Dharminder Chaudhary's research while affiliated with Amrita Vishwa Vidyapeetham and other places

Publications (24)

Chapter
An authenticated mobile key exchange is necessary for post quantum secure communication over a public channel. It enables two parties to establish a secure fresh session key for each of the communication. In the last few years, many post quantum authentication key exchange protocols have been designed. This article contains a discussion how the Dab...
Chapter
The study of information security and privacy is currently quite popular. In parallel, several computing paradigms, such as cloud and edge computing, are already creating a unique ecosystem with various designs, storage possibilities, and processing capacities. The diversity of this ecosystem has several limitations, particularly in terms of securi...
Chapter
Smart grid (SG) is an advanced framework for controlling computers, automation, new technologies, and smart equipment that is more efficient and dependable. Smart grid possesses advanced self-healing capabilities and enables electricity customers to become active participants. Both security and privacy are two very important attributes of SG commun...
Chapter
Smart grids are important in modern smart cities for setting and managing the response demands, for this, they use Information and Communication Technologies. Many kinds of sensors are used in Smart Grid Environment for the surveillance purposes in an area. Their response time is less which is the reason these are deployed in high-tension areas suc...
Conference Paper
The concept of a smart city is increasing because of the demand for intelligent drones. So, the Internet of Drones came into picture, providing several benefits/services for daily life. Services that IoD offers are monitoring, FANET (Flying Ad-Hoc Networks), management of any infrastructure, and IoT (Internet of Things). These services can be deplo...
Article
Full-text available
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives. Although there are few third-party post-quantum authentication and key agreement protocols exist, but the recent studies in this article show that they are not...
Chapter
Post quantum cryptography is the key idea to resist quantum attacks. The Fiat-Shamir were the first who introduce efficient lattice-based signatures. A lattice-based signature ensures the security of blockchain architecture against quantum computers. However, a blockchain is always consisting of multiple communicating nodes, so there is a need to d...
Article
Full-text available
The Fiat–Shamir with Aborts paradigm of Lyubashevsky introduced efficient lattice based signatures. A lattice‐based signature is used to design post quantum secure blockchain architecture. But, a blockchain is always consisting of multiple nodes, and then we need an efficient aggregate signature to verify nodes in one‐step. We have designed a block...
Article
Full-text available
The issue of animal attacks is increasingly concerning for rural populations and forestry workers. To track the movement of wild animals, surveillance cameras and drones are often employed. However, an efficient model is required to detect the animal type, monitor its locomotion and provide its location information. Alert messages can then be sent...
Article
Full-text available
The Internet of Vehicles (IoV), with advanced technology in 5G communication, is considered the backbone of a smart city’s intelligent transport system. There are mainly two types of vehicular communication: (1) Vehicle to Vehicle (V2V) and (2) Vehicle to Infrastructure (V2I). In IoV, there is a dynamic change in the network topology according to t...
Article
Full-text available
A three-party authenticated key exchange protocol enables two entities to agree on a session key with the help of a dedicated server over public channel. Shor’s algorithm is a big threat for existing authenticated key exchange protocols. Lattice based cryptography plays a very important role in designing authentication and key agreement secure agai...

Citations

... al. [25] proposed new scheme for three party key agreement using lattice and elliptic curve cryptography both. His scheme is secure from user's anonymity but they use maximum number of message transformation for complete one session. ...
... Finally, we cover the current-day progress of quantum internet, particularly focusing from the perspective of network layer architecture. The unique attributes of quantum mechanics have been leveraged for quantum computing and communication in variety of fields and domains, such as, vehicular communications [312] [313], biomedical applications [314], social networks [315], electric grids [316], etc. The paper also summarizes the recent trends in this domain with a multitude of research endeavors aimed at addressing various open problems and challenges in the field. ...
... With the development of deep learning techniques, the performance of animal behavior recognition has been significantly improved. Natarajan et al. [6] achieve high-accuracy detection of wild-animal behavior using deep learning models. In order to ensure real-time performance, Fuentes et al. [7] proposed a behavior recognition algorithm for cattle based on a spatial-and-temporal information framework. ...
... This section offers an analysis of our protocol's performance and conducts a comparison with the related work of Tanveer et al. [1], Irshad et al. [34], Chaudhary et al. [35], and Ever et al. [27]. The comparison focuses on computational and communication overheads, as well as the security features provided by each protocol. ...