Ravi Kishore Kodali
National Institute of Technology, Warangal
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ravi Kishore Kodali.
international conference on computer communication and informatics | 2013
Ravi Kishore Kodali; Narasimha Sarma
Wireless sensor networks (WSNs) rely on various resource constrained nodes with limited energy, range, memory and computational power it is necessary to conserve battery energy so as to extend the life time of the given WSN deployment. In any WSN application measured data is gathered at regular intervals and the same is sent to the Base station (BS) by using neighbouring nodes. By forming clusters of nodes in the WSN, the measured data from the nodes can be aggregated and the aggregated value can be sent towards the BS instead of sending every measurement value and thereby reducing energy consumed by the nodes [5]. By adopting hierarchical routing protocols, it is possible to reduce energy consumption considerably. The basic LEACH based data aggregation approach is extended further for improved energy efficiency. This work deal with two different second-level hierarchical protocols, namely, Two-level LEACH(TL-LEACH) and Directed Diffusion LEACH (DD-LEACH) and a comparison of the same.
Archive | 2014
Ravi Kishore Kodali; N. V. S. N. Sarma
Elliptic curve cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie–Hellman (DH) key exchange algorithm. This work presents an implementation of ECC encryption making use of the DH key exchange algorithm. Encryption and decryption of text messages have also been attempted. In ECC, we normally start with mapping a character of message to an affine point on the elliptic curve, which is called encoding. A comparison of the proposed algorithm and Koblitz’s method shows that the proposed algorithm is as secure as Koblitz’s encoding and has less computational complexity due to the elimination of encoding, thereby improving energy efficiency of the crypto-system to be used in resource constrained applications, such as wireless sensor networks (WSNs). It is almost infeasible to attempt a brute force attack. The security strength of the algorithm is proportional to key length. As the key length increases, the data that can be sent at a time also increase.
international conference on computing communication and automation | 2016
Ravi Kishore Kodali; Vishal Jain; Suvadeep Bose; Lakshmi Boppana
Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation by making use of the same set of sensors. The leverage obtained by prefering this system over the similar kinds of existing systems is that the alerts and the status sent by the wifi connected microcontroller managed system can be received by the user on his phone from any distance irrespective of whether his mobile phone is connected to the internet. The microcontroller used in the current prototype is the TI-CC3200 Launchpad board which comes with an embedded micro-controller and an onboard Wi-Fi shield making use of which all the elctrical appliances inside the home can be controlled and managed.
communication systems and networks | 2014
Ravi Kishore Kodali
With ever growing demand for Wireless Sensor Networks (WSNs) in military and commercial application areas, the urge for secure data exchange over the network is also on the increase. The standard cryptographic algorithms, such as the RSA can not address the security issue due to its computational complexity and the resource constrained nature of the constituent nodes. Another public key cryptographic (PKC) algorithm, Elliptic curve cryptography (ECC) has been emerging as a promising alternative to be used in WSN nodes, as it is capable of providing a similar security level using smaller key length compared to that of the RSA. As WSN nodes are deployed randomly over the field, these nodes are more vulnerable to the man-in-middle (MIM) attack. In traditional ECC algorithm, the Generator point is published along with other domain parameters. An intruder, launching MIM attack, could crack the public key, leading to a security breach in the network. This work proposes a technique for ECC with a hidden generator point in order to overcome the MIM attack. Three different algorithms based on distribution of points on the elliptic cure (EC), using a different generator point for each encrypted message and selecting different generator points for each session are discussed. A comparison based on the computational cost and security for three different techniques is also presented.
international conference on computer communication and informatics | 2013
Ravi Kishore Kodali; Harpreet Singh Budwal
Wireless Sensor Networks (WSNs) are being widely used in various civilian and military applications. In certain WSN applications, the data among the nodes and the Base Station (BS), needs to be exchanged in a secure manner. The encryption and decryption operations over the data involve additional energy overhead. Hence, it is required to use a security model, which offers security with less computational requirements, as WSN nodes have resource constraints. Elliptic curve cryptography (ECC), a public key cryptographic system, has lesser key size requirements in comparison with RSA algorithm. ECC has been gaining acceptance as another alternative to RSA. In ECC, scalar multiplication accounts for about 80 % of the key calculation time [1]. This work presents an optimized Sliding Window method with 1s complement technique for scalar multiplication. The same is also compared with two other methods of scalar multiplication, Binary Method and Non-Adjacent Form (NAF) method.
international conference on signal processing | 2015
Ravi Kishore Kodali; Lakshmi Boppana; Sai Sourabh Yenamachintala
Most of the scientific operation involve floating point computations. It is necessary to implement faster multipliers occupying less area and consuming less power. Multipliers play a critical role in any digital design. Even though various multiplication algorithms have been in use, the performance of Vedic multipliers has not drawn a wider attention. Vedic mathematics involves application of 16 sutras or algorithms. One among these, the Urdhva tiryakbhyam sutra for multiplication has been considered in this work. An IEEE-754 based Vedic multiplier has been developed to carry out both single precision and double precision format floating point operations and its performance has been compared with Booth and Karatsuba based floating point multipliers. Xilinx FPGA has been made use of while implementing these algorithms and a resource utilization and timing performance based comparison has also been made.
2013 International Conference on Control Communication and Computing (ICCC) | 2013
Ravi Kishore Kodali
Wireless sensor networks (WSNs) have been finding their application in diversified fields. Certain WSN applications used in military and commercial fields require the data communication within the network to be secure and confidentiality of the data needs to be maintained. Any WSN security model requires key services, authentication and integrity. As WSN nodes are resource constrained, in terms of limited battery energy and less CPU capabilities, energy efficient crypto-algorithms need to be chosen. Elliptic curve (EC) based algorithms have proven to be computationally efficient and provide the same security level when compared with traditional crypto-algorithms for the given key size. This work provides implementation details of ECDSA, making use of the low-cost SHA-1. The WSN implementation of SHA-1 involves 8-bit operations as the IRIS node supports an 8- bit micro-controller. The SHA-1 and ECDSA algorithms have been implemented using IRIS WSN node.
ieee recent advances in intelligent computational systems | 2015
Ravi Kishore Kodali; Govinda Swamy; B. Lakshmi
Internet of Things (IoT) is a computing process, where each physical object is equipped with sensors, microcontrollers and transceivers for empowering communication and is built with suitable protocol stacks which help them interacting with each other and communicating with the users. In IoT based healthcare, diverse distributed devices aggregate, analyse and communicate real time medical information to the cloud, thus making it possible to collect, store and analyse the large amount of data in several new forms and activate context based alarms. This novel information acquisition paradigm allows continuous and ubiquitous medical information access from any connected device over the Internet. As each one of the devices used in IoT are limited in battery power, it is optimal to minimise the power consumption to enhance the life of the healthcare system. This work explains the implementation of an IoT based In-hospital healthcare system using ZigBee mesh protocol. The healthcare system implementation can periodically monitor the physiological parameters of the In-hospital patients. Thus, IoT empowered devices simultaneously enhance the quality of care with regular monitoring and reduce the cost of care and actively engage in data collection and analysis of the same.
advances in computing and communications | 2015
Ravi Kishore Kodali; A Venkata Sai Kiran; Shikha Bhandari; Lakshmi Boppana
Wireless Sensor Networks (WSNs) comprise of large number of sensor nodes, which sense and measure various physical phenomena related parameters and transmit the measured data towards the base station by making use of the neighbouring nodes acting as relay nodes. In order to extend the lifetime of a WSN application, it is necessary to distribute the energy dissipated among the nodes evenly in the network and improve the overall system performance. The lifetime of network depends on the underlying routing protocol. This paper presents various energy-efficient routing protocols being widely used. A performance comparison of direct transmission protocol, MTE protocol and LEACH protocol and improved LEACH and multi-level LEACH protocols like MLEACH protocol, DD-LEACH protocol and TL-LEACH protocol is presented. This work also proposes an energy efficient and improved multi-level LEACH protocol and DD-TL-LEACH protocol. For the purpose of simulation analysis, the NS-3 simulation platform has been made use of.
international conference on advanced computing | 2013
Ravi Kishore Kodali; Lakshmi Bopppana; Seetarami Reddy Kondapalli
This paper elucidates on the different types of filters used for DDC and DUC conversions. They constitute the most crucial functions in the implementation of SDR. The paper also further discusses filters from the point of view of its usage on different USRP platforms like USRPB100 and USRPN210 along with their respective analysis for interpolation and decimation operations. A comparative study of CIC, RRC and Half band filters on the basis of its computational requirements and magnitude responses is carried out.