Posts by Collection

certifications

portfolio

publications

Blockchain based Waste Management

Published in , 2019

The environment is the most sought-after topic for discussion in global forums because of the alarming threat it faces. Waste Management is one of the major challenges after global warming that affects the environment and harmony of nature. Government and non-governmental organisations are working towards solutions for better waste management. Though in present-day technology is part of waste management, it is not an integral part of waste management in many countries. Current technology only helps in reducing manual intervention by automating waste collection and transportation. It also helps in the disposal of non-useful waste and recycles/reuse useful waste by converting them into raw materials. People are the major part of the waste management cycle, so without their involvement, it is extremely difficult to make any technology-based system successful. People’s involvement in waste management would increase if they are incentivized for proper segregation of wastes, reusing, recycling, disposal and even for spreading awareness. The supportive technology should automatically monitor waste management cycle, record important actions and react accordingly.

Recommended citation: Gopalakrishnan, Preethi, and R. Ramaguru. "Blockchain based waste management." International Journal of Engineering and Advanced Technology 8.5 (2019): 2632-2635. https://www.ijeat.org/wp-content/uploads/papers/v8i5/E7828068519.pdf

Blockchain for the Internet of Vehicles

Published in , 2019

Recent advancements in the Internet of Things and mobile internet helped the development of traditional Vehicular Adhoc-NETwork (VANET) based systems into the Internet of Vehicles (IoV). Vehicles in IoV make decisions based on the information from other vehicles and roadside infrastructure. This information helps them make critical decisions and alert the user about unpredictable situations. Security and privacy concerns in vehicles are increasing, hence it is important to address these issues, thus preventing malicious nodes transmitting falsified information or tampering critical communication data.

Recommended citation: Ramaguru R., Sindhu M., Sethumadhavan M. (2019) Blockchain for the Internet of Vehicles. In: Singh M., Gupta P., Tyagi V., Flusser J., Ören T., Kashyap R. (eds) Advances in Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science, vol 1045. Springer, Singapore. https://doi.org/10.1007/978-981-13-9939-8_37 https://link.springer.com/chapter/10.1007/978-981-13-9939-8_37

Blockchain Framework for Social Media DRM Based on Secret Sharing

Published in , 2020

Huge adoption of the Internet into our daily lives generates at least few MBs of data. Social media in modern age enabled every single user with a smartphone and Internet to be a marketer, journalist, publisher and content creator. Ensuring protection and copyright of social media data like images, videos and audios are extremely demanding. Copyright infringement happens easily, and protecting the content for its originality and authenticity should be simplified.

Recommended citation: Kripa M., Nidhin Mahesh A., Ramaguru R., Amritha P.P. (2021) Blockchain Framework for Social Media DRM Based on Secret Sharing. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 195. Springer, Singapore. https://doi.org/10.1007/978-981-15-7078-0_43 https://link.springer.com/chapter/10.1007%2F978-981-15-7078-0_43

Medical Records Management Using Distributed Ledger and Storage

Published in , 2021

In the last decade, blockchain technology has seen adoption to infinite domains, health care sector is one of the major domains where there are a greater opportunity and advantage to leverage the benefits of distributed ledgers in storing and securing patient medical records. The Government of India (GoI) is also very keen on digitization in addition to their wider adoption of blockchain technology to serve the citizens by ensuring their privacy and security of personally sensitive.

Recommended citation: Anjum S., Ramaguru R., Sethumadhavan M. (2021) Medical Records Management Using Distributed Ledger and Storage. In: Singh M., Tyagi V., Gupta P.K., Flusser J., Ören T., Sonawane V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1441. Springer, Cham. https://doi.org/10.1007/978-3-030-88244-0_6 https://link.springer.com/chapter/10.1007/978-3-030-88244-0_6

Distributed Identity and Verifiable Claims Using Ethereum Standards

Published in , 2022

Identity management is an inevitable part of the proper delivery of schemes and services to individuals by the government and private organizations. Identity management encompasses the creation and maintenance of identity. It ensures that the right entity gains access to the right resources at the right time for verification. It also involves providing high security, privacy, productivity, and enhanced user experience.

Recommended citation: Thomas A.M., Ramaguru R., Sethumadhavan M. (2022) Distributed Identity and Verifiable Claims Using Ethereum Standards. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311. Springer, Singapore. https://doi.org/10.1007/978-981-16-5529-6_48 https://link.springer.com/chapter/10.1007%2F978-981-16-5529-6_48

Open-Source Cryptocurrency Forensic Framework

Published in , 2022

In 2008, an unnamed person or group with the pseudonym ‘Satoshi Nakamoto’ introduced Bitcoin through a Whitepaper “A Peer-to-Peer Electronic Cash System”. Since then, both the number of users and the value of Bitcoin have grown. Bitcoin also introduced the concept of Blockchain Technology, which has now broadened to cover industries such as supply chain management, crowdfunding, open governance, education credentialing, health care, digital rights management, and Automotive

Recommended citation: Anuhya G, Ramaguru R (2022). "Open-Source Cryptocurrency Forensic Framework." Digital 4N6. vol 4 issue 1. pp 20-26. Digital 4N6. https://doi.org/10.46293/4n6/2022.02.01.03

Evaluation of Wireless Access Point Security and Best Practices for Mitigation

Published in , 2022

The necessity for safeguarding wireless networks has increased due to an increase in the number of associated cyber-attacks on unsecured and weak wireless networks. It is critical for individuals, homeowners, and businesses to protect their wireless networks from external hackers. Wardriving is the act of an attacker foraging for wireless networks while driving a vehicle or while using a laptop or a smartphone. It is an efficient method for gathering information about nearby Wireless Access Points (WAPs), which aids in the analysis of a particular WAPs weakness.

Recommended citation: A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, "Evaluation of Wireless Access Point Security and Best Practices for Mitigation," 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2021, pp. 422-427, doi: 10.1109/ICEECCOT52851.2021.9707914. https://doi.org/10.1109/ICEECCOT52851.2021.9707914

Distributed Ledger Framework for an Adaptive University Management System

Published in , 2022

The true power and the state of any technology are best known during difficult times. The yet-to-over COVID-19 lockdown has unleashed the power of online and remote modes of learning, evaluation, and working. The universities and educational institutions worldwide faced their big-time challenge in delivering, managing, evaluating their student’s learning progress. The need for an online-virtual-remote learning platform has become inevitable, which comes with a multitude of challenges, including usability, security, privacy, and real-time adoption.

Recommended citation: Sivadanam Y.L., Ramaguru R., Sethumadhavan M. (2022) Distributed Ledger Framework for an Adaptive University Management System. In: Chaki N., Devarakonda N., Cortesi A., Seetha H. (eds) Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 99. pp. 295-306. Springer, Singapore. https://doi.org/10.1007/978-981-16-7182-1_24 https://doi.org/10.1007/978-981-16-7182-1_24

startups

Kuppai

Published:

Kolect

Published:

talks

Workshop on Philately

Published:

Organised by: Department of Post, Tiruppur
Represented: Gandhimani Numismatics and Philately Club (GNPC)

FDP on Blockchain Technologies

Published:

Organised by: Dept. of Information Technology, Eswari College of Engineering, Chennai
Represented: Amrita Vishwa Vidyapeetham, Coimbatore

Safe in Cyberia

Published:

Campaign by: Amrita Vishwa Vidyapeetham & NDTV
Represented: Amrita Vishwa Vidyapeetham

Internet/IT and Ethics

Published:

Organised by: EduDevs, Haryana and Amrita Vishwa Vidyapeetham, Coimbatore

FDP on Data Protection and Privacy

Published:

Organised by: Center for Cyber Intelligence, Avinashilingam Institute of Home Science and Higher Education for Women, Coimbatore
Represented: Amrita Vishwa Vidyapeetham, Coimbatore

Blockchain Technology and AgriBusiness

Published:

Organised by: Directorate of Agri Business Development, Tamil Nadu Agricultural University, Coimbatore
Represented: Amrita Vishwa Vidyapeetham, Coimbatore

teaching

18CY712 - Blockchain Technology

Postgraduate Course - M.Tech CYS [3rd Sem], TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, 2020

Number of Students : 3
Number of Completed Mini-projects : 3

PT0-001 - CompTIA PenTest+

Certifications - PenTest+ (Batch - 1), Amrita School of Engineering, Amrita Vishwa Vidyapeetham, 2021

Number of Students : 9

20CY712 - Blockchain Technology

Postgraduate Course - M.Tech CYS [3rd Sem], TIFAC-CORE in Cyber Security, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, 2021

19CSE447 - Cloud Computing

Undergraduate Course - B.Tech EEE & ELC [7th Sem], AB2-203, Dept. of EEE, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, 2022

Number of Students : 60

20CYS202 - User Interface Design

Undergraduate Course - B.Tech CSE (CYS) [3rd Sem], TIFAC-CORE in Cyber Security, Amrita School of Computing, Amrita Vishwa Vidyapeetham, 2022

Number of Students : 86
Number of Completed Mini-projects : TBD

20CYS281 - Operating System Lab

Undergraduate Course - B.Tech CSE (CYS) [3rd Sem], TIFAC-CORE in Cyber Security, Amrita School of Computing, Amrita Vishwa Vidyapeetham, 2022

Number of Students : 86

21CY712 - Blockchain Technology

Postgraduate Course - M.Tech CYS [3rd Sem], TIFAC-CORE in Cyber Security, Amrita School of Computing, Amrita Vishwa Vidyapeetham, 2022