Parwinder Dhillon - Academia.edu (original) (raw)

Uploads

Papers by Parwinder Dhillon

Research paper thumbnail of Attacks and Countermeasures for Secure User Authentication Mechanisms

"Distribution of services and resources via open network has become the latest trend in informati... more "Distribution of services and resources via open network has become the latest trend in information technology. In this digital era, any two entities can exchange messages, irrespective of their physical distance. Therefore, open networks and servers demand the security to protect data and information from the hackers. The remote user authentication plays a fundamental and essential role to ensure secure and authorized communication over insecure public channels. Recently, numerous states of the art authentication schemes have been proposed in the literature to authenticate the remote user. This paper performs a comprehensive systematic review of literature in order to gather existing knowledge on authentication techniques proposed and ways to discern the most effective ones for different contexts. The review illustrates that the vast research has been done for authentication approaches, although its use in some contexts has not been researched as much. The paper also throws light on the possible attacks that have been identified to date. Furthermore, the existing authentication schemes are compared on the basis of security and their advantages, limitations are highlighted."

Research paper thumbnail of Elliptic curve cryptography for real time embedded systems in IoT networks

2016 5th International Conference on Wireless Networks and Embedded Systems (WECON), 2016

Internet of things (IoT) is a growing network of embedded devices that can interact with the exte... more Internet of things (IoT) is a growing network of embedded devices that can interact with the external environment. With this increasing global network, electronic communication between devices is becoming wireless and ubiquitous. Also, most of the IoT services will be realized as real time embedded systems which rely heavily on security mechanisms. This makes security imperative to embedded devices in IoT. This paper presents security challenges faced by system designers while designing secure embedded systems. The most difficult task for embedded system security is implementation of Public Key Cryptography (PKC). PKC based on Elliptic Curve Cryptography (ECC) which uses smaller key sizes is efficient for both private and public operations. Moreover, with IoT several embedded devices are becoming interconnected which makes ECC advantageous when you need to embed security. The comparative study suggests that ECC is best suited for resource constrained real time embedded systems in IoT.

Research paper thumbnail of A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services

Journal of Ambient Intelligence and Smart Environments, 2019

The evolution of cloud computing and Internet of Things (IoT) paradigms has made real time monito... more The evolution of cloud computing and Internet of Things (IoT) paradigms has made real time monitoring of patients by remote medical professionals feasible and patients take benefits of healthcare services at home. In these situations patient data gets stored at the centralized healthcare center, from where it can be accessed by a medical professional at regular intervals. However, this makes the patient's privacy a critical issue due to the open wireless environment. Recently, many authentication schemes for healthcare services have been proposed in the literature and it has been observed that most of the schemes cannot completely achieve the security requirements and they furthermore do not consider the issue of how a medical professional access cloud server data. In this paper, we propose a multi-factor authentication scheme based on elliptic curve cryptography which allows only a legal medical professional to access patient's medical data stored on the cloud server. Furthermore, the web based AVISPA tool is used for formal analysis and it confirms that the scheme is secure against active and passive attacks including replay and man-in-the-middle attacks. Also, a comparison of security features and performance analysis proves that the scheme offers a strong defense against security attacks and also achieves session key agreement.

Research paper thumbnail of Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things

Multimedia Tools and Applications, 2019

Since last decade, VoIP is transitioning from being a voice scheme to the most powerful unified c... more Since last decade, VoIP is transitioning from being a voice scheme to the most powerful unified communications engine. All VoIP systems uses the Session Initiation Scheme that defines the procedures and messages used to set up a phone callor any other kind of communication. IoT is another paradigm-shifting idea that is going to change VoIP communications, since it offers a seamless way to connect all of the devices, applications and platforms. Embedding VoIP in IoT solutions provides a competitive advantage over the traditional telephony system of being interconnected to Internet of Things. With the IoT, value proposition of VoIP broadens so with IoT, however, VoIP is vulnerable to all of the intrinsic security problems in IP. In this paper, a new biometrics based authentication scheme using ECC has been proposed. The formal and informal security analysis of the scheme proves the security strength of the scheme. Simulation of the scheme using AVISPA also proves the scheme is secure against potential threats. Comparison of the proposed scheme in terms of computation cost and security features with other related schemes proves the superiority of the scheme.

Research paper thumbnail of Multi-factor user authentication scheme for IoT-based healthcare services

Journal of Reliable Intelligent Environments, 2018

Due to the tremendous rise of the cloud computing and the Internet of Things (IoT) paradigms, the... more Due to the tremendous rise of the cloud computing and the Internet of Things (IoT) paradigms, the possibility of remote monitoring of the patients in real time by a remote Medical Professional (MP) has become feasible and patients can enjoy healthcare services at home. To achieve this, the patient's medical data will need to be stored on the Cloud server. However, patient's medical data stored on server are highly sensitive and, hence, the Cloud-IoT network becomes open to many attacks. For that reason, it must ensure that patients' medical data do not get exposed to malicious users. This makes strong user authentication a prerequisite for the successful global deployment of centralized healthcare systems. In this paper, we present an efficient, strong authentication protocol, for the MP to access patient data for healthcare applications based on Cloud-IoT network. The proposed protocol includes: (1) three-factor MP authentication (i.e. password, biometrics and smartcard); (2) mutual authentication between MP and the cloud server; (3) establishes a secure shared session key; and (4) maintains key freshness. Furthermore, the proposed protocol uses only two message exchanges between MP and cloud server, and attains efficiency (i.e. low computation and communication costs). Through the formal analysis using AVISPA web tool, security analysis and performance analysis, we conclude that the proposed protocol is more secure against potential attacks and obtains a trade-off between security and performance cost for healthcare application using Cloud-IoT networks.

Research paper thumbnail of Secure multi-factor remote user authentication scheme for Internet of Things environments

International Journal of Communication Systems, 2017

Research paper thumbnail of A lightweight biometrics based remote user authentication scheme for IoT services

Journal of Information Security and Applications, 2017

User authentication is becoming crucial in the accelerating Internet of Things (IoT) environment.... more User authentication is becoming crucial in the accelerating Internet of Things (IoT) environment. With IoT several applications and services have been emerging in the areas such as, surveillance, healthcare, security, etc. The services offered can be accessed through smart device applications by the user from anywhere, anytime and anyplace. This makes security and privacy critical to IoT. Moreover, security is paramount in IoT, to enable secure access to the services; multi-factor based authentication can provide high security. In this paper, a lightweight biometric based remote user authentication and key agreement scheme for secure access to IoT services has been proposed. The protocol makes use of lightweight hash operations and XOR operation. The security analysis proves that it is robust against multiple security attacks. The formal verification is performed using AVISPA tool, which confirms its security in the presence of a possible intruder.

Research paper thumbnail of A Novel framework to Image Edge Detection using Cellular Automata

Ijca Special Issue on Confluence 2012 the Next Generation Information Technology Summit, Sep 17, 2012

Edge detection is one of the most commonly used operations in image analysis and digital image pr... more Edge detection is one of the most commonly used operations in image analysis and digital image processing. Edge detection technique has a key role in machine vision and image understanding systems. In machine vision motion track and measurement system based on discrete feature, the exact feature edge orientation in the image is the precondition of the successful completion of the vision measurement task. Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodology. Most of the classical mathematical methods for edge detection based on the derivative of the pixels of the original image are Gradient operators, Laplacian and Laplacian of Gaussian operators. Gradient based edge detection methods, such as Roberts, Sobel and Prewitts, have used two 2-D or 3-D linear filters to process vertical edges and horizontal edges

Research paper thumbnail of Handoff Optimization for Wireless and Mobile Networks using Fuzzy logic

International Journal of Computer Applications, 2013

The most important issue in Personal Communication Services (PCS) is the mobility management. And... more The most important issue in Personal Communication Services (PCS) is the mobility management. And the efficiency of this PCS system is dependent on the maintenance of a reliable and optimal radio link between the mobile user and the fixed system. When the mobile user moves out of his coverage area, handoff is required to enjoy continuation of services. In this paper, a handoff algorithm termed as Fuzzy controller for Handoff Optimization (FCHO) is introduced based upon fuzzy logic. Traditional algorithms for handoff using fixed values of parameters can perform well only in specific environment but FCHO exploits attractive features of several existing algorithms, and adds more capabilities to provide adaptation to the dynamic environment. Simulation results reveal that the proposed FCHO algorithm eliminates the problem of corner effect by dynamically changing the value of threshold and hysteresis with the change in the RSSI and the velocity of the mobile station.

Research paper thumbnail of Estimating Software Reusability from OO Metrics using Fuzzy Logic

With the rise of the OO software development the traditional software metrics have proved inadequ... more With the rise of the OO software development the traditional software metrics have proved inadequate to measure such systems. This has led to the development of metrics suited to the OO model. Chidamber and Kemerer proposed a set of six metrics to measure the OO aspects in order to help the users in understanding the complexity of object oriented design and in predicting the external software quality attributes such as software defects, testing, and maintenance effort. In this paper, we have used fuzzy logic to evaluate the quality of an OO system in terms of reusability. We have tried to analyze and interpret the impact of six CK metrics on the reusability of the system. Simulation results demonstrate how the reuse factor varies with respect to the metrics viz. WMC, DIT, NOC, CBO, LCOM and RFC.

Research paper thumbnail of Fuzzy Logic Approach to Forecast the Extendibility/Extensibility in Object Oriented Design using an Integrated Model

International Journal of Computer Applications, May 16, 2014

A number of researchers have conducted various empirical studies on the software metrics for Obje... more A number of researchers have conducted various empirical studies on the software metrics for Object Oriented design. The research proved that some of these metrices are very useful for forcasting the quality attributes of the software like extendibility/extensibility, effectiveness, reliability and maintainability. In this paper a hybrid approach is proposed for investigating the extendibility/extensibility of classes in Object Oriented design.Tthe hybrid approach will comprised of subset of CK netric suite and mood netric suite. These days a great demand occur for finding software measurement so that quality of software can be forcasted. Therefore software engineering require various quality models that can be used for forcasting the characteristics for quality such as extendibility/extensibility, effectiveness, reliability and maintainability. The main objective of this work is to experimentally forecast the association between OOD metrics and extendibility/extensibility.

Research paper thumbnail of Attacks and Countermeasures for Secure User Authentication Mechanisms

"Distribution of services and resources via open network has become the latest trend in informati... more "Distribution of services and resources via open network has become the latest trend in information technology. In this digital era, any two entities can exchange messages, irrespective of their physical distance. Therefore, open networks and servers demand the security to protect data and information from the hackers. The remote user authentication plays a fundamental and essential role to ensure secure and authorized communication over insecure public channels. Recently, numerous states of the art authentication schemes have been proposed in the literature to authenticate the remote user. This paper performs a comprehensive systematic review of literature in order to gather existing knowledge on authentication techniques proposed and ways to discern the most effective ones for different contexts. The review illustrates that the vast research has been done for authentication approaches, although its use in some contexts has not been researched as much. The paper also throws light on the possible attacks that have been identified to date. Furthermore, the existing authentication schemes are compared on the basis of security and their advantages, limitations are highlighted."

Research paper thumbnail of Elliptic curve cryptography for real time embedded systems in IoT networks

2016 5th International Conference on Wireless Networks and Embedded Systems (WECON), 2016

Internet of things (IoT) is a growing network of embedded devices that can interact with the exte... more Internet of things (IoT) is a growing network of embedded devices that can interact with the external environment. With this increasing global network, electronic communication between devices is becoming wireless and ubiquitous. Also, most of the IoT services will be realized as real time embedded systems which rely heavily on security mechanisms. This makes security imperative to embedded devices in IoT. This paper presents security challenges faced by system designers while designing secure embedded systems. The most difficult task for embedded system security is implementation of Public Key Cryptography (PKC). PKC based on Elliptic Curve Cryptography (ECC) which uses smaller key sizes is efficient for both private and public operations. Moreover, with IoT several embedded devices are becoming interconnected which makes ECC advantageous when you need to embed security. The comparative study suggests that ECC is best suited for resource constrained real time embedded systems in IoT.

Research paper thumbnail of A secure multi-factor ECC based authentication scheme for Cloud-IoT based healthcare services

Journal of Ambient Intelligence and Smart Environments, 2019

The evolution of cloud computing and Internet of Things (IoT) paradigms has made real time monito... more The evolution of cloud computing and Internet of Things (IoT) paradigms has made real time monitoring of patients by remote medical professionals feasible and patients take benefits of healthcare services at home. In these situations patient data gets stored at the centralized healthcare center, from where it can be accessed by a medical professional at regular intervals. However, this makes the patient's privacy a critical issue due to the open wireless environment. Recently, many authentication schemes for healthcare services have been proposed in the literature and it has been observed that most of the schemes cannot completely achieve the security requirements and they furthermore do not consider the issue of how a medical professional access cloud server data. In this paper, we propose a multi-factor authentication scheme based on elliptic curve cryptography which allows only a legal medical professional to access patient's medical data stored on the cloud server. Furthermore, the web based AVISPA tool is used for formal analysis and it confirms that the scheme is secure against active and passive attacks including replay and man-in-the-middle attacks. Also, a comparison of security features and performance analysis proves that the scheme offers a strong defense against security attacks and also achieves session key agreement.

Research paper thumbnail of Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things

Multimedia Tools and Applications, 2019

Since last decade, VoIP is transitioning from being a voice scheme to the most powerful unified c... more Since last decade, VoIP is transitioning from being a voice scheme to the most powerful unified communications engine. All VoIP systems uses the Session Initiation Scheme that defines the procedures and messages used to set up a phone callor any other kind of communication. IoT is another paradigm-shifting idea that is going to change VoIP communications, since it offers a seamless way to connect all of the devices, applications and platforms. Embedding VoIP in IoT solutions provides a competitive advantage over the traditional telephony system of being interconnected to Internet of Things. With the IoT, value proposition of VoIP broadens so with IoT, however, VoIP is vulnerable to all of the intrinsic security problems in IP. In this paper, a new biometrics based authentication scheme using ECC has been proposed. The formal and informal security analysis of the scheme proves the security strength of the scheme. Simulation of the scheme using AVISPA also proves the scheme is secure against potential threats. Comparison of the proposed scheme in terms of computation cost and security features with other related schemes proves the superiority of the scheme.

Research paper thumbnail of Multi-factor user authentication scheme for IoT-based healthcare services

Journal of Reliable Intelligent Environments, 2018

Due to the tremendous rise of the cloud computing and the Internet of Things (IoT) paradigms, the... more Due to the tremendous rise of the cloud computing and the Internet of Things (IoT) paradigms, the possibility of remote monitoring of the patients in real time by a remote Medical Professional (MP) has become feasible and patients can enjoy healthcare services at home. To achieve this, the patient's medical data will need to be stored on the Cloud server. However, patient's medical data stored on server are highly sensitive and, hence, the Cloud-IoT network becomes open to many attacks. For that reason, it must ensure that patients' medical data do not get exposed to malicious users. This makes strong user authentication a prerequisite for the successful global deployment of centralized healthcare systems. In this paper, we present an efficient, strong authentication protocol, for the MP to access patient data for healthcare applications based on Cloud-IoT network. The proposed protocol includes: (1) three-factor MP authentication (i.e. password, biometrics and smartcard); (2) mutual authentication between MP and the cloud server; (3) establishes a secure shared session key; and (4) maintains key freshness. Furthermore, the proposed protocol uses only two message exchanges between MP and cloud server, and attains efficiency (i.e. low computation and communication costs). Through the formal analysis using AVISPA web tool, security analysis and performance analysis, we conclude that the proposed protocol is more secure against potential attacks and obtains a trade-off between security and performance cost for healthcare application using Cloud-IoT networks.

Research paper thumbnail of Secure multi-factor remote user authentication scheme for Internet of Things environments

International Journal of Communication Systems, 2017

Research paper thumbnail of A lightweight biometrics based remote user authentication scheme for IoT services

Journal of Information Security and Applications, 2017

User authentication is becoming crucial in the accelerating Internet of Things (IoT) environment.... more User authentication is becoming crucial in the accelerating Internet of Things (IoT) environment. With IoT several applications and services have been emerging in the areas such as, surveillance, healthcare, security, etc. The services offered can be accessed through smart device applications by the user from anywhere, anytime and anyplace. This makes security and privacy critical to IoT. Moreover, security is paramount in IoT, to enable secure access to the services; multi-factor based authentication can provide high security. In this paper, a lightweight biometric based remote user authentication and key agreement scheme for secure access to IoT services has been proposed. The protocol makes use of lightweight hash operations and XOR operation. The security analysis proves that it is robust against multiple security attacks. The formal verification is performed using AVISPA tool, which confirms its security in the presence of a possible intruder.

Research paper thumbnail of A Novel framework to Image Edge Detection using Cellular Automata

Ijca Special Issue on Confluence 2012 the Next Generation Information Technology Summit, Sep 17, 2012

Edge detection is one of the most commonly used operations in image analysis and digital image pr... more Edge detection is one of the most commonly used operations in image analysis and digital image processing. Edge detection technique has a key role in machine vision and image understanding systems. In machine vision motion track and measurement system based on discrete feature, the exact feature edge orientation in the image is the precondition of the successful completion of the vision measurement task. Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodology. Most of the classical mathematical methods for edge detection based on the derivative of the pixels of the original image are Gradient operators, Laplacian and Laplacian of Gaussian operators. Gradient based edge detection methods, such as Roberts, Sobel and Prewitts, have used two 2-D or 3-D linear filters to process vertical edges and horizontal edges

Research paper thumbnail of Handoff Optimization for Wireless and Mobile Networks using Fuzzy logic

International Journal of Computer Applications, 2013

The most important issue in Personal Communication Services (PCS) is the mobility management. And... more The most important issue in Personal Communication Services (PCS) is the mobility management. And the efficiency of this PCS system is dependent on the maintenance of a reliable and optimal radio link between the mobile user and the fixed system. When the mobile user moves out of his coverage area, handoff is required to enjoy continuation of services. In this paper, a handoff algorithm termed as Fuzzy controller for Handoff Optimization (FCHO) is introduced based upon fuzzy logic. Traditional algorithms for handoff using fixed values of parameters can perform well only in specific environment but FCHO exploits attractive features of several existing algorithms, and adds more capabilities to provide adaptation to the dynamic environment. Simulation results reveal that the proposed FCHO algorithm eliminates the problem of corner effect by dynamically changing the value of threshold and hysteresis with the change in the RSSI and the velocity of the mobile station.

Research paper thumbnail of Estimating Software Reusability from OO Metrics using Fuzzy Logic

With the rise of the OO software development the traditional software metrics have proved inadequ... more With the rise of the OO software development the traditional software metrics have proved inadequate to measure such systems. This has led to the development of metrics suited to the OO model. Chidamber and Kemerer proposed a set of six metrics to measure the OO aspects in order to help the users in understanding the complexity of object oriented design and in predicting the external software quality attributes such as software defects, testing, and maintenance effort. In this paper, we have used fuzzy logic to evaluate the quality of an OO system in terms of reusability. We have tried to analyze and interpret the impact of six CK metrics on the reusability of the system. Simulation results demonstrate how the reuse factor varies with respect to the metrics viz. WMC, DIT, NOC, CBO, LCOM and RFC.

Research paper thumbnail of Fuzzy Logic Approach to Forecast the Extendibility/Extensibility in Object Oriented Design using an Integrated Model

International Journal of Computer Applications, May 16, 2014

A number of researchers have conducted various empirical studies on the software metrics for Obje... more A number of researchers have conducted various empirical studies on the software metrics for Object Oriented design. The research proved that some of these metrices are very useful for forcasting the quality attributes of the software like extendibility/extensibility, effectiveness, reliability and maintainability. In this paper a hybrid approach is proposed for investigating the extendibility/extensibility of classes in Object Oriented design.Tthe hybrid approach will comprised of subset of CK netric suite and mood netric suite. These days a great demand occur for finding software measurement so that quality of software can be forcasted. Therefore software engineering require various quality models that can be used for forcasting the characteristics for quality such as extendibility/extensibility, effectiveness, reliability and maintainability. The main objective of this work is to experimentally forecast the association between OOD metrics and extendibility/extensibility.