Chandan Tilak Bhunia
Bengal Institute of Technology & Management
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Chandan Tilak Bhunia.
International Journal of Computer Theory and Engineering | 2009
Chandan Koner; Pijush Kanti Bhattacharjee; Chandan Tilak Bhunia; Ujjwal Maulik
Authentication of mobile subscriber is a challenge of future researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3G mobile communication system has been developed to speed up the data communication. In general the authentication technique in 2G mobile communication is solely dependent on checking the authenticity of MS (Mobile Station or Subscriber) by challenge/response mechanism. Here authenticity is one-way for which MSC (Mobile or Main Switching Center) checks the validity of MS. 3G mobile communication works on two different switching techniques. One is circuit switching for voice and low speed data communications. The other one is packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication is established by packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3G network) authentication is mutual where both MS and MSC or network authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, we enlighten different new approaches that can be effectively used as an authentication tool in 3G mobile communications.
International Journal of Computer and Electrical Engineering | 2010
Pijush Kanti Bhattacharjee; Chandan Koner; Chandan Tilak Bhunia; Ujjwal Maulik
Voice frequency pattern is asymmetric just like nature. Although voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for authentication purpose. We propose second entity as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. Third entity is chosen as probable location (place) of the subscriber from the selective locations at the time of initializing a call i.e. distance between the subscriber and the network. These three entities such as probability of particular range of frequencies for the salutation word, particular salutation or greeting word, location at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to the assigned weightage of the relative grades. Then Fuzzy operations are performed on modified relative grades (sets). We invent a Fuzzy Rule (condition). If the results obtained from fuzzy operations are satisfied by the invented fuzzy rule, the subscriber (MS) and the network (MSC or PDSN) is mutually authenticated in 3-G mobile communications.
International Journal of Computer Theory and Engineering | 2010
Pijush Kanti Bhattacharjee; Chandan Koner; Chandan Tilak Bhunia; Ujjwal Maulik
Authentication of mobile subscribers and network is a challenging issue to the researchers, since hacking and threats are increasing with the enhanced population of wireless traffic. Now mobile communication system (3-G or advanced) has been developed to speed up the data communication. 3-G mobile communication uses two different switching techniques: circuit switching for voice and low speed data communications, and packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication uses packet switching process through PDSN (Packet Data Serving Node) servers. In circuit switching (3-G network), authentication is mutual where both MS and network (MSC) authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, we propose a mutual authentication technique that verifies the authenticity of the subscriber as well as the network (MSC or PDSN) by subscribers password, SIM and biometric property of the subscriber. Two biometric parameters are used in which one biometric parameter is stored in SIM and the other biometric parameter taken as frequency of Flipping or Clapping sound of the subscriber, called certified document (CD), is stored at server (MSC or PDSN). An algorithm is developed by these four entities to check this authentication process, termed biometric entity based mutual authentication technique for 3-G mobile communications.
International Journal of Computer Theory and Engineering | 2010
Pijush Kanti Bhattacharjee; Chandan Koner; Chandan Tilak Bhunia; Ujjwal Maulik
An artificial intelligence based mutual authentication system with four entities is developed keeping any eye to enhancing threat and hacking in mobile network. Since voice frequency lies between 0 ~ 3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the salutation or selective words used by a subscriber at the beginning of conversation like Hello, Good Morning, Namaskar etc is taken as first entity for authentication purpose. Second entity is chosen as frequency of flipping or clapping sound of the subscriber at the time of initializing a call. Then third entity is taken as face image of the calling subscriber. We propose fourth entity as probability of salutation or greeting word from subscriber’s talking habit (set of salutation words) whiles the subscriber starts a call. These four entities such as probability of particular range of frequencies for the salutation word, frequency of flipping sound, face image matching of the subscriber, particular salutation or greeting word at the time of starting a call are used with most frequently, more frequently and less frequently by the subscriber like uncertainty in Artificial Intelligence (AI). Now different relative grades are assigned for most frequently, more frequently and less frequently used parameters and the grades are modified according to weightage. We invent a Fuzzy Rule (condition) by Fuzzy operation. If the results obtained from fuzzy operations are satisfied by the invented fuzzy rule, the subscriber (MS) and the network (MSC or PDSN) are mutually authenticated in 3-G mobile communications. Pijush Kanti Bhattacharjee is an Assistant Professor in the Department of Electronics and Communication Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He was an Ex Asssitant Director in the Department of Telecommunications (DoT), Government of India, India. He has possessed vast working experience in the field of Telecommunications including Mobile Communications, Image Processing, Network Security, VLSI etc. He is a member of IACSIT, IAENG, CSTA, IE, ISTE, IAPQR. (phone: +91-33-25954148; email: [email protected]). Chandan Koner is an Assistant Professor in the Department of Computer Science and Engineering, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He is pursuing PhD course. He is member of IACSIT and IAENG. (phone: +91-9434535556; email: [email protected]). Chandan Tilak Bhunia is a Director, Bengal Institute of Technology and Management, Santiniketan, P.O. Doranda, West Bengal, Pin-731236, India. He is a FIE(I), FIETE and Senior Member of IEEE. (phone: +919434033157; email: [email protected]). Ujjwal Maulik is currently a Professor in the Department of Computer Science and Technology, Jadavpur University, Kolkata, India. He is a FIE(I) and Senior Member of IEEE. (phone: +91-33-24131766; email: [email protected]).
asian himalayas international conference on internet | 2009
Chandan Koner; Pijush Kanti Bhattacharjee; Chandan Tilak Bhunia; Ujjwal Maulik
Authentication of mobile subscribers and network are a challenging issue to the researchers due to increasing security threats and attacks with the enhanced population of wireless traffic. 3-G or advanced mobile communication system has been developed to speed up the data communication. 3-G mobile communications use two different switching techniques: circuit switching for voice and low speed data communications and packet switching mainly for data communication, but can afford voice communication like VoIP (Voice Over Internet Protocol), video telephony, multimedia service etc. Generally high speed data communication uses packet switching technique through PDSN (Packet Data Serving Node) servers. In circuit switching (3-G network), authentication is mutual where both MS and MSC or network authenticate each other, but in packet switching only network (servers in PDSN) examines the authenticity of MS. In this paper, we propose a mutual authentication technique for circuit and packet switching both that verifies the authenticity of the subscriber as well as the network by subscribers password, SIM (expressed as identifier) and biometric property of the subscriber, termed as mutual authentication technique using three entities in 3-G mobile communications.
International Journal of Computer and Electrical Engineering | 2010
Chandan Koner; Pijush Kanti Bhattacharjee; Chandan Tilak Bhunia; Ujjwal Maulik
511 Abstract—Authentication of mobile subscriber’s messages is a challenging issue for future researchers due to increasing security threats and attacks. Next generation mobile communication system has been developed for introducing several new messaging systems having increased volume of data. In the entire authentication techniques in mobile communications, the authenticity of a subscriber is checked by the server or switch at the starting time up of communication (call). These authentication techniques are based on application of cryptographic algorithms and functions for subscriber’s authentication, but do not provide any message authentication method. In this paper, we propose an artificial intelligence based subscriber message authentication scheme. Message server performs a feasibility study of subscriber writing characteristics i.e. writing habit or style from subscriber’s past messages. It assigns different relative grades according to the appearance in the past messages i.e. frequency of sentences, idioms with salutation words and phrasal verbs appearing like most frequently, more frequently, less frequently used sentences, idioms with salutations and phrasal verbs in those messages. It ascertains the theory of artificial intelligence and thereof derives fuzzy sets from the relative grades which are obtained from number of occurrence of those sentences or idioms or phrasal verbs in a message. Now applying fuzzy operations on fuzzy sets, the server or switch validates the authenticity of a subscriber. This paper also reports how human intelligence can be efficiently introduced to a message server for checking authenticity of the subscribers.
International Journal of Computer Theory and Engineering | 2010
Chandan Koner; Chandan Tilak Bhunia; Ujjwal Maulik
Remote systems authentication schemes need more research and investigation due to increasing of hackers and attacks with the population of wired and wireless traffic. All of the popular remote user and system authentication schemes are fixed authentication and provides only entity authentication, not provides any data authentication. Recently Das proposed a flexible remote systems authentication scheme using smart card (8) that checks authenticity of user as well as remote system. In this paper, we show that Dass scheme is not withstand the modification attack, reverse XOR attack and adversary system attack. We have proposed Modified Dass scheme which serves as entity authentication as well as data authentication. We have applied Automatic Variable Password technique (AVP) to make the password unbreakable by changing it session to session. Application of AVP made the Dass scheme a Time Variant Authentication scheme that checks the authenticity of remote user time to time. We show that how Modified Dass scheme defenses modification attack, reverse XOR attack and adversary system attack.
international conference on future computer and communication | 2009
C. Koner; Chandan Tilak Bhunia; Ujjwal Maulik
Authentication in sending information is a great research challenge. Many different authentication schemes have been invented to improve the security and efficiency due to increasing of threats and attacks with the increasing volume of traffic. There is a need for analysis the efficiency and security of authentication schemes to apply them in specific application. For this purpose, an analysis of few authentication schemes is made with several parameters of interest in this paper. We observe that no scheme is suitable for all applications neither any application is suitable invariably.
Computer Engineering and Intelligent Systems | 2012
Bikramjit Sarkar; Chandan Tilak Bhunia; Ujjwal Maulik
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 | 2012
Avijit Bhowmick; Chandan Koner; Chandan Tilak Bhunia