Sharmistha Adhikari - Academia.edu (original) (raw)
Uploads
Papers by Sharmistha Adhikari
Wireless Personal Communications
Lecture Notes in Electrical Engineering, 2018
In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to lev... more In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to leverage scalable content distribution. Similarly, the Internet of things (IoT) is another upcoming technology which integrates as well as manages heterogeneous connected devices over the Internet. Recent literature have shown that IoT architecture can efficiently perform if it is implemented in CCN environment. In addition, considering the openness of the Internet used in IoT communication and limited capacity of IoT devices, security becomes a serious challenge which demands attention of the research community. In this paper, our main objective is to design a secure IoT communication framework that operates in CCN. A certificateless public key infrastructure is designed for our resource-constrained IoT communication framework in CCN. We have incorporated elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to ensure security of the proposed scheme. Finally, an in-depth security analysis confirms that the proposed scheme is resistant to various relevant cryptographic attacks.
Algorithms for Intelligent Systems, 2022
In current technological era, content centric network (CCN) is envisaged as a clean-slate future ... more In current technological era, content centric network (CCN) is envisaged as a clean-slate future Internet architecture to meet the growing demand of information exchange as well as to ease smooth distribution of content. Recently, with the popularity of mobile devices, wireless mobile network (WMN) has become an integral part of our daily life. Through WMN mobile users can access information/content from Internet anytime even in roaming from one cellular network to another. However, due to limitation of coverage of an access point (AP) in WMN, mobile handover occurs frequently between the AP and mobile device. During handover process, privacy and security of a mobile consumer becomes a serious challenge since mobile user’s anonymity and non-traceability have to be maintained. However, mobility of consumer and content producer in CCN is a major concern which needs to be addressed along with its security aspect. In this paper, a lightweight anonymous handover authentication protocol f...
Emerging Technologies in Computing, 2021
Computer Communications, 2020
International Journal of Communication Systems, 2018
Initially, Internet has evolved as a resource sharing model where resources are identified by IP ... more Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean-slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP-based Internet. Hence, the transition from contemporary IP-based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in-network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC-based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured.
Wireless Personal Communications
Lecture Notes in Electrical Engineering, 2018
In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to lev... more In the recent era, content-centric network (CCN) is emerging as a future Internet paradigm to leverage scalable content distribution. Similarly, the Internet of things (IoT) is another upcoming technology which integrates as well as manages heterogeneous connected devices over the Internet. Recent literature have shown that IoT architecture can efficiently perform if it is implemented in CCN environment. In addition, considering the openness of the Internet used in IoT communication and limited capacity of IoT devices, security becomes a serious challenge which demands attention of the research community. In this paper, our main objective is to design a secure IoT communication framework that operates in CCN. A certificateless public key infrastructure is designed for our resource-constrained IoT communication framework in CCN. We have incorporated elliptic curve cryptography (ECC), a state-of-the-art lightweight cryptosystem, to ensure security of the proposed scheme. Finally, an in-depth security analysis confirms that the proposed scheme is resistant to various relevant cryptographic attacks.
Algorithms for Intelligent Systems, 2022
In current technological era, content centric network (CCN) is envisaged as a clean-slate future ... more In current technological era, content centric network (CCN) is envisaged as a clean-slate future Internet architecture to meet the growing demand of information exchange as well as to ease smooth distribution of content. Recently, with the popularity of mobile devices, wireless mobile network (WMN) has become an integral part of our daily life. Through WMN mobile users can access information/content from Internet anytime even in roaming from one cellular network to another. However, due to limitation of coverage of an access point (AP) in WMN, mobile handover occurs frequently between the AP and mobile device. During handover process, privacy and security of a mobile consumer becomes a serious challenge since mobile user’s anonymity and non-traceability have to be maintained. However, mobility of consumer and content producer in CCN is a major concern which needs to be addressed along with its security aspect. In this paper, a lightweight anonymous handover authentication protocol f...
Emerging Technologies in Computing, 2021
Computer Communications, 2020
International Journal of Communication Systems, 2018
Initially, Internet has evolved as a resource sharing model where resources are identified by IP ... more Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean-slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP-based Internet. Hence, the transition from contemporary IP-based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in-network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC-based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured.