| Current Path : /var/www/html/venkat/ |
| Current File : /var/www/html/venkat/' |
<html><head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<title>
Venkat/IIIT
</title>
</head>
<body>
<table bgcolor="lightgrey" border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center" bgcolor="white">
<img src="Venkat_IIIT_files/iiita%2520logo.jpg" height="110" width="100">
</td>
<td align="center"><b>
<font size="5">Indian Institute of Information Technology,Allahabad</font>
<br><font size="1">(An Institute of National Importance by Act of Parliament)
</font><br>
A Centre of Excellence in Information Technology, Established by Ministry of Education, Govt. of India. <br>
Deoghat, Jhalwa, Prayagraj-211015 (U.P.) <br>
</b></td>
<td align="center" width="10%">
<img src="venk.jpg" height="200" width="250">
</td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td align="center">
<h1><b><font color="blue"><span><span id="dtx-highlighting-item" dtx-highlight-backgroundcolor="lime"> S.VENKATESAN (In Tamil: சு.வெங்கடேசன்) </span></span></font></b> </h1>Take the pain and spread the happiness - Mahatma Gandhi</td>
</tr><tr>
</tr></tbody></table>
<font color = "Red">
Resources: <br> 1. Developed a simple MCQ Conduction and Evaluation web portal to support the online evaluation in this ongoing Covid'19 Pandemic. It has features such as random questions, random choices, more than one answer support, any number of choices support, option to remove the question after test, re-evaluate the question with new answer after the exam, etc. Interested can write to venkat@iiita.ac.in for free service and source code for educational purpose. <br>
2. Web and Network Security practice manual for teaching purpose [<a href = "manual-toc.pdf" target = "_blank">Table of Contents</a>]. Interested can write to me for the manual.
<br>
3. TrustSim: A trust and reputation model evaluation simulator. For more information and download code, please <a href="https://security.iiita.ac.in/tools.php" target = "_blank">Visit</a>. <br>
4. Cloud Security Check List (Basic) [<a href="cloud-checklist.pdf" target = "_blank"> Available Here </a>]. <br>
5. Web Security Audit Checklist [<a href="https://security.iiita.ac.in/websecurity-checklist.pdf" target = "_blank"> Available Here </a>]. <br>
6. Blockchain Testbed for application validation [Access the testbed from <a href="https://nsclab.iiita.ac.in" target ="_blank"> Here </a>]. The complete hardware setup will be assinged to you remotely. </br>
7. IoT Security Audit Guidelines (Network and Device) <a href="https://security.iiita.ac.in/iot/report.php" target ="_blank"> Here </a>. Please send your comments as well as can be used for auditing.
</font>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Designation and Address </font> </i></b></td>
<td>
Associate Professor <br> Department of Information Technology <br>
Room Number : 4304 <br>
Computer Centre - 2(CC-2) <br>
Indian Institute of Information Technology, Allahabad <br>
Deoghat, Jhalwa, Prayagraj-211015 (U.P.) <br>
Ph. : + 91 532 2922138 <br>
E-Mail : <img src="mail1.png"> ,
<img src="mail2.png"> <br>
<b> Associated with :</b> <a href = "https://security.iiita.ac.in"> Network Security & Cryptography (NSC) Lab </a> and <a href = https://security.iiita.ac.in/iot/> IoT Security Lab </a>
</td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Education</font> </i></b><br></td><td><align="justify"><ul><li>
Ph.D. - Mobile Agent Security from Department of Computer Science and
Engineering at Anna University, Chennai,Tamilnadu, India in Feb. 2010. Thesis Advisor: Prof.C.Chellappan</li><li>
M.Tech. - Computer Science and Engineering from Bharath Institute of
Higher Education and Research University,Chennai, Tamilnadu, India in
2005.</li><li>
B.Tech. - Computer Science and Engineering from Sri Manakula Vinayagar
Engineering College affiliated with Pondicherry University, Pondicherry,
India in 2003. </li><li>
DCT - Diploma in Computer Technology from Adhiparasakthi Polytechnic, Tamilnadu, India in 2000. </li></ul></align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b> <i><font color="lightred">Publications</font></i> </b> <br></td><td><align="justify">
<b>International Journals </b> <br> <ol>
<li> Ashutosh Kumar, L. Kavisankar, S. Venkatesan, Manish Kumar, Suneel Yadav, Sandeep Kumar Shukla, Rahamatullah Khondoker (2024), "IoT Device Security Audit Tools: A Comprehensive Analysis and a Layered Architecture Approach for Addressing Expanded Security Requirements", accepted to publish in the International Journal of Information Security, Springer.</li>
<li>
Yuvaraj Rajendra, Venkatesan Subramanian and Sandeep Kumar Shukla (2024), "Sybil Attack Detection in ultra-dense VANETs using Verifiable Delay Functions", Peer-to-Peer Networking and Applications, Springer.
</li>
<li>
Yuvaraj Rajendra, Sachin Sahu, Venkatesan Subramanian and Sandeep Kumar Shukla (2023), "Storage Efficient Blockchain Models for Constrained Applications", International Journal on Cluster Computing, Volume 26, pages 2163–2181, Springer.
</li>
<li>
Venkatesan Subramanian, KK and Pallapa Venkataram (2022), "A Concept Map based Teaching of Compiler Design for Undergraduate Students", published in EAI Endorsed Transactions on e-Learning, Vol.8, No.1.
</li>
<li>
Nitish Andola, Sourabh Prakash, Vijay Kumar Yadav, Raghav, S. Venkatesan and Shekhar Verma (2022), "A Secure Searchable Encryption Scheme for Cloud using Hash based Indexing", Journal of Computer and System Sciences, Vol,126, pp. 119-137,Elsevier.
</li>
<li>
Jaya Singh, Ayush Sinha, Priyanka Goli, Venkatesan Subramanian, Sandeep Kumar Shukla and Om Prakash Vyas (2021), "Insider Attack Mitigation in a Smart Metering Infrastructure using Reputation Score and Blockchain Technology", International Journal of Information Security, Springer.
</li>
<li>
Venkatesan S., Vladimir A. Oleshchuk, Chellappan C., and Sourabh Prakash (2016), "Analysis of Key Management Protocols for Social Networks", International Journal of Social Network Analysis and Mining, Vol.6, No.1, Article.3.Springer.</li>
<!--<li> Venkatesan S., Chellappan C., Anurika Vaish, Dhavachelvan P. and Prabhu C., "A Collaborative Model to Mitigate the TCP SYN Flood Attack in IPv4/IPv6 Environment", accepted to publish in International Journal of Information and Computer Security, Inderscience Publishers.</li>--><li>
Venkatesan S., Baskaran R., Chellappan C., Anurika Vaish and
Dhavachelvan P.(2013), "Artificial Immune System based Mobile Agent Platform Protection", International Journal on Computer Standard and Interfaces, Elsevier Standards, Vol.35, No.4,pp.365-373.
</li><li>
Venkatesan S., Saleem Basha M.S., Chellappan C., Anurika Vaish and
Dhavachelvan.P (2013), " Analysis of accounting models to detect duplicate
request in Web Service", Journal of King Saud
University - Computer and Information Sciences, Elsevier Standards, Vol.25, No.1,pp.7-24.
</li><li>
Venkatesan S., Chellappan C., Vengattaraman C., Dhavachelvan P. and Anurika
Vaish (2010), 'Advanced Mobile Agent Security Models for Code Integrity
and Malicious Availability Check', International Journal of Computer
and Network Applications,Elsevier Standards, Vol No.33, pp.661-671. </li><li>
Venkatesan S., Chellappan C. and Dhavachelvan P.(2010), 'Performance
analysis of mobile agent failure recovery in E-Service applications',
International Journal on Computer Standard and Interfaces, Elsevier
Standards, Vol.32,No.1-2,pp.38-43.</li><li>
Venkatesan S. and Chellappan C. (2009), 'Free Roaming Mobile Agent
(FRoMA) Protection against Multiple Attacks', International Journal on
Communication Networks and Distributed Systems, Inderscience Publishers,
Vol. 3, No. 4, pp. 362-383. </li><li>
Venkatesan S. and Chellappan C. (2009), 'Generating Routing Table of
Free-Roaming Mobile Agent in Distributed Environment',
International Journal on Computer standard and Interfaces, Elsevier
Standards, Vol. 31, No. 2, pp. 428-436. </li><li>
Venkatesan S. and Chellappan C. (2008), 'Inaugurating Free-Roaming
Mobile Agent (FRoMA) Based Secured e-Health Model', eHealth
International Journal, Vol. 4, No. 1, pp. 14-19. </li></ol>
<b>International Conferences </b><br><ol>
<li> Swaroop Dora, Brijesh Peshvani, Ashutosh Kumar, Piyush Tiwari, S. Venkatesan, Sandeep Kumar Shukla, Rahamatullah Khondoker (2025),"Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic", accepted to present in The 17th International Conference on COMmunication Systems & NETworkS - Workshop on Machine Intelligence in Networked Data and Systems (MINDS) (COMSNETS Workshop '25 - MINDS). </li>
<li> L. Kavishankar, Ajay Vemuri, S Venkatesan, Rahamatullah Khondoker (2024), 'A Novel Strategy for the Identification of the Operating System of Bluetooth-Enabled Devices for Security Audit" is accepted to publish in the 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2024), Sweden. </li>
<li> Ashutosh Kumar, Brijesh Peshvani, S Venkatesan, Manish Kumar, Suneel Yadav and Sandeep Kumar Shukla (2023), 'Automated Security Audit Testbed for IP-Based IoT Devices without Physical Access' is accepted to publish in the 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2023), San Antonio, Texas , USA. </li>
<li> Shivam Mishra, Aditya Ray, Manpreet Singh, S Venkatesan and Anshu S. Anand (2023), 'Automated Hardware Auditing Testbed for UART and SPI based IoT Devices' is accepted to publish in the 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2023), San Antonio, Texas , USA.</li>
<li> Yuvaraj Rajendra, Venkatesan Subramanian and Sandeep Kumar Shukla (2023), 'BlockPaaS: Blockchain Platform as a Service', accepted for publication in the 15th International Conference on COMmunication Systems and NETworkS - COMSNETS 2023 under Demo and Exhibits Category. </li>
<li>S. Venkatesan, Sandeep Kumar Shukla and Yuvaraj Rajendra (2022), 'TrustSim: A Decentralized Reputation and Trust Model Simulator', published in the proceedings of the Fourth International Conference on Blockchain Computing and Applications (BCCA 2022).
</li>
<li>
Yuvaraj Rajendra, Sachin Sahu, Venkatesan Subramanian and Sandeep Kumar Shukla (2021), 'A Storage Efficient Blockchain Model for Constrained Applications', published in the proceedings of The Third IEEE International Conference on Blockchain Computing and Applications (BCCA2021), Tartu, Estonia, pp. 73-80. [Online]
</li>
<li> Venkatesan Subramanian, Yuvaraj Rajendra, Shubham Sahai and Sandeep Kumar Shukla (2020), 'Decentralized Device Authentication Model Using the Trust Score and Blockchain Technology for Dynamic Networks' published in the proceedings of the 3rd IEEE Blockchain Conference, Greece. [Online] </li>
<li>Venkatesan S et al. (2019), 'Simplification of Compiler Design Course Teaching using Concept Maps', Proceedings of 7th International Conference on Information Technology in Education (ICITE 2019), Sydney, Australia, pp.91-102. </li>
<li>Akansha Pandey, Ezhil S.Kalaimannan and Venkatesan.S (2015), 'An Information Diffusion Model to analyse the behavior of Online Social Network based Malwares', Proceedings of The 2015 International Conference on Computational Science and Computational Intelligence, Las Vegas, USA, pp.867-868. </li>
<li>Preeti Yadav, Savita Gupta and Venkatesan.S (2014), 'Trust model for Privacy in Social Networking using Probablistic Determination', Proceedings of 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014),Madras Institute of Technology, Anna University, Chennai. (Best Paper Award). </li><li>
Ragini, Parul Mehrotra and Venkatesan.S (2014), 'An efficient model for Privacy and Security in Mobile Cloud Computing',Proceedings of the 4th International Conference on Recent Trends in Information Technology (ICRTIT 2014), Madras Institute of Technology, Anna University, Chennai. </li><li>
Venkatesan S. and Abhishek Vaish. (2011), 'Multi-Agent based Dynamic
Data Integrity protection in cloud computing', Proceedings of the
International Conference on Advances in Communication, Network, and
Computing- CNC 2011,Bangalore,Volume 142, part 1, pp. 76-82.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Identifying the Split
Personality of the Malicious Host in the Mobile Agent Environment',
Proceedings of the 2008 IEEE International Conference on Intelligent
Systems, Bulgaria, pp. 14-40 to 14-44.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Mobile Agent
Platform through Attack Identification Scanner (AIS) by Malicious
Identification Police (MIP)', Proceedings of the IEEE International
Conference on Emerging Trends in Engineering and Technology,
(ICETET'2008), India, pp. 1228-1231.</li><li>
Venkatesan S. and Chellappan C. (2008), 'Protection of Malicious Host to
Host Attack in the Free Roaming Mobile Agent (FRoMA) Environment',
Proceedings of the ACM International Conference on Advances in Computing
(ICAC 2008), India, pp. 1-4.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Performance of Protecting Free
Roaming Mobile agent against Multiple Colluded Attacks', Proceedings of
the IEEE International Conference on Advances in Computer Vision and
Information Technology(ACVIT'07), India, pp. 16-24. </li><li>
Venkatesan S. and Chellappan C. (2007), 'Protecting Free Roaming Mobile
Agent against Multiple Colluded Truncation Attacks', ACM Proceedings of
International Conference on Mobile Multimedia
Communication(MobiMedia'07), Greece, pp. 293-297.</li><li>
Venkatesan S. and Chellappan C. (2007), 'Recovery model for Free Roaming
Mobile Agent against Multiple Attacks', ACM Proceedings of
International Conference on Mobile Multimedia Communication
(MobiMedia'07), Greece, pp. 275-279. </li><li>
Venkatesan S. and et al. (2006), 'Autonomous Scattered
Firewall', Proceedings of 1st International Conference on Intelligent
System and Control(ISCO'06), Coimbatore, India. </li></ol>
<b>Book Chapters </b><br><ol>
<li>Venkatesan Subramanian, Shubham Sahai, Sandeep Kumar Shukla and Jaya Singh (2020), 'Secure and Decentralized Management of Health Records' in the Edited Book entitled 'Applications of Blockchain in Healthcare'. This Edited Book is published in the book series of Springer entitled 'Studies in Big Data', pp. 115–139. </li>
<li>
Venkatesan S. Chellappan C. Dhavachelvan P.(2012), 'Recovery of
Ubiquitous Multimedia Content Discovery Mobile Agent', published in the
book named Ubiquitous Multimedia and Mobile Agents: Models and
Implementations, Editor: Susmit Bagchi IGI Global Publishing Service,
USA.pp.215-231.</li><li>
Venkatesan S. Chellappan C. Anurika Vaish (2012), 'Mobile Agent based
Multimedia Content Discovery', published in the book named Ubiquitous
Multimedia and Mobile Agents: Models and Implementations, Editor: Susmit
Bagchi, IGI Global Publishing Service, USA. pp.135-147.</li></ol>
<b>Workshop </b><br><ol><li>
S.Venkatesan, Shubham Sahai Srivastava and Sandeep Kumar Shukla (2017), "Decentralized Authentication for IoT Devices using the Blockchain", accepted to present in the 2nd Advanced Workshop on Blockchain: Technology, Applications, Challenges, organized by ISRDC, IIT Bombay, India.</li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Invited Talks</font></i></b><br></td><td><align="justify"><ol><li>
Title: Vulnerabilities in Network Protocols<br>
TEQIP-II Sponsored National Workshop On Advanced VLSI, Signal processing and Communication network (AVSC-2014), MNNIT, Allahabad, 2014. </li>
<li>
Title: Security Vulnerabilities in the Network Protocols,Improved services and Bitcoin Technique <br>
Five Days National Workshop on Emerging Trends in Communication & Information Technology (COMMIT'17), SHUATS, Allahabad, Jan-Feb 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at Department of Computer Science and Engineering, IIT-Kanpur, 11th March 2017.
</li>
<li>
Title: Blockchain: Goethereum Implementation Perspective <br>
Invited Talk at IEEE Computer Society of India Symposium, IIIT - Allahabad, 18th March 2017.
</li>
<li>
Title: Blockchain and its Applications <br>
Invited Talk at Webinar-20, Series-22 organized by Computer Society of India, Allahabad Chapter, 13th September 2020.
</li>
<li>
Title: Secure eHealth Record Management System using the Blockchain Technology <br>
Research and Invited Talk at DST-UKIERI Virtual workshop on Adversarial Cyber Security, Jointly organized by Indian Institute of Technology (IIT) Mandi, in collaboration with London Metropolitan University and Centre for Multidisciplinary Innovation and Collaboration (C-MRiC), 24th September 2020.
</li>
<li>
Title: Cyber Security: Attack Surface, Trends and Expansion <br>
Invited Talk at IEEE UP Section Webinar Series, 18th July 2021.
</li>
<li>
Title: Cyber Security and Blockchain <br>
Talk in AICTE ATAL FDP on Cyber Security for Internet of Things organized by PDPM Indian Institute of Information Technology, Design & Manufacturing (IIITDM) Jabalpur, 25th June 2021.<br>
</li>
<li>
Title: Blockchain for Smart Metering Infrastructure <br>
Talk in AICTE ATAL FDP on IoT Applications with Blockchain Techniques organized by National Institute of Technology Meghalaya, India, 19th July 2021.<br>
</li>
<li>
Titles: "Introduction to Blockchain", "IOTA", "Decentralized Authentication Scheme Using Blockchain Technology", "Storage Constraint Free Blockchain", "Security Risk in Machine Learning" <br>
Talk in the Hetergeneous Data Analytics Applications with Special Reference to Deep Learning Models and Blockchain Technologies for Applications in Digital Mobility jointly organized by IIIT Allahabad and Hof University of Applied Sciences. Venue: Hof University of Applied Sciences, Hof, Germany, 04th to 07th July 2022. <br>
</li>
<li>
Title: "e-Health Data Security: Anonymization, Federated ML and Blockchain Technology" <br>
Talk in the workshop titled "Artificial Intelligence for Cardiology" organized by IIIT Allahabad and THM University of Applied Sciences, Germany. Venue: Rauischholzhausen Castle, Gissen, Germany, 18th to 20th June 2024. <br>
</li>
<li>
Title: "Cyber Security Awareness" <br>
Invited Talk at THM University of Applied Sciences, Friedberg, Germany. 24th June 2025. <br>
</li>
<li>
Title: "Cloud Security" <br>
Indian Cybersecurity Academic Network (ICAN) Faculty Development Program (FDP) at IIT Madras on 14th July 2025. <br>
</li>
<li>
Title: "Blockchain for Constrained Applications" <br>
School of Computing, Engineering & Intelligent Systems, Ulster University, Northern Ireland on 21st August 2025. <br>
</li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Experience</font></i></b><br></td><td><align="justify"><ol><li>
Research: 2.2 Years in Collaborative Directed Basic research on Smart
and Secure Environment (SSE) project funded by National Technical
Research Organization (NTRO), New Delhi as Research/Scientific
Associate. </li><li>
Teaching: 13 Years. </li></ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Software Development</font></i> </b> <br></td><td><align="justify"><ol><li>
Digital Display Content Copying Protection for Smart and Secure
Environment project funded by National Technical Research Organization,
New Delhi </li><li>
Online Examination System for Smart and Secure Environment project
funded by National Technical Research Organization, New Delhi. </li><li>
Elective and Project Registration Portal for IIIT-Allahabad students. </li> <li>
Online Program (C, C++, Java, Python and Perl) evaluation tool. </li> <li>
MCQ Conduction and Evaluation web portal to support the online evaluation. </li> </ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<br>
<b><i><font color="lightred">Research Tool/Simulators</font></i> </b> <br></td><td><align="justify"><ol><li>
<a href = "https://security.iiita.ac.in/tools.php" target = "_blank">TrustSim</a>: A Decentralized Reputation and Trust Model Simulator </li>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b> <i><font color="lightred">Courses Teaching</font></i> </b> <br></td>
<td><align="justify">
<br><b> <a href="http://profile.iiita.ac.in/venkat/course/" target = "_blank">Course Site</a>
</b> <br>
<!--<ol><li>
Compiler Design</li><li>
Network Security </li><li>
Security Architecture</li></ol>
-->
</align="justify"><br></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Interest </font></i> </b> </td><td><align="justify">
<ol><li>Mobile Agent Security </li><li>
Applied Cryptography</li><li>
Blockchain</li><li>
Cloud Computing and Social Network Privacy</li> </ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Research Team </font> </i> </b></td> <td> <align="justify">
<ol> <li> Dr. Saurabh Prakash <br> PhD <br> Thesis Title: A Privacy Preserving Framework for Data Storage and Retrieval on the Cloud [Completed] </li><li> Mrs.Jaya Singh <br> Research Scholar <br> Research Area: Big Data Security </li><li> Mr. Yuvaraj Rajendra <br> M.Tech - PhD <br> Research Area: Decentralized Dynamic Network </li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Professional Membership </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute of Electrical and Electronics Engineers (IEEE) </li><li> Association for Computing Machinery (ACM)</li><li> Cryptology Research Society of India (CRSI) </li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" Rules="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Project </font> </i> </b></td> <td> <align="justify">
<ol> <li> Institute one time seed money <br> Electronic Medical Record Management System using Blockchain Technology <br> Cost: Approximate Rs.10 lakhs <br> Role: Principal Investigator <br> Duration : 1 year [From May 2017] <br> Status: Completed. </li>
<li> Department of Science & Technology - ICPS <br>Development of Secure IoT Communication using the Blockchain Technology <br> Recommended Cost: ~Rs.36 lakhs <br> Role: Principal Investigator <br> Duration: 3 years from August 2019</li>
<li>Department of Science & Technology - Indo-Norway Collobarative Project <br> Cyber-Physical Security in Energy Infrastructure of Smart Cities (CPSEC) <br> Recommended Cost: Approximate Rs.36 lakhs <br> Role: Co-PI <br> Duration: 3 Years from October 2018.</li>
<li>DST-C3i Hub, IIT Kanpur <br> IoT Security Project - Development of Security Audit Framework for Secure IoT Network <br> Recommended Cost: Approximate Rs.274.25 lakhs <br> Role: PI <br> Duration: 5 Years from March 2021.</li>
</li></ol> </align> </td> </tr> </tbody> </table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Papers Reviewed in </font></i> </b> </td><td><align="justify"><ol>
<li>IEEE transaction on System, Man and Cybernetics: Part C.</li> <li>
International Journal of Network and Applications (Elsevier). </li><li>
International Journal of Applied Mathematics and Computation (Elsevier). </li><li>
International Journal on NETNOMICS: Economic Research and Electronic Networking (Springer). </li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%">
<b><i><font color="lightred">Recognition</font></i> </b> </td><td><align="justify"><ol>
<li> Associate Fellow, C3iHub, IIT Kanpur [For the period 2022-2023]. </li>
</ol>
</align="justify"></td>
</tr>
</tbody></table>
<table border="1" width="100%" RULES="ROWS" FRAME="HSIDES">
<tbody><tr>
<td width="20%"><center>
<a href="http://www.iiita.ac.in/"> IIIT-A HOME </a></center>
</td>
<td align="center">
<img src="Venkat_IIIT_files/sword.jpg" height="120" width="120">
</td>
<td width="20%"><center><font color="blue">
<img src="Venkat_IIIT_files/bouquet.jpg" height="70" width="70">
<p>Greetings and Thanks to my Parents, Professors and Friends </p></font></center><font color="blue">
</font></td>
</tr><tr>
</tr></tbody></table>
</body></html>