Radhakrishnan Maivizhi

@nitpy.ac.in

Faculty (On Contract), CSE
National Institute of Technology Puducherry, Karaikal, Puducherry, India



              

https://researchid.co/maivizhi16

RESEARCH INTERESTS

Wireless Sensor Networks
Internet of Things
Machine Learning
Network Security

11

Scopus Publications

81

Scholar Citations

6

Scholar h-index

3

Scholar i10-index

Scopus Publications

  • Identity-based secure data aggregation in big data wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    Inderscience Publishers

  • Fuzzy routing for in-network aggregation in wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    Springer Science and Business Media LLC

  • Q-learning based routing for in-network aggregation in wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    Springer Science and Business Media LLC

  • Spatial Correlation based Data Redundancy Elimination for Data Aggregation in Wireless Sensor Networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    IEEE
    The dense distributed deployment of Wireless Sensor Networks (WSNs) causes the sensors to generate big amount of data which are highly correlated and redundant. Transmitting such spatially correlated and redundant data consumes more sensor energy and consequently decreases the lifetime of network. Eliminating redundancy is thus necessary in the sensed data and also while processing the sensed data. By employing appropriate data aggregation techniques, the data redundancy can be minimized. We leverage statistical techniques in sensor networks and propose a novel Spatial Correlation based Data Redundancy Elimination for Data Aggregation (SCDRE) protocol that eliminates redundancy at two levels: at source level, it uses simple data similarity function and at aggregator level, it uses correlation coefficient to eliminate redundancy and aggregate the data. We have evaluated the proposed protocol in terms of aggregation ratio, data accuracy and energy consumption and the results show that SCDRE outperforms other existing techniques. In addition, SCDRE is more robust in the presence of noise and outliers. By eliminating data redundancy to greater extent, our protocol experiences less communication overhead and significantly enhances the lifetime of sensor networks.

  • Concealed multidimensional data aggregation in big data wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    ACM
    Wireless sensor networks (WSNs) deployed in a plethora of applications produce a significant portion of big data. Handling these huge volume of data is a critical challenge in a resource constrained wireless sensor networks. Data aggregation is the most practical and important paradigm in big data wireless sensor networks. It reduces the huge volume of data by combining the similar data and eliminating data redundancy and reduces thereby the resource consumption. However preserving data confidentiality and integrity along with en-route aggregation is a great challenge. In this paper, we propose a novel Concealed Multidimensional Data Aggregation (CMDA) protocol for big data wireless sensor networks. CMDA integrates super-increasing sequence and homomorphic encryption to structure the multidimensional data and protect the data privacy and a homomorphic signature to check the integrity of data. In addition, the proposed protocol filters false data packets and achieves data freshness. Security analysis reveals that the proposed protocol achieves end-to-end security and performance evaluation shows that CMDA incurs less communication overhead and consequently reduces energy consumption which enhances the lifetime of sensor networks. To the best of our knowledge, this is the first work that achieves end-to-end security in multidimensional data aggregation.

  • Linear Discriminant Analysis for Data Aggregation in Big Data Wireless Sensor Networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    ACM
    1 EXTENDED ABSTRACT Data aggregation or in-network aggregation plays a fundamental and vital role in maximizing the lifetime of wireless sensor networks (WSNs). However, in big data applications, existing data aggregation (DA) techniques based on compressed sensing, discrete cosine tranform and principal component analysis [2] suffer from problems such as high energy consumption and complex data analysis. To overcome these problems, we propose a novel linear discriminant analysis based data aggregation protocol for multidimensional data in big data WSNs. The proposed protocol employs Fisher Linear Discriminant (FLD) [1], a machine learning technique for aggregating multidimensional data. Researchers defined FLD as a classifier and a dimensionality reduction technique. Classifier: Data aggregation is performed after projecting the multidimensional data down to one dimension as follows. y =WT x ≥ −w0 (1)

  • Secure in-network aggregation in wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    IGI Global
    In-network aggregation is a natural approach in wireless sensor networks (WSNs) to collaboratively process data generated by the sensor nodes. Besides processing, in-network aggregation also achieves effective energy consumption and bandwidth utilization. Since the sensing devices of a WSN are prone to a variety of attacks due to wireless communication and limited resources, secure in-network aggregation is a great challenge. This article proposes a secure in-network aggregation (SINA) protocol for additive aggregation functions. This protocol integrates privacy homomorphism (PH) and secret sharing to achieve both data confidentiality and data integrity. Additionally, the proposed protocol ensures message authentication and data freshness. Moreover, it achieves false data screening in-network should be changed as in-network false data screening which considerably saves energy by not transmitting false packets. Security analysis reveals that SINA protects the network from variety of attacks. Performance analysis shows that SINA consumes less energy while achieving end-to-end security, and thereby increases the lifetime of the WSN.

  • Intrusion Resilient Concealed Data Aggregation in Wireless Sensor Networks
    Maivizhi Radhakrishnan and Yogesh Palanichamy

    IEEE
    The primary objective of Concealed Data Aggregation (CDA) is to preserve privacy while performing enroute data aggregation. Privacy Homomorphism (PH) techniques facilitate the development of concealed data aggregation protocols that enable end-to-end encryption in wireless sensor networks. Nevertheless, these protocols do not satisfy other security requirements such as integrity, authentication and data freshness and are vulnerable to various attacks. In this paper, we propose the novel Intrusion Resilient Concealed Data Aggregation (IRCDA) protocol for secure in-network data aggregation. This protocol employs privacy homomorphism techniques to achieve data privacy and combines them with homomorphic digital signatures to protect the integrity of the aggregated result. In addition, the proposed approach is resilient against node compromise attacks, an attack that devastates the function of Wireless Sensor Networks (WSNs). Security analysis and performance evaluation show that ours is the first work which remains secure even after compromising many sensor nodes and base station though not simultaneously. It completely mitigates the harmful effect caused by key exposure. Moreover, our protocol incurs very less communication overhead with slight increase in computation which is negligible when compared to communication cost and thereby it prolongs the lifetime of the network. The results prove that IRCDA performs better than most of the existing techniques in providing security to the process of data aggregation.

  • Efficient and robust secure in-network aggregation in wireless sensor networks
    Radhakrishnan Maivizhi and Palanichamy Yogesh

    Springer Singapore

  • A survey of tools for community detection and mining in social networks
    R. Maivizhi, S. Sendhilkumar, and G. S. Mahalakshmi

    ACM
    Online Social Networks (OSNs) namely Facebook, Twitter and LinkedIn are the most popularly visited sites on the internet. These sites contain large voluminous data about the people and relationships among them. Community structure is an important property of social networks. It is a topic of considerable interest in many areas due to its wide range of applications in multiple disciplines including biology, computer science, social sciences and so on. Detection of communities reveals how the structure of ties affects the peoples and their relationships. To facilitate community discovery a wide range of tools have been developed over years. This paper surveys several tools available for detection and mining of communities and presents a comparative study. In addition, we discussed various visualization layouts of social networks in order to perceive network data and to communicate the result of analysis.

  • Distance based detection and localization of multiple spoofing attackers for wireless networks
    Maivizhi R. and Matilda S.

    IEEE
    Wireless networks are prone to identity based spoofing attacks and tend to degrade network performance. Received Signal Strength (RSS) spatial correlation is usually used for detecting and localizing spoofing attacks. This cannot be applied to environments where RSS value is not stable and varies with distance. This approach is also not desirable for accurate localization of multiple adversaries. This paper proposes Distance based Detection and Localization (DDL) algorithm that adds distance parameter to the existing system to perform spoofing detection and accurate localization of multiple adversaries. In addition, it determines the number of attackers, eliminates them from the network and thereby improves network performance. Simulation results demonstrate that this proposed work provides excellent localization performance and is generic across different technologies including IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee) networks.

RECENT SCHOLAR PUBLICATIONS

  • Identity-based secure data aggregation in big data wireless sensor networks
    R Maivizhi, P Yogesh
    International Journal of Ad Hoc and Ubiquitous Computing 41 (1), 16-28 2022

  • Fuzzy routing for in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    Peer-to-Peer Networking and Applications 15 (1), 592-611 2022

  • Q-learning based routing for in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    Wireless Networks 27 (3), 2231-2250 2021

  • Linear Discriminant Analysis for Data Aggregation in Big Data Wireless Sensor Networks
    R Maivizhi, P Yogesh
    Proceedings of the 3rd ACM India Joint International Conference on Data 2021

  • Spatial correlation based data redundancy elimination for data aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    2020 international conference on innovative trends in information technology 2020

  • Concealed multidimensional data aggregation in big data wireless sensor networks
    R Maivizhi, P Yogesh
    Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, 19-27 2020

  • Secure in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    International Journal of Intelligent Information Technologies (IJIIT) 16 (1 2020

  • Smart Secure Systems–Iot and Analytics Perspective
    GP Venkataramani, K Sankaranarayanan, S Mukherjee, K Arputharaj, ...
    Comminications in Computer and Information Science ed.). Springer 2018

  • Efficient and Robust Secure In-Network Aggregation in Wireless Sensor Networks
    R Maivizhi, P Yogesh
    Smart Secure Systems–IoT and Analytics Perspective: Second International 2018

  • Intrusion Resilient Concealed Data Aggregation in Wireless Sensor Networks
    M Radhakrishnan, Y Palanichamy
    2017 Ninth International Conference on Advanced Computing (ICoAC), 227-234 2017

  • A survey of tools for community detection and mining in social networks
    R Maivizhi, S Sendhilkumar, GS Mahalakshmi
    Proceedings of the International Conference on Informatics and Analytics, 1-8 2016

  • Detection and Localization of Multiple Spoofing Attackers for Mobile Wireless Networks
    R Maivizhi, S Matilda
    ICTACT Journal on Communication Technology 6 (2) 2015

  • Distance based Detection and Localization of multiple spoofing attackers for wireless networks
    R Maivizhi, S Matilda
    2014 International Conference on Computation of Power, Energy, Information 2014

MOST CITED SCHOLAR PUBLICATIONS

  • Q-learning based routing for in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    Wireless Networks 27 (3), 2231-2250 2021
    Citations: 22

  • Spatial correlation based data redundancy elimination for data aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    2020 international conference on innovative trends in information technology 2020
    Citations: 19

  • A survey of tools for community detection and mining in social networks
    R Maivizhi, S Sendhilkumar, GS Mahalakshmi
    Proceedings of the International Conference on Informatics and Analytics, 1-8 2016
    Citations: 10

  • Distance based Detection and Localization of multiple spoofing attackers for wireless networks
    R Maivizhi, S Matilda
    2014 International Conference on Computation of Power, Energy, Information 2014
    Citations: 8

  • Fuzzy routing for in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    Peer-to-Peer Networking and Applications 15 (1), 592-611 2022
    Citations: 6

  • Concealed multidimensional data aggregation in big data wireless sensor networks
    R Maivizhi, P Yogesh
    Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, 19-27 2020
    Citations: 6

  • Smart Secure Systems–Iot and Analytics Perspective
    GP Venkataramani, K Sankaranarayanan, S Mukherjee, K Arputharaj, ...
    Comminications in Computer and Information Science ed.). Springer 2018
    Citations: 5

  • Secure in-network aggregation in wireless sensor networks
    R Maivizhi, P Yogesh
    International Journal of Intelligent Information Technologies (IJIIT) 16 (1 2020
    Citations: 3

  • Identity-based secure data aggregation in big data wireless sensor networks
    R Maivizhi, P Yogesh
    International Journal of Ad Hoc and Ubiquitous Computing 41 (1), 16-28 2022
    Citations: 1

  • Detection and Localization of Multiple Spoofing Attackers for Mobile Wireless Networks
    R Maivizhi, S Matilda
    ICTACT Journal on Communication Technology 6 (2) 2015
    Citations: 1