Loading web-font TeX/Math/Italic
Anushri Rajendran - IEEE Xplore Author Profile

Showing 1-25 of 232 results

Filter Results

Show

Results

The rapid growth of electric vehicle and autonomous vehicle populations has led to explosive expansion of IoV data being transmitted in the wireless communication infrastructure. Advances in IoV technologies also resulted in more complex and dynamic communication protocols/patterns, which are hard for the underlying wireless network to satisfy. Besides, security considerations of IoV communication...Show More
Blockchain systems have evolved over decades, addressing the inefficiencies and high costs associated with centralized architectures. Among various consensus mechanisms, committee-based hybrid Byzantine Fault Tolerant (BFT) protocols are a fundamental approach to blockchain consensus. However, designing a hybrid BFT consensus protocol that ensures fairness, responsiveness, and formal security rema...Show More
The anonymity of blockchain may be exploited by criminals for illegal fund transfers, thus a conditional privacy-preserving scheme is important for blockchain regulation. Currently, sharding technology under a multi-chain architecture is used to improve blockchain scalability. However, current conditional privacy-preserving schemes cannot work on this architecture. To protect the privacy of the tr...Show More
Owing to frequent traffic accidents, the violation reporting service is a promising method to enhance road safety in vehicular ad hoc networks (VANETs). However, to implement such a service, it is critical to ensure security, privacy, and efficiency when vehicles send messages to roadside units (RSU). In this study, to address these issues, a vehicle violation reporting service is proposed using r...Show More
In vehicular networks, caching service content on edge servers (ESs) is a widely accepted strategy for promptly responding to vehicle requests, reducing communication overhead, and improving service experience. However, implementing such an architecture requires addressing the challenges associated with ES response data reliability and communication security. In this study, to tackle the ES respon...Show More
Vehicular intrusion detection systems (VIDSs) play a crucial role in protecting the security of vehicular ad hoc networks (VANETs). Recently, numerous researchers have proposed effective vehicular intrusion detection systems to protect the security of VANETs. However, some existing vehicle intrusion systems are susceptible to catastrophic forgetfulness in the process of implementing incremental up...Show More
In the Vehicle-to-Everything (V2X) communication system, the presence of ambiguous warnings significantly increases the risk of severe accidents, posing a substantial threat to the safety of autonomous driving. It is crucial to detect such confusing warnings to avoid danger. Existing solutions to address this issue heavily rely on trust entities or are constructed based on number theory assumption...Show More
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing medical conditions between doctors and patients. However, sensitive information such as patient medical data may face security challenges such as data leakage and abuse during transm...Show More
Sidechain techniques enhance blockchain scalability and interoperability, enabling decentralized exchanges and cross-chain operations for wrapped digital assets. However, existing PoW sidechains face challenges, including centralization, high communication costs, and incomplete PoW-based security proofs. This paper introduces SFPoW, a Secure and Flexible Proof-of-Work sidechains for cross-chain in...Show More
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients’ medical experiences and improving the efficiency of public medical services. However, concerns regarding security and privacy may hinder the widespread implementation and development of IoMT in practical applications. Dynamic Searchable Symmetric Encryption (DSSE) can maintain search capabi...Show More
With the rapid development of vehicular ad-hoc networks (VANETs) and the increasing diversification of user demands, interactions between different management domains have become more frequent. Identity authentication is an effective way to establish cross-domain trust and secure communication. However, the existing cross-domain authentication schemes of VANETs are limited to the same management o...Show More
The development of cloud computing needs to continuously improve and perfect the privacy-preserving techniques for the user's confidential data. Multi-user join query, as an important method of data sharing, allows multiple legitimate data users to perform join query over the data owner's encrypted database. However, some existing join query protocols may face some challenges in the practical appl...Show More
Introducing the SDN paradigm can further improve the handover efficiency of mobile nodes, and researchers have proposed corresponding solutions to the security problems in the handover process. Some existing cryptography-based schemes delegate authentication to the fog nodes to accelerate the handover process, however, the computation and communication overheads are not low enough to satisfy the r...Show More
Permissioned blockchains play a significant role in various application scenarios. Applications built on heterogeneous permissioned blockchains need to migrate data from one chain to another, aiming to keep their competitiveness and security. Thus, data migration across heterogeneous chains is a building block of permissioned blockchains. However, existing data migration protocols across heterogen...Show More
With the widespread deployment of vehicular ad-hoc networks (VANETs), data sharing has garnered considerable attention as a core feature of VANETs. Attribute-based proxy re-encryption (ABPRE) enables fine-grained access control and provides flexible ciphertext updates. The initially authorized vehicle generates the re-encryption key to enable ciphertext-to-ciphertext conversion in the cloud, allow...Show More
The rapid evolution of the Industrial Internet of Things (IIoT) has necessitated increased device interactions across various management domains. This entails devices from different domains collaborating on the same production task. This poses significant challenges for the dynamics of cross-domain authentication schemes. Traditional cross-domain authentication schemes struggle to support seamless...Show More
In cryptography, side-channel analysis (SCA) is a technique used to recover cryptographic keys by examining the physical leakages that occur during the operation of cryptographic devices. Recent advancements in deep learning (DL) have greatly enhanced the extraction of crucial information from intricate leakage patterns. A considerable amount of research is dedicated to studying the SubByte (SB) o...Show More
Due to the rising requirement for data sharing, multi-data owner access control schemes have emerged, where a single data file is jointly owned by multiple data owners. Since the shared files contain information from multiple data owners, it is crucial to revoke malicious users to minimize harm when data leakage occurs. However, current multi-data owner solutions typically rely on a single data ow...Show More
Efficient and secure data sharing in the Internet of Vehicles (IoV) is critical for the advancement of intelligent transportation, particularly in the context of emerging 5G/6G networks and driverless technology. This has prompted researchers to explore Blockchain-based Internet of Vehicles (BIoV) solutions to address common issues in intelligent transportation systems (ITS). However, at the edge ...Show More
In Industrial Internet of Things (IIoT) systems, data sharing between industrial departments is often utilized to optimize management models and improve decision-making efficiency. To enable secure data sharing, authentication between smart devices is critical. However, existing authentication schemes do not comprehensively consider data anonymity, data traceability, pseudonym management, and flex...Show More
With the development of the Internet of Vehicles (IoV), data sharing as a key service for most IoV applications has emerged as an effective way to break down data silos and unlock the data's potential. In order to guarantee the security and confidentiality of the data-sharing process, various advanced cryptographic techniques have been proposed by both the research community and industry. As one o...Show More
The interconnected environment of the Internet of Vehicles (IoV) facilitates the development of various low-carbon and secure location-based services. However, sharing data with semi-trusted service providers poses serious security risks. In particular, it can threaten the confidentiality of past messages after the leakage of the user’s key. In this article, we propose an efficient and forward-sec...Show More
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and security as well as transparency and privacy could be considered as building blocks in the e-vote system. The blockchain could provide a public access board to reduce the storage costs for ...Show More
Internet of Medical Things-based healthcare system (IoMTHS) is a kind of industrial information system that integrates life monitoring, pathological inference and drug therapy. However, the sensitive nature and high value of its data make it a prime target for cyberattacks. Although many multiserver authentication protocols have been studied in recent years to ensure that only authorized users can...Show More
In the era of flourishing sustainable smart cities, with the accessibility of Internet and the persistent evolution of distributed computing, there is an increasing reliance on cloud/fog computing environments and online data storage platforms for secure data sharing. However, existing cryptographic schemes fall short in simultaneously satisfying security requirements such as bilateral fine-graine...Show More