Skip to main content

Showing 1–14 of 14 results for author: Gope, P

.
  1. arXiv:2404.09722  [pdf, other

    cs.LG cs.AI cs.CR

    VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication

    Authors: Xun Yuan, Yang Yang, Prosanta Gope, Aryan Pasikhani, Biplab Sikdar

    Abstract: In the current artificial intelligence (AI) era, the scale and quality of the dataset play a crucial role in training a high-quality AI model. However, good data is not a free lunch and is always hard to access due to privacy regulations like the General Data Protection Regulation (GDPR). A potential solution is to release a synthetic dataset with a similar distribution to that of the private data… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  2. arXiv:2403.13743  [pdf, other

    cs.CR

    Quantum-Secure Certificate-Less Conditional Privacy-Preserving Authentication for VANET

    Authors: Girraj Kumar Verma, Nahida Majeed Wani, Prosanta Gope

    Abstract: Vehicular Ad-hoc Networks (VANETs) marked a pronounced change in the Intelligent Transport System and Smart Cities through seamless vehicle communication to intensify safety and efficacy. However, a few authentication schemes have been devised in the literature to ensure the authenticity of the source and information in the post-quantum era. The most popular base for such construction is lattice-b… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Paper submitted to IEEE TDSC under review

  3. arXiv:2403.07817  [pdf, other

    cs.CR

    UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience

    Authors: Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling

    Abstract: Introducing Small Cell Networks (SCN) has significantly improved wireless link quality, spectrum efficiency and network capacity, which has been viewed as one of the key technologies in the fifth-generation (5G) mobile network. However, this technology increases the frequency of handover (HO) procedures caused by the dense deployment of cells in the network with reduced cell coverage, bringing new… ▽ More

    Submitted 4 April, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

  4. arXiv:2403.01438  [pdf, other

    cs.LG

    Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting

    Authors: Asif Iqbal, Prosanta Gope, Biplab Sikdar

    Abstract: Accurate load forecasting is crucial for energy management, infrastructure planning, and demand-supply balancing. Smart meter data availability has led to the demand for sensor-based load forecasting. Conventional ML allows training a single global model using data from multiple smart meters requiring data transfer to a central server, raising concerns for network requirements, privacy, and securi… ▽ More

    Submitted 12 March, 2024; v1 submitted 3 March, 2024; originally announced March 2024.

  5. arXiv:2403.00464  [pdf, other

    cs.CR cs.AR

    Attacking Delay-based PUFs with Minimal Adversary Model

    Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar

    Abstract: Physically Unclonable Functions (PUFs) provide a streamlined solution for lightweight device authentication. Delay-based Arbiter PUFs, with their ease of implementation and vast challenge space, have received significant attention; however, they are not immune to modelling attacks that exploit correlations between their inputs and outputs. Research is therefore polarized between develo** modelli… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: 13 pages, 6 figures, journal

    MSC Class: 68M25 ACM Class: I.2.8

  6. arXiv:2309.07730  [pdf, other

    cs.CR cs.AI

    AIDPS:Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks

    Authors: Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar

    Abstract: Underwater Acoustic Sensor Networks (UW-ASNs) are predominantly used for underwater environments and find applications in many areas. However, a lack of security considerations, the unstable and challenging nature of the underwater environment, and the resource-constrained nature of the sensor nodes used for UW-ASNs (which makes them incapable of adopting security primitives) make the UW-ASN prone… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  7. arXiv:2307.16149  [pdf, other

    cs.LG cs.AI cs.CR

    A Novel DDPM-based Ensemble Approach for Energy Theft Detection in Smart Grids

    Authors: Xun Yuan, Yang Yang, Asif Iqbal, Prosanta Gope, Biplab Sikdar

    Abstract: Energy theft, characterized by manipulating energy consumption readings to reduce payments, poses a dual threat-causing financial losses for grid operators and undermining the performance of smart grids. Effective Energy Theft Detection (ETD) methods become crucial in mitigating these risks by identifying such fraudulent activities in their early stages. However, the majority of current ETD method… ▽ More

    Submitted 13 January, 2024; v1 submitted 30 July, 2023; originally announced July 2023.

  8. arXiv:2303.13204  [pdf, other

    cs.CR

    A Privacy-Preserving Energy Theft Detection Model for Effective Demand-Response Management in Smart Grids

    Authors: Arwa Alromih, John A. Clark, Prosanta Gope

    Abstract: The detection of energy thefts is vital for the safety of the whole smart grid system. However, the detection alone is not enough since energy thefts can crucially affect the electricity supply leading to some blackouts. Moreover, privacy is one of the major challenges that must be preserved when dealing with clients' energy data. This is often overlooked in energy theft detection research as most… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  9. arXiv:2211.13258  [pdf, other

    cs.AI cs.RO eess.SY

    Online Dynamic Reliability Evaluation of Wind Turbines based on Drone-assisted Monitoring

    Authors: Sohag Kabir, Koorosh Aslansefat, Prosanta Gope, Felician Campean, Yiannis Papadopoulos

    Abstract: The offshore wind energy is increasingly becoming an attractive source of energy due to having lower environmental impact. Effective operation and maintenance that ensures the maximum availability of the energy generation process using offshore facilities and minimal production cost are two key factors to improve the competitiveness of this energy source over other traditional sources of energy. C… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: A modified version of this work has been published in the 2022 International Conference on Computing, Electronics & Communications Engineering (iCCECE). This work is a draft author version

  10. arXiv:2207.05890  [pdf, other

    cs.CR cs.DB

    E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System

    Authors: Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar

    Abstract: The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare-industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and security-critical nature of EHRs, it is essential to consider the security and privacy issues of storing and sharing EHR. However, existing security s… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  11. arXiv:2207.04692  [pdf, other

    cs.CR cs.CV

    PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

    Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin

    Abstract: As the demand for highly secure and dependable lightweight systems increases in the modern world, Physically Unclonable Functions (PUFs) continue to promise a lightweight alternative to high-cost encryption techniques and secure key storage. While the security features promised by PUFs are highly attractive for secure system designers, they have been shown to be vulnerable to various sophisticated… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

    Comments: 13 pages main text, 7 pages supplementary material (total 20 pages), 8 figures, submitted to IEEE Transactions on Information Forensics and Security

  12. arXiv:2206.13055  [pdf, other

    cs.CR

    Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid

    Authors: Rohini Poolat Parameswarath, Prosanta Gope, Biplab Sikdar

    Abstract: The popularity of Electric Vehicles (EVs) has been rising across the globe in recent years. Smart grids will be the backbone for EV charging and enable efficient consumption of electricity by the EVs. With the demand for EVs, associated cyber threats are also increasing. Users expose their personal information while charging their EVs, leading to privacy threats. This paper proposes a user-empower… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: 13 pages

  13. arXiv:2206.09870  [pdf, other

    cs.CR

    Privacy-aware Secure Region-based Handover for Small Cell Networks in 5G-enabled Mobile Communication

    Authors: Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling

    Abstract: The 5G mobile communication network provides seamless communications between users and service providers and promises to achieve several stringent requirements, such as seamless mobility and massive connectivity. Although 5G can offer numerous benefits, security and privacy issues still need to be addressed. For example, the inclusion of small cell networks (SCN) into 5G brings the network closer… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

  14. arXiv:2205.09170  [pdf, other

    cs.CR

    Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

    Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope

    Abstract: IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) have grown in importance in recent years, with the Routing Protocol for Low Power and Lossy Networks (RPL) emerging as a major enabler. However, RPL can be subject to attack, with severe consequences. Most proposed IDSs have been limited to specific RPL attacks and typically assume a stationary environment. In this article, we propose… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.