Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Analysis of MR damper based on finite element approach
    (Trans Tech Publications Ltd ttp@transtec.ch, 2014) Hemanth, K.; Ganesha, A.; Hemantha, K.; Gangadharan, K.V.
    A magneto rheological damper is a damper filled with magneto rheological fluid, which is controlled by a magnetic field. This allows the damping characteristics of the shock absorber to be continuously controlled by varying the force of the electromagnet. This type of shock absorber has several applications, most notably in semi-active vehicle suspensions which may adapt to road conditions, as they are monitored through sensors in the vehicle. This paper presents magnetic saturation analysis of non-parametric model of magnetorheological (MR) damper using ANSYS for improvement of the higher force with optimal current and MATLAB/Simulink simulation for quarter car model equipped with MR damper to conduct dynamic studies of the system using skyhook controller and comparative study for passive and semi-active system. © (2014) Trans Tech Publications, Switzerland.
  • Item
    Modified protocol for secure mutual authentication in IoT smart homes
    (Institute of Electrical and Electronics Engineers Inc., 2021) Varsha, P.; Hemanth, K.; Raut, A.
    IoT platforms often face attacks as IoT platforms are generally resource-constrained and thus do not have enough computation power and memory to support standard security measures. In 2019, 'a secure lightweight mutual authentication and key exchange protocol for IoT smart home environment utilizing temporary identity keys and cumulative Keyed-hash chain' was proposed. A Cumulative Keyed-hash chain mechanism was introduced to ensure the sender's identity (through challenge-response). This authentication protocol emerged vulnerable to replay and parallel session attacks in the communication phase between controller and manufacturer nodes. This paper proposes a modified protocol which overcomes the vulnerabilities in authentication protocol and ensures secure mutual authentication between the nodes. Further, cryptanalysis of the old protocol and formal evaluation of the proposed protocol for vulnerabilities is done using the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit to ensure the security of the proposed system. © 2021 IEEE.