Dr. Adarsh Kumar | University Of Petroleum And Energy Studies (original) (raw)
Papers by Dr. Adarsh Kumar
Artificial Intelligence and Machine Learning for COVID-19, 2021
COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner T... more COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the use of existing infrastructure, technologies such as artificial intelligence, neural network, blockchain technology, cloud computing, drone-based monitoring, etc have given the important observations and awareness to many It is observed that with the combined efforts of technology and healthcare system, recognition of the outbreak is much faster compared to earlier infections However, many are working continuously to collect and analyze the available COVID-19-related data and introspect the future The whole of this work is performed to maximize the use of technology and reduce the risk of a continuous outbreak This work has discussed the recent work done over the use of technologies in handling the COVID-19 scenario Here, a comparative analysis of various parameters in each technological aspect is discussed to have an understanding of the preferred approaches in different places Further, brief surveys are conducted in each technological aspect for a better understanding of technological advantage in handling pandemic © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG
Future Generation Computer Systems, 2021
Computer Applications in Engineering Education, 2020
Advances in Intelligent Systems and Computing, 2020
Sensors, 2020
In healthcare, interoperability is widely adopted in the case of cross-departmental or specializa... more In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data...
The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach... more The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers whereas multi-stage detection detect outliers at MAC, routing and application layer. A novel trust management mechanism is proposed for trust based outlier detection followed by internal and external indices for second stage filtering and outlier detection. Thereafter, performance of individual and group nodes is measured for outlier detection and subsequent processing. Simulation results shows cluster stability with different number of clusters. Maximum stability for 0 to 500 nodes (small scale network) is observed with 25 clusters, 500 to 3000 nodes (medium scale network) is observed with 39 clusters and 3000 to 5000 nodes (large scale network) is observed with 52 clusters. The proposed approach shows cluster stability of 61% (approax.).
In recent years, it is observed that various authentication schemes have been proposed for both r... more In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.
Advances in Intelligent Systems and Computing, 2019
With the advent of new technologies, many computational devices with sensing and networking power... more With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.
2014 International Conference on Parallel, Distributed and Grid Computing, 2014
A secure interconnection of objects through RFID technology extends the range of information avai... more A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
2014 International Conference on Parallel, Distributed and Grid Computing, 2014
Things are integrated for increasing the availability of information. MIoT is the connectivity of... more Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.
Communications in Computer and Information Science, 2012
The tight computing constraints of low capacity mobile devices require lightweight cryptographic ... more The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption, lightweight key exchange and lightweight authentication using hashing mechanism are conducted in this work. The parameters taken for software comparison are: high throughput, minimum delay and for hardware are: minimum gate equivalents (GE) and minimum power consumption. Cryptographic primitives are combined using two scenarios: (i) authentication to plaintext and confidentiality to message_to_send and (ii) confidentiality to plaintext and authentication to message_to_send. Two combinations are having similar results comparisons but authentication to plaintext and confidentiality to message_to_send is more meaningful. Furthermore, these two combinations provide implementation of cryptographic primitives with 30% of total GE at 52 μW. Thus, these are two complete cryptographic solutions with ultra-lightweight features which are suitable for extremely resource constraint environments such as mobile sensor devices.
2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012
This paper examines the lightweight cryptography primitives and proposes a novel integration mech... more This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and hardware parameters; area consumption in terms of gate equivalents (GE); are taken into consideration. An integration proposal of these cryptography primitives has been proposed and it has been observed that these primitives can be clubbed with hardware cost of 36.5% of the total GE with maximum through and minimum delay using Destination Sequenced Distance Vector (DSDV) protocol.
Communications in Computer and Information Science, 2012
With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be ... more With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.
2013 Sixth International Conference on Contemporary Computing (IC3), 2013
This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodat... more This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on health score. This accumulation is further lightened using four lightweight strategies: lightweight or ultra lightweight vibration mechanism, lightweight trust computation, lightweight key management and lightweight subgroup formation. In continuation, analysis of trust evaluation against different attacks is also presented. Simulation shows that the proposed system can improve the network performance as well as effectively provide protection against various attacks.
In this work various elliptic curve are compared and evaluated based on their operations i.e. Add... more In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs (Mobile Ad Hoc Networks) and further network performance is analyzed to calculate efficient processing unit in a partially distributed key management environment. To manipulate the
International Journal of Computer Network and Information Security, Feb 28, 2014
Artificial Intelligence and Machine Learning for COVID-19, 2021
COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner T... more COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the use of existing infrastructure, technologies such as artificial intelligence, neural network, blockchain technology, cloud computing, drone-based monitoring, etc have given the important observations and awareness to many It is observed that with the combined efforts of technology and healthcare system, recognition of the outbreak is much faster compared to earlier infections However, many are working continuously to collect and analyze the available COVID-19-related data and introspect the future The whole of this work is performed to maximize the use of technology and reduce the risk of a continuous outbreak This work has discussed the recent work done over the use of technologies in handling the COVID-19 scenario Here, a comparative analysis of various parameters in each technological aspect is discussed to have an understanding of the preferred approaches in different places Further, brief surveys are conducted in each technological aspect for a better understanding of technological advantage in handling pandemic © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG
Future Generation Computer Systems, 2021
Computer Applications in Engineering Education, 2020
Advances in Intelligent Systems and Computing, 2020
Sensors, 2020
In healthcare, interoperability is widely adopted in the case of cross-departmental or specializa... more In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data...
The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach... more The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers whereas multi-stage detection detect outliers at MAC, routing and application layer. A novel trust management mechanism is proposed for trust based outlier detection followed by internal and external indices for second stage filtering and outlier detection. Thereafter, performance of individual and group nodes is measured for outlier detection and subsequent processing. Simulation results shows cluster stability with different number of clusters. Maximum stability for 0 to 500 nodes (small scale network) is observed with 25 clusters, 500 to 3000 nodes (medium scale network) is observed with 39 clusters and 3000 to 5000 nodes (large scale network) is observed with 52 clusters. The proposed approach shows cluster stability of 61% (approax.).
In recent years, it is observed that various authentication schemes have been proposed for both r... more In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.
Advances in Intelligent Systems and Computing, 2019
With the advent of new technologies, many computational devices with sensing and networking power... more With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.
2014 International Conference on Parallel, Distributed and Grid Computing, 2014
A secure interconnection of objects through RFID technology extends the range of information avai... more A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.
2014 International Conference on Parallel, Distributed and Grid Computing, 2014
Things are integrated for increasing the availability of information. MIoT is the connectivity of... more Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.
Communications in Computer and Information Science, 2012
The tight computing constraints of low capacity mobile devices require lightweight cryptographic ... more The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption, lightweight key exchange and lightweight authentication using hashing mechanism are conducted in this work. The parameters taken for software comparison are: high throughput, minimum delay and for hardware are: minimum gate equivalents (GE) and minimum power consumption. Cryptographic primitives are combined using two scenarios: (i) authentication to plaintext and confidentiality to message_to_send and (ii) confidentiality to plaintext and authentication to message_to_send. Two combinations are having similar results comparisons but authentication to plaintext and confidentiality to message_to_send is more meaningful. Furthermore, these two combinations provide implementation of cryptographic primitives with 30% of total GE at 52 μW. Thus, these are two complete cryptographic solutions with ultra-lightweight features which are suitable for extremely resource constraint environments such as mobile sensor devices.
2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012
This paper examines the lightweight cryptography primitives and proposes a novel integration mech... more This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and hardware parameters; area consumption in terms of gate equivalents (GE); are taken into consideration. An integration proposal of these cryptography primitives has been proposed and it has been observed that these primitives can be clubbed with hardware cost of 36.5% of the total GE with maximum through and minimum delay using Destination Sequenced Distance Vector (DSDV) protocol.
Communications in Computer and Information Science, 2012
With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be ... more With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.
2013 Sixth International Conference on Contemporary Computing (IC3), 2013
This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodat... more This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on health score. This accumulation is further lightened using four lightweight strategies: lightweight or ultra lightweight vibration mechanism, lightweight trust computation, lightweight key management and lightweight subgroup formation. In continuation, analysis of trust evaluation against different attacks is also presented. Simulation shows that the proposed system can improve the network performance as well as effectively provide protection against various attacks.
In this work various elliptic curve are compared and evaluated based on their operations i.e. Add... more In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs (Mobile Ad Hoc Networks) and further network performance is analyzed to calculate efficient processing unit in a partially distributed key management environment. To manipulate the
International Journal of Computer Network and Information Security, Feb 28, 2014