Article
Computer Science, Hardware & Architecture
Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Neeraj Kumar, Sandip Roy
Summary: Crowdsourcing is a practice to solve complex problems and achieve common goals through collective intelligence. Despite its advantages, security and privacy are concerns. This paper introduces a new blockchain-based authentication scheme for crowdsourcing, which shows superior performance in security, functionality, computation, and communication costs. Extensive blockchain-based simulations demonstrate the impact of the scheme on system performance.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Multidisciplinary Sciences
Da-Zhi Sun
Summary: Vinoth et al.'s proposed authenticated key agreement scheme for industrial IoT applications did not successfully defend against user impersonation, device impersonation, replay, and desynchronization attacks, and could not maintain user privacy.
Article
Computer Science, Artificial Intelligence
Yuxiang Zhou, Haowen Tan, Karunarathina Chandrathilaka Appuhamilage Asiria Iroshan
Summary: The rapid development of 5G communication, big data technology, and intelligent transportation system has led to the growth of vehicle networks. However, this growth also brings security problems including privacy disclosure and key security issues. In order to address these threats and ensure secure communication between vehicles and roadside units (RSUs), a secure and efficient authentication key agreement scheme is proposed. The scheme ensures mutual authentication and session key security, while also allowing for flexible time key settings and dynamic vehicle management. Furthermore, the scheme has been proven to be secure under the random oracle model and shows improved efficiency compared to existing schemes.
CONNECTION SCIENCE
(2023)
Article
Computer Science, Information Systems
Gaurav Tyagi, Rahul Kumar
Summary: Formulating a secure and efficient user authentication scheme for wireless sensor networks (WSNs) is a complex task. Existing schemes have several issues such as information leakage attacks, session key exposure, lack of user anonymity, forward secrecy, and multi-factor security. To address these issues, we propose an improved scheme that has been verified for security through formal and informal analysis, achieving a good balance between efficiency and security.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Huanhuan Hu, Longxia Liao, Junhui Zhao
Summary: The paper introduces a cloud-assisted authentication scheme based on Chebyshev polynomial encryption, where user login requests are verified using smart card, password and biometric data. The scheme offers additional features such as offline sensor node registration, updating of user credentials, adding new sensor nodes and user anonymity, while delivering enhanced security performance compared to other schemes.
Article
Computer Science, Information Systems
Garima Singh
Summary: IoMT has gained popularity in the healthcare industry and is expected to expand beyond clinics and hospitals in the future. However, security remains a major concern as cybercriminals constantly target healthcare facilities. This research proposes a secure authentication and key agreement protocol to enhance IoMT security.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Tian-Fu Lee, Der-Chyuan Lou, Chien-Hung Chang
Summary: Authenticated key agreement for Internet of Drones (IoD) allows mobile users to securely and efficiently access a group of drones for various services such as supply transportation, surveillance data transmission, and communication provision. Previous studies developed lightweight protocols to address security issues, but this investigation reveals the weaknesses of a previous protocol and proposes an enhanced protocol with dynamic identities and message freshness. The enhanced protocol is formally proven secure and outperforms related protocols by 28.4%.
INTERNET OF THINGS
(2023)
Article
Telecommunications
Junshuai Sun, Qi Jiang, Jianfeng Ma, Qingfeng Cheng, I Chih-Lin, Chengguang Yin
Summary: The study proposes an enhanced authentication and key exchange protocol to address the security issues in 5G-integrated WSNs, which is more resilient to various types of attacks and demonstrates superior performance compared to existing schemes.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES
(2021)
Article
Computer Science, Information Systems
Tian-Fu Lee, I-Pin Chang, Guo-Jun Su
Summary: Electronically protected health information is stored in computerized healthcare records and can be easily shared or retrieved by healthcare providers via the Internet. The two main concerns are Internet security and patient privacy. Various regions have established privacy standards, such as HIPAA in the United States and GDPR in Europe. Recent studies suggest that cryptosystems based on Chebyshev chaotic maps are more efficient than those using modular exponential computation and scalar multiplication on elliptic curves. This investigation proposes a secure and efficient non-certificate-based authenticated key agreement scheme that utilizes lightweight operations, including Chebyshev chaotic maps and hash operations.
Article
Energy & Fuels
Susan A. Mohammed Taqi, Saeed Jalili
Summary: The importance of smart grids is growing in line with the global trend towards smart city models and increasing energy sector efficiency. However, addressing security concerns is urgently needed. The PALK scheme was found to have security vulnerabilities, leading to the design of a new authentication and key agreement protocol called LSPA. It was formally verified to withstand attacks and shown to have better communication and computation costs than the PALK scheme.
Article
Chemistry, Analytical
Iqra Asghar, Muhammad Ayaz Khan, Tahir Ahmad, Subhan Ullah, Khwaja Mansoor ul Hassan, Attaullah Buriro
Summary: In smart home environments, robust user authentication is necessary due to the interaction between a remote user and devices occurring through a gateway. Existing user-authentication schemes still have security vulnerabilities, including the node capture attack. This research paper analyzes the vulnerability of user-authentication approaches to node capture attacks and proposes a secure scheme suitable for IoT-based smart home environments, validated through verification and performance analysis.
Article
Engineering, Electrical & Electronic
He Xu, Xianzhen Yin, Feng Zhu, Peng Li
Summary: This paper presents a new RFID system, Au-Hota, which can authenticate both tags and users simultaneously, and resist replay and impersonation attacks. The system assigns a unique identifier to users based on inductive coupling between tags, achieving good authentication performance.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Information Systems
M. M. Modiri, M. Salmasizadeh, J. Mohajeri, B. H. Khalaj
Summary: This paper focuses on improving two authentication and key agreement (AKA) protocols for 5G networks. The improved protocols meet security and performance requirements and are compatible with the 3GPP security architecture. They achieve mutual authentication, secure key agreement, and confidentiality of session keys, while also complying with other security requirements and having appropriate overheads compared to other AKA protocols.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Durbadal Chattaraj, Basudeb Bera, Ashok Kumar Das, Sourav Saha, Pascal Lorenz, YoungHo Park
Summary: In the Internet of Vehicles (IoV), the blockchain-assisted certificateless key agreement protocol Block-CLAP provides superior security and lower communication and computational overheads compared to existing competing authentication schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Computer Science, Hardware & Architecture
Zisang Xu, Xiong Li, Jianbo Xu, Wei Liang, Kim-Kwang Raymond Choo
Summary: In the Internet of Vehicles (IoV), a reliable and secure authentication and key agreement scheme is required to prevent data from being forged or modified. This paper proposes a secure and computationally efficient scheme where RSU can authenticate with the vehicle, improving authentication efficiency and reducing energy consumption compared to existing schemes.
COMPUTERS & ELECTRICAL ENGINEERING
(2021)
Article
Telecommunications
Mukesh Soni, Dileep Kumar Singh
Summary: The concept of wireless body area network in the medical field is crucial for exchanging health data efficiently. A proposed secure and lightweight health authentication and key agreement protocol reduces security risks and communication overhead in WBAN communications.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
A. Shobanadevi, G. Maragathm, Syam Machinathu Parambil Gangadharan, Mukesh Soni, Rohit Kumar, Tien Anh Tran, Bhupesh Kumar Singh
Summary: The rise of information technology has made it easier to access digital information and the internet of things. However, these methods also pose a risk to privacy. A recent study proposes a composite reversible data hiding approach that aims to protect digital materials from illicit use and distribution while maintaining a high level of image quality. The suggested approach achieves this goal by merging the cover image with encrypted confidential data, resulting in a high rate of peak signal-to-noise ratio (PSNR).
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2022)
Article
Engineering, Multidisciplinary
Nihar Ranjan Nayak, Sumit Kumar, Deepak Gupta, Ashish Suri, Mohd Naved, Mukesh Soni
Summary: This study identifies risk factors for occupational accidents and examines their impacts using Bayesian networks. The experimental findings show that machine learning methods can accurately predict certain occupational accident situations.
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT
(2022)
Article
Health Care Sciences & Services
Tanvi Puri, Mukesh Soni, Gaurav Dhiman, Osamah Ibrahim Khalaf, Malik Alazzam, Ihtiram Raza Khan
Summary: Emotion recognition plays a crucial role in human interaction, and through the use of intelligent systems and convolutional neural networks, we can classify and identify consumer emotions more accurately, categorizing them into different classes.
JOURNAL OF HEALTHCARE ENGINEERING
(2022)
Article
Mathematical & Computational Biology
Mukesh Soni, Ihtiram Raza Khan, K. Suresh Babu, Syed Nasrullah, Abhishek Madduri, Saima Ahmed Rahin
Summary: The SEMRCNN model is proposed for autonomously extracting prostate cancer locations from MP-MRI. It achieves fine segmentation by utilizing feature maps and integrating information from different types of images. The model outperforms other segmentation models in prostate cancer MP-MRI.
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE
(2022)
Article
Computer Science, Artificial Intelligence
Mukesh Soni, S. Gomathi, Pankaj Kumar, Prathamesh P. Churi, Mazin Abed Mohammed, Akbal Omran Salman
Summary: Pulmonary disease is widespread globally, and timely diagnosis is crucial. To improve accuracy, a new hybrid deep learning architecture called STNCNN was developed. Tested on the dataset from NIH chest x-ray images, STNCNN achieved an accuracy of 69%, outperforming other methods. The proposed system simplifies the work of specialists and physicians, enhancing the efficiency of lung disease diagnosis.
INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH
(2022)
Article
Computer Science, Artificial Intelligence
Mukesh Soni, Dileep Kumar Singh
Summary: Wireless body area network (WBAN) is an important platform for transferring health data from the human body to a database. This study focuses on the security aspects of WBAN, including user verification, data correctness, and information secrecy. The researchers discuss various existing data transmission schemes and evaluate their strengths and weaknesses. They also describe essential security properties for WBAN communication, explain security attacks during message transmission, and propose countermeasures. This comprehensive study aids researchers in developing secure WBAN data transfer techniques.
EVOLUTIONARY INTELLIGENCE
(2023)
Article
Computer Science, Artificial Intelligence
Neha Sharma, Mukesh Soni, Sumit Kumar, Rajeev Kumar, Nabamita Deb, Anurag Shrivastava
Summary: Asian social networks play a crucial role in providing enhanced and real-time data mapping, as well as accessing diverse big data sources. The concept of sentiment analysis helps in understanding textual content in relation to the stock market. An intelligent ontology and knowledge-based Asian social network solution can improve decision making by extracting important information. This article focuses on predicting stock market news sentiments using ontological knowledge-based Convolution Neural Network (CNN) and swarm-based Artificial Bee Colony (ABC) algorithm.
ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING
(2023)
Article
Computer Science, Information Systems
Trupil Limbasiya, Sanjay K. Sahay, Debasis Das
Summary: The presence of many vehicles on the road creates various issues such as parking difficulties, traffic congestion, and energy consumption. Utilizing information and communication technology to address parking challenges while ensuring security and privacy is a valuable approach. The proposed SAMPARK protocol offers secure and lightweight smart parking management, demonstrating efficient performance in computational time, storage cost, and communication overhead according to test-bed results.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Article
Engineering, Civil
Trupil Limbasiya, Debasis Das
Summary: This study proposes a secure and efficient information exchange protocol called QueryCom for vehicular cloud computing in smart transportation. The protocol is designed using SHA-512 and AES-256 to ensure security and user anonymity. Furthermore, an index-based sequential searching method is used to effectively retrieve information from the vehicular cloud database.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Mukesh Soni, Dileep Kumar Singh
Summary: This passage discusses the objective of turning present technology into intelligent global habitats and the importance of 6G in meeting real-time application requirements. The research paper suggests a group-based handover authentication strategy for 6G heterogeneous networks to enhance efficiency and security in the authentication process.
PHYSICAL COMMUNICATION
(2023)
Article
Computer Science, Information Systems
R. John Martin, Rajvardhan Oak, Mukesh Soni, V. Mahalakshmi, Arsalan Muhammad Soomar, Anjali Joshi
Summary: With the development of mobile networks and apps, user-generated content (UGC) has become crucial for enhancing personalized services. UGC consists of multi-source heterogeneous data such as user reviews, tags, scores, images, and videos. Big data fusion presents both opportunities and challenges. The fusion and representation learning of multi-source UGC text and image play a vital role in improving customized services.
ACM JOURNAL OF DATA AND INFORMATION QUALITY
(2023)
Article
Engineering, Electrical & Electronic
Kirti Shukla, Archana Kollu, Poonam Panwar, Mukesh Soni, Latika Jindal, Hemlata Patel, Ismail Keshta, Renato R. R. Maaliw III
Summary: As the Internet of Things (IoT) expands, the energy requirements of IoT terminal equipment increase. To tackle the energy scarcity issue and ensure uninterrupted and stable operation in the face of renewable energy and uncertain environments, a rational and efficient energy allocation strategy is necessary. This study proposes a deep reinforcement learning energy allocation strategy that utilizes the DQN algorithm to directly interact with an unknown environment. The best energy allocation method is independent of environmental knowledge, and a pretraining algorithm is introduced to maximize the initialization state of the strategy. Comparative and simulation experiments are conducted under various channel data conditions. The results demonstrate that the proposed energy allocation strategy surpasses the current strategy in multiple channel scenarios and exhibits a high adaptability.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2023)
Proceedings Paper
Materials Science, Multidisciplinary
Ayan Banik, Anurag Shrivastava, Ravindra Manohar Potdar, Sanjiv Kumar Jain, Santosh Gopal Nagpure, Mukesh Soni
Summary: In this study, the characteristics of Single-Phase Solar Photovoltaic Rooftop System were analyzed using MATLAB. A new grid synchronization methodology and INC control technique were proposed for analyzing the output current and achieving maximum power tracking. Extensive testing confirmed the practicality and promising outcomes of the proposed power grid model.
MATERIALS TODAY-PROCEEDINGS
(2022)
Proceedings Paper
Materials Science, Multidisciplinary
Sunil A. Patel, Sanjay P. Patel, Yagna Bhupendra Kumar Adhyaru, Santosh Maheshwari, Pankaj Kumar, Mukesh Soni
Summary: Artificial Intelligence plays a major role in smart devices, with new AI development tools like AutoML rapidly gaining popularity for their self-adapting capabilities in building efficient smart devices.
MATERIALS TODAY-PROCEEDINGS
(2022)
Article
Computer Science, Hardware & Architecture
Jia Ke, Ying Wang, Mingyue Fan, Xiaojun Chen, Wenlong Zhang, Jianping Gou
Summary: This study integrates the emotional correlation analysis model and Self-organizing Map (SOM) to construct fine-grained user emotion vector based on review text and perform visual cluster analysis, which helps platform merchants quickly mine user clustering and characteristics.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Shi Qiu, Huping Ye, Xiaohan Liao, Benyue Zhang, Miao Zhang, Zimu Zeng
Summary: This paper proposes a multilevel-based algorithm for hyperspectral image interpretation, which achieves semantic segmentation through multidimensional information fusion, and introduces a context interpretation module to improve detection performance.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao
Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Jiahao Xiong, Weihua Ou, Zhonghua Liu, Jianping Gou, Wenjun Xiao, Haitao Liu
Summary: This paper proposes a novel remote photoplethysmography framework, named GraphPhys, which utilizes graph neural network to extract physiological signals and introduces Average Relative GraphConv for the task of remote physiological signal measurement. Experimental results show that the methods based on GraphPhys significantly outperform the original methods.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)
Article
Computer Science, Hardware & Architecture
Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang
Summary: The rise of illicit activities involving blockchain digital currencies has become a growing concern. In order to prevent illegal activities, this study combines financial risk control with machine learning to identify and predict the risks of users with poor credit. Experimental results demonstrate high performance in user financial credit analysis.
COMPUTERS & ELECTRICAL ENGINEERING
(2024)