Debasish Jena

Debasish Jena
International Institute of Information Technology | IIIT Bhubaneswar · Department of Computer Science and Engineering

About

101
Publications
233,678
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,222
Citations

Publications

Publications (101)
Article
In the last decade, internet of things (IoT) emerged as one of the most promising fields of research. The services provided by the IoT have come as a big relief to human life due to the smartness and real-time monitoring without human intervention. IoT applications are widely used as it provides a high level of comfort, automation of the system, an...
Article
Full-text available
The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities a...
Chapter
Mohapatra, NivaSingh, ShreyanshiKumar Mohanta, BhabenduJena, DebasishPrediction of the automotive accident severity plays a very crucial role in the smart transportation system. The main motive behind our research is to find out the specific features which could affect the vehicle accident severity. In this paper, some of the classification models,...
Article
Smart city has come a long way since the development of emerging technology like Information and communications technology (ICT), Internet of Things (IoT), Machine Learning (ML), Block chain and Artificial Intelligence. The Intelligent Transportation System (ITS) is an important application in a rapidly growing smart city. Prediction of the automot...
Article
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation cente...
Article
Full-text available
The present research is inclined to study the relationship between two important forms of “Contract” in employment relations, psychological contract and knowledge contract, and job outcomes, i.e. employee retention and employee satisfaction. For this purpose, the data were collected from 268 employees working in the IT sector from North India. The...
Chapter
Full-text available
The Internet of things (IoT) is widely used to implement different applications like smart home, smart health care, smart city, and smart farming system. The development of large smart devices/sensors enables smart technologies making it possible to implement the smart application in real time. The IoT system has security challenges like authentica...
Chapter
The Internet of Things (IoT) is growing rapidly in the last decade. The number of interconnected smart devices has already crossed the total world’s population. The data generated by these devices are huge. The IoT is used in different applications like smart monitoring, healthcare system, smart home, where sensitive information is shared among use...
Chapter
As trust-based data and message security is reliable and efficient in the case of resource and power constraints networks, it finds a new field of research for researchers in wireless sensor networks. Till now, a lot of researches have been carried out to set up trust management systems in the above network. Probability distribution functions have...
Chapter
Electronic health record (EHR) stores not only the patient’s health-related data but also the sensitive individual information. Consequently, data security and access privacy are the greatest concern of EHR applications while sharing the data through the cloud. Ciphertext policy attribute-based encryption (CP-ABE) is one of the popular one-to-many...
Article
Full-text available
In the contemporary dynamic business context (characterized by stiff competition, high uncertainty, growth of global as well as virtual organizations, etc.), setting up systems for recognizing and engaging employees which need constant endeavor from present-day organizations. Hence, organizations are actively exploring and adopting novel initiative...
Conference Paper
Full-text available
Nowadays data is collected without any specific purpose, every activity of a machine or a human being is recorded, If needed in the future then the data will be analyzed. But here the question of trust arises as the data will go through many phases for the analysis by different parties. The data may contain some sensitive or private information tha...
Article
Cloud storage is gaining popularity to store and share files. To secure the files, cloud storage providers supply client interfaces with the facility to encrypt the files and upload them into the cloud. When client-side encryption is done, the onus of key management lies with the cloud user. Public key proxy re-encryption mechanisms can be used to...
Article
In the last decade internet of things (IoT) technology becomes useful in almost every application fields. IoT-cloud-based architecture is insufficient to handle the requirement of IoT like latency, bandwidth, and volume of data. Fog computing can address those problems by providing processing and services to end-users at the edge network. In centra...
Conference Paper
Full-text available
VANET, a heterogeneous interconnection of smart vehicles, is a great platform to develop a smart transportation system. VANET comprises the various types of communication like Vehicle to Vehicle, Vehicle to Infrastructure based on the ad-hoc network. Resource constraints (like rechargeable power source, frequency spectrum, channels etc.), safety ma...
Conference Paper
Full-text available
Computing and communication are getting increasingly ubiquitous with the inclusion of sophisticated devices like electric vehicles, smart phones and other house hold appliances. Due to the constant evolution in Internet of Things (IoT), the process of collaboration of these devices at a mass scale in order to provide improved and better services to...
Conference Paper
Full-text available
Cyber-physical Systems (CPS) are reshaping the way of interaction with the physical world. Moreover, the true potential of CPS will be realized when a decentralized approach will be taken into account. Blockchain is an up-and-coming technology which can establish trust in CPS, where participants do not trust each other. Blockchain applications elim...
Article
Full-text available
Internet of Things (IoT) is one of the most rapidly used technologies in the last decade in various applications. The smart things are connected in wireless or wired for communication, processing, computing, and monitoring different real-time scenarios. The things are heterogeneous and have low memory, less processing power. The implementation of t...
Conference Paper
Full-text available
In today’s world, IoT technology is used vastly in different services. This Document is about IoT commercial Drone uses for Online Shopping.drone has advanced technology, camera and GPS to find out the destination point easily. Drones have been used for different kinds of applications like Social networking, Military Purpose, Medical or healthcare...
Article
In conventional cloud computing technology, cloud resources are provided centrally by massive data centres. Therefore, edge computing technology has been proposed, where cloud services can be extended to the edge of the network to decrease a network congestion. The management of the resources is a major challenge before the researcher. Therefore, i...
Article
In the last decade internet of things (IoT) technology becomes useful in almost every application fields. IoT-cloud-based architecture is insufficient to handle the requirement of IoT like latency, bandwidth, and volume of data. Fog computing can address those problems by providing processing and services to end-users at the edge network. In centra...
Conference Paper
Full-text available
Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...
Conference Paper
Full-text available
Low maintenance of the roads is one of the extensive cause of increasing road accidents and vehicle breakage. Mostly roads contain potholes, wreckage or detritus which is best to be bypassed however if not sometimes lead to severe road causalities. Many car or bus accident happens over a wrecked bridge, as it slips and overturns. To avoid this kind...
Conference Paper
Full-text available
Blockchain is the backbone technology behind crypto-currency and Bitcoin. By concept, Blockchain is a distributed database where transactions are recorded in an incorruptible and non-modifiable manner. Currently, Blockchain technology is envisioned as a powerful framework for open-access networks, decentralized information processing and sharing sy...
Conference Paper
Full-text available
The evolution of IOT that began with computers has now developed into an ecosystem. This IOT ecosystem consists of a large number of different types of devices embedded with sensors and technology, which makes them smart enough to interact within themselves. With IOT omnipresent, the challenge would be how to ensure only authorized access to the re...
Article
Blockchain Technology has received a lot of attention from both industry and academia due to its decentralized, persistency, anonymity and auditability properties. In this survey, use of Blockchain technology in wide applications area and its implementation challenges have been done. A rigorous search for journal/research article related to Blockch...
Conference Paper
Full-text available
In the era of the Internet of Things(IoT) smart devices are connected with wire or wireless way. The IoT devices are capable of sensing the environment and has the ability to transmit that information to the next level. The application area of IoT is Smart city, Smart transportation, Healthcare sector, Agriculture, Monitoring environment. Each of t...
Conference Paper
Full-text available
Internet of Things (IoT) is excessively influencing our day to day lives in many domains be it small smart device like a smart-watch or large industrial enterprises. Thus, a number of different IoT based applications are developed and deployed for these sectors. An IoT system enables devices to communicate among each other without human assistance/...
Conference Paper
Full-text available
Internet of Things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application improves the human living standard and also makes life easy to access and monitoring the things in real time. Though there exist some se...
Conference Paper
Full-text available
Fog computing is decentralized scalable architecture where the fog nodes can join and leave the network arbitrary way. The IoT devices connected to the fog network can also have the connectivity issue. As all the fog nodes and IoT devices are connected in a distributed way it is hard to build a secure infrastructure in the absence of a trusted cent...
Conference Paper
Full-text available
Over the past decade, a lot of evolution has happened in the field of security specifically authentication system. The most commonly used authentication service we use now is OAuth 2.0 based authentication. In this method, we are dependent on a 3rd party authentication service provider to which we need to trust. Though this model is used extensivel...
Conference Paper
Full-text available
The Internet of Things (loT) is advantageous in many areas such as people, society, and industries as it interconnects a different kind of devices and information entities hence it originates a huge number of value-added services. Typically, IoT environments are comprised of many diversified devices but with limited resource. To establish an end-to...
Conference Paper
Full-text available
The rising thought of the Internet of Things (IoT) is quickly discovering its way all through our modern life, aiming to enhance the quality of life by associating numerous smart devices, technologies, and applications. Overall, the IoT would allow for the automation of everything around us. Currently researchers have found that there is a potentia...
Conference Paper
Full-text available
—In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. The blockchain technology overshadows regulatory problem and technical challenges. A smart contract is a set of programs which are self-verifying ,self-executing and tamp...
Conference Paper
Side-channel attacks, which exploit deficiencies in the implementations of theoretically secure systems, have been known to take a variety of forms on the mobile platforms. In this work, we present Magneto, a magnetic field based app classification mechanism. Magneto captures the Hall effect due to energy consumption by different components in a sm...
Article
Full-text available
A field experiment was conducted for three consecutive seasons during 2013 and 2014 in order to study the effect of fly ash with lime and gypsum with and without FYM on heavy metal content of maize as well as its yield in an. The experiment was laid out in a randomized block design (RBD) with eight treatments namely, T-control (received no amendmen...
Conference Paper
Full-text available
The Internet of things(IoT) has brought the vision of the smarter world into reality and including healthcare it has a many application domains. The convergence of IOT-cloud can play a significant role in the smart healthcare by offering better insight of healthcare content to support affordable and quality patient care. In this paper, we proposed...
Article
Phyto-proteins of Mangifera indica L., Aegle marmelos (L.) Corrêa, Volvariella volvacea (Paddy straw mushroom), Carica papaya L., Ocimum sanctum L. and Aloe vera (L.) Burm. f. extracted in water and PBS under cold percolation are precipitated in 50% acetone and quantified after reconstitution. PBS suspension with higher protein is assayed for throm...
Chapter
Image encryption is one of the most promising fields of research in the conventional scientific society. Visual cryptography is a secured encryption technique which is used to encrypt a secret image based on share generation and superimposition rather than computing. This overcomes the burden of computation but the mammoth risk of attackers is supe...
Article
Simulation studies for electric field distribution in micro structured optical fiber (MSOF) using plane wave expansion (PWE) technique is reported in this paper, where the outcomes of electric field distribution leads to beam splitting application. Here MSOF is realized by 5 x 5 air holes on silicon substrate with defect at centre. PWE method is em...
Article
Estimation of damage ratio of ion-implanted neodymium- doped yttrium vanadate (IINDYV) waveguide is thoroughly explored in this paper. In this research, waveguide is realized by the combination of two IINDYV layers separated by air. Different type of losses such as absorption, reflection, diffraction and polarisation are cogitated during the invest...
Article
A leaching study was conducted in the laboratory in order to study the effect of different amendments on transport of Ca through 14 cm soil column packed with acid soil. Sandy loam soil from a maize field was collected; air dried and packed in PVC pipe of 15 cm long and 8.6 cm diameter maintaining a bulk density of 1.5 Mg m-3. There were four soil...
Article
Full-text available
Galactogogues elicit pharmacological effects, resulting in increased prolactin concentration through interactions with dopamine receptors and thereby augmenting milk supply. Commercially available synthetic drugs induce adverse effect on the neuro-endocrine axis of lactation physiology. Their prolonged uses have caused toxicity which opens a detrim...
Article
Cow is equated to mother in the Indian tradition and her urine panacea of all diseases. Cow urine is a divine medicine and is used for treatment of diabetes, blood pressure, asthma, psoriasis, eczema, heart attack, blockage in arteries, fits, cancer, AIDS, piles, prostrate, arthritis, migraine, thyroid, ulcer, acidity, constipation, gynaecological...
Article
In 1993 Nyberg and Rupeel proposed an authenticated encryption scheme (AES) based on the DSA algorithm that reduces the computation time and communication costs for authenticated message transmission. Motivated by this, several researchers developed further AES approaches. However, when a dispute occurs between the sender and recipient, there is no...
Article
Full-text available
Vehicular ad hoc networks (VANETs) are an upcoming technology that is gaining momentum in recent years. That may be the reason that the network attracts more and more attention from both industry and academia. Due to the limited bandwidth of wireless communication medium, scalability is a major problem. Data aggregation is a solution to this. The g...
Conference Paper
Full-text available
In Vehicular adhoc networks, due to the limited bandwidth, high vehicle mobility and density of vehicles, scalability is a major problem. Data aggregation is a solution to this. The goal is to combine the information and disseminate this in larger regions. Another criteria is all the messages should be unaltered in the delivery and should be authen...
Article
Full-text available
In this paper, a secure and efficient protocol for ve-hicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic...
Article
Reliability, efficient bandwidth utilisation, consistency and authenticity are some of the required applications that are required for proper implementation of vehicular ad-hoc networks (VANETs). As vehicular Ad hoc Networks are expected to greatly influence and improve road safety as well as driving conditions, they are attracting much attention t...
Article
Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt large messages. But the key management, i.e., the key should be available at both sender and receiver before communication is the most difficult part of symmetric cryptosystem. So, to encrypt large messages, we usually take the help of bot...
Article
A wide number of Internet voting systems have been implemented over the years for voluntary and mandatory purposes with mixed results. In 2002, Wu and Sankaranarayana proposed a simple protocol for Internet voting. However, their protocol does not satisfy all properties of an ideal Internet voting protocol. In this paper, we propose an improved Int...
Conference Paper
Full-text available
In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we also defines the use of signature technique in honeypot for traffic analysis. In the end we summarizes all these a...
Conference Paper
Vehicular Adhoc Networks these days are attracting much attention as they are expected to greatly influence and improve road safety as well as driving conditions. But along with all the benefits that it offers, there is more chance of giving way to frequent and severe malicious attacks. Due to this reason much attention is being given to the securi...
Conference Paper
Full-text available
In this paper, a modified of Jena remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unse...
Conference Paper
Full-text available
Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cr...
Conference Paper
Full-text available
Internet connectivity can offer enormous advantages, however security needs to be a major consideration when planning an Internet connection. There are significant security risks associated with the Internet that often are not obvious to new (and existing) users. In particular, intruder activities as well as vulnerabilities that could assist intrud...
Article
In the past, several key agreement protocols are proposed on pre-shared password based mechanism. Due to development of communication technology, it is necessary to construct a secure end-to-end channel between clients. In this paper, an improved version of J. Kim et al proposed password-authenticated key exchange protocol has been proposed. The pr...
Conference Paper
Full-text available
Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for bi...
Conference Paper
Full-text available
Design of neuro-controller for complex dynamic systems is a big challenge faced by the researchers. In this paper we present a design of a robust neuro-controller for a dynamic system to make the system response fast with no overshoot. Here the control action decided by the controller completely depends on the value of the error at that point of ti...
Conference Paper
This work presents system identification using neural network approaches for modelling a laboratory based twin rotor multi-input multi-output system (TRMS). Here we focus on a memetic algorithm based approach for training the multilayer perceptron neural network (NN) applied to nonlinear system identification. In the proposed system identification...
Conference Paper
Hill cipher's susceptibility to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in both cryptology and linear algebra. Hill cipher requires inverse of the key matrix while decryption. In fact that not all the matrices have an inverse and therefore they will not be eligible as key matrices in the Hil...
Conference Paper
In this paper, a novel efficient remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unsec...
Conference Paper
Full-text available
Several gradient-based approaches such as back-propagation, conjugate gradient and Levenberg Marquardt (LM) methods have been developed for training the neural network (NN) based systems. Still, in some situations, like multimodal cost function, these procedures may lead to some local minima, therefore, the evolutionary algorithms (EAs) based proce...
Conference Paper
Vector control of induction motor is an efficient approach to control the speed of induction motor used for industrial drives. Although the vector control is very popular method but there lies difficulty in obtaining an accurate model of induction motor (IM) owing to the variation of induction motor parameters, such as resistance, inductance and ti...
Conference Paper
Full-text available
In this paper, we propose a novel protocol for smart card based on elliptic curve discrete logarithm problem (ECDLP). We believe that applications of smart card technology should be benefited more from advantages of public key cryptography, specifically, in initiation and maintenance of secure channel. This paper introduces a public key cryptograph...