Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
118 results
Search Results
Item Data formats and its research challenges in iot: A survey(Springer Science and Business Media Deutschland GmbH, 2021) Mahanthappa, S.; Chandavarkar, B.R.In the current context, the increase in data generated by the heterogeneous IoT sensors results in several challenges to the IoT applications’ developers. One of the significant problems is handling nonstandardized zeta bytes of heterogeneous IoT data. Further, there is a lack of understanding of data generated by the sensors and incompatibility in representing the data. The objective of this survey paper is to introduce IoT sensors with their areas of applications, the different data formats, representing the data in an interchangeable format, and handling data as a stream. Further, this paper also presents challenges and research opening in IoT data. © Springer Nature Singapore Pte Ltd 2021.Item Void-aware routing protocols for underwater communication networks: A survey(Springer Science and Business Media Deutschland GmbH, 2021) Nazareth, P.; Chandavarkar, B.R.Underwater Acoustic Sensor Networks (UASNs) is a technology used in several marine applications like environment prediction, defense applications, and discovering mineral resources. UASNs has several challenges like high bit error rate, high latency, low bandwidth, and void-node problem during routing. In the context of routing protocols for underwater communication networks, the void-node problem is one of the major challenging issues. The void-node problem arises in the underwater communication during the greedy-forwarding technique, due to which packet will not be forwarded further toward the sink. In this review paper, we analyze the void-node problem in underwater networks and issues related to the void-node. Also, we elaborate on the significant classification of void-handling routing protocols. We analyze both location-based and pressure-based void-handling routing protocols. © Springer Nature Singapore Pte Ltd 2021.Item Mitigation of RPL stateless address auto-configuration IPV6 spoofing attack in IOT(Apple Academic Press, 2023) Yadav, S.; Gangwar, S.; Kembhavi, P.; Chandavarkar, B.R.; Kamble, S.As wireless network usage is expanding, attempts are being made to disrupt the smooth functioning of the network. Due to power and memory constraints inherent in the Internet of Things (IoT) devices, implementing security measures becomes an even more significant challenge. There are many ways in which confidential information can be extracted from networks. IP address spoofing is one such attack. IP address spoofing is an illegal, unauthorized change of IP address. Malicious elements in the network impersonate as a genuine client by copying their IP address. As a result, attackers can intercept network communication between genuine clients. A false IP address makes it possible for the attacker to bypass existing security mechanisms, which creates severe security and confidentiality problems. This chapter proposes a method to resolve the issue by ensuring that an incoming node in a network always gets a unique IP address, thus making it difficult for the attacker to disguise itself as a genuine client and carry out the attack. © 2023 Apple Academic Press, Inc. All rights reserved.Item Void Avoidance Node Deployment Strategy for Underwater Sensor Networks(Springer, 2020) Nazareth, P.; Chandavarkar, B.R.Underwater Wireless Sensor Networks (UWSNs) play a major role in many aquatic applications. Underwater sensors were deployed over a given three-dimensional area. Dynamic and unpredictable nature of the underwater environment is resulting in void communications, interrupting the flow of data to the sink node. Sensor nodes, which are part of void communications are called void nodes, and in multi-hop communication nodes depend on void which are called trap. Any deployed node can become a void or trap not only after their deployment but also during their initial deployment. Most popularly used random deployment strategy in UWSNs always results in the many voids and traps. To countermeasure, the shortfall additional nodes are deployed, which may result in still worse condition. The first objective of this paper is highlighting void and trap node problems in random deployment strategy. In the second objective, we are proposing a systematic way of sensor node deployment that overcomes void and trap problems arising in random deployment in UWSNs. Through the MATLAB simulation drawbacks of random and benefits of systematic deployment strategies are demonstrated using a count of void & trap nodes, volume of the area covered, and count of retained void & traps. © 2020, Springer Nature Singapore Pte Ltd.Item Security issues and challenges in Healthcare Automated Devices(Institute of Electrical and Electronics Engineers Inc., 2020) Jangid, A.; Dubey, P.K.; Chandavarkar, B.R.Automated devices can be seen everywhere be at home, office, medical devices, Mobiles, etc. This paper presents some of the healthcare-related automated devices with their shortcomings related to security. We are addicted to automated devices and in near future, we will be watching new emergence of devices with the increasing power of automation devices and their security is a big concern as the credibility of a machine is questionable and it's related to automated devices and we are left with many challenges to resolve those security threats. This paper reviews the automation devices primarily in the healthcare field and their security-related issues along with the challenges that we might face in the future while using them. Some already available solutions are presented to try to come up with possible new solutions. © 2020 IEEE.Item An Experimental Evaluation of SHA-512 for Different Modes of Operation(Institute of Electrical and Electronics Engineers Inc., 2020) Bhonge, H.N.; Ambat, M.K.; Chandavarkar, B.R.We have different numbers of algorithms for computation of the hash. SHA-512 is vulnerable to pre-image attacks. Two variants of SHA-512, which are SHA-512/224 and SHA-512/256, are also susceptible to collision attacks. This paper aimed to overcome the challenges of SHA-5112 and its variants. Our approach is to use the SHA-512 algorithm with different modes of operation. We evaluate each mode of operation in terms of the time required for the computation of the hash. This paper also describes two essential properties, such as pre-image resistance and collision resistance of our approach. © 2020 IEEE.Item Use Cases of Authentication Protocols in the Context of Digital Payment System(Institute of Electrical and Electronics Engineers Inc., 2020) Thawre, G.; Bahekar, N.; Chandavarkar, B.R.In the digital payment system, the transactions and their data about clients are very sensitive, so the security and privacy of personal information of the client is a big concern. The confirmation towards security necessities prevents the data from a stolen and unauthorized person over the digital transactions, So the stronger authentication methods required, which must be based on cryptography. Initially, in the payment ecosystem, they were using the Kerberos protocol, but now different approaches such as Challenge-Handshake Authentication Protocol (CHAP), Tokenization, Two-Factor Authentication(PIN, MPIN, OTP), etc. such protocols are being used in the payment system. This paper presents the use cases of different authentication protocols. Further, the use of these protocols in online payment systems to verify each individual are explained. © 2020 IEEE.Item Techniques to Secure Address Resolution Protocol(Institute of Electrical and Electronics Engineers Inc., 2020) Selvarajan, S.; Mohan, M.; Chandavarkar, B.R.Address Resolution Protocol was developed to create a standard for translating IP addresses to physical addresses. ARP takes (IP, Protocol) as input and converts to physical address. ARP can be easily spoofed because it lacks security. The inventors of ARP thought that internal to the network threats were minimum, and ARP had to be simple for its efficient and dynamic working. A machine in the network, which can work at the data link layer, can be easily spoofed because of the vulnerability in ARP protocol, leading to a man-in-the-middle attack. Securing ARP is not an easy task because state information should be preserved for authentication of ARP frames. However, the protocol is stateless, and making changes to the ARP protocol itself is not practical since the protocol is currently being widely used. Our objective in this paper is to provide a solution to detect and mitigate ARP spoofing attacks without any changes to the protocol itself. The proposed system provides improvement to an existing solution using ICMP to detect ARP spoofing. © 2020 IEEE.Item Remote User Authentication and Issues: A Survey(Institute of Electrical and Electronics Engineers Inc., 2020) Mehra, R.; Meshram, A.; Chandavarkar, B.R.The most convenient and the simplest authentication method to deal with the important and secret data over an uncertain network is remote user authentication. For remote user authentication, a system call with a high-security network is required, which will help to identify whether the parties which are communicating are trustworthy and genuine. User and the server will be securely authenticated using remote user authentication, protecting and processing the communication in a user-friendly way, and provide security to the user by hiding their details. This paper discusses the different approaches in which a remote user authentication mechanism can be done and the issues in those methods, which will verify both the parties in a secure, simple, and convenient way. © 2020 IEEE.Item An Experimental Evaluation on the Dependency between One-Way Hash Functions and Salt(Institute of Electrical and Electronics Engineers Inc., 2020) Rathod, U.; Sonkar, M.; Chandavarkar, B.R.Passwords are barriers that protect unauthorized users from accessing personal information in any application. Protecting passwords is one of the challenging tasks in today's world. Currently, a combination of Username/Password used for authentication for a large number of applications. Malicious users might try to steal/misuse the user's data for unethical purposes. To prevent passwords from stealing, developers prefer to use one-way hash functions. One-way hash functions are theoretically irreversible functions that take as an input variable size text and output fixed-sized text. In reality, hash functions are not collision-resistant. Therefore it is recommended to use passwords and randomly generated text called salt to generate hash values and prevent rainbow tables and dictionary attacks. Passwords are hashed at the client-side and sent across the public channel/network. A salt is a randomly generated alphanumeric text used to concatenate with a password to generate a random hash value. This paper demonstrates how the random generation of salt is dependent on passwords and how hash values are dependent on salt. Further, analysis of the behaviour of passwords and hash values using various tools like Wireshark, Ettercap, and Hydra are presented in the paper. © 2020 IEEE.
