R. Anandan’s research while affiliated with Institute of Science & Technology for Advanced Studies & Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


Accuracy Results by File Size inline three ML models
Recall Results by File Size inline three ML models by Table
F1 Score Results by File Size inline three ML models by Table
Comparative Study of Lightweight Encryption Algorithms Leveraging Neural Processing Unit for Artificial Internet of Medical Things
  • Article
  • Full-text available

March 2025

·

25 Reads

·

2 Citations

International Journal of Computational and Experimental Science and Engineering

Puthiyavan Udayakumar

·

R. Anandan

The Artificial Internet of Medical Things (AIoMT)enables a new generation of medical devices with real-time data analytics, remote patient monitoring, and tailored medicine. This interconnected landscape also facilitates cyberattacks targeting sensitive and critical patient information. Cryptography is one Method of ensuring secure data transmission. IoT networks have boosted the concept of lightweight cryptography since IoT devices have limited resources, including power, memory, and batteries. These algorithms are designed to protect data efficiently while utilizing minimal resources. The research presents a comparative study of lightweight encryption algorithms evaluated by the National Institute of Standards and Technology (NIST) for suitability in securing data on AIoMT devices. Here, we analyze the Functional and Non-Functional characteristics of leading contenders. The value proposition of this research is to address the need to secure critical, sensitive patient information on AIoMT devices. The evaluation is performed using Raspberry Pi AI Kit, integrated with an M.2 HAT+ board and a Hailo-8L accelerator module; the Method adopted is a systematic literature review. Eight Models adopted AES, PRESENT, MSEA, LEA, XTEA, SIMON, PRINCE, and RECTANGLE; ML models adopted and trained and verified against each of the eight NIST lightweight encryption algorithms and every model assessed with key performance indicators such as precision, recall, F1-score, and accuracy.

Download

Design and Deploy Azure IoT Security

November 2024

·

3 Reads

·

2 Citations

The fundamentals of IoT security begin with the recognition that IoT devices are particularly vulnerable to cyber threats due to their vast connectivity and data exchange capabilities. A foundational aspect of IoT security is implementing strong authentication and authorization mechanisms. By restricting access to the network to authorized devices and users, unauthorized entry can be prevented, and data breaches can be mitigated. This includes employing multifactor authentication and leveraging certificates or other cryptographic methods to verify identities. Additionally, devices and users should only receive the minimum access necessary to perform their functions according to the principle of least privilege. For devices to be protected against newly discovered threats and address known vulnerabilities, firmware, and software must be regularly updated and patched.


Design and Deploy Azure Edge Services

November 2024

In the realm of the Internet of Things (IoT), networks play a critical role in facilitating communication between devices, enabling data exchange, and supporting various applications. This overview provides a comprehensive look at crucial aspects of IoT networks, including protocols, models, and layers, as well as the design and deployment of Azure Edge Services for IoT applications.


Design and Deploy Azure IoT Networks

November 2024

Network topology serves as the backbone upon which innovative solutions are built. This subsection delves into the fundamental principles that govern network structures, providing a comprehensive understanding of how data flows and devices communicate within an IoT ecosystem. By grasping the intricacies of network topology, readers will gain the insights necessary to design resilient and scalable architectures tailored for Azure environments.


Get Started with IoT Network and Security

November 2024

Welcome to the dynamic realm of IoT networks and cybersecurity. In today's interconnected world, the proliferation of IoT devices has fundamentally changed how we interact with technology. Before we embark on our exploration, it is crucial to understand the essence of IoT networks and the paramount importance of security within these interconnected systems.




Plan Microsoft Defender for IoT

May 2024

·

13 Reads

·

1 Citation

Planning a comprehensive plan for Microsoft Defender for IoT is paramount due to the unique security challenges associated with Internet of Things (IoT) devices. Unlike traditional computing devices, IoT devices often operate in diverse and distributed environments, making them susceptible to various threats. A well-structured plan is necessary to address these challenges and ensure the security and integrity of the IoT ecosystem.


Manage Microsoft Defender for IoT

May 2024

·

1 Read

In this book, you are at final stages, from the foundational steps to the final stage of Microsoft Defender for IoT management and security. This chapter serves as a comprehensive reference point for organizations seeking to optimize their security operations within operational technology (OT) environments.


Deploy Microsoft Defender for IoT

May 2024

·

5 Reads

In this book, you are at crucial stages, from the foundational steps to the advanced stage of Microsoft Defender for IoT deployment. Each section of this chapter is thoughtfully curated to provide a structured and in-depth understanding of the deployment processes for securing the Internet of Things (IoT) ecosystem.


Citations (7)


... Implementing ZTA involves micro-segmentation, strict identity verification, and dynamic access controls to prevent unauthorized access. Microsoft's Zero Trust framework exemplifies this model, advocating for stringent identity management and least privilege enforcement (Udayakumar & Anandan, 2024;Samuel-Okon et al., 2024). ...

Reference:

Developing Proactive Threat Mitigation Strategies for Cloud Misconfiguration Risks in Financial SaaS Applications
Design and Deploy Azure IoT Security
  • Citing Chapter
  • November 2024

... Recent advancements in hardware acceleration, including graphics processing units (GPUs) and tensor processing units (TPUs), have facilitated the deployment of complex PIDL models in real-time grid environments. Additionally, federated learning frameworks and decentralized AI architectures offer new possibilities for scaling PIDL-based control across large-scale power systems without compromising security or computational efficiency [17][18][19][20]. ...

Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities
  • Citing Book
  • January 2024

... The distributed nature of cloud-native systems further worsens their susceptibility to cyberattacks. Attackers can alter or intercept data before it reaches its intended destination, a scenario that can severely disrupt real-time applications (Udayakumar & Anandan, 2024;Marquis et al., 2024). According to Shahid et al. (2022), delays or inaccuracies in data transmission caused by such attacks can compromise decision-making processes, particularly in sensitive settings like healthcare, where a compromised robot transmitting patient data could lead to incorrect diagnoses or treatments. ...

Develop Security Strategy for IoT/OT with Defender for IoT
  • Citing Chapter
  • May 2024

... In this framework, quantum entanglement links distinct qubits. Within quantum circuits, these setups execute quantum operations through quantum gates [21]. It is widely recognized that a quantum gate alters a qubit system into a different state, and similarly to classical computing, that can be integrated with various classical operators, such as rotation operator gates and CX gates [22]. ...

Plant disease recognition using residual convolutional enlightened Swin transformer networks
Ponugoti Kalpana

·

R. Anandan

·

Abdelazim G. Hussien

·

[...]

·

... The Adaptive Multi-Layer Security Framework (AMLSF) was introduced in the paper [18] for real-time applications in smart city networks to address current security challenges. It used machine learning-based algorithms to dynamically adapt security protocols in response to real-time threats and unexpected patterns in device behaviour. ...

Adaptive Multi-Layer Security Framework (AMLSF) for real-time applications in smart city networks

Journal of Autonomous Intelligence

... However, it has yielded considerable success and has been integrated into various phases of plant growth realized in the domain of precision agriculture. These include plant growth stress and disease detection [18][19][20][21] , growth monitoring 22,23 , plant seedling classification 24,25 , yield prediction 26 among others. Among these applications of AI on big data in agriculture, strawberry growth stage classification for nutrition management has remained largely unexplored. ...

A Capsule Attention Network for Plant Disease Classification
  • Citing Article
  • October 2023

Traitement du signal