Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Naveen Chilamkurti is active.

Publication


Featured researches published by Naveen Chilamkurti.


Journal of Molecular Biology | 2016

ExoCarta: A Web-Based Compendium of Exosomal Cargo

Shivakumar Keerthikumar; David Chisanga; Dinuka Ariyaratne; Haidar Al Saffar; Sushma Anand; Kening Zhao; Monisha Samuel; Mohashin Pathan; Markandeya Jois; Naveen Chilamkurti; Lahiru Gangoda; Suresh Mathivanan

Exosomes are membranous vesicles that are released by a variety of cells into the extracellular microenvironment and are implicated in intercellular communication. As exosomes contain RNA, proteins and lipids, there is a significant interest in characterizing the molecular cargo of exosomes. Here, we describe ExoCarta (http://www.exocarta.org), a manually curated Web-based compendium of exosomal proteins, RNAs and lipids. Since its inception, the database has been highly accessed (>54,000 visitors from 135 countries). The current version of ExoCarta hosts 41,860 proteins, >7540 RNA and 1116 lipid molecules from more than 286 exosomal studies annotated with International Society for Extracellular Vesicles minimal experimental requirements for definition of extracellular vesicles. Besides, ExoCarta features dynamic protein-protein interaction networks and biological pathways of exosomal proteins. Users can download most often identified exosomal proteins based on the number of studies. The downloaded files can further be imported directly into FunRich (http://www.funrich.org) tool for additional functional enrichment and interaction network analysis.


Journal of Sensors | 2009

Cross-layer support for energy efficient routing in wireless sensor networks

Naveen Chilamkurti; Sherali Zeadally; Athanassios V. Vasilakos; Vikas. Sharma

The Dynamic Source Routing (DSR) algorithm computes a new route when packet loss occurs. DSR does not have an in-built mechanism to determine whether the packet loss was the result of congestion or node failure causing DSR to compute a new route. This leads to inefficient energy utilization when DSR is used in wireless sensor networks. In this work, we exploit cross-layer optimization techniques that extend DSR to improve its routing energy efficiency by minimizing the frequency of recomputed routes. Our proposed approach enables DSR to initiate a route discovery only when link failure occurs. We conducted extensive simulations to evaluate the performance of our proposed cross-layer DSR routing protocol. The simulation results obtained with our extended DSR routing protocol show that the frequency with which new routes are recomputed is 50% lower compared with the traditional DSR protocol. This improvement is attributed to the fact that, with our proposed cross-layer DSR, we distinguish between congestion and link failure conditions, and new routes are recalculated only for the latter.


Information Sciences | 2015

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

Debiao He; Neeraj Kumar; Naveen Chilamkurti

With an advancement of wireless communication technology, wireless sensor network (WSN) has emerged as one of the most powerful technologies which can be used in various applications, such as military surveillance, environment monitoring, industrial control, and medical monitoring. WSNs are vulnerable to large collection of attacks than traditional networks because they transmit data using a wireless channel and are deployed in unattended environments. So, in this environment, how to ensure secure communications between different communication parties becomes a challenging issue with respect to the constraints of energy consumption, and large overhead generated during various operations performed. In this direction, the mutual authentication and key agreement (MAAKA) scheme attracts much attention in recent years. In literature, MAAKA schemes were presented in last several years. However, most of these schemes cannot satisfy security requirements in WSNs. Recently, Xue et al. proposed a temporal-credential-based MAAKA scheme for WSNs and proved that it could withstand various types of attacks. However, this paper points out that Xue et al.s MAAKA scheme is vulnerable to the off-line password guessing attack, the user impersonation attack, the sensor node impersonation attack and the modification attack. Moreover, this paper also points out that Xue et al.s MAAKA scheme cannot provide user anonymity. To overcome weaknesses in Xue et al.s MAAKA scheme, this paper proposes a new temporal-credential-based MAAKA scheme for WSNs. Security analysis shows the proposed MAAKA scheme could overcome the weaknesses in Xue et al.s MAAKA scheme. Performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature. Therefore, the proposed MAAKA scheme is more suitable for providing security for various applications in WSNs.


The Journal of Supercomputing | 2012

Energy-efficient networking: past, present, and future

Sherali Zeadally; Samee Ullah Khan; Naveen Chilamkurti

The twenty-first century has witnessed major technological changes that have transformed the way we live, work, and interact with one another. One of the major technology enablers responsible for this remarkable transformation in our global society is the deployment and use of Information and Communication Technology (ICT) equipment. In fact, today ICT has become highly integrated in our society that includes the dependence on ICT of various sectors, such as business, transportation, education, and the economy to the point that we now almost completely depend on it. Over the last few years, the energy consumption resulting from the usage of ICT equipment and its impact on the environment have fueled a lot of interests among researchers, designers, manufacturers, policy makers, and educators. We present some of the motivations driving the need for energy-efficient communications. We describe and discuss some of the recent techniques and solutions that have been proposed to minimize energy consumption by communication devices, protocols, networks, end-user systems, and data centers. In addition, we highlight a few emerging trends and we also identify some challenges that need to be addressed to enable novel, scalable, cost-effective energy-efficient communications in the future.


IEEE Transactions on Vehicular Technology | 2012

Performance Analysis of PMIPv6-Based NEtwork MObility for Intelligent Transportation Systems

Jong-Hyouk Lee; Thierry Ernst; Naveen Chilamkurti

While host mobility support for individual mobile hosts (MHs) has been widely investigated and developed over the past years, there has been relatively less attention to NEtwork MObility (NEMO). Since NEMO Basic Support (NEMO-BS) was developed, it has been the central pillar in Intelligent Transport Systems (ITS) communication architectures for maintaining the vehicles Internet connectivity. As the vehicle moves around, it attaches to a new access network and is required to register a new address obtained from the new access network to a home agent (HA). This location update of NEMO-BS often results in unacceptable long handover latency and increased traffic load to the vehicle. To address these issues, in this paper, we introduce new NEMO support protocols, which rely on mobility service provisioning entities introduced in Proxy Mobile IPv6 (PMIPv6), as possible mobility support protocols for ITS. As a base protocol, we present PMIPv6-based NEMO (P-NEMO) to maintain the vehicles Internet connectivity while moving and without participating in the location update management. In P-NEMO, the mobility management for the vehicle is supported by mobility service provisioning entities residing in a given PMIPv6 domain. To further improve handover performance, fast P-NEMO (FP-NEMO) has been developed as an extension protocol. FP-NEMO utilizes wireless L2 events to anticipate the vehicles handovers. The mobility service provisioning entities prepare the vehicles handover prior to the attachment of the vehicle to the new access network. Detailed handover procedures for P-NEMO and FP-NEMO are provided, and handover timing diagrams are presented to evaluate the performance of the proposed protocols. P-NEMO and FP-NEMO are compared with NEMO-BS in terms of traffic cost and handover latency.


Telecommunication Systems | 2009

An adaptive cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e WLAN

Cheng-Han Lin; Ce-Kuen Shieh; Chih-Heng Ke; Naveen Chilamkurti; Sherali Zeadally

This paper proposes an adaptive cross-layer mapping algorithm to improve the transmission quality of MPEG-4 video stream over an IEEE 802.11e wireless network. Instead of classifying video data to a specific access category in an 802.11e network, we propose an algorithm that dynamically maps MPEG-4 video packets to appropriate access categories according to both the significance of the video data and the network traffic load. Our proposed cross-layer architecture passes information about the significance of video packets from the application layer to the media access control layer. The queue length of a specific access category is used to deduce the network traffic load. We conducted a performance evaluation of our proposed cross-layer approach under both light and heavily loaded network conditions. Our simulation results demonstrate: (a) superior performance of our proposed approach (under both light and heavy loads) over 802.11e (Enhanced Distributed Channel Access (EDCA) and static mapping schemes, (b) not only guarantees prioritized transmission of essential video data but also provides efficient queue length utilization.


advanced information networking and applications | 2006

The Packet Loss Effect on MPEG Video Transmission in Wireless Networks

Cheng-Han Lin; Chih-Heng Ke; Ce-Kuen Shieh; Naveen Chilamkurti

The purpose of this paper is to study the packet loss effect on MPEG video transmission quality in wireless networks. First, we consider the distribution of packet losses in wireless network, including distributed and burst packet losses. Besides, we also discuss the additional packet drops by the play-out buffer at the received end, and the effect of the transmission packet size on the video delivered quality. From the results, we find that the effect of burst packet losses on the video delivered quality is less than distributed packet losses in the same packet loss rate. Moreover, the smaller size of the play-out buffer leads to more packet drops and worse video quality. Finally, if there is no video recovery for video transmission, the video delivered quality of the larger packet size will be better than smaller packet size


Iet Communications | 2010

Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment

Ming-Fong Tsai; Naveen Chilamkurti; Jong Hyuk Park; Ce-Kuen Shieh

These days, a wide variety of wireless interfaces are available to connect to Internet. When coverage area of these different technologies overlap, receiver equipped with multiple interfaces can use them simultaneously to improve the performance of its applications in terms of bandwidth rely on bandwidth aggregation. However, specific conditions such as bottleneck bandwidth and end-to-end delay need to be accounted for before using such techniques. If this problem of end-to-end delay and bottleneck bandwidth are not properly addressed, there may be many packets along multiple paths which can arrive late and can lead to a large number of out-of-order packets at the receiver, which can eventually cause serious degradation of video quality at the receiver. For this reason, in this study, the authors propose a multi-path transmission control scheme (MTCS) combining bandwidth aggregation and packet scheduling for real-time streaming in a multi-path environment. In a bandwidth aggregation scheme, the authors propose a mathematical model to find the transmission rate over each path in order to obtain the optimal total throughput. However, the end-to-end delay of each path is not the same. The out-of-order packets problem will become serious in a multi-path environment. Therefore the authors propose a packet scheduling scheme to arrange the transmission sequence in order to effectively minimise the impact of packet reordering at the receiver. Our proposed control scheme not only aggregates the available bandwidth of multiple paths, but also reduces the time of packet reordering at the receiver. Experimental results show with our proposed scheme, the authors not only obtain the optimal transmission throughput but also reduce packet reordering delays under varying drop and delay conditions caused by the underlying network.


Computers & Electrical Engineering | 2014

Collaborative trust aware intelligent intrusion detection in VANETs

Neeraj Kumar; Naveen Chilamkurti

Trust aware Collaborative Learning Automata based Intrusion Detection System (T-CLAIDS) for VANETs is proposed in this paper. Learning Automata (LA) are assumed to be deployed on vehicles in the network to capture the information about the different states of the vehicles on the road. A Markov Chain Model (MCM) is constructed for representation of states and their transitions in the network. Transitions from one state to other are dependent upon the density of the vehicles in a particular region. A new classifier is designed for detection of any malicious activity in the network and is tuned based upon the new parameter called as Collaborative Trust Index (CTI) so that it covers all possible types of attacks in the network. An algorithm for detection of abnormal events using the defined classifier is also proposed. The results obtained show that T-CLAIDS performs better than the other existing schemes with respect to parameters such as false alarm ratio, detection ratio and overhead generated.


Journal of Medical Systems | 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

Debiao He; Neeraj Kumar; Naveen Chilamkurti; Jong-Hyouk Lee

The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

Collaboration


Dive into the Naveen Chilamkurti's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ce-Kuen Shieh

College of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chih-Heng Ke

National Quemoy University

View shared research outputs
Top Co-Authors

Avatar

Ming-Fong Tsai

National Cheng Kung University

View shared research outputs
Top Co-Authors

Avatar

Anand Paul

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Alfred Daniel

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge