Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
29 results
Search Results
Item Identifying and mitigating against XSS attacks in web applications(CRC Press, 2021) Shashidhara, R.; Madhusudhan, R.[No abstract available]Item Blockchain Based Artificial Intelligence of Things (AIoT) for Wildlife Monitoring(Springer Science and Business Media Deutschland GmbH, 2024) Madhusudhan, R.; Pravisha, P.Climate change poses a significant threat to wild animals and their habitats, increasing the chance of human-wildlife conflict. Traditional camera-based imaging systems are centralized and require operators to install the camera and monitor the video recording constantly. However, manually processing the massive number of images and videos gathered from camera traps is expensive and time-consuming. In this article, we will develop a framework for wildlife monitoring systems that make use of Artificial Intelligence of Things (AIoT), the Interplanetary File System (IPFS), and blockchain. A wildlife camera that uses AIoT to detect wild animal movement in real-time gathers the dynamic properties of animals. Cloud computing solutions are impractical for critical data management in wildlife monitoring due to their high latency and constant internet connectivity requirements. IPFS is a distributed file system that offers efficient data storage, distribution, and persistence, enabling offline-centric paradigms. In our framework, IPFS is used for permanent data storage, and the hash value of data is stored on a private blockchain. The data from multiple forest zones is stored on a consortium blockchain. A simulation is carried out using CNN and a method to improve the scalability of the framework is presented. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Item Enhancing Cybersecurity: Malicious Webpage Detection Using Machine and Deep Learning(Springer Science and Business Media Deutschland GmbH, 2025) Madhusudhan, R.; Surashe, S.V.; Pravisha, P.A wide range of techniques have been proposed for detecting malicious webpages; however, with the advent of more sophisticated webpage creation processes, it has become more challenging for these approaches to deliver satisfactory outcomes. Blacklisting and classification techniques were used in the past to identify malicious webpages. The classification of the websites becomes more challenging if they are not included on the blacklist. Machine learning techniques are gaining popularity in cybersecurity. One disadvantage of the machine learning model is that it becomes slower when using content-based features. While getting the whois feature, which gives creation, updation, and expiration dates of the webpage, the webpage is physically visited. Hence, there is a chance of malicious activity. Therefore, the process of feature extraction becomes challenging and time-consuming. This article uses the Term Frequency-Inverse Document Frequency (TF-IDF) and Natural Language Processing (NLP) methods to obtain the corpus for benign and malicious words present in the Unified Resource Locator (URL). An artificial neural network (ANN) has been employed to categorize websites as benign or malicious. A comparative analysis of artificial neural networks (ANN) with other machine learning approaches has been conducted. The experimental results demonstrate that ANN has the highest accuracy of 96.70%. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Item Smart Land Registry System Using Blockchain: Challenges and Solutions(Springer Science and Business Media Deutschland GmbH, 2025) Madhusudhan, R.; Arya, D.; Pravisha, P.The land registry system fosters property investment and provides security to proprietors, thereby promoting economic development. Traditional centralized systems encounter challenges such as inefficiency, malicious activity, lack of transparency, etc. Blockchain is a distributed ledger that maintains data over a network without the control of a central authority. It uses a peer-to-peer system and consensus mechanisms to validate and permanently add transaction blocks, making data tamper-proof and immutable. The blockchain-based smart land registry system offers several benefits, including efficiency, security, transparency, and immutability. Blockchains can be configured as public, private, hybrid, or consortium, each with specific advantages and use cases. The blockchain network uses a consensus mechanism to ensure that only verified transactions are added to a block. A good combination of blockchain and consensus algorithms has solved various problems in land registration. In this article, a systematic study is conducted on blockchain-based land registry systems to identify research gaps in this area. The article highlights the technologies used for developing these systems and the classification of systems based on the services provided. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.Item Cryptanalysis of a remote user authentication protocol using smart cards(IEEE Computer Society help@computer.org, 2014) Madhusudhan, R.; Kumar, R.S.Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. © 2014 IEEE.Item An efficient and secure authentication scheme with user anonymity for roaming service in global mobile networks(Association for Computing Machinery acmhelp@acm.org, 2016) Madhusudhan, R.; ShashidharaIn global mobile network, it is essential to authenticate mobile users and provide secure communication between a user, foreign agent and the home agent using session key. Designing a secure and efficient authentication protocol for roaming users in mobile network is a challenging. The authors wen et al. analyzed Jiang et al. authentication scheme recently and proved that the scheme cannot resist with replay attack and stolen-verifier attack. Later, they come up with a smart card based authentication scheme for roaming service. The Wen et al.'s scheme protects anonymity of the user and is believed to have many abilities to resist a various kind of cryptographic attacks. However, through careful analysis, we find that Wen et al.'s scheme is vulnerable to bit flipping attack, impersonation (forgery attacks), insider attack, denial-of-service attack, unfair key agreement and cannot provide user's anonymity. To remedy these weaknesses and to achieve low communication and computation costs, we proposed an efficient secure authentication scheme for roaming users in global mobile networks. The performance analysis shows that the proposed authentication protocol is simple and secure. © 2016 ACM.Item Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card(Institute of Electrical and Electronics Engineers Inc., 2016) Madhusudhan, R.; Hegde, M.In a distributed environment, one of the major concerns is authentication of remote users. In this sector, legitimate users are more powerful attackers. The remote systems working with password and smart card ensures authorised access. Smart card based remote user authentication schemes have been adopted due to their low computation cost and portability. In 2012, Wen and Li proposed an improved dynamic ID based remote user authentication with key agreement scheme. They stated that their scheme provides protection against impersonation attack and preserves secret information. In this paper, we unveil the drawbacks of Wen and Li's scheme. Also we show that their scheme does not detect wrong password quickly, making it vulnerable to insider and smart card stolen attack. Further the scheme provides no protection for forward secrecy. To solve these security weaknesses, we propose a robust authentication scheme which overcomes all the pointed flaws, by keeping eminence of Wen and Li's scheme. © 2016 IEEE.Item An efficient and secure user authentication scheme with anonymity in global mobility networks(Institute of Electrical and Electronics Engineers Inc., 2017) Madhusudhan, R.; Suvidha, K.S.User authentication is a very important security mechanism for accessing the services while roaming in the global mobility networks. However, the authentication schemes designed are vulnerable to the attacks, hence new requirements should be employed while designing a scheme. In 2014 Gope and Hwang proposed an efficient mutual authentication and key agreement scheme, in which they stated that the scheme provides a strong security to the user anonymity. In this paper we have proved that Gope and Hwang scheme is vulnerable to stolen smart card attack, offline password guessing attack, forgery attack and replay attack. Moreover their scheme fails to preserve user anonymity. Hence a new efficient and secure user authentication scheme with anonymity in global mobility networks is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. Performance analysis shows that the proposed scheme is secure and suitable for practical implementation. © 2017 IEEE.Item An enhanced secure authentication scheme with user anonymity in mobile cloud computing(Institute of Electrical and Electronics Engineers Inc., 2017) Madhusudhan, R.; Suvidha, K.S.With the rapid growth and development in cloud computing and mobility, mobile cloud computing has emerged and becomes the trend of future generation computing paradigm. Cloud offers infrastructure, platform and software services to mobile users through mobile network. The key issues in mobile cloud computing are security and privacy. While analysing security and privacy issues in mobile cloud computing, three aspects should be considered they are: mobile terminal, mobile network and the cloud. To address the key issues in mobile cloud computing, we proposed an authentication scheme which will provide security to the messages exchanged between mobile user and the cloud server. Lee at al. have proposed authentication scheme for roaming service in global mobility networks in 2016. In this paper we have reviewed Lee et al.'s scheme and proved that their scheme is vulnerable to replay attack, man in the middle attack and impersonation attack. Moreover their scheme fails to preserve user anonymity, provides no local password verification and could not achieve perfect forward secrecy. Hence an enhanced secure authentication scheme with user anonymity in mobile cloud computing is proposed. Furthermore, the security analysis of the proposed scheme is also presented in this paper. © 2017 IEEE.Item An improved user authentication scheme for telecare medical information systems(Institute of Electrical and Electronics Engineers Inc., 2018) Madhusudhan, R.; Nayak, C.S.Medical field is one of the many important fields that keeps growing day by day. Since health care is essential for every human being, development of medical systems play a vital role in the overall development of society. With the help of the Internet, medical services are provided through TMIS (Telecare Medicine Information System). During the process, information related to patient is transmitted over open channels and ensuring safety to this information is an essential task. For this, a number of remote user authentication schemes have been proposed and evolved over the time. Chen et al. proposed an authentication scheme for TMIS in 2018. Through analysis of their scheme, it has been shown that their scheme cannot withstand user impersonation attack, server masquerading attack, password guessing attack and cannot preserve user anonymity. These weaknesses have been presented in this paper. In addition to this, an improved scheme has been proposed which overcomes the aforementioned security defects. Also, this paper discusses the security analysis of the proposed scheme, which proves that it is more secure and can be practically implemented. © 2018 ACM.
- «
- 1 (current)
- 2
- 3
- »
