Arijit Karati

ORCID: 0000-0001-5605-7354
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cloud Data Security Solutions
  • Cryptographic Implementations and Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Residue Arithmetic
  • IoT and Edge/Fog Computing
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Complexity and Algorithms in Graphs
  • Caching and Content Delivery
  • Coding theory and cryptography
  • Security and Verification in Computing
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Mobile Ad Hoc Networks
  • Biometric Identification and Security
  • Bluetooth and Wireless Communication Technologies
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Security in Wireless Sensor Networks
  • Wireless Body Area Networks
  • Software-Defined Networks and 5G

National Sun Yat-sen University
2018-2024

NIIT University
2017-2018

NIIT (India)
2017-2018

Indian Institute of Technology Dhanbad
2015-2017

In recent years, two technologies, the cloud computing and Internet of Things (IoT), have a synergistic effect in modern organizations as digitization is new business trend for various industries. Therefore, many outsource their crowdsourced industrial-IoT (IIoT) data system to reduce management overhead. However, authentication one fundamental security/trust requirements such IIoT network. The certificateless signature (CLS) scheme cryptographic primitive that provides authenticity systems....

10.1109/tii.2018.2794991 article EN IEEE Transactions on Industrial Informatics 2018-01-18

The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Things (IoT) enabled network. It has emerged as a promising system wherein various data authentication techniques have been introduced using clumsy certificate management and Diffie-Hellman (DH) assumption. However, in the presence quantum cryptanalysis, DH-type problems could be solved polynomial-time. In this paper, novel certificateless protocol is...

10.1109/tvt.2022.3144785 article EN IEEE Transactions on Vehicular Technology 2022-01-25

Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in context industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data order to reduce cost sharing computation. However, privacy such this environment has attracted wide attention across globe. Signcryption is significant cryptographic primitive that meets both requirement authenticity confidentiality among...

10.1109/jiot.2017.2741580 article EN IEEE Internet of Things Journal 2017-08-18

The Internet of Things (IoT) is revolutionizing our modern lives by introducing active connection between smart devices. However, IoT devices are repeatedly exhibiting many security flaws, which will inevitably lead to eavesdropping and impersonation attacks. Thus, providing a proper in becomes prime focus for the researchers. In cryptography, certificateless signcryption (CLSC) one recent public key techniques requirements authenticity confidentiality any message parties. this article, new...

10.1109/jiot.2019.2939204 article EN IEEE Internet of Things Journal 2019-09-04

The concept of two-factor multiserver authentication protocol was developed to avoid multiple number registrations using smart-cards and passwords. Recently, a variety protocols have been developed. It is observed that the existing RSA-based are not suitable in terms computation complexities security attacks. To provide lower resilience against known attacks, this article proposes (password smart-card) user with RSA cryptosystem for environments. comprehensive discussion proved attacks...

10.1155/2017/5989151 article EN cc-by Security and Communication Networks 2017-01-01

Over the past few years, Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled system allows different entities to examine patient's health condition anywhere and anytime. However, deployment systems an IoT environment faces various security privacy challenges. The authentication participating entities, confidentiality information transferred through insecure channel, access control are essential issues be resolved. To settle these challenges, we...

10.1109/jsyst.2020.3016065 article EN IEEE Systems Journal 2020-09-21

Secure and efficient file storage sharing via authenticated physical devices remain challenging to achieve in a cyber-physical cloud environment, particularly due the diversity of used access services data. Thus this paper, we present lightweight identity-based data protocol provide secure among geographically dispersed clients. The proposed is demonstrated resist chosen-ciphertext attack (CCA) under hardness assumption decisional-Strong Diffie-Hellman (SDH) problem. We also evaluate...

10.1109/tcc.2018.2834405 article EN IEEE Transactions on Cloud Computing 2018-05-08

10.1007/s13369-016-2156-9 article EN Arabian Journal for Science and Engineering 2016-05-07

With the advancement of Internet Things, LoRa Alliance produced Long-Range Wide-Area Network (LoRaWAN) Specification, allowing end-devices to transit through a gateway and join network after completing procedure. When an end-device joins LoRaWAN network, it must send request message server wait for verify such under current protocol. However, as number grows exponentially, verification messages will grow linearly with end-devices. This paper proposes authentication system multiple that...

10.3390/electronics11050797 article EN Electronics 2022-03-03

Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends diversity analysis for decision making with minimized costs in communications and storage. However, it is adverse to confidentiality IIoT from owner as access control performed by honest-but-curious platforms. Although encryption strategy guarantees security, hinders deliverance due its inbred all-or-nothing decryption. Certificateless supporting keyword search eliminates overhead certificates privileges retrieve...

10.1109/tii.2021.3112986 article EN IEEE Transactions on Industrial Informatics 2021-09-20

Abstract With the rapid developments in embedded sensor technology, internet of things (IoT) becomes most focused research trend recent years. However, integration such technology into mobile crowdsensing networks results many security challenges. Data confidentiality and authenticity are two key privacy concerns any IoT‐based environment. Focusing on these issues, we present a new cryptographic protocol to meet those Our is based schemes; first an encryption scheme, which utilizes idea...

10.1002/ett.3315 article EN Transactions on Emerging Telecommunications Technologies 2018-05-04

In the password based authenticated protocol, protecting off-line guessing attack is quite intricate owing to its low entropy property. order withstand it, three-factor (e.g., biometric, smartcard and password) authentication now becoming an important research paradigm in information security. Cheng et al.'s suggested key negotiation protocol using biometric Quadratic Residue Problem (QRP), they claim that it robust against known attacks. However, our careful observation demonstrates endures...

10.1109/rait.2016.7507936 article EN 2016-03-01

Abstract Identity‐based encryption (IBE) is one of the important public key techniques where not only identity receiver used for secure and efficient encryption, but it also has several merits over other traditional public‐key ones. However, two main disadvantages many such IBE‐based systems are requirement a large number parameters different random oracle operations, known that due to improper implementation vulnerable under chosen ciphertext attack. This paper designs an IBE scheme...

10.1002/sec.1588 article EN Security and Communication Networks 2016-08-25

Signcryption is one of the recent public key paradigms that satisfies both requirement authenticity and confidentiality messages between parties. However, most all existing schemes use secure channel communication while distributing partial-private-keys to users in network. it not always efficient establish a during interaction entities. To address this issue, paper aims present new certificateless signcryption scheme does consider communication. The proposed designed without considering...

10.1016/j.procs.2020.04.012 article EN Procedia Computer Science 2020-01-01

Signcryption is one of the most recent public key paradigms that fulfills both requirement confidentiality and authenticity messages between parties. It works more efficiently with a cost significantly smaller than required by signature-then-encryption technique. In this work, practically implementable ID-based sigcryption scheme using bilinear pairings presented. The proposed implemented under hardness CDH (Computational Diffie-Hellman) assumption in standard model without random oracle...

10.1109/icacci.2016.7732149 article EN 2016-09-01

Recently, a number of authentication schemes have been designed for Internet Things (IoT). In 2017, Feng et al. proposed an scheme and claimed that their constructed is well secure. However, based on the cryptanalysis, it shown inappropriate its practical use as does not resist several attacks. Thus, vulnerable. To overcome these attacks, this paper aims to design light-weight which resists real-life security challenges. Besides, we compare our with other competitive find satisfactory results.

10.1109/icoin.2018.8343105 article EN 2022 International Conference on Information Networking (ICOIN) 2018-01-01

Recently, various certificate-less signature (CLS) schemes have been developed using bilinear pairing to provide authenticity of message. In 2015, Jia-Lun Tsai proposed a based short scheme elliptic curve cryptography (ECC) and prove its security under random oracle. However, it is shown that the inappropriate for practical use as there no message-signature dependency present during generation verification. Thus, vulnerable. To overcome these attacks, this paper aims variant Tsai's scheme....

10.1145/2979779.2979798 article EN 2016-01-01
Coming Soon ...