Want to hire this expert for a project? Request a quote for free.
Profile Details
Create Project
USD 40 /hr
Hire Dr. Vinod K.
India
USD 40 /hr
PhD | expert in practical security and wireless networking technologies
Profile Summary
Subject Matter Expertise
Services
Writing
Technical Writing,
General Proofreading & Editing
Research
Scientific and Technical Research
Product Development
Concept Development,
Prototyping
Work Experience
Research Fellow
University of Surrey
August 2023 - September 2025
Research Fellow
University of Surrey
August 2023 - September 2025 ![]()
Software Lead
Inria Centre de Recherche Sophia Antipolis Méditerranée
June 2022 - November 2022
Education
PhD (Industrial Engineering and Operational Research)
Indian Institute of Technology Bombay
January 2018 - November 2022 ![]()
M. Tech (Electrical)
Indian Institute of Technology Bombay
June 1999 - January 2001 ![]()
Certifications
- Certification details not provided.
Publications
CONFERENCE PAPER
Audio-based shared secret generation method title = {Audio-based shared secret generation method}, abstract = {<p><span style="color: rgb(14, 40, 65);">Audio-based shared secret generation method</span></p>}, address = {}, author = {Khandkar, Vinod Sarjerao}, doi = {10.15126/901789}, keywords = {Symmetric key generation;Constrained environment security;Audio RIR}, language = {eng}, pages = {5}, publisher = {University of Surrey}, booktitle = {UK Research Institute in Secure Hardware and Embedded Systems (RISE) 2025 Annual Conference}, number = {}, address = {Royal Academy of Engineering, London, UK}, year = {20250911–20250911}, . UK Research Institute in Secure Hardware and Embedded Systems (RISE) 2025 Annual Conference.
Khandkar, V.S., Hanawal, M.K.(2021). Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool . 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021. p. 169-173.
Khandkar, V.S., Hanawal, M.K.(2020). Detection of Traffic Discrimination in the Internet . 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020. p. 677-679.
CONFERENCE POSTER
End-point authentication method using gyroscope-based shared secret for inter-smartphone direct communication title = {End-point authentication method using gyroscope-based shared secret for inter-smartphone direct communication}, abstract = {<p>The smartphone connectivity options, such as Bluetooth, generate the root of trust upon first connection or pairing. The subsequent connections use the initial root-of-trust without validation. These Trust-On-First-Usage or TOFU models are vulnerable to Man-in-the-Middle (MiTM) or impersonation attacks after pairing. Moreover, root-of-trust based on certificates or QR code-like mechanisms needs a third-party server, which may not be accessible for justifiable reasons. We propose an endpoint validation method that decouples the successive authentications from pairing by shifting the root of trust to a locally agreed shared secret between devices, e.g., via a sensor-based method. The legacy pairing provides the device discovery. Our method uses this shared secret as a Pre-Shared Key (PSK) to perform a Transport Layer Security (TLS) handshake in PSK-Only mode between intended devices. The TLS-PSK adds a minimal overhead (1 RTT) while delivering the superior benefits of the TLS protocol. We demonstrated the method on an Android smartphone over a Bluetooth connection. </p>}, address = {}, author = {Khandkar, Vinod Sarjerao}, keywords = {snoop resilient protocols;Bluetooth;Transport Layer Security}, language = {eng}, subject = {Cryptography}, booktitle = {Next Generation Networking, Multi-Service Networks workshop}, number = {}, address = {Abingdon, United Kingdom}, year = {20250703–20250704},. Next Generation Networking, Multi-Service Networks workshop.
Talk : FFT-assisted Secret Generation via Gyroscope Measurements on Smartphones title = {Talk : FFT-assisted Secret Generation via Gyroscope Measurements on Smartphones}, abstract = {<p>The disclosure of domestic abuse or help needed is challenging for victims due to factors such as intimidation and fear of being caught. Domestic abuse is especially pernicious as the abuser can be a powerful adversary who may have complete control over all technological means of communication within the premises. We have developed a novel sensor-based method to unobtrusively create a shared secret between the victim and the supportive friend without exchanging data over the network. The generated secret shows entropy similar to some methods used in OpenSSL.</p>}, address = {}, author = {Khandkar, Vinod Sarjerao and Sastry, Nishanth Ramakrishna and Toreini, Ehsan}, keywords = {secret generation}, language = {eng}, booktitle = {CyberMi2 Research Day}, number = {2nd}, address = {Birmingham, England}, year = {20240524},. CyberMi2 Research Day.
OTHER
CONFERENCE ABSTRACT
Vinod S. Khandkar and Manjesh K. Hanawal(2020). Detection of Traffic Discrimination in the Internet . 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). {IEEE}