Urbi Chatterjee

Urbi Chatterjee
Indian Institute of Technology Kanpur | IIT Kanpur · Department of Computer Science & Engineering

Ph. D.

About

29
Publications
4,183
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
369
Citations
Citations since 2016
28 Research Items
369 Citations
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
Introduction
The Internet-of-Things (IoT) has been foreseen to become an essential landmark in the growth of smart cities and smart homes in the near future. Hence, special methods must be deployed to enable authentication and secure data transmission for these ubiquitous networks . Since the IoT nodes are inherently resource-constrained, the security measures must be sufficiently lightweight. Our main objective will be to provide authenticity, confidentiality and integrity to these smart devices.
Additional affiliations
March 2021 - present
Indian Institute of Technology Kanpur
Position
  • Professor (Assistant)
February 2020 - February 2021
Indian Institute of Technology Kharagpur
Position
  • Research Assistant
December 2014 - January 2020
Indian Institute of Technology Kharagpur
Position
  • PhD Student
Education
July 2011 - May 2013
Indian Institute of Technology (ISM) Dhanbad
Field of study
  • Computer Application
July 2007 - May 2011
West Bengal University of Technology
Field of study
  • Computer Science and Engineering

Publications

Publications (29)
Article
Security features are of paramount importance for the Internet of Things (IoT), and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT to enable secure authentication and message exchange among the devices. Our scheme employs a Physically Unclonable...
Article
Physically Unclonable Functions promise to be a critical hardware primitive to provide unique identities to billions of connected devices in Internet of Things.The classical authentication techniques suffer from the pressing problems of password dependency and inability to bind access requests to the "things" from which they originate. Although PUF...
Article
Integrity verification plays a paramount role in resource-constraint in internet-of-things framework. The virtual proof of reality has come up with a Sense-Prove-Validate framework for integrity checking of abundant data generated from billions of connected sensors. It leverages the unreliability factor of Physically Unclonable Functions with respe...
Article
Anonymous authentication (AA) schemes are used by an application provider to grant services to its n users for predefined k times after they have authenticated themselves anonymously. These privacy-preserving cryptographic schemes are essentially based on the secret key that is embedded in a trusted platform module (TPM). In this work, we propose a...
Article
This paper initiates the study of “Cryptophasia in Hardware” – a phenomenon that allows hardware circuits/devices with no pre-established secret keys to securely exchange secret information over insecure communication networks. The study of cryptophasia is motivated by the need to establish secure communication channels between lightweight resource...
Article
Full-text available
In recent years, connected and intelligent vehicles have posed advanced risks to road safety and vehicle thefts. The keyless entry and immobiliser systems of luxury vehicles have been under extensive scrutiny and found to be vulnerable against lack of mutual authentication in challenge-response protocol, smaller key size for the cipher, amplificati...
Conference Paper
The globalization of the integrated circuit (IC) manufacturing industry has lured the adversary to come up with numerous malicious activities in the IC supply chain. Logic locking has risen to prominence as a proactive defense strategy against such threats. CAS-Lock (proposed in CHES'20), is an advanced logic locking technique that harnesses the co...
Chapter
Side Channel Attacks (SCAs) was first introduced by Paul Kocher in 1996 to break the secret key of cryptographic algorithms using the inherent property of the implementation along with the mathematical structure of the cipher. These categories of attacks become more robust as they do not require any mathematical cryptanalysis to retrieve the key. I...
Article
Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) are two highly useful hardware primitives to build up the root-of-trust for embedded devices in Internet-of-Things and Cyber-Physical System applications. These applications demand the primitives be lightweight, yet flexible. However, PUFs are designed to offer repeti...
Chapter
In recent years, the transitioning of conventional power grid system into the smart grid infrastructure has made the power distribution network more susceptible towards faults and physical attacks. In this context, we discuss recently proposed Manipulation-of-Demand via IoT attack, False Data Injection Attacks and Electric Fault Attacks. These atta...
Preprint
In recent years, the conventional power grid system has been streamlined towards Smart grid infrastructure that empowers two-way communication between the consumers and the utility providers. This however also makes the grid more susceptible towards faults as well as physical and cyber attacks. In this work, we propose a Physically Unclonable Funct...
Article
In the energy sector, IoT manifests in the form of next-generation power grids that provide enhanced electrical stability, efficient power distribution and utilization. The primary feature of a Smart Grid is the presence of an advanced bi-directional communication network between the Smart meters at the consumer end and the servers at the Utility O...
Chapter
Lightweight, computationally efficient HB-like protocol family has been used for privacy-preserving authentication mechanisms of Radio-Frequency Identification (RFID) tags in recent past. Most of these protocols are proved to be provably secure using the hardness assumption of Learning Parity with Noise (LPN) problem, but failed to resist against m...
Conference Paper
This work proposes a scheme to detect, isolate and mitigate malicious disruption of electro-mechanical processes in legacy PLCs where each PLC works as a finite state machine (FSM) and goes through predefined states depending on the control flow of the programs and input-output mechanism. The scheme generates a group-signature for a particular stat...
Conference Paper
Connected devices in Internet-of-Things (IoT) framework have become more functional and commonplace in modern day-to-day living recently. One of the major security challenges in IoT framework is authentication and key management and hence, rigorous security analysis of these networked devices has been surfaced on demand. In this work, first we show...
Conference Paper
The widespread advent of Cyber-Physical Systems~(CPS), intertwined with the Internet of Things~(IoT), allows billions of resource-constrained embedded devices to be connected at the same time. While this significantly enhances the scope for productivity, it also throws up security issues which, unless addressed, could lead to catastrophic consequen...
Conference Paper
The Internet of Things (IoT) is envisaged to consist of billions of connected devices coupled with sensors which generate huge volumes of data enabling control-and-command in this paradigm. However, integrity of this data is of utmost concern, and is promisingly addressed leveraging the inherent unreliability of Physically Unclonable Functions (PUF...
Article
Physically Unclonable Function (PUF) circuits are often vulnerable to mathematical model-building attacks. We theoretically quantify the advantage provided to an adversary by any training dataset expansion technique along the lines of security analysis of cryptographic hash functions. We present an algorithm to enumerate certain sets of delay const...
Article
Full-text available
Efficient and secure communication architecture for e-health system is proposed in this paper to support online treatment of patients by medical specialists working in any hospital registered to RA (registration authority). The proposed architecture comprises three actors and two use cases, where the actors like patients and hospitals register them...

Network

Cited By

Projects

Project (1)
Project
Security features are of paramount importance for IoT, and implementations are challenging given the resource-constrained IoT setup. We have developed a lightweight identity-based cryptosystem suitable for IoT, to enable secure authentication and message exchange among the devices. Our scheme employs Physically Unclonable Function (PUF), to generate the public identity of each device, which is used as the public key for each device for message encryption. We have provided formal proofs of security in the Session Key security and Universally Composable Framework of the proposed protocol, which demonstrates the resilience of the scheme against passive as well as active attacks.