Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where K. P. Subbalakshmi is active.

Publication


Featured researches published by K. P. Subbalakshmi.


IEEE Transactions on Mobile Computing | 2007

Dynamic Spectrum Access with QoS and Interference Temperature Constraints

Yiping Xing; Chetan Nanjunda Mathur; Mohamed A. Haleem; Rajarathnam Chandramouli; K. P. Subbalakshmi

Spectrum is one of the most precious radio resources. With the increasing demand for wireless communication, efficiently using the spectrum resource has become an essential issue. With the Federal Communications Commissions (FCC) spectrum policy reform, secondary spectrum sharing has gained increasing interest. One of the policy reforms introduces the concept of an interference temperature - the total allowable interference in a spectral band. This means that secondary users can use different transmit powers as long as the sum of these power is less than the interference threshold. In this paper, we study two problems in secondary spectrum access with minimum signal to interference noise ratio (quality of service (QoS)) guarantee under an interference temperature constraint. First, when all the secondary links can be supported, a nonlinear optimization problem with the objective to maximize the total transmitting rate of the secondary users is formulated. The nonlinear optimization is solved efficiently using geometric programming techniques. The second problem we address is, when not all the secondary links can be supported with their QoS requirement, it is desirable to have the spectrum access opportunity proportional to the user priority if they belong to different priority classes. In this context, we formulate an operator problem which takes the priority issues into consideration. To solve this problem, first, we propose a centralized reduced complexity search algorithm to find the optimal solution. Then, in order to solve this problem distributively, we define a secondary spectrum sharing potential game. The Nash equilibria of this potential game are investigated. The efficiency of the Nash equilibria solutions are characterized. It is shown that distributed sequential play and an algorithm based on stochastic learning attain the equilibrium solutions. Finally, the performances are examined through simulations


2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks | 2008

An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks

Santhanakrishnan Anand; Zituo Jin; K. P. Subbalakshmi

In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fentons approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.


IEEE Transactions on Multimedia | 2008

Cryptanalysis of Some Multimedia Encryption Schemes

Goce Jakimoski; K. P. Subbalakshmi

Encryption is one of the fundamental technologies that is used in digital rights management. Unlike ordinary computer applications, multimedia applications generate large amounts of data that has to be processed in real time. So, a number of encryption schemes for multimedia applications have been proposed in recent years. We analyze the following proposed methods for multimedia encryption: key-based multiple Huffman tables (MHT), arithmetic coding with key-based interval splitting (KSAC), and randomized arithmetic coding (RAC). Our analysis shows that MHT and KSAC are vulnerable to low complexity known- and/or chosen-plaintext attacks. Although we do not provide any attacks on RAC, we point out some disadvantages of RAC over the classical compress-then-encrypt approach.


international conference on communications | 2009

Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks

Zituo Jin; Santhanakrishnan Anand; K. P. Subbalakshmi

In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with dedicated sensor networks. We present an analysis using Fentons approximation and Walds sequential probability ratio test (WSPRT) to detect PUEA. Simulation results demonstrate that it is possible to keep the probability of success of PUEA low, while still keeping the probability of missing the return of the primary low as well.


Digital Investigation | 2011

Author gender identification from text

Na Cheng; Rajarathnam Chandramouli; K. P. Subbalakshmi

Text is still the most prevalent Internet media type. Examples of this include popular social networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications such as e-mail, blog, chat rooms, etc. are also mostly text based. A question we address in this paper that deals with text based Internet forensics is the following: given a short text document, can we identify if the author is a man or a woman? This question is motivated by recent events where people faked their gender on the Internet. Note that this is different from the authorship attribution problem. In this paper we investigate author gender identification for short length, multi-genre, content-free text, such as the ones found in many Internet applications. Fundamental questions we ask are: do men and women inherently use different classes of language styles? If this is true, what are good linguistic features that indicate gender? Based on research in human psychology, we propose 545 psycho-linguistic and gender-preferential cues along with stylometric features to build the feature space for this identification problem. Note that identifying the correct set of features that indicate gender is an open research problem. Three machine learning algorithms (support vector machine, Bayesian logistic regression and AdaBoost decision tree) are then designed for gender identification based on the proposed features. Extensive experiments on large text corpora (Reuters Corpus Volume 1 newsgroup data and Enron e-mail data) indicate an accuracy up to 85.1% in identifying the gender. Experiments also indicate that function words, word-based features and structural features are significant gender discriminators.


ACM Transactions on Information and System Security | 2006

Battery power-aware encryption

Rajarathnam Chandramouli; Satish Bapatla; K. P. Subbalakshmi; R. N. Uma

Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.


Mobile Computing and Communications Review | 2009

Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing

Zituo Jin; Santhanakrishnan Anand; K. P. Subbalakshmi

We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Walds sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies available in the literature to study PUEA in the presence of multiple malicious users in fading wireless environments. We present an NPCHT and WSPRT based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that there is a range of network radii in which PUEA are most successful. Results also show that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful PUEA 50% less than that obtained by NPCHT.


IEEE Communications Magazine | 2013

Open research issues in multi-hop cognitive radio networks

Shamik Sengupta; K. P. Subbalakshmi

Cognitive radio networks hold the key to achieving better radio bandwidth utilization and improving the quality of wireless applications. The next step in this fast emerging paradigm is the multi-hop cognitive radio network. Well designed multi-hop cognitive radio networks can provide high bandwidth efficiency by using dynamic spectrum access technologies as well as provide extended coverage and ubiquitous connectivity for the wireless end users. However, the special features of multi-hop cognitive radio networks also raise several unique design challenges. In this article, we survey these unique challenges and open research issues in the design of multi-hop cognitive radio networks as well as discuss potential approaches to address these challenges. This article specifically focuses on the medium access control (MAC) and network layers of the multi-hop cognitive radio protocol stack. Issues considered include efficient spectrum sharing, optimal relay node selection, interference mitigation, end-to-end delay, etc.


consumer communications and networking conference | 2007

Digital Signatures for Centralized DSA Networks

Chetan Nanjunda Mathur; K. P. Subbalakshmi

Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.


IEEE Transactions on Communications | 2001

On the joint source-channel decoding of variable-length encoded sources: the BSC case

K. P. Subbalakshmi; Jacques Vaisey

This paper proposes an optimal maximum a posteriori probability decoder for variable-length encoded sources over binary symmetric channels (BSC) that uses a novel state-space to deal with the problem of variable-length source codes in the decoder. This sequential, finite-delay, joint source-channel decoder delivers substantial improvements over the conventional decoder and also over a system that uses a standard forward error correcting code operating at the same over all bit rates. This decoder is also robust to inaccuracies in the estimation of channel statistics.

Collaboration


Dive into the K. P. Subbalakshmi's collaboration.

Top Co-Authors

Avatar

Rajarathnam Chandramouli

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chetan Nanjunda Mathur

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Santhanakrishnan Anand

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

R. Chandramouli

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed A. Haleem

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaoling Chen

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ning Liu

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Palak K. Amin

Stevens Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yi Tan

Stevens Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge