Kannan Balasubramanian
Mepco Schlenk Engineering College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kannan Balasubramanian.
2014 International Conference on Communication and Network Technologies | 2014
Kannan Balasubramanian
In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.
Chemico-Biological Interactions | 2017
S. Divakar; K. Saravanan; P. Karthikeyan; R. Elancheran; S. Kabilan; Kannan Balasubramanian; Rajlakshmi Devi; Jibon Kotoky; M. Ramanathan
Treatment by androgen receptor (AR) antagonists is one of the regimens for prostate cancer. The prolonged treatment with AR antagonist leads to the expression of point mutation in the ligand binding domain of the AR. This point mutation causes resistance to AR antagonist by converting them into an agonist. The T887A mutated AR was frequently expressed in androgen independent prostate cancer (AIPC) patients. Through literature survey and molecular modelling, we have identified a novel AR antagonist having a bulky β-iminoenamine BF2 complex scaffold. The tested and standard ligands were screened in AR positive (LNCaP, MCF-7 and MDA-MB-453), AR negative (PC3), and non-cancerous (3T3) cell lines through anti-proliferation assay. The ligand, ARA3 was the most potent molecule among all the tested ligands and was 7.6 folds selective for AR positive cell lines. The mechanism of anti-prostate cancer activity of ARA3 was confirmed by western blot, qPCR, and apoptotic assays in LNCaP (T887A positive AR) cells. Structural activity relationship was derived by correlating the in-vitro and in-silico data. Consequently, we have identified the essential functional groups that could prevent the resistance concerning mutant AR. The ARA3 induces the apoptosis in AIPC cells by preventing the AR mediated activation of AKT pathway. The bicalutamide did not induce the apoptosis because it failed to prevent the AR mediated activation of AKT.
international conference on information communication and embedded systems | 2013
S. Amutha; Kannan Balasubramanian
Routing is a fundamental networking function in every communication system including wireless Ad hoc networks. Operation of the entire network can be affected by attacking the service. Such attacks can be performed easily in wireless networks due to the unsupervised access to the wireless medium. The malicious manipulation of routing messages results in the dissemination of incorrect routing information leading to network malfunction. Attacks on ad hoc network routing protocols disrupt network performance and reliability. In addition intermediate nodes can be corrupted and thus exhibit arbitrary behavior. The novel algorithm that detects internal attacks by using both message and route redundancy during route discovery. Route discovery messages are protected by pair wise secret keys between a source and destination. The routes are established by public key cryptographic mechanisms. We propose and analyze the performance of secure implementation of the existing routing protocols like Dynamic Source Routing (DSR) and Adhoc On-demand Distance Vector (AODV).
Computers & Electrical Engineering | 2017
S. Amutha; Kannan Balasubramanian
Abstract A Mobile Ad hoc network (MANET) forms a group of mobile nodes which are active and exchange messages using interconnections between the nodes. The mobile network is the new generation of wireless network and differs from the wired network in the use of power-aware routing protocols, ease of routing configuration and network infrastructure. The proposed work identifies and resolves the black hole attack and provides security to the routing protocol by using a secured energy-optimized expanding ring search (ERS) algorithm. Also, this technique reduces the energy consumption and improves the network lifetime. In addition, this work focuses on improving the packet delivery ratio (PDR), throughput and security using the advanced encryption standard (AES) cryptographic algorithm.
International Journal of Information and Computer Security | 2015
N. Narayanan Prasanth; Kannan Balasubramanian
The increasing demand for higher data rates on the internet requires routers that deliver high performance for high-speed connections. Nowadays high speed routers use the buffered crossbar switches, which have been the interest for research and commercialisation. In this paper, a study is made on the importance of buffered crossbar switches and their scheduling algorithms. Performance analysis is made for various buffered crossbar switch scheduling algorithms using non-uniform traffic patterns.
ieee international conference on emerging trends in computing communication and nanotechnology | 2013
A. R. Priyanka; Kannan Balasubramanian
Anonymous web browsing is an emerging research topic that allows anyone to surf the web privately and securely. However, research on low latency anonymity application including web browsing has received greater attention in order to preserve anonymity but it is quite impractical due to the enormous delay and extra bandwidth demand caused by the current dummy packet padding strategy against traffic analysis attacks. To overcome this problem, we propose a new packet padding strategy to replace the current dominant dummy packet padding strategy for anonymous web browsing systems. The proposed method uses prefetched pages as the cover traffic rather than the dummy packets. With the proposed model, we compared our proposal and the previous scheme in terms of the metric Anonymization Effectiveness (AE) theoretically. Moreover, we defined a metric to measure the efficiency of different padding strategies and established a mathematical model for the traffic analysis attack. Finally, the experimental results have shown that the proposed method is efficient in reducing the delay and bandwidth waste compared to that of dummy packet padding method which confirmed the potentials of the proposed strategy.
ICTACT Journal on Communication Technology | 2014
N. Narayanan Prasanth; Kannan Balasubramanian; Chithra Devi R
Archive | 2016
Kannan Balasubramanian
Archive | 2016
Kannan Balasubramanian
Archive | 2018
Kannan Balasubramanian; M. Rajakani