Soumyashree S Panda

Soumyashree S Panda
International Institute of Information Technology | IIIT Bhubaneswar · Department of Computer Science and Engineering

About

25
Publications
55,978
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,480
Citations

Publications

Publications (25)
Article
Full-text available
The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities a...
Article
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation cente...
Conference Paper
Full-text available
VANET, a heterogeneous interconnection of smart vehicles, is a great platform to develop a smart transportation system. VANET comprises the various types of communication like Vehicle to Vehicle, Vehicle to Infrastructure based on the ad-hoc network. Resource constraints (like rechargeable power source, frequency spectrum, channels etc.), safety ma...
Conference Paper
Full-text available
Computing and communication are getting increasingly ubiquitous with the inclusion of sophisticated devices like electric vehicles, smart phones and other house hold appliances. Due to the constant evolution in Internet of Things (IoT), the process of collaboration of these devices at a mass scale in order to provide improved and better services to...
Conference Paper
Full-text available
Cyber-physical Systems (CPS) are reshaping the way of interaction with the physical world. Moreover, the true potential of CPS will be realized when a decentralized approach will be taken into account. Blockchain is an up-and-coming technology which can establish trust in CPS, where participants do not trust each other. Blockchain applications elim...
Conference Paper
Full-text available
Internet of Things (IoT) has lots of attention in the last decade. The connected IoT devices are more than the total world population. Due to its low cost, easy to deploy, and simple to implement, application areas are large like smart city, smart home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...
Conference Paper
Full-text available
Blockchain is the backbone technology behind crypto-currency and Bitcoin. By concept, Blockchain is a distributed database where transactions are recorded in an incorruptible and non-modifiable manner. Currently, Blockchain technology is envisioned as a powerful framework for open-access networks, decentralized information processing and sharing sy...
Conference Paper
Full-text available
The evolution of IOT that began with computers has now developed into an ecosystem. This IOT ecosystem consists of a large number of different types of devices embedded with sensors and technology, which makes them smart enough to interact within themselves. With IOT omnipresent, the challenge would be how to ensure only authorized access to the re...
Article
Blockchain Technology has received a lot of attention from both industry and academia due to its decentralized, persistency, anonymity and auditability properties. In this survey, use of Blockchain technology in wide applications area and its implementation challenges have been done. A rigorous search for journal/research article related to Blockch...
Conference Paper
Full-text available
In the era of the Internet of Things(IoT) smart devices are connected with wire or wireless way. The IoT devices are capable of sensing the environment and has the ability to transmit that information to the next level. The application area of IoT is Smart city, Smart transportation, Healthcare sector, Agriculture, Monitoring environment. Each of t...
Conference Paper
Full-text available
Internet of Things (IoT) is excessively influencing our day to day lives in many domains be it small smart device like a smart-watch or large industrial enterprises. Thus, a number of different IoT based applications are developed and deployed for these sectors. An IoT system enables devices to communicate among each other without human assistance/...
Conference Paper
Full-text available
Internet of Things (IoT) as per estimated will connect 50 billion devices by 2020. Since its evolution, IoT technology provides lots of flexibility to develop and implement any application. Most of the application improves the human living standard and also makes life easy to access and monitoring the things in real time. Though there exist some se...
Conference Paper
Full-text available
Fog computing is decentralized scalable architecture where the fog nodes can join and leave the network arbitrary way. The IoT devices connected to the fog network can also have the connectivity issue. As all the fog nodes and IoT devices are connected in a distributed way it is hard to build a secure infrastructure in the absence of a trusted cent...
Conference Paper
Full-text available
Over the past decade, a lot of evolution has happened in the field of security specifically authentication system. The most commonly used authentication service we use now is OAuth 2.0 based authentication. In this method, we are dependent on a 3rd party authentication service provider to which we need to trust. Though this model is used extensivel...
Conference Paper
Full-text available
—In the last decade blockchain technology become mainstream research topic because of its decentralized, peer to peer transaction, distributed consensus, and anonymity properties. The blockchain technology overshadows regulatory problem and technical challenges. A smart contract is a set of programs which are self-verifying ,self-executing and tamp...
Conference Paper
Full-text available
Design of a protocol for secure remote login to server(s) is essential, because it not only protects secret information of the users but also allows secure access to the authorized users. In this paper, an improved three-factor authenticated remote login scheme over earlier two recent ones is presented, where password, smartcard and user-biometric,...

Network

Cited By