Article
Automation & Control Systems
Shunfang Hu, Yanru Chen, Yilong Zheng, Bin Xing, Yang Li, Le Zhang, Liangyin Chen
Summary: This article introduces the advanced metering infrastructure (AMI) as a vital component of the smart grid (SG) for real-time data access and bidirectional communication. An authentication and key agreement (AKA) protocol is needed for ensuring the security of AMI systems. A security-enhanced AKA protocol based on elliptic curve cryptography is proposed and rigorously proven under the random oracle model. Performance comparison demonstrates improved security features with lower computation and communication cost. The proposed scheme is implemented practically on a Raspberry Pi 3 Model B+ testbed for smart meters.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Computer Science, Hardware & Architecture
Hafiz Muhammad Sanaullah Badar, Khalid Mahmood, Waseem Akram, Zahid Ghaffar, Muhammad Umar, Ashok Kumar Das
Summary: The Internet of Things (IoT) enables better solutions for managing reliability and power quality in a smart grid environment, and helps in implementing smart grid measures in smart city development. A lightweight mutual authentication scheme is proposed to provide surveillance to smart meters in the smart grid infrastructure, addressing the resource constraints and security vulnerabilities of the environment. The suggested protocol is analyzed against known security threats and its performance is evaluated to showcase its efficiency.
COMPUTERS & ELECTRICAL ENGINEERING
(2023)
Article
Computer Science, Information Systems
Egide Nkurunziza, Tandoh Lawrence, Elfadul Issameldeen, Gervais Mwitende
Summary: The smart grid is a significant IoT application involving various smart devices. Existing security protocols are mostly homogeneous and centralized, posing vulnerabilities. To address this, an authentication protocol for the smart grid using blockchain technology is designed, offering decentralized, lightweight, and SM-compatible solutions.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Electrical & Electronic
Xinyin Xiang, Jin Cao
Summary: Smart grid integrates information and communication technology with traditional grid architecture to enhance efficiency and reliability of power systems. A secure authentication method is essential to prevent data tampering in smart grid communications. The proposed AKA scheme in this paper supports privacy preservation and enables secure communication between SG devices and service providers.
ELECTRIC POWER SYSTEMS RESEARCH
(2022)
Article
Engineering, Electrical & Electronic
Shehzad Ashraf Chaudhry
Summary: The paper identifies flaws in the PALK authentication scheme proposed by Khan et al., specifically pointing out errors in the login and authentication phases due to superficial ECC operations and issues with the use of public keys in the presence of multiple communicating devices. A solution iPALK is proposed by the authors, which is proven to be secure and correct using formal BAN logic and ProVerif automated tool, with performance comparisons showing iPALK to be more efficient in computation and communication costs compared to PALK.
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS
(2021)
Article
Green & Sustainable Science & Technology
Akhtar Badshah, Muhammad Waqas, Ghulam Abbas, Fazal Muhammad, Ziaul Haq Abbas, S. Vimal, Muhammad Bilal
Summary: The Smart grid uses information and communication networks to collect energy data and improve sustainability in power generation and distribution. However, the insecure communication channels in the network raise serious security concerns. In order to address this issue, a scheme called LAKE-BSG is proposed, which ensures secure communication between smart meters and service providers using blockchain technology. Through detailed security analysis and verification, the scheme demonstrates resilience against security attacks and provides efficiency and additional security features.
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
(2022)
Article
Energy & Fuels
Susan A. Mohammed Taqi, Saeed Jalili
Summary: The importance of smart grids is growing in line with the global trend towards smart city models and increasing energy sector efficiency. However, addressing security concerns is urgently needed. The PALK scheme was found to have security vulnerabilities, leading to the design of a new authentication and key agreement protocol called LSPA. It was formally verified to withstand attacks and shown to have better communication and computation costs than the PALK scheme.
Article
Computer Science, Information Systems
Ashish Tomar, Sachin Tripathi
Summary: Research on integrating fog computing with blockchain to address latency, single point of failure, and centralization has been expanding, with limited focus on authentication and key establishment for blockchain-based smart grid under fog environment. This paper introduces a mutual authentication and key agreement scheme for blockchain-based smart grid environment, reducing dependency on single trusted authorities and establishing secure shared keys among smart meter, fog node, and cloud server for message confidentiality. Evaluations using hyperledger fabric and cryptographic libraries show the proposed scheme to be efficient in computational and communication costs, meeting predefined security goals.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Automation & Control Systems
Shehzad Ashraf Chaudhry, Jamel Nebhan, Khalid Yahya, Fadi Al-Turjman
Summary: The rapid advancements in smart grid technology have extended its applications in various areas such as vehicle charging, smart buildings, and smart cities. However, these applications are vulnerable to security threats. To address this issue, this article proposes a new secure communication scheme for smart grid, which provides a secure and efficient authentication method.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Chemistry, Analytical
Pooja Tyagi, Saru Kumari, Bander A. Alzahrani, Anshay Gupta, Ming-Hour Yang
Summary: A secure protocol for wireless transmission is crucial for protecting sensitive information, but existing schemes have security pitfalls. To address these issues, we propose an enhanced authentication scheme and demonstrate its superiority through validation and comparison.
Article
Computer Science, Hardware & Architecture
Mohammad Wazid, Ashok Kumar Das, Rasheed Hussain, Neeraj Kumar, Sandip Roy
Summary: Crowdsourcing is a practice to solve complex problems and achieve common goals through collective intelligence. Despite its advantages, security and privacy are concerns. This paper introduces a new blockchain-based authentication scheme for crowdsourcing, which shows superior performance in security, functionality, computation, and communication costs. Extensive blockchain-based simulations demonstrate the impact of the scheme on system performance.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Venkatasamy Sureshkumar, S. Anandhi, Ruhul Amin, N. Selvarajan, R. Madhumathi
Summary: This article explores the importance of smart grid in the Internet of Things and the security issues in its communication system, proposing a mutually authenticated key establishment protocol to ensure the communication security between the service provider and smart meters.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Seyed Hamid Baghestani, Farokhlagha Moazami, Mahdi Tahavori
Summary: This article discusses the research in the field of smart grid, focusing on the security of data transfer in smart grids and the existing protocol's limitations. The authors propose a lightweight authentication and key agreement protocol based on elliptic curve cryptography and demonstrate its security and efficiency.
IEEE SYSTEMS JOURNAL
(2022)
Article
Engineering, Multidisciplinary
Mohammad Wazid, Siddhant Thapliyal, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty
Summary: Smart healthcare technologies are transforming the traditional healthcare system, but they also face security and privacy challenges. This paper proposes a new lightweight remote user authentication and key establishment scheme to address these issues, and conducts security analysis and comparative studies with other schemes.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
SungJin Yu, KiSung Park
Summary: Smart grid has gained significant attention due to its various services, but it is vulnerable to security attacks. To address this issue, we propose a secure and lightweight authentication and key agreement scheme using a fuzzy extractor. We evaluate the scheme's security and efficiency through simulations and experiments.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)
Article
Computer Science, Information Systems
Narendra K. Dewangan, Preeti Chandrakar, Saru Kumari, Joel J. P. C. Rodrigues
Summary: Blockchain technology is popular for its properties, but certificate management faces issues. Using blockchain can improve security and privacy in certificate management.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
M. Indushree, Manish Raj, Vipul Kumar Mishra, R. Shashidhara, Ashok Kumar Das, K. Vivekananda Bhat
Summary: Designing a secure and efficient authentication protocol for mobility network is crucial and challenging due to network attacks in seamless roaming of mobile users and broadcast nature of communication. The proposed Mobile-Chain is a secure blockchain-based authentication system that protects user privacy and provides provable security. Its implementation on the ethereum blockchain platform using smart contracts shows robustness against security threats in mobility networks.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Shrid Pant, Mehul Sharma, Deepak Kumar Sharma, Deepak Gupta, Joel J. P. C. Rodrigues
Summary: This article proposes a machine learning-based architecture to identify malicious and benign nodes in an IoE network. Through simulations, it is shown that GPSO-based learning algorithms provide reliable, robust, and scalable solutions, and significantly outperform other security protocols in the classification of nodes.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Editorial Material
Computer Science, Hardware & Architecture
Uttam Ghosh, Hellen Maziku, Hari Prabhat Gupta, Biplab Sikdar, Joel J. P. C. Rodrigues
IEEE CONSUMER ELECTRONICS MAGAZINE
(2023)
Article
Engineering, Electrical & Electronic
Jagdeep Singh, Parminder Singh, Mustapha Hedabou, Neeraj Kumar
Summary: Fog computing is a new technology that provides accessibility of computing resources close to end-users, addressing the limitations of network bandwidth and delay in cloud computing. Resource allocation is crucial for managing resources in a fog computing environment. However, traditional techniques do not meet the low latency requirements of modern fog computing applications. This article proposes a resource allocation technique for SDN-enabled fog computing with Collaborative Machine Learning (CML), which reduces execution time, energy consumption, and latency.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Hardware & Architecture
Chien-Ming Chen, Shuangshuang Liu, Xuanang Li, S. K. Hafizul Islam, Ashok Kumar Das
Summary: With the improvement of the public medical system, the medical service industry has become more intelligent. The Internet-of-Medical-Things (IoMT) is crucial in smart medicine. The use of remote wireless monitoring platforms in IoMT systems has reduced the risk of virus infection among medical staff. However, data security during transmission remains a concern. To address this, we propose a three-factor enhanced protocol that ensures confidentiality and privacy. Comparing our protocol with existing ones, ours has efficient performance in terms of execution time and communication costs.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Computer Science, Information Systems
Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
Summary: The progress of sensor devices, digital communication, and computing techniques enhances the functionalities of e-healthcare, where the medical facilities are manageable based on the Internet. Now a days, e-healthcare not only helps in disease diagnosis, or tele-medicine, but also implies to general medical scope and medical resource management. Thus, Internet-of-Medical Thing (IoMT) becomes an umbrella term to connect e-healthcare, tele-medicine, and medical supply chain management.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Civil
Gunasekaran Raja, Nisha Deborah Philips, Ramesh Krishnan Ramasamy, Kapal Dev, Neeraj Kumar
Summary: This paper proposes a method called DTG-GN for generating unmanned aerial vehicle (UAV) trajectories using an improved genetic algorithm and non-uniform rational P-splines optimization. The method aims to improve the efficiency of monitoring agricultural lands by optimizing the smoothness and accuracy of the trajectories. The improved genetic algorithm selects an optimal path, while the non-uniform rational P-splines optimization improves the smoothness of the trajectory. The 6G network is utilized to ensure seamless connectivity between the UAV and the ground control station. Experimental results demonstrate that DTG-GN reduces the time and trajectory length for generating optimal trajectories compared to conventional methods.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Chemistry, Analytical
Ahmed Barnawi, Krishan Kumar, Neeraj Kumar, Nisha Thakur, Bander Alzahrani, Amal Almansour
Summary: Landmine contamination is a global problem with devastating consequences, which can be solved by using unmanned aerial vehicles (UAVs). Automation of the landmine detection process is necessary to fully utilize the potential of UAVs, which are used to airborne sensors for the discovery stage. This study presents a framework for autonomous UAV-based landmine detection, using deep learning for area segmentation and constructing coverage route plans.
Article
Computer Science, Information Systems
Abhishek Bisht, Ashok Kumar Das, Debasis Giri
Summary: Personal Health Records (PHRs) pose challenges in storage and sharing, but Searchable Encryption (SE) combined with Blockchain offers a promising solution. This survey explores research on SE and blockchain technology, comparing existing solutions for secure storage and sharing of PHRs.
SECURITY AND PRIVACY
(2023)
Article
Computer Science, Information Systems
Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, Abdullah Alqahtani
Summary: The healthcare sector is crucial and with the evolution of technologies like IoT, machine learning, and blockchain, it has advantages. Data in this sector is vulnerable due to its private and confidential nature, requiring a secured framework for data transmission. This article presents a blockchain-based authentication and key management mechanism for IoMT-based smart healthcare applications (SBAKM-HS). Comparative analysis shows that SBAKM-HS outperforms other existing schemes, and security verification confirms its resilience against potential attacks. Real-tested implementation of SBAKM-HS demonstrates its impact on system performance.
Proceedings Paper
Computer Science, Artificial Intelligence
Shashank Barthwal, Sumit Pundir, Mohammad Wazid, D. P. Singh, Sakshi Pundir
Summary: Efficient usage of sensor nodes for minimizing energy consumption in wireless sensor networks using an improved energy aware cluster-based routing mechanism (IEACRP) enhances network stability, lifetime, and throughput.
ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I
(2023)
Article
Engineering, Civil
Peiying Zhang, Ning Chen, Guanjun Xu, Neeraj Kumar, Ahmed Barnawi, Mohsen Guizani, Youxiang Duan, Keping Yu
Summary: With the maturity of 5G and ITS technologies, the limited lifetime and computing capability of mobile devices pose challenges to QoS. To address the efficiency and sustainability issues, this paper proposes a multi-target-aware dynamic resource scheduling algorithm and utilizes deep reinforcement learning to interact with the MTCN environment effectively.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Abhishek Bisht, Ashok Kumar Das, Dusit Niyato, Youngho Park
Summary: This paper proposes a dynamic, efficient, and practical PHR sharing scheme that combines searchable symmetric encryption, blockchain technology, and Inter-Planetary File System (IPFS). The proposed scheme guarantees the confidentiality of PHRs, verifiability of search results, and forward security. Extensive test-bed experiments demonstrate that the proposed scheme can be applied in practical scenarios related to the IoMT environment.
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY
(2023)
Article
Computer Science, Information Systems
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty
Summary: This article introduces the privacy and security threats in online social networks (OSNs) and reviews and classifies related research works. It also discusses machine learning-based solutions for security attacks in OSNs and provides future research directions and possible solutions.
SECURITY AND PRIVACY
(2023)