Skip to main content

Research Repository

Advanced Search

All Outputs (11)

Consensus Adversarial Defense Method Based on Augmented Examples (2022)
Journal Article
Ding, X., Cheng, Y., Luo, Y., Li, Q., & Gope, P. (2022). Consensus Adversarial Defense Method Based on Augmented Examples. IEEE Transactions on Industrial Informatics, https://doi.org/10.1109/TII.2022.3169973

Deep learning has been used in many computer-vision-based industrial Internet of Things applications. However, deep neural networks are vulnerable to adversarial examples that have been crafted specifically to fool a system while being imperceptible... Read More about Consensus Adversarial Defense Method Based on Augmented Examples.

An AI-Driven Secure and Intelligent Robotic Delivery System (2022)
Journal Article
Wang, W., Gope, P., & Cheng, Y. (in press). An AI-Driven Secure and Intelligent Robotic Delivery System. IEEE Transactions on Engineering Management, https://doi.org/10.1109/TEM.2022.3142282

Last-mile delivery has gained much popularity in recent years, it accounts for about half of the whole logistics cost. Unlike container transportation, companies must hire significant number of employees to deliver packages to the customers. Therefor... Read More about An AI-Driven Secure and Intelligent Robotic Delivery System.

Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme (2020)
Journal Article
Bian, W., Gope, P., Cheng, Y., & Li, Q. (2020). Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme. Future generations computer systems : FGCS, 109, 45-55. https://doi.org/10.1016/j.future.2020.03.034

The fingerprint has long been used as one of the most important biological features in the field of biometrics. It is person-specific and remain identical though out one’s lifetime. Physically uncloneable functions (PUFs) have been used in authentica... Read More about Bio-AKA: An efficient fingerprint based two factor user authentication and key agreement scheme.

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks (2019)
Journal Article
Gope, P., Das, A. K., Kumar, N., & Cheng, Y. (2019). Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 1-1. https://doi.org/10.1109/tii.2019.2895030

Industrial Wireless Sensor Network (IWSN) is an emerging class of a generalized Wireless Sensor Network (WSN) having constraints of energy consumption, coverage, connectivity, and security. However, security and privacy is one of the major challenges... Read More about Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks.

Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids (2018)
Journal Article
Gope, P., & Sikdar, B. (2019). Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids. IEEE transactions on information forensics and security, 14(6), 1554 - 1566. https://doi.org/10.1109/TIFS.2018.2881730

The concept of smart metering allows real-time measurement of power demand which in turn is expected to result in more efficient energy use and better load balancing. However, finely granular measurements reported by smart meters can lead to starkly... Read More about Lightweight and privacy-friendly spatial data aggregation for secure power supply and demand management in smart grids.

Anonymity preserving and lightweight multi-medical server authentication protocol for telecare medical information system (2018)
Journal Article
Amin, R., Islam, S. H., Gope, P., Choo, K. K. R., & Tapas, N. (2019). Anonymity preserving and lightweight multi-medical server authentication protocol for telecare medical information system. IEEE Journal of Biomedical and Health Informatics, 23(4), 1749 - 1759. https://doi.org/10.1109/JBHI.2018.2870319

Electronic health systems, such as Telecare Medical Information System (TMIS), allow patients to exchange their health information with a medical center/doctor for diagnosis in real-time, and across borders. Given the sensitive nature of health infor... Read More about Anonymity preserving and lightweight multi-medical server authentication protocol for telecare medical information system.

Lightweight and privacy-preserving two-factor authentication scheme for IoT devices (2018)
Journal Article
Gope, P., & Sikdar, B. (2019). Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE internet of things journal, 6(1), 580 - 589. https://doi.org/10.1109/JIOT.2018.2846299

Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol desi... Read More about Lightweight and privacy-preserving two-factor authentication scheme for IoT devices.

Privacy-aware authenticated key agreement scheme for secure smart grid communication (2018)
Journal Article
Gope, P., & Sikdar, B. (2019). Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE transactions on smart grid, 10(4), 3953 - 3962. https://doi.org/10.1109/TSG.2018.2844403

Information and Communication Technologies (ICT) are one of the underpinning platforms of smart grids, facilitating efficient grid management and operation, optimization of resource utilization, as well as enable new products, features, and services.... Read More about Privacy-aware authenticated key agreement scheme for secure smart grid communication.

An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids (2018)
Journal Article
Gope, P., & Sikdar, B. (2018). An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids. IEEE internet of things journal, 5(4), 3126-3135. https://doi.org/10.1109/JIOT.2018.2833863

Smart grids take advantage of information and communication technologies to achieve energy efficiency, automation and reliability. These systems allow two-way communications and power flow between the grid and consumers. However, these bidirectional... Read More about An efficient data aggregation scheme for privacy-friendly dynamic pricing-based billing and demand-response management in smart grids.

Lightweight and Practical Anonymous Authentication Protocol for RFID systems using physically unclonable functions (2018)
Journal Article
Gope, P., Lee, J., & Quek, T. Q. (2018). Lightweight and Practical Anonymous Authentication Protocol for RFID systems using physically unclonable functions. IEEE transactions on information forensics and security, 13(11), 2831-2843. https://doi.org/10.1109/TIFS.2018.2832849

Radio frequency identification (RFID) has been considered one of the imperative requirements for implementation of Internet-of-Things applications. It helps to solve the identification issues of the things in a cost-effective manner, but RFID systems... Read More about Lightweight and Practical Anonymous Authentication Protocol for RFID systems using physically unclonable functions.

Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services (2017)
Journal Article
Gope, P., & Das, A. K. (2017). Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services. IEEE internet of things journal, 4(5), 1764-1772. https://doi.org/10.1109/jiot.2017.2723915

In recent years, mobile computing has gained a huge popularity among mobile users (MUs). It basically combines the mobile devices with the cloud computing. By the means of on-demand self-service and extendibility, it can offer the infrastructures, pl... Read More about Robust anonymous mutual authentication scheme for n-times ubiquitous mobile cloud computing services.