Ashok Kumar Das

Ashok Kumar Das
International Institute of Information Technology, Hyderabad | IIIT · Center for Security, Theory and Algorithmic Research

PhD (Computer Science and Engineering) IIT Kharagpur

About

312
Publications
69,378
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,299
Citations
Introduction
Dr. Ashok Kumar Das is currently working as an Associate Professor in the Center for Security, Theory and Algorithmic Research (Department of Computer Science and Engineering) of the International Institute of Information Technology (IIIT), Hyderabad 500 032, India. He received his Ph.D. degree in Computer Science and Engineering, the M.Tech. degree in Computer Science and Data Processing, and the M.Sc. in Mathematics (Minor: Computer Science), all from Indian Institute of Technology ( IIT) Kharagpur, India. His research interests include cryptography and network security. He has authored over 195 papers in international journals and conferences including 170 reputed journal papers (including IEEE Transactions). He is a Senior Member of the IEEE.
Additional affiliations
May 2022 - June 2022
Old Dominion University
Position
  • Visiting Faculty
January 2017 - present
International Institute of Information Technology, Hyderabad, India
Position
  • Professor (Associate)
June 2010 - December 2016
International Institute of Information Technology, Hyderabad, India
Position
  • Professor (Assistant)
Education
January 2004 - June 2008
Indian Institute of Technology Kharagpur
Field of study
  • Computer Science and Engineering
July 1998 - January 2000
Indian Institute of Technology Kharagpur
Field of study
  • Computer Science
July 1996 - June 1998
Indian Institute of Technology Kharagpur
Field of study
  • Mathematics (Minor: Computer Science)

Publications

Publications (312)
Article
Full-text available
With rapid advancements in the technology, almost all the devices around are becoming smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added to the network, it is important to verify the authenticity of the device before allowing it to communicate with the network. Hence, access control is a crucial security me...
Article
Parallel computing of hash functions along with the security requirements have great advantage in order to reduce the time consumption and overhead of the CPU. In this article, a keyed hash function based on farfalle construction and chaotic neural networks (CNNs) is proposed, which generates a hash value with arbitrary (defined by user) length (eg...
Article
Full-text available
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on int...
Chapter
Emerging 5G/6G communication and next‐generation Internet (NGI) technologies demand proper administration and control of an ultra large‐scale dynamic network to provide high‐speed ubiquitous networked‐resource accessing while assisting higher channel bandwidth. The conventional static network infrastructure‐based solutions provide only manual super...
Article
Dynamic charging is a potential technology that would enable electric vehicles to be charged while they are in motion. Significant security and privacy concerns, on the other hand, arise as a result of communications between electric vehicles and a variety of dynamic charging system entities occurring over a public channel. Numerous authentication...
Article
The cyber physical systems integrate the sensing, computation, control and networking processes into physical objects and infrastructure, which are connected through the Internet to execute a common task. Cyber physical systems can be applied in various applications, like healthcare, transportation, industrial production, environment and sustainabi...
Article
Full-text available
The primary objective of postquantum cryptography (also known as quantum‐resistant cryptography) is to develop the cryptographic systems that need to be robust against both quantum and classical computers, and can also interoperate with the existing communications protocols and networks. In an Internet of Things (IoT) environment, the communicated...
Article
The Internet of Medical Things (IoMT) is a kind of communication environment, which deals with communication that occurs through the Internet of Things (IoT)‐enabled smart medical (healthcare) devices. The potential security threats of IoMT affect the confidentiality, integrity, authenticity and availability of its data and the associated resources...
Article
Full-text available
Agricultural industry is one of the most vital industries that has a major contribution to the economy due to its share in the Gross Domestic Product (GDP) and as a source of employment. The past few decades have seen immense change in the operation of agricultural sector with the introduction of precision farming in conjunction with Inter-net of T...
Article
Full-text available
Sustainable smart healthcare applications are those in which health services can be provided to remotely located patients through the Internet without placing extra burden on environmental resources. They should be operated with minimum power consumption using biodegradable, recyclable, and environmentally friendly healthcare equipment and products...
Article
Full-text available
The information system of healthcare operates through various frameworks, like wireless body area network, telecare medical information system, and mobile or electronic healthcare. All these systems need to maintain the personal health records (PHRs) for various users (ie, patients, doctors, and nurses). In such systems, we need to process and stor...
Chapter
Smart transportation or Internet of Vehicles (IoV)-enabled transportation extends the vehicle-to-vehicle (V2V) communication network. Smart transportation is a real-time application that helps enhance driving aids with the help of vehicle’s Artificial Intelligence (AI), awareness of other vehicles, and their actions giving out the best on-road expe...
Article
The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, facilitating to connect healthcare information technology system via the Internet. It is also called IoT in healthcare, facilitating secure communication of remote healthcare devices over the Internet for qu...
Article
Machine learning (ML) is a subset of Artificial Intelligence (AI), which focuses on the implementation of some systems that can learn from the historical data, identify patterns and make logical decisions with little to no human interventions. Cyber security is the practice of protecting digital systems, such as computers, servers, mobile devices,...
Article
The rapid development of smartphone technology and the Internet services in mobile devices facilitates easy access to online social networking (OSN) sites anytime, anywhere. At the same time, this allures the adversaries to exploit the OSNs as a soft target for easy execution of various attacks that can quickly spread to a large number of users. In...
Article
Healthcare service providers store the patients’ electronic medical records in the cloud in order to provide high quality healthcare services. Patients’ sensitive data is typically encrypted before storing in the cloud. However, it gives rise to a new challenge, namely access control over encrypted data. Attribute-Based Encryption (ABE) is a promis...
Article
Vehicular ad-hoc networks(VANETs) can support vehicle-to-vehicle(V2V) and vehicle-to-infrastructure(V2I) communications to realize connected vehicle. In VANETs, secure communication must be ensured, as otherwise it can lead to traffic accidents and human injuries. Recently, many studies on V2I authentication have been conducted to guarantee the sec...
Article
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and generally considered as an assurance anchor of resource inhibited device. Essentially, the function is based on the cryptographic approach, where a key is created and utilized such that it cannot be cloned. More specifically, it is an arbitrary function which map...
Article
Full-text available
The recent surge in development of smart homes and smart cities canbe observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who...
Article
The Internet of Medical Things (IoMT) is a unification of smart healthcare devices, tools, and software, which connect various patients and other users to the healthcare information system through the networking technology. It further reduces unnecessary hospital visits and the burden on healthcare systems by connecting the patients to their health...
Article
In current situation, Coronavirus Disease-2019 (COVID-19) becomes a very serious health concern to the human life throughout the world. The Internet of Medical Things(IoMT) allows to deploy several wearable Internet of Things(IoT) enabled smart devices in a patient's body. The deployed smart devices should then securely communicate to nearby mobile...
Article
Crowdsourcing is a practice of using collective intelligence of a group in order to achieve a common goal to solve complex problems in an innovative way. It involves obtaining information and opinions from a group of participants who submit their data (i.e., solutions) via the Internet using some applications. The application domains, where crowdso...
Article
Web of Things (WoT) extends the Internet of Things (IoT) paradigm to facilitate communications among smart things/devices and web-based applications. In other words, WoT systems generally provide a web interface for the monitoring and controlling of smart devices over the web, for example in applications such as home automation, intelligent transpo...
Article
Full-text available
The Artificial Intelligence of Things (AIoT) is the amalgamation of Artificial Intelligence (AI) methods and the Internet of Things (IoT) infrastructure, which are deployed there to improve the overall performance of the system. AIoT can be deployed to achieve more efficient IoT operations; thereby can improve human-machine interactions and provide...
Article
In this article, we propose an efficient Bloom filter and fuzzy extractor based user authentication technique, which is significant for an Internet of Things (IoT)-enabled multi-hop Wireless Sensor Networks (IoT-WSNs). The novelty of the proposed authentication technique is that it prevents fraudulent querying data delivery at the starting phase (i...
Article
Electric vehicles have emerged as the future of transport worldwide with the rising need for greener and energy-efficient transportation solutions. This remarkable shift delegated a wide variety of protocols for reliable, scalable and secure communications in the electric vehicle transportation system. With this vision in mind, security researchers...
Article
The Internet of things (IoT) is a framework of various services and smart technologies that mutually communicate information between mobile devices and users or just between devices with the help of Internet connectivity. The dramatic progression of IoT helps numerous network applications and communication technologies to introduce state-of-the-art...
Article
Internet of Drones (IoD)-enabled aerial computing can effectively reduce communication delay and energy consumption as compared to conventional computing environments. It seems very useful for its deployment in disaster areas, emergency relief and battlefield communications. However, different types of attacks, such as replay, man-in-the-middle, imp...
Article
This article proposes a new blockchain-envisioned key management protocol for Artificial Intelligence(AI)-enabled Industrial Cyber-Physical Systems (ICPS). The designed key management protocol enables key establishment among the Internet of Things(IoT)-enabled smart devices and their respective gateway nodes. The blocks partially constructed with s...
Article
Industry 5.0 is the automation, digitization and data communication of industrial procedure that comprises Industrial Cyber-Physical Systems (I-CPS), Industrial Internet of Things (IIoT) and Artificial Intelligence (AI). In I-CPS enabled healthcare ecosystem, intelligent wearable devices have been extensively employed to sense body information and...
Article
In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart devices and drones can be deployed to monitor an agricultural environment. The drones can be further utilized to collect the data from smart devices and send to the Ground Station Server (GSS). However, insecure communication among the smart devices, drones and th...
Article
Full-text available
A blockchain-based smart farming technology provides the agricultural data to the farmers and other users associated with smart farming on a single integrated platform. Moreover, persistence and auditability of stored data in blocks into the blockchain provide the confidence of using the correct data when needed later and adds transparency, anonymi...
Article
Software‐defined networking (SDN) is a programmable architecture for networking domain in which the security is provided by devising the network policies with the help of the network administrator. This is very cumbersome for the administrator to handle different attacks at various planes in SDN architecture. Blockchain can be used to prevent vario...
Article
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are particularly attracting attention from industry communities because of the intelligent transportation systems of smart city technologies. This study proposes an authentication and key agreement protocol for vehicle-to-vehicle(V2V) communication of IoV. Through V2V commu...
Article
In the Internet of Vehicles (IoV), numerous potential applications have come up with the use of the Internet of Things (IoT)-empowered smart devices. In IoV, vehicles, roads, street signs and traffic lights can accordingly adjust to changing conditions in order to assist drivers, and also to improve safety, ease congestion and pollution reduction....
Article
Full-text available
Due to wide-spread use of the Information and Communications Technology (ICT) and Internet of Things (IoT) enabled smart devices, called unmanned aerial vehicles (UAVs) (popularly known as drones), a lot of potential applications of Internet of Drones (IoD) are available ranging from the military to civilian applications. Access control mechanism i...
Article
Full-text available
Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end d...
Article
Emerging next-generation Internet yields proper administration of a wide-ranging dynamic network to assist rapid ubiquitous resource accessibility, whilst providing higher channel bandwidth. Since its inception, the traditional static network infrastructure-based solutions involve manual configuration and proprietary controls of networked devices....
Article
The Internet of Things (IoT) comprises physical/virtual networked objects that collect and exchange data with each other via the public Internet. As this exchange often takes place over public networks, many security attacks in an IoT environment are possible. First, we briefly review the security issues in the IoT environment. Next, we focus on re...
Article
Full-text available
This article introduces a new consortium blockchain‐enabled access control scheme in edge computing based generic Internet of Things environment (called CBACS‐EIoT), where the mutual authentication among the IoT smart devices and the gateway node(s), and also among the gateway node(s) and respective edge server(s) occur. In addition, key management...
Article
A substantial number of authentication protocols are designed to safeguard vehicular ad-hoc network (VANET) communication from potential attacks; however, they experienced an inability to provide a balance between lightweight and security. Existing security and privacy-preserving based authentication protocols in vehicular networks mostly rely on t...
Article
Coronavirus 2019, called COVID-19, is a transmissible disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It earlier impacted the citizens of China alone. However, it has rapidly spread all over the world. The COVID-19 supply chain system aims to facilitate access to several critical items, such as personal protective eq...
Article
Full-text available
In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that has numerous applications including smart city, smart home and intelligent transportation system. The information sensed by several IoT smart devices can be security stored at the (cloud) servers. An external user, being a client, can access the serv...
Article
Full-text available
Smart home is intended to be able to enhance home automation systems and achieves goals such as reducing operational costs and increasing comfort while providing security to mobile users. However, an attacker may attempt security attacks in smart home environments because he/she can inject, insert, intercept, delete, and modify transmitted messages...
Article
Full-text available
Software-defined networking (SDN) is an agile, modern networking approach that facilitates innovations in the networking paradigm. The abstracted and centralized network operating system facilitates the network management and reduces operational expenditure (OPEX). The open nature and simplicity of the data-forwarding plane dramatically reduces cap...
Article
Full-text available
User authentication is a promising security solution in which an external user having his/her mobile device can securely access the real‐time information directly from the deployed smart devices in an Internet of Things‐enabled intelligent precision agricultural environment. To achieve this goal, we present a new signature‐based three factor user a...
Article
With the tremendous growth of Information and Communications Technology (ICT), Cyber Physical Systems (CPS) have opened the door for many potential applications ranging from smart grids and smart cities to transportation, retail, public safety and networking, healthcare and industrial manufacturing. However, due to communication via public channel...
Article
Full-text available
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data collection in many industrial environments. Industrial environments are usually huge. The distances between the devices located in them can be vast; in this case, the Industrial Internet of Things (IIoT) leads to greater productivity and efficiency of industries. Furthe...
Article
Recent advances in Low Power Wide Area Network (LPWAN) are expected to augment the already prodigious proliferation of Industrial Internet of Things (IIoT). However, this unrepresented growth is tinged by the uncertainty of possible challenges in security and privacy. In this work, we propose a novel blockchain-envisioned fine grained user access c...
Article
Full-text available
Internet of Things (IoT) is one of the fastest-growing technologies. With the deployment of massive and faster mobile networks, almost every daily-use item is connected to the Internet. IoT-enabled industrial multimedia environment is used for the collection and analysis of different types of multimedia data (i.e., images, videos, audios, etc.). Th...
Article
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in delivering the packages, and real-time object detection and tracking with minimal human interference. However, there may be several security threats in such an environment, for instance, a malicious user can spy unauthorized drones, transfer malicious packages, or e...
Article
Full-text available
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literat...
Article
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet-connected entities in real time. The communications among these entities (e.g. vehicles, pedestrians, fleet management systems, and road-side infrastructure) take place v...
Article
Surveillance drones, called as unmanned aerial vehicles (UAV), are aircrafts that are utilized to collect video recordings, still images, or live video of the targets, such as vehicles, people or specific areas. Particularly in battlefield surveillance, there is high possibility of eavesdropping, inserting, modifying or deleting the messages during...
Chapter
Banerjee, SoumyaOdelu, VangaDas, Ashok KumarChattopadhyay, SamiranGiri, DebasisIn recent years, security and data privacy in Wireless Sensor Networks (WSNs) have gained great thrust. Several anonymity-preserving user authentication and key establishment mechanisms for WSNs with single base station have been suggested in the literature. However, som...
Chapter
Banerjee, SoumyaOdelu, VangaDas, Ashok KumarChattopadhyay, SamiranGiri, DebasisWith the rapid growth of wireless technology, Internet of Things (IoT) became very popular in both industrial as well as consumer product domains. While there is a lot of available platforms and technologies for IoT, the access control issue is often overlooked in the Io...