scispace - formally typeset
Search or ask a question
Author

Deebak Bakkiam David

Bio: Deebak Bakkiam David is an academic researcher from Middle East Technical University Northern Cyprus Campus. The author has contributed to research in topics: The Internet & Authentication. The author has an hindex of 1, co-authored 1 publications receiving 54 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to node-capture attacks, it resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation.
Abstract: Recently, the Internet of Things (IoT) has emerged as a significant advancement for Internet and mobile networks with various public safety network applications. An important use of IoT-based solutions is its application in post-disaster management, where the traditional telecommunication systems may be either completely or partially damaged. Since enabling technologies have restricted authentication privileges for mobile users, in this paper, a strategy of mobile-sink is introduced for the extension of user authentication over cloud-based environments. A seamless secure authentication and key agreement (S-SAKA) approach using bilinear pairing and elliptic-curve cryptosystems is presented. It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to node-capture attacks, it also resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation. Moreover, the proposed approach can provide a seamless connectivity through authentication over wireless sensor networks to alleviate the computation and communication cost constraints in the system. In addition, using Burrows–Abadi–Needham logic, it is demonstrated that the proposed S-SAKA framework offers proper mutual authentication and session key agreement between the mobile-sink and the base station.

66 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques and provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems.
Abstract: Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of IoT has become a critical concern. The danger exposed by infested Internet-connected Things not only affects the security of IoT but also threatens the complete Internet eco-system which can possibly exploit the vulnerable Things (smart devices) deployed as botnets. Mirai malware compromised the video surveillance devices and paralyzed Internet via distributed denial of service attacks. In the recent past, security attack vectors have evolved bothways, in terms of complexity and diversity. Hence, to identify and prevent or detect novel attacks, it is important to analyze techniques in IoT context. This survey classifies the IoT security threats and challenges for IoT networks by evaluating existing defense techniques. Our main focus is on network intrusion detection systems (NIDSs); hence, this paper reviews existing NIDS implementation tools and datasets as well as free and open-source network sniffing software. Then, it surveys, analyzes, and compares state-of-the-art NIDS proposals in the IoT context in terms of architecture, detection methodologies, validation strategies, treated threats, and algorithm deployments. The review deals with both traditional and machine learning (ML) NIDS techniques and discusses future directions. In this survey, our focus is on IoT NIDS deployed via ML since learning algorithms have a good success rate in security and privacy. The survey provides a comprehensive review of NIDSs deploying different aspects of learning techniques for IoT, unlike other top surveys targeting the traditional systems. We believe that, this paper will be useful for academia and industry research, first, to identify IoT threats and challenges, second, to implement their own NIDS and finally to propose new smart techniques in IoT context considering IoT limitations. Moreover, the survey will enable security individuals differentiate IoT NIDS from traditional ones.

494 citations

Journal ArticleDOI
TL;DR: The privacy issues for content dissemination in the current VSN architecture are analyzed and classified according to their features, and various privacy-preserving content dissemination schemes, attempting to resist distinct attacks, are discussed.
Abstract: Vehicular social networks (VSNs), viewed as the integration of traditional vehicular networks and social networks, are promising communication platforms based on the development of intelligent vehicles and deployment of intelligent transportation systems. Passengers can obtain information by searching over Internet or querying vehicles in proximity through intra-vehicle equipment. Hence, the performance of content dissemination in VSNs heavily relies on inter-vehicle communication and human behaviors. However, privacy preservation always conflicts with the usability of individual information in VSNs. The highly dynamic topology and increasing kinds of participants lead to potential threats for communication security and individual privacy. Therefore, the privacy-preserving solutions for content dissemination in VSNs have become extremely challenging, and numerous researches have been conducted recently. Compared with related surveys, this article provides the unique characteristics of privacy-preserving requirements and solutions for content dissemination in VSNs. It focuses on: 1) a comprehensive overview of content dissemination in VSNs; 2) the privacy issues and potential attacks related to content dissemination; and 3) the corresponding solutions based on privacy consideration. First, the characteristics of VSNs, content dissemination and its solutions in VSNs are revealed. Second, the privacy issues for content dissemination in the current VSN architecture are analyzed and classified according to their features. Various privacy-preserving content dissemination schemes, attempting to resist distinct attacks, are also discussed. Finally, the research challenges and open issues are summarized.

135 citations

Journal ArticleDOI
TL;DR: A Secure and Anonymous Biometric Based User Authentication Scheme (SAB-UAS) is proposed to ensure secure communication in healthcare applications and it is proved that an adversary cannot impersonate as a legitimate user to illegally access or revoke the smart handheld card.
Abstract: Emerging technologies rapidly change the essential qualities of modern societies in terms of smart environments. To utilize the surrounding environment data, tiny sensing devices and smart gateways are highly involved. It has been used to collect and analyze the real-time data remotely in all Industrial Internet of Things (IIoT). Since the IIoT environment gathers and transmits the data over insecure public networks, a promising solution known as authentication and key agreement (AKA) is preferred to prevent illegal access. In the medical industry, the Internet of Medical Things (IoM) has become an expert application system. It is used to gather and analyze the physiological parameters of patients. To practically examine the medical sensor-nodes, which are imbedded in the patient’s body. It would in turn sense the patient medical information using smart portable devices. Since the patient information is so sensitive to reveal other than a medical professional, the security protection and privacy of medical data are becoming a challenging issue of the IoM. Thus, an anonymity-based user authentication protocol is preferred to resolve the privacy preservation issues in the IoM. In this paper, a Secure and Anonymous Biometric Based User Authentication Scheme (SAB-UAS) is proposed to ensure secure communication in healthcare applications. This paper also proves that an adversary cannot impersonate as a legitimate user to illegally access or revoke the smart handheld card. A formal analysis based on the random-oracle model and resource analysis is provided to show security and resource efficiencies in medical application systems. In addition, the proposed scheme takes a part of the performance analysis to show that it has high-security features to build smart healthcare application systems in the IoM. To this end, experimental analysis has been conducted for the analysis of network parameters using NS3 simulator. The collected results have shown superiority in terms of the packet delivery ratio, end-to-end delay, throughput rates, and routing overhead for the proposed SAB-UAS in comparison to other existing protocols.

133 citations

Journal ArticleDOI
TL;DR: A lightweight mutual authentication scheme based on Physical Unclonable Functions for UAV-GS authentication is presented and is resilient against many security attacks such as masquerade, replay, node tampering, and cloning attacks, etc.
Abstract: Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the emergence of application areas such as the Internet of Drones (IoD). They are finding wide applicability in areas ranging from package delivery systems to automated military applications. Nevertheless, communication security between a UAV and its ground station (GS) is critical for completing its task without leaking sensitive information either to the adversaries or to unauthenticated users. UAVs are especially vulnerable to physical capture and node tampering attacks. Further, since UAV devices are generally equipped with small batteries and limited memory storage, lightweight security techniques are best suited for them. Addressing these issues, a lightweight mutual authentication scheme based on Physical Unclonable Functions (PUFs) for UAV-GS authentication is presented in this paper. The UAV-GS authentication scheme is extended further to support UAV-UAV authentication. We present a formal security analysis as well as old-fashioned cryptanalysis and show that our protocol provides various security features such as mutual authentication, user anonymity, etc, and is resilient against many security attacks such as masquerade, replay, node tampering, and cloning attacks, etc. We also compare the performance of our protocol with state-of-the-art authentication protocols for UAVs, based on computation, communication, and memory storage cost.

113 citations

Journal ArticleDOI
TL;DR: A new authentication scheme related to the cloud-assisted CPS in two directions, which provides high security as compared to other related works and is shown to be efficient in terms of communication and computation costs asCompared to those for other related existing schemes.

98 citations