Admissions
Madanapalle Institute of Technology & Science is now MITS Deemed to be University.
Dr.  K. Prathapchandran

Qualification : Ph.D. (The Gandhigram Rural Institute)

Designation : Asst. Professor

Details of Educational Qualification:

Course Specialization Group College Name/University Year of Passing
Ph.D. Mobile Ad hoc Networks Computer Science The Gandhigram Rural Institute 2017
M.Phil Computer Science Computer Science The Gandhigram Rural Institute 2011
M.C.A. Computer Applications Computer Applications The Gandhigram Rural Institute 2008
B.C.A. Computer Applications Computer Applications Madurai Kamaraj University 2005

 

List of Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 “Security, Privacy, and Trust in AI-IoT Integrated Smart Systems” Powering e-Collaboration Through AI, Machine Learning, and Internet of Things, IGI Global, 2025 (Scopus Indexed), Accepted.
2 “Secure IoT Architecture Using Graph Neural Networks and Dynamic Trust Models to Combat Sybil Attacks” IEEE Xplore, 2025 (Scopus Indexed) Accepted
3 “Towards an Intelligent Internet: Surveying the Influence of Cognitive Technologies on Network Architecture and Performance” International Journal of Multidisciplinary Research, Vol.7, No.2, 2025.
4 “A Trust Aware Mechanism to ensure Security in the RPL-based Internet of Battlefield Thing (IoBT) Environment (NBDSTrust)” IJCNIS, 2025 (Scopus Indexed), Communicated.
5 “Cryptographic Authorization: A Multi-Level Trust-Based Schema for Securing IoT against Threats” Journal of Mobile Multimedia, 2025, (Scopus Indexed), Communicated.
6 “BioTrust-IoT: A Biologically Inspired Adaptive Trust System for Detecting Man-in-the-Middle Attacks” International Journal of Computer Networks and Applications (IJCNA), 2025, (Scopus Indexed), Communicated.
7 “Trust-Based Fish Swarm Optimization (TFSO) Security Mechanism for the Wireless Sensor Networks (WSN)” Advanced in Distributed Computing and Artificial Intelligence Journal, 2025 (Scopus Indexed), Communicated.
8 “Fortifying the AI Frontier: Safeguarding with Machine Learning” “Artificial Intelligence and Machine Learning, Book Pen Publisher, 2024
9 “Trust And Machine Learning Based Security Models For IOT” Multidisciplinary Education: The Future”, ISBN: 978-93-92032-94-3, 2024
10 “clustering algorithms for mobile ad hoc networks – a review” Proceedings of International Conference on Interdisciplinary Research innovations in Science and Humanities”, ISBN: 978-93-92032-99-8, 2024
11 “The Evolution of IoT: A Review of Past, Present and Future” Proceedings of National Seminar on Artificial Intelligence and Machine Learning, ISBN: 978-81-962550-3-9, 2024
12 “Cognitive Computing A Study on Machine Consciousness” Proceedings of 12th International Conference on Cognitive Computing – A Disruptive Technology, ISBN: 978-81-969021-0-0, 2024
13 “Internet of Things (IoT): A Literature Review” Proceedings of International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, ISBN:978-93-91977-10-8, 2023
14 “Security aspects of Internet of Things – A Review” Proceedings of International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, ISBN:978-93-91977-10-8, 2023
15 “Trust-Based Support Vector Regressive Security Mechanism to Identify Malicious Node in the Internet of Battlefield Things (IOBT)” International Journal of System Assurance and Engineering, 2022, https://doi.org/10.1007/s13198-022-01719-w (Indexed in Scopus and SCIE, Impact Factor:2)
16 “Mitigating Blackhole attack in RPL based Internet of Things Using Trust and Machine Learning” International journal of socio technology and knowledge development, 2022. (Indexed in Scopus Indexed and Web of Science)
17 “A Trust Aware Security Mechanism to Detect Sinkhole Attack in RPL Based IoBT Environment Using Random Forest - RFTrust” Computer Networks, Elsevier, Vol.198, No. 108413, 2021.(Indexed in Scopus and SCIE, Impact Factor: 4.457)
18 “Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol in Internet of Battlefield Thing (IoBT)” International Journal of Business Data Communications and Networking (IJBDCN), 1(17), pp.1-23, 2021. (Indexed in Web of Science, UGC Care, and Scopus)
19 “Authenticated And Trusted AODV (ATAODV) Routing Protocol To Detect Blackhole Attack In Manet Based Military Environment” International Journal of Interdisciplinary Telecommunications and Networking (IJITN),Vol.02,no.02,pp.51-71, 2021(Indexed in Web of Science and UGC Care)
20 “Security attacks in Internet of Things” Journal of Critical reviews, ISSN: 23945125, Vol.7, Issue: 14, 2020. (Indexed in Scopus)
21 “A vision-based surface roughness measurement using a geometric search technique” ARPN Journal of Engineering and Applied Sciences, Vol.14, Issue.2, Jan 2019. (0.224)(Indexed in Scopus and UGC care)
22 “Material Defect Detection and Assessment of Surface Roughness Using Image Processing and Machine Vision System” Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 07-Special Issue, pp.500-509, 2019. (0.11) (Indexed in Scopus and UGC care)
23 “Security and Privacy Challenges in Internet of Things – A Review” Karpagam Journal of Computer Science, December, 2019
24 “Different Routing Attacks and its solutions in MANET” Karpagam Journal of Computer Science, Vol.12,Issue.4, pp.53-64,2018.
25 “A Cluster based technique to segment the hippocampus from T2-weighted MRI of human head scans” International Journal of Electrical, Electronics and Computer Science Engineering”, Vol.01, pp.76-81, 2018.
26 “The Segmentation of Hippocampus from MRI of Human Head Scans using Fuzzy C-Means Clustering” Trends in Mathematics, Springer, ISSN.2297-0215,vol.01,Issue.1,pp.333-342,2018.(Indexed in Scopus and UGC Care)
27 “A Study on Quality Inspection for Automated Visual Inspection System and Image Processing” Karpagam Journal of Computer Science, Vol.12, Issue.4, 2018.
28 ”Review of internet of things and its applications” Karpagam Journal of Computer Science, Vol.15, no.05, Aug.2020
29 “Trusted and Lightweight Dynamic Source Routing (TL-DSR) protocol to withstand against selfish attack in Mobile ad hoc Network based Military Environment” Karpagam Journal of Computer Science, Vol.11,Issue.4, pp.177-185,2017.
30 ”The Segmentation of Hippocampus from and mid Sagittal T2-weighted Magnetic Resonance images of human brain using morphological Operations and Thresholding” Karpagam Journal of Computer Science, Vol.11,Issue.5, pp.226-233,2017.
31 “Trust based Security Model to Withstand against Black Hole and Grey Hole Attacks in Military based Mobile Ad Hoc Networks” International Journal of Mobile Network Communication & Telematics, ISSN. 1839-5678, Vol.06, No.01, pp.1-14, 2016.
32 “Behaviour of Routing Protocols in Mobile Ad Hoc Networks Investigated for Emergency and Rescues Scenario in India “ International Journal of Wireless & Mobile Networks, ISSN. 0975-3834, Vol. 8, No. 1, pp.23-37, 2016.
33 “Authentication Using Trust to Detect Misbehaving Nodes In Mobile Ad Hoc Networks Using Q-Learning “ International Journal of Network Security and its Applications, Vol.8, No.3, pp.47-64, ISSN: 0974 - 9330, 2016.
34 “A Centralized Trust Computation model for secure group formation in Military based Mobile Ad Hoc networks Using Stereotypes” Advances in Intelligent Systems and Computing, Springer, Vol.412, pp.427-438, 2015. (0.17)
35 “Trust based Authentication Scheme to Remove Malicious in Mobile Ad Hoc Networks” International Journal of Applied Engineering Research, ISSN 1087—1090, Vol.No. 10, pp. 23348-23353, 2015.
36 “Trust and Cluster based security architecture in MANET for a Collaborative Project Environment” International Journal of Advanced Networking and Applications, ISSN: 0975-0282, 2015.
37 ”A Comparative Study on Reactive or On Demand Routing Protocols in Mobile Ad Hoc Networks” International Journal of Computer Applications (IJCA), ISSN: 0975-8887, 2013.
38 “Trust-Based Security Mechanisms for Self-Organized Networks (SONs)” Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, IGI Global, pp. 1782-1805, ISBN13: 9781522598664, 2020.
39 “Trust based Security schemes in Self – Organized Networks (SON)” Handbook of Research on Self-Organized Mobile Communication Technologies, IGI Global, pp.92-114, April 2016, DOI. 10.4018/978-1-5225-0239-5.ch004.
40 “Internet of Things for Developing Smart Sustainable Cities (SSC): A Security Perspective” Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective, Springer, Vol.01, Chapter No.13, DOI. 10.1007/978-3-319-33124-9 2016. (Indexed in Web of Science and UGC care)
41 “A Trust- Based Security Model To Detect Misbehaving Nodes In Iot Environment Using Logistic Regression” Vol.1850,no.012031,pp.1-19, Journal of Physics: Conference Series, 2021.
42 “Multi-tier trust based security mechanism for resource constrained IoT devices” Vol.1850,no.012041,pp.1-16, Journal of Physics: Conference Series, 202.(Indexed in Scopus)
43 “Trust based Security Mechanism for resource constrained IoT Devices – A Review” Vol.1850,no.012042,pp.1-17, Journal of Physics: Conference Series, 2021.(Indexed in Scopus)
44 “Internet of Things (IoT) Applications – An Inclusive Review” Proceedings of the 3 rd National Conference on Advanced Computing (NCAC-2020),Vol.01, pp.81-86, ISBN: 978-93-89105-32-2,2020.
45 “Internet of Things (IoT): A Review” Proceedings of the 3 rd National Conference on Advanced Computing (NCAC-2020), Vol.01, pp.50-56, ISBN: 978-93-89105-32-2, 2020.
46 “Black hole attack and its Solutions in MANET” National Conference on Computational Methods Communication Technical and Informatics, NCCCI 2017, ISBN: 978-81-933316-1-3, Vol.No.1, pp.221-227, 2017.
47 “Routing Attacks and its Solutions in MANET” National Conference on Computational Methods Communication Technical and Informatics, NCCCI 2017, ISBN: 978-81-933316-1-3, Vol.No.1, pp.236-241, 2017.
48 “Energy aware Trust-based Authentication and Detection of Black Hole Attacks in Mobile Ad Hoc Networks using Q-Learning “ Proceedings of National Conference on Recent Advances in Computer Science and Applications, ISBN: 978-93-84743-57-4, Vol.no.1, pp. 185-191, 2015.
49 “Multi-dimensional trust assessment mechanism to identifying collaborative black hole attacks in military based MANET” Proceedings of National conference on New Horizon in Computer Intelligence and Information System,ISBN.978-93-85777-02-8,Vol.No.01, pp.344-350,2015.
50 “Key Management Schemes in Mobile Ad Hoc Networks” Proceedings of National conference on New Horizon in Computer Intelligence and Information System, ISBN.978-93-85777-02-8,Vol.No.01, pp.333-337,2015.
51 “A Light weight Trust based Security model for Mobile Ad Hoc Networks” Proceedings of International Conference on Electrical, Instrumentation and Communication Engineering- Recent Trends and Research Issues held at Sri Krishna institutions, Coimbatore, 2015.
52 “Security Schemes to Thwarting Sybil Attack in Mobile ad hoc Networks” Proceedings of National conference on New Horizon in Computer Intelligence and Information System, ISBN.978-93-85777-02-8,Vol.No.01, pp.360-365,2015
53 “E-Governance: A Security and Privacy Perspective” Seminar on Research Prospects in Digital India held on July 9, 2015.
54 “Trust and Cluster based Authentication Schemes in Mobile Ad Hoc Networks” ISBN: 978-1-4799-3611-3, DOI:10.1109/EPSCICON.2014.6887502, pp.1-5, IEEE Digital Library, 2014. (Indexed in Web of Science,UGC care and Scopus)
55 “Trust based Security Schemes in Mobile Ad Hoc Networks – A Review” ISBN: 978-1-4799-3966-4/14, DOI 10.1109/ICICA.2014.67, IEEE Digital Library, 2014. (Indexed in Web of Science, Scopus and UGC care)
56 “Survey of Cluster Based Cryptographic Schemes to Secure MANET” Bonfring Digital Library, ISBN: 978-93-82338-30-7, pp: 243-250, 2013.
57 “Survey of Clustering Algorithms for MANET” Proceedings of International Conference on Innovations in communication, Information and Computing’2013, ISBN: 978-81-925286-8-7, pp: 187 held at Sasurie College of Engineering, Tirupur, Tamilnadu on January 9-11, 2013.
58 “A Review of Security Attacks in Mobile Ad Hoc Networks” Proceedings of National Conference on Information and Network Management ‘2013, held at Thiyagarajar College of Engineering, Madurai, Tamilnadu on 4, 5 April-2013.
59 Secure IoT Architecture Using Graph Neural Networks and Dynamic Trust Models to Combat Sybil Attack, Second International Conference on Networks & Soft Computing, Vignan’s Foundation for Science, Technology & Research, Deemed to be University, Guntur, Andrapradesh, 2025.
60 Trust Based Security Scheme for Internet of Things(IoT)” International Conference on Emerging Trends in Science and Technology – ICETST ‘25, Sri Ramakrishna College of Arts and Science, Coimbatore, 2025
61 “Trust And Machine Learning Based Security Models For IOT” Multidisciplinary Education: The Future, Assumption University, Thailand, 2024
62 “The Evolution of IoT: A review of Present, Past and Future” National Seminar and Workshop on AI and ML”, Bharata Mata College, Tharikkara, Kerala, November, 2023
63 “Internet of Things (IoT): A Literature Review” International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, KPR Arts, Science and Research, Coimbatore, 2023.
64 “Security aspects of Internet of Things – A Review” International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, KPR Arts, Science and Research, Coimbatore, 2023.
65 “The Role of Trust management and Blockchain in Internet of Things – A Review” MESMAS International Conference, 2022, MES MAMPAD College, Malapuram, Kerala on 21.01.2022.
66 “The security aspects of Mobile Ad hoc Networks” International conference on Interdisciplinary Research Innovations in Science and Humanities”,Nehru Arts and Science College, Coimbatore on 25.11.2021.
67 “Trust-Based Security in Internet of Things (IoT) Environment- A Survey” International Conference on Multi-disciplinary innovations in Computing and Communication (Virtual), Easwari Engineering College, Coimbatore, 19th and 20th April, 2021.
68 “Multi-tier trust-based security mechanism for resource constrained IoT devices” International conference on 2nd International Conference on Mathematical Modeling and Computational Methods in Science and Engineering (ICMMCMSE-2020), Alagappa University, Karaikudai, 2020
69 “Internet of Things (IoT): A Review” National conference on Advanced Computing (NCAC-2020), Bharthiyar University, Coimbatore, 2020
70 “Internet of Things: A Review on Architecture, Applications, Enabling Technologies, and Challenges” International virtual conference on Computational intelligence and applications, organized by Department of Computer science, engineering and information technology, Mohamed Sathak A J Engineering, Chennai, 2020.
71 “A Light weight trust-based security model for Mobile Ad Hoc Networks“ International Conference on Electrical, Instrumentation and Communication Engineering- Recent Trends and Research Issues held at Sri Krishna institutions, Coimbatore, 2015.
72 “Energy aware Trust-based Authentication and Detection of Black Hole Attacks inMobile Ad Hoc Networks using Q-Learning” National Conference on Recent Advances in Computer Science and Applications, Gandhigram Rural Institute-Deemed University, Gandhigram, 2015.
73 “Trust and Cluster based security architecture in MANET for a Collaborative Project Environment” National Conference on Advanced Networking and Applications, Government Arts College, Udumalpet, 2015.
74 “Trust based Authentication Scheme to Remove Malicious in Mobile Ad Hoc Networks” International Conference on Hi-tech trends in Emerging Computational Technologies, Sethu Institute of Technology, Pullor, 2015.
75 “Multi-dimensional trust assessment mechanism to identifying collaborative black hole attacks in military based MANET” National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015
76 “Key Management Schemes in Mobile Ad Hoc Networks” National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015
77 “Security Schemes to Thwarting Sybil Attack in Mobile ad hoc” National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015
78 “A Centralized Trust Computation model for Secure group formation in Military based Mobile Ad Hoc networks Using Stereotypes” International Conference on Computational Intelligence, Cyber Security and Computational Models, PSG College of Technology, Coimbatore, 2015.
79 “Trust based Security Schemes in Mobile Ad Hoc Networks – A review” International Conference on Intelligent Computing Applications, Bharathiar University, Coimbatore during 6-7 March, 2014.
80 “Trust and Cluster based Authentication Schemes in Mobile Ad Hoc Networks” International Conference on Power, Signals, Control and Computation, Vidya Academy of Science and Technology, Thrissur during 3 to 10 January, 2014.
81 “Survey of Clustering Algorithms for MANET” International Conference on Innovations in Communications, Information and Computing, Sasurie College of Engineering, Tripur during 9 to 11 January, 2013.
82 “A Comparative Study on Reactive or On Demand Routing Protocols in Mobile Ad HocNetworks” International Conference on Research Trends in Computer Technologies, Dr.N.G.P. Arts and Science College, Coimbatore.
83 “Survey of Cluster Based Cryptographic Schemes to Secure MANET” International Conference on Applied Mathematics and Theoretical Computer Science,St. Xavier’sCatholic College of Engineering, Nagerkovil,Tamilnadu on 24-25, January 2013.
84 “A Review of Security Attacks in Mobile Ad Hoc Networks” National Conference on Information and Network Management ‘2013, held at Thiyagarajar College of Engineering, Madurai, Tamilnadu on 4, 5 April-2013.

 

Book & Book Chapters

  • Multidisciplinary Education: The Future”, ISBN: 978-93-92032-94-3, 2024
  • Proceedings of International Conference on Interdisciplinary Research innovations in Science and Humanities”, ISBN: 978-93-92032-99-8, 2024