Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 3 of 3
  • Item
    Security issues and challenges in Healthcare Automated Devices
    (Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.
    Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.
  • Item
    An Interdependency between Symmetric Ciphers and Hash Functions: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2020) Dubey, P.K.; Jangid, A.; Chandavarkar, B.R.
    Symmetric ciphers are one of the most famous cryptographic paradigms in cryptography. Its simplistic algorithm makes it easy to understand, and it has not very complex implementation. Hash functions, on the other hand, are the fundamental algorithm in managing the integrity of the transmitted data. It is also widely popular. Symmetric ciphers and hash functions are very much dependent on each other to make them more secure and robust application. In this paper, we will see how symmetric ciphers and hash functions are connected, and their different use cases in real life. This paper also includes different symmetric ciphers, hash functions, and we will see their relationship. First, this paper will introduce what a security service is, then the classes of cryptographic algorithms are illustrated where we have discussed different paradigms of cryptography. After that, we have addressed different types of symmetric ciphers and hash functions. Based on some use cases, we have shown the inter-dependency of symmetric cipher and hash function. Next, we have presented a comparison in various approaches to dependency. © 2020 IEEE.
  • Item
    Trilateration Based Localization for Underwater Sensor Networks
    (Springer Science and Business Media Deutschland GmbH, 2022) Nazareth, P.; Chandavarkar, B.R.; Dubey, P.K.
    Underwater Sensor Networks (UWSNs) is one of the emerging areas in the field of communication. UWSNs are used in many applications. At the same time, it faces several challenges such as energy constraint, node mobility, routing, and localization. The sensed data is meaningful only when it is referred to with location. In underwater sensor networks (UWSNs), determining the sensor’s location where the event is taking place is essential. Estimating the location of each node in a sensor network is known as localization. As global positioning system (GPS) signals are not propagated underwater, localization becomes a challenging issue. While various localization algorithms have been proposed for terrestrial sensor networks, they may not directly map them to underwater due to the variation and three-dimension nature of underwater. This paper presents a new localization technique for underwater sensor networks based on trilateration. In this technique, whenever a new node is introduced in an UWSNs, it will derive its coordinates by examining the coordinates of three of its nearest neighbors and the distance between them. Distance between them is determined by using round-trip time. The mathematical model, along with simulation, is presented in the paper. Further, a thorough analysis of results for static and mobile nodes is discussed in this paper. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.