Ravilla Dilli

Ravilla Dilli
Manipal Institute of Technology · Electronics and Communication Engineering

M.Tech. Ph.D (Wireless Communications and Networks)
5G and 6G Wireless Technologies, IoT

About

27
Publications
14,912
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
139
Citations
Introduction
Dr. Ravilla Dilli currently works at the ECE, MIT, MAHE, Manipal. Ravilla does research in Wireless Communications. His research areas are Communication Networks, Mobile Ad hoc Networks, Wireless Sensor Networks, Routing Protocols and algorithms, Network Security, High-Speed Networks, 5G, 6G Wireless Technologies.

Publications

Publications (27)
Article
Full-text available
Frequencies above 100 GHz are the promising frequency bands for 6G wireless communication systems because of the abundant unexplored and unused spectrum. The increasing global demand for ultra-high spectral efficiencies, data rates, speeds and bandwidths in next-generation wireless networks motivates the exploration of peak capabilities of massive...
Article
Full-text available
Millimeter-wave (mmWave) and massive multi-input–multi-output (mMIMO) communications are the most key enabling technologies for next generation wireless networks to have large available spectrum and throughput. mMIMO is a promising technique for increasing the spectral efficiency of wireless networks, by deploying large antenna arrays at the base s...
Article
Full-text available
millimeter (mmWave) frequencies are covering from 30GHz to 300GHz in the electromagnetic spectrum and their uses in various applications like next-generation wireless communication systems (massive 5G telecommunications network), medical devices, airport security and automatic collision avoidance systems are growing vastly in the near future. There...
Article
Full-text available
Millimeter-wave (mmWave) and massive multi-input-multi-output (mMIMO) communications are the most key enabling technologies for next generation wireless networks to have large available spectrum and throughput. mMIMO is a promising technique for increasing the spectral efficiency of wireless networks, by deploying large antenna arrays at the base s...
Article
Full-text available
The increasing global demand for ultra-high spectral efficiencies, data rates, speeds, and bandwidths in next-generation wireless networks motivate the exploration of peak capabilities of ultra-massive MIMO (mMIMO) wireless access technology at THz bands (0.1 THz – 10 THz). The smaller wavelengths (in the order of microns) of these frequencies give...
Conference Paper
Full-text available
According to 3GPP, the frequency bands of 5G technologies are occupied at various parts of the frequency spectrum. E.g. mmWave frequencies are used for short-range communications in 5G mobile communications which can provide much higher bandwidth, supports greater data rates and also overcome the effect of path loss using carrier aggregation f...
Article
To have higher "spectrum efficiency" for the next generation optical and wireless networks, it is essential to combine the features of Polar codes with the modulation schemes of higher order. As per 3rd Generation Partnership Project (3GPP), 5G New Radio (NR) communication systems use polar coding techniques for control channels. As the polar codes...
Chapter
Full-text available
Secure Hash Algorithm (SHA-3) is a next generation security standard used in the world of electronic communications where the digital messages are transformed into “message digest” for creating digital signatures. Any changes in the original message leads to a change in the message digest and it becomes easy to detect the modifications to the origi...
Article
The purpose of this article is to determine the recognition and awareness levels of the nursery, primary and high school teachers working in the province of Ankara in terms of their view on museums as a learning environment. For the study, a SWOT analysis was conducted on the preschool teachers working in Ankara to determine the strengths and weakn...
Conference Paper
Full-text available
In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for secured routing in hybrid routing technique of Mobile Ad hoc Networks (MANETs). We have used Hashed Message Authentication Code (HMAC) to achieve data integrity and authenticatio...
Article
The present study, aiming to develop nature culture in primary school students and to help them to become acquainted with their close environment, is a quasi-experimental study. Museum education activities were conducted with the study group which consisted of 128 fourth-grade primary school students. At the end of the study, the students gained un...
Conference Paper
Full-text available
Message authentication is a mechanism to verity the integrity of a message and it can be achieved using Message Authentication code (MAC) also called as keyed hash function. An ideal Hash algorithm will require a cryptanalytic effort greater than or equal to the brut-force effort. In the recent time, there have been enough efforts in developing cry...
Article
Full-text available
Mobile Ad hoc NETwork (MANET) is an infrastructure independent network with every mobile node acting as the router in the network formation. These networks are most useful when the present infrastructure is destroyed or at remote locations which are deprived of these amenities. One of the biggest challenges of these networks is the security of the...
Article
Full-text available
Hash functions are used in information security applications for the generation and verification of digital signatures, key derivation, and pseudorandom bit generation. Hash algorithms are secure because, for a given algorithm, it is computationally infeasible to find a message that corresponds to a given message digest, or to find two different me...
Article
Full-text available
The purpose of a hash function is to produce a 'fingerprint' of a message or data for authentication. The strength of the Hash code against brute-force attacks depends on the length of the hash code produced by the algorithm. Constructing the Message Authentication Codes (MAC) from Cryptographic hash functions (SHA-256) gives faster execution in so...
Conference Paper
Full-text available
Ad hoc networks are wireless networks without a fixed infrastructure, which are usually assembled on a temporary basis to serve a specific deployment such as emergency rescue or battlefield communication. Zone Routing Protocol (ZRP) is one of the hybrid routing protocols in MANETs, which is vulnerable to a number of security threats that come from...
Article
Full-text available
Ad hoc wireless networks are the category of wireless networks that utilize multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure. In typical wireless networks, terminals have to be powered on at all time to detect possible signals that target them which causes in significant unwanted energy consumpti...
Chapter
Full-text available
Ad hoc networks are wireless networks without a fixed infrastructure, and are usually established on a temporary basis for a specific application like emergency rescue or battle field communication. Energy management in wireless networks is the process of managing the sources and consumers of energy in a node or in the network as a whole for enhanc...
Article
Full-text available
An ad hoc wireless network has a dynamic nature tha t leads to constant changes in its network topology . As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networ ks. Based on the routing information update mechanism Ad hoc wireless networks routing...
Article
Full-text available
An ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networks. Based on the routing information update mechanism Ad hoc wireless networks routing protoco...
Chapter
Full-text available
The Zone Routing Protocol (ZRP) is a hybrid routing protocol that proactively maintains routes within a local region of the network (which we refer to as the routing zone). Here, we describe the motivation of ZRP and its architecture also the query control mechanisms, which are used to reduce the traffic amount in the route discovery procedure. In...
Article
Full-text available
Wireless technology based on the IEEE 802.11 standard is used to support multiple types of communication services (data, voice, and image) with different QoS requirements. Node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must...

Network

Cited By

Projects

Projects (2)
Project
Routing techniques that reduces power consumption in MANETs