ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key C... more ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key Cryptography but still Public Key Cryptography plays a vital role in providing security in secure communication in a Wireless Sensor Network. Due to the memory constraints in wireless sensor nodes, the proposed protocols in the literature are based on the idea of pre-distribution of keys before the deployment of the WSNs but are not able to achieve perfect secrecy and also face the key management problem in large scale WSNs. Whereas Asymmetric Key Cryptography offers a flexible but clean interface for the security component in the WSNs. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a WSN based on Elliptic Curve Cryptography with a novel time stamp mechanism.
SummaryIn an infrastructure‐critical manufacturing industry, continuous monitoring of the assembl... more SummaryIn an infrastructure‐critical manufacturing industry, continuous monitoring of the assembly lines with internet‐integrated sensors in an unforeseeable, stochastic, and harsh environment becomes indispensable for real‐time fault detection, location, and isolation. State‐of‐the‐art literature suggest that the Cognitive Radio‐based Industrial Internet of Things (CR‐IIoTs), a spectrum aware wireless communication paradigm, is best suited for monitoring as they are proficient in overcoming spectrum scarcity in a 2.4‐GHz industrial, scientific, and medical (ISM) band and guarantee a threshold Quality of Service (QoS) in hostile environs. Nonetheless, CR‐IIoTs and the Cognitive Radio‐based network archetype are susceptible to internal and external security threats at the application layer and vulnerable to Spectrum Sensing Data Falsification (SSDF) at Data Link Layer (DLL). In CR‐IIoTs, cooperative spectrum sensing (CSS) is a competent technique to ameliorate the performance of Prim...
Visually impaired people are individuals who have a partial or complete loss of vision. This cond... more Visually impaired people are individuals who have a partial or complete loss of vision. This condition can vary in severity, from mild to profound, and can be caused by a variety of factors, including genetics, injury, illness, or aging. It's important to note that visually impaired people are a diverse group with different needs and abilities, and they should be treated with respect and given equal access to opportunities and resources. Smart applications can be extremely helpful for visually impaired people by providing them with information and assistance in navigating their environment. Moreover, can greatly enhance the independence and quality of life for visually impaired people. Many applications have been proposed with individual features set and other concerns due to are expensive, difficult to use, less affordable, less accessible and are an overhead while travelling. To solving these issues, in this paper we design an android Application - Smart Vision (SV) to aid the...
Peer-to-peer Networking and Applications, Sep 28, 2021
The idea of the Internet of Things (IoT) network has been created as a result of the coordination... more The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.
The idea of the Internet of Things (IoT) network has been created as a result of the coordination... more The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.
Neural Cryptography, the latest emerging trend of cryptocysm whirls around an approach of elimina... more Neural Cryptography, the latest emerging trend of cryptocysm whirls around an approach of eliminating the need of a secure public channel by generating a key on the sender’s as well as the receiver’s side so as to enhance the overall security of a cryptographic system. Image Steganography being a derived rendition of cryptography embeds messages in an image and shares the key over a channel for the decryption while using a symmetric key algorithm thus making it easy for an adversary eavesdropper to get the key and decrypt the message. In this paper a novel approach of symmetric key encryption based on AES-256 bit PRP and Pseudo Random Hash based Neural Cryptographic LSB technique has been proposed to select the bits’ insertion position of secret information for image steganography. In order to increase the security of the communication system, we make the use of Multi Layered Perceptron Neural Networks by using the back propagation algorithm for generating the key and thus eliminati...
2013 27th International Conference on Advanced Information Networking and Applications Workshops
ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key C... more ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key Cryptography but still Public Key Cryptography plays a vital role in providing security in secure communication in a Wireless Sensor Network. Due to the memory constraints in wireless sensor nodes, the proposed protocols in the literature are based on the idea of pre-distribution of keys before the deployment of the WSNs but are not able to achieve perfect secrecy and also face the key management problem in large scale WSNs. Whereas Asymmetric Key Cryptography offers a flexible but clean interface for the security component in the WSNs. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a WSN based on Elliptic Curve Cryptography with a novel time stamp mechanism.
ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key C... more ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key Cryptography but still Public Key Cryptography plays a vital role in providing security in secure communication in a Wireless Sensor Network. Due to the memory constraints in wireless sensor nodes, the proposed protocols in the literature are based on the idea of pre-distribution of keys before the deployment of the WSNs but are not able to achieve perfect secrecy and also face the key management problem in large scale WSNs. Whereas Asymmetric Key Cryptography offers a flexible but clean interface for the security component in the WSNs. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a WSN based on Elliptic Curve Cryptography with a novel time stamp mechanism.
SummaryIn an infrastructure‐critical manufacturing industry, continuous monitoring of the assembl... more SummaryIn an infrastructure‐critical manufacturing industry, continuous monitoring of the assembly lines with internet‐integrated sensors in an unforeseeable, stochastic, and harsh environment becomes indispensable for real‐time fault detection, location, and isolation. State‐of‐the‐art literature suggest that the Cognitive Radio‐based Industrial Internet of Things (CR‐IIoTs), a spectrum aware wireless communication paradigm, is best suited for monitoring as they are proficient in overcoming spectrum scarcity in a 2.4‐GHz industrial, scientific, and medical (ISM) band and guarantee a threshold Quality of Service (QoS) in hostile environs. Nonetheless, CR‐IIoTs and the Cognitive Radio‐based network archetype are susceptible to internal and external security threats at the application layer and vulnerable to Spectrum Sensing Data Falsification (SSDF) at Data Link Layer (DLL). In CR‐IIoTs, cooperative spectrum sensing (CSS) is a competent technique to ameliorate the performance of Prim...
Visually impaired people are individuals who have a partial or complete loss of vision. This cond... more Visually impaired people are individuals who have a partial or complete loss of vision. This condition can vary in severity, from mild to profound, and can be caused by a variety of factors, including genetics, injury, illness, or aging. It's important to note that visually impaired people are a diverse group with different needs and abilities, and they should be treated with respect and given equal access to opportunities and resources. Smart applications can be extremely helpful for visually impaired people by providing them with information and assistance in navigating their environment. Moreover, can greatly enhance the independence and quality of life for visually impaired people. Many applications have been proposed with individual features set and other concerns due to are expensive, difficult to use, less affordable, less accessible and are an overhead while travelling. To solving these issues, in this paper we design an android Application - Smart Vision (SV) to aid the...
Peer-to-peer Networking and Applications, Sep 28, 2021
The idea of the Internet of Things (IoT) network has been created as a result of the coordination... more The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.
The idea of the Internet of Things (IoT) network has been created as a result of the coordination... more The idea of the Internet of Things (IoT) network has been created as a result of the coordination of different developments, constant handling, intellectual capacity, item sensors, and inserted frameworks. Recently, IoT devices have made big impact on industrial critical infrastructures. However, security and privacy of IoT critical infrastructure still, is the big concern. Therefore, to address the vulnerabilities of the existing frameworks, this paper proposes a cryptographically secure privacy-preserving authenticated key agreement scheme for a IoT network through an elliptical curve, which generates a mutual key between the user and the device. The safety review and systematic testing of the system using the Automated Validation of Internet Security Protocols and Applications (AVISPA) method have been carried out to show the protection quality of the system. The quality review reveals that the scheme is lightweight and effective. By comparison, the proposed scheme is found to be comparable to the related works, and the current framework offers additional features such as Key Compromise Impersonate Attack Resistance, Established Session Key Protection, Key Replication Resistance, in addition to existing features.
Neural Cryptography, the latest emerging trend of cryptocysm whirls around an approach of elimina... more Neural Cryptography, the latest emerging trend of cryptocysm whirls around an approach of eliminating the need of a secure public channel by generating a key on the sender’s as well as the receiver’s side so as to enhance the overall security of a cryptographic system. Image Steganography being a derived rendition of cryptography embeds messages in an image and shares the key over a channel for the decryption while using a symmetric key algorithm thus making it easy for an adversary eavesdropper to get the key and decrypt the message. In this paper a novel approach of symmetric key encryption based on AES-256 bit PRP and Pseudo Random Hash based Neural Cryptographic LSB technique has been proposed to select the bits’ insertion position of secret information for image steganography. In order to increase the security of the communication system, we make the use of Multi Layered Perceptron Neural Networks by using the back propagation algorithm for generating the key and thus eliminati...
2013 27th International Conference on Advanced Information Networking and Applications Workshops
ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key C... more ABSTRACT Although the security in WSNs is currently being provided through mostly Symmetric Key Cryptography but still Public Key Cryptography plays a vital role in providing security in secure communication in a Wireless Sensor Network. Due to the memory constraints in wireless sensor nodes, the proposed protocols in the literature are based on the idea of pre-distribution of keys before the deployment of the WSNs but are not able to achieve perfect secrecy and also face the key management problem in large scale WSNs. Whereas Asymmetric Key Cryptography offers a flexible but clean interface for the security component in the WSNs. This paper proposes a new mutual authentication and key management scheme for a particular session between any two corresponding nodes of a WSN based on Elliptic Curve Cryptography with a novel time stamp mechanism.
Uploads
Papers by Gaurav Indra