@amrita.edu
Assistant Professor (Senior Grade)
Amrita Vishwa Vidyapeetham
Multidisciplinary, Computer Engineering
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Danda Prudhvi Krishna, R. Ramaguru, K. Praveen, M. Sethumadhavan, Kattur Soundarapandian Ravichandran, Raghunathan Krishankumar, and Amir H. Gandomi
Springer Science and Business Media LLC
AbstractOAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third-party fraud and identity theft. To circumvent this problem, we need a distributed framework to authenticate and authorize the user without third-party involvement. This paper proposes a distributed authentication and authorization framework using a secret-sharing mechanism that comprises a blockchain-based decentralized identifier and a private distributed storage via an interplanetary file system. We implemented our proposed framework in Hyperledger Fabric (permissioned blockchain) and Ethereum TestNet (permissionless blockchain). Our performance analysis indicates that secret sharing-based authentication takes negligible time for generation and a combination of shares for verification. Moreover, security analysis shows that our model is robust, end-to-end secure, and compliant with the Universal Composability Framework.
Aju Mathew Thomas, K. V. Lakshmy, R. Ramaguru, and P. P. Amritha
Springer Nature Singapore
Yaswanth Lingam Sivadanam, R. Ramaguru, and M. Sethumadhavan
Springer Nature Singapore
Aju Mathew Thomas, R Ramaguru, and M Sethumadhavan
Springer Nature Singapore
Aju Mathew Thomas, Gowtham Akshaya Kumaran, R Ramaguru, R Harish, and K Praveen
IEEE
The necessity for safeguarding wireless networks has increased due to an increase in the number of associated cyber-attacks on unsecured and weak wireless networks. It is critical for individuals, homeowners, and businesses to protect their wireless networks from external hackers. Wardriving is the act of an attacker foraging for wireless networks while driving a vehicle or while using a laptop or a smartphone. It is an efficient method for gathering information about nearby Wireless Access Points (WAPs), which aids in the analysis of a particular WAPs weakness. Hackers use wardriving techniques to identify open and poorly secured WAPs from which they can conduct illegal activities such as stealing personal data containing sensitive information and later using it to commit identity theft. This paper proposes and develops a Python-based standalone tool for analyzing the vulnerability of a specific Access Points captured during wardriving activity. The proposed tool generates a Report with the information about the WAP captured and also outlines best practices and recommendations for securing the WAP against wardriving.
Samia Anjum, R. Ramaguru, and M. Sethumadhavan
Springer International Publishing
M. Kripa, A. Nidhin Mahesh, R. Ramaguru, and P. P. Amritha
Springer Singapore
R. Ramaguru, M. Sindhu, and M. Sethumadhavan
Springer Singapore