Dr. K. Prathapchandran
Qualification : Ph.D. (The Gandhigram Rural Institute)
Designation : Asst. Professor
Details of Educational Qualification:
Course | Specialization | Group | College Name/University | Year of Passing |
---|---|---|---|---|
Ph.D. | Mobile Ad hoc Networks | Computer Science | The Gandhigram Rural Institute | 2017 |
M.Phil | Computer Science | Computer Science | The Gandhigram Rural Institute | 2011 |
M.C.A. | Computer Applications | Computer Applications | The Gandhigram Rural Institute | 2008 |
B.C.A. | Computer Applications | Computer Applications | Madurai Kamaraj University | 2005 |
List of Publications
S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
---|---|---|
1 | “Security, Privacy, and Trust in AI-IoT Integrated Smart Systems” | Powering e-Collaboration Through AI, Machine Learning, and Internet of Things, IGI Global, 2025 (Scopus Indexed), Accepted. |
2 | “Secure IoT Architecture Using Graph Neural Networks and Dynamic Trust Models to Combat Sybil Attacks” | IEEE Xplore, 2025 (Scopus Indexed) Accepted |
3 | “Towards an Intelligent Internet: Surveying the Influence of Cognitive Technologies on Network Architecture and Performance” | International Journal of Multidisciplinary Research, Vol.7, No.2, 2025. |
4 | “A Trust Aware Mechanism to ensure Security in the RPL-based Internet of Battlefield Thing (IoBT) Environment (NBDSTrust)” | IJCNIS, 2025 (Scopus Indexed), Communicated. |
5 | “Cryptographic Authorization: A Multi-Level Trust-Based Schema for Securing IoT against Threats” | Journal of Mobile Multimedia, 2025, (Scopus Indexed), Communicated. |
6 | “BioTrust-IoT: A Biologically Inspired Adaptive Trust System for Detecting Man-in-the-Middle Attacks” | International Journal of Computer Networks and Applications (IJCNA), 2025, (Scopus Indexed), Communicated. |
7 | “Trust-Based Fish Swarm Optimization (TFSO) Security Mechanism for the Wireless Sensor Networks (WSN)” | Advanced in Distributed Computing and Artificial Intelligence Journal, 2025 (Scopus Indexed), Communicated. |
8 | “Fortifying the AI Frontier: Safeguarding with Machine Learning” | “Artificial Intelligence and Machine Learning, Book Pen Publisher, 2024 |
9 | “Trust And Machine Learning Based Security Models For IOT” | Multidisciplinary Education: The Future”, ISBN: 978-93-92032-94-3, 2024 |
10 | “clustering algorithms for mobile ad hoc networks – a review” | Proceedings of International Conference on Interdisciplinary Research innovations in Science and Humanities”, ISBN: 978-93-92032-99-8, 2024 |
11 | “The Evolution of IoT: A Review of Past, Present and Future” | Proceedings of National Seminar on Artificial Intelligence and Machine Learning, ISBN: 978-81-962550-3-9, 2024 |
12 | “Cognitive Computing A Study on Machine Consciousness” | Proceedings of 12th International Conference on Cognitive Computing – A Disruptive Technology, ISBN: 978-81-969021-0-0, 2024 |
13 | “Internet of Things (IoT): A Literature Review” | Proceedings of International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, ISBN:978-93-91977-10-8, 2023 |
14 | “Security aspects of Internet of Things – A Review” | Proceedings of International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, ISBN:978-93-91977-10-8, 2023 |
15 | “Trust-Based Support Vector Regressive Security Mechanism to Identify Malicious Node in the Internet of Battlefield Things (IOBT)” | International Journal of System Assurance and Engineering, 2022, https://doi.org/10.1007/s13198-022-01719-w (Indexed in Scopus and SCIE, Impact Factor:2) |
16 | “Mitigating Blackhole attack in RPL based Internet of Things Using Trust and Machine Learning” | International journal of socio technology and knowledge development, 2022. (Indexed in Scopus Indexed and Web of Science) |
17 | “A Trust Aware Security Mechanism to Detect Sinkhole Attack in RPL Based IoBT Environment Using Random Forest - RFTrust” | Computer Networks, Elsevier, Vol.198, No. 108413, 2021.(Indexed in Scopus and SCIE, Impact Factor: 4.457) |
18 | “Decision Tree Trust (DTTrust)-Based Authentication Mechanism to Secure RPL Routing Protocol in Internet of Battlefield Thing (IoBT)” | International Journal of Business Data Communications and Networking (IJBDCN), 1(17), pp.1-23, 2021. (Indexed in Web of Science, UGC Care, and Scopus) |
19 | “Authenticated And Trusted AODV (ATAODV) Routing Protocol To Detect Blackhole Attack In Manet Based Military Environment” | International Journal of Interdisciplinary Telecommunications and Networking (IJITN),Vol.02,no.02,pp.51-71, 2021(Indexed in Web of Science and UGC Care) |
20 | “Security attacks in Internet of Things” | Journal of Critical reviews, ISSN: 23945125, Vol.7, Issue: 14, 2020. (Indexed in Scopus) |
21 | “A vision-based surface roughness measurement using a geometric search technique” | ARPN Journal of Engineering and Applied Sciences, Vol.14, Issue.2, Jan 2019. (0.224)(Indexed in Scopus and UGC care) |
22 | “Material Defect Detection and Assessment of Surface Roughness Using Image Processing and Machine Vision System” | Jour of Adv Research in Dynamical & Control Systems, Vol. 11, 07-Special Issue, pp.500-509, 2019. (0.11) (Indexed in Scopus and UGC care) |
23 | “Security and Privacy Challenges in Internet of Things – A Review” | Karpagam Journal of Computer Science, December, 2019 |
24 | “Different Routing Attacks and its solutions in MANET” | Karpagam Journal of Computer Science, Vol.12,Issue.4, pp.53-64,2018. |
25 | “A Cluster based technique to segment the hippocampus from T2-weighted MRI of human head scans” | International Journal of Electrical, Electronics and Computer Science Engineering”, Vol.01, pp.76-81, 2018. |
26 | “The Segmentation of Hippocampus from MRI of Human Head Scans using Fuzzy C-Means Clustering” | Trends in Mathematics, Springer, ISSN.2297-0215,vol.01,Issue.1,pp.333-342,2018.(Indexed in Scopus and UGC Care) |
27 | “A Study on Quality Inspection for Automated Visual Inspection System and Image Processing” | Karpagam Journal of Computer Science, Vol.12, Issue.4, 2018. |
28 | ”Review of internet of things and its applications” | Karpagam Journal of Computer Science, Vol.15, no.05, Aug.2020 |
29 | “Trusted and Lightweight Dynamic Source Routing (TL-DSR) protocol to withstand against selfish attack in Mobile ad hoc Network based Military Environment” | Karpagam Journal of Computer Science, Vol.11,Issue.4, pp.177-185,2017. |
30 | ”The Segmentation of Hippocampus from and mid Sagittal T2-weighted Magnetic Resonance images of human brain using morphological Operations and Thresholding” | Karpagam Journal of Computer Science, Vol.11,Issue.5, pp.226-233,2017. |
31 | “Trust based Security Model to Withstand against Black Hole and Grey Hole Attacks in Military based Mobile Ad Hoc Networks” | International Journal of Mobile Network Communication & Telematics, ISSN. 1839-5678, Vol.06, No.01, pp.1-14, 2016. |
32 | “Behaviour of Routing Protocols in Mobile Ad Hoc Networks Investigated for Emergency and Rescues Scenario in India “ | International Journal of Wireless & Mobile Networks, ISSN. 0975-3834, Vol. 8, No. 1, pp.23-37, 2016. |
33 | “Authentication Using Trust to Detect Misbehaving Nodes In Mobile Ad Hoc Networks Using Q-Learning “ | International Journal of Network Security and its Applications, Vol.8, No.3, pp.47-64, ISSN: 0974 - 9330, 2016. |
34 | “A Centralized Trust Computation model for secure group formation in Military based Mobile Ad Hoc networks Using Stereotypes” | Advances in Intelligent Systems and Computing, Springer, Vol.412, pp.427-438, 2015. (0.17) |
35 | “Trust based Authentication Scheme to Remove Malicious in Mobile Ad Hoc Networks” | International Journal of Applied Engineering Research, ISSN 1087—1090, Vol.No. 10, pp. 23348-23353, 2015. |
36 | “Trust and Cluster based security architecture in MANET for a Collaborative Project Environment” | International Journal of Advanced Networking and Applications, ISSN: 0975-0282, 2015. |
37 | ”A Comparative Study on Reactive or On Demand Routing Protocols in Mobile Ad Hoc Networks” | International Journal of Computer Applications (IJCA), ISSN: 0975-8887, 2013. |
38 | “Trust-Based Security Mechanisms for Self-Organized Networks (SONs)” | Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, IGI Global, pp. 1782-1805, ISBN13: 9781522598664, 2020. |
39 | “Trust based Security schemes in Self – Organized Networks (SON)” | Handbook of Research on Self-Organized Mobile Communication Technologies, IGI Global, pp.92-114, April 2016, DOI. 10.4018/978-1-5225-0239-5.ch004. |
40 | “Internet of Things for Developing Smart Sustainable Cities (SSC): A Security Perspective” | Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective, Springer, Vol.01, Chapter No.13, DOI. 10.1007/978-3-319-33124-9 2016. (Indexed in Web of Science and UGC care) |
41 | “A Trust- Based Security Model To Detect Misbehaving Nodes In Iot Environment Using Logistic Regression” | Vol.1850,no.012031,pp.1-19, Journal of Physics: Conference Series, 2021. |
42 | “Multi-tier trust based security mechanism for resource constrained IoT devices” | Vol.1850,no.012041,pp.1-16, Journal of Physics: Conference Series, 202.(Indexed in Scopus) |
43 | “Trust based Security Mechanism for resource constrained IoT Devices – A Review” | Vol.1850,no.012042,pp.1-17, Journal of Physics: Conference Series, 2021.(Indexed in Scopus) |
44 | “Internet of Things (IoT) Applications – An Inclusive Review” | Proceedings of the 3 rd National Conference on Advanced Computing (NCAC-2020),Vol.01, pp.81-86, ISBN: 978-93-89105-32-2,2020. |
45 | “Internet of Things (IoT): A Review” | Proceedings of the 3 rd National Conference on Advanced Computing (NCAC-2020), Vol.01, pp.50-56, ISBN: 978-93-89105-32-2, 2020. |
46 | “Black hole attack and its Solutions in MANET” | National Conference on Computational Methods Communication Technical and Informatics, NCCCI 2017, ISBN: 978-81-933316-1-3, Vol.No.1, pp.221-227, 2017. |
47 | “Routing Attacks and its Solutions in MANET” | National Conference on Computational Methods Communication Technical and Informatics, NCCCI 2017, ISBN: 978-81-933316-1-3, Vol.No.1, pp.236-241, 2017. |
48 | “Energy aware Trust-based Authentication and Detection of Black Hole Attacks in Mobile Ad Hoc Networks using Q-Learning “ | Proceedings of National Conference on Recent Advances in Computer Science and Applications, ISBN: 978-93-84743-57-4, Vol.no.1, pp. 185-191, 2015. |
49 | “Multi-dimensional trust assessment mechanism to identifying collaborative black hole attacks in military based MANET” | Proceedings of National conference on New Horizon in Computer Intelligence and Information System,ISBN.978-93-85777-02-8,Vol.No.01, pp.344-350,2015. |
50 | “Key Management Schemes in Mobile Ad Hoc Networks” | Proceedings of National conference on New Horizon in Computer Intelligence and Information System, ISBN.978-93-85777-02-8,Vol.No.01, pp.333-337,2015. |
51 | “A Light weight Trust based Security model for Mobile Ad Hoc Networks” | Proceedings of International Conference on Electrical, Instrumentation and Communication Engineering- Recent Trends and Research Issues held at Sri Krishna institutions, Coimbatore, 2015. |
52 | “Security Schemes to Thwarting Sybil Attack in Mobile ad hoc Networks” | Proceedings of National conference on New Horizon in Computer Intelligence and Information System, ISBN.978-93-85777-02-8,Vol.No.01, pp.360-365,2015 |
53 | “E-Governance: A Security and Privacy Perspective” | Seminar on Research Prospects in Digital India held on July 9, 2015. |
54 | “Trust and Cluster based Authentication Schemes in Mobile Ad Hoc Networks” | ISBN: 978-1-4799-3611-3, DOI:10.1109/EPSCICON.2014.6887502, pp.1-5, IEEE Digital Library, 2014. (Indexed in Web of Science,UGC care and Scopus) |
55 | “Trust based Security Schemes in Mobile Ad Hoc Networks – A Review” | ISBN: 978-1-4799-3966-4/14, DOI 10.1109/ICICA.2014.67, IEEE Digital Library, 2014. (Indexed in Web of Science, Scopus and UGC care) |
56 | “Survey of Cluster Based Cryptographic Schemes to Secure MANET” | Bonfring Digital Library, ISBN: 978-93-82338-30-7, pp: 243-250, 2013. |
57 | “Survey of Clustering Algorithms for MANET” | Proceedings of International Conference on Innovations in communication, Information and Computing’2013, ISBN: 978-81-925286-8-7, pp: 187 held at Sasurie College of Engineering, Tirupur, Tamilnadu on January 9-11, 2013. |
58 | “A Review of Security Attacks in Mobile Ad Hoc Networks” | Proceedings of National Conference on Information and Network Management ‘2013, held at Thiyagarajar College of Engineering, Madurai, Tamilnadu on 4, 5 April-2013. |
59 | Secure IoT Architecture Using Graph Neural Networks and Dynamic Trust Models to Combat Sybil Attack, | Second International Conference on Networks & Soft Computing, Vignan’s Foundation for Science, Technology & Research, Deemed to be University, Guntur, Andrapradesh, 2025. |
60 | Trust Based Security Scheme for Internet of Things(IoT)” | International Conference on Emerging Trends in Science and Technology – ICETST ‘25, Sri Ramakrishna College of Arts and Science, Coimbatore, 2025 |
61 | “Trust And Machine Learning Based Security Models For IOT” | Multidisciplinary Education: The Future, Assumption University, Thailand, 2024 |
62 | “The Evolution of IoT: A review of Present, Past and Future” | National Seminar and Workshop on AI and ML”, Bharata Mata College, Tharikkara, Kerala, November, 2023 |
63 | “Internet of Things (IoT): A Literature Review” | International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, KPR Arts, Science and Research, Coimbatore, 2023. |
64 | “Security aspects of Internet of Things – A Review” | International Conference on Recent Trends in Computer Science and Data Analytics (ICRTCSDA)”, KPR Arts, Science and Research, Coimbatore, 2023. |
65 | “The Role of Trust management and Blockchain in Internet of Things – A Review” | MESMAS International Conference, 2022, MES MAMPAD College, Malapuram, Kerala on 21.01.2022. |
66 | “The security aspects of Mobile Ad hoc Networks” | International conference on Interdisciplinary Research Innovations in Science and Humanities”,Nehru Arts and Science College, Coimbatore on 25.11.2021. |
67 | “Trust-Based Security in Internet of Things (IoT) Environment- A Survey” | International Conference on Multi-disciplinary innovations in Computing and Communication (Virtual), Easwari Engineering College, Coimbatore, 19th and 20th April, 2021. |
68 | “Multi-tier trust-based security mechanism for resource constrained IoT devices” | International conference on 2nd International Conference on Mathematical Modeling and Computational Methods in Science and Engineering (ICMMCMSE-2020), Alagappa University, Karaikudai, 2020 |
69 | “Internet of Things (IoT): A Review” | National conference on Advanced Computing (NCAC-2020), Bharthiyar University, Coimbatore, 2020 |
70 | “Internet of Things: A Review on Architecture, Applications, Enabling Technologies, and Challenges” | International virtual conference on Computational intelligence and applications, organized by Department of Computer science, engineering and information technology, Mohamed Sathak A J Engineering, Chennai, 2020. |
71 | “A Light weight trust-based security model for Mobile Ad Hoc Networks“ | International Conference on Electrical, Instrumentation and Communication Engineering- Recent Trends and Research Issues held at Sri Krishna institutions, Coimbatore, 2015. |
72 | “Energy aware Trust-based Authentication and Detection of Black Hole Attacks inMobile Ad Hoc Networks using Q-Learning” | National Conference on Recent Advances in Computer Science and Applications, Gandhigram Rural Institute-Deemed University, Gandhigram, 2015. |
73 | “Trust and Cluster based security architecture in MANET for a Collaborative Project Environment” | National Conference on Advanced Networking and Applications, Government Arts College, Udumalpet, 2015. |
74 | “Trust based Authentication Scheme to Remove Malicious in Mobile Ad Hoc Networks” | International Conference on Hi-tech trends in Emerging Computational Technologies, Sethu Institute of Technology, Pullor, 2015. |
75 | “Multi-dimensional trust assessment mechanism to identifying collaborative black hole attacks in military based MANET” | National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015 |
76 | “Key Management Schemes in Mobile Ad Hoc Networks” | National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015 |
77 | “Security Schemes to Thwarting Sybil Attack in Mobile ad hoc” | National conference on New Horizon in Computer Intelligence and Information System, Gandhigram Rural Institute – DU, Gandhigram, 2015 |
78 | “A Centralized Trust Computation model for Secure group formation in Military based Mobile Ad Hoc networks Using Stereotypes” | International Conference on Computational Intelligence, Cyber Security and Computational Models, PSG College of Technology, Coimbatore, 2015. |
79 | “Trust based Security Schemes in Mobile Ad Hoc Networks – A review” | International Conference on Intelligent Computing Applications, Bharathiar University, Coimbatore during 6-7 March, 2014. |
80 | “Trust and Cluster based Authentication Schemes in Mobile Ad Hoc Networks” | International Conference on Power, Signals, Control and Computation, Vidya Academy of Science and Technology, Thrissur during 3 to 10 January, 2014. |
81 | “Survey of Clustering Algorithms for MANET” | International Conference on Innovations in Communications, Information and Computing, Sasurie College of Engineering, Tripur during 9 to 11 January, 2013. |
82 | “A Comparative Study on Reactive or On Demand Routing Protocols in Mobile Ad HocNetworks” | International Conference on Research Trends in Computer Technologies, Dr.N.G.P. Arts and Science College, Coimbatore. |
83 | “Survey of Cluster Based Cryptographic Schemes to Secure MANET” | International Conference on Applied Mathematics and Theoretical Computer Science,St. Xavier’sCatholic College of Engineering, Nagerkovil,Tamilnadu on 24-25, January 2013. |
84 | “A Review of Security Attacks in Mobile Ad Hoc Networks” | National Conference on Information and Network Management ‘2013, held at Thiyagarajar College of Engineering, Madurai, Tamilnadu on 4, 5 April-2013. |
Book & Book Chapters
- Multidisciplinary Education: The Future”, ISBN: 978-93-92032-94-3, 2024
- Proceedings of International Conference on Interdisciplinary Research innovations in Science and Humanities”, ISBN: 978-93-92032-99-8, 2024