Swapnoneel Roy

ORCID: 0000-0003-1164-2757
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Genome Rearrangement Algorithms
  • Cryptographic Implementations and Security
  • Algorithms and Data Compression
  • Caching and Content Delivery
  • Chromosomal and Genetic Variations
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Opportunistic and Delay-Tolerant Networks
  • DNA and Biological Computing
  • Green IT and Sustainability
  • Enzyme Production and Characterization
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • Network Security and Intrusion Detection
  • Optimization and Search Problems
  • Security and Verification in Computing
  • Chaos-based Image/Signal Encryption
  • Information and Cyber Security
  • Cooperative Communication and Network Coding
  • Advanced Malware Detection Techniques
  • Smart Agriculture and AI
  • Cloud Computing and Resource Management
  • Water Quality Monitoring Technologies

University of North Florida
2015-2024

IBM (United States)
2006-2013

University at Buffalo, State University of New York
2011-2013

New York University
2011

IBM (India)
2008

Energy consumption has emerged as a first class computing resource for both server systems and personal devices. The growing importance of energy led to rethink in hardware design, hypervisors, operating compilers. Algorithm design is still relatively untouched by the algorithmic complexity models do not capture consumed an algorithm. In this paper, we propose new model account used Based on abstract memory (which was inspired popular DDR3 similar parallel disk I/O Vitter Shriver), present...

10.1145/2422436.2422470 article EN 2013-01-03

Precision agriculture is the collection of hardware and software technologies that allow a farmer to make informed, differentiated decisions regarding agricultural operations such as planting, fertilizing, pest control, harvesting. In recent years, advances in machinery emergence robots continuously increased resolution at which treatment possible. This creates corresponding need for information fine spatial temporal resolution. Autonomous multi-robot systems (e.g., unmanned ground aerial...

10.1109/access.2021.3130900 article EN cc-by IEEE Access 2021-01-01

Some enzymes can catalyze more than one chemical conversion for which they are physiologically specialized. This secondary function, is called underground, promiscuous, metabolism, or cross activity, recognized as a valuable feature and has received much attention developing new catalytic functions in industrial applications. In this study, novel bifunctional xylanase/β-glucosidase metagenomic-derived enzyme, PersiBGLXyn1, with underground β-glucosidase activity was mined by in-silico...

10.3389/fmicb.2022.1056364 article EN cc-by Frontiers in Microbiology 2023-01-04

Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks. Tradeoffs between availability security arise at implementation, however, triggered by the additional resources (e.g., memory computation) required blockchain-enabled hosts. This paper applies an energy-reducing algorithmic engineering technique for Merkle Tree (MT) root calculations Proof of Work (PoW)...

10.1109/tnsm.2022.3219494 article EN publisher-specific-oa IEEE Transactions on Network and Service Management 2022-11-04

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, recent ECC-based and key exchange protocols are subjected to threat modeling static analysis detect vulnerabilities enhance them be more secure against threats. This work demonstrates how currently-used vulnerable attacks. If vulnerable, damage could include critical data loss elevated privacy concerns. The considered differ their usage of security factors (e.g., passwords,...

10.3390/cryptography1010009 article EN cc-by Cryptography 2017-06-13

α-Amylases are among the very critical enzymes used for different industrial purposes. Most α-amylases cannot accomplish requirement of conditions and easily lose their activity in harsh environments. In this study, a novel α-amylase named PersiAmy1 has been identified through multistage silico screening pipeline from rumen metagenomic data. The long-term storage low high temperatures demonstrated 82.13 71.01% activities after 36 days incubation at 4 50°C, respectively. stable retained...

10.3389/fmicb.2021.713125 article EN cc-by Frontiers in Microbiology 2021-08-30

Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability security arise at implementation, however, triggered by additional resources (e.g., memory, computation) required each blockchain-enabled host. This paper applies an energy-reducing algorithmic engineering technique for Merkle Tree root...

10.1109/trustcom53373.2021.00149 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2021-10-01

Hash-based message authentication code (HMAC) involves a secret cryptographic key and an underlying crypto-graphic hash function. HMAC is used to simultaneously verify both integrity authenticity of messages and, in turn, plays significant role secure communication protocols e.g., Transport Layer Security (TLS). The high energy consumption well-known as the trade-off between security, consumption, performance. Previous research reducing has approached problem primarily at system software...

10.1109/igsc55832.2022.9969377 article EN 2022-10-24

In this work, we argue that energy management should be a guiding principle for design and implementation of algorithms. Traditional complexity models algorithms are simple do not aid in energy-efficient conducted large number experiments to understand consumption We study the popular vector operations, matrix sorting, graph observed any given algorithm depends on memory parallelism can exhibit data layout RAM with variations up 100% many Our validate asymptotic model presented companion...

10.1109/mascots.2014.47 article EN 2014-09-01

10.1007/s11334-015-0250-x article EN Innovations in Systems and Software Engineering 2015-06-16

In the services domain, customers raise issues and service requests in form of tickets. There is a pool personnel who work on these tickets resolve them. The problem at hand to dispatch most appropriate personnel. Optimality applied metrics like mean time taken ticket, fair sharing workload among personnel, size configuration pool. current state art involves human dispatcher for assigning incoming requests. Though intelligent, can be suboptimal with respect above mentioned objectives due...

10.1109/srii.2011.54 article EN Annual SRII Global Conference 2011-03-01

Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of growing number cyber attacks. Though there have been several studies related to denial service cache attacks, those are primarily based on simulations investigations attacks real networks still lacking.

10.1145/3288599.3288640 article EN 2019-01-04

In this work we consider two elliptic curve cryptography based authentication protocols for performing cryptanalysis and security enhancement. The first one by Moosavi et al., is a mutual scheme RFID implant systems. We perform on protocol observe that it prone to the clogging attack, kind of denial service (DoS) attack. then suggest an improvement prevent other analysis Xu al. This smart card protocol. again attack via replay. all which precede require server compute computationally...

10.1109/cicn.2015.226 article EN 2015-12-01

In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that has already been shown vulnerable to the off-line guessing attack Tapiador et al. perform further protocol observe it prone clogging attack, kind of denial service (DOS) attack. all card which precede require server compute computationally intensive modular exponentiation, like Xu al., or Lee are Further,...

10.1109/pccc.2011.6108113 article EN 2011-11-01

With the exponential growth of content, Internet is undergoing a transformation from host-centric approach to content-centric one, popularly known as an Information Centric Networks (ICN). ICN aims improve user performance by incorporating in-network caching at storage enabled nodes. In this paper, we explore scalability and effectiveness targeted denial service attack (DoS) designed for [1]. attack, malicious nodes periodically request unpopular thereby replacing popular content in caches...

10.1109/iccnc.2016.7440666 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2016-02-01

We study the problem of information sampling an ambient phenomenon using a group mobile robots. Autonomous robots are being deployed for various applications such as precision agriculture, search-and-rescue, among others. These usually equipped with sensors and tasked collecting maximal further data processing decision making. The studied is proved to be NP-Hard in literature. To solve stated approximately, we employ multi-agent deep reinforcement learning framework use concepts mean field...

10.1109/smc52423.2021.9658795 article EN 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2021-10-17

In this work, we perform security analysis of using an e-mail as a self-service password reset point, and exploit some the vulnerabilities servers' forgotten paths. We illustrate three different attacks on personal Email account, variety tools such as: public knowledge attainable through social media or records to answer questions execute engineering attack, hardware available man in middle free software brute-force attack login email account. Our results expose inherent emails points. The...

10.1109/mobisecserv.2018.8311443 article EN 2018-02-01

In a coordinated multi-robot information sampling scenario, robots often share their collected with others for better prediction. As any other online data sharing technique, integrity is concern, but it has not yet been addressed in the literature. this paper, we study how to secure being shared among such network against attacks and what cost of integrating security techniques. To end, propose Blockchain-based protocol that helps reject fake injection by malicious entity. On hand, optimal...

10.1109/ssrr53300.2021.9597867 article EN 2021-10-25

In this work we compute the energy generated by modular exponentiation, a widely used powerful tool in password authentication protocols for cyber physical systems. We observe exponentiation to be an expensive operation terms of consumption addition known computationally intensive. then analyze security and advanced smart card based protocol systems, that use exponentiation. devise generic cryptanalysis method on protocol, which attacker exploits computational intensive nature perform denial...

10.1109/dcoss.2014.52 article EN 2014-05-01

In this paper, we study a genome rearrangement primitive called block moves. This as special case of another well studied transposition. We revisit the problem BLOCK SORTING, which is sorting under moves in work. SORTING has been shown to be NP-Complete, and couple results have designed factor 2 approximation algorithms for - best known till date. However whether APX-Hard, or an improvement over interesting open problems. design new algorithm SORTING. Our equal terms ratio, however, our...

10.1109/bibe.2014.37 article EN 2014-11-01
Coming Soon ...