level-one heading

Why Kolabtree
Getting started is quick and easy. No upfront fees
It’s free to request a service and invite bids from experts
Discuss requirements with the expert in detail before accepting statement of work from Kolabtree
Collaborate with the expert directly to get your work done the right way
Fund project when you hire the expert, but approve the deliverables only once work is done
Want to hire this expert for a project? Request a quote for free.
Profile Details
Create Project
★★★★★
☆☆☆☆☆
USD 40 /hr
Hire Dr. Vinod K.
India
USD 40 /hr

PhD | expert in practical security and wireless networking technologies

Profile Summary
Subject Matter Expertise
Services
Writing Technical Writing, General Proofreading & Editing
Research Scientific and Technical Research
Product Development Concept Development, Prototyping
Work Experience

Research Fellow

University of Surrey

August 2023 - September 2025

Research Fellow

University of Surrey

August 2023 - September 2025

Software Lead

Inria Centre de Recherche Sophia Antipolis Méditerranée

June 2022 - November 2022

Education

PhD (Industrial Engineering and Operational Research)

Indian Institute of Technology Bombay

January 2018 - November 2022

M. Tech (Electrical)

Indian Institute of Technology Bombay

June 1999 - January 2001

Certifications
  • Certification details not provided.
Publications
CONFERENCE POSTER
End-point authentication method using gyroscope-based shared secret for inter-smartphone direct communication title = {End-point authentication method using gyroscope-based shared secret for inter-smartphone direct communication}, abstract = {<p>The smartphone connectivity options, such as Bluetooth, generate the root of trust upon first connection or pairing. The subsequent connections use the initial root-of-trust without validation. These Trust-On-First-Usage or TOFU models are vulnerable to Man-in-the-Middle (MiTM) or impersonation attacks after pairing. Moreover, root-of-trust based on certificates or QR code-like mechanisms needs a third-party server, which may not be accessible for justifiable reasons. We propose an endpoint validation method that decouples the successive authentications from pairing by shifting the root of trust to a locally agreed shared secret between devices, e.g., via a sensor-based method. The legacy pairing provides the device discovery. Our method uses this shared secret as a Pre-Shared Key (PSK) to perform a Transport Layer Security (TLS) handshake in PSK-Only mode between intended devices. The TLS-PSK adds a minimal overhead (1 RTT) while delivering the superior benefits of the TLS protocol. We demonstrated the method on an Android smartphone over a Bluetooth connection. </p>}, address = {}, author = {Khandkar, Vinod Sarjerao}, keywords = {snoop resilient protocols;Bluetooth;Transport Layer Security}, language = {eng}, subject = {Cryptography}, booktitle = {Next Generation Networking, Multi-Service Networks workshop}, number = {}, address = {Abingdon, United Kingdom}, year = {20250703–20250704},. Next Generation Networking, Multi-Service Networks workshop.
Talk : FFT-assisted Secret Generation via Gyroscope Measurements on Smartphones title = {Talk : FFT-assisted Secret Generation via Gyroscope Measurements on Smartphones}, abstract = {<p>The disclosure of domestic abuse or help needed is challenging for victims due to factors such as intimidation and fear of being caught. Domestic abuse is especially pernicious as the abuser can be a powerful adversary who may have complete control over all technological means of communication within the premises. We have developed a novel sensor-based method to unobtrusively create a shared secret between the victim and the supportive friend without exchanging data over the network. The generated secret shows entropy similar to some methods used in OpenSSL.</p>}, address = {}, author = {Khandkar, Vinod Sarjerao and Sastry, Nishanth Ramakrishna and Toreini, Ehsan}, keywords = {secret generation}, language = {eng}, booktitle = {CyberMi2 Research Day}, number = {2nd}, address = {Birmingham, England}, year = {20240524},. CyberMi2 Research Day.
OTHER
Extended TLS: Masking Server Host Identity on the Internet Using Encrypted TLS Handshake title = {Extended TLS: Masking Server Host Identity on the Internet Using Encrypted TLS Handshake}, abstract = {<p>The Internet is a common platform for sharing information. It is required to preserve every user’s privacy and security of information on the Internet. While data security is primarily taken care of by the TLS protocol and broader adaptation of HTTPS, FTPS, and SMPTS protocol, some fields of TLS expose the type of activity a user is performing, thus violating user privacy. One such protocol information is Server Name Indication (SNI) in the TLS ClinetHello message that goes in plaintext. Anyone intercepting the message thus identifies the service host type. We present a method named Extended TLS (ETLS) to mask the server host identity by encrypting the SNI without requiring any change in the existing protocols. In ETLS, a connection is established over two handshakes - the</p><p>first handshake establishes a secure channel without sharing SNI information, and the second handshake shares the encrypted SNI. ETLS requires no modification in the already proven TLS encryption mechanism and retains all security benefits of the existing secure channel establishment. We demonstrate the feasibility of ETLS over live Internet with scripts that implement our methodology. Using a customized client-server and a commercial traffic shaper, we also demonstrated that the host identity is not exposed under ETLS, thus demonstrating its</p><p>privacy-preserving property.</p>}, address = {}, author = {Khandkar, Vinod Sarjerao and Hanawal, Manjesh K.}, doi = {10.1109/SPCOM55316.2022.9840773}, isbn = {9781665482509}, issn = {2474-915X}, journal = {2022 International Conference on Signal Processing and Communications}, keywords = {snoop resilient protocols}, language = {eng}, pages = {5}, publisher = {IEEE}, series = {International Conference on Signal Processing and Communications SPCOM}, year = {2022}, . 2022 International Conference on Signal Processing and Communications.
Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool title = {Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool}, abstract = {The debate on "Net-neutrality" and events pointing towards its possible violations have led to the development of tools to detect deliberate traffic discrimination on the Internet. Given the complex nature of the Internet, neutrality violations are not easy to detect, and tools developed so far suffer from various limitations. In this paper, we study many challenges in developing a tool for detecting such violations. We take the validation as an application of our study of challenges in TD detection systems. As a case study, we focus on the Wehe tool and demonstrate the categorized analysis or validation of traffic differentiation detection tools. The Wehe tool is one of the most recent tools to detect neutrality violations. Despite the Wehe tool's vast utility and possible influences over policy decisions, its mechanisms are not yet fully validated by researchers other than original tool developers. Our validation uses the Wehe App, a clientserver setup mimicking the Wehe tool's end-to-end behavior and theoretical arguments. We validated the Wehe app for its methodology, traffic discrimination detection, and operational environments.}, author = {Khandkar, Vinod S. and Hanawal, Manjesh K.}, doi = {10.1109/COMSNETS51098.2021.9352826}, isbn = {9781728191270}, issn = {2155-2487}, journal = {2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)}, keywords = {Internet;Net neutrality;Network neutrality;Tools;traffic differentiation;validation}, language = {eng}, pages = {5}, publisher = {IEEE}, year = {2021}, . 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS).
CONFERENCE ABSTRACT
Vinod S. Khandkar and Manjesh K. Hanawal(2020). Detection of Traffic Discrimination in the Internet . 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). {IEEE}