Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Biplob R. Ray is active.

Publication


Featured researches published by Biplob R. Ray.


Computer Networks | 2014

Scalable RFID security framework and protocol supporting Internet of Things

Biplob R. Ray; Jemal H. Abawajy; Morshed U. Chowdhury

Abstract Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems

Biplob R. Ray; Morshed U. Chowdhury; Jemal H. Abawajy

The Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked applications security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.


the internet of things | 2016

Secure Object Tracking Protocol for the Internet of Things

Biplob R. Ray; Morshed U. Chowdhury; Jemal H. Abawajy

In this paper, we propose a secure object tracking protocol to ensure the visibility and traceability of an object along the travel path to support the Internet of Things (IoT). The proposed protocol is based on radio frequency identification system for global unique identification of IoT objects. For ensuring secure object tracking, lightweight cryptographic primitives and physically unclonable function are used by the proposed protocol in tags. We evaluated the proposed protocol both quantitatively and qualitatively. In our experiment, we modeled the protocol using security protocol description language (SPDL) and simulated SPDL model using automated claim verification tool Scyther. The results show that the proposed protocol is more secure and requires less computation compared to existing similar protocols.


Future Generation Computer Systems | 2018

Universal and secure object ownership transfer protocol for the Internet of Things

Biplob R. Ray; Jemal H. Abawajy; Morshed U. Chowdhury; Abdulhameed Alelaiwi

Abstract In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Things (IoT) in a secure manner. In application domains such as supply chain management, RFID tagged objects are required to securely change hands several times during their life cycle. To this end, we propose a novel ownership transfer mechanism that securely transfers an RFID tagged objects in Internet of Things (IoT). An important property of the proposed approach is that the proposed ownership transfer mechanism ensures the security of both the RFID tagged objects and the object owners. We analysed the proposed object ownership transfer protocol both qualitatively and quantitatively to evaluate its effectiveness. The analysis shows that the proposed protocol is more secure and requires less computation as compared to existing similar protocols.


software engineering artificial intelligence networking and parallel distributed computing | 2015

Secure object tracking protocol for Networked RFID Systems

Biplob R. Ray; Morshed Howdhury; Jemal H. Abawajy; Monika Jesmin

Networked systems have adapted Radio Frequency identification technology (RFID) to automate their business process. The Networked RFID Systems (NRS) has some unique characteristics which raise new privacy and security concerns for organizations and their NRS systems. The businesses are always having new realization of business needs using NRS. One of the most recent business realization of NRS implementation on large scale distributed systems (such as Internet of Things (IoT), supply chain) is to ensure visibility and traceability of the object throughout the chain. However, this requires assurance of security and privacy to ensure lawful business operation. In this paper, we are proposing a secure tracker protocol that will ensure not only visibility and traceability of the object but also genuineness of the object and its travel path on-site. The proposed protocol is using Physically Unclonable Function (PUF), Diffie-Hellman algorithm and simple cryptographic primitives to protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability. The tag only performs a simple mathematical computation (such as combination, PUF and division) that makes the proposed protocol suitable to passive tags. To verify our security claims, we performed experiment on Security Protocol Description Language (SPDL) model of the proposed protocol using automated claim verification tool Scyther. Our experiment not only verified our claims but also helped us to eliminate possible attacks identified by Scyther.


International Journal of Networked and Distributed Computing | 2015

Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System

K D Gaith Al.; Biplob R. Ray; Morshed U. Chowdhury

In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists in the literature, however, most of them are impractical or insecure to implement on current passive RFID tags. We are proposing a timer based ownership transfer protocol for closed loop RFID systems. The proposal in this paper includes two implement scenario to cover diverse tags type. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.


international conference on advanced applied informatics | 2014

RFID Tag Ownership Transfer Protocol for A Closed Loop System

K D Gaith Al.; Biplob R. Ray; Morshed U. Chowdhury

In the RFID system a tag is attached to an object which might own by a number of people during its life cycle. As a result, the RFID system requires to transfer ownership of the tag. The ownership transfer has to protect privacy of current and new owner. There are number of ownership transfer protocol proposed to achieve secure ownership transfer. However, most of them are impractical or insecure to implement on current passive RFID tags. We are presenting an ownership transfer protocol using timer based shared secret for closed loop RFID systems. The protocol will ensure security and privacy of involved parties in the idle circumstances. Our comparison shows that the proposed protocol is more secure and practical than existing similar ones.


ieee conference on open systems | 2014

PUF-based secure checker protocol for Networked RFID Systems

Biplob R. Ray; Morshed U. Chowdhury; Jemal Abawaiy

Radio Frequency Identification (RFID) system is an emerging technology for automating object identification. The Networked RFID System (NRS) is a component of a distributed object identification network which facilitates automated supply chain management. It also makes the Internet of Things (IoT) concept a reality. To increase the business feasibility of NRS implementation, the system should be able to ensure the visibility and traceability of the object throughout the chain using a checker protocol. By doing so, the protocol will check the genuineness of the object and the genuineness of the objects previous travel path on-site. While doing so, the protocol needs to ensure the security requirement of the system. To this end, we propose a secure checker protocol for NRS which will use a PUF (Physically Unclonable Function) and simple cryptographic primitives. The protocol provides security (protect privacy of the partners, injection of fake objects, non-repudiation, and unclonability), visibility and traceability for NRS. It is also suitable for passive tags.


FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security | 2016

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept

Gaith Al; Robin Doss; Morshed U. Chowdhury; Biplob R. Ray

Since the RFID technology has been found couple of decades ago, there was much involvement of this emerging technology in the improvement of supply chain management. As this technology made the industry more reliable and faster to process, yet there were always some technical issues and security threats that emerged from the heavy use of the RFID tags in the SCM, or other industries. Hereby we represent a new protocol based on a new idea that can be used to manage and organize tags as well as the objects attached to them in SCM, to prevent counterfeiting and reduce the security threats taking into consideration the security and privacy concerns that faces the industry today. This new approach will open a new horizon to the supply chain management as well as the RFID systems technology since it will handle multi- tags attached to objects managed in one location as an entity of one in one. We called our approach the MATRYOSHKA approach since it has the same idea of the russian doll, in managing multi-tags as one entity and prevent counterfeiting. We also added extra authentication process based on a mathematical exchange key formation to increase the security during communication to prevent threats and attacks and to provide a secure mutual authentication method.


Studies in health technology and informatics | 2018

Caring for carers of people with dementia: A protocol for harnessing innovation through deploying leading edge technologies to enable virtual support groups and services

Lynne Parkinson; Annie Banbury; Anne Livingstone; Steven Gordon; Biplob R. Ray; Louise Byrne; Susan Nancarrow; Christopher M. Doran; Margaret McAllister; Carrie Petersen; Sonja Pedell; Denise Wood

In rural Australia, knowledge and utilisation of support by informal carers is lacking. During the caregiving period, socioemotional support from family and friends plays an important role in sustaining caregiving activities. Post-care, these social networks facilitate adjustment to role change and dealing with grief. Developing and improving access to peer support to enable carers to effectively cope with the challenges of caring may positively influence their caring experience. The primary objective of this project is to examine the response of isolated rural carers for older people with dementia to a videoconference (VC) based peer support and information program. Will participation in the program improve self-efficacy, quality of life, and mental health? Secondary objectives are to develop a VC based peer support program for isolated rural carers for older people with dementia, using a co-design approach; and to assess the feasibility of VC technology for enhancing social support to family caregivers in their homes. This project will collaboratively co-design and evaluate a facilitated VC peer support and information program to carers of people with dementia within rural areas. Carers will be recruited through community health and care providers. Program development will use an information sharing approach to facilitate social interaction. A focus of the project is to use off-the-shelf technology which will be more accessible than specialised bespoke solutions that are currently popular in this area of research. A mixed methods repeated measures randomized wait list design will be used to evaluate the project. The primary outcomes are self-efficacy, quality of life, and mental health. Secondary outcomes are perceived social support and user satisfaction with the technology, and intention to continue VC interaction.

Collaboration


Dive into the Biplob R. Ray's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Savitri Bevinakoppa

Melbourne Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Annie Banbury

Central Queensland University

View shared research outputs
Top Co-Authors

Avatar

Christopher M. Doran

Central Queensland University

View shared research outputs
Top Co-Authors

Avatar

Denise Wood

Central Queensland University

View shared research outputs
Top Co-Authors

Avatar

Dennis Jarvis

Central Queensland University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge