- Wireless Networks and Protocols
- Smart Grid Security and Resilience
- Physical Unclonable Functions (PUFs) and Hardware Security
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Network Traffic and Congestion Control
- Advanced Wireless Network Optimization
- Advanced MIMO Systems Optimization
- Energy Harvesting in Wireless Networks
- Opportunistic and Delay-Tolerant Networks
- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- UAV Applications and Optimization
- Software-Defined Networks and 5G
- Wireless Communication Networks Research
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
National University of Singapore
2016-2025
Birla Institute of Technology and Science, Pilani
2023-2024
National Institute of Pharmaceutical Education and Research
2020
AGH University of Krakow
2018
University of Southern California
2017
Rensselaer Polytechnic Institute
2006-2015
Institut national de recherche en informatique et en automatique
2002
Indian Institute of Technology Kanpur
2000
The Internet of Things (IoT) is the next era communication. Using IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks are trying empower inanimate act without any human intervention. existing upcoming highly promising increase level comfort, efficiency, automation for users. To able implement such world an ever-growing fashion requires high security, privacy, authentication, recovery...
Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical cloning attacks. Therefore, any protocol designed should be robust even cases when device captured by adversary. Moreover, many have limited storage computational capabilities. Hence, it desirable that solutions computationally efficient. To address all these requirements, this paper, we present a lightweight...
As consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, this article, we describe common attacks faced by IoT and suggest potential mitigation strategies. We hope that findings presented article will inform future design devices.
The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause paradigm shift the way we work, interact, think. IoT devices are usually small, low cost, have limited resources, makes them vulnerable physical, side-channel, cloning attacks. Therefore, any protocol designed for systems should not only be secure but also efficient terms usage chip area, energy, storage, processing. To address this issue, present light-weight...
With the growing interest in use of autonomous computing, sensing and actuating devices for various applications such as smart grids, home networking, environments cities, health care, machine-to-machine (M2M) communication has become an important networking paradigm. However, order to fully exploit facilitated by M2M communications, adequate support from all layers network stack must first be provided meet their service requirements. This paper presents a survey requirements, technical...
Recent developments in IoT have facilitated advancements the Internet of Vehicles (IoV) with autonomous vehicles and roadside infrastructure as its key components. IoV aims to provide new innovative services for different modes transport adaptive traffic management enables broadcast messages improve safety efficiency. However, due nontrusted environments, it is difficult evaluate credibility that they receive. Therefore, trust establishment a security concern constantly limited by...
Generative Artificial Intelligence (GAI) has sparked a transformative wave across various domains, including machine learning, healthcare, business, and entertainment, owing to its remarkable ability generate lifelike data. This comprehensive survey offers meticulous examination of the privacy security challenges inherent GAI. It provides five pivotal perspectives essential for understanding these intricacies. The paper encompasses discussions on GAI architectures, diverse generative model...
This research paper intends to provide real-life applications of Generative AI (GAI) in the cybersecurity domain. The frequency, sophistication and impact cyber threats have continued rise today's world. ever-evolving threat landscape poses challenges for organizations security professionals who continue looking better solutions tackle these threats. GAI technology provides an effective way them address issues automated manner with increasing efficiency. It enables work on more critical...
With recent advances in device fabrication technology, economical deployment of large scale sensor networks, capable pervasive monitoring and control physical systems have become possible. Scalability, low overhead anti distributed functionality are some the key requirements for any protocol designed such networks. In this paper, we present a protocol, Distributed Predictive Tracking, one most likely applications networks: tracking moving targets. The uses clustering based approach...
We present an analytic model for evaluating the queueing delays at nodes in IEEE 802.11 MAC based wireless network. The can account arbitrary arrival patterns, packet size distributions and number of nodes. Our gives closed form expressions obtaining delay queue length characteristics. each node as a discrete time G/G/1 derive service distribution while accounting factors including channel access due to shared medium, impact collisions, resulting backoffs well distribution. is also extended...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> In this paper, we present an analytic model for evaluating the queueing delays and channel access times at nodes in wireless networks using IEEE 802.11 Distributed Coordination Function (DCF) as MAC protocol. The can account arbitrary arrival patterns, packet size distributions number of nodes. Our gives closed form expressions obtaining delay queue length characteristics models each node a...
Information and communication technologies (ICT) are one of the underpinning platforms smart grids, facilitating efficient grid management operation, optimization resource utilization, as well enabling new products, features, services. However, this interconnection technology with ICT leads to various security challenges in power grid. One such concern is tampering usage data from meters which may result not only incorrect billing, but also decisions related demand supply management. In...
This paper addresses the problem of developing energy efficient transmission strategies for Body Sensor Networks (BSNs) with harvesting. It is assumed that multiple modes allow a tradeoff between consumption and packet error probability are available to sensor nodes. Taking into account harvesting capabilities nodes, decision policies developed determine mode use at given instant time in order maximize quality coverage. The formulated as Markov Decision Process (MDP) performance policy thus...
One of the most important and critical requirements for Internet Vehicles (IoV) is security under strict latency. Typically, authentication protocols vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced application traffic increased overhead. Moreover, mobile nature vehicles makes them a prime target physical, side channel, cloning attacks. To address these issues, this article presents an efficient protocol IoV. The proposed uses physical unclonable...
The advent of Internet Things (IoT) has escalated the information sharing among various smart devices by many folds, irrespective their geographical locations. Recently, applications like e-healthcare monitoring attracted wide attention from research community, where both security and effectiveness system are greatly imperative. However, to best our knowledge none existing literature can accomplish these objectives (e.g., systems not secure against physical attacks). This paper addresses...
Electric vehicles (EVs) have been slowly replacing conventional fuel based since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities and Vehicle-Smart Grid ecosystem, commonly called V2G can be achieved. This would encourage people to switch or Plug-in Hybrid Vehicles (PHEVs), positively aid load management on power present economic benefits all entities involved such an ecosystem. Nonetheless, privacy security...
The increasing deployment of cellular networks across the globe has brought two issues to forefront: energy cost running these and associated environmental impact. Also, most recent growth in been developing countries, where unavailability reliable electricity grids forces operators use sources like diesel generators for power, which not only increases operating costs but also contributes pollution. Cellular base stations powered by renewable such as solar power have emerged one promising...
The development of Internet Things (IoT) has paved way for the Vehicles (IoV) and intelligent transportation systems (ITS). Vehicular ad-hoc networks (VANETs) are indispensable ITS with vehicles (IV) as their key players. To ensure proper reliable VANET operation, IVs need secure inter- intra-network communication trust reliability data (provenance). This paper aims to provide management in VANETs by proposing a trustless system model using blockchain certificate authority (CA) registering...
The number of Internet Things (IoT) devices is expected to grow exponentially in the near future and produce large amounts potentially sensitive data. simple low cost nature IoT makes them an attractive target for spoofing or impersonation attacks. To solve this issue, paper proposes a two-factor authentication protocol using physically unclonable functions characteristics wireless signal from device. security analysis results on MICAz motes shows that proposed can be used as effective tool...
The concept of smart metering allows real-time measurement power demand which in turn is expected to result more efficient energy use and better load balancing. However, finely granular measurements reported by meters can lead starkly increased exposure sensitive information, including various personal attributes activities. Even though several security solutions have been proposed recent years address this issue, most the existing are based on public-key cryptographic primitives, such as...
The energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems support open innovation. EI provides bidirectional for analysis improvement of usage between service providers customers. To ensure secure, reliable, efficient operation, the should be protected from cyber attacks. Thus, secure key establishment is an important issue this Internet-based smart environment. In paper, we propose...
There has been a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, several applications. In many application scenarios, UAVs are deployed missions where sensitive data is collected, such monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to and/or safety nature collected these applications, it imperative consider security, privacy aspects used scenarios. this article, we propose an efficient aware...
This article provides a literature review of state-of-the-art machine learning (ML) algorithms for disaster and pandemic management. Most nations are concerned about disasters pandemics, which, in general, highly unlikely events. To date, various technologies, such as IoT, object sensing, UAV, 5G, cellular networks, smartphone-based system, satellite-based systems have been used ML can handle multidimensional, large volumes data that occur naturally environments related to management...