Search Results - nagarajan+kandasamy

4 Results Sort By:
LinkPursuit – A Reinforcement Learning Method and Protocol for Distributed Antenna State Selection to Mitigate Wireless Interference
PAGE TITLEOverviewPAGE SUMMARY Network densification, the practice of deploying more radio access nodes into a geographical area, is being considered as a cost and bandwidth-effective method to increase wireless network capacity. Despite their benefits, widespread small-cell deployment also poses a tremendous challenge in terms of interference management....
Published: 1/22/2024   |   Inventor(s): Kapil Dandekar, Danh Nguyen, Nagarajan Kandasamy, Anton Paatelma, Harri Saarnisaari
Keywords(s):  
Category(s): Communications & Cybersecurity, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Communications & Cybersecurity > Comm: Antennas, Communications & Cybersecurity > Comm: Wireless, Electrical Engineering & Electronics > EE: Telecommunications, Hardware, Circuits & Sensors > Hardware: Antennas, Hardware, Circuits & Sensors > Hardware: Communication & Networking
A Real-Time, Protocol-Aware Reactive Jamming Framework Built on Software Defined Radios
PAGE TITLEOverviewPAGE SUMMARY Wireless network jamming techniques are commonly used in both military and commercial applications to block communication between network devices. Denial-Of-Service techniques (e.g. continuous jamming) are frequently employed but suffer drawbacks including high power consumption and high probability of detection. Reactive...
Published: 7/24/2024   |   Inventor(s): Kapil Dandekar, Nagarajan Kandasamy, Danh Nguyen, Boris Shishkin, Cem Sahin, David Dorsey
Keywords(s):  
Category(s): Communications & Cybersecurity, Computing, Software, Analytics & Information Technology, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Communications & Cybersecurity > Comm: Reactive Jamming, Communications & Cybersecurity > Comm: Software Defined Radio, Communications & Cybersecurity > Comm: Wireless, Computing, Software, Analytics & Information Technology > Computing: Algorithms, Computing, Software, Analytics & Information Technology > Computing: Simulation & Modeling, Electrical Engineering & Electronics > EE: Electronic Devices, Electrical Engineering & Electronics > EE: Telecommunications, Hardware, Circuits & Sensors > Hardware: Antennas, Hardware, Circuits & Sensors > Hardware: Communication & Networking
Physical Gate based Preamble Obfuscation for Securing Wireless Communication
PAGE TITLE Physical Gate based Preamble Obfuscation for Securing Wireless Communication PAGE SUMMARY In wireless networks, the transmission between legitimate users can be easily overheard by an eavesdropper for interception due to the broadcast nature of wireless medium, making the transmission highly vulnerable to eavesdropping attacks. Physical...
Published: 1/11/2024   |   Inventor(s): Kapil Dandekar, Ioannis Savidis, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, James Chacko, Kyle Juretus
Keywords(s):  
Category(s): Computing, Software, Analytics & Information Technology, Communications & Cybersecurity, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Hardware, Circuits & Sensors > Hardware: Antennas, Hardware, Circuits & Sensors > Hardware: Communication & Networking, Computing, Software, Analytics & Information Technology > Computing: Algorithms, Electrical Engineering & Electronics > EE: Data Communications, Electrical Engineering & Electronics > EE: Telecommunications, Communications & Cybersecurity > Comm: Antennas, Communications & Cybersecurity > Comm: Network Signal Processing, Communications & Cybersecurity > Comm: Obfuscation, Communications & Cybersecurity > Comm: Wireless
PhyLeave: Physical layer key based interleaving for secure wireless communication
PAGE TITLE PhyLeave - Physical layer key based interleaving for secure wireless communication PAGE SUMMARY An assortment of security threats exist due to the standardization of the communication channel between two trusted parties that can be exploited by an intruder. Data security is typically implemented through software based encryption on the payload....
Published: 6/20/2024   |   Inventor(s): Kapil Dandekar, Kyle Juretus, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Ioannis Savidis, James Chacko
Keywords(s):  
Category(s): Communications & Cybersecurity, Electrical Engineering & Electronics, Hardware, Circuits & Sensors, Hardware, Circuits & Sensors > Hardware: Communication & Networking, Electrical Engineering & Electronics > EE: Data Communications, Electrical Engineering & Electronics > EE: Telecommunications, Communications & Cybersecurity > Comm: Network Signal Processing, Communications & Cybersecurity > Comm: Wireless