Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 10 of 102
  • Item
    Void Avoidance Node Deployment Strategy for Underwater Sensor Networks
    (Springer, 2020) Nazareth, P.; Chandavarkar, B.R.
    Underwater Wireless Sensor Networks (UWSNs) play a major role in many aquatic applications. Underwater sensors were deployed over a given three-dimensional area. Dynamic and unpredictable nature of the underwater environment is resulting in void communications, interrupting the flow of data to the sink node. Sensor nodes, which are part of void communications are called void nodes, and in multi-hop communication nodes depend on void which are called trap. Any deployed node can become a void or trap not only after their deployment but also during their initial deployment. Most popularly used random deployment strategy in UWSNs always results in the many voids and traps. To countermeasure, the shortfall additional nodes are deployed, which may result in still worse condition. The first objective of this paper is highlighting void and trap node problems in random deployment strategy. In the second objective, we are proposing a systematic way of sensor node deployment that overcomes void and trap problems arising in random deployment in UWSNs. Through the MATLAB simulation drawbacks of random and benefits of systematic deployment strategies are demonstrated using a count of void & trap nodes, volume of the area covered, and count of retained void & traps. © 2020, Springer Nature Singapore Pte Ltd.
  • Item
    Security issues and challenges in Healthcare Automated Devices
    (Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.
    Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.
  • Item
    An Experimental Evaluation of SHA-512 for Different Modes of Operation
    (Institute of Electrical and Electronics Engineers Inc., 2020) Bhonge, H.N.; Ambat, M.K.; Chandavarkar, B.R.
    We have different numbers of algorithms for computation of the hash. SHA-512 is vulnerable to pre-image attacks. Two variants of SHA-512, which are SHA-512/224 and SHA-512/256, are also susceptible to collision attacks. This paper aimed to overcome the challenges of SHA-5112 and its variants. Our approach is to use the SHA-512 algorithm with different modes of operation. We evaluate each mode of operation in terms of the time required for the computation of the hash. This paper also describes two essential properties, such as pre-image resistance and collision resistance of our approach. © 2020 IEEE.
  • Item
    Use Cases of Authentication Protocols in the Context of Digital Payment System
    (Institute of Electrical and Electronics Engineers Inc., 2020) Thawre, G.; Bahekar, N.; Chandavarkar, B.R.
    In the digital payment system, the transactions and their data about clients are very sensitive, so the security and privacy of personal information of the client is a big concern. The confirmation towards security necessities prevents the data from a stolen and unauthorized person over the digital transactions, So the stronger authentication methods required, which must be based on cryptography. Initially, in the payment ecosystem, they were using the Kerberos protocol, but now different approaches such as Challenge-Handshake Authentication Protocol (CHAP), Tokenization, Two-Factor Authentication(PIN, MPIN, OTP), etc. such protocols are being used in the payment system. This paper presents the use cases of different authentication protocols. Further, the use of these protocols in online payment systems to verify each individual are explained. © 2020 IEEE.
  • Item
    Techniques to Secure Address Resolution Protocol
    (Institute of Electrical and Electronics Engineers Inc., 2020) Selvarajan, S.; Mohan, M.; Chandavarkar, B.R.
    Address Resolution Protocol was developed to create a standard for translating IP addresses to physical addresses. ARP takes (IP, Protocol) as input and converts to physical address. ARP can be easily spoofed because it lacks security. The inventors of ARP thought that internal to the network threats were minimum, and ARP had to be simple for its efficient and dynamic working. A machine in the network, which can work at the data link layer, can be easily spoofed because of the vulnerability in ARP protocol, leading to a man-in-the-middle attack. Securing ARP is not an easy task because state information should be preserved for authentication of ARP frames. However, the protocol is stateless, and making changes to the ARP protocol itself is not practical since the protocol is currently being widely used. Our objective in this paper is to provide a solution to detect and mitigate ARP spoofing attacks without any changes to the protocol itself. The proposed system provides improvement to an existing solution using ICMP to detect ARP spoofing. © 2020 IEEE.
  • Item
    Remote User Authentication and Issues: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2020) Mehra, R.; Meshram, A.; Chandavarkar, B.R.
    The most convenient and the simplest authentication method to deal with the important and secret data over an uncertain network is remote user authentication. For remote user authentication, a system call with a high-security network is required, which will help to identify whether the parties which are communicating are trustworthy and genuine. User and the server will be securely authenticated using remote user authentication, protecting and processing the communication in a user-friendly way, and provide security to the user by hiding their details. This paper discusses the different approaches in which a remote user authentication mechanism can be done and the issues in those methods, which will verify both the parties in a secure, simple, and convenient way. © 2020 IEEE.
  • Item
    An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt
    (Institute of Electrical and Electronics Engineers Inc., 2020) Rathod, U.; Sonkar, M.; Chandavarkar, B.R.
    Passwords are barriers that protect unauthorized users from accessing personal information in any application. Protecting passwords is one of the challenging tasks in today's world. Currently, a combination of Username/Password used for authentication for a large number of applications. Malicious users might try to steal/misuse the user's data for unethical purposes. To prevent passwords from stealing, developers prefer to use one-way hash functions. One-way hash functions are theoretically irreversible functions that take as an input variable size text and output fixed-sized text. In reality, hash functions are not collision-resistant. Therefore it is recommended to use passwords and randomly generated text called salt to generate hash values and prevent rainbow tables and dictionary attacks. Passwords are hashed at the client-side and sent across the public channel/network. A salt is a randomly generated alphanumeric text used to concatenate with a password to generate a random hash value. This paper demonstrates how the random generation of salt is dependent on passwords and how hash values are dependent on salt. Further, analysis of the behaviour of passwords and hash values using various tools like Wireshark, Ettercap, and Hydra are presented in the paper. © 2020 IEEE.
  • Item
    Mitigating Man-in-the-Middle Attack in Digital Signature
    (Institute of Electrical and Electronics Engineers Inc., 2020) Jain, S.; Sharma, S.; Chandavarkar, B.R.
    We all are living in the digital era, where the maximum of the information is available online. The digital world has made the transfer of information easy and provides the basic needs of security like authentication, integrity, nonrepudiation, etc. But, with the improvement in security, cyber-attacks have also increased. Security researchers have provided many techniques to prevent these cyber-attacks; one is a Digital Signature (DS). The digital signature uses cryptographic key pairs (public and private) to provide the message's integrity and verify the sender's identity. The private key used in the digital signature is confidential; if attackers find it by using various techniques, then this can result in an attack. This paper presents a brief introduction about the digital signature and how it is vulnerable to a man-in-the-middle attack. Further, it discusses a technique to prevent this attack in the digital signature. © 2020 IEEE.
  • Item
    A Mathematical Model for Node Mobility during Water Current and Tsunami in Underwater Sensor Networks
    (Institute of Electrical and Electronics Engineers Inc., 2020) Tejaskumar, K.; Dharamdas, I.R.; Chandavarkar, B.R.
    In underwater acoustic sensor networks (UWASNs), the nodes deployed in the seas and oceans are not always stationary but are affected by changes in their environment. The changes may occur naturally or due to man-made interactions. Naturally occurring phenomena like earthquakes, tsunami, and water currents affect the position of the deployed nodes. The movement of nodes has an impact on the routing of packets involved in underwater communication. Thus, the mobility of nodes is an important factor that has to be taken into account when designing networking protocols for UW-ASNs. This paper talks about the motion of the nodes due to water currents and tsunami propagation. Mathematical models depicting the node's movement due to water currents and tsunami are discussed in this paper. The simulation of the node trajectories is done using UnetStack3. © 2020 IEEE.
  • Item
    Undeniable Signature Scheme: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2020) Kale, P.; Hazarika, P.; Chandavarkar, B.R.
    Nowadays, almost all business organizations, committees use the internet to do transactions and confidential information exchange. So it is crucial to make these transactions secure and reliable. A system to be confident and trustworthy needs a function of cryptography, and also it must manage the keys of cryptography. The digital signature, which is universally verifiable, is a solution when there are disputes between the sender and receiver. Later the undeniable signature scheme was introduced as a modern technique to verify the validity of a message sent by the sender. The undeniable signature scheme has its properties to protect the interests of the sender and receiver. An authenticated verifier only can check the signature with the approval of the signer. In this paper, we have discussed various undeniable signature schemes-key generation, signature verification, and disavowal protocol. This paper compares different schemes of the undeniable signature on the various notations of security. © 2020 IEEE.