Heena Rathore | IIT Jodhpur (original) (raw)

Papers by Heena Rathore

Research paper thumbnail of A review of security challenges, attacks and resolutions for wireless medical devices

2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017

Evolution of implantable medical devices for human beings has provided a radical new way for trea... more Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DLRT: Deep Learning Approach for Reliable Diabetic Treatment

GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017

Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today,... more Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks

2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), 2018

The immune system of the human body has massive potential in defending it against multiple harmfu... more The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework

2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2020

As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases... more As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards a Practical Pedestrian Distraction Detection Framework using Wearables

2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Blockchain applications for healthcare

Energy Efficiency of Medical Devices and Healthcare Applications, 2020

Abstract Healthcare systems control and monitor the health of patients with the help of advanced ... more Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people's life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture

We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing arc... more We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IMS2021 Project Connect: Connecting to Broaden Participation

IEEE Microwave Magazine, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking

2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019

Software Defined Networking (SDN) is an emerging architecture providing services on a priority ba... more Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of TangleCV

Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Connected vehicles are designed to make informed safety-related decisions based on data/informati... more Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Deep learning-based security schemes for implantable medical devices

Energy Efficiency of Medical Devices and Healthcare Applications, 2020

Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns i... more Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations

2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021

As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic o... more As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach

Neural Computing and Applications, 2021

Athletes represent the apex of physical capacity filling in a social picture of performance and b... more Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IMS2020 Project Connect: Connectivity That Works

IEEE Microwave Magazine, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey of Blockchain Enabled Cyber-Physical Systems

Sensors, 2020

Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. ... more Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-layer security scheme for implantable medical devices

Neural Computing and Applications, 2018

Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the area... more Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment

IEEE Access, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants

IEEE Access, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables

IEEE Access, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of TangleCV

ACM Transactions on Cyber-Physical Systems, 2021

Connected vehicles are set to define the future of transportation; however, this upcoming technol... more Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A review of security challenges, attacks and resolutions for wireless medical devices

2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), 2017

Evolution of implantable medical devices for human beings has provided a radical new way for trea... more Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of DLRT: Deep Learning Approach for Reliable Diabetic Treatment

GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017

Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today,... more Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks

2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), 2018

The immune system of the human body has massive potential in defending it against multiple harmfu... more The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework

2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2020

As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases... more As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Towards a Practical Pedestrian Distraction Detection Framework using Wearables

2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Blockchain applications for healthcare

Energy Efficiency of Medical Devices and Healthcare Applications, 2020

Abstract Healthcare systems control and monitor the health of patients with the help of advanced ... more Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people's life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture

We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing arc... more We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IMS2021 Project Connect: Connecting to Broaden Participation

IEEE Microwave Magazine, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking

2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019

Software Defined Networking (SDN) is an emerging architecture providing services on a priority ba... more Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of TangleCV

Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

Connected vehicles are designed to make informed safety-related decisions based on data/informati... more Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Deep learning-based security schemes for implantable medical devices

Energy Efficiency of Medical Devices and Healthcare Applications, 2020

Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns i... more Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations

2021 IEEE International Conference on Communications Workshops (ICC Workshops), 2021

As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic o... more As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach

Neural Computing and Applications, 2021

Athletes represent the apex of physical capacity filling in a social picture of performance and b... more Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of IMS2020 Project Connect: Connectivity That Works

IEEE Microwave Magazine, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey of Blockchain Enabled Cyber-Physical Systems

Sensors, 2020

Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. ... more Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-layer security scheme for implantable medical devices

Neural Computing and Applications, 2018

Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the area... more Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment

IEEE Access, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants

IEEE Access, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables

IEEE Access, 2018

Bookmarks Related papers MentionsView impact

Research paper thumbnail of TangleCV

ACM Transactions on Cyber-Physical Systems, 2021

Connected vehicles are set to define the future of transportation; however, this upcoming technol... more Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...

Bookmarks Related papers MentionsView impact