Browsing by Author "Deena Nath Gupta"
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
PublicationConference Paper Enterprises in the Era of Industry 5.0(Institute of Electrical and Electronics Engineers Inc., 2023) Kavita Bhatia; Santosh K. Pandey; Vivek K Singh; Deena Nath GuptaAdaptation of IT in enterprises is a challenging process. Many visions of industrial revolutions are currently being used as well as many futuristic trends are in discussion. It is emerging that humans and robots can work together. A clear comparison between Industry 4.0 and Industry 5.0 visions is presented on the basis of different criteria. As for as Industry 5.0's first vision is considered, Human-Robot co-working is going to be a challenging task for Enterprises. The authors presented eleven issues an Enterprise can face in Human-centric development. The purpose of this study is to discuss possible security issues related to Human-centric transformation from the perspective of both the Enterprise and the workforce. Several studies focusing on organizational robotics are expected to be influenced by the issues identified in this report. The authors discussed possible legal, regulatory, psychological, socio-ethical, and ethical issues that may arise from Human-centric Transformation. In addition, the authors pointed out that the changing roles of IT and HR departments pose challenges to the co-working of humans and robots. © 2023 Bharati Vidyapeeth, New Delhi.PublicationArticle Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism(Multidisciplinary Digital Publishing Institute (MDPI), 2023) Kavita Bhatia; Santosh K. Pandey; Vivek K. Singh; Deena Nath GuptaThe security of web applications in an enterprise is of paramount importance. To strengthen the security of applications, the identification and mitigation of vulnerabilities through appropriate countermeasures becomes imperative. The Open Web Application Security Project (OWASP) Top 10 API Security Risks, 2023 Edition, indicates the prominent vulnerabilities of API security risks. Broken authentication, however, is placed in second position with level-3 exploitability, level-2 prevalence, level-3 detectability, and level-3 technical impact. To mitigate this vulnerability, many mitigation strategies have been proposed by using the cryptographic primitives wherein two techniques, namely hashing and PUF, are used. Some of the proposals have integrated the concepts of hashing and PUF. However, the unnecessarily lengthy and complex mathematics used in these proposals makes them unsuitable for current API-based application scenarios. Therefore, in this paper, the authors propose a privacy-preserving authentication protocol that incorporates the capability of both mechanisms in an easy and low-complexity manner. In addition to overcoming existing limitations, the proposed protocol is tested to provide more security properties over existing schemes. Analysis of their performance has demonstrated that the proposed solutions are secure, efficient, practical, and effective for API-based web applications in an enterprise environment. © 2023 by the authors.PublicationArticle Leveraging Sponge Construction for Chaos-Driven Hash Function Generation(IGI Global, 2025) Kavita Bhatia; Santosh Kumar Pandey; Vivek Kumar Singh; Deena Nath GuptaUsing hashes for user authentication allows systems to verify identity without storing or transmitting plaintext passwords, preventing theft or leakage. At the system level, access is granted if the hash matches and denied if it doesn't. A recent development in this area is chaos-based hashing, though it's not fully matured due to its complex and flawed design principles. This work proposes a novel chaos-based hash using a sponge construction. The design includes a four-state finite automaton to build the chaos structure, with a sponge mechanism for optimal bit mixing. Statistical evaluations show that the proposed hash offers strong diffusion, confusion, collision resistance, and balanced distribution. In addition to its provable security, it extends indifferentiability from random oracles in sponge-based constructions. Moreover, compared to existing chaos-based hashes, the proposed solution achieves superior performance. © 2025 IGI Global. All rights reserved.PublicationConference Paper Research Challenges in IoT enablement for Enterprise(Institute of Electrical and Electronics Engineers Inc., 2023) Kavita Bhatia; Santosh K. Pandey; Vivek K Singh; Deena Nath GuptaAlthough Internet of Things (IoT) is not a new terminology yet finding its suitability to many of the enterprises is challenging. Because almost all the applications are dynamic in nature, the devices under an IoT environment are supposed to be functional as usual under the scalable conditions also. Both, the constrained nature of the devices and the scalable nature of the applications, are together restricting the enterprises to adopt the new IoT environment. In this work, the authors are presenting an overview of different applications under an IoT environment such as Mobile IoT (M-IoT), Smart Home, Smart City, Smart Grid, Smart Transport, Industrial IoT (IIoT) and Internet of Healthcare Things (IoHT) etc. The study will be focused on different parameters such as seamless communication, device security, communication security and applicability. Some findings of this study indicate that the security considerations of many applications are not addressed properly. The authors will also elaborate major research challenges to work upon related to different applications in an IoT environment. © 2023 Bharati Vidyapeeth, New Delhi.PublicationArticle Securing Ports of Web Applications Against Cross Site Port Attack (XSPA) by Using a Strong Session Identifier (Session ID)(John Wiley and Sons Inc, 2025) Kavita Bhatia; Santosh Kumar Pandey; Vivek Kumar Singh; Deena Nath GuptaXSPA vulnerability can be attacked by stealing the cookie's information. In this case, it becomes utmost necessary to secure the information written in a cookie. A cookie contains a session ID that is a unique number generated by the server. This session ID must be a large random number so that no one can guess a valid session ID in real-time. Numerous research studies have been accomplished on the same but the area still persist gaps in view of emerging threats, such as phishing, pharming, and DoS. This paper proposes a new random-number generator that produces unique numbers in bulk. This helps the server to match the high demand of unique session IDs from different clients. The proposed generator is suitable for all types of web applications, because it requires the smallest area of only 134 Gate Equivalent on the application specific integrated circuit (ASIC) for its execution. Additionally, the proposed generator passed all tests of EPCglobal. Total time delay of digital circuit and power analysis results presented in the subsequent sections are also in the favour of proposed generator. With the implementation of this proposed technique cookies are expected to be more secure as evident from try-out results. © 2025 The Author(s). IET Cyber-Physical Systems: Theory & Applications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology.
