poonam jindal - Academia.edu (original) (raw)

Papers by poonam jindal

Research paper thumbnail of AES 32: An FPGA implementation of Lightweight-AES for IoT Devices

International journal of computing and digital system/International Journal of Computing and Digital Systems, Aug 10, 2024

Research paper thumbnail of Physical Key Generation Using Modified Discrete Wavelet Transforms For The Internet of Things

International Journal of Computing and Digital Systems, Jan 14, 2024

Research paper thumbnail of Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks

The Journal of Supercomputing, Aug 17, 2023

Research paper thumbnail of A compact and efficient AES-32GF for encryption in small IoT devices

Research paper thumbnail of A highly efficient FPGA implementation of AES for high throughput IoT applications

Journal of Discrete Mathematical Sciences and Cryptography, Oct 3, 2022

Research paper thumbnail of Response Time Analysis of Secure IEEE 802.11n Wireless LAN in a Class of Network Scenarios

International Conference on Advanced Computing, Feb 21, 2015

In this paper, we investigate the security performance of IEEE 802.11n WLAN standard using an exp... more In this paper, we investigate the security performance of IEEE 802.11n WLAN standard using an experimental test bed in roaming and non-roaming, congested and non-congested network scenarios with different packet lengths. Experimental results are obtained in terms of response time (RT) for a layered security model covering nine security protocols. Experimental results show that different security layers have varied impact on RT. For IEEE 802.11n version, the response time is the highest for WEP/64/128. It is around 45% and 42% more than that for WPA2/AES and enterprise layer WPA2/AES/TKIP respectively. The important observation is that though WEP/64/128 is the security layer with the least complexity, it causes the maximum RT. The response time in case of uncongested network and congested network is measured. It is found that response time in TCP congested network is almost 3-4% more than that of TCP uncongested network and RT in UDP congested network is 39.58% more than that of UDP uncongested network. TCP response time is more than that of UDP response time. It decreases with increasing packet length. RT is increased by 3-4% in roaming network as compared to non-roaming network. The experimental results presented in this paper can be used as reference to configure WLANs in order to optimally apply the security policies in varied class of wireless networks.

Research paper thumbnail of Physical Layer Security-Based Relay Selection for Wireless Cooperative Networks: A Reinforcement Learning Approach

Research paper thumbnail of Analyzing the security-performance tradeoff in block ciphers

In this paper, we have presented comparative performance analysis of symmetric key algorithms par... more In this paper, we have presented comparative performance analysis of symmetric key algorithms particularly of block ciphers. Performance evaluation of various block ciphers has been carried out in terms of encryption time, avalanche effect, throughput, CPU time, and power consumption. The obtained numerical values show that there is always a tradeoff between security and the network performance. RC6 outperforms the AES for all the parameters except security. We have introduced a new modified version of RC6 referred to as MC-RC6 with enhanced security and performance better than AES.

Research paper thumbnail of Physical Layer Security with Energy Harvesting Techniques: A Study

Lecture notes in networks and systems, Aug 31, 2018

In wireless communication, the message signal transmitted by a source is received by all the node... more In wireless communication, the message signal transmitted by a source is received by all the nodes present in the range of the transmitter; thus, reliable and secure links are desired. Moreover, a battery of the relay nodes present in a wireless network needs to be recharged on regular basis. The combination of physical layer security and energy harvesting offers reliable and secure transmission of information plus prevents draining out the battery of relays that helps in cooperative communication. Therefore, it has become a hotspot area for research work. In this paper, we present a study on research progresses in the area of physical layer security with energy harvesting techniques.

Research paper thumbnail of A Compact and Efficient Fpga Implementation of Aes for Iot Devices

Research paper thumbnail of Photonic Crystal Fiber Based Refractive Index Sensor for Cholesterol Sensing in Far Infrared Region

Research paper thumbnail of Decagonal solid core PCF based refractive index sensor for blood cells detection in terahertz regime

Optical and Quantum Electronics, Mar 16, 2021

The fast and accurate detection of the blood components is very necessary before initiating the t... more The fast and accurate detection of the blood components is very necessary before initiating the treatment of patients. In this article, a decagonal Solid Core Photonic Crystal Fiber (SC-PCF) sensor with very high sensitivity and low confinement loss for efficiently detecting the blood cells is proposed. The solid core with air hole ring gives an extra edge for sensing the biomedical analytes due to the easy infiltration of liquid in the holes of the core. The material used in the background of the PCF is TOPAS. A Perfectly Matched Layer (PML) is used as boundary condition in outer layer of cladding. The Full-Vectorial Finite Element Method (FV-FEM) is used for solving the Maxwell equation and numerical analysis of the model in the THz regime. In results, the highest sensitivity in the terahertz spectrum for glucose, plasma, WBC and RBC are 84.55%, 85.09%, 85.62% and 87.68% respectively. Specifically, more than 85.09% sensitivity for all the blood components makes this sensor very useful for rapid blood sensing. This paper also analyzes the low confinement loss (CL), high effective mode area, low birefringence and beat length at operating frequency in the terahertz spectrum (1THz–4THz) for all the blood components.

Research paper thumbnail of Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers

Wireless Personal Communications, Apr 13, 2021

The modern and emerging wireless communication technologies are benefiting from relaying techniqu... more The modern and emerging wireless communication technologies are benefiting from relaying techniques, which is already adopted in long term evolution (LTE) Release 10. The relay technology has great potential to improve the communication distance and system capabilities. However, due to the use of short-range frequencies for communication and increasing user density, relay technology requires the integration of machine learning and physical layer security (PLS) to attain its full potential. Therefore, this paper presents the machine learning (ML) algorithms for relay selection (RS) to improve the physical layer security of a dual-hop non-regenerative wireless cooperative network. The secure RS is converted into a prediction and decision-making problem. To the best of our knowledge, this is the first attempt to study the secured RS as a prediction and decision-making problem. We propose two reinforcement-learning techniques, namely the physical layer secured Q-learning algorithm for RS (PQL-RS) and the modified physical layer secured Q-learning algorithm for RS (MPQL-RS) for different scenarios. Markov decision process (MDP) is used with the introduced algorithms to select a single relay from a group of relays and multiple eavesdroppers. RS without requiring the prior data and network model knowledge are the unique advantages of the proposed algorithms. The introduced algorithms are compared to the different RS schemes and simulation results show that the MPQL-RS can deliver the best performance and save the convergence time. Moreover, the secrecy performance of different modulation techniques is also analyzed for the proposed algorithms. It is shown that the secrecy of the system improves by 7% on average for every double in modulation order.

Research paper thumbnail of Refractive index sensor for sensing high refractive index bioliquids at the THz frequency

Journal of The Optical Society of America B-optical Physics, Oct 22, 2021

In this paper, a highly sensitive and low loss refractive index (RI) biosensor for high RI bio-an... more In this paper, a highly sensitive and low loss refractive index (RI) biosensor for high RI bio-analytes detection, such as for cholesterol, nicotine, and bacillus bacteria, is proposed. A novel, to the best of our knowledge, decagonal structure with porous core photonic crystal fiber (PC-PCF) is introduced. The porous core consists of a rectangular sensing hole. The analytes to be sensed are considered in liquid form and infiltrated into the sensing holes, which makes the sensing process simpler and more straightforward. Cladding of the PC-PCF consists of multilayer circular air holes arranged in a decagonal pattern. For durability and stability of the sensor, TOPAS is used as the fiber material. A perfectly matched layer is used for boundary conditions. The correlation among optical power, material, and structural properties is analyzed by the finite element method. The sensing performance of the designed sensor is observed at THz frequency (1.4–3.8 THz). The results under high RI of the analytes (1.52–1.55) are as follows: maximum sensitivity of 98.31% for x polarization and 98.26% for y polarization, very low confinement loss of 1.5 × 10 − 14 d B / m , narrow effective mode area of 1.92 × 10 − 7 m 2 , minimum effective material loss of 0.000164 c m − 1 , and very low waveguide dispersion of 0.002 ± 0.05 ps/THz/cm. In addition, the effect of variation of structural parameters on sensor performance is also analyzed. The proposed PC-PCF-based biosensor can be very useful for sensing higher RI biochemical analytes.

Research paper thumbnail of Lightweight Cryptography: A Solution to Secure IoT

Wireless Personal Communications, Jan 25, 2020

Research paper thumbnail of Design and Implementation of RS(450, 406) Decoder

International Journal of Embedded and Real-time Communication Systems, 2021

Research paper thumbnail of Surface plasmon resonance sensor based on MXene coated PCF for detecting the cancer cells with machine learning approach

Microelectronic Engineering, 2023

Research paper thumbnail of Efficient Secret Key Generation Using Langrage’s Interpolation and Discrete Wavelet Transform Function for Internet of Things

International Journal of Computing and Digital Systems, Apr 16, 2023

Data security during information flow has been a difficult challenge in Internet of Things (IoT).... more Data security during information flow has been a difficult challenge in Internet of Things (IoT). To improve security status various conventional cryptographic methods such as public, private, and hybrid key generation had been utilized by various researchers. But these methods are associated with a lack of secure communication between two or more devices. In view of this, a lot of effort is being put into the physical layer of security. In this concept signal-based encryption and key generation are used as the major components in the security of data. In this research, we present a physical layer security technique based on wavelet transforms and Langrage's interpolation. The wavelet based function precedes the sampling of Received Signal Strength (RSS) and convolution of the Langrage's interpolation and generates a session shared key for communication. The size of the generated key is 128 bits and 1024 bits during the authentication process of sharing information. The proposed algorithm's performance is evaluated through a simulation modeling environment. Different standard data bench for performance analysis is also used. The proposed technique is evaluated in two scenarios; Line of Sight (LoS) and Non-Line of Sight (NLoS). The proposed algorithm is contrasted with key generation techniques based on Lagrange and Skyglow (SKG).As compare to Skyglow and Lagrange's algorithms, the proposed algorithm achieves a 3-5% improvement in overall efficiency for key generation validation.

Research paper thumbnail of Sensing Techniques in Cognitive Radio Networks: An Appraisal

Research paper thumbnail of Secrecy Performance Analysis in Different Network Scenerios

In this paper, we analyze the secrecy rate of a single hop wireless network employing Power Split... more In this paper, we analyze the secrecy rate of a single hop wireless network employing Power Splitting Relaying (PSR) energy harvesting scheme using Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative schemes in different channel conditions, namely, AWGN channel, Rayleigh channel and Rician channel. A power beacon is also used to provide power to source and relay. We have analysed that AF performs better than DF in all the three cases.

Research paper thumbnail of AES 32: An FPGA implementation of Lightweight-AES for IoT Devices

International journal of computing and digital system/International Journal of Computing and Digital Systems, Aug 10, 2024

Research paper thumbnail of Physical Key Generation Using Modified Discrete Wavelet Transforms For The Internet of Things

International Journal of Computing and Digital Systems, Jan 14, 2024

Research paper thumbnail of Reinforcement learning-based secure joint relay and jammer selection in dual-hop wireless networks

The Journal of Supercomputing, Aug 17, 2023

Research paper thumbnail of A compact and efficient AES-32GF for encryption in small IoT devices

Research paper thumbnail of A highly efficient FPGA implementation of AES for high throughput IoT applications

Journal of Discrete Mathematical Sciences and Cryptography, Oct 3, 2022

Research paper thumbnail of Response Time Analysis of Secure IEEE 802.11n Wireless LAN in a Class of Network Scenarios

International Conference on Advanced Computing, Feb 21, 2015

In this paper, we investigate the security performance of IEEE 802.11n WLAN standard using an exp... more In this paper, we investigate the security performance of IEEE 802.11n WLAN standard using an experimental test bed in roaming and non-roaming, congested and non-congested network scenarios with different packet lengths. Experimental results are obtained in terms of response time (RT) for a layered security model covering nine security protocols. Experimental results show that different security layers have varied impact on RT. For IEEE 802.11n version, the response time is the highest for WEP/64/128. It is around 45% and 42% more than that for WPA2/AES and enterprise layer WPA2/AES/TKIP respectively. The important observation is that though WEP/64/128 is the security layer with the least complexity, it causes the maximum RT. The response time in case of uncongested network and congested network is measured. It is found that response time in TCP congested network is almost 3-4% more than that of TCP uncongested network and RT in UDP congested network is 39.58% more than that of UDP uncongested network. TCP response time is more than that of UDP response time. It decreases with increasing packet length. RT is increased by 3-4% in roaming network as compared to non-roaming network. The experimental results presented in this paper can be used as reference to configure WLANs in order to optimally apply the security policies in varied class of wireless networks.

Research paper thumbnail of Physical Layer Security-Based Relay Selection for Wireless Cooperative Networks: A Reinforcement Learning Approach

Research paper thumbnail of Analyzing the security-performance tradeoff in block ciphers

In this paper, we have presented comparative performance analysis of symmetric key algorithms par... more In this paper, we have presented comparative performance analysis of symmetric key algorithms particularly of block ciphers. Performance evaluation of various block ciphers has been carried out in terms of encryption time, avalanche effect, throughput, CPU time, and power consumption. The obtained numerical values show that there is always a tradeoff between security and the network performance. RC6 outperforms the AES for all the parameters except security. We have introduced a new modified version of RC6 referred to as MC-RC6 with enhanced security and performance better than AES.

Research paper thumbnail of Physical Layer Security with Energy Harvesting Techniques: A Study

Lecture notes in networks and systems, Aug 31, 2018

In wireless communication, the message signal transmitted by a source is received by all the node... more In wireless communication, the message signal transmitted by a source is received by all the nodes present in the range of the transmitter; thus, reliable and secure links are desired. Moreover, a battery of the relay nodes present in a wireless network needs to be recharged on regular basis. The combination of physical layer security and energy harvesting offers reliable and secure transmission of information plus prevents draining out the battery of relays that helps in cooperative communication. Therefore, it has become a hotspot area for research work. In this paper, we present a study on research progresses in the area of physical layer security with energy harvesting techniques.

Research paper thumbnail of A Compact and Efficient Fpga Implementation of Aes for Iot Devices

Research paper thumbnail of Photonic Crystal Fiber Based Refractive Index Sensor for Cholesterol Sensing in Far Infrared Region

Research paper thumbnail of Decagonal solid core PCF based refractive index sensor for blood cells detection in terahertz regime

Optical and Quantum Electronics, Mar 16, 2021

The fast and accurate detection of the blood components is very necessary before initiating the t... more The fast and accurate detection of the blood components is very necessary before initiating the treatment of patients. In this article, a decagonal Solid Core Photonic Crystal Fiber (SC-PCF) sensor with very high sensitivity and low confinement loss for efficiently detecting the blood cells is proposed. The solid core with air hole ring gives an extra edge for sensing the biomedical analytes due to the easy infiltration of liquid in the holes of the core. The material used in the background of the PCF is TOPAS. A Perfectly Matched Layer (PML) is used as boundary condition in outer layer of cladding. The Full-Vectorial Finite Element Method (FV-FEM) is used for solving the Maxwell equation and numerical analysis of the model in the THz regime. In results, the highest sensitivity in the terahertz spectrum for glucose, plasma, WBC and RBC are 84.55%, 85.09%, 85.62% and 87.68% respectively. Specifically, more than 85.09% sensitivity for all the blood components makes this sensor very useful for rapid blood sensing. This paper also analyzes the low confinement loss (CL), high effective mode area, low birefringence and beat length at operating frequency in the terahertz spectrum (1THz–4THz) for all the blood components.

Research paper thumbnail of Intelligent Physical Layer Secure Relay Selection for Wireless Cooperative Networks with Multiple Eavesdroppers

Wireless Personal Communications, Apr 13, 2021

The modern and emerging wireless communication technologies are benefiting from relaying techniqu... more The modern and emerging wireless communication technologies are benefiting from relaying techniques, which is already adopted in long term evolution (LTE) Release 10. The relay technology has great potential to improve the communication distance and system capabilities. However, due to the use of short-range frequencies for communication and increasing user density, relay technology requires the integration of machine learning and physical layer security (PLS) to attain its full potential. Therefore, this paper presents the machine learning (ML) algorithms for relay selection (RS) to improve the physical layer security of a dual-hop non-regenerative wireless cooperative network. The secure RS is converted into a prediction and decision-making problem. To the best of our knowledge, this is the first attempt to study the secured RS as a prediction and decision-making problem. We propose two reinforcement-learning techniques, namely the physical layer secured Q-learning algorithm for RS (PQL-RS) and the modified physical layer secured Q-learning algorithm for RS (MPQL-RS) for different scenarios. Markov decision process (MDP) is used with the introduced algorithms to select a single relay from a group of relays and multiple eavesdroppers. RS without requiring the prior data and network model knowledge are the unique advantages of the proposed algorithms. The introduced algorithms are compared to the different RS schemes and simulation results show that the MPQL-RS can deliver the best performance and save the convergence time. Moreover, the secrecy performance of different modulation techniques is also analyzed for the proposed algorithms. It is shown that the secrecy of the system improves by 7% on average for every double in modulation order.

Research paper thumbnail of Refractive index sensor for sensing high refractive index bioliquids at the THz frequency

Journal of The Optical Society of America B-optical Physics, Oct 22, 2021

In this paper, a highly sensitive and low loss refractive index (RI) biosensor for high RI bio-an... more In this paper, a highly sensitive and low loss refractive index (RI) biosensor for high RI bio-analytes detection, such as for cholesterol, nicotine, and bacillus bacteria, is proposed. A novel, to the best of our knowledge, decagonal structure with porous core photonic crystal fiber (PC-PCF) is introduced. The porous core consists of a rectangular sensing hole. The analytes to be sensed are considered in liquid form and infiltrated into the sensing holes, which makes the sensing process simpler and more straightforward. Cladding of the PC-PCF consists of multilayer circular air holes arranged in a decagonal pattern. For durability and stability of the sensor, TOPAS is used as the fiber material. A perfectly matched layer is used for boundary conditions. The correlation among optical power, material, and structural properties is analyzed by the finite element method. The sensing performance of the designed sensor is observed at THz frequency (1.4–3.8 THz). The results under high RI of the analytes (1.52–1.55) are as follows: maximum sensitivity of 98.31% for x polarization and 98.26% for y polarization, very low confinement loss of 1.5 × 10 − 14 d B / m , narrow effective mode area of 1.92 × 10 − 7 m 2 , minimum effective material loss of 0.000164 c m − 1 , and very low waveguide dispersion of 0.002 ± 0.05 ps/THz/cm. In addition, the effect of variation of structural parameters on sensor performance is also analyzed. The proposed PC-PCF-based biosensor can be very useful for sensing higher RI biochemical analytes.

Research paper thumbnail of Lightweight Cryptography: A Solution to Secure IoT

Wireless Personal Communications, Jan 25, 2020

Research paper thumbnail of Design and Implementation of RS(450, 406) Decoder

International Journal of Embedded and Real-time Communication Systems, 2021

Research paper thumbnail of Surface plasmon resonance sensor based on MXene coated PCF for detecting the cancer cells with machine learning approach

Microelectronic Engineering, 2023

Research paper thumbnail of Efficient Secret Key Generation Using Langrage’s Interpolation and Discrete Wavelet Transform Function for Internet of Things

International Journal of Computing and Digital Systems, Apr 16, 2023

Data security during information flow has been a difficult challenge in Internet of Things (IoT).... more Data security during information flow has been a difficult challenge in Internet of Things (IoT). To improve security status various conventional cryptographic methods such as public, private, and hybrid key generation had been utilized by various researchers. But these methods are associated with a lack of secure communication between two or more devices. In view of this, a lot of effort is being put into the physical layer of security. In this concept signal-based encryption and key generation are used as the major components in the security of data. In this research, we present a physical layer security technique based on wavelet transforms and Langrage's interpolation. The wavelet based function precedes the sampling of Received Signal Strength (RSS) and convolution of the Langrage's interpolation and generates a session shared key for communication. The size of the generated key is 128 bits and 1024 bits during the authentication process of sharing information. The proposed algorithm's performance is evaluated through a simulation modeling environment. Different standard data bench for performance analysis is also used. The proposed technique is evaluated in two scenarios; Line of Sight (LoS) and Non-Line of Sight (NLoS). The proposed algorithm is contrasted with key generation techniques based on Lagrange and Skyglow (SKG).As compare to Skyglow and Lagrange's algorithms, the proposed algorithm achieves a 3-5% improvement in overall efficiency for key generation validation.

Research paper thumbnail of Sensing Techniques in Cognitive Radio Networks: An Appraisal

Research paper thumbnail of Secrecy Performance Analysis in Different Network Scenerios

In this paper, we analyze the secrecy rate of a single hop wireless network employing Power Split... more In this paper, we analyze the secrecy rate of a single hop wireless network employing Power Splitting Relaying (PSR) energy harvesting scheme using Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative schemes in different channel conditions, namely, AWGN channel, Rayleigh channel and Rician channel. A power beacon is also used to provide power to source and relay. We have analysed that AF performs better than DF in all the three cases.