Professional Documents
Culture Documents
https://doi.org/10.1007/s10586-021-03390-5 (0123456789().,-volV)(0123456789().
,- volV)
Marimuthu Karuppiah7
Abstract
In recent years, online education systems (OES) are improved tremendously with the development of information com-
munication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources
using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligence and soft
computing approaches. The physical verification of the traditional education system is replaced with a secure authenti-
cation process for a human-centered predictive intelligence system. Many authentication schemes are available to provide
authentication in human predictive OES, but they are suffering from authentication delay, computation complexity,
communication cost, and user privacy. Hence, it is very difficult to provide data security using resource-limited IoT
devices. In this work, a secure and efficient anonymous authentication scheme is introduced to avoid the mischievous
learners and subject experts entering into OES. Also, the proposed scheme provides the essential security requirement of
user privacy to OES users until they behave properly. If any chance for dispute, the system discloses the privacy of
misbehaving users. The security and performance analysis section ensures that the proposed system provides a secure
infrastructure to support sustainable education using resource-limited IoT devices by consuming very little computation
and communication delay compared with other existing schemes.
Keywords Anonymous authentication Conditional privacy Soft computing Artificial intelligence Online education
system IoT
3
King Abdullah II School of Information Technology,
& Marimuthu Karuppiah University of Jordan, Amman 11942, Jordan
marimuthume@gmail.com 4
School of Computer and Communication Engineering,
Subramani Jegadeesan University of Science and Technology, Beijing 100083,
jegadeesans@rediffmail.com China
Mohammad S. Obaidat 5
Department of Computer Science and Engineering,
msobaidat@gmail.com; m.s.obaidat@ieee.org University College of Engineering Tindivanam, Tindivanam,
Pandi Vijayakumar Tamil Nadu, India
vijibond2000@gmail.com; pvijayakumar@ieee.org 6
Department of Electronics and Communication, GMR
Maria Azees Institute of Technology, Srikakulam, Andhra Pradesh, India
azeesmm@gmail.com 7
Department of Computer Science and Engineering, SRM
Institute of Science and Technology, Delhi-NCR Campus,
1
Department of Electronics and Communication Engineering, Ghaziabad, Uttar Pradesh 201204, India
M. Kumarasamy College of Engineering, Karur,
Tamil Nadu 639113, India
2
College of Computing and Informatics University of Sharjah,
Sharjah 27272, UAE
123
Cluster Computing
123
Cluster Computing
123
Cluster Computing
Subject Subject
Expert Expert
Subject Expert
to Learner
Communication
Subject
Expert
Learner Learner
Learner to
Learner
Learner Communication Learner
123
Cluster Computing
each authentic user in OES has the license or rights to registration process is completed, the li can connect to
know the content of information. Each information is the RC through SEi for the further process with the help
appended by SEi and the OLDs digital signature before of their secret keys which are collected from the RC
communication starts. Therefore, the receiver can authen- during the registration process.
ticate the received information and check the integrity and Generation of anonymous certificate the OES users need
legitimacy of the information. The proposed system uses a to follow the following steps to generate the necessary
bilinear pairing method to check the integrity and legiti- anonymous certificates.
macy of the information received. Step 1 every user needs to choose the random
numbers a1 ; a2 ; :::; am 2 Z n ; where, m n as the one-
time private key and calculate the corresponding one-
123
Cluster Computing
¼ gr ri þx
1 g1
i
baþk1
d2 ¼ uaþk2 ¼ gx1
bv
¼ X1
After calculating the values of bu ; bv ; d; d1 ; d2 , the
user calculates the contender CN ¼ HðDIDli k X 1 k Y 1 k bdu
d01 ¼
Si k bu k bv k bk k d1 k d2 Þ and calculates the value e1 , beu1
e2 as follows,
bðaþa
u
mÞ
e1 ¼ ðam k1 Þq ¼
buðam k1 Þ
e2 ¼ ðam k2 Þq
¼ bðaþa
u
m am þk 1 Þ
1 ¼
time anonymous signature sign ¼ g1
ak þHðAMÞ
to authenticate baþk
v
2
123
Cluster Computing
qu ; qv ; x; x1 ; x2
¼ qlv 1 þl2 ¼ x1
l
qu ¼ X 1 1 :gk1 xb :xc
x02 ¼
qv ¼ ST i :X 1 2
l xa
qlv 2 :qlu 1 k
x ¼ ðk þ l1 Þq ¼ :qv
qx v
x1 ¼ qlv 1 þl2
qlv 2 :qlu 1
x2 ¼ qlu 1 :qlv 2 l1 ¼ kþl1
:qkv
qv
123
Cluster Computing
If it holds, the li will accept the LM. Otherwise, it will be P believes fresh(X), P believes Q said X
rejected immediately. P believes Q believes X
Proof of correctness P believes Q believes X if P believes X is sent currently
HðLMÞ and Q has said X.
e signSE ; SPj g2
Jurisdiction rule (Rule 3)
1
mj þHðLMÞ mj HðLMÞ P believes Q controls X, P believes Q believes X
¼ e g1 ; g2 g2
P believes X
1
mj þHðLMÞ mj þHðLMÞ P believes X if P believes Q has the jurisdiction for X
¼ e g1 ; g2
and P believes Q believes X.
Decomposition rule (Rule 4)
P sees (X, Y)
1
:m þHðLMÞ
mj þHðLMÞ j
(a)
¼ eðg1 ; g2 Þ P sees (X)
¼ eðg1 ; g2 Þ ðAs per bilinear propertyÞ P believes fresh (X)
(b)
P believes fresh (X, Y)
Conditional tracking if any dispute, the RC will collect
the certificate of a specific SEi , C SE ¼ P believes (X, Y)
(c)
fqu k qv k CN SE k xa k xb k xc g and computes the P believes (X)
following. Several postulates are used to decompose messages and
qbv
l
ðST i :X 1 2 Þb
bl
ST bi :X 1 2
bl
ST bi :X 1 2 verify their freshness. Informally, (a) If P observes
al ¼ ¼ ¼ ¼ ST bi everything, it will be able to detect X. (b) If one of the
Y1 2 ðgb1 Þal2 ðga1 Þbl2 X1 2
bl
components is fresh, then combination X; Y is fresh and (c)
The number of different message components implies
The RC can easily trace the actual identity of SEi by belief in them independently.
knowing the value of ST bi in the tracking list. After finding Proof of proposed anonymous authentication protocol
the actual identity of compromised SEi , the RC can with-
draw the privacy of a malicious SEi to avoid further harm 1. By applying Rule 1, the following can be derived.
to the OES. C SE
SEi believes SEi $ li ; SEi sees fM SE gCSE
SEi believes li said fM SE g
123
Cluster Computing
li believes SEi controls f AM g; li believes SEi believes f AM g the li and hence bv is also at random. Furthermore, the bv is
li believes f AM g calculated by using an elliptic curve discrete logarithm
problem (ECDLP). Hence, finding T i from bv is very
h 1 i
8. Rule 4 is used to derive the following. complex. Computing T i from bv is o q2þoð1Þ loglogn ,
li believes li Ck SEi where n is defined as the number of li [16]. Also, finding a
$
Ck
from the set of k one-time public keys ð2k 1Þ is very
li believes SEi believesli $ SEi complex. Therefore, it is very difficult for attackers to
Since li believes fresh ðCNÞ, so it is possible to crake an anonymous certificate to execute an imperson-
obtain li believes fresh ðCN þ 1Þ. ation attack by using T i and a within a particular period.
Hence, the following can be derived. Therefore, the opponent cannot generate authentic
li believes fresh ðfCN þ 1gCSE Þ. Because certificates.
li believes CSE ; li sees fCN SE þ 1gCk .
10. The following can be derived based on the rule1. 5.2.2 Resistance to fake information attack
li believes SEi said fCN SE þ 1gCSE
If an adversary K needs to transmit the fake information to
11. Rule 2 is used to obtain the following. OES users, then he/she need to calculate two security
li believes SEi believes fCN SE þ 1gCSE parameters Si and DIDli , such that Ai ¼ Si DIDli ¼ X 1 .
Here, the Si ¼ gr1
i
and DIDli ¼ gr1i þx are calculated for
At last, the following can be derived. every user in the RC in offline mode. Hence, it is very
difficult for an K to calculate the r i and x from the Si and
li believes SEi believes li Ck SEi DIDli due to the ECDLP problem. The computational
$ h 1 i
Likewise, the following can be obtained. complexity in calculating x is o q2þoð1Þ loglogr . Here, the r
SEi believes li believes li CSE SEi is considered as the number of users registered in RC. The
$ r i is selected randomly for each user and hence DIDli is
also random. Hence, it increases the complexity of calcu-
5.2 Informal security analysis lating r i as o½2r 1. Therefore, to send fake information to
OES users, an K need to find the value of r i and x to
In this section, the security properties of the proposed compromise Si DIDli ¼ X 1 for transmitting fake infor-
h 1 i
schemes, such as data integrity, authentication, and user mation to other users is o q2þoð1Þ loglogr :½2r 1 .
privacy are analyzed informally. In the proposed system, Hence, it is very difficult to send fake information to OES
user-generated certificates and signatures are important users.
parameters for ensuring security against impersonating,
masquerade, and key duplication attacks. In this method, 5.2.3 Resistance to the message modification attack
the generation of valid certificates and signatures are not
possible for an outside attacker. Because K au is stored In the proposed system, the li sends an anonymous message
securely. Therefore, it is very difficult for attackers to send AM ¼ ðmsg k sign k bk k C k Þ and then SEi sends a mes-
fake information to the OES and execute key duplication sage M SE ¼ ðLM k signSE k C SE k SPj Þ to the other OES
attacks. The proposed system is secure against masquerade entities. Here, the information is transferred through the
attacks. Because, to execute a masquerade attack, the wireless environment. So, it increases the opportunity for
opponent must find the one-time key of an authenticated an opponent to modify the message msg and LM. To
user and the key assigned by the RC. Also, it is difficult for maintain the integrity of the message from attackers, the
the opponent to find the details from the registration pro- 1
a þHðAMÞ
cedure since it is done offline in RC. proposed system affixes the user signature sign ¼ g1k
on every message before communication. Here, ak is the
5.2.1 Resistance to an impersonation attack temporary private key. Therefore, this ak is only known to
the specific li . Hence, it is very difficult to generate the
To execute this attack, an attacker needs to find the secret same signature by an attacker. To generate the signature,
parameter T i and also need to identify bv by using the the attacker needs to find the value of ak . But the value of
generated anonymous certificate ak will get changed from time to time. Even though, if
C k ¼ fbk k Si k DIDli k bu k bv k CN k e1 k e2 g. The bv is attackers found the value of ak , they cannot find the msg.
calculated as bv ¼ T i :X a1 , where a is selected randomly by Because ak is used only one time and it is not used for
123
Cluster Computing
In the proposed system, every message AM ¼ ðmsg k The amount of time required to verify the certificate and
sign k bk k C k Þ is attached with an anonymous signature the signature is considered to be the computational cost.
1
a þHðAMÞ The computational cost of the proposed system is com-
sign ¼ g1k and certificate
pared with the existing systems such as D. Boneh et al.
C k ¼ fbk k Si k DIDli k bu k bv k CN k e1 k e2 g. There-
scheme [15], Z. Gong et al. scheme [16], X. Lin et al.
fore, it is very difficult to find the real signature and cer-
scheme [17], R. Lu et al. scheme [18], and J. Shao et al.
tificate of the particular information. Therefore, an K
scheme [19]. Let us consider that, the time needed to
acquires zero knowledge about the real user of a specific
perform the pairing operation is T p , the time needed to
signature and certificate. Also, the value of the signature
perform the hash function is T h , the time required to per-
and certificate consists of temporary private keys and
form the multiplication is T m and T ex is considered to be
dummy identities. Even, if found the values of temporary
the time spent to perform the exponential function. For the
private keys and dummy identities to generate the signature
proposed work, a pairing-based cryptography library is
and certificate, an K cannot reveal the privacy of the li or
used to perform T p , T h , T m and T ex . To calculate the
SEi . Because the computed value gives zero knowledge
computational cost of this scheme, the proposed protocol is
about the li or SEi .
implemented using a 2-GHz computer system with a
memory capacity of 4-GB, Cygwin 1.7.35–15 with the gcc
version 4.9.2 [20]. Every result is evaluated for 100 sim-
ulation runs and the average results are taken into account.
123
Cluster Computing
123
Cluster Computing
123
Cluster Computing
Table 3 Comparison of various security properties 10. Saleh, M.M., Wahid, F.A.: A review of security threats by the
unauthorized in the e-learning. Int. J. Comput. Technol. 14(11),
Security features Schemes 6240–6243 (2015)
11. Tarus, K., Gichoya, D., Muumbo, A.M.: Challenges of imple-
[25] [26] [27] [28] Proposed
menting e-learning in Kenya: a case of Kenyan public universi-
Authentication ties. Int. Rev. Res. Open Distrib. Learn. 16(1), 120–141 (2015)
12. Amin, R., Islam, S., Biswas, G., Giri, D., Khan, M., Kumar, N.: A
Confidentiality 9 9 more secure and privacy-aware anonymous user authentication
Data integrity scheme for distributed mobile cloud computing environments.
Privacy preservation 9 9 Secur. Commun. Netw. 9(17), 4650–4666 (2016)
13. Wang, M., Liu, D., Zhu, L., Xu, Y., Wang, F.: LESPP: light-
Anonymity 9 9
weight and efficient strong privacy preserving authentication
Nonrepudiation 9 scheme for secure VANET communication. Computing 98(7),
Replay attack 685–708 (2014)
Unlinkability 9 14. Memon, I., Hussain, I., Akhtar, R., Chen, G.: Enhanced privacy
9 9 9
and authentication: an efficient and secure anonymous commu-
nication for location based service using asymmetric cryptogra-
phy scheme. Wirel. Pers. Commun. 84(2), 1487–1508 (2014)
15. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the
Weil pairing. J. Cryptol. 17(4), 297–319 (2004)
tracking mechanism to disclose the actual identity of the 16. Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificate-less
mischievous li or SEi to improve the performance of OES. aggregate signatures from bilinear maps. In: Proceedings of the
The security and performance analysis section ensures that 8th ACIS International Conference on Software Engineering,
the proposed system performs better than the other existing Artificial Intelligence, Networking and Parallel/Distributed
Computing (SNPD), August 2007, vol. 3, pp. 188–193
systems in terms of computational and communication 17. Lin, X., Sun, X., Ho, P.-H., Shen, X.: GSIS: a secure and privacy
costs. Hence, it is very suitable for resource-limited IoT preserving protocol for vehicular communications. IEEE Trans.
based OES. In the future, an automatic authentication Veh. Technol. 56(6), 3442–3456 (2007)
system can be performed by artificial intelligence and soft 18. Lu, R., Lin, X., Luan, T.-H.: Pseudonym changing at social spots:
an effective strategy for location privacy in VANETs. IEEE
computing techniques. Trans. Veh. Technol. 61(1), 86–96 (2012)
19. Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous
Acknowledgment This work is supported in part by PR of China authentication protocol for VANETs. IEEE Trans. Veh. Technol.
Ministry of Education Distinguished Possessor Grant given to Prof. 65(3), 1711–1720 (2016)
Obaidat under number: MS2017BJKJ003. 20. Cygwin: Linux Environment Emulator for Windows. http://www.
cygwin.com/. Accessed 3 Feb 2021
21. Zeng, X., Xu, G., Zheng, X., Xiang, Y., Zhou, W.: E-AUA: an
References efficient anonymous user authentication protocol for mobile IoT.
IEEE Access 6(2), 1506–1519 (2019)
1. Liagkou, V., Stylios, C., Petunin, A.: Handling privacy and 22. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key
concurrency in an online educational evaluation system. Balt. cryptography. In: Advances in Cryptology-Asiacrypt’03, LNCS,
J. Mod. Comput. 7(1), 86–98 (2019) vol. 2894, pp. 452–473. Springer, 2003
2. Zhao, Y., Li, S., Jiang, L.: Secure and efficient user authentica- 23. Chen, X., Zhang, F., Kim, K.: A new ID-based group signature
tion scheme based on password and smart card for multiserver scheme from bilinear pairings. In: Proceedings of WISA’03,
environment. Secur. Commun. Netw. 2018(1), 1–13 (2018) LNCS, vol. 2908, pp. 585–592. Springer, 2003
3. Konan, M., Wang, W.: A secure mutual batch authentication 24. Zhang, Z., Wong, D., Xu, J., Feng, D.: Certificateless public-key
scheme for patient data privacy preserving in WBAN. Sensors signature: security model and efficient construction. In: Pro-
19(7), 1608 (2019) ceedings of ACNS 2006, LNCS, vol. 3989, pp. 293–308.
4. Agarkar, A., Agrawal, H.: LRSPPP: lightweight R-LWE-based Springer, 2006
secure and privacy-preserving scheme for prosumer side network 25. Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network
in smart grid. Heliyon 5(3), e01321 (2019) security: a fuzzy attribute-based sign-cryption scheme. IEEE J.
5. Adetoba, B.T., Awodele, O., Kuyoro, S.O.: E-learning security Sel. Areas Commun. 31(9), 37–46 (2013)
issues and challenges: a review. J. Sci. Res. Stud. 3(5), 96–100 26. Cagalaban, G., Kim, S.: Towards a secure patient information
(2016) access control in ubiquitous healthcare systems using identity-
6. Labrecque, L., Markos, E., Darmody, A.: Addressing online based sign-cryption. In: Proceedings of the 13th International
behavioral advertising and privacy implications: a comparison of Conference on Advanced Communication Technology, Seoul,
passive versus active learning approaches. J. Mark. Educ. 2(33), Korea, pp. 863–867, 2011.
273–284 (2019) 27. Braeken, A., Porambage, P., Stojmenovic, M., Lambrinos, L.:
7. Attwell, G.: E-portfolios—the DNA of the personal learning eDAAAS: efficient distributed anonymous authentication and
environment? J. e-Learn. Knowl. Soc. 3(2), 39–61 (2007) access in smart homes. Int. J. Distrib. Sens. Netw. 12(12), 1–11
8. Barik, N., Karforma, S.: Risks and remedies in e-learning system. (2016)
Int. J. Netw. Secur. Appl. 4(1), 51–59 (2012) 28. Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote
9. Pastore, R., Chellman, A.: Motivations for residential students to anonymous authentication schemes for wireless body area net-
participate in online courses. Q. Rev. Distance Educ. 10(3), works. IEEE Trans. Parallel Distrib. Syst. 25(2), 332–342 (2014)
263–277 (2009)
123
Cluster Computing
29. Mahdi, A.O., Alhabbash, M.I., Abu-Naser, S.S.: An intelligent Subramani Jegadeesan received
tutoring system for teaching advanced topics in information the B.E. Degree in Electronics
security. Worldw. J. Multidiscip. Res. Dev. 2(12), 1–9 (2016) and Communication Engineer-
30. Ikedinachi, A.P., Misra, S., Assibong, P.A., Olu-Owolabi, E.F., ing from Periyar University,
Maskeliūnas, R., Damasevicius, R.: Artificial intelligence, smart Salem, India, in 2004, the M.E.
classrooms and online education in the 21st century: implications Degree in Communication Sys-
for human development. J. Cases Inf. Technol. 21(3), 66–79 tems from the Anna University
(2019) of Technology, Coimbatore,
31. Popenici, S.A., Kerr, S.: Exploring the impact of artificial intel- India, in 2009, and the Ph.D.
ligence on teaching and learning in higher education. Res. Pract. Degree from the Faculty of
Technol. Enhanc Learn. 12(1), 22 (2017) Information and Communica-
32. Cukurova, M., Kent, C., Luckin, R.: Artificial intelligence and tion Engineering, Anna Univer-
multimodal data in the service of human decision-making: a case sity, Chennai, in 2016. He is
study in debate tutoring. Br. J. Educ. Technol. 50(6), 3032–3046 currently an Associate Professor
(2019) with the M. Kumarasamy Col-
33. Vijayakumar, P., Obaidat, M., Azees, M.: SK Hafizul Islam, N lege of Engineering, Karur, India. His main thirst research areas
Kumar, ‘‘Efficient and secure anonymous authentication with include energy management in wireless sensor networks and network
location privacy for IoT-based WBANs.’’ IEEE Trans. Ind. and information security.
Inform. (2019). https://doi.org/10.1109/TII.2019.2925071
34. Vijayakumar, P., Chang, V., Jegatha Deborah, L., Balusamy, B., Mohammad S. Obaidat (Fellow
Shynu, P.G.: Computationally efficient privacy preserving of IEEE and Fellow of SCS)
anonymous mutual and batch authentication schemes for vehic- received the Ph.D. Degree in
ular ad hoc networks. Future Gener. Comput. Syst. 78, 943–955 Computer Engineering with a
(2018) Minor in Computer Science
35. Obaidat, M.S., Traore, I., Woungang, I.: Biometric-Based Phys- from The Ohio State University,
ical and Cybersecurity Systems. Springer, Cham (2019) Columbus, OH, USA. Among
36. Obaidat, M.S., Boudriga, N.: Security of e-Systems and Com- his previous positions are
puter Networks. Cambridge University Press, New York (2007) Advisor to the President of the
37. Vijayakumar, P., Azees, M., Chang, V., Deborah, J., Balusamy, Philadelphia University for
B.: Computationally efficient privacy preserving authentication Research, Development and
and key distribution techniques for vehicular ad hoc networks. Information Technology, the
Clust. Comput. 20(3), 2439–2450 (2017) President and the Chair of
38. Xia, X., Ji, S., Vijayakumar, P., Shen, J., Rodrigues, J.J.P.C.: An Board of Directors, Society for
efficient anonymous authentication and key agreement Molding and Simulation Inter-
scheme with privacy-preserving for smart cities. Int. J. Distrib. national, SCS, the Senior Vice President of SCS, the Dean of the
Sens. Netw. (2021). https://doi.org/10.1177/15501477211026804 College of Engineering, Prince Sultan University, the Chair and
39. Azees, M., Vijayakumar, P., Karuppiah, M., Nayyar, A.: An Tenured Professor of the Department of Computer and Information
efficient anonymous authentication and confidentiality preserva- Science; the Director of the MS Graduate Program in Data Analytics,
tion schemes for secure communications in wireless body area Fordham University, the Chair and Tenured Professor of the
networks. Wirel. Netw. 27(3), 2119–2130 (2021) Department of Computer Science, the Director of the Graduate Pro-
40. Karuppiah, M., Saravanan, R.: A secure remote user mutual gram, Monmouth University, the Tenured Full Professor of the King
authentication scheme using smart cards. J. Inf. Secur. Appl. Abdullah II School of Information Technology, University of Jordan,
19(4–5), 282–294 (2014) The PR of China Ministry of Education Distinguished Overseas
41. Karuppiah, M., Saravanan, R.: A secure authentication Professor of the University of Science and Technology Beijing,
scheme with user anonymity for roaming service in global China, and an Honorary Distinguished Professor of the Amity
mobility networks. Wirel. Pers. Commun. 84(3), 2055–2078 University: A Global University. He is currently the Founding Dean
(2015) and the Professor of the College of Computing and Informatics, The
University of Sharjah, United Arab Emirates. He is also an interna-
Publisher’s Note Springer Nature remains neutral with regard to tionally known Academic/Researcher/Scientist/Scholar. He is also a
jurisdictional claims in published maps and institutional affiliations. Fellow of SCS. He received many best paper awards for his papers,
including ones from IEEE ICC, IEEE Globecom, AICSA, CITS,
SPECTS, and DCNET international conferences. He also received
best paper awards from the IEEE Systems Journal in 2018 and in
2019 (two best paper awards). In 2020, he received the four best paper
awards from IEEE Systems Journal. In 2021, he also received and the
IEEE Systems best paper award. He also received many other
worldwide awards for his technical contributions, including the 2018
IEEE ComSocTechnical Committee on Communications Software
Technical Achievement Award for contribution to cybersecurity,
wireless networks computer networks and modeling and simulation,
the SCS prestigious McLeod Founder’s Award, the Presidential
Service Award, and the SCS Hall of Fame-Lifetime Achievement
Award for his technical contribution to modeling and simulation and
for his outstanding visionary leadership and dedication to increasing
the effectiveness and broadening the applications of modeling and
simulation worldwide. He also received the SCS Outstanding Service
123
Cluster Computing
Award. He was awarded the IEEE CITS Hall of Fame Distinguished India. He has already published the research articles in some of the
and Eminent Award. He has chaired numerous (over 175) interna- reputed journals, such as the IEEE Transactions on Intelligent
tional conferences and has given numerous (over 175) keynote Transportation Systems, Cluster Computing (Springer), and IET
speeches worldwide. He has served as the ABET/CSAB Evaluator intelligent transport systems. His research interests include security in
and on the IEEE CS Fellow Evaluation Committee. He has served as wireless sensor networks and VANETs.
the IEEE CS Distinguished Speaker/Lecturer and an ACM Distin-
guished Lecturer. Since 2004, has been serving as the SCS Distin- Marimuthu Karuppiah (Senior
guished Lecturer. He has received extensive research funding and Member, IEEE) received the
published to date about 1200 refereed technical articles—about half B.E. Degree in Computer Sci-
of them are journal articles, over 95 books, and over 70 book chapters. ence and Engineering from
He is also the Editor-in-Chief of three scholarly journals and an Editor Madurai Kamaraj University,
of many other international journals. He is also the Founding Editor- Madurai, India, in 2003, the
in Chief of Security and Privacy journal (Wiley). He is also the M.E. Degree in Computer Sci-
Founder or Co-Founder of five international conferences. ence and Engineering from
Anna University, Chennai,
Pandi Vijayakumar received the India, in 2005, and the Ph.D.
B.Eng. Degree from Madurai Degree in Computer Science
Kamarajar University in 2002, and Engineering from VIT
the M.Eng. Degree in Computer University, Vellore, India, in
Science and Engineering from 2015. He was an Associate
the Karunya Institute of Tech- Professor with VIT University,
nology in 2005, and the Ph.D. Vellore, India. He is currently a Professor with the Department of
Degree in Computer Science Computing Science and Engineering, SRM Institute of Science and
and Engineering from Anna Technology, Delhi-NCR Campus, India. He has published more than
University, Chennai, in 2013. 40 research articles in SCI indexed journals. Also, he has published
He was the Former Dean of more than 40 research articles in Scopus indexed journals and inter-
University College of Engi- national conferences. His current research interests include cryptog-
neering, Tindivanam and pre- raphy and wireless network security, in particular, authentication and
sently working as Assistant encryption schemes. He is a Life Member of the Cryptology Research
Professor in the Department of Society of India (CRSI) and the Computer Society of India (CSI), and
Computer Science and Engineering. He is guiding many Ph.D. a Member of ACM.
scholars in the field of network and cloud security. He has published
various quality papers in reputed journals like IEEE Transactions,
Elsevier, Springer, IET, Taylor and Francis, Wiley, etc. His main
thrust research areas are key management in network security and
multicasting in computer networks.
123