scispace - formally typeset
Search or ask a question

Showing papers by "Rituparna Chaki published in 2016"


Journal ArticleDOI
TL;DR: This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack, and one way hash chain is used to reduce the energy drainage.
Abstract: Abstract The ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.

11 citations


Proceedings ArticleDOI
23 Jun 2016
TL;DR: Many of the existing biometric techniques like Iris or finger-print recognition are effective only when the person to be authenticated or verified is physically accessible and fall short of the requirements for IoT applications like an integrated remote-healthcare.
Abstract: Authenticating users in a continual manner has become extremely critical for a wide range of applications in the domain of pervasive computing and Internet of Things (IoT). In these days, it’s also an accepted fact that user authentication based on biometric features is often more efficient than the traditional means of password-based authentication. However, many of the existing biometric techniques like Iris or finger-print recognition are effective only when the person to be authenticated or verified is physically accessible. Thus such technologies are good for applications like Passport Control and fall short of the requirements for IoT applications like an integrated remote-healthcare where different types of users like Doctors, patients, hospitals, insurance companies, other care-givers and even authorized civic-body administrators are to be continually authenticated from remote locations. It is important to ensure that the desired services are accessed only by a legitimate user and no one else. In this paper, we address these issues by proposing a modular solution using key-stroke based biometrics.

8 citations



Journal ArticleDOI
TL;DR: A multi-level energy-aware routing framework has been proposed here and the simulation result shows that the proposed algorithm increases network lifetime more than the other existing routing protocols.
Abstract: The use of sensors to sense a multitude of events forms the basis of the all-pervasive computing concepts of today. The challenge lies in transferring the information sensed over the wireless links with limited bandwidth. The sensors are normally deployed close to each other and hence end up sensing the same event and sending the information. This gives rise to considerable redundancy and energy wastage of individual nodes. Clusterisation is the common technique for reducing the load of the nodes in order to increase the overall lifetime of the network. The selection of cluster head is very important in this regard. This paper uses a multitude of different parameters such as residual energy, distance from sink node, number of neighbour nodes etc., for selecting a cluster head. A multi-level energy-aware routing framework has been proposed here. The simulation result shows that the proposed algorithm increases network lifetime more than the other existing routing protocols.

2 citations


Proceedings ArticleDOI
01 Jul 2016
TL;DR: A context and trust aware workflow oriented access framework that is designed by mapping proposed access model to workflow instances at run-time and validated by workflow net model, where workflow instance can be successfully executed without any interruption and can satisfy soundness property while incorporating proposed access control approach.
Abstract: Service oriented computing (SoC) changes the way of conducting business as these services are often available on a network. As traditional access control approach may not work in the changed environment, protecting business resource from misuse is a big challenge. Again, static allocation of access right to users will not be an efficient solution as SoC environment changes with time. This paper focuses on design of dynamic access control approach for business process. Here, we propose a context and trust aware workflow oriented access framework. Proposed approach focuses on inter-component relationship where phases are executed either in online or offline mode to avoid performance bottleneck. The concept of static binding in role based access model is extended to support dynamic access control by including context awareness and trust relationship between owner and user. Trust is either directly or indirectly dependent on service level agreement (SLA) compliance, quality of service, reputation and provenance (historical data). In this paper, the framework is designed by mapping proposed access model to workflow instances at run-time. It is validated by workflow net model, where workflow instance can be successfully executed without any interruption and can satisfy soundness property while incorporating proposed access control approach.

2 citations


Book ChapterDOI
01 Jan 2016
TL;DR: A secured remote service (SecReS) framework is proposed here to ensure availability of health-care resource to valid end users and is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity.
Abstract: Health-care service in remote environment opens for several security challenges. These may affect confidentiality, integrity, and availability of resource. Securing service is a big concern for this kind of application. Encoding is required before uploading data to remote web server. Identity management is another primary aspect to validate any service. One-time identity verification during login has no importance, because valid session may be hijacked by impostors. Compared to other techniques, identity management based on human computer interaction is simple and less costly in remote environment. Service verification also needs to be considered to control access rights along with end user verification. A secured remote service (SecReS) framework is proposed here to ensure availability of health-care resource to valid end users. This service is capable to reduce time complexity, bandwidth cost, and to increase accuracy and attack resistance capacity. Theoretical analysis shows its efficiency.

2 citations


Proceedings ArticleDOI
01 Sep 2016
TL;DR: This paper addresses the synchronization aspect for multiple concurrent threads in a Remote Healthcare System under development by using checkpoint-based multi-versioning Software Transactional Memory for application domain to achieve non-blocking process synchronization.
Abstract: This paper addresses the synchronization aspect for multiple concurrent threads in a Remote Healthcare System (RHS) under development. Resources like data files are shared by multiple stakeholders and users including doctors, trained paramedic staff, patient party or even Government agencies collecting statistical and demographic data. In the system under trial, medical kiosks are setup at distant places where patients visit and their complaints are recorded by trained caregivers. Later, doctor accesses such data from the system, makes a diagnosis and suggests prescriptions accordingly. In such a set-up, it is quite often that more than one users access the same shared resource simultaneously. In conventional lock-based process synchronization, such concurrent processes are blocked by the process holding a lock over the files. The major contribution of this paper is to use checkpoint-based multi-versioning Software Transactional Memory for our application domain to achieve non-blocking process synchronization. With help of multi-versioning technique the proposed method is also able to reduce number of expensive remote validations as well as transactional aborts. Experimental verification finds that proposed method yields higher throughput in comparison to clairvoyant type multi-version concurrency control mechanism.

2 citations


Book ChapterDOI
28 Sep 2016
TL;DR: This paper has presented a hierarchical data aggregation based routing algorithm which outperforms other existing approaches for routing in Wireless Sensor Networks.
Abstract: Designing routing protocols to serve real time disaster management, is a challenging task involving optimum energy utilization along with reduced delay in event reporting. In this paper, we have focused on the data aggregation techniques which alleviate the constraints of sensor networks and put forward as an essential paradigm for routing in Wireless Sensor Networks. We have presented a hierarchical data aggregation based routing algorithm. Extensive analysis and simulation shows that proposed algorithm outperforms other existing approaches.

1 citations


Book ChapterDOI
TL;DR: In this article, the authors present a brief description of one of the recently proposed software transaction memory (STM) implementations and address the need of STM implementation, and also describe the implementation technique of the STM in STM Haskell.
Abstract: Software transaction memory (STM) is a promising programming abstract for shared variable concurrency. This paper presents a brief description of one of the recently proposed STM and addresses the need of STM implementation. The paper also describes the implementation technique of STM in STM Haskell. In the STM implementation process, three different approaches have been presented which employ different execution policies. In the evaluation process, transactions with varying execution length are being considered which are executed in multi-threaded environment. The experimental results show an interesting outcome which focuses on the future direction of research for STM implementation.

Book ChapterDOI
01 Jan 2016
TL;DR: The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads, and Simulation result shows that it helps to increase network longevity.
Abstract: Energy efficiency is the main challenge for wireless sensor networks. Power-aware schemes send the same data through multiple paths, which causes data redundancy and a huge amount of energy drainage within the network. Use of a head node for a cluster can be a better solution. The proposed algorithm creates several clusters, selects a cluster head, aggregates the data, and sends that to base station through other cluster heads. Simulation result shows that it helps to increase network longevity.

Book ChapterDOI
14 Sep 2016
TL;DR: The application, besides creating a user data-set, also generates a signature vector database and the quality of input data is very much important for generating an accurate use pattern vector.
Abstract: Keystrokes dynamics has been used for quite sometimes in authentication of users. The technique has immense possibilities due to ease of implementation and un-obtrusive nature. Researchers have been working for attaining improved accuracy rate of user identification. Such techniques are validated using standard data-set. As it turns out, the quality of input data is very much important for generating an accurate use pattern vector. In this paper, an application for data collection has been presented. The application, besides creating a user data-set, also generates a signature vector database.