Radio Frequency Identification Devices and Applications
RFID trail marker identification project
RFID security and privacy
Computer Forensics Education
Computer Science Education
Teaching Java using media computation
Lab component for data structures course
Virtual network and security lab for online students
Some selected publications:
Ray, L., Khan, S., Summers, W., Wright, B., Introducing Computer Science using Media Computation, Accepted in ENMA 2009, June 17-19, 2009
R. Kannan, L. Ray, S. S. Iyengar, and R. Kalidindi, ”Max-Min Length-Energy-Constrained Routing in Wireless Sensor Networks”, LNCS-Lecture Notes in Computer Science, Springer-Verlag, Vol 2920, pp. 234-249. (1st European Workshop on Wireless Sensor Networks, Jan 19-21, 2004).
R. Kannan, L. Ray , R. Kalidindi and S. S. Iyengar, ”Threshold-Energy Constrained Routing Protocol for Sensor Networks”, Sensor Letters, December 2003.
L. Ray, R. Kannan, ” Randomized Message Forwarding with Equalized Incoming/Outgoing Traffic Rate: A Mechanism for Ensuring Anonymous Communication”, International Conference on Intelligent Sensing and Information Processing, India, December 2005.
L. Ray, R. Kannan, A. Durresi, ”Secure Weighted Data Aggregation in Wireless Sensor Networks”, International Conference on Information Systems, ISNG, Las Vegas, November, 2004.
R. Kannan, L. Ray and A. Durresi, ”Efficient Key Pre-distribution Schemes for Sensor Networks”, 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESAS 04), Heidelberg, Germany, August 2004.
R. Kalidindi, L. Ray, R. Kannan, and S. S. Iyengar,” Distributed Energy-Aware MAC Protocol for Wireless Sensor Networks”,International Conference on Wireless Networks , Las Vegas, Nevada, June 2003.