, he/she can see things that is open for that specific family account. The customer must provide a remarkable finger impression to the next level of confirmation in order to manage the items.
  • A Novel Energy Efficient Multi-Dimensional Virtual Machines Allocation and Migration at the Cloud Data Center

    Sharma N.K., Bojjagani S., Reddy Y.C.A.P., Vivekanandan M., Srinivasan J., Maurya A.K.

    Article, IEEE Access, 2023, DOI Link

    View abstract ⏷

    Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by Virtual Machines (VMs) through the cloud data center. Therefore, energy-aware VMs allocation and migration are essential tasks in the cloud environment. This paper proposes a Branch-and-Price based energy-efficient VMs allocation algorithm and a Multi-Dimensional Virtual Machine Migration (MDVMM) algorithm at the cloud data center. The Branch-and-Price based VMs allocation algorithm reduces energy consumption and wastage of resources by selecting the optimal number of energy-efficient PMs at the cloud data center. The proposed MDVMM algorithm saves energy consumption and avoids the Service Level Agreement (SLA) violation by performing an optimal number of VMs migrations. The experimental results demonstrate that our proposed Branch-and-Price based VMs allocation with VMs migration algorithms saves more than 31% energy consumption and improves 21.7% average resource utilization over existing state-of-the-art techniques with a 95% confidence interval. The performance of the proposed approaches outperforms in terms of SLA violation, VMs migration, and Energy SLA Violation (ESV) combined metrics over existing state-of-the-art VMs allocation and migration algorithms.
  • An Efficient Detection and Classification of Plant Diseases using Deep Learning Approach

    Jagadeesan S., Deepakraj E., Ramalingam V., Venkatachalam I., Vivekanandan M., Manjula R.

    Conference paper, 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023, 2023, DOI Link

    View abstract ⏷

    Crop failure caused by disease-causing pests is an important problem. Farmers struggle with disease management and detection due to inadequate interventions. The goal is to create an automatic system to efficiently identify plant diseases from photos while reducing crop losses and increasing productivity. Machine learning algorithms offer a faster and cheaper alternative to visual inspection by experts. The main goal is to perform image analysis for early diagnosis and effective disease control. The use of CNN architecture for plant disease classification and detection offers a promising solution for plant health monitoring and risk mitigation. Given the threats to crop productivity and global food security, reliable methods for early detection and accurate classification are essential. CNNs enable efficient analysis of vast plant image databases, enabling accurate plant disease identification with speed and accuracy. The multi-layer CNN approach extracts feature and refines the representation, facilitating accurate prediction and accurate diagnosis. Transfer learning methods accelerate system development and allow adaptation to plant disease-specific databases. Combining computer vision algorithms with CNN architecture enables real-time monitoring, early disease detection and targeted intervention, reducing yield losses and improving crop management. This approach uses AI, image analysis, and plant pathology to solve the challenges of sustainable agriculture and plant diseases. System performance is measured by various performance metrics.
  • Blockchain based Secure Erlang Server for Request based Group Communication over XMPP

    Johnpaul C.I., Vivekanandan M., Premkamal P.K., Ramya R.

    Conference paper, 2023 International Conference on Advances in Intelligent Computing and Applications, AICAPS 2023, 2023, DOI Link

    View abstract ⏷

    Many real world activities in computer science scenarios are linked with concurrency and security related issues and have to handle large number of processes to be executed in parallel with false safe security solutions. There are many traditional methods in programming languages to handle concurrency. Concurrency is one of the major issues that need to be addressed by most of the servers when dealing with the group communication operations. Security of the data as well as the credibility of the users are the other aspects when a group of users involve in real-time communication. Many light-weighted servers are designed to carryout elementary operations of request handling, file sharing etc. In design of such servers having large number of clients, the request service handling will be based on the individual server programs. Keeping track of individual credibility and establishing concurrency solutions in server design is challenging. The whole work describes the significance and implementation of an Erlang based XMPP server in comparison with a Python based XMPP server with a view to service the client request handling operations for sending messages, group chatting, buddy-list creation, presence identification integrated with XML messaging pattern as per the XMPP protocol. We also accomplish the security and credibility of the users using a blockchain based interface that keep track of user activities during group communication. The security analysis is also performed for blockchain based interface.
  • Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment

    Vivekanandan M., Premkamal P.K., Johnpaul C.I., Ebinazer S.E.

    Conference paper, 2023 International Conference on Innovative Trends in Information Technology, ICITIIT 2023, 2023, DOI Link

    View abstract ⏷

    Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through cloud for smart cities, collaborative actions, remote activities based on the data at the source, etc., need to be secure and free from masquerading and tampering. In most of the cases the data is pushed into the cloud from access points, sensors, or remote access centers. Preventing the data access and identifying anonymous access to these sensors require an enhanced security mechanism that prevents the inconsistent data to be transferred to the cloud. We propose a blockchain based enhanced security system that protects the data from the access point it leaves for the cloud using a distributed ledger. The consensus mechanism ensures the trust of existing sources during the data transfer from the source to the cloud. The trust generated by the subsequent data blocks with the security hash key ensure the integrity of the data and validity of the actual source. This prevent the illegal access to the data sharing points. We have verified the degree of security offered by our proposed model using informal analysis. We found that our method has improved the security of data access.
  • BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

    Vivekanandan M., V. N S., U S.R.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    Due to the advancement of wireless technology, the Internet of Things (IoT) Device to Device communication for exchanging messages is feasible without human involvement. Authentication and identification of device location are highly essential tasks to verify the originality of IoT Devices (IoTDs) during communication via open channel. In recent days, IoTD registration is processed through the Registration Center Authority (RAC) and this may face single point of failure and insider attack. To solve these problems, we propose a Blockchain based Internet of Things (IoT) Device to Device Authentication Protocol for Smart City Applications using 5G Technology (BIDAPSCA5G). In the proposed protocol, the IoT Devices registration process is performed through private blockchain. The Blockchain has the Distributed Ledger (DL) for storing IoTD credential details, which is accessed only by authenticated entities. In the proposed protocol, mutual authentication was performed without involvement of RAC/Gate-Way-Node (GWN) to reduce the computation cost. The proposed protocol has the additional features such as location based authentication, blockchain based revocation phase and registration of IoTDs, IoTD anonymity property at device level. The security analysis of the proposed protocol was performed through formal security verification using Proverif tool, formal security analysis using Random Oracle Model (RoM) and informal security analysis. The security analysis proved that the proposed protocol is secured against well-known attacks and also it provides better performance as well as additional features when compared to existing protocols.
  • Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Srinivasulu Reddy U.

    Article, Peer-to-Peer Networking and Applications, 2021, DOI Link

    View abstract ⏷

    The development in cloud computing platforms has resulted, hosting many day-to-day service applications in the cloud. To avail the services provided by different cloud service providers (CSPs), the mobile user has to register his/her identity with the CSPs. The mobile user (MU) has to remember multiple identities and credentials to access various CSPs. Many single sign-on schemes have been proposed in the literature to eliminate multiple registrations by mobile users to access CSPs. Most of these schemes rely on a trusted third party known as Registration Authority Center (RAC), which is a centralized entity to manage the identity information of all the mobile users registered with it. The centralized RAC has two operational problems, i.e., RAC has full control over the data it possesses, resulting in the possibility of the data breach and increased risk of single-point-of-failure. In this paper, we propose a blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment, which solves these two traditional problems with centralized registration centers. In proposed protocol, the registration of MU and CSP are performed through public blockchain network for MU to access CSPs and the authentication was performed between MU and CSP through public blockchain. The public blockchain network stores MU and CSPs identity information. Public blockchain network provides integrity to the data stored in it and secures the system from single-point-of-failure. In addition, security analysis and performance analysis were also performed for proposed protocol and it showed that the proposed protocol is secure from all-known attacks with better performance efficiency.
  • MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map

    Vivekanandan M., Sastry V.N., SrinivasuluReddy U.

    Article, Telecommunication Systems, 2021, DOI Link

    View abstract ⏷

    Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud services securely is the prime concern of the mobile user. To address the user privacy issue, a secure mutual authentication protocol for mobile cloud environment using chebyshev chaotic map is proposed. The protocol provides Mutual Authentication among Cloud Service Provider (CSP) and Mobile User (MU). In our protocol, Session Key is securely generated among MU and CSP with the help of Registration Center. The proposed protocol was compared with existing ones and proven to be superior in terms of computational performance and security. Further, proposed protocol was analysed using Burrows-Abadi-Needham (BAN) logic, Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and informal security analysis. Security analysis shows that the proposed protocol can withstand all well-known attacks.
  • Biometric based User Authentication Protocol for Mobile Cloud Environment

    Vivekanandan M., Sastry V.N., Reddy U.S.

    Conference paper, ISBA 2019 - 5th IEEE International Conference on Identity, Security and Behavior Analysis, 2019, DOI Link

    View abstract ⏷

    Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo's developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password and fingerprint) and attacks for service provider impersonation. It has no provision for smart-card revocation and lacks mutual authentication. To address this-mentioned issues, we propose a novel Biometric based User Authentication Protocol for MCC. The proposed protocol supports session key agreement of participants and flawless mutual authentication. Our protocol is verified using Burrows-Abadi-Needham (BAN) logic. It further withstands all known attacks and performs well with respect to computational cost.
Contact Details

manojkumar.v@srmap.edu.in

Scholars

Doctoral Scholars

  • Ms Vasigani Jhansy Archana