User profiles for V. Thiruppathy Kesavan
Thiruppathy KesavanProfessor, DSEC Verified email at dsengg.ac.in Cited by 276 |
Optimal reactive power dispatch for real power loss minimization and voltage stability enhancement using Artificial Bee Colony Algorithm
…, V Vimala, S Ramesh, VT Kesavan - Microprocessors and …, 2020 - Elsevier
Reactive Power Dispatch (RPD) plays important role in power system reliability and security.
This paper proposes the Optimal Reactive Power Dispatch (ORPD) for real power loss …
This paper proposes the Optimal Reactive Power Dispatch (ORPD) for real power loss …
Adaptive neuro‐fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs
V Thiruppathy Kesavan, S Murugavalli… - IET …, 2023 - Wiley Online Library
Vehicular Adhoc Networks (VANET) facilitate inter‐vehicle communication using their dedicated
connection infrastructure. Numerous advantages and applications exist associated with …
connection infrastructure. Numerous advantages and applications exist associated with …
Secret key cryptography based security approach for wireless sensor networks
VT Kesavan, S Radhakrishnan - … International Conference on …, 2012 - ieeexplore.ieee.org
In this paper, we propose a security approach which uses Secret Key (SK) cryptography and
key management along with re-keying support. A salient feature of this approach is that a …
key management along with re-keying support. A salient feature of this approach is that a …
Cluster based dynamic keying technique for authentication in wireless sensor networks
V Thiruppathy Kesavan, S Radhakrishnan - Mobile Communication and …, 2013 - Springer
This paper proposes a Cluster Based Dynamic Keying Technique (CBDKT) for authentication
in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (…
in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (…
Cluster based secure dynamic keying technique for heterogeneous mobile wireless sensor networks
VT Kesavan, S Radhakrishnan - China Communications, 2016 - ieeexplore.ieee.org
In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes
essential in various applications. During node mobility, there are possibilities for the malicious …
essential in various applications. During node mobility, there are possibilities for the malicious …
[PDF][PDF] Multiple secret keys based security for wireless sensor networks
VT Kesavan, S Radhakrishnan - International Journal of …, 2012 - academia.edu
We propose a security approach that uses secret key cryptography and key management
along with re-keying support. A salient feature of our approach is that a secret key is …
along with re-keying support. A salient feature of our approach is that a secret key is …
[PDF][PDF] Scalable and Secure Dynamic Key Management Framework for Static and Mobile Wireless Sensor Networks
VT KESAVAN - 2015 - academia.edu
Wireless Sensor Network consists of diverse numbers of resource constrained sensor
nodes that are deployed in the field to sense the real world attributes and send the sensed …
nodes that are deployed in the field to sense the real world attributes and send the sensed …
Secure clustering and routing for heterogeneous mobile wireless sensor networks with dynamic key management
V Thiruppathy Kesavan… - Journal of Experimental & …, 2016 - Taylor & Francis
In mobile wireless sensor networks, the process of offering security to the network after
computing dynamic key may result in misuse of information by malicious node. All the messages …
computing dynamic key may result in misuse of information by malicious node. All the messages …
A decentralized framework for enhancing security in power systems through blockchain technology and trading system
V Thiruppathy Kesavan, D Danalakshmi… - Energy Sources, Part …, 2024 - Taylor & Francis
The primary objective of implementing secure smart power networks is to reduce the risk of
data privacy breaches, including adversarial data poisoning and inference attacks. This study …
data privacy breaches, including adversarial data poisoning and inference attacks. This study …
BLOCKCHAIN-POWERED INTRUDER IDENTIFICATION IN IOT NETWORKS-METHODOLOGY AND IMPLEMENTATION.
VT Kesavan, D Danalakshmi… - ICTACT Journal on …, 2024 - search.ebscohost.com
The Internet of Things (IoT) is expanding rapidly, raising concerns about network security
against attackers. This article explores the use of blockchain technology to enhance intrusion …
against attackers. This article explores the use of blockchain technology to enhance intrusion …