RS

Rahul Saha

26 records found

PETRAK

A solution against DDoS attacks in vehicular networks

In recent years, the frequently reported incidents of Distributed Denial of Service assaults on vehicular networks in various countries have made researchers find new protective solutions. DDoS attacks can propagate through the charging points for electric vehicles in a charging ...

VAIDANSHH

Adaptive DDoS detection for heterogeneous hosts in vehicular environments

Vehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, these algorithms are applicable only ...

AALMOND

Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks

Access control (AC) is an important security parameter in industrial networks; a mismanaged AC system leads to security breaches. The existing security solutions significantly consider the AC methods in the Industrial Internet of Things (IIoT); however, falsified identity can byp ...

GREPHRO

Nature-inspired optimization duo for Internet-of-Things

The optimization techniques usually work with the maximization or minimization of the problem to obtain the local loci or cumulative global loci. Two-dimensional bio-inspired optimization techniques face convexing problems towards a global solution and use an increased number of ...

MADESANT

Malware detection and severity analysis in industrial environments

Malware remains a persistent threat to industrial operations, causing disruptions and financial losses. Traditional malware detection approaches struggle with the increasing complexity of false positives and negatives. However, existing Intrusion Detection Systems (IDSs) often la ...
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leadi ...

PREVIR

Fortifying Vehicular Networks Against Denial of Service Attacks

Vehicular networks are expanding their applications for future sustainability. The reported increasing rate of data breaches through vehicular networks by Distributed Denial of Service (DDoS) type of intrusion creates concern for such networks. Existing security solutions focus o ...
Lawful evidence management by law enforcement agencies during the Digital Forensics (DF) investigation is of supreme importance since it convicts suspects of crimes. Therefore, a secure and efficient evidence management system should have certain features such as tamper-resistant ...

Pribadi

A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities

Wireless Multimedia Sensor Network (WMSN) is a network of interconnected sensor nodes equipped with multimedia devices capable to retrieve multimedia as well as scalar sensor data in smart city scenarios. With the progress of smart city development, WMSNs are becoming points of i ...

COUNT

Blockchain framework for resource accountability in e-healthcare

The progress of sensor devices, digital communication, and computing techniques enhances the functionalities of e-healthcare, where the medical facilities are manageable based on the Internet. Now a days, e-healthcare not only helps in disease diagnosis, or tele-medicine, but als ...

PIGNUS

A Deep Learning model for IDS in industrial internet-of-things

The heterogeneous nature of the Industrial Internet of Thing (IIoT) has a considerable impact on the development of an effective Intrusion Detection System (IDS). The proliferation of linked devices results in multiple inputs from industrial sensors. IDS faces challenges in analy ...

BENIGREEN

Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT

The energy conservative extension of the Internet of Things (IoT), green IoT, is a revolutionary approach in connecting people, processes, and things in an energy-efficient way. The existing research works in the domain of green IoT forbid the use of decentralized management (e.g ...

RAPCOL

A range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things

Industrial applications and automation controls are closely connected with heterogeneous Wireless Sensor Network (WSN); thus, Industrial Internet-of Thing (IIoT) enhances the productivity, scalability, and flexibility of the operations. However, in many cases such as tracking a d ...
The increasing number of connected devices in the era of Internet of Thing (IoT) has also increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent system to monitor, detect, and alert about malicious activities; an Intrusion Prevention System ( ...
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also increasing exponentially. Theref ...
Wide-scale adoption of the Internet of Everything requires decentralized security, responsibility, and trust among the stakeholders. All these can be achieved by a Distributed Ledger Technology (DLT) backbone. As a mathematical model for enabling this DLT backbone, IOTA's Tangle ...
Internet of Things (IoT) composed of large number of sensing devices with a variety of features applicable for various applications. In such scenarios, due to low data handling capabilities, limited storage, and security aspects, it is quite challenging to protect networks agains ...

DeBot

A deep learning-based model for bot detection in industrial internet-of-things

In this paper, we show a deep learning model for bot detection, named as DeBot, for industrial network traffic. DeBot uses a novel Cascade Forward Back Propagation Neural Network (CFBPNN) model with a subset of features using the Correlation-based Feature Selection (CFS) techniqu ...
Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this technology. Consensus protocol/algorithm helps to provi ...

PoSC

Combined Score for Consensus in Intemet-of-Things Applications

The properties of decentralization, security, and immutability have made the blockchain technology beneficial for various Internet of Things (IoT) applications. Consensus algorithms enable the peers in IoT-based networks to reach a common agreement on the current state of the net ...