
Selvi Munuswamy- M.E., M.B.A., PhD
- Associate Professor at Vellore Institute of Technology
Selvi Munuswamy
- M.E., M.B.A., PhD
- Associate Professor at Vellore Institute of Technology
About
64
Publications
12,620
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,599
Citations
Introduction
Current institution
Vellore Institute of Technology
Current position
- Associate Professor
Additional affiliations
April 2019 - present
July 2018 - October 2018
January 2015 - present
Publications
Publications (64)
Secure and energy-efficient data aggregation is a critical challenge in Internet of Things (IoT) networks, where high communication power consumption and network vulnerabilities can significantly impact performance and node lifespan. This paper proposes a novel Reinforcement Learning-based Billfish Optimization Technique (RL-BOT) to address these c...
In an era of increasing sophistication and frequency of cyber threats, securing Internet of Things (IoT) networks has become a paramount concern. IoT networks, with their diverse and interconnected devices, face unique security challenges that traditional methods often fail to address effectively. To tackle these challenges, an Intrusion Detection...
Wireless Sensor Networks (WSN) are built with miniature sensor nodes (SN), which are deployed into the geographical location being sensed to monitor environmental conditions, which transfer the sensed physical information to the base station for further processing. The sensor nodes frequently experience node failure as a result of their hostile dep...
In Wireless Sensor Networks (WSNs), sensor nodes are placed to sense and collect data. Due to the energy constraint nature of WSN, optimising the energy during the data dissemination is a major concern. To solve this problem, data aggregation may be used to bring down the redundant transmission of packets in WSN. In most of the previously available...
Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challenge in the effective delivery of the collected data due to the presence of malicious nodes. Moreover, since security and minimization of ener...
A wireless sensor network (WSN) is made up of many sensor nodes with insufficient energy, storage, and processing capabilities. Data gathering and transmission to the base station are two of the main responsibilities of the sensor nodes (BS). As a result, the network lifespan becomes the key factor in the successful design of data collection strate...
Routing Protocol for Low-Power and Lossy Networks (RPL) has been used in the Internet of Things (IoT) with Wireless Sensor Networks (WSNs), but it is does not give much focus to protect against routing attacks. Therefore, it is possible for an attacker to utilize the RPL routing system as an initial platform for devastating and crippling attacks on...
Wireless Sensor Network (WSN) communication encounters security vulnerabilities, particularly with network traffic being susceptible to attacks during routing. The effective use of Deep Learning (DL) methods has been demonstrated in developing Intrusion Detection Systems (IDSs) to manage security attacks in Wireless Sensor Networks (WSN). Consequen...
Middle-box based attacks create serious functional defects in the devices such as firewalls, address translators, load balancers, server units, and other data inspecting devices. Middle-box based attacks are more severe than terminal node-based attacks. These attacks are mainly initiated to malfunction the internal events of middle-level devices. N...
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, si...
Internet of Things is made up of sensor nodes that can sense the given environment, gather the data from environment and then communicates the data to the sink node and the internet through wireless communication. As it follows the routing protocols used in Wireless Sensor Networks, the Denial of Service (DoS) attacks including selective forwarding...
Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other...
Aerial warfare systems in various countries highly expect Swarm Unmanned Aerial Vehicles (UAVs) and Flying Adhoc Networks (FANETs) for defense stability. However, swarm UAVs face many challenges, like security breaches, malfunctions, link failures, and handover failures. UAVs can easily malfunction by external threats to create data loss, theft, si...
The intrusion detection systems (IDSs) developed based on classification algorithms for securing wireless sensor networks (WSNs) are unable to attain the required detection accuracy. To handle the security issue in WSN, an intelligent IDS is proposed in this work by using a convolution neural network (CNN)-based deep learning approach along with a...
Data transmission in intelligent transportation systems is being challenged by a variety of factors, such as open wireless communication channels, that pose problems related to security, anonymity, and privacy. To achieve secure data transmission, several authentication schemes are proposed by various researchers. The most predominant schemes are b...
The Internet of Things (IoT) is a distributed system which is made up of the connections of smart objects (things) that can continuously sense the events in their sensing domain and transmit the data via the Internet. IoT is considered as the next revolution of the Internet since it has provided vast improvements in day-to-day activities of humans...
Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message. Quantum cryptography is also hiding the plain text through encryption and it works based on the law of quantum physics for providing absolute security of dat...
The Internet of Things (IoT) is an important and a major key component to support human life. Sensors are the sensing devices that play an important role in IoT to detect environmental conditions. The significance of IoT is increasing due to the increase in the things connected to the internet using Internet Protocol version-6 (IPv6). Low-Power and...
Image compression is an important task in most applications to save the storage space and communication cost. In this direction, many researches proposed Block Truncation Coding models to compress the images. However, some limitations are present in the existing image compression algorithms since they do not identify the image block dependencies, p...
Recent advances in Wireless Sensor Networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challenge in the effective delivery of the collected data due to the presence of malicious nodes. Moreover, since security and minimization of ener...
Wireless Sensor Networks (WSNs) are consisting of a number of sensing nodes that are used to collect data from various environmental conditions and are used frequently when it comes to monitoring and regulating of the network environment. In this scenario, the presence of malicious nodes in the network will lead to challenges in the provision of co...
Cloud computing is the distributed collection of virtual computing devices which are used to store, process and outsource the data for the different vendors in dynamic manner. Data which is being the most valuable asset in cloud computing is vulnerable to security and privacy of data that is being shared and used in the cloud environment. Guarantee...
One of the prominent applications of Internet of Things (IoT) in this digital era is the development of smart cities. In IoT based smart cities, the smart objects (devices) are connected with each other via internet as a backbone. The sensed data by the smart objects are transmitted to the sink for further processing using multi hop communication....
Mobile edge computing has been widely used in various IoT devices due to its excellent computing power and good interaction speed. Task offloading is the core of mobile edge computing. However, most of the existing task offloading strategies only focus on improving the unilateral performance of MEC, such as security, delay, and overhead. Therefore,...
Wireless Sensor Networks (WSNs) contain multiple wireless sensor nodes deployed around the geographical locations. The WSN used in military applications need more security and hence the deployment of trustworthy nodes and links in WSN provides more secure data transmission in Decentralized Military Sensor Networks (DMSNs). Moreover, the DMSNs work...
The Indian railways play a vital role in the lifestyle of a commuter. Serving close to 23 million passengers a day, it is considered quintessential in an Indian setting. However, due to track placements in rural and urban areas, they tend to threaten animals and human beings that traverse it. This paper alleviates the danger by suggesting a prevent...
In a Wireless Sensor Network (WSN), there are some energy constrained tiny sensor devices called nodes. These nodes can sense the environment, capture the data and routing them optimally to the base station. It is used in many applications including agriculture, medicine and transportation. However, the existing routing algorithms for WSN are not e...
Wireless Sensor Networks (WSNs) is a collection of tiny distributed sensor nodes that have been used to sense the physical parameters of the environment where it has been deployed. Data dissemination is an important activity performed in WSNs in order to administer and manage them. Gossiping makes the network to transmit the same data item multiple...
Healthcare applications are diverse in nature and they are in critical need of compatible and understandable systems through which they can communicate effectively. A semantic framework for such disparate applications is very necessary so that the resultant seamless communication between them would boost up the patient information access and health...
Wireless sensor networks consist of many tiny sensor nodes which are deployed in various geographical locations for sensing the normal spectacles and also to transmit the collected information to the base station which is also named destination node through multiple nodes present in the network. Most of the existing heuristics algorithms used for f...
In this world of science and technology, the Internet of Things [IoT] plays a predominant role in the wide range of sectors such as communications. Without communication, no movement exists. Thereby, IoT plays a vital key role in medical science for connectivity establishment in faster space regulation. IoT has several roles in many streams like sm...
Mobile Ad-hoc NETworks (MANETs) are the self-configuring network consisting of mobile nodes communicating via radio waves. These networks do not have any centralized controlling mechanism and designated routers. All the nodes in the network can be either a communication end point or a router. Therefore, MANETs are more vulnerable to attacks. Black...
Social networks build and maintain relationships between individuals. Sentiment analysis is important in social network analysis for extracting user’s interest from product preferences based on reviews to determine whether it is positive, negative or neutral review. Moreover, sentiment analysis is used to predict the sentiment of users on specific...
Intrusion Detection Systems assume a noteworthy job in the provision of security in wireless Sensor networks. The existing intrusion detection systems focus only on the detection of the known type of attacks. However, it neglects to recognize the new sort of attacks which are introduced by malicious users leading to vulnerability and information lo...
Internet of Things is a distributed collection of smart devices, where the smart device communicates with each other using Device to Device (D2D communication. Due to the resource constraint nature of IOT, the lightweight communication protocol is needed. Message Querying Telemetry Transport (MQTT) is one of the lightweight communication protocol w...
Wireless Sensor Networks (WSNs) is a collection of tiny nodes which are widely deployed in a given environment to sense the natural phenomenon and send the sensed information to via control station using multi hop communication. The advantages of the WSNs are their cost efficient and effective communication in unattended environments. Most of the e...
The internet exists as a global interconnection network for information sharing, commerce, and entertainment. The usage of internet has grown tremendously over the past decade in the field of E- health care monitoring system. In E- health care monitoring systems, Smart Wireless Body Area Networks (S-WBANs) is one among such technologies and is bein...
Wireless Sensor Networks (WSNs) is a distributed collection of tiny wireless nodes which forms an ad hoc network dynamically to sense the natural phenomenon and sent it to the control station. Due to the resource constrained nature of WSN, maximizing the nodes life time is main and challenging issue. In this paper, Fitness Function based Routing Pr...
In wireless sensor networks (WSN), the nodes are used to collect and gather the data from different environments. Hence, the network consumes more energy which is the main and challenging issue in WSNs. Since the sensor is operating under battery, recharging is impossible and hence the lifetime of each sensor is an important issue. Therefore, it is...
Security is an important phenomena for energy conservation in wireless sensor networks (WSN). Moreover, the management of trust in the WSN is a challenging task since trust is used when collaboration is critical to achieve reliable communication. In a military application using WSN, it is often necessary to communicate secret information such as mi...
Wireless Sensor Networks (WSNs) are used in the design of Internet of Things (IoT) for sensing the environment, collecting the data and to send them to the base station and the locations used for analysis. In WSNs for IoT, intelligent routing is an important phenomena that is necessary to enhance the Quality of Service (QoS) in the network. Moreove...
A mobile wireless sensor network (MWSN) consists of many sensor nodes, which can move from one position to another and gather data from the environment, and such nodes are coordinated with the support of a sink node. In recent years, the mobility behavior of sensor nodes present in wireless sensor networks is used to form effective clustering and t...
In recent days healthcare domains need a efficient storage and retrieval systems to provide a effective medical services to the health seekers. But there is a vocabulary gap in understanding the medical terminologies due to ambiguity. So, the existing systems need a intelligent medical storage using some natural language processing. Users post thei...
Wireless sensor networks (WSN) are useful in many practical applications including agriculture, military and health care systems. However, the nodes in a sensor network are constrained by energy and hence the lifespan of such sensor nodes are limited due to the energy problem. Temporal logics provide a facility to predict the lifetime of sensor nod...
In wireless sensor network, massive sensor nodes are deployed to sense the environment for various applications, so that there is a reduction in energy when performing routing which leads to decrease in network lifetime. However, if routing is performed through all the nodes, energy will be wasted. To avoid the wastage of resources such as energy o...
-Due to the expeditious improvement in the
wireless communication technology and automobile
industries, the en-sample of automobiles ad-hoc networks
appear as a auspicious path to afford road safety vehicle
truck age management, and infomercial usance.
Coordinated communication, on the other hand, can
embellish the dependability of communication li...
s a archetype of Automatic Machine for perfect health aided solution that adjoins mobile and Internet Protocol Version 6 and approaches in a Radionics sensor network to analyze the health condition of patients and afford a advanced range of Adequate, Effective, all-inclusive, and Comfort services. A low-Energy embedded personal wearable sensor scal...
Adhoc low power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by...