scispace - formally typeset
Search or ask a question
Author

S. Balamurugan

Bio: S. Balamurugan is an academic researcher from VIT University. The author has contributed to research in topics: Multiplier (economics) & Gas compressor. The author has an hindex of 8, co-authored 19 publications receiving 115 citations.

Papers
More filters
Proceedings ArticleDOI
01 Sep 2019
TL;DR: The possible vulnerabilities in the modern IoT network along with their countermeasures to prevent them are presented from the perspective of software, hardware, and network infrastructure.
Abstract: The Internet of Things (IoT) is the emerging network of hardware and software components connected to daily life activities for bringing reliability and convenience. The network mostly consists of heterogeneous devices, each having different protocols. The technology is evolving and bringing many new IoT devices into the market. IoT devices help users to lead a convenient life because of their capabilities such as processing, storage, and networking. It also helps in the field of automation, healthcare, and data analytics. However, the security of the IoT network is still a concern for the developers and users. The heterogeneous nature of the network makes it difficult for the developers to safeguard the network. On the other hand, it opens a wide range of opportunity for the attackers to compromise the confidentiality, integrity, or availability of the system. Some of the major attacks are Distributed Denial of Service (DDoS), Man In The Middle (MITM) and replay attacks. As the human elements are integrated with the IoT infrastructure, it is important to consider the security of the data and the operation of the device. The evolution of modern technologies leads to modern threats and attacks on the network, increasing the need for strict security and preventive measures. This paper presents the possible vulnerabilities in the modern IoT network along with their countermeasures to prevent them from the perspective of software, hardware, and network infrastructure. The overview could help the reader to gain insight into the IoT network threats and security.

28 citations

Journal ArticleDOI
TL;DR: The synthesizing process of multi-input converters is displayed and some of the existing efficient non-isolated multi- input high step-up DC-DC converter topologies are immensely discussed and compared.

28 citations

Proceedings ArticleDOI
03 Apr 2013
TL;DR: This paper presents a low power and high speed 15-4 Compressor for digital signal processing applications and a new 5-3 compressor also proposed which is faster and also consumes less power than the conventional 5- 3 compressor.
Abstract: This paper presents a low power and high speed 15-4 Compressor for digital signal processing applications. A new 5-3 compressor also proposed which is faster and also consumes less power than the conventional 5-3 compressor. This proposed 5-3 compressor is utilized in 15-4 compressor which will results in low power and high speed. Proposed 15-4 compressor is 11.01% faster and power consumption is reduced by 8.7%.

20 citations

Journal ArticleDOI
TL;DR: In this paper, higher order compressors which can be effectively used for high speed multiplicati ons are presented, which offer less delay and area than lower-order compressors.
Abstract: This study presents higher order compressors which can be effectively used for high speed multiplicati ons. The proposed compressors offer less delay and area. But the Energy Delay Product (EDP) is slightly hig her than lower order compressors. The performance of 8◊8, 16◊16 and 24◊24 multipliers using the proposed higher order compressors has been compared with the same multipliers using lower order compressors and found that the new structures can be used for high speed multiplications. These compressors are simula ted with Cadence RTL complier at a temperature of 25°C with the supply voltage of 1.2 V.

18 citations

Proceedings ArticleDOI
01 Aug 2017
TL;DR: A low cost, low power waste management system which will be applicable in regions which are not economically sound and designed using an Arduino Uno board incorporating additional modules such as a GSM module to send messages.
Abstract: In this paper we have developed a low cost, low power waste management system which will be applicable in regions which are not economically sound. This system enables us to collect the trash as and when the can is full or when the trash inside is decomposed compared to daily collection. This has been designed using an Arduino Uno board incorporating additional modules such as a GSM module to send messages.

16 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Novel approximate compressors and an algorithm to exploit them for the design of efficient approximate multiplier circuits are proposed and synthesized approximate multipliers for several operand lengths using a 40-nm library.
Abstract: Approximate computing is an emerging trend in digital design that trades off the requirement of exact computation for improved speed and power performance. This paper proposes novel approximate compressors and an algorithm to exploit them for the design of efficient approximate multipliers. By using the proposed approach, we have synthesized approximate multipliers for several operand lengths using a 40-nm library. Comparison with previously presented approximated multipliers shows that the proposed circuits provide better power or speed for a target precision. Applications to image filtering and to adaptive least mean squares filtering are also presented in the paper.

173 citations

Journal ArticleDOI
TL;DR: An extensive overview of the IoT technology and its varied applications in life saving, smart cities, agricultural, industrial etc. by reviewing the recent research works and its related technologies is proposed.
Abstract: Internet of things (IoT) is a very unique platform which is getting very popular day by day. The very reason for this to happen is the advancement in technology and its ability to get linked to everything. This feature of getting linked has in itself provided multiple opportunities and a vast scope of development. The fact that technology in various fields has evolved through the years, is the reason why we observe a rapid change in the shape, size and capacity of various instruments, components and the products used in daily life. And this benefit of simplified technology when accompanied by a platform like IoT eases the work as well as benefits both the manufacturer and the end user. The Internet of Things gives us an opportunity to construct effective administrations, applications for manufacturing, lifesaving solutions, proper cultivation and more. This paper proposes an extensive overview of the IoT technology and its varied applications in life saving, smart cities, agricultural, industrial etc. by reviewing the recent research works and its related technologies. It also accounts the comparison of IoT with M2M, points out some disadvantages of IoT. Furthermore, a detailed exploration of the existing protocols and security issues that would enable such applications is elaborated. Potential future research directions, open areas and challenges faced in the IoT framework are also summarized.

145 citations

Journal ArticleDOI
TL;DR: This survey details the simulation tools of IoT networks, IoT sensors along with their recent application areas, broad IoT research challenges, as well as in-depth analysis of IoT research history and recommendations that attract current IoT researchers' attention.

123 citations

Journal ArticleDOI
01 Jun 2021
TL;DR: This extensive literature survey on the most recent publications in IoT security identified a few key research trends that will drive future research in this field.
Abstract: With the continuous expansion and evolution of IoT applications, attacks on those IoT applications continue to grow rapidly. In this systematic literature review (SLR) paper, our goal is to provide a research asset to researchers on recent research trends in IoT security. As the main driver of our SLR paper, we proposed six research questions related to IoT security and machine learning. This extensive literature survey on the most recent publications in IoT security identified a few key research trends that will drive future research in this field. With the rapid growth of large scale IoT attacks, it is important to develop models that can integrate state of the art techniques and technologies from big data and machine learning. Accuracy and efficiency are key quality factors in finding the best algorithms and models to detect IoT attacks in real or near real-time

109 citations

Journal ArticleDOI
TL;DR: A deep review is undertaken of the related literature based on IoT infrastructure for efficient handling of waste generated in urban scenarios, focusing on the interaction among concessionaires and waste generators from the perspective of a shorter collection time with reduced costs, as well as citizenship promotion.
Abstract: With the increase of population density and the rural exodus to cities, urbanization is assuming extreme proportions and presents a tremendous urban problem related to waste generation. The increase of waste generation has been considered a significant challenge to large urban centers worldwide and represents a critical issue for countries with accelerated population growth in cities. The Internet of Things (IoT) and cloud computing offer an automation possibility through cyberphysical systems that will change the way solid waste management is performed. Considering IoT requirements, a review analysis of waste management models available in the literature is performed in detail in this paper. Then, a deep review is undertaken of the related literature based on IoT infrastructure for efficient handling of waste generated in urban scenarios, focusing on the interaction among concessionaires and waste generators (citizens) from the perspective of a shorter collection time with reduced costs, as well as citizenship promotion. An IoT-based reference model is described, and a comparison analysis of the available solutions is presented, with the goal to highlight the most relevant approaches and identify open research issues on the topic.

97 citations