This page has only limited features, please log in for full access.
Hello Everyone, Greetings! Thank you very much for providing a research platform to share the work. My research interests are Inner IoT devices security, personal security, and privacy-preserving, Control system Security (Authentication and Access control), HW and SW security, Communication protocol security, Homomorphic Encryption, Internet of things network protocol, Discrete Logarithm, Elliptical curve cryptosystem, Cryptography, Cloud, Smart Grid, and Medical security. If anyone interested in mentioned field, please feel free to contact me. Sincerely, Abhijeet Thakarev
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.
Abhijeet Thakare; Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences 2021, 11, 1260 .
AMA StyleAbhijeet Thakare, Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences. 2021; 11 (3):1260.
Chicago/Turabian StyleAbhijeet Thakare; Young-Gab Kim. 2021. "Secure and Efficient Authentication Scheme in IoT Environments." Applied Sciences 11, no. 3: 1260.
Landmine removal is a basic issue looked by numerous nations around the globe, and the circumstance can be intensified during cataclysmic events or land advancement. Along these lines, it is an earnest issue to identify landmines in the ground and evacuate them securely. The procedure of landmine expulsion begins with the discovery of landmines in the ground. This exploration surveys the advancement and utilizations of Ground Penetrating Radar (GPR) innovation to address the difficulties of dependably distinguishing landmines. The accentuation is on the significance of the GPR system in landmine recognition execution to non military personnel or helpful demining programs. Ground Penetrating Radar (GPR) is a ultra-wideband radar that gives centimeter goals to find even little targets. There are two particular kinds of GPR approaches viz. time space and frequency domain. For the experimentation, at first a ground penetration radar is utilized to create informational collection, which is then prepared utilizing A, B and C scans to lessen the commotion to get landmine signals. At that point the migration algorithm is applied to the images got from Ground Penetrating Radar. From the output of the migration algorithm, landmine signals are processed, which are utilized as features of each landmine for recognition and distinguishing proof. As different articles are distinguished after the movement calculation, a determination method is applied to identify only signals of landmines and dispose of different items. Along these lines, an end to end pipeline for landmine recognition is proposed and assessed with a baseline strategy to highlight its viability.
Ajay Kumar; Aruna Pavate; Kumar Abhishek; Abhijeet Thakare; Mansi Shah. Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images. 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW) 2020, 1 -6.
AMA StyleAjay Kumar, Aruna Pavate, Kumar Abhishek, Abhijeet Thakare, Mansi Shah. Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images. 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW). 2020; ():1-6.
Chicago/Turabian StyleAjay Kumar; Aruna Pavate; Kumar Abhishek; Abhijeet Thakare; Mansi Shah. 2020. "Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images." 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW) , no. : 1-6.
Abhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal 2020, 7, 2890 -2900.
AMA StyleAbhijeet Thakare, Euijong Lee, Ajay Kumar, Valmik B. Nikam, Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal. 2020; 7 (4):2890-2900.
Chicago/Turabian StyleAbhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. 2020. "PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud." IEEE Internet of Things Journal 7, no. 4: 2890-2900.