K. P. Subbalakshmi
Stevens Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by K. P. Subbalakshmi.
IEEE Transactions on Mobile Computing | 2007
Yiping Xing; Chetan Nanjunda Mathur; Mohamed A. Haleem; Rajarathnam Chandramouli; K. P. Subbalakshmi
Spectrum is one of the most precious radio resources. With the increasing demand for wireless communication, efficiently using the spectrum resource has become an essential issue. With the Federal Communications Commissions (FCC) spectrum policy reform, secondary spectrum sharing has gained increasing interest. One of the policy reforms introduces the concept of an interference temperature - the total allowable interference in a spectral band. This means that secondary users can use different transmit powers as long as the sum of these power is less than the interference threshold. In this paper, we study two problems in secondary spectrum access with minimum signal to interference noise ratio (quality of service (QoS)) guarantee under an interference temperature constraint. First, when all the secondary links can be supported, a nonlinear optimization problem with the objective to maximize the total transmitting rate of the secondary users is formulated. The nonlinear optimization is solved efficiently using geometric programming techniques. The second problem we address is, when not all the secondary links can be supported with their QoS requirement, it is desirable to have the spectrum access opportunity proportional to the user priority if they belong to different priority classes. In this context, we formulate an operator problem which takes the priority issues into consideration. To solve this problem, first, we propose a centralized reduced complexity search algorithm to find the optimal solution. Then, in order to solve this problem distributively, we define a secondary spectrum sharing potential game. The Nash equilibria of this potential game are investigated. The efficiency of the Nash equilibria solutions are characterized. It is shown that distributed sequential play and an algorithm based on stochastic learning attain the equilibrium solutions. Finally, the performances are examined through simulations
2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks | 2008
Santhanakrishnan Anand; Zituo Jin; K. P. Subbalakshmi
In this paper, we study the denial-of-service (DoS) attack on secondary users in a cognitive radio network by primary user emulation (PUE). Most approaches in the literature on primary user emulation attacks (PUEA) discuss mechanisms to deal with the attacks but not analytical models. Simulation studies and results from test beds have been presented but no analytical model relating the various parameters that could cause a PUE attack has been proposed and studied. We propose an analytical approach based on Fentons approximation and Markov inequality and obtain a lower bound on the probability of a successful PUEA on a secondary user by a set of co-operating malicious users. We consider a fading wireless environment and discuss the various parameters that can affect the feasibility of a PUEA. We show that the probability of a successful PUEA increases with the distance between the primary transmitter and secondary users. This is the first analytical treatment to study the feasibility of a PUEA.
IEEE Transactions on Multimedia | 2008
Goce Jakimoski; K. P. Subbalakshmi
Encryption is one of the fundamental technologies that is used in digital rights management. Unlike ordinary computer applications, multimedia applications generate large amounts of data that has to be processed in real time. So, a number of encryption schemes for multimedia applications have been proposed in recent years. We analyze the following proposed methods for multimedia encryption: key-based multiple Huffman tables (MHT), arithmetic coding with key-based interval splitting (KSAC), and randomized arithmetic coding (RAC). Our analysis shows that MHT and KSAC are vulnerable to low complexity known- and/or chosen-plaintext attacks. Although we do not provide any attacks on RAC, we point out some disadvantages of RAC over the classical compress-then-encrypt approach.
international conference on communications | 2009
Zituo Jin; Santhanakrishnan Anand; K. P. Subbalakshmi
In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) networks. In particular, we analyze primary user emulation attacks (PUEA) in cognitive radio networks without using any location information and therefore can do away with dedicated sensor networks. We present an analysis using Fentons approximation and Walds sequential probability ratio test (WSPRT) to detect PUEA. Simulation results demonstrate that it is possible to keep the probability of success of PUEA low, while still keeping the probability of missing the return of the primary low as well.
Digital Investigation | 2011
Na Cheng; Rajarathnam Chandramouli; K. P. Subbalakshmi
Text is still the most prevalent Internet media type. Examples of this include popular social networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications such as e-mail, blog, chat rooms, etc. are also mostly text based. A question we address in this paper that deals with text based Internet forensics is the following: given a short text document, can we identify if the author is a man or a woman? This question is motivated by recent events where people faked their gender on the Internet. Note that this is different from the authorship attribution problem. In this paper we investigate author gender identification for short length, multi-genre, content-free text, such as the ones found in many Internet applications. Fundamental questions we ask are: do men and women inherently use different classes of language styles? If this is true, what are good linguistic features that indicate gender? Based on research in human psychology, we propose 545 psycho-linguistic and gender-preferential cues along with stylometric features to build the feature space for this identification problem. Note that identifying the correct set of features that indicate gender is an open research problem. Three machine learning algorithms (support vector machine, Bayesian logistic regression and AdaBoost decision tree) are then designed for gender identification based on the proposed features. Extensive experiments on large text corpora (Reuters Corpus Volume 1 newsgroup data and Enron e-mail data) indicate an accuracy up to 85.1% in identifying the gender. Experiments also indicate that function words, word-based features and structural features are significant gender discriminators.
ACM Transactions on Information and System Security | 2006
Rajarathnam Chandramouli; Satish Bapatla; K. P. Subbalakshmi; R. N. Uma
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
Mobile Computing and Communications Review | 2009
Zituo Jin; Santhanakrishnan Anand; K. P. Subbalakshmi
We present a Neyman-Pearson composite hypothesis test (NPCHT) and a Walds sequential probability ratio test (WSPRT) to detect primary user emulation attacks (PUEA) in cognitive radio networks. Most approaches in the literature on PUEA assume the presence of underlying sensor networks for localization of the malicious nodes. There are no analytical studies available in the literature to study PUEA in the presence of multiple malicious users in fading wireless environments. We present an NPCHT and WSPRT based analysis to detect PUEA in fading wireless channels in the presence of multiple randomly located malicious users. We show that there is a range of network radii in which PUEA are most successful. Results also show that for the same desired threshold on the probability of missing the primary, WSPRT can achieve a probability of successful PUEA 50% less than that obtained by NPCHT.
IEEE Communications Magazine | 2013
Shamik Sengupta; K. P. Subbalakshmi
Cognitive radio networks hold the key to achieving better radio bandwidth utilization and improving the quality of wireless applications. The next step in this fast emerging paradigm is the multi-hop cognitive radio network. Well designed multi-hop cognitive radio networks can provide high bandwidth efficiency by using dynamic spectrum access technologies as well as provide extended coverage and ubiquitous connectivity for the wireless end users. However, the special features of multi-hop cognitive radio networks also raise several unique design challenges. In this article, we survey these unique challenges and open research issues in the design of multi-hop cognitive radio networks as well as discuss potential approaches to address these challenges. This article specifically focuses on the medium access control (MAC) and network layers of the multi-hop cognitive radio protocol stack. Issues considered include efficient spectrum sharing, optimal relay node selection, interference mitigation, end-to-end delay, etc.
consumer communications and networking conference | 2007
Chetan Nanjunda Mathur; K. P. Subbalakshmi
Over the past few years there has been a growing demand for radio resources and at the same time these resources are under utilized due to static spectrum allocation techniques. Dynamic spectrum access (DSA) has been thought of as a solution that would satisfy both the growing demand for radio resources and to efficiently utilize the spectrum. The radio devices that have the capability to dynamically sense the spectrum and access the under utilized bands are called cognitive radios (CR). There are two broad classes of users in CR, the primary user is a licensed user of a particular radio frequency band and the secondary users are unlicensed users who cognitively operate without causing harmful interference to the primary user. In this paper we consider a denial attack on centralized DSA networks where a malicious secondary user masquerades as a primary user and effectively shuts off access to all other secondary users. Note that this problem is unique to CR due to the distinction between primary and secondary users. We propose a public key cryptography based primary user identification mechanism that prevents malicious secondary users from masquerading as primary users. We show that the proposed identification mechanism and the associated key management are computationally light weight. We also discuss some advantages and limitations of the proposed identification mechanism.
IEEE Transactions on Communications | 2001
K. P. Subbalakshmi; Jacques Vaisey
This paper proposes an optimal maximum a posteriori probability decoder for variable-length encoded sources over binary symmetric channels (BSC) that uses a novel state-space to deal with the problem of variable-length source codes in the decoder. This sequential, finite-delay, joint source-channel decoder delivers substantial improvements over the conventional decoder and also over a system that uses a standard forward error correcting code operating at the same over all bit rates. This decoder is also robust to inaccuracies in the estimation of channel statistics.