Dr. B. D. Deebak

Dr. B. D. Deebak
Verified
Dr. B. D. verified their affiliation via an institutional email.
Verified
Dr. B. D. verified their affiliation via an institutional email.
  • PhD in Multimedia Communication & Security
  • Research Fellow at University of Warwick

[Top 2% Scientists 2022-2024] Information Security, Cryptography, Integrating AI with Cyber Security, IoT with 5G/6G

About

82
Publications
14,387
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,217
Citations
Introduction
I am currently working as a Research Fellow in the Cyber Security Center at the University of Warwick and collaborating with academic and cybersecurity companies, located in Northern Ireland, on research and development projects in AI-enabled cybersecurity.
Current institution
University of Warwick
Current position
  • Research Fellow
Additional affiliations
August 2022 - present
Gachon University
Position
  • Brain Pool Fellow
Description
  • Funded By the National Research Foundation of Korea
June 2015 - present
Mepco Schlenk Engineering College
Position
  • Professor (Assistant)
Description
  • Teaching, Research, Placement Coordinator and Student Counselor
July 2011 - June 2015
SASTRA University
Position
  • Research Scholar (SASTRA & TCS)
Education
July 2011 - April 2015
SASTRA University
Field of study
  • Wireless Multimedia Communication & Security
September 2007 - September 2009
Raisoni Group of Institutions
Field of study
  • Embedded System and Computing
August 2003 - May 2007
Mohamed Sathak Engineering College
Field of study
  • Information Technology

Publications

Publications (82)
Article
Technological convergence in visual sensing with industrial IoT (VSI-IoT) can bring numerous advances to large-scale crowd management systems like visual crowdsensing. VSI-IoT has significant features, including sensing, computing, analyzing, and storing, to address the issues of bearing failures, such as unplanned outages, increased downtime, and...
Article
Epidemic-prone diseases transforming the regular activities of people and health systems have become unprecedented events around the world. In the event of health emergencies like COVID-19, device-centric applications can expand communications capacities and global connectivity using technologies to meet the competitive requirements of healthcare I...
Article
B5G-enabled healthcare systems interconnect a wide range of Internet of Medical Things (IoMT) using supportive networks such as heterogeneous networks and cognitive radio networks to enhance the medical infrastructure. In healthcare, IoMT integrates access technologies, computing infrastructure, and services to connect healthcare systems to handle...
Article
Full-text available
This study presents a novel approach to cryptographic algorithm design that harnesses the power of recurrent neural networks. Unlike traditional mathematical-based methods, neural networks offer nonlinear models that excel at capturing chaotic behavior within systems. We employ a recurrent neural network trained on Monte Carlo estimation to predict...
Article
Full-text available
Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-called sink node (SN) or mobile sink (MS) to perform a few data computation processes including collection and analysis. This network has a wide range of medical applications to exploit the key features of primary sensing units associated with their computing devices such...
Article
At present, communication networks like the Internet of Things (IoT) are emerging with some of the latest technologies, such as artificial intelligence, big data, and cloud computing, to enable wireless edge infrastructures and seamless data migration. In particular, edge-based wireless communications help to gain new insights into the mitigation o...
Article
Full-text available
Coronavirus disease 2019 (COVID-19) has caused severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) across the globe, impacting effective diagnosis and treatment for any chronic illnesses and long-term health implications. In this worldwide crisis, the pandemic shows its daily extension (i.e., active cases) and genome variants (i.e., Alpha)...
Article
Full-text available
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable forms through digitizati...
Article
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervent...
Article
In recent times, cloud-enabled healthcare services have gained much attention in fulfilling the analysis of privacy risks associated with effective decision management systems including trustworthiness and secure data sharing. This system has revolutionized the medical architecture to evolve unprecedented opportunities in using the technologies of...
Article
Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to extend t...
Article
Cognitive Inspired Internet of Medical Things (CI-IoMT) combines cognitive science and artificial intelligence to interact with humans and pervasive digital environments. The connected IoT devices generate a massive amount of data and process this sensory data with cognitive computing to perform efficient analysis at edge nodes. Internet of Medical...
Chapter
Of late, Information and Communication Technologies (ICT) play a vital role in developing smart applications. With the help of smart metering and Advanced Metering Infrastructures (AMI), Smart Grids (SG) are becoming a reality on a global scale. Currently, the growth of research efforts of SGs requires emerging technologies to enable substantial su...
Chapter
Full-text available
Smart grid (SG) systems are freshly improved networks of linked devices that considerably expand the traditional energy infrastructure’s reliability, efficiency, and sustainability. To attain high efficiency, the Information and communication technology (ICT) is used for execution, data monitoring and control, dependability, economics, and sustaina...
Book
Sustainable Networks in Smart Grid presents global challenges in smart metering with renewable energy resources, micro-grid design, communication technologies, big data, privacy and security in the smart grid. Providing an overview of different available PLC technologies and configurations and their applications in different sectors, this book prov...
Article
The advancement of sensory technologies proliferates the development of low-cost electronics systems to operate the environmental features of smart cities. Global urbanization integrates networking systems to offer computing-based practical solutions for improving the quality of application-oriented services. Most of the existing works primarily fo...
Article
Internet of Things (IoT) has led to significant advancements in communication technologies, specifically, concerning IoT Based Sustainable Information Systems. Industry-Academic communities have lately made great strides for the development of security for IoT-based application systems, such as traffic management, industrial automation systems, mil...
Article
Full-text available
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily lives. Advanced information and communication technologies play a vital role in the development of smart cities/industries, including buildings, hospitals, transportation, and other related public and private environments. The emerging technologies are conver...
Article
The initiatives of sustainable urbanization use ICT-based innovation to improve service efficiencies of smart cities and to discover modern economic opportunities. The smart sustainable cities prefer a reliable IoT connectivity and data integration to meet the standard constraints of emerging computing paradigms with enabling techhnologies. The com...
Chapter
Key flexibilities such as billing and charging enable the smart grid to innovate various energy consumption scenarios. The electric power grid uses a mechanism of self-configuration to plan and operate communication technologies during normal and abnormal conditions. The development of intelligent electronic devices utilizes distribution networks a...
Chapter
Of late, Information and Communication Technologies (ICT) play a vital role in developing smart applications. With the help of smart metering and Advanced Metering Infrastructures (AMI), Smart Grids (SG) are becoming a reality on a global scale. Currently, the growth of research efforts of SGs requires emerging technologies to enable substantial su...
Chapter
Participatory sensing and collaborative learning has proliferated the emergence of the Internet of Things (IoT) to collect and analyze the grid data in a service-based cloud framework. The decentralized framework prefers multiple participants to train the local or global model accurately. The real-time participant's and cloud computing services pla...
Article
The integration of sensing technologies and cloud computing signifies the design perspectives of electronic healthcare systems. It has its own application domain to upload the clinical data of the patients and treatment procedures to the cloud server. Moreover, the data user may process the queries with suitable sensing parameters to obtain an appr...
Article
Artificial Intelligence Based Internet of Things (AI-IoT enables autonomous communication among social networks and IoT to leverage the promising solution in the modern paradigms. It can provide an interactive platform across the globe to enrich the quality of networking services to the end-users. Of late, the expansion of Information-centric netwo...
Article
Internet-of-Things (IoT) integrates ubiquitous computing to extend the Internet connectivity to the various application environments such as e-Health, smart cities, cyber–physical systems, etc. It connects the real-time objects to experience high-speed data transfer in 5G network deployment. It may periodically collect and process the data to contr...
Chapter
With the expansion of the Internet of Things, cloud computing services have changed the horizon of advanced computing technologies. Of late, the enterprise systems have excessively demanded data discovery, greater visibility, social integration, seamless streaming, and web push notification via smart computing devices for modern web applications. I...
Article
Cutting-edge IoT revolutionizes the delivery of healthcare information services to meet the global demand. The convergence of smart sensors has prioritized the development of eHealth technologies. In a telecommunication system, it is primarily concerned with the development of core technologies that enable electronic applications associated with 5G...
Article
Full-text available
Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data processing and analysis to fulfill the essential characteristics of seamless computing services such as less processing time, dynamic network management, and location awareness. With the evolution of mobile edge computing, numerous security and privacy issues have been...
Article
The rapid development forms a new transition of information technologies to offer an intelligent manufacturing. The manufacturer has revolutionized the stages of product lifecycle including process planning and maintenance for the early detection of potential system failures and proactive management. Technological advancements including big data, t...
Chapter
COVID-19 is a more transferable illness caused by a new novel coronavirus. It is highly emerging with efficient biosensors such as sensitive and selective that afford the diagnostic tools to infer the disease early. It can maintain a personalized healthcare system to evaluate the growth of disease under proper patient care. To discover as a persona...
Article
Session Initiation Protocol (SIP) is a communication protocol of multimedia systems providing IP signaling to initiate instant messaging. The rapid growth of wireless communication has gained momentum for the development of value-added services such as voice, data, and video ubiquitously. Continuous development has emerged in various application do...
Article
Blockchain application and cyber-physical systems play a crucial role to modernize the traditional industrial process, technical procedures, and business models. It uses frame resilient and smart contracts to reduce the complexities of service costs. The blockchain applications associate the key features such as self-verification, and self-integrit...
Article
Full-text available
Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based applicat...
Chapter
In digital forensics, social media is promptly evolving as a frontier technology. The digital information may explore the magazine contents on social media to offer incredible sustenance in the process of criminal investigations. Conversely, discovering the potential evidence using social media is not presented as a proof in any court of law. The f...
Article
Numerous application domains in practice related to target- tracking, monitoring, and transportation have utilized the wide usage of Wireless Sensor Networks (WSN's) technology. These domains use physical networking objects connecting over the Internet to collect and exchange the data. Using the advancement of cloud computing technologies and aggra...
Article
Full-text available
The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless Multimedia Sensor Networks (WMSNs) has extended its significant role in the development of remote medica...
Chapter
Social networks enhance the appearance of community tools based on web applications that provide a reliable connection to the shared information effectively. Owing to the immense growth of the social network graph, the voluminous data including productive, and media contents cannot be easily diffused to summarize the social relations. Thus, this ch...
Article
SARS-CoV2 has caused a coronavirus disease known as COVID-19. It has become a pandemic all over the world that highly demands proper data interpretation to expand research findings. In the medical and healthcare systems, the Internet of Medical Things devices play a crucial role to gain the autonomous operation that provides an eco-friendly conditi...
Chapter
In this chapter, the author addressed the important aspects of remote healthcare systems. In order to ensure secure communication and data transfer, various design issues and security challenges have been discussed in detail. Moreover, the author have presented a generic architecture for remote healthcare system that ensures better usability for th...
Article
The perceptual experience of next-generation wireless networks is nowadays coexisting with a unified heterogeneous system. It uses advanced IP features with scalable infrastructure to optimize the efficiency rate of the core networks. Of late, the Internet of Things (IoT) has played a significant role in the growth of smart devices that derive a fo...
Article
Background and Objectives: Technological development expands the computation process of smart devices that adopt the telecare medical information system (TMIS) to fulfill the demands of the healthcare organisation. It provides better medical identification to claim the features namely trustworthy, efficient and resourceful. Moreover, the telecare s...
Article
Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To ma...
Article
Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption. Most of the existing approaches use Long Range Wide Area Network (LoRa-WAN) as a media access layer. It pro...
Article
Due to technological advancement and deployment of handheld devices, mobile computing devices have gained the user attention to save resource usage, service access, and application use. In practice, it can be deployed widely to experience massive data storage and less computation cost. However, wireless channel access is vulnerable and insecure to...
Book
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues,...
Article
Internet of Things (IoT) has enhanced the appearance of the information and communications technology (ICT) infrastructure of smart sustainable cities that emerge as a growth of the urban development. The potential growth of environment sustainabilities is coming into the existence of the insightful visions of ICT that include big data analytics as...
Article
Technological developments in communication technologies in the form of hardware and software have made unilateral sensor connectivity over Internet access that facilitates data observation and measurement of physical entities. A technology known as Internet of Things is commonly referred to as the connectivity of Internet devices that provides the...
Chapter
The growth of unmanned aerial vehicles (UAVs) is tremendously growing to promise to business opportunities of cellular networks. On the one hand, it is integrated with cellular system to guarantee the significant features of service management. On the other hand, it unprecedentedly explored the opportunities to realize the significances of system i...
Chapter
Full-text available
The growth of unmanned aerial vehicles (UAVs) is tremendously growing to promise to business opportunities of cellular networks. On the one hand, it is integrated with cellular system to guarantee the significant features of service management. On the other hand, it unprecedentedly explored the opportunities to realize the significances of system i...
Article
Internet of Things (IoT) leverages the sensor inter-connectivity that offers a wide range of real-time monitoring opportunities for smart environmental systems. As a consequence, it is witnessed that IoT plays an important role in the next generation of smart communication networks. In the future, the evolution of smart environment becomes a pillar...
Chapter
In the past, unmanned aerial vehicles (UAV) has become a hot topic for the development of research application systems. It has the real-time applications namely surveillance, camerawork in movies, communication, transportation, agriculture, delivery of goods, and for the remote rescue operations in various application scenarios. Navigation tool use...
Article
Internet of Things (IoT) has advanced its pervasiveness across the globe for the development of smart networks. It is aimed to deploy network edge that enables smart services and computation for the IoT devices. In addition, this deployment would not only improve the user experience but also provide service resiliency in case of any catastrophes. I...
Article
Full-text available
Environment sustainability, energy efficiency and computational reduction of computation time are recent stressing issues for the information and communication technologies (ICTs). Energy efficiency (EE) in particular is accounted for practical use of device to device (D2D) communications which is optimistic, and alternative architectural network e...
Article
Full-text available
Emerging technologies rapidly change the essential qualities of modern societies in terms of smart environments. To utilize the surrounding environment data, tiny sensing devices and smart gateways are highly involved. It has been used to collect and analyze the real-time data remotely in all Industrial Internet of Things (IIoT). Since the IIoT env...
Article
Full-text available
With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally i...
Article
Third Generation Partnership Project (3GPP) standardizes the Long-Term Evolution (LTE) to improve the quality of service in modern communication systems using 3GPP LTE-advanced (LTE-A) networks. As this technology is converging with modern devices, efficient resource allocation schemes are essential for Q3 minimization of the communication delay fo...
Article
This paper analyzes the traffic models of Markov-modulated Poisson-process (MMPP) and Markov-Channel (MC) using IP multimedia server–client systems over Campus WiFi networks. The purpose of MMPP is to discover the optimal-delay divergence path to detect and recover the link-failure to mitigate the packet dropping ratio. The purpose of MC is to crea...
Article
Full-text available
Recently, Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since ena...
Article
Full-text available
For Multimedia Medical Information System (MMIS), security and privacy are the significant measures. For the guarantee of MMIS significant measures, several authentication schemes have been proposed, though the authentication schemes fail to offer the measurable features, like Repetitive Registration, Verification Table, Mutual Authenticity with Ke...
Article
Numerous software tools are available for systems biologist that primarily deals with the different kinds of biological data from the different kind of biological resources, such as micro-arrays, metabolic-networks and predicted protein-structure. A prime challenge of today is to commingle the data resources of the biological data; thus this letter...
Article
In 3G, the server platform of IP multimedia subsystem (IMS) offers multimedia service to the multimedia clients through the exchange of authenticated key agreement (AKA) scheme. Since the IMS service is transmitted over public networks, the server and client of IMS shares a common session-key via the execution of AKA scheme to secure the communicat...
Article
Recently, several biometric and tele-care based user authentication schemes have been proposed to enhance the safe and security of the systems. In 2013, the authors, namely Das et al. improved the authentication scheme of Chang et al. to overcome the severe security flaws, such as failed to protect man-in-the-middle attack, failed to provide the re...
Article
In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the...
Article
Full-text available
Authenticated key agreement (AKA) is useful to preserve the secret (private) key for the data being transmitted over an insecure Thus, this paper proposes the strategies, such as short-term and long-term private keys for the three party authentication and key agreement (3PAKA) protocol. Recently, the IP Multimedia server and client systems have bee...
Article
This paper scrutinizes the authentication and key agreement (AKA) protocol and it was adopted by the Universal Mobile Telecommunication System (UMTS) to emerge the standards of Fourth Generation (4G) network. Lately, Communication of Multimedia (CoM) has drawn up an attention of the researchers for the future of Secure - Wireless Mobile Communicati...
Article
Full-text available
Recently, Session Initiation Protocol (SIP) has become a prime signaling protocol for the multimedia communication systems, though none of the researchers have analyzed its promising features, namely access independence, authentication scheme verification, AKA (Authentication and Key Agreement) security properties, 3GPP security properties, signal...
Article
Full-text available
Since Social/Media Client has rapidly grown for Long Term Evolution (LTE) network, several Authentication and Key Agreement (AKA) Protocols have proposed for securing its communication. Wu et al. and Yoon et al. have concerned on for Server-Client environment. Though those mechanisms were failed to provide mutual authentication and secure key shari...
Article
Full-text available
Since the technologies of Internet and wireless communication have grown tremendously in the past, people have always occupied of some security sensitive wireless devices for the Internet services, such as voice call, instant messaging, online game, electronic banking, electronics trading and so on. Over a few decades, session key sharing has been...
Article
Since Social/Media Client has rapidly grown for Long Term Evolution (LTE) network, several Authentication and Key Agreement (AKA) Protocols have proposed for securing its communication. Wu et al. and Yoon et al. have concerned on for Server-Client environment. Though those mechanisms were failed to provide mutual authentication and secure key shari...
Article
Full-text available
Several Authentication and Key Agreement (AKA) Protocol have been proposed in the past, though major security flaws have been addressed, like key-compromise impersonation attack, unknown-key sharing attack, not fulfilling the security features of AKA. Thus, this paper proposes a novel mechanism of Pairwise Disjoint Key Authentication (PDKA) to abor...
Article
Full-text available
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless / wire-line for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to inte...
Article
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless/wireline for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to interpr...
Article
Full-text available
Over few decades, the Transmission Control Protocol (TCP) has been employed for developing the major Internet applications. Eventhough of which TCP has some major challenging issues when it operates in the Wireless Networks (WN). Some of the issues are identified from the existing techniques which are Packet Dropping Rate (PDR) and Packet Reception...
Conference Paper
Full-text available
The IP multimedia subsystem (IMS) is standardized by the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session...
Conference Paper
Full-text available
The IP multimedia subsystem (IMS) is standardized the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session est...
Conference Paper
Full-text available
The IP multimedia subsystem (IMS) is standardized by the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session...

Network

Cited By