scispace - formally typeset
N

Naren

Researcher at Birla Institute of Technology and Science

Publications -  8
Citations -  444

Naren is an academic researcher from Birla Institute of Technology and Science. The author has contributed to research in topics: The Internet & Authentication. The author has an hindex of 6, co-authored 8 publications receiving 98 citations.

Papers
More filters
Journal ArticleDOI

A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques

TL;DR: The different types of UAVs, the regulatory laws for UAV activities, their use cases, recreational, and military UAV incidents, and their prevention using anti-UAV techniques are discussed.
Journal ArticleDOI

SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication

TL;DR: A lightweight mutual authentication scheme based on Physical Unclonable Functions for UAV-GS authentication is presented and is resilient against many security attacks such as masquerade, replay, node tampering, and cloning attacks, etc.
Journal ArticleDOI

HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks

TL;DR: A two-way two-stage authentication protocol using hardware security primitives called Physical Unclonable Functions (PUFs) is presented and compared with relevant protocols in the healthcare IoT scenario in terms of computation time and security to show its suitability and robustness.
Journal ArticleDOI

PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks

TL;DR: A two-stage lightweight mutual authentication protocol well suited to SDN-backed multi UAV networks deployed in surveillance areas and compared with other state-of-the-art works in terms of computation latency and resilience against known security attacks is presented.
Journal ArticleDOI

Security issues in implantable medical devices: Fact or fiction?

TL;DR: This paper investigates the practical security risks involved with the use of IMDs and the motivations for an attacker to hack these devices and outlines some practical security measures that can further enhance the security and privacy for patients using IMDs.