Work place: C.R.Rao Advanced Institute of Mathematics, Statistics and Computer Science (AIMSCS), Hyderabad, 500046, India
E-mail: asaxena@crraoaimscs.res.in
Website:
Research Interests: Information Security, Network Security, Information Systems
Biography
Ashutosh Saxena M.Sc. (1990), M.Tech. (1992) and Ph.D. in Computer Science (1999). An industry expert and academician with over two decades of experience, 90+international publications, 26 granted patents, and a book on PKI: Concept, Design and Deployment (Tata McGraw Hill 2004) to his credit. Research interest: information security and privacy. Began career as a lecturer and computer engineer in the university and IUC-DAE facilities at Indore. Associate Professor at IDRBT (established by RBI), from 1998-2006. Worked at Infosys Ltd. (2006-16) as Principal Research Scientist & AVP. Member of the review board for many international journals, conferences and committees. Served as Adjunct Faculty at NIT Warangal & Professor and Dean R&D at CMR Technical Campus. Currently Professor (CS) at CRRAO-AIMSCS, UoH Campus, Hyderabad.
By Nitin Singh Chauhan Ashutosh Saxena JVR Murthy
DOI: https://doi.org/10.5815/ijcnis.2019.06.04, Pub. Date: 8 Jun. 2019
Tech-savvy users are striving to bring automation and digitization in their lifestyle to make life more comfortable and efficient; Internet of Things (IoT) is an enabler in this direction. Technology advancements and new business opportunities are rapidly changing the IoT adoption landscape, and thereby security and privacy concerns have also started raising and realizing. The increasing number of IP enabled electronic devices, enormous data generation, and communication traffic have enhanced the attack surface for security and privacy violators. Many security attack scenarios are the result of poor identification and authentication mechanisms of communicating entities. In this paper, we present a secure scheme to perform a business transaction initiated by a smart device in the IoT environment. Scheme performs dynamic authentication of a business transaction while ensuring the privacy of the associated user(s). This scheme relies on Message Authentication Code (MAC) and dynamic key generation method to achieve a secure workflow. In this paper, we present a pluggable Roaming Smart Meters (RSM) concept to demonstrate the applicability of the proposed authentication scheme.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals