Dr. Adarsh Kumar | University Of Petroleum And Energy Studies (original) (raw)

Papers by Dr. Adarsh Kumar

Research paper thumbnail of An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games

Research paper thumbnail of Digital Transformation and Emerging Technologies for COVID-19 Pandemic: Social, Global, and Industry Perspectives

Artificial Intelligence and Machine Learning for COVID-19, 2021

COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner T... more COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the use of existing infrastructure, technologies such as artificial intelligence, neural network, blockchain technology, cloud computing, drone-based monitoring, etc have given the important observations and awareness to many It is observed that with the combined efforts of technology and healthcare system, recognition of the outbreak is much faster compared to earlier infections However, many are working continuously to collect and analyze the available COVID-19-related data and introspect the future The whole of this work is performed to maximize the use of technology and reduce the risk of a continuous outbreak This work has discussed the recent work done over the use of technologies in handling the COVID-19 scenario Here, a comparative analysis of various parameters in each technological aspect is discussed to have an understanding of the preferred approaches in different places Further, brief surveys are conducted in each technological aspect for a better understanding of technological advantage in handling pandemic © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG

Research paper thumbnail of A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic

Future Generation Computer Systems, 2021

Research paper thumbnail of Digital device‐based active learning approach using virtual community classroom during the COVID‐19 pandemic

Computer Applications in Engineering Education, 2020

Research paper thumbnail of A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City

Research paper thumbnail of A Robust NIfTI Image Authentication Framework Based on DST and Multi-scale Otsu Thresholding

Research paper thumbnail of A Decision-Based Multi-layered Outlier Detection System for Resource Constraint MANET

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Lightweight Proof of Game (LPoG): A Proof of Work (PoW)’s Extended Lightweight Consensus Algorithm for Wearable Kidneys

Sensors, 2020

In healthcare, interoperability is widely adopted in the case of cross-departmental or specializa... more In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data...

Research paper thumbnail of An Efficient Outlier Detection Mechanism for RFID-Sensor Integrated MANET

The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach... more The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers whereas multi-stage detection detect outliers at MAC, routing and application layer. A novel trust management mechanism is proposed for trust based outlier detection followed by internal and external indices for second stage filtering and outlier detection. Thereafter, performance of individual and group nodes is measured for outlier detection and subsequent processing. Simulation results shows cluster stability with different number of clusters. Maximum stability for 0 to 500 nodes (small scale network) is observed with 25 clusters, 500 to 3000 nodes (medium scale network) is observed with 39 clusters and 3000 to 5000 nodes (large scale network) is observed with 52 clusters. The proposed approach shows cluster stability of 61% (approax.).

Research paper thumbnail of Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs

In recent years, it is observed that various authentication schemes have been proposed for both r... more In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.

Research paper thumbnail of Security and Trust in IoT Communications: Role and Impact

Advances in Intelligent Systems and Computing, 2019

With the advent of new technologies, many computational devices with sensing and networking power... more With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.

Research paper thumbnail of Modeling and analysis of RFID authentication protocols for supply chain management

2014 International Conference on Parallel, Distributed and Grid Computing, 2014

A secure interconnection of objects through RFID technology extends the range of information avai... more A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.

Research paper thumbnail of Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)

2014 International Conference on Parallel, Distributed and Grid Computing, 2014

Things are integrated for increasing the availability of information. MIoT is the connectivity of... more Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.

Research paper thumbnail of Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2012

The tight computing constraints of low capacity mobile devices require lightweight cryptographic ... more The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption, lightweight key exchange and lightweight authentication using hashing mechanism are conducted in this work. The parameters taken for software comparison are: high throughput, minimum delay and for hardware are: minimum gate equivalents (GE) and minimum power consumption. Cryptographic primitives are combined using two scenarios: (i) authentication to plaintext and confidentiality to message_to_send and (ii) confidentiality to plaintext and authentication to message_to_send. Two combinations are having similar results comparisons but authentication to plaintext and confidentiality to message_to_send is more meaningful. Furthermore, these two combinations provide implementation of cryptographic primitives with 30% of total GE at 52 μW. Thus, these are two complete cryptographic solutions with ultra-lightweight features which are suitable for extremely resource constraint environments such as mobile sensor devices.

Research paper thumbnail of A complete, efficient and lightweight cryptography solution for resource contrainst Mobile Ad-Hoc Networks

2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012

This paper examines the lightweight cryptography primitives and proposes a novel integration mech... more This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and hardware parameters; area consumption in terms of gate equivalents (GE); are taken into consideration. An integration proposal of these cryptography primitives has been proposed and it has been observed that these primitives can be clubbed with hardware cost of 36.5% of the total GE with maximum through and minimum delay using Destination Sequenced Distance Vector (DSDV) protocol.

Research paper thumbnail of Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2012

With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be ... more With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.

Research paper thumbnail of Novel Trusted Hierarchy Construction for RFID Sensor–Based MANETs Using ECCs

Research paper thumbnail of Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs)

2013 Sixth International Conference on Contemporary Computing (IC3), 2013

This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodat... more This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on health score. This accumulation is further lightened using four lightweight strategies: lightweight or ultra lightweight vibration mechanism, lightweight trust computation, lightweight key management and lightweight subgroup formation. In continuation, analysis of trust evaluation against different attacks is also presented. Simulation shows that the proposed system can improve the network performance as well as effectively provide protection against various attacks.

Research paper thumbnail of Performance analysis of MANET using elliptic curve cryptosystem

In this work various elliptic curve are compared and evaluated based on their operations i.e. Add... more In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs (Mobile Ad Hoc Networks) and further network performance is analyzed to calculate efficient processing unit in a partially distributed key management environment. To manipulate the

Research paper thumbnail of Survey on Lightweight Primitives and Protocols for Rfid in Wireless Sensor Networks

International Journal of Computer Network and Information Security, Feb 28, 2014

Research paper thumbnail of An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games

Research paper thumbnail of Digital Transformation and Emerging Technologies for COVID-19 Pandemic: Social, Global, and Industry Perspectives

Artificial Intelligence and Machine Learning for COVID-19, 2021

COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner T... more COVID-19 disease pandemic is affecting the lives of millions of people in one or another manner To handle the COVID-19 pandemic situation, technological aspects play a vital role in parallel to medical and healthcare facilities With the use of existing infrastructure, technologies such as artificial intelligence, neural network, blockchain technology, cloud computing, drone-based monitoring, etc have given the important observations and awareness to many It is observed that with the combined efforts of technology and healthcare system, recognition of the outbreak is much faster compared to earlier infections However, many are working continuously to collect and analyze the available COVID-19-related data and introspect the future The whole of this work is performed to maximize the use of technology and reduce the risk of a continuous outbreak This work has discussed the recent work done over the use of technologies in handling the COVID-19 scenario Here, a comparative analysis of various parameters in each technological aspect is discussed to have an understanding of the preferred approaches in different places Further, brief surveys are conducted in each technological aspect for a better understanding of technological advantage in handling pandemic © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG

Research paper thumbnail of A drone-based networked system and methods for combating coronavirus disease (COVID-19) pandemic

Future Generation Computer Systems, 2021

Research paper thumbnail of Digital device‐based active learning approach using virtual community classroom during the COVID‐19 pandemic

Computer Applications in Engineering Education, 2020

Research paper thumbnail of A Novel Simulated-Annealing Based Electric Bus System Design, Simulation, and Analysis for Dehradun Smart City

Research paper thumbnail of A Robust NIfTI Image Authentication Framework Based on DST and Multi-scale Otsu Thresholding

Research paper thumbnail of A Decision-Based Multi-layered Outlier Detection System for Resource Constraint MANET

Advances in Intelligent Systems and Computing, 2020

Research paper thumbnail of Lightweight Proof of Game (LPoG): A Proof of Work (PoW)’s Extended Lightweight Consensus Algorithm for Wearable Kidneys

Sensors, 2020

In healthcare, interoperability is widely adopted in the case of cross-departmental or specializa... more In healthcare, interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data...

Research paper thumbnail of An Efficient Outlier Detection Mechanism for RFID-Sensor Integrated MANET

The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach... more The proposed outlier detection scheme is multi-filtered, outlier stage outlier detection approach for resource constrained devices and networks. Multi-filtered consists of detection using trust, indices and performance based outliers whereas multi-stage detection detect outliers at MAC, routing and application layer. A novel trust management mechanism is proposed for trust based outlier detection followed by internal and external indices for second stage filtering and outlier detection. Thereafter, performance of individual and group nodes is measured for outlier detection and subsequent processing. Simulation results shows cluster stability with different number of clusters. Maximum stability for 0 to 500 nodes (small scale network) is observed with 25 clusters, 500 to 3000 nodes (medium scale network) is observed with 39 clusters and 3000 to 5000 nodes (large scale network) is observed with 52 clusters. The proposed approach shows cluster stability of 61% (approax.).

Research paper thumbnail of Comparative Analysis of Elliptic Curve Cryptography Based Lightweight Authentication Protocols for RFID-Sensor Integrated MANETs

In recent years, it is observed that various authentication schemes have been proposed for both r... more In recent years, it is observed that various authentication schemes have been proposed for both resourceful and resource constraint devices. Most of these schemes are not suitable for practical applications because of known security weaknesses. In this work, elliptic curve cryptography (ECC) based authentication mechanisms are proposed for comparative analysis. Proposed authentication mechanisms are formally validated through simulation using automated lightweight cryptographic primitives for resource constrained devices. It is observed that proposed protocol 5 is giving best performance in terms of minimum jitter and processing delay, and maximum throughput for 75, 150 and 1000 nodes networks. A minimum of 4.3% (50 nodes network) and maximum of 61.9% (1000 nodes network) improvement is observed for protocol 5 as compared to other protocol.

Research paper thumbnail of Security and Trust in IoT Communications: Role and Impact

Advances in Intelligent Systems and Computing, 2019

With the advent of new technologies, many computational devices with sensing and networking power... more With the advent of new technologies, many computational devices with sensing and networking power are connected with each other. These devices sense the data from the environment, perform some computation on it, and then either store or transmit the data to some other device having similar capabilities. With this process of communication, there arise several security and trust concerns, which are very critical to handle. Such security and trust concerns can be potential threats to the IoT ecosystem and they need to be handled with the latest architecture, framework, and technology. This paper attempts to highlight some major threats of security and trust in IoT and how existing architecture deals with them.

Research paper thumbnail of Modeling and analysis of RFID authentication protocols for supply chain management

2014 International Conference on Parallel, Distributed and Grid Computing, 2014

A secure interconnection of objects through RFID technology extends the range of information avai... more A secure interconnection of objects through RFID technology extends the range of information availability. Security in this integration is achievable through proper identification, authentication, grouping / yoking, distance bounding, and tag and ownership transfer protocols. This work analyzes the computational and communicational cost of group and authentication protocols. Further, these protocols are modeled and analyzed using alloy model. Results show that a network of 255 nodes can be constructed with delays of 9.6 msec and 7.6 msec using peer to peer and centralized connectivity respectively.

Research paper thumbnail of Simulation and analysis of authentication protocols for mobile Internet of Things (MIoT)

2014 International Conference on Parallel, Distributed and Grid Computing, 2014

Things are integrated for increasing the availability of information. MIoT is the connectivity of... more Things are integrated for increasing the availability of information. MIoT is the connectivity of mobile devices to extend the information. Connectivity of mobile devices helps in managing the various social activities. Security is a major concern while integrating the heterogeneous devices in these social networks. Things embedded with radio frequency based identifications are having scarcity of resources thus require lightweight cryptography aspects. This work proposes a single bar circular topology based authentication protocol for MIoT. This protocol helps in authenticating the mobile devices for constructing secure network. The proposed protocol is modeled using Alloy model. Delay analysis shows that construction of secure network is possible with maximum delay of 0.91 msec. Node can enter or leave the network with minimum of 0.13 and maximum of 0.20 msec. Further, Zone Routing Protocol (ZRP) is considered to be the best protocol for constructing a secure network.

Research paper thumbnail of Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2012

The tight computing constraints of low capacity mobile devices require lightweight cryptographic ... more The tight computing constraints of low capacity mobile devices require lightweight cryptographic implementations.A software and hardware based performance analysis of cryptographic primitives: lightweight encryption/decryption, lightweight key exchange and lightweight authentication using hashing mechanism are conducted in this work. The parameters taken for software comparison are: high throughput, minimum delay and for hardware are: minimum gate equivalents (GE) and minimum power consumption. Cryptographic primitives are combined using two scenarios: (i) authentication to plaintext and confidentiality to message_to_send and (ii) confidentiality to plaintext and authentication to message_to_send. Two combinations are having similar results comparisons but authentication to plaintext and confidentiality to message_to_send is more meaningful. Furthermore, these two combinations provide implementation of cryptographic primitives with 30% of total GE at 52 μW. Thus, these are two complete cryptographic solutions with ultra-lightweight features which are suitable for extremely resource constraint environments such as mobile sensor devices.

Research paper thumbnail of A complete, efficient and lightweight cryptography solution for resource contrainst Mobile Ad-Hoc Networks

2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012

This paper examines the lightweight cryptography primitives and proposes a novel integration mech... more This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and hardware parameters; area consumption in terms of gate equivalents (GE); are taken into consideration. An integration proposal of these cryptography primitives has been proposed and it has been observed that these primitives can be clubbed with hardware cost of 36.5% of the total GE with maximum through and minimum delay using Destination Sequenced Distance Vector (DSDV) protocol.

Research paper thumbnail of Efficient Hierarchical Threshold Symmetric Group Key Management Protocol for Mobile Ad Hoc Networks

Communications in Computer and Information Science, 2012

With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be ... more With rapid growth of Ad Hoc Networks consisting of low power computing devices, security will be an important factor for their full implementation. Because of scarcity of resources in terms of computing capability and energy efficiency, designing of computationally efficient group key management protocols with dynamic topology is a major concern. Teo and Tan [11] proposed an energy-efficient generalized circular hierarchical group model, but this approach suffers from: (i) exponential increase of key messages due to dynamic topology and (ii) energy loss because the vicinity of nodes in a subgroup is high. This work is an extension of Teo & Tan’s circular hierarchical model for fixed number of group members. The proposed modification overcomes these two weaknesses of Teo & Tan’s protocol. The proposed modifications make this protocol secure against replay, masquerading, spoofing, chosen ciphertext and impersonation attacks because of proper authentication and digital signatures. The comparative numerical and simulation analysis of proposed approach has been made with Teo & Tan, Wen-Lin-Hwang’s (WLH) and along with Tseng’s group key agreement approach. The analysis shows that proposed approach is well suited for low computational mobile devices with minimum delay. Through WLH protocol shows maximum throughput and minimum delay however it lacks in terms of security aspects.

Research paper thumbnail of Novel Trusted Hierarchy Construction for RFID Sensor–Based MANETs Using ECCs

Research paper thumbnail of Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs)

2013 Sixth International Conference on Contemporary Computing (IC3), 2013

This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodat... more This work presents a new lightweight trust propagation scheme in an ad hoc network. To accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated. This vibration mechanism help to accumulate trust based on health score. This accumulation is further lightened using four lightweight strategies: lightweight or ultra lightweight vibration mechanism, lightweight trust computation, lightweight key management and lightweight subgroup formation. In continuation, analysis of trust evaluation against different attacks is also presented. Simulation shows that the proposed system can improve the network performance as well as effectively provide protection against various attacks.

Research paper thumbnail of Performance analysis of MANET using elliptic curve cryptosystem

In this work various elliptic curve are compared and evaluated based on their operations i.e. Add... more In this work various elliptic curve are compared and evaluated based on their operations i.e. Addition and Doubling. Out of these elliptic curves classical weierstrass and jacobian elliptic curves are selected to implement in MANETs (Mobile Ad Hoc Networks) and further network performance is analyzed to calculate efficient processing unit in a partially distributed key management environment. To manipulate the

Research paper thumbnail of Survey on Lightweight Primitives and Protocols for Rfid in Wireless Sensor Networks

International Journal of Computer Network and Information Security, Feb 28, 2014