Project

Security and Privacy in Computing and Communications: A Cryptography-Based Approach

Goal: We explore various cryptographic protocols and algorithms for enforcing security and privacy in computing and communications systems. The objective is to design application-specific cryptography-based algorithms which are computationally efficient and security strength- wise robust.

Updates
0 new
0
Recommendations
0 new
0
Followers
0 new
7
Reads
0 new
54

Project log

Jaydip Sen
added a research item
With this rapid transformation of the computing and communication world, information-system security has moved from a largely self-contained bounded environment interacting with a generally known and disciplined user community to a worldwide scope with a body of users that may not be known and are not necessarily trusted. Importantly, security control now must deal with circumstances over which there is largely no control or expectation of avoiding their impact. Computer security, as it has evolved, shares a similarity with liability assurance: they each face a threat environment that is known in a very general way and can face attacks over a broad spectrum of sources. However, the exact details or even time or certainty of an attack are unknown until an incident occurs. The purpose of this book is to discuss some of the critical security challenges in today’s computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches to cryptography and other security solutions. With this objective, the book invites contributions from researchers in the field of cryptography and its applications in network security. Some illustrative topics of interest (but not limited to) are cryptography algorithms, authentication, authorization, integrity, confidentiality, privacy, security in wireless networks, security in wireless local area networks, wireless sensor networks, wireless ad hoc networks, vehicular ad hoc networks, security and privacy in the Internet of Things. Privacy of information, Blockchains, and Machine Learning in Security are three additional topics that the book will also deal with.
Jaydip Sen
added a research item
In the era of Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduate and doctoral students who are working in the field of cryptography, network security and security and privacy issues in the Internet of Things (IoT), and machine learning application in security. It will also be useful for faculty members of graduate schools and universities
Jaydip Sen
added a research item
Machine learning and data mining algorithms play important roles in designing intrusion detection systems. Based on their approaches towards the detection of attacks in a network, intrusion detection systems can be broadly categorized into two types. In the misuse detection systems, an attack in a system is detected whenever the sequence of activities in the network match with a known attack signature. In the anomaly detection approach, on the other hand, anomalous states in a system are identified based on a significant difference in the state transitions of the system from its normal states. This chapter presents a comprehensive discussion on some of the existing schemes of intrusion detection based on misuse detection, anomaly detection and hybrid detection approaches. Some future directions of research in the design of algorithms for intrusion detection are also identified.
Jaydip Sen
added 11 research items
This presentation is on an identity-based signature scheme that is secure and resistant to key replay attack. It also avoids the key escrow problem thereby making it suitable for deployment in real-world applications.
This presentation was delivered as an invited tutorial on September 17, 2010 in the 1st IEEE International Conference on Computing and Communication Technology (ICCCT 2010), which was organized in MNNIT, Allahabd, India. It disscused the technologies, security issues and their solutions in wireless local area networks (WLANs).
This presentation was delivered as an invited tutorial delivered in the Faculty development Program (FDP), which was organized in Bengal Institute of Technology and Management (BITM) on April 16, 2010, in Shantiniketan, West Bengal, India. It presents fundamental concepts of cryptography and network security.
Jaydip Sen
added a project goal
We explore various cryptographic protocols and algorithms for enforcing security and privacy in computing and communications systems. The objective is to design application-specific cryptography-based algorithms which are computationally efficient and security strength- wise robust.