Rajarshi Roy Chowdhury

Rajarshi Roy Chowdhury
Universiti Brunei Darussalam · Energy Systems Engineering

About

19
Publications
1,094
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
79
Citations
Citations since 2017
17 Research Items
77 Citations
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
201720182019202020212022202305101520253035
Introduction
Skills and Expertise

Publications

Publications (19)
Article
Full-text available
In the cyberspace, device identification has become one of the most important factors in improving security of a network, containing both Internet of Things (IoT) and non-IoT devices. Resource-constraint IoT devices are generally more vulnerable than non-IoT devices, to different kinds of security threats, including Mirai botnet and spoofing attack...
Article
Full-text available
The One Belt One Road Initiative (OBOR) by China presents a grand vision to the world that aims to foster cooperation among different countries in various fields such as global trade, international relations, infrastructure development, education, and technology. Also known as the Belt and Road Initiative (BRI), it comprises a network of roads, rai...
Article
Full-text available
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, based on digital foo...
Article
Full-text available
span lang="EN-US">The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, ba...
Article
Full-text available
The Internet of Things can be considered a technological revolution and has successfully merged the physical world with the digital world. However, heterogeneous IoT devices with different functionalities impose new security challenges in cyberspace, including node forgery, unauthorized access to data and cyberattacks. It is essential to identify n...
Conference Paper
Full-text available
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet-connectivity. To secure a network, device identification plays key role. In this paper, a device fingerprinting (DFP) model, which is able to distinguish between Internet of Thi...
Conference Paper
Matrix factorization (MS) is a collaborative filtering (CF) based approach, which is widely used for recommendation systems (RS). In this research work, we deal with the content recommendation problem for users in a content management system (CMS) based on users’ feedback data. The CMS is applied for publishing and pushing curated content to the em...
Preprint
Full-text available
The usage of technologically advanced devices has seen a boom in many domains, including education, automation, and healthcare; with most of the services requiring Internet connectivity. To secure a network, device identification plays key role. In this paper, a device fingerprinting (DFP) model, which is able to distinguish between Internet of Thi...
Preprint
Full-text available
The rapidly increasing number of internet of things (IoT) and non-IoT devices has imposed new security challenges to network administrators. Accurate device identification in the increasingly complex network structures is necessary. In this paper, a device fingerprinting (DFP) method has been proposed for device identification, based on digital foo...
Article
Modernization and technological advancement have made smart and convenient living environments, including smart houses and smart cities, possible, by combining the Internet of Things (IoT), data, and internet-based services over various communication protocols. IoT is the next generation of the Internet. However, commonly resource-constraint IoT de...
Article
In cyberspace, a large number of Internet of Things (IoT) devices from different manufacturers with heterogeneous functionalities are connected together. It is challenging to identify all these devices in an IoT ecosystem. The situation becomes even more complicated when the devices come from the same manufacturer and of similar types due to their...
Preprint
Matrix factorization (MS) is a collaborative filtering (CF) based approach, which is widely used for recommendation systems (RS). In this research work, we deal with the content recommendation problem for users in a content management system (CMS) based on users' feedback data. The CMS is applied for publishing and pushing curated content to the em...
Article
Device fingerprinting is a problem of identifying a network device using network traffic data to secure against cyber-attacks. Automated device classification from a large set of network traffic features space is challenging for the devices connected in the cyberspace. In this work, the idea is to define a device-specific unique fingerprint by anal...
Article
Full-text available
With the growth of wireless network technology-based devices, identifying the communication behaviour of wireless connectivity enabled devices, e.g. Internet of Things (IoT) devices, is one of the vital aspects, in managing and securing IoT networks. Initially, devices use frames to connect to the access point on the local area network and then, us...
Preprint
Device identification is the process of identifying a device on Internet without using its assigned network or other credentials. The sharp rise of usage in Internet of Things (IoT) devices has imposed new challenges in device identification due to a wide variety of devices, protocols and control interfaces. In a network, conventional IoT devices i...
Article
Full-text available
Cloud computing refers to high scalable computing applications, storages and platforms as a service to companies, individuals and governments. Therefore, SMB (Small and Medium Business) organizations are adapting cloud computing services gradually to save cost and to increase efficiency in their business environment. While cloud service benefits an...
Article
Full-text available
Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by AS1,AS2 and AS3 corresponding authentication servers. For simplicity, let AS1, AS2 ,AS3 represent those threedomains. This mobile...

Network

Cited By