11 results on '"Kougianos, Elias"'
Search Results
2. FlexiChain 2.0: NodeChain Assisting Integrated Decentralized Vault for Effective Data Authentication and Device Integrity in Complex Cyber-Physical Systems
- Author
-
Alkhodair, Ahmad J., Mohanty, Saraju P., Kougianos, Elias, Alkhodair, Ahmad J., Mohanty, Saraju P., and Kougianos, Elias
- Abstract
Distributed Ledger Technology (DLT) has been introduced using the most common consensus algorithm either for an electronic cash system or a decentralized programmable assets platform which provides general services. Most established reliable networks are unsuitable for all applications such as smart cities applications, and, in particular, Internet of Things (IoT) and Cyber Physical Systems (CPS) applications. The purpose of this paper is to provide a suitable DLT for IoT and CPS that could satisfy their requirements. The proposed work has been designed based on the requirements of Cyber Physical Systems. FlexiChain is proposed as a layer zero network that could be formed from independent blockchains. Also, NodeChain has been introduced to be a distributed (Unique ID) UID aggregation vault to secure all nodes' UIDs. Moreover, NodeChain is proposed to serve mainly FlexiChain for all node security requirements. NodeChain targets the security and integrity of each node. Also, the linked UIDs create a chain of narration that keeps track not merely for assets but also for who authenticated the assets. The security results present a higher resistance against four types of attacks. Furthermore, the strength of the network is presented from the early stages compared to blockchain and central authority. FlexiChain technology has been introduced to be a layer zero network for all CPS decentralized applications taking into accounts their requirements. FlexiChain relies on lightweight processing mechanisms and creates other methods to increase security.
- Published
- 2023
3. Consensus Algorithms of Distributed Ledger Technology -- A Comprehensive Analysis
- Author
-
Alkhodair, Ahmad J., Mohanty, Saraju P., Kougianos, Elias, Alkhodair, Ahmad J., Mohanty, Saraju P., and Kougianos, Elias
- Abstract
The most essential component of every Distributed Ledger Technology (DLT) is the Consensus Algorithm (CA), which enables users to reach a consensus in a decentralized and distributed manner. Numerous CA exist, but their viability for particular applications varies, making their trade-offs a crucial factor to consider when implementing DLT in a specific field. This article provided a comprehensive analysis of the various consensus algorithms used in distributed ledger technologies (DLT) and blockchain networks. We cover an extensive array of thirty consensus algorithms. Eleven attributes including hardware requirements, pre-trust level, tolerance level, and more, were used to generate a series of comparison tables evaluating these consensus algorithms. In addition, we discuss DLT classifications, the categories of certain consensus algorithms, and provide examples of authentication-focused and data-storage-focused DLTs. In addition, we analyze the pros and cons of particular consensus algorithms, such as Nominated Proof of Stake (NPoS), Bonded Proof of Stake (BPoS), and Avalanche. In conclusion, we discuss the applicability of these consensus algorithms to various Cyber Physical System (CPS) use cases, including supply chain management, intelligent transportation systems, and smart healthcare., Comment: 50 pages, 20 figures
- Published
- 2023
4. Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles
- Author
-
Sadhu, Pintu Kumar, Yanambaka, Venkata P., Mohanty, Saraju P., Kougianos, Elias, Sadhu, Pintu Kumar, Yanambaka, Venkata P., Mohanty, Saraju P., and Kougianos, Elias
- Abstract
With the rapid growth of new technological paradigms such as the Internet of Things (IoT), it opens new doors for many applications in the modern era for the betterment of human life. One of the recent applications of the IoT is the Internet of Vehicles (IoV) which helps to see unprecedented growth of connected vehicles on the roads. The IoV is gaining attention due to enhancing traffic safety and providing low route information. One of the most important and major requirements of the IoV is preserving security and privacy under strict latency. Moreover, vehicles are required to be authenticated frequently and fast considering limited bandwidth, high mobility, and density of the vehicles. To address the security vulnerabilities and data integrity, an ultralight authentication scheme has been proposed in this article. Physical Unclonable Function (PUF) and XOR function are used to authenticate both server and vehicle in two message flow which makes the proposed scheme ultralight, and less computation is required. The proposed Easy-Sec can authenticate vehicles maintaining low latency and resisting known security threats. Furthermore, the proposed Easy-Sec needs low overhead so that it does not increase the burden of the IoV network. Computational ( around 4 ms) and Communication (32 bytes) overhead shows the feasibility, efficiency, and also security features are depicted using formal analysis, Burrows, Abadi, and Needham (BAN) logic, and informal analysis to show the robustness of the proposed mechanisms against security threats.
- Published
- 2022
5. PharmaChain: A Blockchain to Ensure Counterfeit Free Pharmaceutical Supply Chain
- Author
-
Bapatla, Anand K., Mohanty, Saraju P., Kougianos, Elias, Bapatla, Anand K., Mohanty, Saraju P., and Kougianos, Elias
- Abstract
Access to essential medication is a primary right of every individual in all developed, developing and underdeveloped countries. This can be fulfilled by pharmaceutical supply chains (PSC) in place which will eliminate the boundaries between different organizations and will equip them to work collectively to make medicines reach even the remote corners of the globe. Due to multiple entities, which are geographically widespread, being involved and very complex goods and economic flows, PSC is very difficult to audit and resolve any issues involved. This has given rise to many issues, including increased threats of counterfeiting, inaccurate information propagation throughout the network because of data fragmentation, lack of customer confidence and delays in distribution of medication to the place in need. Hence, there is a strong need for robust PSC which is transparent to all parties involved and in which the whole journey of medicine from manufacturer to consumer can be tracked and traced easily. This will not only build safety for the consumers, but will also help manufacturers to build confidence among consumers and increase sales. In this article, a novel Distributed Ledger Technology (DLT) based transparent supply chain architecture is proposed and a proof-of-concept is implemented. Efficiency and scalability of the proposed architecture is evaluated and compared with existing solutions., Comment: 25 pages, 15 figures
- Published
- 2022
6. Everything You wanted to Know about Smart Agriculture
- Author
-
Mitra, Alakananda, Vangipuram, Sukrutha L. T., Bapatla, Anand K., Bathalapalli, Venkata K. V. V., Mohanty, Saraju P., Kougianos, Elias, Ray, Chittaranjan, Mitra, Alakananda, Vangipuram, Sukrutha L. T., Bapatla, Anand K., Bathalapalli, Venkata K. V. V., Mohanty, Saraju P., Kougianos, Elias, and Ray, Chittaranjan
- Abstract
The world population is anticipated to increase by close to 2 billion by 2050 causing a rapid escalation of food demand. A recent projection shows that the world is lagging behind accomplishing the "Zero Hunger" goal, in spite of some advancements. Socio-economic and well being fallout will affect the food security. Vulnerable groups of people will suffer malnutrition. To cater to the needs of the increasing population, the agricultural industry needs to be modernized, become smart, and automated. Traditional agriculture can be remade to efficient, sustainable, eco-friendly smart agriculture by adopting existing technologies. In this survey paper the authors present the applications, technological trends, available datasets, networking options, and challenges in smart agriculture. How Agro Cyber Physical Systems are built upon the Internet-of-Agro-Things is discussed through various application fields. Agriculture 4.0 is also discussed as a whole. We focus on the technologies, such as Artificial Intelligence (AI) and Machine Learning (ML) which support the automation, along with the Distributed Ledger Technology (DLT) which provides data integrity and security. After an in-depth study of different architectures, we also present a smart agriculture framework which relies on the location of data processing. We have divided open research problems of smart agriculture as future research work in two groups - from a technological perspective and from a networking perspective. AI, ML, the blockchain as a DLT, and Physical Unclonable Functions (PUF) based hardware security fall under the technology group, whereas any network related attacks, fake data injection and similar threats fall under the network research problem group., Comment: 45 pages, 27 Figures
- Published
- 2022
7. SaYoPillow: A Blockchain-Enabled, Privacy-Assured Framework for Stress Detection, Prediction and Control Considering Sleeping Habits in the IoMT
- Author
-
Rachakonda, Laavanya, Bapatla, Anand K., Mohanty, Saraju P., Kougianos, Elias, Rachakonda, Laavanya, Bapatla, Anand K., Mohanty, Saraju P., and Kougianos, Elias
- Abstract
Considering today's lifestyle, people just sleep forgetting the benefits it provides to the human body. The reasons for not having a productive sleep could be many. Smart-Yoga Pillow (SaYoPillow) is envisioned as a device that may help in recognizing the importance of a good quality sleep to alleviate stress while establishing a measurable relationship between stress and sleeping habits. A system that analyzes the sleeping habits by continuously monitoring the physiological changes that occur during rapid eye movement (REM) and non-rapid eye movement (NREM) stages of sleep is proposed in the current work. In addition to the physiological parameter changes, factors such as sleep duration, snoring range, eye movement, and limb movements are also monitored. The SaYoPillow system is processed at the edge level with the storage being at the cloud. Not having to compromise the user's privacy, SaYoPillow proposes secure data transmission for both uploading and retrieving, and secure storage and communications as an attempt to reduce malicious attacks on healthcare. A user interface is provided for the user to control data accessibility and visibility. SaYoPillow has 96% accuracy which is close to other existing research works. However, SaYoPillow is the only work with security features as well as only work that considers sleeping habits for stress., Comment: 38 pages, 22 figures and 6 Tables
- Published
- 2020
8. PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks
- Author
-
Puthal, Deepak, Mohanty, Saraju P., Yanambaka, Venkata P., Kougianos, Elias, Puthal, Deepak, Mohanty, Saraju P., Yanambaka, Venkata P., and Kougianos, Elias
- Abstract
In today's connected world, resource constrained devices are deployed for sensing and decision making applications, ranging from smart cities to environmental monitoring. Those recourse constrained devices are connected to create real-time distributed networks popularly known as the Internet of Things (IoT), fog computing and edge computing. The blockchain is gaining a lot of interest in these domains to secure the system by ignoring centralized dependencies, where proof-of-work (PoW) plays a vital role to make the whole security solution decentralized. Due to the resource limitations of the devices, PoW is not suitable for blockchain-based security solutions. This paper presents a novel consensus algorithm called Proof-of-Authentication (PoAh), which introduces a cryptographic authentication mechanism to replace PoW for resource constrained devices, and to make the blockchain application-specific. PoAh is thus suitable for private as well as permissioned blockchains. Further, PoAh not only secures the systems, but also maintains system sustainability and scalability. The proposed consensus algorithm is evaluated theoretically in simulation scenarios, and in real-time hardware testbeds to validate its performance. Finally, PoAh and its integration with the blockchain in the IoT and edge computing scenarios is discussed. The proposed PoAh, while running in limited computer resources (e.g. single-board computing devices like the Raspberry Pi) has a latency in the order of 3 secs., Comment: 26 pages, 18 figures
- Published
- 2020
9. PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE)
- Author
-
Mohanty, Saraju P., Yanambaka, Venkata P., Kougianos, Elias, Puthal, Deepak, Mohanty, Saraju P., Yanambaka, Venkata P., Kougianos, Elias, and Puthal, Deepak
- Abstract
This article presents the first-ever blockchain which can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE). This article presents a unique concept of blockchain that integrates hardware security primitives called Physical Unclonable Functions (PUFs) to solve scalability, latency, and energy requirement challenges and is called PUFchain. Data management and security (and privacy) of data, devices, and individuals, are some of the issues in the IoE architectures that need to be resolved. Integrating the blockchain into the IoE environment can help solve these issues and helps in the aspects of data storage and security. This article introduces a new blockchain architecture called PUFchain and introduces a new consensus algorithm called "Proof of PUF-Enabled Authentication" (PoP) for deployment in PUFchain. The proposed PoP is the PUF integration into our previously proposed Proof-of-Authentication (PoAh) consensus algorithm and can be called "Hardware-Assisted Proof-of-Authentication (HA-PoAh)". However, PUF integration is possible in the existing and new consensus algorithms. PoP utilizes PUFs which are responsible for generating a unique key that cannot be cloned and hence provide the highest level of security. A PUF uses the nanoelectronic manufacturing variations that are introduced during the fabrication of an integrated circuit to generate the keys. Hence, once generated from a PUF module, the keys cannot be cloned or generated from any other module. PUFchain uses a PUF and Hashing module which performs the necessary cryptographic functions. Hence the mining process is offloaded to the hardware module which reduces the processing times. PoP is approximately 1,000X faster than the well-established Proof-of-Work (PoW) and 5X faster than Proof-of-Authentication (PoAh)., Comment: 37 pages, 22 figures, 6 Tables
- Published
- 2019
10. cSeiz: An Edge-Device for Accurate Seizure Detection and Control for Smart Healthcare
- Author
-
Sayeed, Md Abu, Mohanty, Saraju P., Kougianos, Elias, Sayeed, Md Abu, Mohanty, Saraju P., and Kougianos, Elias
- Abstract
Epilepsy is one of the most common neurological disorders affecting up to 1% of the world's population and approximately 2.5 million people in the United States. Seizures in more than 30% of epilepsy patients are refractory to anti-epileptic drugs. An important biomedical research effort is focused on the development of an energy efficient implantable device for the real-time control of seizures. In this paper we propose an Internet of Medical Things (IoMT) based automated seizure detection and drug delivery system (DDS) for the control of seizures. The proposed system will detect seizures and inject a fast acting anti-convulsant drug at the onset to suppress seizure progression. The drug injection is performed in two stages. Initially, the seizure detector detects the seizure from the electroencephalography (EEG) signal using a hyper-synchronous signal detection circuit and a signal rejection algorithm (SRA). In the second stage, the drug is released in the seizure onset area upon seizure detection. The design was validated using a system-level simulation and consumer electronics proof of concept. The proposed seizure detector reports a sensitivity of 96.9% and specificity of 97.5%. The use of minimal circuitry leads to a considerable reduction of power consumption compared to previous approaches. The proposed approach can be generalized to other sensor modalities and the use of both wearable and implantable solutions, or a combination of the two., Comment: 24 pages, 16 figures
- Published
- 2019
11. iVAMS 1.0: Polynomial-Metamodel-Integrated Intelligent Verilog-AMS for Fast, Accurate Mixed-Signal Design Optimization
- Author
-
Mohanty, Saraju P., Kougianos, Elias, Mohanty, Saraju P., and Kougianos, Elias
- Abstract
Electronic circuit behavioral models built with hardware description/modeling languages such as Verilog-AMS for system-level simulations are typically functional models. They do not capture the physical design (layout) information of the target design. Numerous iterations of post-layout design adjustments are usually required to ensure that design specifications are met with the presence of layout parasitics. In this paper a paradigm shift of the current trend is presented that integrates layout-level information in Verilog-AMS through metamodels such that system-level simulation of a mixed-signal circuit/system is realistic and as accurate as true parasitic netlist simulation. The simulations performed with these parasitic-aware models can be used to estimate system performance without layout iterations. We call this new form of Verilog-AMS as iVAMS (i.e. Intelligent Verilog-AMS). We call this iVAMS 1.0 as it is simple polynomial-metamodel integrated Intelligent Verilog-AMS. As a specific case study, a voltage-controlled oscillator (VCO) Verilog-AMS behavioral model and design flow are proposed to assist fast PLL design space exploration. The PLL simulation employing quadratic metamodels achieves approximately 10X speedup compared to that employing the layout extracted, parasitic netlist. The simulations using this behavioral model attain high accuracy. The observed error for the simulated lock time and average power dissipation are 0.7% and 3%, respectively. This behavioral metamodel approach bridges the gap between layout-accurate but fast simulation and design space exploration. The proposed method also allows much shorter design verification and optimization to meet stringent time-to-market requirements. Compared to the optimization using the layout netlist, the runtime using the behavioral model is reduced by 88.9%., Comment: 25 pages, 13 figures
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.