Joshitta Shantha - Academia.edu (original) (raw)

Uploads

Papers by Joshitta Shantha

Research paper thumbnail of Open Source Software for Image Processing: A Comparative Study

SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES

Research paper thumbnail of Design of Covid19 Detection Based On Relative Eccentric Feature Selection Using Deep Vectored Regressive Neural Network for Corona Virus

Research paper thumbnail of The Integration of Machine Learning Technique with the Existing System to Predict the Flight Prices

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Review of: "Maintaining cyberhygiene in the Internet of Things (IoT): An expert consensus study of requisite user behaviours

Research paper thumbnail of Hybrid One Time Password Algorithm for Secure Healthcare IoT Data Access

Research Highlights in Mathematics and Computer Science Vol. 8, Apr 8, 2023

Research paper thumbnail of Object Activity Tracking for Webcam Using Hog Algorithm Comparing Background Subtraction Algorithm

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Design of Covid19 Detection Based On Relative Eccentric Feature Selection Using Deep Vectored Regressive Neural Network for Corona Virus

2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)

Research paper thumbnail of Lightweight Algorithms for Data Security in Healthcare Internet of Things

Research paper thumbnail of Security analysis of hybrid one time password generation algorithm for IoT data

INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY

Research paper thumbnail of Internet of Things (IoT)

Cases on Edge Computing and Analytics, 2021

Naturally, IoT network consists of constrained devices with limited power, storage, and processin... more Naturally, IoT network consists of constrained devices with limited power, storage, and processing capabilities. However, IoT has some challenges to face internal and external issues, for instance, security issues, connectivity complex, data management, etc. In such a case, IoT is not supported by a heavyweight protocol suite. So, developing the lightweight protocol suite is the challenge for IoT environment. This chapter also describes such protocols that fulfill the requirements of IoT. In fact, IoT environment consists of a huge amount of devices. The controlling of all the devices is another issue, as well as data analytics among different devices, also considered a major issue. As a constraint, this chapter focuses to design a standard protocol suite for IoT environment.

Research paper thumbnail of Ethical Issues Faced by College Students by the Usage of Social Networking Sites with Reference to Theni District

Research paper thumbnail of EPC Based Authentication of Devices in the Smart Healthcare System

Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...

Research paper thumbnail of Security in IoT Environment: A Survey

The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, ... more The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.

Research paper thumbnail of A Novel Authentication Scheme for IoT enabled Smart Healthcare System

International journal of engineering research and technology, 2018

The Internet of Things (IoT), connecting a large number of communication and information devices,... more The Internet of Things (IoT), connecting a large number of communication and information devices, is the future of the scientific world. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. Smart phone is at every hand and its usage is sky-rocketing. This gives way to connect anything and anybody with the internet which in turn makes secure communication and secure sharing of information critical. In this paper, the existing works are analyzed and an IoT enabled healthcare system architecture is proposed. A novel authentication scheme that supplements the security of the proposed healthcare system is also proposed. Keywords— IoT, Architecture, Enhancing Authentication, Smart Healthcare System, Security, IoT devices.

Research paper thumbnail of SAT_Jo: An Enhanced Lightweight Block Cipher for the Internet of Things

2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 2018

The utilization of resource constrained computing devices such as Radio-Frequency IDentification ... more The utilization of resource constrained computing devices such as Radio-Frequency IDentification (RFID) tags, sensor nodes, industrial controllers and smart cards is very common today. The move from desktop computers to small devices made life stability to mobility and brings a wide range of security and privacy concerns. There come the cryptographic algorithms to ensure the security and privacy of the data and the users. Mostly, security of any cryptographic algorithms depends on the substitution boxes that are used in the round function. This paper proposes a new block cipher, SAT_Jo, which is suitable to the tag based applications of the Internet of Things (IoT). This paper computes a 4×4 S-box by the Galois field of order 24. Permutation is explained as a bijective map from the set to itself. Sub key computation is carried out with a change in each phase. The encryption algorithm is explained with a mathematical illustration.

Research paper thumbnail of EPC Based Authentication of Devices in the Smart Healthcare System

Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...

Research paper thumbnail of Smart Classroom is a Boon to Improve Computer Skills in Rural India: A Case Study of Theni District

Artificial Intelligent Systems and Machine Learning, 2011

Information technology is an amalgam of some wonderful inventions of the 21th century in electron... more Information technology is an amalgam of some wonderful inventions of the 21th century in electronics and communication. During a very short span of time it has acquired an important place in almost all aspects of human life and particularly in the field of education. It has compelled countries to take part in education reforms. Building a „knowledge – based‟ economy, where knowledge, creativity and innovation play an important role in generating and sustaining economic growth, is a key objective in all developing countries. As India steps forward in pursuit of its Vision 2020, access to quality education, human capital development and the educational competitiveness of Indian Colleges rank among its most important challenges. Hence, to ensure that its drive towards developed nation status is not derailed, the Ministry of Higher Education and University Grants Commission have jointed their hands to ensure quality in higher education. This paper describes the importance of smart class...

Research paper thumbnail of Applications of Big Data Analytics for Diagnosing Diabetic Mellitus : Issues and Challenges

Today, the world has been excited about big data and the advancement in analytics. Big Data has a... more Today, the world has been excited about big data and the advancement in analytics. Big Data has an incredible influence from global market to the day-today life. Big Data is the term used to describe the huge volume of both structured and unstructured data. Big Data Analytics is the use of advanced analytical techniques against very large and diverse data sets that include different types and sizes. Nothing is more important than healthy and peaceful life. Big Data Analytics improves health care system through the reduction run time and the optimal cost. This paper presents an overview of big data analytics in health care and discusses the issues and challenges.

Research paper thumbnail of A Neoteric Authentication Scheme for Iot Healthcare System

The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future o... more The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future of the scientific world. The increasing amounts of devices with Wi-Fi capabilities allow them to send and receive data. Now-adays smart phone is with everybody and its usage is sky-rocketing. This gives way to connect anything that can be connected, will be connected and secure sharing of information critical. In this paper, the existing works are analyzed and new architecture for Smart healthcare system is proposed. A neoteric authentication scheme that supplements the security of the smart healthcare system is also proposed.

Research paper thumbnail of Device authentication mechanism for IoT enabled healthcare system

Internet of things (IoT) is the prelude to new technological innovation. It expands with differen... more Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application. Moreover, the medical devices used in the IoT enabled Healthcare System are resource constrained devices. So, this paper proposes a novel mechanism for authenticating such resource constrained medical devices. New algorithm for secure authentication and key agreement of the medical devices is also presented. This mechanism is resistance against various security attacks such as eavesdropping, man-in-the-middle and Denial of Service attacks. Formal security analysis and the comparative study presented in this paper have proved that the proposed mechanism has many security features an...

Research paper thumbnail of Open Source Software for Image Processing: A Comparative Study

SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES

Research paper thumbnail of Design of Covid19 Detection Based On Relative Eccentric Feature Selection Using Deep Vectored Regressive Neural Network for Corona Virus

Research paper thumbnail of The Integration of Machine Learning Technique with the Existing System to Predict the Flight Prices

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Review of: "Maintaining cyberhygiene in the Internet of Things (IoT): An expert consensus study of requisite user behaviours

Research paper thumbnail of Hybrid One Time Password Algorithm for Secure Healthcare IoT Data Access

Research Highlights in Mathematics and Computer Science Vol. 8, Apr 8, 2023

Research paper thumbnail of Object Activity Tracking for Webcam Using Hog Algorithm Comparing Background Subtraction Algorithm

2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Design of Covid19 Detection Based On Relative Eccentric Feature Selection Using Deep Vectored Regressive Neural Network for Corona Virus

2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)

Research paper thumbnail of Lightweight Algorithms for Data Security in Healthcare Internet of Things

Research paper thumbnail of Security analysis of hybrid one time password generation algorithm for IoT data

INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY

Research paper thumbnail of Internet of Things (IoT)

Cases on Edge Computing and Analytics, 2021

Naturally, IoT network consists of constrained devices with limited power, storage, and processin... more Naturally, IoT network consists of constrained devices with limited power, storage, and processing capabilities. However, IoT has some challenges to face internal and external issues, for instance, security issues, connectivity complex, data management, etc. In such a case, IoT is not supported by a heavyweight protocol suite. So, developing the lightweight protocol suite is the challenge for IoT environment. This chapter also describes such protocols that fulfill the requirements of IoT. In fact, IoT environment consists of a huge amount of devices. The controlling of all the devices is another issue, as well as data analytics among different devices, also considered a major issue. As a constraint, this chapter focuses to design a standard protocol suite for IoT environment.

Research paper thumbnail of Ethical Issues Faced by College Students by the Usage of Social Networking Sites with Reference to Theni District

Research paper thumbnail of EPC Based Authentication of Devices in the Smart Healthcare System

Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...

Research paper thumbnail of Security in IoT Environment: A Survey

The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, ... more The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.

Research paper thumbnail of A Novel Authentication Scheme for IoT enabled Smart Healthcare System

International journal of engineering research and technology, 2018

The Internet of Things (IoT), connecting a large number of communication and information devices,... more The Internet of Things (IoT), connecting a large number of communication and information devices, is the future of the scientific world. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. Smart phone is at every hand and its usage is sky-rocketing. This gives way to connect anything and anybody with the internet which in turn makes secure communication and secure sharing of information critical. In this paper, the existing works are analyzed and an IoT enabled healthcare system architecture is proposed. A novel authentication scheme that supplements the security of the proposed healthcare system is also proposed. Keywords— IoT, Architecture, Enhancing Authentication, Smart Healthcare System, Security, IoT devices.

Research paper thumbnail of SAT_Jo: An Enhanced Lightweight Block Cipher for the Internet of Things

2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 2018

The utilization of resource constrained computing devices such as Radio-Frequency IDentification ... more The utilization of resource constrained computing devices such as Radio-Frequency IDentification (RFID) tags, sensor nodes, industrial controllers and smart cards is very common today. The move from desktop computers to small devices made life stability to mobility and brings a wide range of security and privacy concerns. There come the cryptographic algorithms to ensure the security and privacy of the data and the users. Mostly, security of any cryptographic algorithms depends on the substitution boxes that are used in the round function. This paper proposes a new block cipher, SAT_Jo, which is suitable to the tag based applications of the Internet of Things (IoT). This paper computes a 4×4 S-box by the Galois field of order 24. Permutation is explained as a bijective map from the set to itself. Sub key computation is carried out with a change in each phase. The encryption algorithm is explained with a mathematical illustration.

Research paper thumbnail of EPC Based Authentication of Devices in the Smart Healthcare System

Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...

Research paper thumbnail of Smart Classroom is a Boon to Improve Computer Skills in Rural India: A Case Study of Theni District

Artificial Intelligent Systems and Machine Learning, 2011

Information technology is an amalgam of some wonderful inventions of the 21th century in electron... more Information technology is an amalgam of some wonderful inventions of the 21th century in electronics and communication. During a very short span of time it has acquired an important place in almost all aspects of human life and particularly in the field of education. It has compelled countries to take part in education reforms. Building a „knowledge – based‟ economy, where knowledge, creativity and innovation play an important role in generating and sustaining economic growth, is a key objective in all developing countries. As India steps forward in pursuit of its Vision 2020, access to quality education, human capital development and the educational competitiveness of Indian Colleges rank among its most important challenges. Hence, to ensure that its drive towards developed nation status is not derailed, the Ministry of Higher Education and University Grants Commission have jointed their hands to ensure quality in higher education. This paper describes the importance of smart class...

Research paper thumbnail of Applications of Big Data Analytics for Diagnosing Diabetic Mellitus : Issues and Challenges

Today, the world has been excited about big data and the advancement in analytics. Big Data has a... more Today, the world has been excited about big data and the advancement in analytics. Big Data has an incredible influence from global market to the day-today life. Big Data is the term used to describe the huge volume of both structured and unstructured data. Big Data Analytics is the use of advanced analytical techniques against very large and diverse data sets that include different types and sizes. Nothing is more important than healthy and peaceful life. Big Data Analytics improves health care system through the reduction run time and the optimal cost. This paper presents an overview of big data analytics in health care and discusses the issues and challenges.

Research paper thumbnail of A Neoteric Authentication Scheme for Iot Healthcare System

The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future o... more The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future of the scientific world. The increasing amounts of devices with Wi-Fi capabilities allow them to send and receive data. Now-adays smart phone is with everybody and its usage is sky-rocketing. This gives way to connect anything that can be connected, will be connected and secure sharing of information critical. In this paper, the existing works are analyzed and new architecture for Smart healthcare system is proposed. A neoteric authentication scheme that supplements the security of the smart healthcare system is also proposed.

Research paper thumbnail of Device authentication mechanism for IoT enabled healthcare system

Internet of things (IoT) is the prelude to new technological innovation. It expands with differen... more Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application. Moreover, the medical devices used in the IoT enabled Healthcare System are resource constrained devices. So, this paper proposes a novel mechanism for authenticating such resource constrained medical devices. New algorithm for secure authentication and key agreement of the medical devices is also presented. This mechanism is resistance against various security attacks such as eavesdropping, man-in-the-middle and Denial of Service attacks. Formal security analysis and the comparative study presented in this paper have proved that the proposed mechanism has many security features an...