Skip to main content
COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the... more
COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the use of existing infrastructure, technologies such as artificial intelligence, neural network, blockchain technology, cloud computing, drone-based monitoring, etc have given the important observations and awareness to many It is observed that with the combined efforts of technology and healthcare system, recognition of the outbreak is much faster compared to earlier infections However, many are working continuously to collect and analyze the available COVID-19-related data and introspect the future The whole of this work is performed to maximize the use of technology and reduce the risk of a continuous outbreak This work has discussed the recent work done over the use of technologies in handling the COVID-19 scenario Here, a comparative analysis of various parameters in each technological aspect is discussed to have an understanding of the preferred approaches in different places Further, brief surveys are conducted in each technological aspect for a better understanding of technological advantage in handling pandemic © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG
In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities... more
In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data...
The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers... more
The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers whereas multi-stage detection detect outliers at MAC, routing and application layer. A novel trust management mechanism is proposed for trust based outlier detection followed by internal and external indices for second stage filtering and outlier detection. Thereafter, performance of individual and group nodes is measured for outlier detection and subsequent processing. Simulation results shows cluster stability with different number of clusters. Maximum stability for 0 to 500 nodes (small scale network) is observed with 25 clusters, 500 to 3000 nodes (medium scale network) is observed with 39 clusters and 3000 to 5000 nodes (large scale network) is observed with 52 clusters. The proposed approach shows cluster stability of 61% (approax.).
In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security... more
In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.
With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or... more
With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and... more
A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a... more
Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.
The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption,... more
The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption, lightweight key exchange and lightweight authentication using hashing mechanism are conducted in this work. The parameters taken for software comparison are: high throughput, minimum delay and for hardware are: minimum gate equivalents (GE) and minimum power consumption. Cryptographic primitives are combined using two scenarios: (i) authentication to plaintext and confidentiality to message_to_send and (ii) confidentiality to plaintext and authentication to message_to_send. Two combinations are having similar results comparisons but authentication to plaintext and confidentiality to message_to_send is more meaningful. Furthermore, these two combinations provide implementation of cryptographic primitives with 30% of total GE at 52 μW. Thus, these are two complete cryptographic solutions with ultra-lightweight features which are suitable for extremely resource constraint environments such as mobile sensor devices.
This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work,... more
This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and hardware parameters; area consumption in terms of gate equivalents (GE); are taken into consideration. An integration proposal of these cryptography primitives has been proposed and it has been observed that these primitives can be clubbed with hardware cost of 36.5% of the total GE with maximum through and minimum delay using Destination Sequenced Distance Vector (DSDV) protocol.
With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency,... more
With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.
This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on... more
This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on health score. This accumulation is further lightened using four lightweight strategies: lightweight or ultra lightweight vibration mechanism, lightweight trust computation, lightweight key management and lightweight subgroup formation. In continuation, analysis of trust evaluation against different attacks is also presented. Simulation shows that the proposed system can improve the network performance as well as effectively provide protection against various attacks.
In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs... more
In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs (Mobile Ad Hoc Networks) and further network performance is analyzed to calculate efficient processing unit in a partially distributed key management environment. To manipulate the
With the daily rapid growth in the number of newly confirmed and suspected Coronavirus cases, Coronavirus extremely threatens public health, countries’ economic, social life, and international relations around the world In the fight... more
With the daily rapid growth in the number of newly confirmed and suspected Coronavirus cases, Coronavirus extremely threatens public health, countries’ economic, social life, and international relations around the world In the fight against Coronavirus, Unmanned Aerial Vehicles (UAV) or drones can play a significant role in many aspects to limit the spread of this pandemic Also, the strategic planning of many governments such as in China for controlling this crisis is supported by the use of drones for the Coronavirus outbreak This chapter explores the possibilities and opportunities of UAV, also called drones in fighting Coronavirus Drones are introduced, showing their main findings to make it easy for researchers to investigate new techniques that will help the healthcare sector worker and reduce the spread of Coronavirus pandemic The chapter also presents some problems and challenges that can help healthcare sectors and curbing the Coronavirus spread © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG
Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and... more
Interconnection of devices through Radio Frequency IDentification (RFID) brings enormous applications that are increasing constantly day by day. Due to the rapid growth of such applications, security of RFID networks becomes crucial and is a major challenge. Classical or lightweight cryptography primitives and protocols are the solutions to enhance the security standards in such networks. Authentication protocols are one of the important security protocols required to be integrated before exchange of secured information. This work surveyed the recently developed authentication protocols. Further, classifications, security challenges, and attack analysis are explored. A comparative analysis of different types of authentication protocols explains their applications in resourceful and resource constraint Internet of Things (IoT). Authentication protocols are categorized into: symmetric, asymmetric, lightweight, ultra-lightweight and group protocols. Symmetric and asymmetric protocols a...
Lightweight cryptography is an efficient security mechanism for resource constraint devices. Cryptography is broadly classified into lightweight primitives and protocols. Lightweight protocols are further classified as identification,... more
Lightweight cryptography is an efficient security mechanism for resource constraint devices. Cryptography is broadly classified into lightweight primitives and protocols. Lightweight protocols are further classified as identification, authentication, yoking, tag and ownership transfer etc. In this work tree based lightweight identification mechanism is proposed with probability analysis to protect the system from various attacks: mafia fraud attack and sybil attack. Performance analysis shows that Ad-hoc On demand Distance Vector (AODV) routing protocol outperforms Dynamic Source Routing (DSR) protocol for 50, 100 and 150 nodes. Percentage increase in throughput is more than 30% and decrease in delay is less than 40% for both protocols.
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and... more
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research questions (RQ) that show the assessment and interpretation process step by step. Based on the parameters and RQ specified in the research methodology section, a total of 43 primary articles have been selected from the 251 articles extracted from various scientific databases. The majority of these articles are concerned with evaluating the existing self-sovereign identity (SSI) solutions and their role in the blockchain-based land registry system to address the compliance issues in the existing SSI solutions with SSI principles and find the best possible SSI solution to address the identity problems in the land registry. The existing digital identity solutions cannot h...
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial intelligence, allowing digital transformation in autonomous vehicles. IA can completely replace humans with automation with better safety and... more
Intelligent Automation (IA) in automobiles combines robotic process automation and artificial intelligence, allowing digital transformation in autonomous vehicles. IA can completely replace humans with automation with better safety and intelligent movement of vehicles. This work surveys those recent methodologies and their comparative analysis, which use artificial intelligence, machine learning, and IoT in autonomous vehicles. With the shift from manual to automation, there is a need to understand risk mitigation technologies. Thus, this work surveys the safety standards and challenges associated with autonomous vehicles in context of object detection, cybersecurity, and V2X privacy. Additionally, the conceptual autonomous technology risks and benefits are listed to study the consideration of artificial intelligence as an essential factor in handling futuristic vehicles. Researchers and organizations are innovating efficient tools and frameworks for autonomous vehicles. In this sur...
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath... more
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. In the wireless communication system, there exist degradation factors such as signal fading, multipath transmission, signal inferences, bandwidth limitation and so on. In addition to these degradation factors, the wireless transmission is not a secure environment. The information might be leaked during the transmission. Currently , the issues of privacy and security have become increasingly important for the mobile users. Traditionally, the security scheme is applied to the higher network layer. Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. Within information theoretic security characterizes the fundamental ability of the physical layer to provide a secure transmission. Hence, this work concentrates on the secure cooperative ...
1Jackson School of Geosciences, University of Texas at Austin, Austin, USA 2Indian Institute of Tropical Meteorology, Ministry of Earth Sciences, India 3Krea University, Sri City, India 4Department of Systemics, School of Computer... more
1Jackson School of Geosciences, University of Texas at Austin, Austin, USA 2Indian Institute of Tropical Meteorology, Ministry of Earth Sciences, India 3Krea University, Sri City, India 4Department of Systemics, School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India 5School of Electronic Engineering and Computer Science, Queen Mary University of London, Mile End Rd, Bethnal Green, London E1 4NS, UK
In the recent era of the Internet of Things, the dominant role of sensors and the Internet provides a solution to a wide variety of real-life problems. Such applications include smart city, smart healthcare systems, smart building, smart... more
In the recent era of the Internet of Things, the dominant role of sensors and the Internet provides a solution to a wide variety of real-life problems. Such applications include smart city, smart healthcare systems, smart building, smart transport and smart environment. However, the real-time IoT sensor data include several challenges, such as a deluge of unclean sensor data and a high resource-consumption cost. As such, this paper addresses how to process IoT sensor data, fusion with other data sources, and analyses to produce knowledgeable insight into hidden data patterns for rapid decision-making. This paper addresses the data processing techniques such as data denoising, data outlier detection, missing data imputation and data aggregation. Further, it elaborates on the necessity of data fusion and various data fusion methods such as direct fusion, associated feature extraction, and identity declaration data fusion. This paper also aims to address data analysis integration with ...
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems,... more
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to provide security. In this work, a novel approach is designed to secure the RFID-Sensor based MANET that uses ECC for assigning identification to resource constrained mobile nodes. This assignment helps to create centralized environment with subgroups, groups and hierarchies. Group or subgroups boundaries are limited through distance bounding protocols. Trust management plays the role of maintaining the relationship between nodes for long endeavor. Probability analysis of distance bounding protocol shows that the proposed approach is protected from mafia fraud, distance fraud, terr...
Designing an outlier detection process for unknown resources is a challenging task. It may contain resourceful or resource-constrained devices. In this work, a multi-regional and multi-layered outlier detection process is proposed.... more
Designing an outlier detection process for unknown resources is a challenging task. It may contain resourceful or resource-constrained devices. In this work, a multi-regional and multi-layered outlier detection process is proposed. Proposed approach implements MAC, routing and application layer outlier detection processes in three different regions. These regions are designed with priority of resources and importance of stakeholder taken into considerations. Similar outlier processed with different datasets is used for outlier detection in this multi-region invigilator architecture. Proposed architecture is verified through internal, external and performance based indices. Simulation results shows the cluster stability in process of data formalization and outlier detection. Internal and external indices shows that the maximum stability is possible with 5 to 500 nodes and 26 clusters for small scale network, 500 to 3000 nodes with 41 clusters for medium scale network and 3000 to 6000...
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio... more
Internet of Things (IoT) is a pervasive environment to interconnect the things like: smart objects, devices etc. in a structure like internet. Things can be interconnected in IoT if these are uniquely addressable and identifiable. Radio Frequency Identification (RFID) is one the important radio frequency based addressing scheme in IoT. Major security challenge in resource constraint RFID networks is how to achieve traditional CIA security i.e. Confidentiality, Integrity and Authentication. Computational and communication costs for Lightweight Mutual Authentication Protocol (LMAP), RFID mutual Authentication Protocol with Permutation (RAPP) and kazahaya authentication protocols are analyzed. These authentication protocols are modeled to analyze the delays using lightweight modeling language. Delay analysis is performed using alloy model over LMAP, RAPP and kazahaya authentication protocols where one datacenter (DC) is connected to different number of readers (1,5 or 10) with connecti...
Number of keys used to convert plaintext to ciphertext. For example, symmetric/single or asymmetric/two key/public key. Key is an element which can be either numeric or non-numeric, which when applied to a given message results in a... more
Number of keys used to convert plaintext to ciphertext. For example, symmetric/single or asymmetric/two key/public key. Key is an element which can be either numeric or non-numeric, which when applied to a given message results in a encrypted message. Key can be implicitly or explicitly derived from plaintext. Implicit key derivation is also known as auto keying, where the derived key is a part of the plaintext. Explicit key or individual key is a key that is not a part of the plaintext. For a secure communication to take place, the life cycle of key involves: initialization, agreement, distribution and cancellation. This entire process is also known as key management.