User profiles for V. Thiruppathy Kesavan

Thiruppathy Kesavan

Professor, DSEC
Verified email at dsengg.ac.in
Cited by 276

Optimal reactive power dispatch for real power loss minimization and voltage stability enhancement using Artificial Bee Colony Algorithm

…, V Vimala, S Ramesh, VT Kesavan - Microprocessors and …, 2020 - Elsevier
Reactive Power Dispatch (RPD) plays important role in power system reliability and security.
This paper proposes the Optimal Reactive Power Dispatch (ORPD) for real power loss …

Adaptive neuro‐fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs

V Thiruppathy Kesavan, S Murugavalli… - IET …, 2023 - Wiley Online Library
Vehicular Adhoc Networks (VANET) facilitate inter‐vehicle communication using their dedicated
connection infrastructure. Numerous advantages and applications exist associated with …

Secret key cryptography based security approach for wireless sensor networks

VT Kesavan, S Radhakrishnan - … International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we propose a security approach which uses Secret Key (SK) cryptography and
key management along with re-keying support. A salient feature of this approach is that a …

Cluster based dynamic keying technique for authentication in wireless sensor networks

V Thiruppathy Kesavan, S Radhakrishnan - Mobile Communication and …, 2013 - Springer
This paper proposes a Cluster Based Dynamic Keying Technique (CBDKT) for authentication
in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (…

Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks

VT Kesavan, S Radhakrishnan - China Communications, 2016 - ieeexplore.ieee.org
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes
essential in various applications. During node mobility, there are possibilities for the malicious …

[PDF][PDF] Multiple secret keys based security for wireless sensor networks

VT Kesavan, S Radhakrishnan - International Journal of …, 2012 - academia.edu
We propose a security approach that uses secret key cryptography and key management
along with re-keying support. A salient feature of our approach is that a secret key is …

[PDF][PDF] Scalable and Secure Dynamic Key Management Framework for Static and Mobile Wireless Sensor Networks

VT KESAVAN - 2015 - academia.edu
Wireless Sensor Network consists of diverse numbers of resource constrained sensor
nodes that are deployed in the field to sense the real world attributes and send the sensed …

Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management

V Thiruppathy Kesavan… - Journal of Experimental & …, 2016 - Taylor & Francis
In mobile wireless sensor networks, the process of offering security to the network after
computing dynamic key may result in misuse of information by malicious node. All the messages …

A decentralized framework for enhancing security in power systems through blockchain technology and trading system

V Thiruppathy Kesavan, D Danalakshmi… - Energy Sources, Part …, 2024 - Taylor & Francis
The primary objective of implementing secure smart power networks is to reduce the risk of
data privacy breaches, including adversarial data poisoning and inference attacks. This study …

BLOCKCHAIN-POWERED INTRUDER IDENTIFICATION IN IOT NETWORKS-METHODOLOGY AND IMPLEMENTATION.

VT Kesavan, D Danalakshmi… - ICTACT Journal on …, 2024 - search.ebscohost.com
The Internet of Things (IoT) is expanding rapidly, raising concerns about network security
against attackers. This article explores the use of blockchain technology to enhance intrusion …