Faculty Dr Manjula R
Dr Manjula R SRM-AP

Dr Manjula R

Assistant Professor

Department of Computer Science and Engineering

Contact Details

manjula.r@srmap.edu.in

Office Location

J C Bose Block, Level 2, Cabin No: 204, Nano Communications and Networking Lab

Education

2018
Indian Institute of Technology Kharagpur
India
2006
M. Tech
Visvesvaraya Technological University
India
2002
B. E.
Visvesvaraya Technological University
India

Personal Website

Experience

  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2017 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka

Research Interest

  • Present Research Work: Present and Future Research Area: The new research domain that I am currently exploring is “in-vivo Wireless Nanosensor Networks” for cardiac health monitoring. With the never-ending technological advancements and nanotechnology, researchers have shown, in the past, the feasibility of nano-sized computers that could be swallowed or injected into the human body. The nano-machines are used to collect information at the molecular level from within the human body and deliver them to the outside world for further analysis. Theoretical models for channels, physical layer, and data link layers protocols are available in the literature. However, little research is seen in the network layer, especially in data collection and routing. Currently my research team is understanding the effect of bio-channels on terahertz signals to determine path loss and channel capacity. Further, our team is working on developing nano-sized bio compatible antennas operating in terahertz band as coupling device that is suitable for nano-machines for in-vivo communications. This knowledge is then utilized by MAC layer protocols and routing protocols to achieved optimal data delivery mechanism. We have completed channel modeling for in-vivo communications when nanosensors are used for monitoring cardiac health monitoring and also performed channel capacity analyses. The nanosized antenna developed is published in Indian Patent. The preliminary investigations of this work have been published in conferences and accepted in book chapters.
  • Past Research: My Ph.D. and the ongoing research work focus on designing energy-efficient techniques for preserving contextual privacy in Wireless Sensor Networks. The wireless nature of information communication between the sensor nodes and from the sensor node to the base station may endanger the privacy of the asset(s) (e.g., habitat monitoring, military applications, etc.) under observation when an adversary, who is capable of detecting the message flows, may trace back to the source in the reverse path and locate the assets. Unlike traditional message content concealment which involves hiding the original information through cryptography or steganography, say, for instance, the current work focuses on concealing the contextual information. In particular, protecting the source of information. Currently, I am exploring the following three areas (i.e., addressing three questions): i) analyzing the performance of source location privacy preservation techniques in presence of multiple sources; ii) understanding the effect of the active attacks, such as packet content modification attacks and packet dropping attacks, on the performance of privacy-preserving protocols; and iii) studying the impact of radio range on privacy strength, measured in terms of safety period metric. Of these, the solutions to the first question are seen in two reputed IEEE journals namely, IEEE Internet of Things Journal and IEEE Transactions on Industrial Informatics.

Awards

  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2011: Cambridge International Certificate for Teachers and Trainers, Achieved a certificate at Professional Level, with Distinction, through Mission10X Wipro ltd
  • 2010: “Integrated Innovations+”, Contribution to the best innovations practiced by the Mission10Xians, A book released on occasion of Mission10X third anniversary, 2nd edition | Security in Communication Networks, pp. 73-74 | Cryptography, pp. 137-138.
  • 2009–2010: Mission10X International Certifications |Mission10X Dale Carnegie Certificate in High Impact Teaching Skills, 2009 | Mission10X Certificate in Teaching and Learning, 2010
  • 2009: INNOVATION, Contribution to a book on activity-based learning - Quiz. pp 62.
  • 2007: Cisco Certified Network Associate, CCNA, Cisco Career Certifications, CSCO11305180, validity 25/102007 to 20/10/2010 | Score Details: Planning and Designing (91%) Implementation and Operation (75%) Troubleshooting (77%) Technology (84%)
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2005: Certification on Instructional Design and Delivery, NITTTR, Chennai
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.

Memberships

  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)

Publications

  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.

Patents

  • Dual band micro-strip patch antenna for electromagnetic nano- communications.

    Dr Manjula R

    Patent Application No: 202441011916, Date Filed: 20/02/2024, Date Published: 08/03/2024, Status: Published

  • System for determining and predicting scattering coefficients of myocardium tissue in near-infrared-band for in-vivo communications

    Dr Manjula R

    Patent Application No: 202441090535, Date Filed: 21/11/2024, Date Published: 29/11/2024, Status: Published

Projects

Scholars

Doctoral Scholars

  • Mr. Rampilla Swathi Kiran Kumar
  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan

Interests

  • 6G networks
  • Nanoantenna Design
  • Nanosensor Design
  • Security and Privacy
  • Wireless Nanosensor Networks
  • Wireless Sensor Networks

Thought Leaderships

There are no Thought Leaderships associated with this faculty.

Top Achievements

Research Area

No research areas found for this faculty.

Computer Science and Engineering is a fast-evolving discipline and this is an exciting time to become a Computer Scientist!

Computer Science and Engineering is a fast-evolving discipline and this is an exciting time to become a Computer Scientist!

Recent Updates

No recent updates found.

Education
2002
B. E.
Visvesvaraya Technological University
India
2006
M. Tech
Visvesvaraya Technological University
India
2018
Indian Institute of Technology Kharagpur
India
Experience
  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2017 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
Research Interests
  • Present Research Work: Present and Future Research Area: The new research domain that I am currently exploring is “in-vivo Wireless Nanosensor Networks” for cardiac health monitoring. With the never-ending technological advancements and nanotechnology, researchers have shown, in the past, the feasibility of nano-sized computers that could be swallowed or injected into the human body. The nano-machines are used to collect information at the molecular level from within the human body and deliver them to the outside world for further analysis. Theoretical models for channels, physical layer, and data link layers protocols are available in the literature. However, little research is seen in the network layer, especially in data collection and routing. Currently my research team is understanding the effect of bio-channels on terahertz signals to determine path loss and channel capacity. Further, our team is working on developing nano-sized bio compatible antennas operating in terahertz band as coupling device that is suitable for nano-machines for in-vivo communications. This knowledge is then utilized by MAC layer protocols and routing protocols to achieved optimal data delivery mechanism. We have completed channel modeling for in-vivo communications when nanosensors are used for monitoring cardiac health monitoring and also performed channel capacity analyses. The nanosized antenna developed is published in Indian Patent. The preliminary investigations of this work have been published in conferences and accepted in book chapters.
  • Past Research: My Ph.D. and the ongoing research work focus on designing energy-efficient techniques for preserving contextual privacy in Wireless Sensor Networks. The wireless nature of information communication between the sensor nodes and from the sensor node to the base station may endanger the privacy of the asset(s) (e.g., habitat monitoring, military applications, etc.) under observation when an adversary, who is capable of detecting the message flows, may trace back to the source in the reverse path and locate the assets. Unlike traditional message content concealment which involves hiding the original information through cryptography or steganography, say, for instance, the current work focuses on concealing the contextual information. In particular, protecting the source of information. Currently, I am exploring the following three areas (i.e., addressing three questions): i) analyzing the performance of source location privacy preservation techniques in presence of multiple sources; ii) understanding the effect of the active attacks, such as packet content modification attacks and packet dropping attacks, on the performance of privacy-preserving protocols; and iii) studying the impact of radio range on privacy strength, measured in terms of safety period metric. Of these, the solutions to the first question are seen in two reputed IEEE journals namely, IEEE Internet of Things Journal and IEEE Transactions on Industrial Informatics.
Awards & Fellowships
  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2011: Cambridge International Certificate for Teachers and Trainers, Achieved a certificate at Professional Level, with Distinction, through Mission10X Wipro ltd
  • 2010: “Integrated Innovations+”, Contribution to the best innovations practiced by the Mission10Xians, A book released on occasion of Mission10X third anniversary, 2nd edition | Security in Communication Networks, pp. 73-74 | Cryptography, pp. 137-138.
  • 2009–2010: Mission10X International Certifications |Mission10X Dale Carnegie Certificate in High Impact Teaching Skills, 2009 | Mission10X Certificate in Teaching and Learning, 2010
  • 2009: INNOVATION, Contribution to a book on activity-based learning - Quiz. pp 62.
  • 2007: Cisco Certified Network Associate, CCNA, Cisco Career Certifications, CSCO11305180, validity 25/102007 to 20/10/2010 | Score Details: Planning and Designing (91%) Implementation and Operation (75%) Troubleshooting (77%) Technology (84%)
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2005: Certification on Instructional Design and Delivery, NITTTR, Chennai
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.
Memberships
  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)
Publications
  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.
Contact Details

manjula.r@srmap.edu.in

Scholars

Doctoral Scholars

  • Mr. Rampilla Swathi Kiran Kumar
  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan

Interests

  • 6G networks
  • Nanoantenna Design
  • Nanosensor Design
  • Security and Privacy
  • Wireless Nanosensor Networks
  • Wireless Sensor Networks

Education
2002
B. E.
Visvesvaraya Technological University
India
2006
M. Tech
Visvesvaraya Technological University
India
2018
Indian Institute of Technology Kharagpur
India
Experience
  • Dec. 2019 – Till date, Asst. Prof. | SRM University AP, Amaravati, AP
  • Aug. 2018 – Nov. 2019, Professor | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2017 – July 2018, Assoc. Prof.| Ballari Institute of Technology and Management, Ballari, Karnataka
  • 2011-2017 - Teaching assistant at Network Design and Simulation Lab 1 and 2, practical | Department of Electronics and Electrical Communication Engineering, IIT Kharagpur
  • Feb. 2009 – July 2011, Asst. Prof. | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Jan. 2008 – Dec. 2008, Sr. Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • July 2006 – Dec. 2007, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
  • Sept. 2002 – Sept. 2004, Lecturer | Ballari Institute of Technology and Management, Ballari, Karnataka
Research Interests
  • Present Research Work: Present and Future Research Area: The new research domain that I am currently exploring is “in-vivo Wireless Nanosensor Networks” for cardiac health monitoring. With the never-ending technological advancements and nanotechnology, researchers have shown, in the past, the feasibility of nano-sized computers that could be swallowed or injected into the human body. The nano-machines are used to collect information at the molecular level from within the human body and deliver them to the outside world for further analysis. Theoretical models for channels, physical layer, and data link layers protocols are available in the literature. However, little research is seen in the network layer, especially in data collection and routing. Currently my research team is understanding the effect of bio-channels on terahertz signals to determine path loss and channel capacity. Further, our team is working on developing nano-sized bio compatible antennas operating in terahertz band as coupling device that is suitable for nano-machines for in-vivo communications. This knowledge is then utilized by MAC layer protocols and routing protocols to achieved optimal data delivery mechanism. We have completed channel modeling for in-vivo communications when nanosensors are used for monitoring cardiac health monitoring and also performed channel capacity analyses. The nanosized antenna developed is published in Indian Patent. The preliminary investigations of this work have been published in conferences and accepted in book chapters.
  • Past Research: My Ph.D. and the ongoing research work focus on designing energy-efficient techniques for preserving contextual privacy in Wireless Sensor Networks. The wireless nature of information communication between the sensor nodes and from the sensor node to the base station may endanger the privacy of the asset(s) (e.g., habitat monitoring, military applications, etc.) under observation when an adversary, who is capable of detecting the message flows, may trace back to the source in the reverse path and locate the assets. Unlike traditional message content concealment which involves hiding the original information through cryptography or steganography, say, for instance, the current work focuses on concealing the contextual information. In particular, protecting the source of information. Currently, I am exploring the following three areas (i.e., addressing three questions): i) analyzing the performance of source location privacy preservation techniques in presence of multiple sources; ii) understanding the effect of the active attacks, such as packet content modification attacks and packet dropping attacks, on the performance of privacy-preserving protocols; and iii) studying the impact of radio range on privacy strength, measured in terms of safety period metric. Of these, the solutions to the first question are seen in two reputed IEEE journals namely, IEEE Internet of Things Journal and IEEE Transactions on Industrial Informatics.
Awards & Fellowships
  • 2020 - Outstanding Large Chapter award presented to WiE Affinity Group, in recognition of the outstanding contribution to the IEEE Bangalore Section in the year 2019. Presented by IEEE Bangalored Section during AGM, 5th January 2020. (Group award).
  • 2020 - Outstanding Medium Student Branch Counselor award for outstanding contribution to the IEEE Bangalore Section during 2019, presented by IEEE Bangalore Section, during AGM, 5th January 2020.
  • 2020 - Best Volunteer – GOLD award for outstanding contribution to IEEE Women in Engineering (WiE) Affinity Group, Bangalore Section during the year 2019, presented by IEEE WiE Affinity Group, Bangalore Section during AGM, 5th January 2020.
  • 2017 - Women's Workshop Travel Grants to present a poster at MobiSys 2017, The Fifteenth International Conference on Mobile Systems, Applications and Services, Niagara Falls, New York, USA. June 19th – 23rd, 2017.
  • 2016 – Bagged first place during a 3-minute challenge: "Talk It up" organized by Women in Engineering Affinity group, IEEE Kharagpur Section held during "IEEE Students' Technology Symposium", IIT Kharagpur, 30th September - 2nd October 2016.
  • 2015 - IEEE Student Branch grant to attend IEEE All India Student and Young Professionals Congress, at Rajagiri School of Engineering and Technology, Kochi, Kerala, India. held on 7th - 9th August 2015.
  • 2011-2014 – AICTE research fellowship for Doctoral studies at IIT Kharagpur.
  • 2011: Cambridge International Certificate for Teachers and Trainers, Achieved a certificate at Professional Level, with Distinction, through Mission10X Wipro ltd
  • 2010: “Integrated Innovations+”, Contribution to the best innovations practiced by the Mission10Xians, A book released on occasion of Mission10X third anniversary, 2nd edition | Security in Communication Networks, pp. 73-74 | Cryptography, pp. 137-138.
  • 2009–2010: Mission10X International Certifications |Mission10X Dale Carnegie Certificate in High Impact Teaching Skills, 2009 | Mission10X Certificate in Teaching and Learning, 2010
  • 2009: INNOVATION, Contribution to a book on activity-based learning - Quiz. pp 62.
  • 2007: Cisco Certified Network Associate, CCNA, Cisco Career Certifications, CSCO11305180, validity 25/102007 to 20/10/2010 | Score Details: Planning and Designing (91%) Implementation and Operation (75%) Troubleshooting (77%) Technology (84%)
  • 2006 - Bagged first prize during state level paper presentation competition: “WITS’06”. B.L.D.E.A's College of Engineering & Technology, Bijapur.
  • 2005: Certification on Instructional Design and Delivery, NITTTR, Chennai
  • 2004–2006 - Arya Vysya Association Education Scholarship for M. Tech program.
  • 1999–2002 - Jindal Education Scholarship for B.E. program.
Memberships
  • Senior Member, IEEE
  • IEEE Women in Engineering
  • IEEE Young Professionals
  • IEEE Sensors Council
  • IEEE Big Data Community
  • IEEE N2Women
  • IEEE SIGHT
  • IEEE Internet of Things Community
  • IEEE Computer Society Technical Committee on Security and Privacy
  • Fellow and Chartered Engineer, Institute of Engineers (India), on 14 Feb 2022. Fellow (Membership No: F-1287571)
Publications
  • An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

    Raja M., Datta R.

    Article, IETE Journal of Research, 2018, DOI Link

    View abstract ⏷

    Asset monitoring and tracking is an important application of wireless sensor networks (WSNs). Tiny sensors collect information about the assets and convey this message to the base station using multi-hop routing techniques. For instance, in habitat monitoring application, the nodes collect details of the endangered species and report to the central controller, i.e., the base station. Preserving the privacy of these assets from the attackers is imperative. An attacker may backtrack the message flow and eventually capture the asset. In this work, we aim to improve the source location privacy, which is measured by the safety period, by designing a new routing technique where randomized routes in the whole network are generated distributively between the node of origin and the base station. The diversity of the routing paths will lengthen the backtracking period of the attacker and thus increase the safety period. The key feature of the solution is that it achieves improved source location privacy without hampering the network lifetime. Unlike the existing solutions, the proposed technique does not employ any fake sources that decreases the network lifetime due to generation of large number of dummy packets. The solution performs quite well even when the asset is near the base station. The proposed method is analysed and compared with forward random walk and phantom single path routing schemes. Simulation results demonstrate that the proposed method achieves improved privacy level with more uncertainty in the routing paths than the current techniques.
  • Efficient aggregation technique for data privacy in wireless sensor networks

    Raja M., Datta R.

    Article, IET Networks, 2018, DOI Link

    View abstract ⏷

    In wireless sensor networks (WSNs), the existing cluster-based private data aggregation techniques are energyintensive due to high message transmission complexity. Reliable data transmissions are also vital for resource constraint WSNs. To address these issues, the authors propose a reliability enabled private data aggregation technique that has message transmission complexity of O(N). Every node in the cluster cleaves its data into n integrants using simple modular arithmetic with suitable prime moduli and transmits to the cluster heads (CHs) for intermediate aggregation. The CHs, in turn, forward the partial aggregate data to the base station where the final aggregate is recovered using an elegant Chinese remainder theorem. The authors use data privacy, communication overhead, and reliability metrics to gauge the performance of the proposed work. Numerical and simulation results demonstrate that the proposed solution outperforms the existing schemes having O(N2) communication complexity.
  • A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

    Manjula R., Datta R.

    Article, Pervasive and Mobile Computing, 2018, DOI Link

    View abstract ⏷

    In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the concept of escape-angle and random walks that is based on potential energy. The proposed method routes packets to the base station via different virtual sources located at various positions in the network. The key idea of this work is to exploit the excess energy available in the non-hotspot areas of the network to generate dispersive routes between source node and the virtual sources. This approach maximizes safety-period without hampering the network lifetime. We present mathematical models to estimate the overall energy expenditure that incurs at each node during Min Hop Routing phase (phase two). We then determine the remaining amount of energy which could be used for Stochastic and Diffusive Routing phase (phase one). Simulation results show that the proposed technique achieves improved safety-period without hampering the network lifetime.
  • Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

    Manjula R., Datta R.

    Conference paper, 2016 IEEE Students' Technology Symposium, TechSym 2016, 2017, DOI Link

    View abstract ⏷

    In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for a novel privacy preserving routing technique in wireless sensor networks (WSNs). The distinctive nature of the proposed technique is gathering the data, aggregating and then slicing the aggregate using t-out-of-n secret sharing scheme (based on CRT) and then route the packets to the sink via multiple paths. The sink will recover the final aggregate with just t shares using CRT. The multi-objective of the proposed technique is to provide data privacy, identity privacy, source location privacy, and route privacy. The solution also mitigates the problem of packet losses associated with the unreliable wireless communication medium by improving the reliability. We also propose an enhanced privacy preserving routing technique that achieves network wide routing paths, and overcomes the drawback of existing phantom single-path routing (PSPR) and forward random walk-based routing (FRW) schemes. Finally, we present the details of the proposed technique with a numerical example and give its possible application for secret and dynamic routing in WSNs. We also show the simulation results to validate the proposed method and comparison with PSPR and FRW techniques demonstrates that our scheme outperforms the other two solutions.
  • An energy-efficient routing technique for privacy preservation of assets monitored with WSN

    Manjula R., Datta R.

    Conference paper, IEEE TechSym 2014 - 2014 IEEE Students' Technology Symposium, 2014, DOI Link

    View abstract ⏷

    Wireless Sensor Networks (WSNs) are deployed to monitor the assets (endangered species) and report the locations of these assets to the Base Station (BS) also known as Sink. The hunter (adversary) attacks the network at one or two hops away from the Sink, eavesdrops the wireless communication links and traces back to the location of the asset to capture them. The existing solutions proposed to preserve the privacy of the assets lack in energy efficiency as they rely on random walk routing technique and fake packet injection technique so as to obfuscate the hunter from locating the assets. In this paper we present an energy efficient privacy preserved routing algorithm where the event (i.e., asset) detected nodes called as source nodes report the events' location information to the Base Station using phantom source (also known as phantom node) concept and a-angle anonymity concept. Routing is done using existing greedy routing protocol. Comparison through simulations shows that our solution reduces the energy consumption and delay while maintaining the same level of privacy as that of two existing popular techniques. © 2014 IEEE.
Contact Details

manjula.r@srmap.edu.in

Scholars

Doctoral Scholars

  • Mr. Rampilla Swathi Kiran Kumar
  • Ms Alemtsehay Gebreanania Gebru
  • Mr Bhagwati Sharan