Research

Current Work

Context. A word that is hard to define if we don’t know the “context” to which we are referring. Systems and interactions with such systems are more meaningful, useful, usable and efficient if context is considered as a core element in the system design. Context is also a very important aspect to consider in modern day computing, because of the Internet of Things (IoT). IoT devices have ‘pervaded’ into our daily personal and work lives. It has reached a stage where we don’t consider them to be ‘assisting’ devices any more. They are usually a significant part of our lives. My research interests stem from the above factors, i.e. the need for us to adapt our interactions to the ubiquity of devices, the context of use, and the security/privacy issues resulting thereof.

I am interested in context-awareness, usability and privacy/security issues of mobile technology, and its application in pedagogy and IoT for social good. Specifically, I like to explore questions such as the following:

  • Pedagogy – Why do people use different strategies to learn? How can we help them learn more effectively?
  • Privacy/security – What can we do to ensure that users’ privacy is protected in their various daily interactions?
  • IoT for social good – How can we ensure the personal safety of users as they go about their daily activities?
Current Research
  • Active learning strategies and technological solutions to teaching & learning
    (People: R. V. Sampangi)
  • PRISM: Privacy, Security and Personal Safety with Mobile Technologies (September 2016 – Present)
    (People:R. V. Sampangi, K. Hawkey, M. Just [Heriot Watt University, UK], A. Willis [University of Edinburgh, UK], et al.)
  • Context-dependent and Usable Security and Privacy (February 2016 – Present)
    (People: R. V. Sampangi, K. Hawkey)

Student Supervision

Students supervised and co-supervised

I have / have had the pleasure to work with the following students during their time at Dalhousie University (* indicates current students):

  • Trishla Shah*
    PhD Student (December 2018 – Present)
    Topic: Secure mobile computing
    Co-supervised with Dr. Angela Siegel
  • Matthew Hemming
    MACSc Student (August 2018 – December 2018)
    Topic: Social media mobile applications
  • Brandon Poole
    BCSc Student, Undergraduate Honours Thesis (July 2018 – December 2018)
    Topic: Social media privacy
  • Hasmeet Singh Chandok
    MCSc Student (May 2017 – August 2018)
    Note: Co-supervised with Dr. Kirstie Hawkey
    Note: He was also mentored by Dr. Mike Just (Heriot-Watt University) and Dr. Alette Willis (The University of Edinburgh)
    Topic: Personal safety mobile applications
  • JeyaBalaji Samuthiravelu
    MACSc Student (May 2017 – April 2018)
    Note: This student pursued an internship-based MACSc and a research project was optional.
    He, however, worked extensively in the research project on personal safety in which he was co-supervised with Dr. Kirstie Hawkey.
    Note: He was also mentored by Dr. Mike Just (Heriot-Watt University) and Dr. Alette Willis (The University of Edinburgh).
    Topic: Personal safety mobile applications
  • Michael Altair
    BACSc Student (May 2017 – April 2018)
    Note: This student pursued the BACSc and a research/honours project was not required as part of program requirements.
    He, however, worked extensively in the research project on personal safety in which he was co-supervised with Dr. Kirstie Hawkey.
    Note: He was also mentored by Dr. Mike Just (Heriot-Watt University) and Dr. Alette Willis (The University of Edinburgh).
    Topic: Personal safety mobile applications
  • Sehrish Khawaja
    MACSc Student (June 2017 – December 2017)
    Note: Co-supervised with Dr. Kirstie Hawkey
    Note: She was also mentored by Dr. Mike Just (Heriot-Watt University) and Dr. Alette Willis (The University of Edinburgh).
    Topic: Design of a personal safety mobile application
  • Nazim Ali
    MACSc Student (June 2017 – August 2017)
    Note: Co-supervised with Dr. Kirstie Hawkey
    Topic: Mobile application security using facial micro expressions

Directed Studies Supervision

I have / have had the pleasure to work with the following students in their directed studies endeavours  (* indicates current students):

  • Matthew Hemming
    MACSc Student (May 2018 – August 2018)
    Topic: Advanced concepts in back-end web development
  • Aaron Hourie
    BCSc Student (May 2018 – August 2018)
    Co-supervised with Mr. James Fleming.
    Topic: Applications of DSP
  • JeyaBalaji Samuthiravelu
    MACSc Student (May 2017 – August 2017)
    Topic: Real-time application development using IBM Developer Cloud

Prior Work

Prior Research
  • Postdoctoral research (2015-16)
    During May 2015 – August 2016, I was a postdoctoral fellow at the Faculty of Computer Science, Dalhousie University. My work was sponsored by Boeing.
    Research focus: Human aspect to security and privacy, particularly in applications employing IoT and mobile devices to create a ubiquitous and coordinated work environment.
    Supervisors: Dr. Derek Reilly and Dr. Srinivas Sampalli.
    Additionally, I worked with Dr. Kirstie Hawkey to explore using Micro Expressions as a possible supplement to Face Recognition. This project was the result of a personal interest towards understanding the working of the human mind, which in a way, led me to consider psychological/behavioural aspects that could make user interactions/reactions unique.
  • Doctoral Research: Biomimetic metamorphic framework for security in resource-constrained wireless networks (2011-2015)
    My thesis focused on Security (key management and authentication) and Applications in Emerging Wireless Technologies (with a specific focus on RFID and WBAN).
    My doctoral work involved creating a metamorphic (or, reconfigurable) security framework, which dynamically ‘switched’ between three new key management algorithms and encryption schemes proposed as part of my thesis work. The objective here was to create security solutions that seem complex to understand/crack, are simple to deploy, but offer security through obscurity. You can find more information about my PhD work here on this page.
    Thesis advisor: Dr. Srinivas Sampalli.
    My doctoral work was sponsored by Boeing, as part of a collaborative venture between The Boeing Company, and Dalhousie University [Click here for the related news item on the Boeing website].
  • Master’s thesis project: Security and reliability of wireless body area networks in remote monitoring of high-risk pregnancies. (2010-2011)
    There seems to be an unavoidable relationship between the lack of adequate medical facilities in rural India, and the risks due to any complications in pregnancies on the lives of the mother and the unborn fetus. My work focused on proposing an application to remotely monitor women with high-risk pregnancies, and to ensure reliable and secure communication between the WBAN sensors and the hospital monitoring station.
    Thesis advisors: Dr. Shalini R. Urs and Dr. Srinivas Sampalli.
  • The knowledge city index: A case study of Mysore. (2009-2011)
    Our objective in this project was to assess the attributes of a city, particularly those that have been classified as “Knowledge Cities” around the world, and to develop a framework that would help in assessing cities in developing economies such as India. Our initial work involved assessing the attributes of the Indian city of Mysore and positioning it as a knowledge city. Next, we proposed a framework to assess and position a city in developing economies as a knowledge city, with Mysore used as a case study.

Collaborative Projects

Collaborative Projects

During my time at the Faculty of Computer Science, I have been actively involved in a number of projects. I list a few of those here.

  • Augmentation of Face Recognition with Live Elements for User Authentication (May 2014 – August 2018)
    Click here for more information about this project.
    (People: R. V. Sampangi, K. Hawkey, B. MacKay, R. Alsheh)
  • Interactive Android / Web Application for World Diabetes Day (November 2014)
    We created an interactive web application and an informative Android application for spreading awareness about diabetes at information booths (at Dalhousie University and NSCC, Dartmouth) on World Diabetes Day 2014. This project was in collaboration with Capital Health.
    (People: D. Agarwal, S. Dey, P. Bahekar, R. V. Sampangi, S. Sampalli)
  • Interactive Web Application for prideHealth (July 2014)
    We created an interactive web application to be deployed at the Halifax Pride Parade 2014. This project was in collaboration with prideHealth.
    (People: D. Agarwal, S. Dey, R. V. Sampangi, S. Sampalli)
  • Quality / Conformance Assessment for Healthcare Application (June 2014 – July 2014)
    We worked on assessing a healthcare solution for its conformance to standards. This project was in collaboration with Health QR.
    (People: L. Tucker, R. V. Sampangi, S. Sampalli)
  • Mobile Couponing Solution (May 2014 – July 2014)
    We worked on an intuitive solution for mobile couponing. This project was in collaboration with Citrus Mobile Solutions.
    (People: M. Kumar, M. Nukala, S. K. R. Thadoor, L. Tucker, R. V. Sampangi, S. Sampalli)
  • Prototype Development of Home Safe Living System (2012-13)
    Prototype development of Home Safe Living System, a software system that will expertly assess a geriatric patients ability to either live independently or with the assistance of a caregiver, and recommend the necessary changes. It considers patients level of physical and cognitive abilities to generate a health profile. The project is funded by NSERC Engage grant.
    (People: M. Rahman, R. V. Sampangi, A. Kulakevich, S. Sampalli)
  • Requirement and Feasibility Study of Home Safe Living System (2012)
    Home Safe Living provides solutions for independent living of elderly people. In this project, we conducted a feasibility study of company’s requirements to develop a software system which will capture the health profile of a client / patient and helps in assessing their ability to live either independently or with the assistance of a caregiver, and recommend any additional requirements. Our proposal includes designing of an knowledge-based expert system with web-based interface.
    (People: M. Rahman, R. V. Sampangi, A. P. Khandavilli, S. Sampalli)
  • Android Application for Capturing, Manipulating and Sharing Images (2012)
    This is a novel social application to capture or use images that are present in the phone memory, and manipulate the images, and share the images in the user’s social group.
    (People: R. V. Sampangi, G. Sharma, A. S. Sran, S. Sampalli)
  • Android Application to Share and View Images (2012)
    This is a novel application to share and view images between two Android devices. The application used Bluetooth for sharing the images between the devices, and used a modified handshaking protocol for exchanging important information between the paired devices to display the images appropriately.
    (People: R. V. Sampangi, G. Sharma, A. S. Sran, S. Sampalli)
  • Security and Reliability of Wireless Body Area Networks (WBAN) in Wireless (Remote) Monitoring of High-Risk Pregnancies (2011)
    (Master’s thesis, University of Mysore, Mysore, India)
    In this project, we explored the pertinence of remote health monitoring to patients with high-risk pregnancies, and proposed reliability improvement technique and a security suite for the proposed application. (People: R. V. Sampangi, S. Urs, S. Sampalli)
  • Study of Mysore city as a Knowledge city and development of Knowledge City Assessment Index (2009 – 2012)
    In this study, we studied the various parameters associated with a knowledge city, developed an index to effectively assess the positioning of cities in emerging economies as knowledge cities, and analyzed Mysore city, India in terms of the developed Knowledge City Index (KCI).
    (People: R. V. Sampangi, V. Viswanath, H. C. A. Ray, N. K. Rao, N. Shilpa, R. Sathyendhranath, B. A. S. Kumar, W. Ritter, S. Urs)

Publications

Links: ORCID ID 0000-0002-7919-8843     |     Google Scholar

Refereed Journal Articles
  1. R. V. Sampangi and S. Sampalli, “Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks”, International Journal of Network Security, Vol.19, No.3, pp.430-442, May 2017 (DOI: 10.6633/IJNS.201703.19(3).12). Click here to access the paper online.
  2. R. V. Sampangi and S. Sampalli, “HiveSec: Security in Resource-Constrained Wireless Networks Inspired by Beehives and Bee Swarms”, International Journal of Information Security (2016). doi:10.1007/s10207-016-0341-1. Click here to access the paper online.
  3. R. V. Sampangi and S. Sampalli, “Butterfly Encryption Scheme for Resource-Constrained Wireless Networks”, Sensors 2015 (Special Issue Identification, Information & Knowledge in the Internet of Things), 15(9), 23145-23167; doi:10.3390/s150923145. Received: 13 July 2015 / Revised: 27 August 2015 / Accepted: 8 September 2015 / Published: 15 September 2015. Click here to access the paper online.
  4. R. V. Sampangi and S. Sampalli, “RFID Mutual Authentication Protocols based on Gene Mutation and Transfer”, in the Special issue on RFID & Internet of Things of the Journal of Communications Software and Systems (JCOMSS), Vol. 9, No. 1, March 2013. Click here to access the paper online.
  5. R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, “A Security Suite for Wireless Body Area Networks”, International Journal of Network Security and Its Applications (IJNSA), Vol. 4, No. 1, pp. 97-116, January 2012. Click here to access the paper online.
  6. R. V. Sampangi, W. Ritter, N. V. Vighnesh and H. C. A. Ray, “The Knowledge City Index: A Case Study of Mysore”, International Journal of Knowledge-Based Development (IJKBD) 2012, Vol. 3, No. 2, pp. 193-212. Click here to access the paper online.
Refereed Conference Articles
  1. J. Narayanaswamy, R. V. Sampangi and S. Sampalli, “HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption,” Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP) 2015, February 2015, Loire Valley, France.
  2. R. V. Sampangi and S. Sampalli, “‘RFID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation”, Proceedings of the 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2014, September 2014, Split, Croatia.Click here to access the paper onlineThis submission was recognized as the “Best Conference Paper in the General Conference Program” at SoftCOM 2014.
  3. R. V. Sampangi and S. Sampalli, “HiveSign: Dynamic Message Signatures for Resource-Constrained Wireless Networks”, Proceedings of the 10thACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet) 2014, September 2014, Montreal, Canada.Click here to access the paper onlineThis submission was recognized with the “Best Paper Award” at Q2SWinet 2014.
  4. J. Narayanaswamy, R. V. Sampangi and S. Sampalli, “SCARS: Simplified Cryptographic Algorithm for RFID Systems”, Proceedings of the 2014 IEEE RFID Technology and Applications Conference (RFID-TA), September 2014, Tampere, Finland.
  5. M. Alabdulhafith, R. V. Sampangi and S. Sampalli, “NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection”,Proceedings of the 5th International Workshop on Near Field Communication (NFC 2013), February 2013, Zurich, Switzerland. Click here to access the paper online.
  6. R. V. Sampangi and S. Sampalli, “Tag-Server Mutual Authentication Scheme based on Gene Transfer and Genetic Mutation”, Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications (CISDA 2012), July 2012, Ottawa, Canada. Click here to access the paper online.
  7. R. V. Sampangi, S. Dey, S. R. Urs and S. Sampalli, “IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks”, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012, Vol. 86, pp.482-494. Click here to access the paper online.
  8. R. V. Sampangi, S. R. Urs and S. Sampalli, “A Novel Reliability Scheme Employing Multiple Sink Nodes for Wireless Body Area Networks”,Proceedings of the 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA 2011), pp. 162-167, September 2011, Langkawi, Malaysia. Click here to access the paper online.
  9. R. V. Sampangi, S. Rath and W. Lijuan, “Knowledge Management in Inter-Societal Academic R&D”, Proceedings of the International Conference of Engineering and Information Management (ICEIM) 2011, Chengdu, China, April 2011. Click here to access the paper online.
  10. R. V. Sampangi, S. Dey and V. N. Viswanath, “The Sneeze Algorithm: A Social Network and Biomimetic Approach for Intrusion Detection in Wireless Networks”, Proceedings of the 2010 IEEE International Workshop on Business Applications of Social Network Analysis (BASNA 2010), pp. 1-5, December 2010, Bangalore, India. Click here to access the paper online.
  11. V. S. Raghav, W. Ritter, N. V. Vighnesh, H. C. A. Ray, N. K. Rao, N. Shilpa, R. Sathyendhranath, B. A. S. Kumar, “Mysore – A Framework and an Audit of a Knowledge City”, Proceedings of the Third Knowledge City World Summit, Melbourne, Australia, November 2010.
  12. R. V. Sampangi, V. N. Viswanath and H. C. A. Ray, “Reaching the Unreached: A Study on Mobile Learning in India”, Proceedings of the 5th International Conference of E-Learning (ICEL) 2010, University Sains Malaysia, Penang, Malaysia, July 2010. Click here for the proceedings.
Workshop and Other Minimally Referreed Articles
  1. M. Rahman, R. V. Sampangi and S. Sampalli, “Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems,” 2015 IEEE 12th Consumer Communications and Networking Conference (CCNC): CCNC 2015 Workshops – IEEE CCAN – CCNC 2015 Workshops.
  2. R. V. Sampangi, and K. Hawkey, “(Can’t) Lie to ME: Using Micro Expressions for User Authentication,” Who are you?! Adventures in Authentication: WAY Workshop, Symposium On Usable Privacy and Security (SOUPS) 2014.
  3. J. Narayanaswamy, R. V. Sampangi, M. Rahman, and S. Sampalli, “Integrity as a Part of Encryption,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  4. J. Narayanaswamy, R. V. Sampangi, M. Rahman, and S. Sampalli, “Generation of Dynamic Key Length for the Block Cipher,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  5. J. Narayanaswamy, M. Rahman, R. V. Sampangi, and S. Sampalli, “Dynamic Random Key Generator for Stream Cipher,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  6. J. Narayanaswamy, M. Rahman, R. V. Sampangi, and S. Sampalli, “Bandwidth Efficient Data Transmission,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  7. A. S. Sran, R. V. Sampangi and S. Sampalli, “A light weight Authentication scheme for RFID through dynamic generation of keys,” Dalhousie Computer Science In-House Conference (DCSI) 2012. Click here to access the paper online.
Other Articles
  1. R. V. Sampangi and J. McSweeny, “A Balancing Act: The realities of graduate school,” Focus (Summer 2013), published by the Centre for Learning and Teaching, Dalhousie University, August 2013.
Presentations
  1. R. V. Sampangi, S. Sampalli, “A Context-specific Dynamically Re-configurable Security Framework,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
    This presentation was recognized as the “Best Presentation” at DCSI 2015.
  2. R. V. Sampangi, D. Reilly, “Context-Dependent Security using Sensors and User Behaviour,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
  3. S. S. Arora, R. V. Sampangi. D. Reilly, “Brushing and Linking Paper Documents with Mobile Devices,” Dalhousie Computer Science In-House Conference (DCSI) 2015, 30 September – 2 October, 2015.
  4. R. V. Sampangi, “Creating Effective Presentations,” DCSI 2015 Special Sessions, Faculty of Computer Science, Dalhousie University, 16 September 2015.
  5. J. M. McSweeny, J. Augusto, and R. V. Sampangi, “Elements of the Certificate in University Teaching and Learning (CUTL),” Dalhousie TA Day 2015, Centre for Learning and Teaching (CLT), Dalhousie University, 15 September 2015.
  6. R. V. Sampangi, “Plagiarism: Don’t Do It,” In-class Presentation (Course: Network Security), Faculty of Computer Science, Dalhousie University, March 2014.
  7. R. V. Sampangi, “Research: Learning from Fools and from Sages,” Invited Presentation on Research in Everyday Life, MYRA School of Business, Mysore, India, January 2014.
  8. M. Rahman, R. V. Sampangi and S. Sampalli, “Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems,” Dalhousie Computer Science In-House Conference (DCSI) 2013.
  9. R. V. Sampangi, “Research and Experiences at Graduate School,” Invited Presentation, International School of Information Management, University of Mysore, Mysore, India, April 2013.
  10. R. V. Sampangi, “Introduction to Radio Frequency Identification (RFID),” Sessional Instructor Development Workshop, Centre for Learning and Teaching, Dalhousie University, July 2012.
  11. M. Alabdulhafith, R. V. Sampangi and S. Sampalli, “Wireless Technology in Health Care,” Health Informatics Seminar, Faculty of Medicine, Dalhousie University, Halifax, NS, February 2012.
Juried / Curated Art Installations and Competitions
  1. R. V. Sampangi. (2014) “Tiger Park: A Social Parking Application,” Dal App Challenge 2014, Dalhousie University, Halifax, NS.
    This entry was placed 3rd in the App challenge.
  2. D. Reilly, M. Tawakol, S. Mahajan, M. Alnusayri, K. Hawkey, B. MacKay, J. Patel, R. V. Sampangi, S. Michels et al. (2013) “Operation:Citadel” (curated exhibit). Nocturne:Art at Night festival, Halifax NS. Click here for more information.
  3. S. Maldonado, R. V. Sampangi. (2013) “CS Scale,” Dal App Challenge 2013, Dalhousie University, Halifax, NS.