Muttukrishnan Rajarajan

Muttukrishnan Rajarajan
  • Professor at City, University of London

About

386
Publications
94,461
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
10,504
Citations
Current institution
City, University of London
Current position
  • Professor

Publications

Publications (386)
Article
Full-text available
Using raw sensitive data of end-users helps service providers manage their operations efficiently and provide high-quality services to end-users. Although access to sensitive information benefits both parties, it poses several challenges concerning end-user privacy. Most data-sharing schemes based on differential privacy allow control of the level...
Chapter
Full-text available
The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by...
Article
The growth of IoT devices is so rapid that several billions of such devices would be in use in a span of four-year period. Essential security mechanisms need to be put in place to curb several security attacks prevalent in IoT. Access control is an important security mechanism that ensures legitimate and controlled access to critical and limited re...
Article
Full-text available
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to enable business-appropriate decision-making. In view of this challenge, a new model is proposed...
Article
Autonomous vehicles are taking a leap forward by performing operations without human intervention through continuous monitoring of their surroundings using multiple sensors. Images gathered through vehicle mounted cameras can be large, requiring specialized storage such as cloud. However, cloud data centres can be prone to security and privacy chal...
Article
Full-text available
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional machine learning approaches may become data-dependent, insensitive to error cost, and thus may not tack...
Article
Full-text available
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security requirements have become an integral part of an IoT system. Authentication and access control are the two principal security requirements for ensuring authorized and restricted accesses to limited and essen...
Preprint
Full-text available
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to enable business-appropriate decision-making. To address this issue, we propose a Cloud Enterpris...
Article
The diverse range of Internet of Things (IoT) devices in smart homes results in users having to deal with a variety of technologies with different and incompatible user authentication methods. Continuous authentication offers an intelligent solution to this problem, although its application within IoT is currently in its infancy, and the limitation...
Preprint
Full-text available
Cloud computing adoption has been increasing rapidly amid COVID-19 as organisations accelerate the implementation of their digital strategies. Most models adopt traditional dynamic risk assessment, which does not adequately quantify or monetise risks to enable business-appropriate decision-making. To address this issue, we propose a Cloud Enterpris...
Article
Full-text available
The security of IoT devices is a major concern that needs to be addressed for their wide adoption. Users are constantly seeking devices that are faster and capable of holding large amounts of data securely. It is purported that water has memory of its own and the ability to retain memory of the substances that are dissolved into it, even after bein...
Article
Full-text available
Ransomware attacks are hazardous cyber-attacks that use cryptographic methods to hold victims’ data until the ransom is paid. Zero-day ransomware attacks try to exploit new vulnerabilities and are considered a severe threat to existing security solutions and internet resources. In the case of zero-day attacks, training data is not available before...
Article
Full-text available
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on modular arithmetic to the contemporary cryptosystems based on quantum computing. The emergence of quan...
Article
Full-text available
As the world calls it, data is the new oil. With vast installments of Industrial Internet-of-Things (IIoT) infrastructure, data is produced at a rate like never before. Similarly, artificial intelligence (AI) and machine learning (ML) solutions are getting integrated to numerous services, making them "smarter". However , the data remains fragmented...
Article
Full-text available
The traditional power network has now evolved into the smart grid, where cyber technology enables automated control, greater efficiency, and improved stability. However, this integration of information technology exposes critical infrastructure to potential cyber-attacks. Furthermore, the interdependent nature of the grid’s composite information an...
Article
The removal of tartrazine dye from aqueous solution using g-C3N4/Fe3O4 nanocomposites was studied. The g-C3N4/Fe3O4 nanocomposites were synthesized using simple co-precipitation method. The synthesized nanocomposites were characterized by spectral (UV-Vis DRS, FT-IR) and analytical (PXRD, SEM, EDAX, HRTEM) techniques. Photodegradation of tartrazine...
Article
Full-text available
The outbreak of the COVID-19 virus has caused widespread panic and global initiatives are geared towards treatment and limiting its spread. With technological advancements, several mechanisms and mobile applications have been developed that attempt to trace the physical contact made by a person with someone who has been tested COVID-19 positive. Wh...
Article
In the present work biogenic synthesis of silver nanoparticles using Cissus quadarangularis aqueous leaf extract and their evaluation of antimicrobial activities. The synthesized nanoparticles were confirmed by, X-ray diffraction (XRD), UV–visible absorption (UV–Vis), Scanning electron microscopy (SEM) and Fourier transform infra-red (FT-IR) spectr...
Preprint
Traditional power grids are evolving to keep pace with the demands of the modern age. Smart grids contain integrated IT systems for better management and efficiency, but in doing so, also inherit a plethora of cyber-security threats and vulnerabilities. Denial-of-Service (DoS) is one such threat. At the same time, the smart grid has particular char...
Chapter
Full-text available
The automotive industry is witnessing an accelerated growth in digital innovations that turn modern vehicles into digital systems. This makes the security of modern vehicles a crucial concern as they have evolved into cyber-physical and safety-critical systems. Therefore, stateful identity management and continuous access control have become a para...
Article
In the present work, we have demonstrated the fabrication of catechol (CC) biosensor based on reduced graphene oxide (rGO) decorated β-cyclodextrin (β-CD) nanosheet immobilized using nafion (Nf) on modified GCE (glassy carbon electrode). The rGO/β-CD nanocomposite is synthesized through sonochemical approach and characterized by spectral (UV–visibl...
Preprint
Full-text available
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or in transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems based on modular arithmetic to the contemporary cryptosystems based on quantum computing. The emergence of qu...
Article
Mn, Zr co-doped Ag2O nanoparticles (NPs) were blended through a wet chemical strategy, and the physicochemical properties of doped and co-doped silver oxide nanoparticles were characterized using X-ray diffraction, UV-DRS visible spectroscopy, Fourier transform infrared spectroscopy, scanning electron microscopy with energy dispersive X-ray spectro...
Article
Full-text available
Security of data has always been a contested issue since the internet became the way of life. The internet and Web 2.0 followed by Web 3.0 have enabled many applications for the use of the citizens. E-government is one of them. Questions have always been raised about the security of data in E-government applications and services. Saudi Arabia is on...
Chapter
Traditional power grids are evolving to keep pace with the demands of the modern age. Smart grids contain integrated IT systems for better management and efficiency, but in doing so, also inherit a plethora of cyber-security threats and vulnerabilities. Denial-of-Service (DoS) is one such threat. At the same time, the smart grid has particular char...
Article
Full-text available
The SrWO4/Bi2O3 nanocomposite was gotten by co-precipitation process and described by X-ray diffraction (XRD), UV–vis diffuse reflectance spectroscopy (UV–vis DRS), Fourier transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM), high resolution transmission electron microscopy (HR-TEM), energy dispersive X-ray analysis (EDX), T...
Article
Full-text available
In this study, we demonstrate a facile approach for the synthesis of strontium tungstate (G-SrWO4) using Pomelo leaf extract via the sonochemical method. The electrocatalytic performance of G-SrWO4 solubilized Nafion (Nf) (G-SrWO4/Nf) modified GC electrode was evaluated for uric acid (UA) detection. The characteristic properties of the prepared G-S...
Article
Full-text available
In a rapidly changing IT environment, access to the resources involved in various projects might change randomly based on the role-based access control (RBAC) system. Hence, the security administrator needs to dynamically maintain the role assignments to users for optimizing user-role assignments. The manual updation of user-role assignments is pro...
Book
This book presents the recent research adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., and embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., that has made Internet of things (IoT) to step out of its infancy to become smart things. Now, smart sensors can col...
Article
Full-text available
LoRaWAN, part of the long range Internet of Things (IoT) technologies, is a Low Power Wide Area (LPWA) protocol that enables communication between the battery operated resource constrained devices. Although LoRaWAN provides system-level security, these networks are based on a basic assumption of trust between the network server and the user, which...
Article
Full-text available
The proliferation of IoT in various technological realms has resulted in the massive spurt of unsecured data. The use of complex security mechanisms for securing these data is highly restricted owing to the low-power and low-resource nature of most of the IoT devices, especially at the Edge. In this work, we propose to use blockchains for extending...
Article
Full-text available
Privacy-preserving applications allow users to perform on-line daily actions without leaking sensitive information. The privacy-preserving scalar product is one of the critical algorithms in many private applications. The state-of-the-art privacy-preserving scalar product schemes use either computationally intensive homomorphic (public-key) encrypt...
Chapter
This chapter addresses the application of machine learning algorithms to detect attacks against smart grids. Smart grids are the result of a long process of transformation that power systems have been through, relying on Information and Communication Technology (ICT) to improve their monitoring and control. Although an objective of this convergence...
Article
Among numerous metal oxide based nanocomposites, the polymer incorporated nanocomposites has received fascinated attention as promising electrode materials for inexpensive nonenzymatic glucose sensor. In this study, development of a sensitive and selective glucose sensor was fabricated using molybdenum trioxide (MoO3) via sol-gel method. The synthe...
Preprint
Full-text available
Privacy-preserving applications allow users to perform on-line daily actions without leaking sensitive information. Privacy-preserving scalar product is one of the critical algorithms in many private applications. The state-of-the-art privacy-preserving scalar product schemes use either computationally intensive homomorphic (public-key) encryption...
Book
In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more depend...
Article
The hexavalent Chromium (Chromium (VI) (or) Cr⁶⁺) is considered as the most toxic element that directly affects the environment and the human cycle adversely. Therefore, in the present study we proposed a sensitive and selective electrochemical sensor for the detection of Cr⁶⁺ in various water samples using graphene carbon nitride decorated with si...
Article
Full-text available
Herein, we report a simple synthesis, characterization and photocatalytic degradation application of composite NiO-WO₃ nanoparticles. The nanoparticles were synthesized by facile low-temperature method and characterized by several techniques such as X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM)...
Article
Full-text available
This paper describes a highly sensitive and selective electrochemical sensing of folic acid (FA) using vanadium pentoxide decorated graphene carbon nitride covalently grafted polyvinyl alcohol modified GC electrode (V2O5/G-C3N4/PVA/GCE). The V2O5/G-C3N4/PVA nanocomposite was synthesized by an in-situ oxidative polymerization method and characterize...
Conference Paper
Blockchain systems are being rapidly integrated in various technologies, with limited work on the effect of the underlying network topology on the blockchain performance. In this work, we investigate the significance of each network node on the overall blockchain performance. This is assessed by selecting critical nodes according to different criti...
Article
Full-text available
Global system for mobile communication (GSM) is widely used digital mobile service around the world. Although GSM was designed as a secure wireless system, it is now vulnerable to different targeted attacks. There is a need to address security domains especially the confidentiality of communication. This paper presents a novel framework for end to...
Article
Full-text available
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the changing of privileges is done once in a while. However, to date, no efficient and secure scheme is a...
Article
Full-text available
This paper describes a selective and sensitive detection of bronchodilators (theophylline) using an aloe vera plant extract decorated iron tungstate nanorods (AFW) immobilized Nafion (Nf) modified glassy carbon electrode (GCE) (AFW/Nf/GCE). The AFW was synthesized by the co-precipitation method and characterized by UV–visible spectroscopy, x-ray di...
Article
Full-text available
Internet of Things (IoT) widely use analysis of data with artificial intelligence (AI) techniques in order to learn from user actions, support decisions, track relevant aspects of the user, and notify certain events when appropriate. However, most AI techniques are based on mathematical models that are difficult to understand by the general public,...
Article
In the present work, a novel cupric oxide decorated on β-cyclodextrin (CuO/β-CD) nanocomposite was synthesized by sonochemical method. The CuO/β-CD nanocomposites were characterized by UV–vis, Raman, FT-IR, FE-SEM, mapping analysis, XRD techniques. Fascinatingly, the CuO/β-CD nanocomposite Nafion (Nf) solubilized modified glassy carbon electrode (C...
Article
A novel and selective electrochemical sensing of nicotine is studied using copper tungstate decorated reduced graphene oxide nanocomposite (CuWO 4 /rGO) nafion (Nf) immobilized GC electrode (GCE). The CuWO 4 /rGO nanocomposite is synthesized using sonication method and characterized by HR-TEM (High resolution transmission electron microscopy), SEM...
Article
Full-text available
Determination of glucose plays very important part in diagnostics and management of diabetes. Nowadays, determination of glucose is necessary in human health. In order to develop the glucose biosensor, polymer modified catalytic composites were fabricated and used to detect glucose molecules. In this work, NiO nanostructure metal oxide (NMO) was fa...
Article
Full-text available
A novel electrochemical sensor based on iron tungstate doped tin oxide nanocomposite Nafion (FeWO4/SnO2/Nf) immobilized modified glassy carbon electrode (GCE) is fabricated to determine hydroquinone (HQ) in this present study. The structural morphology and phase of FeWO4/SnO2 nanocomposite are characterized by X-ray powder diffraction (XRD), energy...
Chapter
Botnets have been part of some of the most aggressive cyberattacks reported in recent years. To make them even harder to be detected and mitigated, attackers have built C&C (Command and Control) infrastructures on top of popular Internet services such as Skype and Bitcoin. In this work, we propose an approach to detect botnets with C&C infrastructu...
Article
Full-text available
Glucose detection is extremely necessary in several zones like foodstuff industries, analytical field, clinical diagnostics and biotechnology. In particular, diabetes mellitus which is a common chronic disease that threatens to the human health. To avoid this trouble, glucose recognition is significant. In this work, a novel vanadium dioxide (VO2)...
Article
An eco-friendly ZnFe2O4/CeO2 nanocomposites as visible light photocatalysts with different mole ratios were successfully fabricated by sonochemical method. The nanocomposites material was characterized various analytical techniques such as X-ray diffraction (XRD), UV–vis diffuse reflectance spectroscopy (DRS), fourier transform infrared spectroscop...
Article
Full-text available
The propagation approach of a botnet largely dictates its formation, establishing a foundation of bots for future exploitation. The chosen propagation method determines the attack surface and, consequently, the degree of network penetration, as well as the overall size and the eventual attack potency. It is therefore essential to understand propaga...
Article
In this study, we produce a new continuous authentication scheme for gesture-typing on mobile devices. Our scheme is the first scheme that authenticates gesture-typing interactions in a word-independent format. The scheme relies on groupings of features extracted from the word gesture after it has been reduced to parts common to all gestures. We sh...
Conference Paper
Botnets have been part of some of the most aggressive cyberattacks reported in recent years. To make them even harder to be detected and mitigated, attackers have built C&C (Command and Control) infrastructures on top of popular Internet services such as Skype and Bitcoin. In this work, we propose an approach to detect botnets with C&C infrastructu...
Conference Paper
Internet of Things (IoT) systems can often pose risk to users' privacy via disclosure of personal information to third parties. In this paper, we argue that to assess privacy risks associated with IoT systems, an automated solution is required due to the increasing pervasiveness and complexity of deployed IoT systems. We propose requirements for an...
Article
Strontiumtitaniumtrioxide (SrTiO3) decorated β-cyclodextrin (β-CD) nanocomposite modified glassy carbon electrode was developed for the efficient and accurate determination of poisonous Arsenic (III) ions in water and blood serum samples. The synthesized SrTiO3/β-CD nanocomposite was successfully characterized by spectral and electrochemical method...
Article
Full-text available
This work introduces an efficient algorithm to develop a privacy-preserving (PP) voice verification based on iVector and linear discriminant analysis techniques. This research considers a scenario in which users enrol their voice biometric to access different services (i.e., banking). Once enrolment is completed, users can verify themselves using t...
Article
DETERMINATION environmental and of clinical glucose analyses. is of enormous In recent importance years, polymer in the modified fields of metal biological, oxides arrived a great consideration in the detection of glucose. In this study, we have developed a sensitive and selective non-enzymatic glucose sensor by using CuO NMO encapsulation with PEG...
Article
Full-text available
A novel Cr5O12 nanoparticle were prepared by reducing K2Cr2O7 using Azadirachta indica plant extracts as a reducing agent. The synthesized nanoparticles shows orthorhombic phases with a band gap for 1.27 eV and it is further conformed by SEM. The average dimension of the nanoshell was about 56.99 nm. The FTIR spectrum explores the presence of the f...
Article
A novel poly vinyl alcohol supported cupric oxide nanocomposite (CuO/PVA) modified glassy carbon electrode (GCE) was developed for determination of mercury (II) ions by electrochemical methods. The CuO/PVA nanocomposite was synthesized by sonochemical method and characterized by spectral, analytical and electrochemical methods. Interestingly, cycli...
Article
This work presents a new approach to preparation of Co/Mn-W3O8 nanoparticles via facile sonochemical route. Cobalt and manganese codoped tungsten oxide (W3O8) nanoparticles was studied as a photocatalyst for the removal of amaranth under solar light irradiation (λmax 520 nm). The results indicated that the Co/Mn-W3O8 composite photocatalyst showed...
Article
Full-text available
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructure. However, UAV networks raise security challenges because of its dynamic topology. This paper proposes a technique for maintaining security in UAV networks in the context of surveillance, by corroborating information about events from different sour...
Conference Paper
Internet of Things (IoTs) are being widely used for a large number of use case scenarios, where a wide range of devices, with different computational resources, are marshalled for the purpose of a certain mission goal. The unique combination of these devices and the nature of sensitive information that they hold poses a large number of risks where...
Chapter
In this paper we propose an ontological model for documenting provenance of MQTT message brokers to enhance the transparency of interactions between IoT agents.
Article
Searchable Encryption allows a user or organisation to outsource their encrypted documents to a Cloud-based storage service, while maintaining the ability to perform keyword searches over the encrypted text. However, most of the existing search schemes do not take the almost certain presence of typographical errors in the documents under considerat...
Article
Full-text available
The novel MnWO4/BiOI nanocomposite materials were successfully synthesized by a precipitation deposition method. The as-prepared photocatalyst was characterized by XRD, SEM, EDAX, UV-DRS, FT-IR, TEM and BET techniques. The as-prepared MnWO4/BiOI nanocomposites were further utilized to study the degradation of the Celestin blue aqueous solution unde...
Article
We present a novel scheme for continuous face authentication using mobile device cameras that addresses the issue of spoof attacks and attack windows in state-of-the-art approaches. Our scheme authenticates a user based on extracted facial features. However, unlike other schemes that periodically re-authenticate a user, our scheme tracks the authen...
Article
This paper demonstrates the development of an electrochemical sensor based on ZnO-manganese hexacyanoferrate nanocomposite (ZnO/MnHCNF)- modified glassy carbon electrode (GCE) for detecting riboflavin (RF) in 0.1 M PBS (pH 6.4) using voltammetric studies. The GCE was prepared by depositing appropriate amounts of ZnO on the surface of GCE, followed...
Article
Searchable Encryption (SE) allows a client to search over large amounts of encrypted data outsourced to the Cloud. Although, this helps to maintain the confidentiality of the outsourced data but achieving privacy is a difficult and resource intensive task. With the increase in the query effectiveness, i.e., by shifting from single keyword SE to mul...

Network

Cited By