This page has only limited features, please log in for full access.

Unclaimed
Prosanta Gope
Department of Computer Science, University of Sheffield, Regent Court, Sheffield S1 4DP, United Kingdom

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 19 August 2021 in IEEE Transactions on Smart Grid
Reads 0
Downloads 0

The smart metering infrastructure plays an important role in smart grid environments. Such metering networks need to be protected against cyber attacks by using authenticated key exchange protocols, and many relevant schemes have been presented by researchers. In addition, in order to protect against the energy theft problem, it is also important to consider physical security of the smart meter. Recently, PUFs (physical uncloneable functions) have gained popularity as a primitive against physical attacks. In 2019, we proposed the first PUF-based authentication scheme for secure smart grid communication with resilience against physical attacks on smart meters. However, recent studies have shown that PUFs are susceptible to modeling attacks. To address this issue, this paper proposes a reconfigureable authenticated key exchange scheme for secure communication in smart grids by using the concept of reconfigureable PUFs. In addition to security, the efficiency evaluation demonstrates that our new scheme has advantages in both the computation and communication costs as compared to the state-of-the-art protocols.

ACS Style

Prosanta Gope; Biplab Sikdar. A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids. IEEE Transactions on Smart Grid 2021, PP, 1 -1.

AMA Style

Prosanta Gope, Biplab Sikdar. A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids. IEEE Transactions on Smart Grid. 2021; PP (99):1-1.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2021. "A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids." IEEE Transactions on Smart Grid PP, no. 99: 1-1.

Journal article
Published: 09 July 2021 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0

The Internet-of-Things (IoT) is becoming a revolutionary paradigm, moving towards ubiquity in day to day life and used in several applications such as smart healthcare systems, industry 4.0, critical infrastructure, etc. As with any concept that relies on wireless communication, authentication is of paramount importance when it comes to security considerations. Devices in many IoT applications are severely constrained in terms of computational resources and are thus unable to utilize many modern cryptographic methods for security purposes. Physically-Unclonable-Functions (PUFs) propose to solve this issue by allowing devices to generate unique and secure digital fingerprints at extremely low computational cost. However, PUFs are vulnerable to Machine-Learning-based modeling-attacks that can mathematically clone the PUFs in order to impersonate them. To address these requirements, this paper introduces a new lightweight and practical anonymous authentication protocol for IoT that is resilient against machine learning attacks on PUFs.

ACS Style

Prosanta Gope; Biplab Sikdar; Owen Millwood. A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on PUF-based Authentication Mechanisms for Internet-of-Medical-Things. IEEE Transactions on Industrial Informatics 2021, PP, 1 -1.

AMA Style

Prosanta Gope, Biplab Sikdar, Owen Millwood. A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on PUF-based Authentication Mechanisms for Internet-of-Medical-Things. IEEE Transactions on Industrial Informatics. 2021; PP (99):1-1.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar; Owen Millwood. 2021. "A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on PUF-based Authentication Mechanisms for Internet-of-Medical-Things." IEEE Transactions on Industrial Informatics PP, no. 99: 1-1.

Journal article
Published: 24 February 2021 in Sustainable Cities and Society
Reads 0
Downloads 0

Human movement is a significant factor in extensive spatial-transmission models of contagious viruses. The proposed COUNTERACT system recognizes infectious sites by retrieving location data from a mobile phone device linked with a particular infected subject. The proposed approach is computing an incubation phase for the subject's infection, backpropagation through the subjects’ location data to investigate a location where the subject has been during the incubation period. Classifying to each such site as a contagious site, informing exposed suspects who have been to the contagious location, and seeking near real-time or real-time feedback from suspects to affirm, discard, or improve the recognition of the infectious site. This technique is based on the contraption to gather confirmed infected subject and possibly carrier suspect area location, correlating location for the incubation days. Security and privacy are a specific thing in the present research, and the system is used only through authentication and authorization. The proposed approach is for healthcare officials primarily. It is different from other existing systems where all the subjects have to install the application. The cell phone associated with the global positioning system (GPS) location data is collected from the COVID-19 subjects.

ACS Style

Hemant Ghayvat; Muhammad Awais; Prosanta Gope; Sharnil Pandya; Shubhankar Majumdar. ReCognizing SUspect and PredictiNg ThE SpRead of Contagion Based on Mobile Phone LoCation DaTa (COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence. Sustainable Cities and Society 2021, 69, 102798 .

AMA Style

Hemant Ghayvat, Muhammad Awais, Prosanta Gope, Sharnil Pandya, Shubhankar Majumdar. ReCognizing SUspect and PredictiNg ThE SpRead of Contagion Based on Mobile Phone LoCation DaTa (COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence. Sustainable Cities and Society. 2021; 69 ():102798.

Chicago/Turabian Style

Hemant Ghayvat; Muhammad Awais; Prosanta Gope; Sharnil Pandya; Shubhankar Majumdar. 2021. "ReCognizing SUspect and PredictiNg ThE SpRead of Contagion Based on Mobile Phone LoCation DaTa (COUNTERACT): A system of identifying COVID-19 infectious and hazardous sites, detecting disease outbreaks based on the internet of things, edge computing, and artificial intelligence." Sustainable Cities and Society 69, no. : 102798.

Journal article
Published: 24 August 2020 in IEEE Transactions on Vehicular Technology
Reads 0
Downloads 0

There has been a a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, in several applications. In many application scenarios, UAVs are deployed in missions where sensitive data is collected, such as monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to the sensitive and/or safety critical nature of the data collected in these applications, it is imperative to consider the security and privacy aspects of the UAVs used in these scenarios. In this article, we propose an efficient privacy aware authentication scheme for edge-assisted UAVs (Internet of Drones). Unlike the existing security solutions for UAV, our proposed scheme does not require to store any secret key in the devices but still can ensure the desired security level. To the best of our knowledge, this is the first article, where physical security of the UAV has taken into account. The proposed system allows third-party communication and mobile edge computing service provides to authenticate the UAVs without any loss of provacy and outperforms existing methods in terms of computational complexity.

ACS Style

Prosanta Gope; Biplab Sikdar. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones. IEEE Transactions on Vehicular Technology 2020, 69, 13621 -13630.

AMA Style

Prosanta Gope, Biplab Sikdar. An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones. IEEE Transactions on Vehicular Technology. 2020; 69 (11):13621-13630.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2020. "An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones." IEEE Transactions on Vehicular Technology 69, no. 11: 13621-13630.

Journal article
Published: 07 July 2020 in IEEE Journal of Biomedical and Health Informatics
Reads 0
Downloads 0

The advent of Internet of Things (IoT) has escalated the information sharing among various smart devices by many folds, irrespective of their geographical locations. Recently, applications like e-healthcare monitoring has attracted wide attention from the research community, where both the security and the effectiveness of the system are greatly imperative. However, to the best of our knowledge none of the existing literature can accomplish both these objectives (e.g., existing systems are not secure against physical attacks). This paper addresses the shortcomings in existing IoT-based healthcare system. We propose an enhanced system by introducing a Physical Unclonable Function (PUF)-based authentication scheme and a data driven fault-tolerant decision-making scheme for designing an IoT-based modern healthcare system. Analyses show that our proposed scheme is more secure and efficient than existing systems. Hence, it will be useful in designing an advanced IoT-based healthcare system.

ACS Style

Prosanta Gope; Youcef Gheraibia; Sohag Kabir; Biplab Sikdar. A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process. IEEE Journal of Biomedical and Health Informatics 2020, 25, 862 -873.

AMA Style

Prosanta Gope, Youcef Gheraibia, Sohag Kabir, Biplab Sikdar. A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process. IEEE Journal of Biomedical and Health Informatics. 2020; 25 (3):862-873.

Chicago/Turabian Style

Prosanta Gope; Youcef Gheraibia; Sohag Kabir; Biplab Sikdar. 2020. "A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process." IEEE Journal of Biomedical and Health Informatics 25, no. 3: 862-873.

Journal article
Published: 30 June 2020 in Computer
Reads 0
Downloads 0

This research analyzes the impact of counterfeit drugs on the health-care supply chain industry and evaluates the solutions currently in place to reduce the number of counterfeits coming to the market. Feedback information obtained from industry professionals is used to build requirements for PharmaCrypt, a new blockchain-driven tool.

ACS Style

Neetesh Saxena; Ieuan Thomas; Prosanta Gope; Pete Burnap; Neeraj Kumar. PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. Computer 2020, 53, 29 -44.

AMA Style

Neetesh Saxena, Ieuan Thomas, Prosanta Gope, Pete Burnap, Neeraj Kumar. PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs. Computer. 2020; 53 (7):29-44.

Chicago/Turabian Style

Neetesh Saxena; Ieuan Thomas; Prosanta Gope; Pete Burnap; Neeraj Kumar. 2020. "PharmaCrypt: Blockchain for Critical Pharmaceutical Industry to Counterfeit Drugs." Computer 53, no. 7: 29-44.

Special issue article
Published: 23 October 2019 in International Journal of Communication Systems
Reads 0
Downloads 0

Rapid development of wireless networks brings about many security problems in portable communication systems (PCSs), which can provide mobile users with an opportunity to enjoy global roaming services. In this regard, designing a secure user authentication scheme, especially for recognizing legal roaming users, is indeed a challenging task. It is noticed that there is no delegation‐based protocol for PCSs, which can guarantee anonymity, untraceability, perfect forward secrecy, and resistance of denial‐of‐service (DoS) attack. Therefore, in this article, we put forward a novel delegation‐based anonymous and untraceable authentication protocol, which can guarantee to resolve all the abovementioned security issues and hence offer a solution for secure communications for PCSs.

ACS Style

Prosanta Gope; Hemant Ghayvat; Yongqiang Cheng; Sohag Kabir. An enhanced secure delegation-based anonymous authentication protocol for PCSs. International Journal of Communication Systems 2019, e4199 .

AMA Style

Prosanta Gope, Hemant Ghayvat, Yongqiang Cheng, Sohag Kabir. An enhanced secure delegation-based anonymous authentication protocol for PCSs. International Journal of Communication Systems. 2019; ():e4199.

Chicago/Turabian Style

Prosanta Gope; Hemant Ghayvat; Yongqiang Cheng; Sohag Kabir. 2019. "An enhanced secure delegation-based anonymous authentication protocol for PCSs." International Journal of Communication Systems , no. : e4199.

Journal article
Published: 15 June 2019 in Computers & Security
Reads 0
Downloads 0

Fog computing is a new paradigm that extends cloud computing and services to the edge of the network. Although it has several distinct characteristics, however, the conventional fog computing model does not support some of the imperative features such as D2D communications, which can be useful for several critical IoT applications and services. Besides, fog computing faces numerous new security and privacy challenges apart from those inherited from cloud computing, however, security issues in fog computing have not been addressed properly. In this article, first we introduce a new privacy-preserving security architecture for fog computing model with the cooperative D2D communication support, which can be useful for various IoT applications. Subsequently, based on the underlying foundation of our proposed security architecture we design three lightweight anonymous authentication protocols (LAAPs) to support three distinct circumstances in D2D-Aided fog computing. In this regard, we utilize the lightweight cryptographic primitives like one-way function and EXCLUSIVE-OR operations, which will cause limited computational overhead for the resource limited edge devices.

ACS Style

Prosanta Gope. LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security 2019, 86, 223 -237.

AMA Style

Prosanta Gope. LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. Computers & Security. 2019; 86 ():223-237.

Chicago/Turabian Style

Prosanta Gope. 2019. "LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm." Computers & Security 86, no. : 223-237.

Journal article
Published: 02 April 2019 in IEEE Transactions on Smart Grid
Reads 0
Downloads 0

The Energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems that support open innovation. EI provides bidirectional communication for analysis and improvement of energy usage between service providers and customers. To ensure a secure, reliable and efficient operation, the EI should be protected from cyber attacks. Thus, secure and efficient key establishment is an important issue for this Internet-based smart grid environment. In this paper, we propose an efficient privacy-preserving authentication scheme for EI-based Vehicle-to-Grid Communication using lightweight cryptographic primitives such as one-way non-collision hash functions. In our proposed scheme, a customer can securely access services provided by the service provider using a symmetric key established between them. Detailed security and performance analysis of our proposed scheme are presented to show that it is resilient against many security attacks, cost effective in computation and communication, and provides an efficient solution for the EI.

ACS Style

Prosanta Gope; Biplab Sikdar. An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication. IEEE Transactions on Smart Grid 2019, 10, 6607 -6618.

AMA Style

Prosanta Gope, Biplab Sikdar. An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication. IEEE Transactions on Smart Grid. 2019; 10 (6):6607-6618.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2019. "An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication." IEEE Transactions on Smart Grid 10, no. 6: 6607-6618.

Journal article
Published: 13 February 2019 in Sensors
Reads 0
Downloads 0

Background: Ambiguities and anomalies in the Activity of Daily Living (ADL) patterns indicate deviations from Wellness. The monitoring of lifestyles could facilitate remote physicians or caregivers to give insight into symptoms of the disease and provide health improvement advice to residents; Objective: This research work aims to apply lifestyle monitoring in an ambient assisted living (AAL) system by diagnosing conduct and distinguishing variation from the norm with the slightest conceivable fake alert. In pursuing this aim, the main objective is to fill the knowledge gap of two contextual observations (i.e., day and time) in the frequent behavior modeling for an individual in AAL. Each sensing category has its advantages and restrictions. Only a single type of sensing unit may not manage composite states in practice and lose the activity of daily living. To boost the efficiency of the system, we offer an exceptional sensor data fusion technique through different sensing modalities; Methods: As behaviors may also change according to other contextual observations, including seasonal, weather (or temperature), and social interaction, we propose the design of a novel activity learning model by adding behavioral observations, which we name as the Wellness indices analysis model; Results: The ground-truth data are collected from four elderly houses, including daily activities, with a sample size of three hundred days plus sensor activation. The investigation results validate the success of our method. The new feature set from sensor data fusion enhances the system accuracy to (98.17% ± 0.95) from (80.81% ± 0.68). The performance evaluation parameters of the proposed model for ADL recognition are recorded for the 14 selected activities. These parameters are Sensitivity (0.9852), Specificity (0.9988), Accuracy (0.9974), F1 score (0.9851), False Negative Rate (0.0130).

ACS Style

Hemant Ghayvat; Muhammad Awais; Sharnil Pandya; Hao Ren; Saeed Akbarzadeh; Subhas Chandra Mukhopadhyay; Chen Chen; Prosanta Gope; Arpita Chouhan; Wei Chen. Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection. Sensors 2019, 19, 766 .

AMA Style

Hemant Ghayvat, Muhammad Awais, Sharnil Pandya, Hao Ren, Saeed Akbarzadeh, Subhas Chandra Mukhopadhyay, Chen Chen, Prosanta Gope, Arpita Chouhan, Wei Chen. Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection. Sensors. 2019; 19 (4):766.

Chicago/Turabian Style

Hemant Ghayvat; Muhammad Awais; Sharnil Pandya; Hao Ren; Saeed Akbarzadeh; Subhas Chandra Mukhopadhyay; Chen Chen; Prosanta Gope; Arpita Chouhan; Wei Chen. 2019. "Smart Aging System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and Anomaly Detection." Sensors 19, no. 4: 766.

Journal article
Published: 24 January 2019 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0

Industrial Wireless Sensor Network (IWSN) is an emerging class of a generalized Wireless Sensor Network (WSN) having constraints of energy consumption, coverage, connectivity, and security. However, security and privacy is one of the major challenges in IWSN as the nodes are connected to Internet and usually located in an unattended environment with minimum human interventions. In IWSN, there is a fundamental requirement for a user to access the real-time information directly from the designated sensor nodes. This task demands to have a user authentication protocol. To satisfy this requirement, this article proposes a lightweight and privacy-preserving mutual user authentication protocol in which only the user with a trusted device has the right to access the IWSN. Therefore, in the proposed scheme, we considered the physical layer security of the sensor nodes. We show that the proposed scheme ensures security even if a sensor node is captured by an adversary. The proposed protocol uses the lightweight cryptographic primitives, such as one way cryptographic hash function, Physically Unclonable Function (PUF) and bitwise exclusive (XOR) operations. Security and performance analysis shows that the proposed scheme is secure, and is efficient for the resource-constrained sensing devices in IWSN.

ACS Style

Prosanta Gope; Ashok Kumar Das; Neeraj Kumar; Yongqiang Cheng. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics 2019, 15, 4957 -4968.

AMA Style

Prosanta Gope, Ashok Kumar Das, Neeraj Kumar, Yongqiang Cheng. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Transactions on Industrial Informatics. 2019; 15 (9):4957-4968.

Chicago/Turabian Style

Prosanta Gope; Ashok Kumar Das; Neeraj Kumar; Yongqiang Cheng. 2019. "Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks." IEEE Transactions on Industrial Informatics 15, no. 9: 4957-4968.

Journal article
Published: 16 November 2018 in IEEE Transactions on Information Forensics and Security
Reads 0
Downloads 0

The concept of smart metering allows real-time measurement of power demand which in turn is expected to result in more efficient energy use and better load balancing. However, finely granular measurements reported by smart meters can lead to starkly increased exposure of sensitive information, including various personal attributes and activities. Even though several security solutions have been proposed in recent years to address this issue, most of the existing solutions are based on publickey cryptographic primitives such as homomorphic encryption, elliptic curve digital signature algorithms (ECDSA), etc. which are ill-suited for the resource constrained smart meters. On the other hand, to address the computational inefficiency issue, some masking-based solutions have been proposed. However, these schemes cannot ensure some of the imperative security properties such as consumer’s privacy, sender authentication, etc. In this paper, we first propose a lightweight and privacyfriendly masking-based spatial data aggregation scheme for secure forecasting of power demand in smart grids. Our scheme only uses lightweight cryptographic primitives such as hash functions, exclusive-OR operations, etc. Subsequently, we propose a secure billing solution for smart grids. As compared to existing solutions, our scheme is simple and can ensure better privacy protection and computational efficiency, which are essential for smart grids.

ACS Style

Prosanta Gope; Biplab Sikdar. Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. IEEE Transactions on Information Forensics and Security 2018, 14, 1554 -1566.

AMA Style

Prosanta Gope, Biplab Sikdar. Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids. IEEE Transactions on Information Forensics and Security. 2018; 14 (6):1554-1566.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2018. "Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids." IEEE Transactions on Information Forensics and Security 14, no. 6: 1554-1566.

Preprint
Published: 11 July 2018
Reads 0
Downloads 0

The proposed research methodology aims to design a generally implementable framework for providing a house owner/member with the immediate notification of an on-going theft (unauthorized access to their premises). For this purpose, a rigorous analysis of existing systems was undertaken to identify research gaps. The problems found with existing systems were that they can only identify the intruder after the theft, or cannot distinguish between human and non-human objects. Wireless Sensors Networks (WSNs) combined with the use of Internet of Things (IoT), Cognitive Internet of Things, Internet of Medical Things, and Cloud Computing are expanding smart home concepts and solutions, and their applications. The primary objective of the present research work was to design and develop IoT and cloud computing based smart home solutions. In addition, we also propose a novel smart home anti-theft system that can detect an intruder, even if they have partially/fully hidden their face using clothing, leather, fiber, or plastic materials. The proposed system can also detect an intruder in the dark using a CCTV camera without night vision facility. The fundamental idea was to design a cost-effective and efficient system for an individual to be able to detect any kind of theft in real-time and provide instant notification of the theft to the house owner. The system also promises to implement home security with large video data handling in real-time.

ACS Style

Sharnil Pandya; Hemant Ghayvat; Ketan Kotecha; Moi Hoon Yap; Prosanta Gope. Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for Wellness Protocol. 2018, 1 .

AMA Style

Sharnil Pandya, Hemant Ghayvat, Ketan Kotecha, Moi Hoon Yap, Prosanta Gope. Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for Wellness Protocol. . 2018; ():1.

Chicago/Turabian Style

Sharnil Pandya; Hemant Ghayvat; Ketan Kotecha; Moi Hoon Yap; Prosanta Gope. 2018. "Smart Home Anti-Theft System: A Novel Approach for Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for Wellness Protocol." , no. : 1.

Journal article
Published: 12 June 2018 in IEEE Internet of Things Journal
Reads 0
Downloads 0

Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol designed for IoT devices should be robust even in cases when an IoT device is captured by an adversary. Moreover, many of the IoT devices have limited storage and computational capabilities. Hence, it is desirable that the security solutions for IoT devices should be computationally efficient. To address all these requirements, in this article, we present a lightweight and privacy-preserving two-factor authentication scheme for IoT devices, where physically uncloneable functions (PUFs) have been considered as one of the authentication factors. Security and performance analysis show that our proposed scheme is not only robust against several attacks, but also very efficient in terms of computational efficiently.

ACS Style

Prosanta Gope; Biplab Sikdar. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things Journal 2018, 6, 580 -589.

AMA Style

Prosanta Gope, Biplab Sikdar. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices. IEEE Internet of Things Journal. 2018; 6 (1):580-589.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2018. "Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices." IEEE Internet of Things Journal 6, no. 1: 580-589.

Journal article
Published: 06 June 2018 in IEEE Transactions on Smart Grid
Reads 0
Downloads 0

Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grids, facilitating efficient grid management and operation, optimization of resource utilization, as well as enable new products, features, and services. However, this interconnection of grid technology with ICT leads to various security challenges in the power grid. One such concern is the tampering of usage data from smart meters which may result not only in incorrect billing, but also in incorrect decisions related to demand and supply management. In addition to network based cyber attacks, smart meters are also susceptible to physical attacks since they are installed in customer premises without hardware protection mechanisms. In this paper, we propose a novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between the smart meters and the service provider, but also the physical security of smart meters. In this regard, we utilize the lightweight cryptographic primitives such as Physically Uncloneable Functions (PUFs) and one-way hash function, etc. Hence, the proposed scheme is suitable even for the resource constrained smart meters.

ACS Style

Prosanta Gope; Biplab Sikdar. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Transactions on Smart Grid 2018, 10, 3953 -3962.

AMA Style

Prosanta Gope, Biplab Sikdar. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Transactions on Smart Grid. 2018; 10 (4):3953-3962.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2018. "Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication." IEEE Transactions on Smart Grid 10, no. 4: 3953-3962.

Journal article
Published: 08 May 2018 in IEEE Internet of Things Journal
Reads 0
Downloads 0

Smart grids take advantage of information and communication technologies to achieve energy efficiency, automation and reliability. These systems allow two-way communications and power flow between the grid and consumers. However, these bidirectional communications introduce several security and privacy threats to consumers. One of the open challenges in this context is user privacy when smart meters are used to capture fine-grained energy usage information. Although considerable research has been carried out in this direction, most of the existing solutions invariably introduce computational complexity and overhead, which makes them infeasible for resource constrained smart meters. In this paper, we propose a privacy-friendly and efficient data aggregation scheme (EDAS) for dynamic pricing based billing and demand-response management in smart grids. To the best of our knowledge, this is the first paper to address privacy in the context of billing under dynamic electricity pricing. Security and performance analyses show that the proposed scheme offers better privacy protection for electric meter reading aggregation and computational efficiency, as compared to existing schemes.

ACS Style

Prosanta Gope; Biplab Sikdar. An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids. IEEE Internet of Things Journal 2018, 5, 3126 -3135.

AMA Style

Prosanta Gope, Biplab Sikdar. An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids. IEEE Internet of Things Journal. 2018; 5 (4):3126-3135.

Chicago/Turabian Style

Prosanta Gope; Biplab Sikdar. 2018. "An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids." IEEE Internet of Things Journal 5, no. 4: 3126-3135.

Journal article
Published: 03 May 2018 in IEEE Transactions on Information Forensics and Security
Reads 0
Downloads 0

Radio frequency identification (RFID) has been considered one of the imperative requirements for implementation of Internet-of-Things applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems often suffer from various security and privacy issues. To solve those issues for RFID systems, many schemes have been recently proposed by using the cryptographic primitive, called physically uncloneable functions (PUFs), which can ensure a tamper-evident feature. However, to the best of our knowledge, none of them has succeeded to address the problem of privacy preservation with the resistance of DoS attacks in a practical way. For instance, existing schemes need to rely on exhaustive search operations to identify a tag, and also suffer from several security and privacy related issues. Furthermore, a tag needs to store some security credentials (e.g., secret shared keys), which may cause several issues such as loss of forward and backward secrecy and large storage costs. Therefore, in this paper, we first propose a lightweight privacy-preserving authentication protocol for the RFID system by considering the ideal PUF environment. Subsequently, we introduce an enhanced protocol which can support the noisy PUF environment. It is argued that both of our protocols can overcome the limitations of existing schemes, and further ensure more security properties. By analyzing the performance, we have shown that the proposed solutions are secure, efficient, practical, and effective for the resource-constraint RFID tag.

ACS Style

Prosanta Gope; Jemin Lee; Tony Q. S. Quek. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Transactions on Information Forensics and Security 2018, 13, 2831 -2843.

AMA Style

Prosanta Gope, Jemin Lee, Tony Q. S. Quek. Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions. IEEE Transactions on Information Forensics and Security. 2018; 13 (11):2831-2843.

Chicago/Turabian Style

Prosanta Gope; Jemin Lee; Tony Q. S. Quek. 2018. "Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions." IEEE Transactions on Information Forensics and Security 13, no. 11: 2831-2843.

Original research
Published: 30 November 2017 in Journal of Ambient Intelligence and Humanized Computing
Reads 0
Downloads 0

Machine to machine (M2M) communications have significant application potential in the emerging networks including home network. The advent of M2M communication brings numerous security issues as well, while existing efforts have not fully solved those issues. In this article, we propose a secure lightweight anonymous authentication and key agreement protocol for M2M home network service, which can guarantee to resist various security issues like, forgery attacks, insider attacks, masquerade attacks, resilience to key exposure, etc. Furthermore, the proposed protocol generates reasonable additional computational and communication overhead, which is also verified by performance analysis.

ACS Style

Prosanta Gope. Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. Journal of Ambient Intelligence and Humanized Computing 2017, 10, 153 -161.

AMA Style

Prosanta Gope. Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. Journal of Ambient Intelligence and Humanized Computing. 2017; 10 (1):153-161.

Chicago/Turabian Style

Prosanta Gope. 2017. "Anonymous mutual authentication with location privacy support for secure communication in M2M home network services." Journal of Ambient Intelligence and Humanized Computing 10, no. 1: 153-161.

Article
Published: 01 July 2017 in Quantum Information Processing
Reads 0
Downloads 0

This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure–resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

ACS Style

Kun-Fei Yu; Jun Gu; Tzonelih Hwang; Prosanta Gope. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Information Processing 2017, 16, 1 .

AMA Style

Kun-Fei Yu, Jun Gu, Tzonelih Hwang, Prosanta Gope. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Information Processing. 2017; 16 (8):1.

Chicago/Turabian Style

Kun-Fei Yu; Jun Gu; Tzonelih Hwang; Prosanta Gope. 2017. "Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing." Quantum Information Processing 16, no. 8: 1.

Conference paper
Published: 01 December 2016 in 2016 International Computer Symposium (ICS)
Reads 0
Downloads 0

The digital equivalent of a handwritten signature or stamped seal, but offering far more inherent security, a digital signature is intended to solve the problem of tampering and impersonation in digital communications. Digital signatures can provide the added assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed consent by the signer. Even though, some signature schemes have already been proposed to address all the requirements of a digital signature scheme. However, they are unable to accomplish forward or backward unforgeability in arbitrated signature scheme, where if the signature key used in the scheme is compromised then an attacker will be able to forge any previous/future signature. In order to resolve this issue, in this article, we propose secure digital signature schemes, which can ensure the security requirements including forward and backward unforgeability supports.

ACS Style

Tzonelih Hwang; Yi-Ping Luo; Prosanta Gope; Zhi-Rou Liu. Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 International Computer Symposium (ICS) 2016, 244 -247.

AMA Style

Tzonelih Hwang, Yi-Ping Luo, Prosanta Gope, Zhi-Rou Liu. Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System. 2016 International Computer Symposium (ICS). 2016; ():244-247.

Chicago/Turabian Style

Tzonelih Hwang; Yi-Ping Luo; Prosanta Gope; Zhi-Rou Liu. 2016. "Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System." 2016 International Computer Symposium (ICS) , no. : 244-247.