Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kannan Balasubramanian is active.

Publication


Featured researches published by Kannan Balasubramanian.


2014 International Conference on Communication and Network Technologies | 2014

Variants of RSA and their cryptanalysis

Kannan Balasubramanian

In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.


Chemico-Biological Interactions | 2017

Iminoenamine based novel androgen receptor antagonist exhibited anti-prostate cancer activity in androgen independent prostate cancer cells through inhibition of AKT pathway

S. Divakar; K. Saravanan; P. Karthikeyan; R. Elancheran; S. Kabilan; Kannan Balasubramanian; Rajlakshmi Devi; Jibon Kotoky; M. Ramanathan

Treatment by androgen receptor (AR) antagonists is one of the regimens for prostate cancer. The prolonged treatment with AR antagonist leads to the expression of point mutation in the ligand binding domain of the AR. This point mutation causes resistance to AR antagonist by converting them into an agonist. The T887A mutated AR was frequently expressed in androgen independent prostate cancer (AIPC) patients. Through literature survey and molecular modelling, we have identified a novel AR antagonist having a bulky β-iminoenamine BF2 complex scaffold. The tested and standard ligands were screened in AR positive (LNCaP, MCF-7 and MDA-MB-453), AR negative (PC3), and non-cancerous (3T3) cell lines through anti-proliferation assay. The ligand, ARA3 was the most potent molecule among all the tested ligands and was 7.6 folds selective for AR positive cell lines. The mechanism of anti-prostate cancer activity of ARA3 was confirmed by western blot, qPCR, and apoptotic assays in LNCaP (T887A positive AR) cells. Structural activity relationship was derived by correlating the in-vitro and in-silico data. Consequently, we have identified the essential functional groups that could prevent the resistance concerning mutant AR. The ARA3 induces the apoptosis in AIPC cells by preventing the AR mediated activation of AKT pathway. The bicalutamide did not induce the apoptosis because it failed to prevent the AR mediated activation of AKT.


international conference on information communication and embedded systems | 2013

Secure implementation of routing protocols for wireless Ad hoc networks

S. Amutha; Kannan Balasubramanian

Routing is a fundamental networking function in every communication system including wireless Ad hoc networks. Operation of the entire network can be affected by attacking the service. Such attacks can be performed easily in wireless networks due to the unsupervised access to the wireless medium. The malicious manipulation of routing messages results in the dissemination of incorrect routing information leading to network malfunction. Attacks on ad hoc network routing protocols disrupt network performance and reliability. In addition intermediate nodes can be corrupted and thus exhibit arbitrary behavior. The novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. Route discovery messages are protected by pair wise secret keys between a source and destination. The routes are established by public key cryptographic mechanisms. We propose and analyze the performance of secure implementation of the existing routing protocols like Dynamic Source Routing (DSR) and Adhoc On-demand Distance Vector (AODV).


Computers & Electrical Engineering | 2017

Secured energy optimized Ad hoc on-demand distance vector routing protocol

S. Amutha; Kannan Balasubramanian

Abstract A Mobile Ad hoc network (MANET) forms a group of mobile nodes which are active and exchange messages using interconnections between the nodes. The mobile network is the new generation of wireless network and differs from the wired network in the use of power-aware routing protocols, ease of routing configuration and network infrastructure. The proposed work identifies and resolves the black hole attack and provides security to the routing protocol by using a secured energy-optimized expanding ring search (ERS) algorithm. Also, this technique reduces the energy consumption and improves the network lifetime. In addition, this work focuses on improving the packet delivery ratio (PDR), throughput and security using the advanced encryption standard (AES) cryptographic algorithm.


International Journal of Information and Computer Security | 2015

Performance analysis of buffered crossbar switch scheduling algorithms

N. Narayanan Prasanth; Kannan Balasubramanian

The increasing demand for higher data rates on the internet requires routers that deliver high performance for high-speed connections. Nowadays high speed routers use the buffered crossbar switches, which have been the interest for research and commercialisation. In this paper, a study is made on the importance of buffered crossbar switches and their scheduling algorithms. Performance analysis is made for various buffered crossbar switch scheduling algorithms using non-uniform traffic patterns.


ieee international conference on emerging trends in computing communication and nanotechnology | 2013

Efficient anonymous web browsing preventing traffic analysis attacks

A. R. Priyanka; Kannan Balasubramanian

Anonymous web browsing is an emerging research topic that allows anyone to surf the web privately and securely. However, research on low latency anonymity application including web browsing has received greater attention in order to preserve anonymity but it is quite impractical due to the enormous delay and extra bandwidth demand caused by the current dummy packet padding strategy against traffic analysis attacks. To overcome this problem, we propose a new packet padding strategy to replace the current dominant dummy packet padding strategy for anonymous web browsing systems. The proposed method uses prefetched pages as the cover traffic rather than the dummy packets. With the proposed model, we compared our proposal and the previous scheme in terms of the metric Anonymization Effectiveness (AE) theoretically. Moreover, we defined a metric to measure the efficiency of different padding strategies and established a mathematical model for the traffic analysis attack. Finally, the experimental results have shown that the proposed method is efficient in reducing the delay and bandwidth waste compared to that of dummy packet padding method which confirmed the potentials of the proposed strategy.


ICTACT Journal on Communication Technology | 2014

PRIORITIZED QUEUE WITH ROUND ROBIN SCHEDULER FOR BUFFERED CROSSBAR SWITCHES

N. Narayanan Prasanth; Kannan Balasubramanian; Chithra Devi R


Archive | 2016

Threats and Attacks on E-Commerce Sites

Kannan Balasubramanian


Archive | 2016

Web Application Vulnerabilities and Their Countermeasures

Kannan Balasubramanian


Archive | 2018

Security of Identity-Based Encryption Algorithms

Kannan Balasubramanian; M. Rajakani

Collaboration


Dive into the Kannan Balasubramanian's collaboration.

Top Co-Authors

Avatar

M. Rajakani

Mepco Schlenk Engineering College

View shared research outputs
Top Co-Authors

Avatar

Ahmed Mahmoud Abbas

American University in Cairo

View shared research outputs
Top Co-Authors

Avatar

Jayanthi Mathanan

Mepco Schlenk Engineering College

View shared research outputs
Top Co-Authors

Avatar

K Mala

Mepco Schlenk Engineering College

View shared research outputs
Top Co-Authors

Avatar

N. Narayanan Prasanth

National College of Engineering

View shared research outputs
Top Co-Authors

Avatar

A. R. Priyanka

Mepco Schlenk Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jibon Kotoky

Life Sciences Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge