Joshitta Shantha - Academia.edu (original) (raw)
Uploads
Papers by Joshitta Shantha
SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
Research Highlights in Mathematics and Computer Science Vol. 8, Apr 8, 2023
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)
INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY
Cases on Edge Computing and Analytics, 2021
Naturally, IoT network consists of constrained devices with limited power, storage, and processin... more Naturally, IoT network consists of constrained devices with limited power, storage, and processing capabilities. However, IoT has some challenges to face internal and external issues, for instance, security issues, connectivity complex, data management, etc. In such a case, IoT is not supported by a heavyweight protocol suite. So, developing the lightweight protocol suite is the challenge for IoT environment. This chapter also describes such protocols that fulfill the requirements of IoT. In fact, IoT environment consists of a huge amount of devices. The controlling of all the devices is another issue, as well as data analytics among different devices, also considered a major issue. As a constraint, this chapter focuses to design a standard protocol suite for IoT environment.
Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, ... more The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.
International journal of engineering research and technology, 2018
The Internet of Things (IoT), connecting a large number of communication and information devices,... more The Internet of Things (IoT), connecting a large number of communication and information devices, is the future of the scientific world. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. Smart phone is at every hand and its usage is sky-rocketing. This gives way to connect anything and anybody with the internet which in turn makes secure communication and secure sharing of information critical. In this paper, the existing works are analyzed and an IoT enabled healthcare system architecture is proposed. A novel authentication scheme that supplements the security of the proposed healthcare system is also proposed. Keywords— IoT, Architecture, Enhancing Authentication, Smart Healthcare System, Security, IoT devices.
2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 2018
The utilization of resource constrained computing devices such as Radio-Frequency IDentification ... more The utilization of resource constrained computing devices such as Radio-Frequency IDentification (RFID) tags, sensor nodes, industrial controllers and smart cards is very common today. The move from desktop computers to small devices made life stability to mobility and brings a wide range of security and privacy concerns. There come the cryptographic algorithms to ensure the security and privacy of the data and the users. Mostly, security of any cryptographic algorithms depends on the substitution boxes that are used in the round function. This paper proposes a new block cipher, SAT_Jo, which is suitable to the tag based applications of the Internet of Things (IoT). This paper computes a 4×4 S-box by the Galois field of order 24. Permutation is explained as a bijective map from the set to itself. Sub key computation is carried out with a change in each phase. The encryption algorithm is explained with a mathematical illustration.
Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...
Artificial Intelligent Systems and Machine Learning, 2011
Information technology is an amalgam of some wonderful inventions of the 21th century in electron... more Information technology is an amalgam of some wonderful inventions of the 21th century in electronics and communication. During a very short span of time it has acquired an important place in almost all aspects of human life and particularly in the field of education. It has compelled countries to take part in education reforms. Building a „knowledge – based‟ economy, where knowledge, creativity and innovation play an important role in generating and sustaining economic growth, is a key objective in all developing countries. As India steps forward in pursuit of its Vision 2020, access to quality education, human capital development and the educational competitiveness of Indian Colleges rank among its most important challenges. Hence, to ensure that its drive towards developed nation status is not derailed, the Ministry of Higher Education and University Grants Commission have jointed their hands to ensure quality in higher education. This paper describes the importance of smart class...
Today, the world has been excited about big data and the advancement in analytics. Big Data has a... more Today, the world has been excited about big data and the advancement in analytics. Big Data has an incredible influence from global market to the day-today life. Big Data is the term used to describe the huge volume of both structured and unstructured data. Big Data Analytics is the use of advanced analytical techniques against very large and diverse data sets that include different types and sizes. Nothing is more important than healthy and peaceful life. Big Data Analytics improves health care system through the reduction run time and the optimal cost. This paper presents an overview of big data analytics in health care and discusses the issues and challenges.
The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future o... more The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future of the scientific world. The increasing amounts of devices with Wi-Fi capabilities allow them to send and receive data. Now-adays smart phone is with everybody and its usage is sky-rocketing. This gives way to connect anything that can be connected, will be connected and secure sharing of information critical. In this paper, the existing works are analyzed and new architecture for Smart healthcare system is proposed. A neoteric authentication scheme that supplements the security of the smart healthcare system is also proposed.
Internet of things (IoT) is the prelude to new technological innovation. It expands with differen... more Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application. Moreover, the medical devices used in the IoT enabled Healthcare System are resource constrained devices. So, this paper proposes a novel mechanism for authenticating such resource constrained medical devices. New algorithm for secure authentication and key agreement of the medical devices is also presented. This mechanism is resistance against various security attacks such as eavesdropping, man-in-the-middle and Denial of Service attacks. Formal security analysis and the comparative study presented in this paper have proved that the proposed mechanism has many security features an...
SALESIAN JOURNAL OF HUMANITIES & SOCIAL SCIENCES
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
Research Highlights in Mathematics and Computer Science Vol. 8, Apr 8, 2023
2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)
INTERNATIONAL CONFERENCE ON RESEARCH IN SCIENCES, ENGINEERING & TECHNOLOGY
Cases on Edge Computing and Analytics, 2021
Naturally, IoT network consists of constrained devices with limited power, storage, and processin... more Naturally, IoT network consists of constrained devices with limited power, storage, and processing capabilities. However, IoT has some challenges to face internal and external issues, for instance, security issues, connectivity complex, data management, etc. In such a case, IoT is not supported by a heavyweight protocol suite. So, developing the lightweight protocol suite is the challenge for IoT environment. This chapter also describes such protocols that fulfill the requirements of IoT. In fact, IoT environment consists of a huge amount of devices. The controlling of all the devices is another issue, as well as data analytics among different devices, also considered a major issue. As a constraint, this chapter focuses to design a standard protocol suite for IoT environment.
Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, ... more The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.
International journal of engineering research and technology, 2018
The Internet of Things (IoT), connecting a large number of communication and information devices,... more The Internet of Things (IoT), connecting a large number of communication and information devices, is the future of the scientific world. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. Smart phone is at every hand and its usage is sky-rocketing. This gives way to connect anything and anybody with the internet which in turn makes secure communication and secure sharing of information critical. In this paper, the existing works are analyzed and an IoT enabled healthcare system architecture is proposed. A novel authentication scheme that supplements the security of the proposed healthcare system is also proposed. Keywords— IoT, Architecture, Enhancing Authentication, Smart Healthcare System, Security, IoT devices.
2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), 2018
The utilization of resource constrained computing devices such as Radio-Frequency IDentification ... more The utilization of resource constrained computing devices such as Radio-Frequency IDentification (RFID) tags, sensor nodes, industrial controllers and smart cards is very common today. The move from desktop computers to small devices made life stability to mobility and brings a wide range of security and privacy concerns. There come the cryptographic algorithms to ensure the security and privacy of the data and the users. Mostly, security of any cryptographic algorithms depends on the substitution boxes that are used in the round function. This paper proposes a new block cipher, SAT_Jo, which is suitable to the tag based applications of the Internet of Things (IoT). This paper computes a 4×4 S-box by the Galois field of order 24. Permutation is explained as a bijective map from the set to itself. Sub key computation is carried out with a change in each phase. The encryption algorithm is explained with a mathematical illustration.
Internet of Things (IoT) is a promising technology that enables centralized monitoring of things ... more Internet of Things (IoT) is a promising technology that enables centralized monitoring of things and devices used in this ecosystem. The realization of IoT in healthcare brings operational efficacy to hospitals in managing every day clinical activities and tracking of patients from anywhere. Most of the devices in smart healthcare use some secure approaches to communicate information. But the systems could still be vulnerable to hackers. It raises concerns regarding data security and privacy. So, this paper proposes a mechanism, called EPCAMD to authenticate the participating devices in the Smart Healthcare System. The authors utilize a Citizen Identification Number (CID) to authenticate a patient. Electronic Product Code (EPC) of a medical device is used for authenticating medical devices. One way hash function is used in the registration and authentication processes of the proposed EPCAMD mechanism to enhance security of the information transferred between the medical devices and ...
Artificial Intelligent Systems and Machine Learning, 2011
Information technology is an amalgam of some wonderful inventions of the 21th century in electron... more Information technology is an amalgam of some wonderful inventions of the 21th century in electronics and communication. During a very short span of time it has acquired an important place in almost all aspects of human life and particularly in the field of education. It has compelled countries to take part in education reforms. Building a „knowledge – based‟ economy, where knowledge, creativity and innovation play an important role in generating and sustaining economic growth, is a key objective in all developing countries. As India steps forward in pursuit of its Vision 2020, access to quality education, human capital development and the educational competitiveness of Indian Colleges rank among its most important challenges. Hence, to ensure that its drive towards developed nation status is not derailed, the Ministry of Higher Education and University Grants Commission have jointed their hands to ensure quality in higher education. This paper describes the importance of smart class...
Today, the world has been excited about big data and the advancement in analytics. Big Data has a... more Today, the world has been excited about big data and the advancement in analytics. Big Data has an incredible influence from global market to the day-today life. Big Data is the term used to describe the huge volume of both structured and unstructured data. Big Data Analytics is the use of advanced analytical techniques against very large and diverse data sets that include different types and sizes. Nothing is more important than healthy and peaceful life. Big Data Analytics improves health care system through the reduction run time and the optimal cost. This paper presents an overview of big data analytics in health care and discusses the issues and challenges.
The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future o... more The Internet of Things (IoT), interconnection of huge number of everyday objects, is the future of the scientific world. The increasing amounts of devices with Wi-Fi capabilities allow them to send and receive data. Now-adays smart phone is with everybody and its usage is sky-rocketing. This gives way to connect anything that can be connected, will be connected and secure sharing of information critical. In this paper, the existing works are analyzed and new architecture for Smart healthcare system is proposed. A neoteric authentication scheme that supplements the security of the smart healthcare system is also proposed.
Internet of things (IoT) is the prelude to new technological innovation. It expands with differen... more Internet of things (IoT) is the prelude to new technological innovation. It expands with different applications such as smart home, smart city, smart grids, smart car, smart healthcare and smart retail. The application of IoT in Healthcare system brings high value for the elderly, victims of chronic disease and those who require constant supervision. But there are many security issues in such application. Moreover, the medical devices used in the IoT enabled Healthcare System are resource constrained devices. So, this paper proposes a novel mechanism for authenticating such resource constrained medical devices. New algorithm for secure authentication and key agreement of the medical devices is also presented. This mechanism is resistance against various security attacks such as eavesdropping, man-in-the-middle and Denial of Service attacks. Formal security analysis and the comparative study presented in this paper have proved that the proposed mechanism has many security features an...