Nitin Singh Chauhan

Work place: Jawahar Lal Nehru Technological University Kakinada, 533003, India

E-mail: raju.nitin@gmail.com

Website:

Research Interests: Information Security, Network Security, Information Systems, Information Retrieval, Multimedia Information System

Biography

Nitin Singh Chauhan obtained Master’s degree in computer application from Jai Narain Vyas University, Jodhpur, India in 2000.  He started his professional career as Project Executive with Institute for Development and Research in Banking Technology IDRBT (Established by Reserve Bank of India) Hyderabad India (2001-2005). He worked for AppLabs (2005-2006) as a Security Lead and at Genpact (2006-2008) as an Assistant Manager- Information Security. He was Senior Technology Architect at Infosys Limited (2008-2016). He is a Research Scholar at Jawahar Lal Nehru University, Kakinada. His research interest includes cloud security, strong authentication, information security, and sustainable IT. He has 4 granted patents and around 10 published research papers to his credit. Nitin holds multiple security certifications including Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA).

Author Articles
A Privacy-Aware Dynamic Authentication Scheme for IoT Enabled Business Services

By Nitin Singh Chauhan Ashutosh Saxena JVR Murthy

DOI: https://doi.org/10.5815/ijcnis.2019.06.04, Pub. Date: 8 Jun. 2019

Tech-savvy users are striving to bring automation and digitization in their lifestyle to make life more comfortable and efficient; Internet of Things (IoT) is an enabler in this direction. Technology advancements and new business opportunities are rapidly changing the IoT adoption landscape, and thereby security and privacy concerns have also started raising and realizing. The increasing number of IP enabled electronic devices, enormous data generation, and communication traffic have enhanced the attack surface for security and privacy violators. Many security attack scenarios are the result of poor identification and authentication mechanisms of communicating entities. In this paper, we present a secure scheme to perform a business transaction initiated by a smart device in the IoT environment. Scheme performs dynamic authentication of a business transaction while ensuring the privacy of the associated user(s). This scheme relies on Message Authentication Code (MAC) and dynamic key generation method to achieve a secure workflow. In this paper, we present a pluggable Roaming Smart Meters (RSM) concept to demonstrate the applicability of the proposed authentication scheme.

[...] Read more.
Other Articles