Subir Biswas - Academia.edu (original) (raw)

Papers by Subir Biswas

Research paper thumbnail of An identity-based authentication scheme for safety messages in WAVE-enabled VANETs

International Journal of Parallel, Emergent and Distributed Systems

In a vehicular ad hoc network (VANET), a road-side infrastructure or road-side unit (RSU) is anti... more In a vehicular ad hoc network (VANET), a road-side infrastructure or road-side unit (RSU) is anticipated to be installed at some road-side location. This exposes the VANET to several different adversaries. In this paper, we present an authentication scheme for infrastructure-generated safety messages using an identity (ID)-based proxy signature and verification mechanism. An ID-based technique offers a certificate-less public key

Research paper thumbnail of Deploying Proxy Signature in VANETs

2010 Ieee Global Telecommunications Conference Globecom 2010, 2010

... The time synchronization among vehicles and RSUs are done using the timing information field ... more ... The time synchronization among vehicles and RSUs are done using the timing information field of WAVE ... may launch a sybil attack where a vehicle sends out several identities usually to misdirect a VANET. To thwart such an attack, an entity would store the Kc,i fields for all the ...

Research paper thumbnail of Establishing Trust on VANET Safety Messages

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010

We introduce a new scheme for safety message authentication in VANETs. For a practical implementa... more We introduce a new scheme for safety message authentication in VANETs. For a practical implementation of VANET, we anticipate that road side units (RSUs) are not physically protected and are prone to several different attacks including node compromise attacks. Thus, an RSU should not be automatically trusted by on road vehicles. In our proposed scheme, a road side controller (RSC) is responsible for controlling all the RSUs, and delivering messages through RSUs to vehicles in a given area, where each RSU uses a proxy signature mechanism based on Elliptic Curve Cryptography (ECC), which is a variation of known ECDS-based proxy signature schemes and modified according to the VANET's criteria and security requirements. The underlying network constraints and properties from VANET standards have been taken into consideration along with the security, reliability and other related issues. We also discuss the potential forgery and attack scenarios on our proposed scheme. The security analysis and simulation results prove the strength and adaptability of our proposed scheme in future VANETs.

Research paper thumbnail of Location-based anonymous authentication for vehicular communications

2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, 2011

ABSTRACT

Research paper thumbnail of Relevance-based verification of VANET safety messages

2012 IEEE International Conference on Communications (ICC), 2012

Authentication of vehicular safety messages poses a challenge in a high density road-traffic scen... more Authentication of vehicular safety messages poses a challenge in a high density road-traffic scenario as the verification time for gathered messages gets longer than the average interarrival time. This may expose a vehicular network entity to several different security attacks. The existing solutions have addressed the issue either by randomizing the verification candidates, or by using aggregated signature verification schemes, both of which have shortcomings in terms of applicability in vehicular communications. We propose a novel solution to the vehicular message authentication in dense traffic conditions by introducing a prioritized verification strategy. Based on the relevance of physical parameters of neighboring vehicles, received safety messages are assigned with different priority scores at the verifying entity. In a heavy traffic condition when the resources are scarce, a verifier randomly authenticates the selected received messages according to their priorities. Performance evaluation has shown that our approach is scalable, resource-efficient, and compatible with any underlying authentication schemes.

Research paper thumbnail of Proxy signature-based RSU message broadcasting in VANETs

2010 25th Biennial Symposium on Communications, 2010

ABSTRACT

Research paper thumbnail of Fast, Seamless Rekeying In Wireless Sensor Networks

2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009

We extend the probabilistic key-based approach for wireless sensor networks concerning the slow r... more We extend the probabilistic key-based approach for wireless sensor networks concerning the slow rekeying and path key reestablishment processes. By introducing a novel, energy efficient, distributed, and faster scheme, we attempt to replace the existing ordinary rekeying method of probabilistic key management scheme through a deterministic algorithm that works on both the base station and on each communicating pair of sensor nodes. The node predetermines the backup link key for a future key revocation and switches to the backup key when needed without further interrupting the base station or the key server. This scheme assures high level of security in rekeying operation, and at the same time reduces the rekeying cost very significantly.

Research paper thumbnail of ID-based Safety Message Authentication for Security and Trust in Vehicular Networks

2011 31st International Conference on Distributed Computing Systems Workshops, 2011

ABSTRACT

Research paper thumbnail of DDoS attack on WAVE-enabled VANET through synchronization

2012 IEEE Global Communications Conference (GLOBECOM), 2012

A synchronization-based distributed denial of service (DDoS) attack can seriously affect the vehi... more A synchronization-based distributed denial of service (DDoS) attack can seriously affect the vehicular communications. IEEE 802.11p's EDCA mechanism allows prioritization of outgoing frames from a VANET entity. However, small contention window size of EDCA access categories may expose a periodic transmission to malicious entities for launching a synchronization-based DDoS attack. Since broadcast communications in VANET do not have acknowledgements, both sender and receiver of the periodic broadcasts will be unaware of the attack. In this paper, we analyze the prospect of such an attack on vehicular communications. Our contribution includes different mitigation techniques to avoid synchronization-based DDoS attacks in VANETs.

Research paper thumbnail of Prioritized WAVE-based parking assistance with security and user anonymity

We present a secure, privacy-preserving car parking assistance application using priority-based v... more We present a secure, privacy-preserving car parking assistance application using priority-based vehicular communications. The proposed technique utilizes two modified Elliptic Curve algorithms for vehicular message authentication between parking vehicles and corresponding infrastructure. We address the major challenges associated with VANET security and user privacy. The standard Wireless Access in Vehicular Environment (WAVE) protocol suite has been used to construct our signature mechanism, application data secrecy, and message integrity. Security analysis proves the resilience of the scheme against all known attacks. We also investigate network performances in order to justify the effectiveness of the scheme for practical use.

Research paper thumbnail of Development of a Wireless Body-Mounted Sensor to Monitor Location and Activity of Laying Hens in a Non-Cage Housing System

network A novel wireless body-mounted sensor was developed to remotely monitor the location and a... more network A novel wireless body-mounted sensor was developed to remotely monitor the location and activity of laying hens within non-cage housing systems. Legislation and social demand in the U.S. and Europe is pushing the poultry industry to transition primarily to non-cage housing systems. However, non-cage systems typically house hens in groups of tens of thousands, which makes it nearly impossible for caretakers to visually assess the health, welfare, or movement of all individual hens or to follow a particular hen over time. In the present study, laying hens were fitted with a lightweight (10 g) wireless body-mounted sensor to monitor their location in space relative to key resources and general level of physical activity. Sensor data were validated by correlating them to video-based observations of the sensor-wearing hen. In experiment 1, overall agreement of at least 84% was consistently obtained between data from the sensor system and video concerning the hen's proximity to specific resources including nestboxes, perches, water, and feeder. Presented data were collected from three 30 min observations from each of three laying hens. In experiment 2, the accelerometer data from a back-mounted sensor were correlated to video-based observations from two 30 min observation sessions from each of two laying hens in order to demonstrate the feasibility of automated activity classification using the developed sensor system.

Research paper thumbnail of An identity-based authentication scheme for safety messages in WAVE-enabled VANETs

International Journal of Parallel, Emergent and Distributed Systems

In a vehicular ad hoc network (VANET), a road-side infrastructure or road-side unit (RSU) is anti... more In a vehicular ad hoc network (VANET), a road-side infrastructure or road-side unit (RSU) is anticipated to be installed at some road-side location. This exposes the VANET to several different adversaries. In this paper, we present an authentication scheme for infrastructure-generated safety messages using an identity (ID)-based proxy signature and verification mechanism. An ID-based technique offers a certificate-less public key

Research paper thumbnail of Deploying Proxy Signature in VANETs

2010 Ieee Global Telecommunications Conference Globecom 2010, 2010

... The time synchronization among vehicles and RSUs are done using the timing information field ... more ... The time synchronization among vehicles and RSUs are done using the timing information field of WAVE ... may launch a sybil attack where a vehicle sends out several identities usually to misdirect a VANET. To thwart such an attack, an entity would store the Kc,i fields for all the ...

Research paper thumbnail of Establishing Trust on VANET Safety Messages

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010

We introduce a new scheme for safety message authentication in VANETs. For a practical implementa... more We introduce a new scheme for safety message authentication in VANETs. For a practical implementation of VANET, we anticipate that road side units (RSUs) are not physically protected and are prone to several different attacks including node compromise attacks. Thus, an RSU should not be automatically trusted by on road vehicles. In our proposed scheme, a road side controller (RSC) is responsible for controlling all the RSUs, and delivering messages through RSUs to vehicles in a given area, where each RSU uses a proxy signature mechanism based on Elliptic Curve Cryptography (ECC), which is a variation of known ECDS-based proxy signature schemes and modified according to the VANET's criteria and security requirements. The underlying network constraints and properties from VANET standards have been taken into consideration along with the security, reliability and other related issues. We also discuss the potential forgery and attack scenarios on our proposed scheme. The security analysis and simulation results prove the strength and adaptability of our proposed scheme in future VANETs.

Research paper thumbnail of Location-based anonymous authentication for vehicular communications

2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, 2011

ABSTRACT

Research paper thumbnail of Relevance-based verification of VANET safety messages

2012 IEEE International Conference on Communications (ICC), 2012

Authentication of vehicular safety messages poses a challenge in a high density road-traffic scen... more Authentication of vehicular safety messages poses a challenge in a high density road-traffic scenario as the verification time for gathered messages gets longer than the average interarrival time. This may expose a vehicular network entity to several different security attacks. The existing solutions have addressed the issue either by randomizing the verification candidates, or by using aggregated signature verification schemes, both of which have shortcomings in terms of applicability in vehicular communications. We propose a novel solution to the vehicular message authentication in dense traffic conditions by introducing a prioritized verification strategy. Based on the relevance of physical parameters of neighboring vehicles, received safety messages are assigned with different priority scores at the verifying entity. In a heavy traffic condition when the resources are scarce, a verifier randomly authenticates the selected received messages according to their priorities. Performance evaluation has shown that our approach is scalable, resource-efficient, and compatible with any underlying authentication schemes.

Research paper thumbnail of Proxy signature-based RSU message broadcasting in VANETs

2010 25th Biennial Symposium on Communications, 2010

ABSTRACT

Research paper thumbnail of Fast, Seamless Rekeying In Wireless Sensor Networks

2009 29th IEEE International Conference on Distributed Computing Systems Workshops, 2009

We extend the probabilistic key-based approach for wireless sensor networks concerning the slow r... more We extend the probabilistic key-based approach for wireless sensor networks concerning the slow rekeying and path key reestablishment processes. By introducing a novel, energy efficient, distributed, and faster scheme, we attempt to replace the existing ordinary rekeying method of probabilistic key management scheme through a deterministic algorithm that works on both the base station and on each communicating pair of sensor nodes. The node predetermines the backup link key for a future key revocation and switches to the backup key when needed without further interrupting the base station or the key server. This scheme assures high level of security in rekeying operation, and at the same time reduces the rekeying cost very significantly.

Research paper thumbnail of ID-based Safety Message Authentication for Security and Trust in Vehicular Networks

2011 31st International Conference on Distributed Computing Systems Workshops, 2011

ABSTRACT

Research paper thumbnail of DDoS attack on WAVE-enabled VANET through synchronization

2012 IEEE Global Communications Conference (GLOBECOM), 2012

A synchronization-based distributed denial of service (DDoS) attack can seriously affect the vehi... more A synchronization-based distributed denial of service (DDoS) attack can seriously affect the vehicular communications. IEEE 802.11p's EDCA mechanism allows prioritization of outgoing frames from a VANET entity. However, small contention window size of EDCA access categories may expose a periodic transmission to malicious entities for launching a synchronization-based DDoS attack. Since broadcast communications in VANET do not have acknowledgements, both sender and receiver of the periodic broadcasts will be unaware of the attack. In this paper, we analyze the prospect of such an attack on vehicular communications. Our contribution includes different mitigation techniques to avoid synchronization-based DDoS attacks in VANETs.

Research paper thumbnail of Prioritized WAVE-based parking assistance with security and user anonymity

We present a secure, privacy-preserving car parking assistance application using priority-based v... more We present a secure, privacy-preserving car parking assistance application using priority-based vehicular communications. The proposed technique utilizes two modified Elliptic Curve algorithms for vehicular message authentication between parking vehicles and corresponding infrastructure. We address the major challenges associated with VANET security and user privacy. The standard Wireless Access in Vehicular Environment (WAVE) protocol suite has been used to construct our signature mechanism, application data secrecy, and message integrity. Security analysis proves the resilience of the scheme against all known attacks. We also investigate network performances in order to justify the effectiveness of the scheme for practical use.

Research paper thumbnail of Development of a Wireless Body-Mounted Sensor to Monitor Location and Activity of Laying Hens in a Non-Cage Housing System

network A novel wireless body-mounted sensor was developed to remotely monitor the location and a... more network A novel wireless body-mounted sensor was developed to remotely monitor the location and activity of laying hens within non-cage housing systems. Legislation and social demand in the U.S. and Europe is pushing the poultry industry to transition primarily to non-cage housing systems. However, non-cage systems typically house hens in groups of tens of thousands, which makes it nearly impossible for caretakers to visually assess the health, welfare, or movement of all individual hens or to follow a particular hen over time. In the present study, laying hens were fitted with a lightweight (10 g) wireless body-mounted sensor to monitor their location in space relative to key resources and general level of physical activity. Sensor data were validated by correlating them to video-based observations of the sensor-wearing hen. In experiment 1, overall agreement of at least 84% was consistently obtained between data from the sensor system and video concerning the hen's proximity to specific resources including nestboxes, perches, water, and feeder. Presented data were collected from three 30 min observations from each of three laying hens. In experiment 2, the accelerometer data from a back-mounted sensor were correlated to video-based observations from two 30 min observation sessions from each of two laying hens in order to demonstrate the feasibility of automated activity classification using the developed sensor system.