Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    Impact of Blockchain for Internet of Things Security
    (wiley, 2020) Rudra, B.
    The Internet of Things (IoT) is playing a major role in the industry and is encouraging researchers to come up with various applications by bringing economical and social benefits to society. This is having an incredible impact on various environments using common operating picture ranging from mission-critical applications to business-oriented applications like healthcare, transportation, video surveillance, banking, etc. Common operating picture is achieved with the help of advancements seen in WSN devices, which are able to communicate with each other for the exchange of information and allow the data analysis for various purposes. The information is exchanged among the devices using the central server of cloud or fog, raising various security vulnerabilities. Not only the servers, but the IoT devices themselves will have security vulnerabilites which can be exploited by attacks like device spoofing, false authentication, etc. Taking into consideration the predicted evolution of IoT in the coming years, it is required to provide confidence in the users that the data they store or exchange and the devices they use for the purpose of security and privacy is preserved. The IoT objects are interconnected to each other but the functions of these vary from each other, which will not yield better security results with the conventional approaches. To address security and privacy concerns, the central server concept is eliminated and blockchain technology is introduced as a part of IoT. Blockchain, which is used for Bitcoin, has been recently used to provide security in peer-to-peer network, which is similar to IoT technology. This chapter explains the various applications of IoT fol lowed by the security and privacy issues. It discusses the challenges involved in securing IoT followed by an introduction to blockchain technology along with various advantages of blockchain for IoT. It also discusses the application domains of blockchain technology in IoT, classification of threat models that are considered by blockchain protocols for IoT networks, and a comparison of state-of-the-art secure models with respect to blockchain. At the end, the chapter highlights the open challenges and further research directions in blockchain technology for IoT. © 2020 Scrivener Publishing LLC.
  • Item
    Ethereum Blockchain Enabled Secure and Transparent E-Voting
    (Springer Science and Business Media Deutschland GmbH, 2021) Rao, V.; Singh, A.; Rudra, B.
    The blockchain’s revolutionary concept is the underlying technology behind the popular examples such as Bitcoin and it now relies on the Web and online services. Nowadays, blockchain is famous for its use in cryptocurrencies, but many fintech activities and routine processes that were done offline can be done using blockchain. Smart contracts are abstract pieces of codes that need to be inserted into the network and enforced as planned in every phase of upgrading blockchains. With the population growing so fast across the globe, e-voting is an emerging online service-related issue. The smart contracts of blockchain enable to have a easy, safe, cheap, secure and transparent e-voting due to which blockchain is one of the top solutions for e-voting. Even in the many blockchains available in the world, Ethereum is one of the most consistent available blockchain and has widespread use because of which it is suitable for e-voting. An e-voting system must ensure that it is secure, as it should not allow duplicated votes and it should be able to protect attendants’ privacy being fully transparent too. In this paper, Ethereum wallets and Solidity language for smart contracts were used to make a sample small scale e-voting application. The blockchain was tested on local blockchain using ganache and ropsten test network. The Ethereum blockchain keeps the records of ballots and votes after an election is held. Users can use Ethereum wallets to directly submit theirs vote and those votes are handled with the consensus of each Ethereum node. © 2021, Springer Nature Switzerland AG.
  • Item
    Blockchain based Framework for Student Identity and Educational Certificate Verification
    (Institute of Electrical and Electronics Engineers Inc., 2021) Chowdhary, A.; Agrawal, S.; Rudra, B.
    With the rise in digitization of documents stored online, it is important to have a document verification process. It involves customized verification and authentication of a document based on the content of the document. Among all the certificates, the educational certificate is one of the most important certificates, especially for students. Unfortunately, it is very easy to fake documents that are hard to identify nowadays and are often considered original. Blockchain has recently emerged as a potential alternative to manual verification of certificates. It provides a distributed ledger that is verifiable with cryptographic mechanisms. Also, it provides a common platform for easily sharing, storing, and accessing documents. The identity of the students can be verified using government authorized identity proofs. This paper proposes the use of such unique identity number and secret phrase provided by the student to further improve the security of the certificate verification system. The student's identity and document are both verified by matching the hashes already present in the Blockchain. Also, in the proposed method the documents are linked to the student to add another layer of verification. The implementation of this proposed platform can be used to issue, receive and verify the certificates. © 2021 IEEE.
  • Item
    Secure Decentralized Carpooling Application Using Blockchain and Zero Knowledge Proof
    (Science and Technology Publications, Lda, 2024) Goel, S.; Sawant, S.V.; Rudra, B.
    Blockchain extends its reach far beyond cryptocurrencies such as Bitcoin, encompassing a broader spectrum of applications. It acts as a transparent, distributed, and unchangeable ledger where every participant in the network possesses a copy of the blockchain. This decentralized system secures all data and transactions through encryption, ensuring reliability. The key components of blockchain-based applications include Smart Contracts, which house the application’s logic and operate on the blockchain. In traditional carpooling systems, centralized authorities like Uber or Ola control the entire process, collecting and managing data from both drivers and riders. However, by leveraging blockchain and smart contracts, a more secure and private carpooling system can be established, allowing riders and drivers to connect directly without intermediaries. Blockchain applications encounter challenges, primarily related to scalability and privacy. Every node in the system processing transactions limits scalability. Moreover, the practice of publishing all data at each node for processing raises privacy concerns. To tackle these issues, an approach using non-interactive proofs for off-chain computations can enhance efficiency. This approach verifies correctness without exposing private data, thus improving privacy. ZoKrates, a toolbox, simplifies this process by providing a domain-specific language (DSL), compiler, and generators for proofs and verification of Smart Contracts, streamlining complex zero-knowledge proof tasks and promoting their adoption. © 2024 by SCITEPRESS – Science and Technology Publications, Lda.
  • Item
    Advancing Security and Scalability - A Protocol Extension for Dynamic Group Membership Management
    (AnaPub Publications, 2025) Renisha, P.S.; Rudra, B.
    The integration of Contributory Group Key Agreement (CGKA) for group formation revolutionizes the collaborative process of generating group keys, instilling trust and fostering collaboration among group members. By ensuring that each member actively contributes to the generation of the group key, CGKA distributes the responsibility of key generation across the group, thereby enhancing the security and resilience of the group's cryptographic infrastructure. Concurrently, the utilization of Lattice Diffie-Hellman (LDH) for key generation leverages the mathematical properties of lattices to securely derive shared secret keys. LDH offers a robust and efficient method for generating keys in cryptographic applications, ensuring the confidentiality and integrity of communication channels. Furthermore, the incorporation of blockchain technology for implementing membership changes introduces a decentralized and transparent approach to managing group membership dynamics. By leveraging blockchain's distributed ledger technology and smart contracts, membership changes can be executed securely, transparently, and efficiently. This enhances the integrity and resilience of the group's membership management system, allowing for the secure addition and removal of members from the group while maintaining the integrity of the cryptographic infrastructure. Together, the integration of CGKA, LDH, and blockchain technology presents a comprehensive solution for advancing the security and scalability of dynamic group membership management protocols, offering a robust framework for secure and efficient communication in contemporary environments. Moreover, the proposed integration of CGKA, LDH, and blockchain technology facilitates seamless adaptation to dynamic changes in group membership, ensuring that security and scalability are maintained even as the composition of the group evolves. Through simulations and performance evaluations, the effectiveness of the integrated approach that is implemented in Python Software is demonstrated compared to existing protocols like Elliptic Curve Diffie-Hellman (ECDH), RSA Key Exchange, and Post-Quantum Cryptography (PQC). ©2025 The Authors.