PRABAKARAN D

Verified email at gmail.com

ASSOCIATE PROFESSOR, DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
IFET COLLEGE OF ENGINEERING, VILLUPURAM



                             

https://researchid.co/prabakaran

B.E. in ECE
M.Tech in Applied Electronics
Ph.D. pursuing in Network Security
Published more than 10 research articles in SCI, Scopus indexed journals.

EDUCATION

B.E. in ECE
M.Tech in Applied Electronics
Ph.D. pursuing in Network Security

RESEARCH INTERESTS

Network Security, Cloud computing, Antenna

FUTURE PROJECTS

CLOUD COMPUTING SECURITY

TO ENHANCE SECURITY IN CLOUD COMPUTING AND ITS SERVICES


Applications Invited
9

Scopus Publications

89

Scholar Citations

6

Scholar h-index

5

Scholar i10-index

Scopus Publications

  • Design of H-Shaped Antenna for Multiband Applications
    P Harineeshwari. and D Prabakaran.

    IEEE International Conference on Data Science and Information System, ICDSIS 2022, Published: 2022 IEEE
    A wireless devices has an consecutive generation renovation to provide a higher and impressive service. The current 5G generation is the only one with the ability and power to communicate at extremely high speeds. Because they are now required for reliable 5G Wi-Fi connectivity, wide-band antennas with high gain have displaced traditional narrow bandwidth antennas with low gain. The next era, 6G, is projected to assist a large number of information site visitors in managing the increase in connection of Wi-Fi device. As a result, a significant amount of bandwidth will be aimed, and a greater benefit will be required. In order to satisfy the demand of information quotes and bandwidth utilization of conversation systems, maximum of the research studies results in the invent of new designs that fulfill the necessities of the future era verbal exchange. In this paper H-Shaped antenna that contains microstrip feed line is proposed. Among various substrates Polyimide dielectric substrate provides improved performance. The loss tangent and relative permittivity of the polyimide substrate are 3.5 and 0.0027, respectively. Computer software technology (CST) software is used to model the proposed system. The suggested H-shape antenna is shown, together with simulated results for gain, VSWR, return loss, directivity, and radiation pattern.

  • A Web Application Based Administration Panel For Handyman Services
    Gayathri Baskaran, K Saundariya, D Prabakaran, and R Senthilkumaran

    2022 IEEE Delhi Section Conference, DELCON 2022, Published: 2022 IEEE
    Web Development is evolving exponentially today at business purpose. Nowadays, there is an increasing need for handyman services and requires a simpler and more accessible way of storing and managing the required information about the Handyman website in the Admin panel and while using PHP/Python/Ajax, there is a blocking of data from the server-side and it takes multiple loading which makes the website with bad user interaction. This project proposed an administration panel for Household services. The purpose of this web design is to provide a non-blocking environment using Node JS to improve the quality of its working process. It is designed with React JS in front-end development, which makes faster response to the browser, SEO friendly. For security purposes, JWT is proposed in order to secure the data from unknown members by setting the Token. Also, a work analysis of the designed web application is presented and demonstrated in this paper.

  • Webapp service for booking handyman using MongoDB, express JS, React JS, node JS
    K Saundariya, M Abirami, Kumaran R Senthil, D Prabakaran, B Srimathi, and G Nagarajan

    2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, Pages: 180-183, Published: 13 May 2021 IEEE
    In recent days, there is a rapid increase in the need for handyman services around the world. If any issue is unfortunately encountered in the home, some issues may be hectic and people can’t be repaired on their own, people are busy with their schedule, hence they need workers to maintain and repair their homes. It is tough to find workers offline at the correct time and cost. Therefore, this online website makes it easier to book your own workers at the correct time and cost, it makes the workers available in just one click at your doorstep. Handyman workers have a separate login to showcase themselves by adding the works and skills they have. It also helps the professionals to gain opportunities and money based on their work. There are several categories and services, on the time of users’ login for the need for the services, the workers are listed based on location and cost with their name and contact. Creating a website using React JS makes it faster, boosts productivity, and is SEO friendly. MongoDB is a schema-less database and with ease of scale-out, hence it is easier to manage data. With this, a user can avoid delay and difficulty.

  • Speech processing: MFCC based feature extraction techniques - An investigation
    D. Prabakaran and S. Sriuppili

    Journal of Physics: Conference Series, ISSN: 17426588, eISSN: 17426596, Volume: 1717, Published: 9 January 2021 IOP Publishing
    Abstract In this digital world, there are many applications to secure and legalize their data and all of these emissions by various techniques and there are many algorithms and methods to process their data. Some extensive method used is biometric authentication and voice recognition is better, since it paves the convenient manner to the user and it merely acquires the voice from the user. Also the background noise is in crisis with Mel Frequency Cepstrum Coefficient (MFCC) which is recognition algorithm where overcome by other tools such as smoothening filter etc. The main focus of this project is to investigate the feature extraction scheme.

  • Secure Key Generation from Speech signal Using Enhanced MFCC Algorithm
    Prabakaran. D and Shyamala Ramachandran

    2021 IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2021, Published: 2021 IEEE
    Authentication is the crucial process of verifying and permitting the right user to access cloud services. The cloud service security proves to be fragile by the brute force efforts of hackers. To revamp the durability of authentication process, integrating the security factors has been exhorted. One such factor is the secure key extracted from the authenticated user’s voiceprint. This paper proposes a model for enhancing the signal to noise ratio of the MFCC algorithm to extract the secure key from the user voiceprint. The proposed method is highly rigid against the voice duplication attacks preventing unauthorized user to access by duplicating the authorized user’s voice print.

  • A Strong Authentication for Fortifying Wireless Healthcare Sensor Network Using Elliptical Curve Cryptography
    Prabakaran D and Sheela K

    2021 IEEE Mysore Sub Section International Conference, MysuruCon 2021, Pages: 249-254, Published: 2021 IEEE
    The wireless sensor network is the emerging technology with spatially placed electronic sensors to measure the vital parameters. The necessity of monitoring the patient”s critical parameters of physical parameter., psychological activities drives to the development of wireless health care sensor network. The evolution of Wireless Healthcare Sensor Network (WHSN) had eased the monitoring process of patient round the clock. Despite of benefits leading the Wireless Healthcare Sensor Network to the peak of performance., certain vital parameters like network agility and security of the network still remains as a concern. The security aspect of the Wireless Healthcare Sensor Network (WHSN) is a biggest challenge., as the attackers tends to access the details of the patients illegally and may sometimes leads to masquerade the data being transferred. To overcome this concern and to provide a high level of security to the sensitive health care data., this paper proposes a novel methodology to provide rigid authentication using Elliptical Curve Cryptography (ECC). The ECC-based CPABE secured framework for WBAN without the operation of bilinear pairing. The result shows that there is reductions in cipher text size, reduces the computational cost, and also secure transferring of information.

  • Multi-factor authentication for secured financial transactions in cloud environment
    D. Prabakaran and Shyamala Ramachandran

    Computers, Materials and Continua, ISSN: 15462218, eISSN: 15462226, Pages: 1781-1798, Published: 2021 Computers, Materials and Continua (Tech Science Press)
    The rise of the digital economy and the comfort of accessing by way of usermobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019, and manymore cloud server attacks over and over again. These attacks necessitate the demand for a strong framework for authentication to secure from any class of threat. This research paper, propose a framework with a base of Elliptical Curve Cryptography (ECC) to perform secure financial transactions throughVirtual PrivateNetwork (VPN) by implementing strongMulti-Factor Authentication (MFA)using authentication credentials and biometric identity. The research results prove that the proposed model is to be an ideal scheme for real-time implementation. The security analysis reports that the proposed model exhibits high level of security with a minimal response time of 12 s on an average of 1000 users.

  • A review on methodologies and performance analysis of device identity masking techniques
    International Journal of Scientific and Technology Research, eISSN: 22778616, Pages: 2018-2022, Published: December 2019

  • A Review on Performance of Voice Feature Extraction Techniques
    D. Prabakaran and R. Shyamala

    2019 Proceedings of the 3rd International Conference on Computing and Communications Technologies, ICCCT 2019, Pages: 221-231, Published: February 2019 IEEE
    In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.

RECENT SCHOLAR PUBLICATIONS

  • Privacy and Security of Smart Systems
    K Suresh Kumar, D Prabakaran, R Senthil Kumaran, I Yamuna
    Intelligent Green Technologies for Sustainable Smart Cities, 291-315 2022

  • Design of H-Shaped Antenna for Multiband Applications
    P Harineeshwari, D Prabakaran
    2022 IEEE International Conference on Data Science and Information System 2022

  • Secure Channel for Financial Transactions in Cloud Environment Using Blockchain Technology
    D Prabakaran, S Ramachandran
    2022

  • A Web Application Based Administration Panel For Handyman Services
    G Baskaran, K Saundariya, D Prabakaran, R Senthilkumaran
    2022 IEEE Delhi Section Conference (DELCON), 1-5 2022

  • Security and Privacy Provocation of Data in Cloud Computing
    D Prabakaran, KS Kumar, RS Kumaran
    Privacy and Security Challenges in Cloud Computing, 35-58 2022

  • Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
    D Prabakaran, S Ramachandran
    CMC-COMPUTERS MATERIALS & CONTINUA 70 (1), 1781-1798 2022

  • Secure Key Generation from Speech signal Using Enhanced MFCC Algorithm
    S Ramachandran
    2021 IEEE International Conference on Mobile Networks and Wireless 2021

  • A Strong Authentication For Fortifying Wireless Healthcare Sensor Network Using Elliptical Curve Cryptography
    D Prabakaran, K Sheela
    2021 IEEE Mysore Sub Section International Conference (MysuruCon), 249-254 2021

  • Webapp Service for Booking Handyman Using Mongodb, Express JS, React JS, Node JS
    K Saundariya, M Abirami, KR Senthil, D Prabakaran, B Srimathi, ...
    2021 3rd International Conference on Signal Processing and Communication 2021

  • Software-defined network (SDN) architecture and security considerations for 5G communications
    D Prabakaran, SM Nizar, KS Kumar
    Design methodologies and tools for 5G network development and application, 28-43 2021

  • Speech Processing: MFCC Based Feature Extraction Techniques-An Investigation
    D Prabakaran, S Sriuppili
    Journal of Physics: Conference Series 1717 (1), 012009 2021

  • A Review on Performance of Online Transaction Algorithms in Cloud Environment
    M Subashini
    International Journal of Engineering and Technical Research 9 (5) 2020

  • A Review on Performance of Voice Feature Extraction Techniques
    DRS D.Prabakaran
    2019 3rd International Conference on Computing and Communications 2019

  • A Review on Methodologies and Performance Analysis of Device Identity Masking Techniques
    D Prabakaran, H Sathyapriya
    International Journal of Scientific & Technology Research 8 (12), 2018-2022 2019

  • City Air Pollution Tracker
    Ramyadevi, P D
    International Journal of Pure and Applied Mathematics 119 (14), 1063-1068 2018

  • A Survey on security issues and solutions in Virtual private network
    DR Shyamala, P D
    International Journal of Pure and Applied Mathematics 119 (14), 1183-1192 2018

  • All Time Smart Health Monitoring System (ATHM)
    P D
    International Journal for Electronics and Communication Engineering 2017

  • Border Security System using Sensor Interface
    PD Jayanthi B
    International Journal for Research and Development in Technology 7 (4) 2017

  • A Patch Array Antenna for 5G Mobile Phone Applications
    PD Annalakshmi E
    Asian Journal of Applied Science and Technology (AJAST) 1 (3) 2017

  • RFID based Library Automation System
    PD Priyadharishini
    International Conference 2016

MOST CITED SCHOLAR PUBLICATIONS

  • A Review on Performance of Voice Feature Extraction Techniques
    DRS D.Prabakaran
    2019 3rd International Conference on Computing and Communications 2019
    Citations: 20

  • Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment
    D Prabakaran, S Ramachandran
    CMC-COMPUTERS MATERIALS & CONTINUA 70 (1), 1781-1798 2022
    Citations: 16

  • Speech Processing: MFCC Based Feature Extraction Techniques-An Investigation
    D Prabakaran, S Sriuppili
    Journal of Physics: Conference Series 1717 (1), 012009 2021
    Citations: 13

  • Webapp Service for Booking Handyman Using Mongodb, Express JS, React JS, Node JS
    K Saundariya, M Abirami, KR Senthil, D Prabakaran, B Srimathi, ...
    2021 3rd International Conference on Signal Processing and Communication 2021
    Citations: 10

  • A Survey on security issues and solutions in Virtual private network
    DR Shyamala, P D
    International Journal of Pure and Applied Mathematics 119 (14), 1183-1192 2018
    Citations: 10

  • A Patch Array Antenna for 5G Mobile Phone Applications
    PD Annalakshmi E
    Asian Journal of Applied Science and Technology (AJAST) 1 (3) 2017
    Citations: 8

  • Software-defined network (SDN) architecture and security considerations for 5G communications
    D Prabakaran, SM Nizar, KS Kumar
    Design methodologies and tools for 5G network development and application, 28-43 2021
    Citations: 6

  • Secure Channel for Financial Transactions in Cloud Environment Using Blockchain Technology
    D Prabakaran, S Ramachandran
    2022
    Citations: 2

  • A Review on Methodologies and Performance Analysis of Device Identity Masking Techniques
    D Prabakaran, H Sathyapriya
    International Journal of Scientific & Technology Research 8 (12), 2018-2022 2019
    Citations: 2

  • A Web Application Based Administration Panel For Handyman Services
    G Baskaran, K Saundariya, D Prabakaran, R Senthilkumaran
    2022 IEEE Delhi Section Conference (DELCON), 1-5 2022
    Citations: 1

  • Obstacle Identification Using Contour Based Wavelet Analysis
    SM Nizar, D Prabakaran, RS Kumaran, L Balaji, KS Kumar
    2015
    Citations: 1