Biplab Sikdar

ORCID: 0000-0002-0084-4647
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Smart Grid Security and Resilience
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Network Traffic and Congestion Control
  • Advanced Wireless Network Optimization
  • Advanced MIMO Systems Optimization
  • Energy Harvesting in Wireless Networks
  • Opportunistic and Delay-Tolerant Networks
  • User Authentication and Security Systems
  • Privacy-Preserving Technologies in Data
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • UAV Applications and Optimization
  • Software-Defined Networks and 5G
  • Wireless Communication Networks Research
  • Advanced Authentication Protocols Security
  • Security in Wireless Sensor Networks

National University of Singapore
2016-2025

Birla Institute of Technology and Science, Pilani
2023-2024

National Institute of Pharmaceutical Education and Research
2020

AGH University of Krakow
2018

University of Southern California
2017

Rensselaer Polytechnic Institute
2006-2015

Institut national de recherche en informatique et en automatique
2002

Indian Institute of Technology Kanpur
2000

The Internet of Things (IoT) is the next era communication. Using IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner. Various IoT applications focus on automating different tasks are trying empower inanimate act without any human intervention. existing upcoming highly promising increase level comfort, efficiency, automation for users. To able implement such world an ever-growing fashion requires high security, privacy, authentication, recovery...

10.1109/access.2019.2924045 article EN cc-by IEEE Access 2019-01-01

Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical cloning attacks. Therefore, any protocol designed should be robust even cases when device captured by adversary. Moreover, many have limited storage computational capabilities. Hence, it desirable that solutions computationally efficient. To address all these requirements, this paper, we present a lightweight...

10.1109/jiot.2018.2846299 article EN IEEE Internet of Things Journal 2018-06-12

As consumer Internet of Things (IoT) devices become increasingly pervasive in our society, there is a need to understand the underpinning security risks. Therefore, this article, we describe common attacks faced by IoT and suggest potential mitigation strategies. We hope that findings presented article will inform future design devices.

10.1109/mce.2019.2953740 article EN IEEE Consumer Electronics Magazine 2020-02-04

The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause paradigm shift the way we work, interact, think. IoT devices are usually small, low cost, have limited resources, makes them vulnerable physical, side-channel, cloning attacks. Therefore, any protocol designed for systems should not only be secure but also efficient terms usage chip area, energy, storage, processing. To address this issue, present light-weight...

10.1109/jiot.2017.2703088 article EN IEEE Internet of Things Journal 2017-05-12

With the growing interest in use of autonomous computing, sensing and actuating devices for various applications such as smart grids, home networking, environments cities, health care, machine-to-machine (M2M) communication has become an important networking paradigm. However, order to fully exploit facilitated by M2M communications, adequate support from all layers network stack must first be provided meet their service requirements. This paper presents a survey requirements, technical...

10.1109/jiot.2015.2394438 article EN IEEE Internet of Things Journal 2015-01-21

Recent developments in IoT have facilitated advancements the Internet of Vehicles (IoV) with autonomous vehicles and roadside infrastructure as its key components. IoV aims to provide new innovative services for different modes transport adaptive traffic management enables broadcast messages improve safety efficiency. However, due nontrusted environments, it is difficult evaluate credibility that they receive. Therefore, trust establishment a security concern constantly limited by...

10.1109/jiot.2020.3002711 article EN IEEE Internet of Things Journal 2020-06-16

Generative Artificial Intelligence (GAI) has sparked a transformative wave across various domains, including machine learning, healthcare, business, and entertainment, owing to its remarkable ability generate lifelike data. This comprehensive survey offers meticulous examination of the privacy security challenges inherent GAI. It provides five pivotal perspectives essential for understanding these intricacies. The paper encompasses discussions on GAI architectures, diverse generative model...

10.1109/access.2024.3381611 article EN cc-by-nc-nd IEEE Access 2024-01-01

This research paper intends to provide real-life applications of Generative AI (GAI) in the cybersecurity domain. The frequency, sophistication and impact cyber threats have continued rise today's world. ever-evolving threat landscape poses challenges for organizations security professionals who continue looking better solutions tackle these threats. GAI technology provides an effective way them address issues automated manner with increasing efficiency. It enables work on more critical...

10.1109/access.2024.3385107 article EN cc-by-nc-nd IEEE Access 2024-01-01

With recent advances in device fabrication technology, economical deployment of large scale sensor networks, capable pervasive monitoring and control physical systems have become possible. Scalability, low overhead anti distributed functionality are some the key requirements for any protocol designed such networks. In this paper, we present a protocol, Distributed Predictive Tracking, one most likely applications networks: tracking moving targets. The uses clustering based approach...

10.1109/snpa.2003.1203358 article EN 2003-10-08

We present an analytic model for evaluating the queueing delays at nodes in IEEE 802.11 MAC based wireless network. The can account arbitrary arrival patterns, packet size distributions and number of nodes. Our gives closed form expressions obtaining delay queue length characteristics. each node as a discrete time G/G/1 derive service distribution while accounting factors including channel access due to shared medium, impact collisions, resulting backoffs well distribution. is also extended...

10.1109/infcom.2004.1357025 article EN 2005-02-22

<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> In this paper, we present an analytic model for evaluating the queueing delays and channel access times at nodes in wireless networks using IEEE 802.11 Distributed Coordination Function (DCF) as MAC protocol. The can account arbitrary arrival patterns, packet size distributions number of nodes. Our gives closed form expressions obtaining delay queue length characteristics models each node a...

10.1109/tnet.2007.904010 article EN IEEE/ACM Transactions on Networking 2008-08-01

Information and communication technologies (ICT) are one of the underpinning platforms smart grids, facilitating efficient grid management operation, optimization resource utilization, as well enabling new products, features, services. However, this interconnection technology with ICT leads to various security challenges in power grid. One such concern is tampering usage data from meters which may result not only incorrect billing, but also decisions related demand supply management. In...

10.1109/tsg.2018.2844403 article EN IEEE Transactions on Smart Grid 2018-06-06

This paper addresses the problem of developing energy efficient transmission strategies for Body Sensor Networks (BSNs) with harvesting. It is assumed that multiple modes allow a tradeoff between consumption and packet error probability are available to sensor nodes. Taking into account harvesting capabilities nodes, decision policies developed determine mode use at given instant time in order maximize quality coverage. The formulated as Markov Decision Process (MDP) performance policy thus...

10.1109/tcomm.2010.07.080544 article EN IEEE Transactions on Communications 2010-07-01

One of the most important and critical requirements for Internet Vehicles (IoV) is security under strict latency. Typically, authentication protocols vehicular ad hoc networks need to authenticate themselves frequently. This results in reduced application traffic increased overhead. Moreover, mobile nature vehicles makes them a prime target physical, side channel, cloning attacks. To address these issues, this article presents an efficient protocol IoV. The proposed uses physical unclonable...

10.1109/jiot.2020.3010893 article EN IEEE Internet of Things Journal 2020-07-21

The advent of Internet Things (IoT) has escalated the information sharing among various smart devices by many folds, irrespective their geographical locations. Recently, applications like e-healthcare monitoring attracted wide attention from research community, where both security and effectiveness system are greatly imperative. However, to best our knowledge none existing literature can accomplish these objectives (e.g., systems not secure against physical attacks). This paper addresses...

10.1109/jbhi.2020.3007488 article EN IEEE Journal of Biomedical and Health Informatics 2020-07-07

Electric vehicles (EVs) have been slowly replacing conventional fuel based since the last decade. EVs are not only environment-friendly but when used in conjunction with a smart grid, also open up new possibilities and Vehicle-Smart Grid ecosystem, commonly called V2G can be achieved. This would encourage people to switch or Plug-in Hybrid Vehicles (PHEVs), positively aid load management on power present economic benefits all entities involved such an ecosystem. Nonetheless, privacy security...

10.1109/tvt.2020.2976960 article EN IEEE Transactions on Vehicular Technology 2020-02-28

The increasing deployment of cellular networks across the globe has brought two issues to forefront: energy cost running these and associated environmental impact. Also, most recent growth in been developing countries, where unavailability reliable electricity grids forces operators use sources like diesel generators for power, which not only increases operating costs but also contributes pollution. Cellular base stations powered by renewable such as solar power have emerged one promising...

10.1109/mcom.2016.7470944 article EN IEEE Communications Magazine 2016-05-01

The development of Internet Things (IoT) has paved way for the Vehicles (IoV) and intelligent transportation systems (ITS). Vehicular ad-hoc networks (VANETs) are indispensable ITS with vehicles (IV) as their key players. To ensure proper reliable VANET operation, IVs need secure inter- intra-network communication trust reliability data (provenance). This paper aims to provide management in VANETs by proposing a trustless system model using blockchain certificate authority (CA) registering...

10.1109/vtcspring.2019.8746499 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2019-04-01

The number of Internet Things (IoT) devices is expected to grow exponentially in the near future and produce large amounts potentially sensitive data. simple low cost nature IoT makes them an attractive target for spoofing or impersonation attacks. To solve this issue, paper proposes a two-factor authentication protocol using physically unclonable functions characteristics wireless signal from device. security analysis results on MICAz motes shows that proposed can be used as effective tool...

10.1109/jiot.2018.2882610 article EN IEEE Internet of Things Journal 2018-11-21

The concept of smart metering allows real-time measurement power demand which in turn is expected to result more efficient energy use and better load balancing. However, finely granular measurements reported by meters can lead starkly increased exposure sensitive information, including various personal attributes activities. Even though several security solutions have been proposed recent years address this issue, most the existing are based on public-key cryptographic primitives, such as...

10.1109/tifs.2018.2881730 article EN IEEE Transactions on Information Forensics and Security 2018-11-16

The energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems support open innovation. EI provides bidirectional for analysis improvement of usage between service providers customers. To ensure secure, reliable, efficient operation, the should be protected from cyber attacks. Thus, secure key establishment is an important issue this Internet-based smart environment. In paper, we propose...

10.1109/tsg.2019.2908698 article EN IEEE Transactions on Smart Grid 2019-04-02

There has been a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, several applications. In many application scenarios, UAVs are deployed missions where sensitive data is collected, such monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to and/or safety nature collected these applications, it imperative consider security, privacy aspects used scenarios. this article, we propose an efficient aware...

10.1109/tvt.2020.3018778 article EN IEEE Transactions on Vehicular Technology 2020-08-24

This article provides a literature review of state-of-the-art machine learning (ML) algorithms for disaster and pandemic management. Most nations are concerned about disasters pandemics, which, in general, highly unlikely events. To date, various technologies, such as IoT, object sensing, UAV, 5G, cellular networks, smartphone-based system, satellite-based systems have been used ML can handle multidimensional, large volumes data that occur naturally environments related to management...

10.1109/jiot.2020.3044966 article EN IEEE Internet of Things Journal 2020-12-15
Coming Soon ...