Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 4 of 4
  • Item
    Studies on the surface oxidation of molten aluminium - Silicon alloys using laser as a probe
    (Materials Science and Technology, 2007) Udupa, K.R.; Chatterjee, S.
    An attempt has been made to study for the first time the surface oxidation of molten aluminium-silicon alloy using laser as a probe. A ray of low powered laser was made to fall on freshly prepared surface of molten aluminium-silicon alloy and intensity of the reflected beam was measured using a light detecting resistor (LDR). The change in intensity of reflected laser beam which was due to surface degradation of the molten liquid on oxidation was recorded. Intensity profile which showed variation of intensity (registered as reciprocal of resistance on LDR) with respect to time was generated for pure aluminium melt and molten aluminium-silicon alloy. The intensity profile revealed three regions indicating different mechanisms of oxidation in each stage. It was found that alloying addition influences the nature of intensity profile. Copyright © 2007 MS&T'07®.
  • Item
    Efficient key management in IoT using mobile aggregator
    (Springer Verlag service@springer.de, 2016) Saurabh, S.; Pais, A.R.; Chatterjee, S.
    Managing keys in Internet of Things (IoT) is challenging. With this proposed work we are trying to address an efficient key management protocol for specific application based scenario which enforces secure connectivity of devices and minimizes node capture attacks. There are a number of protocols that have been enforced and implemented for wireless sensor networks (WSN) and internet-enabled devices. We propose a protocol with mobility interface using combinatorial designs for key management in IoT devices. Mobile devices follow a dedicated path to collect data securely from installed devices in the network. We also compare our work with existing protocols and few mobility models. © Springer Nature Singapore Pte Ltd. 2016.
  • Item
    Distributed data aggregation in wireless sensor network: With peer verification
    (SciTePress, 2016) Chatterjee, S.; Pais, A.R.; Saurabh, S.
    Data aggregation in wireless sensor network is implemented to reduce the communication overhead and to reduce bandwidth utilization. Data confidentiality requires the sensor node to transmit the data in a secure manner so that the adversary is unable to read the data or transmit false data even if it compromises some of the sensor nodes or aggregation node. In this paper a distributed aggregation protocol using homomorphic trapdoor permutation is proposed. This protocol distributes the responsibility of key generation, aggregation and verification to different nodes to reduce the overall power consumption of the sensor network. The peer verification scheme is also proposed as a part of the protocol. Peer verification ensures the authentication of the data and sender node in the network, by at least k peer nodes. Security of the proposed protocol is analyzed against passive and active adversary model. © © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
  • Item
    Searchable encryption through obfuscation and multi-cloud search
    (Institute of Electrical and Electronics Engineers Inc., 2016) Chatterjee, S.; Bhattacharjee, S.; Chandrasekaran, K.
    In this paper different searchable encryption techniques are studied along with some implementation of searchable encryption in a cloud environment. Symmetric searchable encryption is implemented through trapdoor function to selectively expose keyword for search. A new method of achieving searchable encryption in the random oracle model is proposed through one way indistinguishability obfuscation. Indistinguishability obfuscation is achievable through mimicry function and one way cryptographic hash function. Security of the model is also analyzed with non adaptable indistinguishability security. Using this method an efficient idea of multi-cloud search environment is also proposed. In multi cloud searchable encryption several independent data providers collaborate in a federated way to provide search in their data through different independent cloud service provider revealing only keywords associated with the data. © 2015 IEEE.