Marimuthu Karuppiah

Marimuthu Karuppiah
  • PhD
  • Professor at Presidency University, Bangalore

About

128
Publications
53,159
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,180
Citations
Current institution
Presidency University, Bangalore
Current position
  • Professor
Additional affiliations
August 2020 - present
SRM Institute of Science and Technology
Position
  • Professor
March 2005 - November 2008
Syed Ammal Engineering College
Position
  • Professor (Assistant)
December 2008 - June 2019
Vellore Institute of Technology University
Position
  • Professor (Associate)

Publications

Publications (128)
Article
The progression of cloud computing, IoT technologies, and intelligent transportation systems has accelerated the speedy growth of vehicular ad-hoc networks (VANETs). Recently, attempts have been made to merge fog computing with VANETs to meet the needs of the real world, such as mobility, low transmission delay, etc. In this work, the VANET system...
Article
Full-text available
The technique to overcome the challenge while implementing the fiber optical link is investigated using an alternative optical link called a free‐space optical (FSO) link with advanced modulation and signal processing techniques. A dual‐polarized 16‐quadrature amplitude‐modulated signal is transmitted over single and multi‐FSO channels under variou...
Article
With the rise of Big data generated by Internet of Things (IoT) smart devices, there is an increasing need to leverage its potential while protecting privacy and maintaining confidentiality. Privacy and confidentiality in big data aims to enable data analysis and machine learning on large-scale datasets without compromising the dataset sensitive in...
Article
In the realm of smart city surveillance, consumer electronics (CE) devices communicate through vulnerable wireless channels, posing significant security risks. To ensure secure and uninterrupted services for residents, continuous monitoring is imperative. Existing authentication methods for CE in smart cities authenticate users/devices at the onset...
Article
Industry 4.0 is a revolution of the operations in the industrial manufacturing for increased productivity, trade and commerce. It is heavily reliant on the automation of the processes and equipment along with complex interconnectivity and insightful analysis using machine learning. The interconnectivity of the manufacturing devices from various ind...
Article
Full-text available
We proposed a three‐stage intrusion detection system that utilizes a predictive machine learning model to identify and mitigate attacks on ubiquitous network. In the first stage, we applied Apriori‐enabled Association Rule Mining (AARM) feature selection with support vector machine (SVM) for classification of flow of network. Second, we proposed en...
Chapter
In everyday life, we use hand gestures for several activities, like calling someone or showing directions to somebody, and don't even realise or consciously acknowledge them as a part of life. But for people with hearing disabilities, efficiently contributing to society is a much more important part of their everyday routine. They are their major m...
Chapter
The term drones are thrown around a lot and are frequently used in conversations among consumers, whether it is related to their holiday shopping lists, their hobbies, or even when they discuss news. The original meaning of the term “drone” was preprogramed with a flight plan or remotely controlled, which is why multi-rotor drones are now prominent...
Chapter
Artificial Intelligence occupies a major part in the end-to-end technology we use every day. In order to ensure and enhance security, Artificial Intelligence techniques are used in cyber security applications. Many of the cyber security applications including DDoS security, web firewall, antivirus, and antimalware are attacked everyday by various m...
Chapter
The healthcare industry produces an outsized amount of knowledge, including medical records, compliance with regulatory requirements, and patient information. Most of these records were stored in a hard copy file system, but the current trend targets digital data. Driven by the need for resources and the ability to enhance the quality of healthcare...
Article
In cryptography, Block ciphers use S-Boxes to perform substitution and permutation operations on a data block. S-Boxes provide non-linearity and confusion of bits to the cryptographic algorithms. In addition, secret keys are critical security aspects for encrypting and decrypting messages. The uncertainty and randomness of the secret key and S-boxe...
Article
A novel coronavirus (COVID-19), belonging to a family of severe acute respiratory syndrome coronavirus 2 (SARs-CoV-2), was identified in Wuhan city, Hubei, China, in November 2019. The disease had already infected more than 681.529665 million people as of March 13, 2023. Hence, early detection and diagnosis of COVID-19 are essential. For this purpo...
Article
Full-text available
The Internet of Things (IoT) has become an emerging technology and is expected to connect billions of more devices to the internet in the near future. With time, more and more devices like wearables, intelligent home systems, and industrial automation devices are getting connected to the internet. IoT devices primarily transfer data using wireless...
Article
Many classical cryptographic techniques are breakable due to the quantum computing security threats, and it leads to design public key cryptography based on post-quantum cryptography primitives and security protocols. In recent years, Lattice-Based Cryptography (LBC) becomes a prominent post-quantum cryptographic primitive that can be applied in bo...
Chapter
The historical background of how graph theory emerged into world and gradually gained importance in different fields of study is very well stated in many books and articles. Some of the most important applications of graph theory can be seen in the field network theory. Its significance can be seen in some of the complex network systems in the fiel...
Article
The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated patient medical records are the norm. Authentication schemes are common mechanisms for preventing unauthorised access to medical records via insecure...
Chapter
The taxi fare and the duration of a trip are highly dependent on many factors such as traffic along route or late-night drives, which might be a little slower due to restricted night vision and many more. In this research work, it is attempted to visualize the various factors that might affect the trip durations such as day of the week, pickup loca...
Article
Full-text available
In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligen...
Article
We propose a new access control mechanism for video surveillance system based on user’s biometrics, which allows to access real-time video surveillance data from deployed Internet of Things (IoT) smart devices. For this purpose, mutual authentication is performed between a user and accessed smart devices via the cloud server(s) and the session keys...
Article
Full-text available
The quantity of scientific images associated with patient care has increased markedly in recent years due to the rapid development of hospitals and research facilities. Every hospital generates more medical photographs, resulting in more than 10 GB of data per day being produced by a single image appliance. Software is used extensively to scan and...
Article
English has become an utterly crucial device to take part in global verbal exchange and competition. It is essential to enhance English teaching's flexibility to meet the desires to improve the market economy. Therefore, powerful coaching strategies and language identification are considered challenging factors in existing methods. The proposed mod...
Article
Edge intelligent computing is widely used in the fields, such as the Internet of Medical Things (IoMT), which has advantages, including high data processing efficiency, strong real-time performance and low network delay. However, there are many problems including privacy disclosure, limited calculation force, as well as scheduling and coordination...
Chapter
The demand for blockchain‐based identity management systems (IDMSs) is especially evident in the internet age; we have been dealing with identity management issues since the internet's inception. Privacy, security, and usability have all been cited as major concerns. User identities are organized using IDMSs, which also manage authentication, autho...
Conference Paper
Full-text available
License Platform Detection is a computer technology that enables us to identify digital images on the platform automatically. Different operations are covered in this system, such as imaging, number pad locations, alphanumeric character truncation and OCR. The final objective of the system is to construct and create efficient image processing proce...
Article
Full-text available
This paper presents a music recommendation system for the offline libraries of songs that employs the concepts of reinforcement learning to obtain satisfactory recommendations based on the various considered content-based parameters. In order to obtain insights about the effectiveness of the generated recommendations, parallel instances of single-p...
Article
Deploying convolutional neural network (CNN) inference on resource-constrained devices remains a remarkable challenge for Industrial Internet of Things (IIoT). Although the cloud computing shows great promise in machine learning training and prediction, outsourcing data to a remote cloud always incurs privacy risk and high latency. Therefore, we de...
Article
In the last decade, internet of things (IoT) emerged as one of the most promising fields of research. The services provided by the IoT have come as a big relief to human life due to the smartness and real-time monitoring without human intervention. IoT applications are widely used as it provides a high level of comfort, automation of the system, an...
Article
Full-text available
Infectious diseases are highly contagious due to rapid transmission and very challenging to diagnose in the early stage. Artificial Intelligence and Machine Learning now become a strategic weapon in assisting infectious disease prevention, rapid-response in diagnosis, surveillance, and management. In this paper, a bifold COVID_SCREENET architecture...
Article
Dance is an embodied activity when applied therapeutically, and it can have numerous specific and unspecific health assistances. Dance Movement Therapy (DMT) is a psychotherapeutic process used for the individual’s emotional, cognitive, and physical integration. To automatically synthesize dance movements according to the music, it needs to solve s...
Article
Full-text available
In recent days, data-driven corporate landscape data visualization has been essential and regularly used to help make decisions closely connected to many e-commerce firms' main profits. Since there is an increased need for database professionals to support reliable and successful data visualization, the high demand for data processing is based on d...
Article
Full-text available
One of the most important and difficult research fields is newborn jaundice grading. The mitotic count is an important component in determining the severity of newborn jaundice. The use of principal component analysis (PCA) feature selection and an optimal tree strategy classifier to produce automatic mitotic detection in histopathology images and...
Article
Full-text available
Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protec...
Article
The energy sector currently faces growing challenges related to increasing demand, efficiency, a lack of analytics required for optimal management, and changing supply and demand patterns. Renewable energy technologies such as Energy forecasting, energy efficiency, and energy accessibility are the key factors that incorporate Artificial intelligenc...
Article
A Smart city is a safe and productive urban centre that offers its people a high quality of life through optimized resource management. The sophistication of the energy networks and their critical function make energy management one of the most challenging urban centers' problems. The essential methods are widely used to determine intelligent techn...
Article
Modern urbanization requires smarter technology to develop a range of smart transport system applications (ITS). Continuing traffic management is a major concern worldwide. Via emerging technology and interconnected infrastructure that incorporates a wide variety of connectivity, vehicle control and sensing technologies, and electronics technologie...
Article
Background: Soccer is one of the world's most successful sports with several players. Quality player's activity management is a tough job for administrators to consider in the Internet of Things (IoT) platform. Candidates need to predict the position, intensity, and path of the shot to look back on their results and determine the stronger against...
Article
Full-text available
In the fast growing world, Smart education is an interactive culture and broad concept of higher education. It represents advanced technology that enables students to be more accurate, productive and efficient to process information and skills. Smart education's fundamental problems are distracted students from studying and unreliable learning reso...
Article
Full-text available
Wireless body area network (WBAN) is utilized in various healthcare applications due to its ability to provide suitable medical services by exchanging the biological data between the patient and doctor through a network of implantable or wearable medical sensors connected in the patients’ body. The collected data are communicated to the medical per...
Article
Internet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different zones to carry out specified tasks, the IoD can be beneficial to gather the real time data for interpretation by the users. H...
Article
Full-text available
Smart driving has become conceivable due to the rapid growth of vehicular ad hoc networks. VANETs are considered as the main platform for providing safety road information and instant vehicle communication. Nevertheless, due to the open wireless nature of communication channels, VANET is susceptible to security attacks by malicious users. For this...
Article
Full-text available
Traditional recommendation approaches for the mobile apps basically depend on the app related features. Now a days many users are in quench of app recommendation based on the version description . In the proposed system the hybrid app recommending framework is introduced which is considering the version of the mobile apps. This novel framework name...
Article
Full-text available
Present day world have evolved from traditional environment to smart industries using IoT scheme which in turn forms Industrial Internet of Things (IIoT), which significantly elaborated by providing enhance integration using smart communication through IoT based sensors. IIoT has been providing cost reduction and enhancement in technology by bringi...
Chapter
The fast-growing internet services have led to the rapid development of storing, retrieving and processing health-related documents from a public cloud. In such a scenario, the performance of cloud services offered is not guaranteed, since it depends on efficient resource scheduling, network bandwidth, etc. The trade-off which lies between the cost...
Article
The Internet of Things (IoT) is the next generation plethora of interconnected devices that includes sensors, actuators, etc. and that can provide personalized services such as healthcare, security, and surveillance. The quality of our daily lives is improved by the IoT through pervasive computation and communication. Innumerable devices are being...
Article
Internet of Things will be inevitable in all walks of our life, where it becomes necessary for all smart devices to have end-to-end data transfer capability. These low power and low cost end devices need to be enabled with IPv6 address and corresponding routing mechanism for participating in Internet of Things environment. To enable fast and effici...
Article
Full-text available
Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes have been proposed in the literature. In this paper, we demonstrate the security limitations of a recently proposed password based authentication scheme, and show that their sc...
Article
Full-text available
The fast-growing internet services have led to the rapid development of storing, retrieving and processing health-related documents from a public cloud. In such a scenario, the performance of cloud services offered is not guaranteed, since it depends on efficient resource scheduling, network bandwidth, etc. The trade-off which lies between the cost...
Article
In this paper, the security of a mutual authentication scheme is analyzed. We discern three different attacks in various scenarios. Moreover, we also identify some inherent design flaws of the scheme. As the scheme is suffering from many threats, therefore we argue that the scheme does not have strong characteristics against attacks for practical a...
Article
In recent years, a large number of spectrum mechanisms have been proposed, but these mechanisms ignore the security issues that arise during the design of the mechanism. In this paper, two secure models for sealed-bid spectrum auction are given based on Wang's generic spectrum auction mechanism. One is the basic model and another improved model bas...
Article
Full-text available
Cognitive radio networks improve spectrum efficiency by employing vigilant and accurate spectrum management techniques. This is done to enable an unlicensed user to use the underutilized spectrum. Spectrum sensing determines if a spectrum hole exists for the unlicensed user, this is accomplished using various techniques such as energy detection, mi...
Article
Full-text available
Wireless communication technology is the future of communication, but rapid growth in wireless technology has led to a scarcity in spectrum. Thus, the world has moved away from fixed spectrum allocation to dynamic spectrum allocation. Cognitive Radio Technology is a rapidly growing technique that allows spectrum to be shared between licensed or pri...
Article
Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired and machine learning techniques are used for the purpose of securing data. A system has been proposed based on the Central Dogma of Molecular Biology (CDMB) for the Encryption and Decryption Algorithms by simulating the natural processes of Genetic Coding (conversion fr...
Article
Full-text available
Very recently, Alamr et al (J. Supercomput 1‐14 doi: 10.1007/s11227‐016‐1861‐1) presented a radio frequency identifier (RFID) authentication protocol for the Internet of Things (IoT) through elliptic curve cryptography (ECC). They claimed the protocol to achieve several security properties and thwart all known attacks. However, this paper shows tha...
Article
Full-text available
The Internet of Things (IoT) is now a buzzword for Internet connectivity which extends to embedded devices, sensors and other objects connected to the Internet. Rapid development of this technology has led to the usage of various embedded devices in our daily life. However, for resource sharing and communication among these devices, there is a requ...
Article
Cyber-physical systems (CPSs) have attracted the attention of researchers from all disciplines. In such systems, physical devices collect data, interact with Internet, and send the gathered data to serve people. As one important part of such systems, a smart grid is accepted widely and has played a great role for information and communication techn...
Article
Full-text available
Therapeutic issues are commonly found in every single person. Tumor is a standout among the most unsafe sicknesses a human can ever had. It is exceptionally hard to distinguish it in its beginning times as its side effects seem just in the progressed stages. Subsequently, the early forecast of lung growth is compulsory for the analysis procedure, a...
Article
Genetic Algorithms (GAs) have proved to be a powerful tool in cryptography. The standard AES algorithm incurs high computation costs and has problems in pattern formation when applied to image encryption. It is also prone to the differential and side channel attacks. In this paper, a modification of AES has been proposed for High-Definition (HD) Im...
Article
Full-text available
The session initiation protocol (SIP) is a signaling protocol which is used to controlling communication in the Internet. It is also used for initiating, terminating and maintaining the sessions. A strong authentication scheme plays a pivotal role in safeguarding communications over the Internet. In order to ensure the secure communication, several...
Article
In a cloud computing environment, it is not easy to schedule various Internet of Things (IoT) application tasks due to the heterogeneity characterises of IoT. Efficient scheduling and load balancing of IoT applications is important to minimize the total execution time(makespan) while adhering to constraints like task dependencies. In this paper, a...
Article
Full-text available
Image fusion aims to integrate complementary information from multiple modalitiesinto a single image with none distortion and loss of data. Image fusion is importantin medical imaging, specifically for the purpose of detecting the tumor and identifica-tion of diseases. In this article, completely unique discrete wavelet transform (DWT)and intuition...
Article
Full-text available
Authentication schemes are widely used mechanisms to thwart unauthorized access of resources over insecure networks. Several smart card based password authentication schemes for Telecare Medical Information Systems (TMIS) have been proposed in the literature. Recently, Lee et al. proposed an authentication scheme for TMIS and then they claimed that...
Article
In recent years, two technologies, the cloud computing, and the Internet of Things (IoT) have a synergistic effect in the modern organizations as digitization is a new business trend for various industries. Therefore, many organizations outsource their crowdsourced Industrial-IoT (IIoT) data in the cloud system to reduce data management overhead. H...
Article
The detection and classification of malwares in windows executables is an important and demanding task in the field of data mining. The malwares can easily damage the system by creating harm in the user's system, so some of the existing techniques are developed in the traditional works for an accurate malware detection. But, it lacks some major dra...
Article
This paper introduces the new routing model called Effective Energy Utilisation of Node Model (EEUNM) created for energy-efficient and secure data in wireless sensor networks. EEUNM deals with wireless sensor applications such as military and forest field. The aim of this model is to find the perfect path based on consumption of node energy. The fo...
Article
Remote authentication scheme utilising smart cards have become a prevalent concept due to their convenience and simplicity. Recently, Lee (2015) proposed a low cost authentication scheme without verifier tables. However, in this paper we show that Lee's scheme is susceptible to various attacks and fails to provide essential security properties. We...
Article
Wireless sensor networks (WSNs) play an important role in the Industrial Internet of Things (IIoT), and have been widely used in many industrial fields to gather data of monitoring area. However, due to the open nature of wireless channel and resource-constrained feature of sensor nodes, how to guarantee that the sensitive sensor data can only acce...
Article
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in the context of the industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data in the cloud in order to reduce the cost for sharing data and computation. However,...
Article
Full-text available
Agriculture is the backbone of our economic system and plays an important role in the life of an economy. It does not only provide raw material and food, but also provides large employment opportunities. Therefore, agriculture requires modern technology for increasing the productivity. In this context, wireless sensor networks (WSNs) could be utili...
Article
Full-text available
Before chatbots there were simply bots: The invention of a chatbot brought us to the new era of technology, the era of conversation service. A chatbot is a virtual person that can effectively talk to any human being with the help of interactive conversion textual skill. Now a days there are many cloud-based platforms available for developing and de...
Article
Full-text available
Medical imaging requires capturing different aspects of a human body. To capture tissues, cartilages, bones and nerves one needs different sensors and different modalities which results in different images from each modality of the same body part. Image fusion is a process by which one can fuse such images from different modalities in a single imag...

Network

Cited By