About
25
Publications
55,978
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,480
Citations
Publications
Publications (25)
The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities a...
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation cente...
VANET, a heterogeneous interconnection of smart vehicles, is a great platform to develop a smart transportation system. VANET comprises the various types of communication like Vehicle to Vehicle, Vehicle to Infrastructure based on the ad-hoc network. Resource constraints (like rechargeable power source, frequency spectrum, channels etc.), safety ma...
Computing and communication are getting increasingly ubiquitous with the inclusion of sophisticated devices like electric vehicles, smart phones and other house hold appliances. Due to the constant evolution in Internet of Things (IoT), the process of collaboration of these devices at a mass scale in order to provide improved and better services to...
Cyber-physical Systems (CPS) are reshaping the way of interaction with the physical world. Moreover, the true potential of CPS will be realized when a decentralized approach will be taken into account. Blockchain is an up-and-coming technology which can establish trust in CPS, where participants do not trust each other. Blockchain applications elim...
Internet of Things (IoT) has lots of attention in the
last decade. The connected IoT devices are more than the total
world population. Due to its low cost, easy to deploy, and simple
to implement, application areas are large like smart city, smart
home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...
Blockchain is the backbone technology behind crypto-currency and Bitcoin. By concept, Blockchain is a distributed database where transactions are recorded in an incorruptible and non-modifiable manner. Currently, Blockchain technology is envisioned as a powerful framework for open-access networks, decentralized information processing and sharing sy...
The evolution of IOT that began with computers has now developed into an ecosystem. This IOT ecosystem consists of a large number of different types of devices embedded with sensors and technology, which makes them smart enough to interact within themselves. With IOT omnipresent, the challenge would be how to ensure only authorized access to the re...
Blockchain Technology has received a lot of attention from both industry and academia due to its decentralized,
persistency, anonymity and auditability properties. In this survey, use of Blockchain technology in wide applications
area and its implementation challenges have been done. A rigorous search for journal/research article related
to Blockch...
In the era of the Internet of Things(IoT) smart
devices are connected with wire or wireless way. The IoT
devices are capable of sensing the environment and has the
ability to transmit that information to the next level. The
application area of IoT is Smart city, Smart transportation,
Healthcare sector, Agriculture, Monitoring environment. Each
of t...
Internet of Things (IoT) is excessively influencing
our day to day lives in many domains be it small smart device like
a smart-watch or large industrial enterprises. Thus, a number
of different IoT based applications are developed and deployed
for these sectors. An IoT system enables devices to communicate
among each other without human assistance/...
Internet of Things (IoT) as per estimated will connect
50 billion devices by 2020. Since its evolution, IoT technology
provides lots of flexibility to develop and implement any application.
Most of the application improves the human living standard
and also makes life easy to access and monitoring the things in
real time. Though there exist some se...
Fog computing is decentralized scalable architecture
where the fog nodes can join and leave the network arbitrary
way. The IoT devices connected to the fog network can also
have the connectivity issue. As all the fog nodes and IoT devices
are connected in a distributed way it is hard to build a secure
infrastructure in the absence of a trusted cent...
Over the past decade, a lot of evolution has happened
in the field of security specifically authentication system.
The most commonly used authentication service we use now is
OAuth 2.0 based authentication. In this method, we are dependent
on a 3rd party authentication service provider to which we need
to trust. Though this model is used extensivel...
—In the last decade blockchain technology become
mainstream research topic because of its decentralized, peer to
peer transaction, distributed consensus, and anonymity properties.
The blockchain technology overshadows regulatory problem
and technical challenges. A smart contract is a set of programs
which are self-verifying ,self-executing and tamp...
Design of a protocol for secure remote login to server(s) is essential, because it not only protects secret information of the users but also allows secure access to the authorized users. In this paper, an improved three-factor authenticated remote login scheme over earlier two recent ones is presented, where password, smartcard and user-biometric,...