Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sachin D. Babar is active.

Publication


Featured researches published by Sachin D. Babar.


The Third International Conference on Network Security & Applications (CNSA-2010) | 2010

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)

Sachin D. Babar; Parikshit N. Mahalle; Antonietta Stango; Neeli R. Prasad; Ramjee Prasad

IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.


international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011

Proposed embedded security framework for Internet of Things (IoT)

Sachin D. Babar; Antonietta Stango; Neeli R. Prasad; Jaydip Sen; Ramjee Prasad

IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.


Computer and Information Science | 2010

Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges

Parikshit N. Mahalle; Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad

One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.


Vitae-revista De La Facultad De Quimica Farmaceutica | 2013

Jamming attack: Behavioral modelling and analysis

Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad

The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade the performance of WSN, e.g. energy consumption, throughput, and delay. These are biggest obstacle to make WSN greener. The aim of the paper is to model the behavior of jamming attack and analyze its effect on performance of WSN. Jamming attack jams the traffic in network by blocking the channel. The behavioral modelling and analysis of jamming attack in realistic situations (e.g. sensing in industrial application by following all network rules), gives the clear understanding of jamming attack execution. The paper also presents the possibility of jamming attack in cluster-based WSN, i.e. intelligent cluster head (CH) jamming attack. This degrades the performance of WSN around 30% more than normal reactive jamming attack. The paper finally proposes the requirements for designing the efficient solution against jamming attack.


International Journal of Pervasive Computing and Communications | 2014

CMKMS: Cluster-based mobile key management scheme for wireless sensor network

Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad

Purpose – The paper aims to address wireless sensor network (WSN) security by proposing new cluster-based mobile key management scheme (CMKMS). The growing demands of WSNs in variety of real-time and mission-critical applications increase the challenges in terms of energy efficiency, security and mobility. The security is important to avoid malicious attacks and improve the energy efficiency, while mobility helps to improve the reachability of network. The CMKMS algorithm focuses on the management and maintenance of keys under cluster-based mobile WSN network. Design/methodology/approach – The paper studied the related work in the area of key management and compared the different key management algorithms according to the technique used. The comparative study shows that the available key management algorithms are efficient in terms of security, but they are not scaleable enough to the changing conditions of network and do not work efficiently under node mobility. The research uses cluster-based approach for improving scalability, where cluster head (CH) acts as a key manager. The work developed by considering both static and mobile CH. Findings – The CMKMS considers two phases, first for key maintenance which establishes the two private keys, home key for own cluster and foreign key when node moves from one cluster to another. The second phase maintains the keys when CH moves from one cluster to another. The proposed algorithm improves the efficiency of key management algorithm in terms of security, mobility, energy efficiency and scalability of network. The simulation of scheme in different realistic situation shows that proposed solution shows less computational overheads, energy consumption and delay as compared with state-of-art solution. Research limitations/implications – The research is validated using computer-based simulation, which limits the testing of research by considering external environmental conditions. Therefore, research can be further test using WSN test bed. Practical implications – The research address the issues in key management, developed the scaleable, and node mobility supportable key management algorithms, for addressing the demands of growing WSN applications. Originality/value – This paper accomplish the security of WSN using scaleable and mobility-supported key management algorithms.


2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) | 2013

Countermeasure for intelligent cluster-head jamming attack in wireless sensor network

Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad

The emergence of wireless sensor networks (WSNs) in last few decades, increases the efficiency and accuracy of large number of applications such as defense, habitat monitoring, industrial and many more. The efficiency and accuracy of WSN is largely affected by the different security attacks and emergence of new attacks. Therefore, it is necessary to analyze and countermeasure the new ways of security attacks to make WSN proficient. The objective of the paper is to address this problem. The paper proposes the intelligent cluster head (CH) jamming attack, which will take place in cluster-based network. This attack disturbs the communication inside and outside the cluster. The paper also proposes the solution to countermeasure the attack during both inter- and intra- cluster communication. The proposed solution shows good performance efficiency of WSN in presence of intelligent CH jamming attack.


Archive | 2015

Security Framework and Jamming Detection for Internet of Things

Sachin D. Babar


wireless personal multimedia communications | 2013

Game theoretic modelling of WSN jamming attack and detection mechanism

Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad


Journal of Cyber Security and Mobility | 2013

Activity Modelling and Countermeasures on Jamming Attack

Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad


security and privacy in mobile information and communication systems | 2011

Proposed on Device Capability based Authentication using AES-GCM for Internet of Things (IoT)

Sachin D. Babar; Parikshit N. Mahalle; Neeli R. Prasad; Ramjee Prasad

Collaboration


Dive into the Sachin D. Babar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Parikshit N. Mahalle

Savitribai Phule Pune University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kwang-Cheng Chen

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaydip Sen

Tata Consultancy Services

View shared research outputs
Researchain Logo
Decentralizing Knowledge