SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Medieteknik) ;pers:(Kumar Neeraj)"

Sökning: hsv:(NATURVETENSKAP) hsv:(Data och informationsvetenskap) hsv:(Medieteknik) > Kumar Neeraj

  • Resultat 1-10 av 10
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Challa, Srinavi, et al. (författare)
  • An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
  • 2017
  • Ingår i: Computers & electrical engineering. - : Elsevier. - 0045-7906 .- 1879-0755. ; 69, s. 534-554
  • Tidskriftsartikel (refereegranskat)abstract
    • We first show the security limitations of a recent user authentication scheme proposed for wireless healthcare sensor networks. We then present a provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. The proposed scheme supports functionality features, such as dynamic sensor node addition, password as well as biometrics update, smart card revocation along with other usual features required for user authentication in wireless sensor networks. Our scheme is shown to be secure through the rigorous formal security analysis under the Real-Or-Random (ROR) model and broadly-accepted Burrows-Abadi-Needham (BAN) logic. Furthermore, the simulation through the widely-known Automated Validation of Internet Security Protocols and Applications (AVISPA) tool shows that our scheme is also secure. High security, and low communication and computation costs make our scheme more suitable for practical application in healthcare applications as compared to other related existing schemes.
  •  
2.
  • Chatterjee, Santanu, et al. (författare)
  • Secure Biometric-Based Authentication Schemeusing Chebyshev Chaotic Map for Multi-Server Environment
  • 2018
  • Ingår i: IEEE Transactions on Dependable and Secure Computing. - Piscataway, NJ : IEEE. - 1545-5971 .- 1941-0018. ; 15:5, s. 824-839
  • Tidskriftsartikel (refereegranskat)abstract
    • Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to various servers using single identity and password. We introduce a new authentication scheme for multi-server environments using Chebyshev chaotic map. In our scheme, we use the Chebyshev chaotic map and biometric verification along with password verification for authorization and access to various application servers. The proposed scheme is light-weight compared to other related schemes. We only use the Chebyshev chaotic map, cryptographic hash function and symmetric key encryption-decryption in the proposed scheme. Our scheme provides strong authentication, and also supports biometrics & password change phase by a legitimate user at any time locally, and dynamic server addition phase. We perform the formal security verification using the broadly-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that the presented scheme is secure. In addition, we use the formal security analysis using the Burrows-Abadi-Needham (BAN) logic along with random oracle models and prove that our scheme is secure against different known attacks. High security and significantly low computation and communication costs make our scheme is very suitable for multi-server environments as compared to other existing related schemes.
  •  
3.
  • Jindal, Anish, et al. (författare)
  • An efficient fuzzy rule-based big data analytics scheme for providing healthcare-as-a-service
  • 2017
  • Ingår i: IEEE International Conference on Communications. - Piscataway, NJ : Institute of Electrical and Electronics Engineers (IEEE). - 9781467389990
  • Konferensbidrag (refereegranskat)abstract
    • With advancements in information and communication technology (ICT), there is an increase in the number of users availing remote healthcare applications. The data collected about the patients in these applications varies with respect to volume, velocity, variety, veracity, and value. To process such a large collection of heterogeneous data is one of the biggest challenges that needs a specialized approach. To address this issue, a new fuzzy rule-based classifier for big data handling using cloud-based infrastructure is presented in this paper, with an aim to provide Healthcare-as-a-Service (HaaS) to the users located at remote locations. The proposed scheme is based upon the cluster formation using the modified Expectation-Maximization (EM) algorithm and processing of the big data on the cloud environment. Then, a fuzzy rule-based classifier is designed for an efficient decision making about the data classification in the proposed scheme. The proposed scheme is evaluated with respect to different evaluation metrics such as classification time, response time, accuracy and false positive rate. The results obtained are compared with the standard techniques to confirm the effectiveness of the proposed scheme.
  •  
4.
  • Kumar Das, Ashok, et al. (författare)
  • Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
  • 2018
  • Ingår i: IEEE Internet of Things Journal. - Piscataway, NJ : IEEE. - 2327-4662. ; 5:6, s. 4900-4913
  • Tidskriftsartikel (refereegranskat)abstract
    • Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things (IIoT) becomes popular in recent years. However, as the smart devices share the information with each other using an open channel, i.e., Internet, so security and privacy of the shared information remains a paramount concern. There exist some solutions in the literature for preserving security and privacy in IIoT environment. However, due to their heavy computation and communication overheads, these solutions may not be applicable to wide category of applications in IIoT environment. Hence, in this paper, we propose a new Biometric-based Privacy Preserving User Authentication (BP2UA) scheme for cloud-based IIoT deployment. BP2UA consists of strong authentication between users and smart devices using pre-established key agreement between smart devices and the gateway node. The formal security analysis of BP2UA using the well-known ROR model is provided to prove its session key security. Moreover, an informal security analysis of BP2UA is also given to show its robustness against various types of known attacks. The computation and communication costs of BP2UA in comparison to the other existing schemes of its category demonstrate its effectiveness in the IIoT environment. Finally, the practical demonstration of BP2UA is also done using the NS2 simulation.
  •  
5.
  • Kumar, Neeraj, et al. (författare)
  • A Multi-Tenant Cloud-Based DC Nano Grid for Self-Sustained Smart Buildings in Smart Cities
  • 2017
  • Ingår i: IEEE Communications Magazine. - : IEEE. - 0163-6804 .- 1558-1896. ; 55:3, s. 14-21
  • Tidskriftsartikel (refereegranskat)abstract
    • Energy is one of the most valuable resources of the modern era and needs to be consumed in an optimized manner by an intelligent usage of various smart devices, which are major sources of energy consumption nowadays. With the popularity of low-voltage DC appliances such as-LEDs, computers, and laptops, there arises a need to design new solutions for self-sustainable smart energy buildings containing these appliances. These smart buildings constitute the next generation smart cities. Keeping focus on these points, this article proposes a cloud-assisted DC nanogrid for self-sustainable smart buildings in next generation smart cities. As there may be a large number of such smart buildings in different smart cities in the near future, a huge amount of data with respect to demand and generation of electricity is expected to be generated from all such buildings. This data would be of heterogeneous types as it would be generated from different types of appliances in these smart buildings. To handle this situation, we have used a cloud-based infrastructure to make intelligent decisions with respect to the energy usage of various appliances. This results in an uninterrupted DC power supply to all low-voltage DC appliances with minimal dependence on the grid. Hence, the extra burden on the main grid in peak hours is reduced as buildings in smart cities would be self-sustainable with respect to their energy demands
  •  
6.
  • Kumar, Neeraj, et al. (författare)
  • Energy Management for Cyber-Physical Cloud Systems
  • 2020
  • Ingår i: Future Generation Computer Systems. - : Elsevier. - 0167-739X .- 1872-7115. ; 105, s. 754-756
  • Tidskriftsartikel (övrigt vetenskapligt/konstnärligt)
  •  
7.
  • Wazid, Mohammad, et al. (författare)
  • A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
  • 2018
  • Ingår i: IEEE journal of biomedical and health informatics. - : Institute of Electrical and Electronics Engineers (IEEE). - 2168-2194 .- 2168-2208. ; 22:4, s. 1299-1309
  • Tidskriftsartikel (refereegranskat)abstract
    • Implantable medical devices (IMDs) are man-made devices, which can be implanted in the human body to improve the functioning of various organs. The IMDs monitor and treat physiological condition of the human being (for example, monitoring of blood glucose level by insulin pump). The advancement of information and communication technology (ICT) enhances the communication capabilities of IMDs. In healthcare applications, after mutual authentication, a user (for example, doctor) can access the health data from the IMDs implanted in a patient's body. However, in this kind of communication environment, there are always security and privacy issues such as leakage of health data and malfunctioning of IMDs by an unauthorized access.
  •  
8.
  • Wazid, Mohammad, et al. (författare)
  • Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
  • 2019
  • Ingår i: IEEE Internet of Things Journal. - : IEEE. - 2327-4662. ; 6:2, s. 3572-3584
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.
  •  
9.
  • Wazid, Mohammad, et al. (författare)
  • Design of secure key management and user authentication scheme for fog computing services
  • 2019
  • Ingår i: Future Generation Computer Systems. - : Elsevier. - 0167-739X .- 1872-7115. ; 91, s. 475-492
  • Tidskriftsartikel (refereegranskat)abstract
    • Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.
  •  
10.
  • Wazid, Mohammad, et al. (författare)
  • Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
  • 2017
  • Ingår i: IEEE Internet of Things Journal. - : Institute of Electrical and Electronics Engineers (IEEE). - 2327-4662. ; 4:5, s. 1634-1646
  • Tidskriftsartikel (refereegranskat)abstract
    • A counterfeit drug is a medication or pharmaceutical product which is manufactured and made available on the market to deceptively represent its origin, authenticity and effectiveness, etc., and causes serious threats to the health of a patient. Counterfeited medicines have an adverse effect on the public health and cause revenue loss to the legitimate manufacturing organizations. In this paper, we propose a new authentication scheme for medicine anti-counterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms). The proposed scheme utilizes the near field communication (NFC) and is suitable for mobile environment, which also provides efficient NFC update phase. The security analysis using the widely accepted real-or-random model proves that the proposed scheme provides the session key security. The proposed scheme also protects other known attacks which are analyzed informally. Furthermore, the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool shows that the proposed scheme is secure. The scheme is efficient with respect to computation and communication costs, and also it provides additional functionality features when compared to other existing schemes. Finally, for demonstration of the practicality of the scheme, we evaluate it using the broadly accepted NS2 simulation
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 10

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy