About
Articles by Priti
-
Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain
Multi-party Signatures/Group Signatures/Threshold Signatures in Blockchain
By Priti Kumari, PhD
Activity
-
Our Exploration of #QuantumComputing with #QAOA. We are Harnessing Cutting-Edge #QuantumAlgorithms for Next-Gen Optimization Solutions. Click:…
Our Exploration of #QuantumComputing with #QAOA. We are Harnessing Cutting-Edge #QuantumAlgorithms for Next-Gen Optimization Solutions. Click:…
Liked by Priti Kumari, PhD
-
🌟 Quantum Leap in Vehicle Routing! 🚚✨ We are thrilled to share our latest research on leveraging quantum entanglement for optimizing vehicle…
🌟 Quantum Leap in Vehicle Routing! 🚚✨ We are thrilled to share our latest research on leveraging quantum entanglement for optimizing vehicle…
Liked by Priti Kumari, PhD
-
I am thrilled to announce that I have been awarded gold medal for my PhD thesis! 🏅 My thesis titled “AI-based Narrative Arc Generation for Coherent…
I am thrilled to announce that I have been awarded gold medal for my PhD thesis! 🏅 My thesis titled “AI-based Narrative Arc Generation for Coherent…
Liked by Priti Kumari, PhD
Experience & Education
Licenses & Certifications
-
IBM Developer Day India 2019 - Implement Asset Securitization on the IBM Blockchain Platform
IBM
Issued -
GRE
-
Publications
-
Vulnerabilities in Key Management Schemes in Body Sensor Network
Springer
Body Area Network (BAN) has emerged as most promising technology for pervasive health care applications. Since BAN facilitates communication of very sensitive health data, information leakage in such networks can put human life at risk; and hence security inside BAN is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for…
Body Area Network (BAN) has emerged as most promising technology for pervasive health care applications. Since BAN facilitates communication of very sensitive health data, information leakage in such networks can put human life at risk; and hence security inside BAN is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.
Other authorsSee publication -
Symmetric-key Generation Protocol (SGenP) for Body Sensor Network
IEEE ICC 2018
Sensors of a Body Sensor Network (BSN) transmit messages over a non-secure wireless channel. Messages are encrypted using a secret key to attain privacy. In this paper, we propose Secret-key Generation Protocol (SGenP), assuming that all sensors are capable of capturing physiological signals.
SGenP evades any pre-distribution of keying materials. SGenP consists of two sub-protocols: 1. Hash Message Authentication Code Feature Exchange (HMAC-FE) protocol and 2. Secret Key Construction (SKC)…Sensors of a Body Sensor Network (BSN) transmit messages over a non-secure wireless channel. Messages are encrypted using a secret key to attain privacy. In this paper, we propose Secret-key Generation Protocol (SGenP), assuming that all sensors are capable of capturing physiological signals.
SGenP evades any pre-distribution of keying materials. SGenP consists of two sub-protocols: 1. Hash Message Authentication Code Feature Exchange (HMAC-FE) protocol and 2. Secret Key Construction (SKC) protocol. HMAC-FE facilitates a secret feature exchange using a HMAC function. The HMAC
function works as a module, therefore with different HMAC functions, different levels of security (from Cryptographic to Information theoretic) can be achieved. Once a set of common features between two sensors is decided, SKC protocol outputs a secret key. SGenP offers some essential properties like plug-n-play, replaceability, scalability, flexibility and easy refreshment of keys. SGenP is compared with OPFKA and found that energy consumption due to communications is reduced by 89:2%.Other authors -
Secure Key-exchange for Implantable Sensors using Inductive Coupling
IEEE
The usage of implantable sensors is imperative in Body Sensor Network. The challenges associated with its security are open research problems. Implantable sensors need a set of secret keys to communicate with other sensors or entities. Secret key generation and subsequent key exchange with other sensors
are significant power consuming tasks. Therefore, we propose a method based on pre-distribution of secret keys. The two major drawbacks, higher memory consumption and difficulties in the key…The usage of implantable sensors is imperative in Body Sensor Network. The challenges associated with its security are open research problems. Implantable sensors need a set of secret keys to communicate with other sensors or entities. Secret key generation and subsequent key exchange with other sensors
are significant power consuming tasks. Therefore, we propose a method based on pre-distribution of secret keys. The two major drawbacks, higher memory consumption and difficulties in the key refreshment of existing pre-distribution methods have been overcome in this paper. The key generation process has been shifted from implantable sensor to a trusted external device. The external device is paired with the sensor through inductive coupling and is used for powering the sensor and keys transfer. A variant of Diffie-Hellman key agreement with physiological values is used to facilitate secure transfer of keys. Formal security definitions of the proposed method have been presented. -
Securing a Body Sensor Network
IEEE
Health data is one of the most sensitive data available and its misuse can very easily endanger human lives. Ergo, each system and process in Body Sensor Network (BSN) which accesses this data needs to be secured well enough. In order to achieve this high security along with low energy consumption, a key management scheme named as Double Encryption has been proposed here. The proposed method uses two keys for encryption: a novel physiological feature based key and a preshared key between the…
Health data is one of the most sensitive data available and its misuse can very easily endanger human lives. Ergo, each system and process in Body Sensor Network (BSN) which accesses this data needs to be secured well enough. In order to achieve this high security along with low energy consumption, a key management scheme named as Double Encryption has been proposed here. The proposed method uses two keys for encryption: a novel physiological feature based key and a preshared key between the communicating nodes. The feature and key generation, both are more economical than the existing algorithms in terms of computation, communication, storage, security and error. The features are exchanged with the help of simple addition and subtraction, instead of heavy computations like a vault or coffer creation, commitment, encryption or decryption. The another salient feature of the proposed algorithm is that if the key negotiation fails once, the protocol does not need to be restarted. The protocol is secure in various scenarios like Brute Force Attack, RCB (Remotely Capturing Biometric data) attack, Node Capture attack and Battery Depletion Attack.
Other authors -
CA-MWSN: CLUSTERING ALGORITHM FOR MOBILE WIRELESS SENOR NETWORK
GRAPH-HOC
This paper proposes a centralized algorithm for cluster-head-selection in a mobile wireless sensor network. Before execution of algorithm in each round, Base station runs centralized localization algorithm whereby sensors update their locations to base station and accordingly Base station performs dynamic clustering. Afterwards Base station runs CA-MWSN for cluster-head-selection. The proposed algorithm uses three fuzzy inputs Residual energy, Expected Residual Energy and Mobility to find…
This paper proposes a centralized algorithm for cluster-head-selection in a mobile wireless sensor network. Before execution of algorithm in each round, Base station runs centralized localization algorithm whereby sensors update their locations to base station and accordingly Base station performs dynamic clustering. Afterwards Base station runs CA-MWSN for cluster-head-selection. The proposed algorithm uses three fuzzy inputs Residual energy, Expected Residual Energy and Mobility to find Chance of the nodes to be elected as a Cluster-head. The node with highest Chance is declared as a Cluster-head for that particular cluster. Dynamic clustering provides uniform and significant distribution of energy in a non-uniform distribution of sensors. CA-MWSN guarantees completion of the round.
-
Survey of clustering algorithms using fuzzy logic in wireless sensor network
IEEE
This paper illustrates the successful application of fuzzy logic in wireless sensor networks. There are different disciplines which make use of fuzzy logic such as event forecasting, redundancy reduction, querying to sensor network database, deployment, clustering, MAC protocol etc. In this survey paper, clustering techniques with fuzzy logic are discussed which associates advantages of localized control, scalability and energy conservation. Finally, other factors which affect clustering along…
This paper illustrates the successful application of fuzzy logic in wireless sensor networks. There are different disciplines which make use of fuzzy logic such as event forecasting, redundancy reduction, querying to sensor network database, deployment, clustering, MAC protocol etc. In this survey paper, clustering techniques with fuzzy logic are discussed which associates advantages of localized control, scalability and energy conservation. Finally, other factors which affect clustering along with efficient cluster head selection are considered.
-
Cluster head selection in mobile wireless sensor networks: a survey
SEEK Digital Library
Wireless sensor networks have made the task of surveillance and detection easy up to greater extent. And mobile wireless sensor network is an advancement of wireless sensor network in a way to fulfil requirements of current surveillance techniques more appropriately. In this survey paper, we have considered an important part of mobile wireless sensor network i.e. clustering. So far proposed and implemented algorithms for clustering in mobile wireless sensor network is discussed here with the…
Wireless sensor networks have made the task of surveillance and detection easy up to greater extent. And mobile wireless sensor network is an advancement of wireless sensor network in a way to fulfil requirements of current surveillance techniques more appropriately. In this survey paper, we have considered an important part of mobile wireless sensor network i.e. clustering. So far proposed and implemented algorithms for clustering in mobile wireless sensor network is discussed here with the consideration of LEACH as a basic algorithm for clustering in wireless sensor network.
-
Clustering Algorithm in Wireless Sensor Network: A Survey
SEEK Digital Library
In this survey paper, various challenges to wireless sensor networks are considered and Clustering as a solution to one of them has been introduced. The wireless sensor network is divided into clusters in order to reduce energy consumption as well as to increase coverage area to larger extent. The various clustering schemes with different parameters and in different environments such as static and mobile are discussed. The fuzzy approach in cluster head selection has overcome uncertainty of…
In this survey paper, various challenges to wireless sensor networks are considered and Clustering as a solution to one of them has been introduced. The wireless sensor network is divided into clusters in order to reduce energy consumption as well as to increase coverage area to larger extent. The various clustering schemes with different parameters and in different environments such as static and mobile are discussed. The fuzzy approach in cluster head selection has overcome uncertainty of wireless sensor network at different levels.
Courses
-
Network Security
-
Languages
-
English
-
-
Hindi
-
Organizations
-
IIT, Mandi
No
-
More activity by Priti
-
🌟 Exciting News from ACM India! 🌟 We are thrilled to announce the newly elected leaders for the ACM India Council for the term July 1, 2024, to…
🌟 Exciting News from ACM India! 🌟 We are thrilled to announce the newly elected leaders for the ACM India Council for the term July 1, 2024, to…
Liked by Priti Kumari, PhD
-
Congratulations to Team India for winning the T20 World Cup 2024! Your victory has brought immense joy and pride to millions of fans worldwide. Well…
Congratulations to Team India for winning the T20 World Cup 2024! Your victory has brought immense joy and pride to millions of fans worldwide. Well…
Liked by Priti Kumari, PhD
-
Suppose you are performing a task requiring known entangled states, obtained from a machine. However, machines can become faulty for various reasons.…
Suppose you are performing a task requiring known entangled states, obtained from a machine. However, machines can become faulty for various reasons.…
Liked by Priti Kumari, PhD
-
In the dynamic world of quantum communication and networks, entanglement distribution reigns supreme, driving a multitude of information processing…
In the dynamic world of quantum communication and networks, entanglement distribution reigns supreme, driving a multitude of information processing…
Liked by Priti Kumari, PhD
-
#memeoftheday #developerslife #codingisfun #examroom #joinus #wearehring
#memeoftheday #developerslife #codingisfun #examroom #joinus #wearehring
Liked by Priti Kumari, PhD
-
On behalf of everyone at AsiaOne Magazine, we extend our warmest birthday wishes to Mr. Pramod Sajja! As the President, CEO, and Founder of Paramount…
On behalf of everyone at AsiaOne Magazine, we extend our warmest birthday wishes to Mr. Pramod Sajja! As the President, CEO, and Founder of Paramount…
Liked by Priti Kumari, PhD
-
#memeoftheday #developerslife #variable #examroom #developercommunity #meme
#memeoftheday #developerslife #variable #examroom #developercommunity #meme
Liked by Priti Kumari, PhD
-
I had the privilege of attending our company's 25th-anniversary celebration and the grand launch event of our groundbreaking Supply Chain SaaS…
I had the privilege of attending our company's 25th-anniversary celebration and the grand launch event of our groundbreaking Supply Chain SaaS…
Liked by Priti Kumari, PhD
-
There is a lot of talk about company culture. This past week, I was part of visionary leader Pramod Sajja actually taking action to positively impact…
There is a lot of talk about company culture. This past week, I was part of visionary leader Pramod Sajja actually taking action to positively impact…
Liked by Priti Kumari, PhD
-
"Stay secure with examroom.ai." 🔒 New Updates on National Security Agency (NSA) The National Security Agency (NSA) has recently released an…
"Stay secure with examroom.ai." 🔒 New Updates on National Security Agency (NSA) The National Security Agency (NSA) has recently released an…
Shared by Priti Kumari, PhD
-
UPDATE! We added more capabilities to oto.do ======== Select recently used destinations just with one tap. automatically book the cheapest ride…
UPDATE! We added more capabilities to oto.do ======== Select recently used destinations just with one tap. automatically book the cheapest ride…
Liked by Priti Kumari, PhD
-
Exciting news! Farm To Plate has officially launched in the European Union! Our offices have already been established in the US, Dubai, and India…
Exciting news! Farm To Plate has officially launched in the European Union! Our offices have already been established in the US, Dubai, and India…
Liked by Priti Kumari, PhD
-
This is how Paramount celebrated 25 years of excellence, innovation, and sustainability. Here's a glimpse of what the event was all about - Farm To…
This is how Paramount celebrated 25 years of excellence, innovation, and sustainability. Here's a glimpse of what the event was all about - Farm To…
Liked by Priti Kumari, PhD
Other similar profiles
-
Suraksha R Singh
Connect -
Chandana Raju
Jr. Technical Documentation Specialist at ExamRoom.AI
Connect -
Kavitha AM
Sr Director Human Resource | Human Capital Curator | Global Talent Acquisition & Management | Empowering People & Building teams | Compliance | Culture & Change Champion | Employee Experience
Connect -
Parshant Kumar
CEO @ ExamRoom.AI® | Driving AI Innovation, Cyber Security Expert
Connect -
Vibhuti Vishwakarma
Frontend Developer | React.js | Angular | JavaScript | HTML | CSS | TypeScript | RxJs | NgRx
Connect -
Daneshwari Reddi
Quality analyst at Examroom.ai
Connect -
Vinod Jayakeerthi
Connect -
Tricha Anjali
Connect -
Sathya Murthi V S
Connect -
Sowmiya P
Jr HRBP @ ExamRoom.AI® | HR Management
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More