Sourav Saha

Sourav Saha
International Institute of Information Technology, Hyderabad | IIIT · Centre for Security, Theory, and Algorithms (C-STAR)

PhD in Computer Science and Engineering at IIIT Hyderabad

About

14
Publications
1,711
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
699
Citations
Introduction
Sourav Saha is currently a Ph.D. Research Fellow in Computer Science and Engineering at the Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad, India. He received his Master of Science (MS) by Research degree in Computer Science and Engineering from Indian Institute of Information Technology, Sri City, Chittoor, India and Bachelor of Technology (B.Tech) in CSE from Central Institute of Technology, Kokrajhar
Education
January 2020 - January 2023
International Institute of Information Technology, Hyderabad
Field of study
  • Computer Science and Engineering

Publications

Publications (14)
Article
6G (sixth-generation wireless), the successor to 5G cellular technology, operates at higher frequencies than its predecessor and supports significantly greater capacity and markedly reduced latency. Healthcare is treated as a complex system with various stakeholders, like doctors, patients, hospitals, pharmaceutical companies as well as healthcare...
Article
Full-text available
The Industrial Internet of Things (IIoT) is able to connect machines, analytics and people with IoT smart devices, gateway nodes and edge devices to create powerful intuitivenesses to drive smarter, faster and effective business agreements. IIoT having interconnected machines along with devices can monitor, gather, exchange, and analyze information...
Article
Full-text available
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on int...
Article
This article proposes a new blockchain-envisioned key management protocol for Artificial Intelligence(AI)-enabled Industrial Cyber-Physical Systems (ICPS). The designed key management protocol enables key establishment among the Internet of Things(IoT)-enabled smart devices and their respective gateway nodes. The blocks partially constructed with s...
Article
In the Internet of Vehicles (IoV), numerous potential applications have come up with the use of the Internet of Things (IoT)-empowered smart devices. In IoV, vehicles, roads, street signs and traffic lights can accordingly adjust to changing conditions in order to assist drivers, and also to improve safety, ease congestion and pollution reduction....
Article
Full-text available
This article introduces a new consortium blockchain‐enabled access control scheme in edge computing based generic Internet of Things environment (called CBACS‐EIoT), where the mutual authentication among the IoT smart devices and the gateway node(s), and also among the gateway node(s) and respective edge server(s) occur. In addition, key management...
Article
With the tremendous growth of Information and Communications Technology (ICT), Cyber Physical Systems (CPS) have opened the door for many potential applications ranging from smart grids and smart cities to transportation, retail, public safety and networking, healthcare and industrial manufacturing. However, due to communication via public channel...
Article
We design a new blockchain-based access control protocol in IoT-enabled smart-grid system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely brought to the service providers from their respectively smart meters. The Peer-to-Peer (P2P) network is formed by the participating services providers, where the peer nodes are respon...
Article
Full-text available
As the communications among the vehicles, the Road-Side Units (RSU) and the Edge Servers (ES) take place via wireless communication and the Internet, an adversary may take the opportunity to tamper with the data communicated among various entities in an Internet of Vehicles (IoV) environment. Therefore, it demands secure communication among the inv...
Article
The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during communication either with the control room/ground station server(s) or moving access points in the sky, security and privacy is one the crucial issues which needs to be tackled efficiently. In this...
Conference Paper
Access control is one of the important security services that is essential for an Internet of Things (IoT)-enabled authorized user using his/her smart mobile device to authenticate with the trusted Hospital Authority (HA) in a hospital. After mutual authentication, a secret key is established among the user and HA for secure data transmission. The...
Article
Leakage of sensitive e-health data would severely cause threats leading to tampering of health and person related information. So preserving the privacy of the patient information is an essential feature in e-health systems. In this paper, we first explore the security limitations of the existing authentication schemes. Most of the schemes fail to...
Chapter
In medical emergencies, an instant and secure messaging is an important service to provide quality healthcare services. A session initiation protocol (SIP) is an IP-based multimedia and telephony communication protocol used to provide instant messaging services. Thus, design of secure and efficient SIP for quality medical services is an emerging pr...

Network

Cited By