Sachin D. Babar
Aalborg University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sachin D. Babar.
The Third International Conference on Network Security & Applications (CNSA-2010) | 2010
Sachin D. Babar; Parikshit N. Mahalle; Antonietta Stango; Neeli R. Prasad; Ramjee Prasad
IoT is an intelligent collaboration of tiny sensors and devices giving new challenges to security and privacy in end to end communication of things. Protection of data and privacy of things is one of the key challenges in the IoT. Lack of security measures will result in decreased adoption among users and therefore is one of the driving factors in the success of the IoT. This paper gives an overview, analysis and taxonomy of security and privacy challenges in IoT. Finally, Security Model for IoT has been proposed.
international conference on wireless communication vehicular technology information theory and aerospace electronic systems technology | 2011
Sachin D. Babar; Antonietta Stango; Neeli R. Prasad; Jaydip Sen; Ramjee Prasad
IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives a detailed survey and analysis of embedded security, especially in the area of IoT. Together with the conventional security solutions, the paper highlights the need to provide in-built security in the device itself to provide a flexible infrastructure for dynamic prevention, detection, diagnosis, isolation, and countermeasures against successful breaches. Based on this survey and analysis, the paper defines the security needs taking into account computational time, energy consumption and memory requirements of the devices. Finally, this paper proposes an embedded security framework as a feature of software/hardware co-design methodology.
Computer and Information Science | 2010
Parikshit N. Mahalle; Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
One of the most profound changes today is the increase in mobility of portable yet powerful wireless devices capable of communicating via several different kinds of wireless radio networks of varying link-level characteristics. Requirement for identity is not adequately met in networks, especially given the emergence of ubiquitous computing devices that are mobile and use wireless communications. Addressing identity problem requires changes to the architecture for naming, addressing, and discovery. Challenges include resource discovery; ways to expose relevant privacy distinctions to users, naming and addressing that restricts precise knowledge of identity to authorized parties. This paper presents the identity management (IdM) framework for internet of things (IoT) with the study of existing systems, and addresses the key challenges.
Vitae-revista De La Facultad De Quimica Farmaceutica | 2013
Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade the performance of WSN, e.g. energy consumption, throughput, and delay. These are biggest obstacle to make WSN greener. The aim of the paper is to model the behavior of jamming attack and analyze its effect on performance of WSN. Jamming attack jams the traffic in network by blocking the channel. The behavioral modelling and analysis of jamming attack in realistic situations (e.g. sensing in industrial application by following all network rules), gives the clear understanding of jamming attack execution. The paper also presents the possibility of jamming attack in cluster-based WSN, i.e. intelligent cluster head (CH) jamming attack. This degrades the performance of WSN around 30% more than normal reactive jamming attack. The paper finally proposes the requirements for designing the efficient solution against jamming attack.
International Journal of Pervasive Computing and Communications | 2014
Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
Purpose – The paper aims to address wireless sensor network (WSN) security by proposing new cluster-based mobile key management scheme (CMKMS). The growing demands of WSNs in variety of real-time and mission-critical applications increase the challenges in terms of energy efficiency, security and mobility. The security is important to avoid malicious attacks and improve the energy efficiency, while mobility helps to improve the reachability of network. The CMKMS algorithm focuses on the management and maintenance of keys under cluster-based mobile WSN network. Design/methodology/approach – The paper studied the related work in the area of key management and compared the different key management algorithms according to the technique used. The comparative study shows that the available key management algorithms are efficient in terms of security, but they are not scaleable enough to the changing conditions of network and do not work efficiently under node mobility. The research uses cluster-based approach for improving scalability, where cluster head (CH) acts as a key manager. The work developed by considering both static and mobile CH. Findings – The CMKMS considers two phases, first for key maintenance which establishes the two private keys, home key for own cluster and foreign key when node moves from one cluster to another. The second phase maintains the keys when CH moves from one cluster to another. The proposed algorithm improves the efficiency of key management algorithm in terms of security, mobility, energy efficiency and scalability of network. The simulation of scheme in different realistic situation shows that proposed solution shows less computational overheads, energy consumption and delay as compared with state-of-art solution. Research limitations/implications – The research is validated using computer-based simulation, which limits the testing of research by considering external environmental conditions. Therefore, research can be further test using WSN test bed. Practical implications – The research address the issues in key management, developed the scaleable, and node mobility supportable key management algorithms, for addressing the demands of growing WSN applications. Originality/value – This paper accomplish the security of WSN using scaleable and mobility-supported key management algorithms.
2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) | 2013
Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
The emergence of wireless sensor networks (WSNs) in last few decades, increases the efficiency and accuracy of large number of applications such as defense, habitat monitoring, industrial and many more. The efficiency and accuracy of WSN is largely affected by the different security attacks and emergence of new attacks. Therefore, it is necessary to analyze and countermeasure the new ways of security attacks to make WSN proficient. The objective of the paper is to address this problem. The paper proposes the intelligent cluster head (CH) jamming attack, which will take place in cluster-based network. This attack disturbs the communication inside and outside the cluster. The paper also proposes the solution to countermeasure the attack during both inter- and intra- cluster communication. The proposed solution shows good performance efficiency of WSN in presence of intelligent CH jamming attack.
Archive | 2015
Sachin D. Babar
wireless personal multimedia communications | 2013
Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
Journal of Cyber Security and Mobility | 2013
Sachin D. Babar; Neeli R. Prasad; Ramjee Prasad
security and privacy in mobile information and communication systems | 2011
Sachin D. Babar; Parikshit N. Mahalle; Neeli R. Prasad; Ramjee Prasad