This page has only limited features, please log in for full access.

Mr. Abhijeet Thakare
Student

Basic Info


Research Keywords & Expertise

0 Authentication
0 Computer Security
0 Information Security
0 elliptic curve cryptography
0 Internet of things security

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Hello Everyone, Greetings! Thank you very much for providing a research platform to share the work. My research interests are Inner IoT devices security, personal security, and privacy-preserving, Control system Security (Authentication and Access control), HW and SW security, Communication protocol security, Homomorphic Encryption, Internet of things network protocol, Discrete Logarithm, Elliptical curve cryptosystem, Cryptography, Cloud, Smart Grid, and Medical security. If anyone interested in mentioned field, please feel free to contact me. Sincerely, Abhijeet Thakarev

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 29 January 2021 in Applied Sciences
Reads 0
Downloads 0

Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.

ACS Style

Abhijeet Thakare; Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences 2021, 11, 1260 .

AMA Style

Abhijeet Thakare, Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences. 2021; 11 (3):1260.

Chicago/Turabian Style

Abhijeet Thakare; Young-Gab Kim. 2021. "Secure and Efficient Authentication Scheme in IoT Environments." Applied Sciences 11, no. 3: 1260.

Conference paper
Published: 18 February 2020 in 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW)
Reads 0
Downloads 0

Landmine removal is a basic issue looked by numerous nations around the globe, and the circumstance can be intensified during cataclysmic events or land advancement. Along these lines, it is an earnest issue to identify landmines in the ground and evacuate them securely. The procedure of landmine expulsion begins with the discovery of landmines in the ground. This exploration surveys the advancement and utilizations of Ground Penetrating Radar (GPR) innovation to address the difficulties of dependably distinguishing landmines. The accentuation is on the significance of the GPR system in landmine recognition execution to non military personnel or helpful demining programs. Ground Penetrating Radar (GPR) is a ultra-wideband radar that gives centimeter goals to find even little targets. There are two particular kinds of GPR approaches viz. time space and frequency domain. For the experimentation, at first a ground penetration radar is utilized to create informational collection, which is then prepared utilizing A, B and C scans to lessen the commotion to get landmine signals. At that point the migration algorithm is applied to the images got from Ground Penetrating Radar. From the output of the migration algorithm, landmine signals are processed, which are utilized as features of each landmine for recognition and distinguishing proof. As different articles are distinguished after the movement calculation, a determination method is applied to identify only signals of landmines and dispose of different items. Along these lines, an end to end pipeline for landmine recognition is proposed and assessed with a baseline strategy to highlight its viability.

ACS Style

Ajay Kumar; Aruna Pavate; Kumar Abhishek; Abhijeet Thakare; Mansi Shah. Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images. 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW) 2020, 1 -6.

AMA Style

Ajay Kumar, Aruna Pavate, Kumar Abhishek, Abhijeet Thakare, Mansi Shah. Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images. 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW). 2020; ():1-6.

Chicago/Turabian Style

Ajay Kumar; Aruna Pavate; Kumar Abhishek; Abhijeet Thakare; Mansi Shah. 2020. "Landmines Detection Using Migration and Selection Algorithm on Ground Penetrating Radar Images." 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW) , no. : 1-6.

Journal article
Published: 03 January 2020 in IEEE Internet of Things Journal
Reads 0
Downloads 0
ACS Style

Abhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal 2020, 7, 2890 -2900.

AMA Style

Abhijeet Thakare, Euijong Lee, Ajay Kumar, Valmik B. Nikam, Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal. 2020; 7 (4):2890-2900.

Chicago/Turabian Style

Abhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. 2020. "PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud." IEEE Internet of Things Journal 7, no. 4: 2890-2900.