
Dr. B. D. Deebak- PhD in Multimedia Communication & Security
- Research Fellow at University of Warwick
Dr. B. D. Deebak
- PhD in Multimedia Communication & Security
- Research Fellow at University of Warwick
[Top 2% Scientists 2022-2024]
Information Security, Cryptography, Integrating AI with Cyber Security, IoT with 5G/6G
About
82
Publications
14,387
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,217
Citations
Introduction
I am currently working as a Research Fellow in the Cyber Security Center at the University of Warwick and collaborating with academic and cybersecurity companies, located in Northern Ireland, on research and development projects in AI-enabled cybersecurity.
Current institution
Additional affiliations
Education
July 2011 - April 2015
September 2007 - September 2009
August 2003 - May 2007
Publications
Publications (82)
Technological convergence in visual sensing with industrial IoT (VSI-IoT) can bring numerous advances to large-scale crowd management systems like visual crowdsensing. VSI-IoT has significant features, including sensing, computing, analyzing, and storing, to address the issues of bearing failures, such as unplanned outages, increased downtime, and...
Epidemic-prone diseases transforming the regular activities of people and health systems have become unprecedented events around the world. In the event of health emergencies like COVID-19, device-centric applications can expand communications capacities and global connectivity using technologies to meet the competitive requirements of healthcare I...
B5G-enabled healthcare systems interconnect a wide range of Internet of Medical Things (IoMT) using supportive networks such as heterogeneous networks and cognitive radio networks to enhance the medical infrastructure. In healthcare, IoMT integrates access technologies, computing infrastructure, and services to connect healthcare systems to handle...
This study presents a novel approach to cryptographic algorithm design that harnesses the power of recurrent neural networks. Unlike traditional mathematical-based methods, neural networks offer nonlinear models that excel at capturing chaotic behavior within systems. We employ a recurrent neural network trained on Monte Carlo estimation to predict...
Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-called sink node (SN) or mobile sink (MS) to perform a few data computation processes including collection and analysis. This network has a wide range of medical applications to exploit the key features of primary sensing units associated with their computing devices such...
At present, communication networks like the Internet of Things (IoT) are emerging with some of the latest technologies, such as artificial intelligence, big data, and cloud computing, to enable wireless edge infrastructures and seamless data migration. In particular, edge-based wireless communications help to gain new insights into the mitigation o...
Coronavirus disease 2019 (COVID-19) has caused severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) across the globe, impacting effective diagnosis and treatment for any chronic illnesses and long-term health implications. In this worldwide crisis, the pandemic shows its daily extension (i.e., active cases) and genome variants (i.e., Alpha)...
The social Internet of Medical Things (S-IoMT) highly demands dependable and non-invasive device identification and authentication and makes data services more prevalent in a reliable learning system. In real time, healthcare systems consistently acquire, analyze, and transform a few operational intelligence into actionable forms through digitizati...
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervent...
In recent times, cloud-enabled healthcare services have gained much attention in fulfilling the analysis of privacy risks associated with effective decision management systems including trustworthiness and secure data sharing. This system has revolutionized the medical architecture to evolve unprecedented opportunities in using the technologies of...
Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to extend t...
Cognitive Inspired Internet of Medical Things (CI-IoMT) combines cognitive science and artificial intelligence to interact with humans and pervasive digital environments. The connected IoT devices generate a massive amount of data and process this sensory data with cognitive computing to perform efficient analysis at edge nodes. Internet of Medical...
Of late, Information and Communication Technologies (ICT) play a vital role in developing smart applications. With the help of smart metering and Advanced Metering Infrastructures (AMI), Smart Grids (SG) are becoming a reality on a global scale. Currently, the growth of research efforts of SGs requires emerging technologies to enable substantial su...
Smart grid (SG) systems are freshly improved networks of linked devices that considerably expand the traditional energy infrastructure’s reliability, efficiency, and sustainability. To attain high efficiency, the Information and communication technology (ICT) is used for execution, data monitoring and control, dependability, economics, and sustaina...
Sustainable Networks in Smart Grid presents global challenges in smart metering with renewable energy resources, micro-grid design, communication technologies, big data, privacy and security in the smart grid. Providing an overview of different available PLC technologies and configurations and their applications in different sectors, this book prov...
The advancement of sensory technologies proliferates the development of low-cost electronics systems to operate the environmental features of smart cities. Global urbanization integrates networking systems to offer computing-based practical solutions for improving the quality of application-oriented services. Most of the existing works primarily fo...
Internet of Things (IoT) has led to significant advancements in communication technologies, specifically, concerning IoT Based Sustainable Information Systems. Industry-Academic communities have lately made great strides for the development of security for IoT-based application systems, such as traffic management, industrial automation systems, mil...
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily lives. Advanced information and communication technologies play a vital role in the development of smart cities/industries, including buildings, hospitals, transportation, and other related public and private environments. The emerging technologies are conver...
The initiatives of sustainable urbanization use ICT-based innovation to improve service efficiencies of smart cities and to discover modern economic opportunities. The smart sustainable cities prefer a reliable IoT connectivity and data integration to meet the standard constraints of emerging computing paradigms with enabling techhnologies. The com...
Key flexibilities such as billing and charging enable the smart grid to innovate various energy consumption scenarios. The electric power grid uses a mechanism of self-configuration to plan and operate communication technologies during normal and abnormal conditions. The development of intelligent electronic devices utilizes distribution networks a...
Of late, Information and Communication Technologies (ICT) play a vital role in developing smart applications. With the help of smart metering and Advanced Metering Infrastructures (AMI), Smart Grids (SG) are becoming a reality on a global scale. Currently, the growth of research efforts of SGs requires emerging technologies to enable substantial su...
Participatory sensing and collaborative learning has proliferated the emergence of the Internet of Things (IoT) to collect and analyze the grid data in a service-based cloud framework. The decentralized framework prefers multiple participants to train the local or global model accurately. The real-time participant's and cloud computing services pla...
The integration of sensing technologies and cloud computing signifies the design perspectives of electronic healthcare systems. It has its own application domain to upload the clinical data of the patients and treatment procedures to the cloud server. Moreover, the data user may process the queries with suitable sensing parameters to obtain an appr...
Artificial Intelligence Based Internet of Things (AI-IoT enables autonomous communication among social networks and IoT to leverage the promising solution in the modern paradigms. It can provide an interactive platform across the globe to enrich the quality of networking services to the end-users. Of late, the expansion of Information-centric netwo...
Internet-of-Things (IoT) integrates ubiquitous computing to extend the Internet connectivity to the various application environments such as e-Health, smart cities, cyber–physical systems, etc. It connects the real-time objects to experience high-speed data transfer in 5G network deployment. It may periodically collect and process the data to contr...
With the expansion of the Internet of Things, cloud computing services have changed the horizon of advanced computing technologies. Of late, the enterprise systems have excessively demanded data discovery, greater visibility, social integration, seamless streaming, and web push notification via smart computing devices for modern web applications. I...
Cutting-edge IoT revolutionizes the delivery of healthcare information services to meet the global demand. The convergence of smart sensors has prioritized the development of eHealth technologies. In a telecommunication system, it is primarily concerned with the development of core technologies that enable electronic applications associated with 5G...
Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data processing and analysis to fulfill the essential characteristics of seamless computing services such as less processing time, dynamic network management, and location awareness. With the evolution of mobile edge computing, numerous security and privacy issues have been...
The rapid development forms a new transition of information technologies to offer an intelligent manufacturing. The manufacturer has revolutionized the stages of product lifecycle including process planning and maintenance for the early detection of potential system failures and proactive management. Technological advancements including big data, t...
COVID-19 is a more transferable illness caused by a new novel coronavirus. It is highly emerging with efficient biosensors such as sensitive and selective that afford the diagnostic tools to infer the disease early. It can maintain a personalized healthcare system to evaluate the growth of disease under proper patient care. To discover as a persona...
Session Initiation Protocol (SIP) is a communication protocol of multimedia systems providing IP signaling to initiate instant messaging. The rapid growth of wireless communication has gained momentum for the development of value-added services such as voice, data, and video ubiquitously. Continuous development has emerged in various application do...
Blockchain application and cyber-physical systems play a crucial role to modernize the traditional industrial process, technical procedures, and business models. It uses frame resilient and smart contracts to reduce the complexities of service costs. The blockchain applications associate the key features such as self-verification, and self-integrit...
Sustainable Computing has advanced the technological evolution of the Internet and information-based communication technology. It is nowadays emerging in the form of the Cloud of Medical Things (CoMT) to develop smart healthcare systems. The academic community has lately made great strides for the development of security for the CoMT based applicat...
In digital forensics, social media is promptly evolving as a frontier technology. The digital information may explore the magazine contents on social media to offer incredible sustenance in the process of criminal investigations. Conversely, discovering the potential evidence using social media is not presented as a proof in any court of law. The f...
Numerous application domains in practice related to target- tracking, monitoring, and transportation have utilized the wide usage of Wireless Sensor Networks (WSN's) technology. These domains use physical networking objects connecting over the Internet to collect and exchange the data. Using the advancement of cloud computing technologies and aggra...
The challenge of COVID-19 has become more prevalent across the world. It is highly demanding an intelligent strategy to outline the precaution measures until the clinical trials find a successful vaccine. With technological advancement, Wireless Multimedia Sensor Networks (WMSNs) has extended its significant role in the development of remote medica...
Social networks enhance the appearance of community tools based on web applications that provide a reliable connection to the shared information effectively. Owing to the immense growth of the social network graph, the voluminous data including productive, and media contents cannot be easily diffused to summarize the social relations. Thus, this ch...
SARS-CoV2 has caused a coronavirus disease known as COVID-19. It has become a pandemic all over the world that highly demands proper data interpretation to expand research findings. In the medical and healthcare systems, the Internet of Medical Things devices play a crucial role to gain the autonomous operation that provides an eco-friendly conditi...
In this chapter, the author addressed the important aspects of remote healthcare systems. In order to ensure secure communication and data transfer, various design issues and security challenges have been discussed in detail. Moreover, the author have presented a generic architecture for remote healthcare system that ensures better usability for th...
The perceptual experience of next-generation wireless networks is nowadays coexisting with a unified heterogeneous system. It uses advanced IP features with scalable infrastructure to optimize the efficiency rate of the core networks. Of late, the Internet of Things (IoT) has played a significant role in the growth of smart devices that derive a fo...
Background and Objectives: Technological development expands the computation process of smart devices that adopt the telecare medical information system (TMIS) to fulfill the demands of the healthcare organisation. It provides better medical identification to claim the features namely trustworthy, efficient and resourceful. Moreover, the telecare s...
Unmanned Aerial Vehicle (UAV) has extensively been practiced in the military and civilian surveillance systems that access sensitive data over the cellular networks. However, channel insecurity and battery limitation may not protect the aerial coverage area. Thus, sensitive information gathered through aerial vehicles causes security threats. To ma...
Internet of Things (IoT) utilizes an intelligent technique to facilitate the design and development of smart-urban projects. As the smart devices have limited battery sources, IoT services should initiate its setup with low-power consumption. Most of the existing approaches use Long Range Wide Area Network (LoRa-WAN) as a media access layer. It pro...
Due to technological advancement and deployment of handheld devices, mobile computing devices have gained the user attention to save resource usage, service access, and application use. In practice, it can be deployed widely to experience massive data storage and less computation cost. However, wireless channel access is vulnerable and insecure to...
Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues,...
Internet of Things (IoT) has enhanced the appearance of the information and communications technology (ICT) infrastructure of smart sustainable cities that emerge as a growth of the urban development. The potential growth of environment sustainabilities is coming into the existence of the insightful visions of ICT that include big data analytics as...
Technological developments in communication technologies in the form of hardware and software have made unilateral sensor connectivity over Internet access that facilitates data observation and measurement of physical entities. A technology known as Internet of Things is commonly referred to as the connectivity of Internet devices that provides the...
The growth of unmanned aerial vehicles (UAVs) is tremendously growing to promise to business opportunities of cellular networks. On the one hand, it is integrated with cellular system to guarantee the significant features of service management. On the other hand, it unprecedentedly explored the opportunities to realize the significances of system i...
The growth of unmanned aerial vehicles (UAVs) is tremendously growing to promise to business opportunities of cellular networks. On the one hand, it is integrated with cellular system to guarantee the significant features of service management. On the other hand, it unprecedentedly explored the opportunities to realize the significances of system i...
Internet of Things (IoT) leverages the sensor inter-connectivity that offers a wide range of real-time monitoring opportunities for smart environmental systems. As a consequence, it is witnessed that IoT plays an important role in the next generation of smart communication networks. In the future, the evolution of smart environment becomes a pillar...
In the past, unmanned aerial vehicles (UAV) has become a hot topic for the development of research application systems. It has the real-time applications namely surveillance, camerawork in movies, communication, transportation, agriculture, delivery of goods, and for the remote rescue operations in various application scenarios. Navigation tool use...
Internet of Things (IoT) has advanced its pervasiveness across the globe for the development of smart networks. It is aimed to deploy network edge that enables smart services and computation for the IoT devices. In addition, this deployment would not only improve the user experience but also provide service resiliency in case of any catastrophes. I...
Environment sustainability, energy efficiency and computational reduction of computation time are recent stressing issues for the information and communication technologies (ICTs). Energy efficiency (EE) in particular is accounted for practical use of device to device (D2D) communications which is optimistic, and alternative architectural network e...
Emerging technologies rapidly change the essential qualities of modern societies in terms of smart environments. To utilize the surrounding environment data, tiny sensing devices and smart gateways are highly involved. It has been used to collect and analyze the real-time data remotely in all Industrial Internet of Things (IIoT). Since the IIoT env...
With the technological advances in the areas of Machine-To-Machine (M2M) and Device-To-Device (D2D) communication, various smart computing devices now integrate a set of multimedia sensors such as accelerometers, barometers, cameras, fingerprint sensors, gestures, iris scanners, etc., to infer the environmental status. These devices are generally i...
Third Generation Partnership Project (3GPP) standardizes the Long-Term Evolution
(LTE) to improve the quality of service in modern communication systems
using 3GPP LTE-advanced (LTE-A) networks. As this technology is converging
with modern devices, efficient resource allocation schemes are essential for Q3
minimization of the communication delay fo...
This paper analyzes the traffic models of Markov-modulated Poisson-process (MMPP) and Markov-Channel (MC) using IP multimedia server–client systems over Campus WiFi networks. The purpose of MMPP is to discover the optimal-delay divergence path to detect and recover the link-failure to mitigate the packet dropping ratio. The purpose of MC is to crea...
Recently, Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since ena...
For Multimedia Medical Information System (MMIS), security and privacy are the significant measures. For the guarantee of MMIS significant measures, several authentication schemes have been proposed, though the authentication schemes fail to offer the measurable features, like Repetitive Registration, Verification Table, Mutual Authenticity with Ke...
Numerous software tools are available for systems biologist that primarily deals with the different kinds of
biological data from the different kind of biological resources, such as micro-arrays, metabolic-networks
and predicted protein-structure. A prime challenge of today is to commingle the data resources of the
biological data; thus this letter...
In 3G, the server platform of IP multimedia subsystem (IMS) offers multimedia service to the multimedia
clients through the exchange of authenticated key agreement (AKA) scheme. Since the IMS service is
transmitted over public networks, the server and client of IMS shares a common session-key via the
execution of AKA scheme to secure the communicat...
Recently, several biometric and tele-care based user authentication schemes have been proposed to enhance the safe and security of the systems. In 2013, the authors, namely Das et al. improved the authentication scheme of Chang et al. to overcome the severe security flaws, such as failed to protect man-in-the-middle attack, failed to provide the re...
In hierarchical wireless sensor networks (H-WSNs), adaptive user authentication scheme has attracted significantly for the purposes of mutual authentication, session key establishment and resiliency to the attacks, like impersonation, parallel-session and password guessing. Several user authentication schemes have been proposed recently; though the...
Authenticated key agreement (AKA) is useful to preserve the secret (private) key for the data being transmitted over an insecure Thus, this paper proposes the strategies, such as short-term and long-term private keys for the three party authentication and key agreement (3PAKA) protocol. Recently, the IP Multimedia server and client systems have bee...
This paper scrutinizes the authentication and key agreement (AKA) protocol and it was adopted by the Universal Mobile Telecommunication System (UMTS) to emerge the standards of Fourth Generation (4G) network. Lately, Communication of Multimedia (CoM) has drawn up an attention of the researchers for the future of Secure - Wireless Mobile Communicati...
Recently, Session Initiation Protocol (SIP) has become a prime signaling protocol for the multimedia communication systems, though none of the researchers have analyzed its promising features, namely access independence, authentication scheme verification, AKA (Authentication and Key Agreement) security properties, 3GPP security properties, signal...
Since Social/Media Client has rapidly grown for Long Term Evolution (LTE) network, several Authentication and Key Agreement (AKA) Protocols have proposed for securing its communication. Wu et al. and Yoon et al. have concerned on for Server-Client environment. Though those mechanisms were failed to provide mutual authentication and secure key shari...
Since the technologies of Internet and wireless communication have grown tremendously in the past, people have always occupied of some security sensitive wireless devices for the Internet services, such as voice call, instant messaging, online game, electronic banking, electronics trading and so on. Over a few decades, session key sharing has been...
Since Social/Media Client has rapidly grown for Long Term Evolution (LTE) network, several Authentication and Key Agreement (AKA) Protocols have proposed for securing its communication. Wu et al. and Yoon et al. have concerned on for Server-Client environment. Though those mechanisms
were failed to provide mutual authentication and secure key shari...
Several Authentication and Key Agreement (AKA) Protocol have been proposed in the past, though major security flaws have been addressed, like key-compromise impersonation attack, unknown-key sharing attack, not fulfilling the security features of AKA. Thus, this paper proposes a novel mechanism of Pairwise Disjoint Key Authentication (PDKA) to abor...
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless / wire-line for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to inte...
IP Multimedia Subsystem (IMS) is now being a solution for packet switched networks. The future generation network is amalgamating the infrastructure of Wireless/wireline for providing the standard interface for Internet services. Nevertheless, the network infrastructures like multimedia and non-multimedia do not have any native mechanism to interpr...
Over few decades, the Transmission Control Protocol (TCP) has been employed for developing the major Internet applications. Eventhough of which TCP has some major challenging issues when it operates in the Wireless Networks (WN). Some of the issues are identified from the existing techniques which are Packet Dropping Rate (PDR) and Packet Reception...
The IP multimedia subsystem (IMS) is standardized by the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session...
The IP multimedia subsystem (IMS) is standardized the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session est...
The IP multimedia subsystem (IMS) is standardized by the 3rd generation partnership project (3GPP) and 3GPP2 as a new core network domain to support Internet Protocol (IP) based multimedia services over 3G networks. Session initiation protocol (SIP) which is an application layer signaling protocol is also standardized by 3GPP and 3GPP2 for session...