curriculum vitae of odelu vanga -...

13
Curriculum Vitae of Odelu Vanga Dr. ODELU VANGA Research Professor (KRF Outstanding Young Foreign Scholar) The Second Science & Technology Building Sejong-Ro 2511, Korea University Sejong Metropolitan City 30019 South Korea (Republic of Korea) E-mail: [email protected] Home page: https://sites.google.com/site/odeluvanga/home EDUCATIONAL QUALIFICATIONS Ph. D. (Cryptography and Network Security) from Indian Institute of Technology Kharagpur Date of Joining : December 24, 2013 Date of Ph. D. Thesis submission : January 20, 2016 Date of Ph. D. Thesis Defense : June 24, 2016 Title of the Ph. D. Thesis: Design and Analysis of Hierarchical Access Control and User Authentication Protocols for Distributed Computer NetworksSupervisor : Prof. Adrijit Goswami M. Tech. (Computer Science & Data Processing) from Indian Institute of Technology Kharagpur. Year: 2009-2011. Percentage/CGPA: 8.66/10. M. Sc. (Applied Mathematics) from Kakatiya University, Warangal, India. Year: 2005-2007. Percentage/CGPA: 65.45 % (First Class). B.Sc. (Mathematics, Physics, and Computer Science) from Kakatiya University Warangal, India. Year: 2001-2004. Percentage/CGPA: 66 % (First Class). Class 12 (Mathematics, Physics, and Chemistry) from Board of Intermediate Education Andhra Pradesh, India. Year: 1999-2001. Percentage/CGPA: 76.5 % (First Class). Class 10 from Board of Secondary Education Andhra Pradesh, India. Year: 1999. Percentage/CGPA: 61 % (First Class). 1

Upload: others

Post on 20-Apr-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

Curriculum Vitae of Odelu Vanga

Dr. ODELU VANGA

Research Professor(KRF Outstanding Young Foreign Scholar)The Second Science & Technology BuildingSejong-Ro 2511, Korea UniversitySejong Metropolitan City 30019South Korea (Republic of Korea)

E-mail: [email protected]

Home page: https://sites.google.com/site/odeluvanga/home

EDUCATIONAL QUALIFICATIONS

• Ph. D. (Cryptography and Network Security) from Indian Institute of Technology KharagpurDate of Joining : December 24, 2013Date of Ph. D. Thesis submission : January 20, 2016Date of Ph. D. Thesis Defense : June 24, 2016Title of the Ph. D. Thesis:“Design and Analysis of Hierarchical Access Control and User Authentication Protocolsfor Distributed Computer Networks”Supervisor : Prof. Adrijit Goswami

• M. Tech. (Computer Science & Data Processing) from Indian Institute of Technology Kharagpur.Year: 2009-2011.Percentage/CGPA: 8.66/10.

• M. Sc. (Applied Mathematics) from Kakatiya University, Warangal, India.Year: 2005-2007.Percentage/CGPA: 65.45 % (First Class).

• B.Sc. (Mathematics, Physics, and Computer Science) from Kakatiya University Warangal, India.Year: 2001-2004.Percentage/CGPA: 66 % (First Class).

• Class 12 (Mathematics, Physics, and Chemistry) from Board of Intermediate Education AndhraPradesh, India.Year: 1999-2001.Percentage/CGPA: 76.5 % (First Class).

• Class 10 from Board of Secondary Education Andhra Pradesh, India.Year: 1999.Percentage/CGPA: 61 % (First Class).

1

Page 2: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

TEACHING & RESEARCH EXPERIENCE

• Research Professor, Dept. of Computer Convergence SoftwareKorea University, South KoreaDuration: December 2017 to till date.

• Assistant Professor in the Department of Computer Science and Engineering,Indian Institute of Information Technology Chittoor, Sri City, Andhra Pradesh, India.Duration : June 2016 to November 2017 (1 year and 6 months)

• Lecturer in the Department of Mathematics,Rajiv Gandhi University of Knowledge Technologies, Basar, Telangana, India.Duration: From June 2011 to December 2013 (2 years and 6 months).

AWARDS AND HONORS

• Selected as an Outstanding Young Foreign Scholar (Korean Research Fellowship - 2017) by Na-tional Research Foundation, the Government of S. Korea.

• Secured All India Fifth Rank in Graduate Aptitude Test in Engineering (GATE-2009) in Mathe-matics.

• Awarded Council for Scientific and Industrial Research - Junior Research Fellowship (CSIR-JRF)in Mathematical Sciences, 2008.

• Received prestigious CSIR Junior Research Fellowship during MTech at Indian Institute of Tech-nology Kharagpur, India.

• Received Ministry of Human Resource Development (MHRD), Govt. of India fellowship to do PhDat Indian Institute of Technology Kharagpur, India.

• Secured university sixth rank in M.Sc. Applied Mathematics in the academic year 2005 - 07.

RESEARCH CONTRIBUTIONS

I have explored different theoretical aspects of cryptographic solutions in the following areas, and appliedthem for various domains. I have specifically reduced the computational complexity of the proposed so-lutions in an optimistic way for various scenarios where lightweight devices would face critical computa-tional overheads like in eHealth domain. As far as research is concerned, I have published 45 InternationalJournals and Conferences.

Attribute-based access control• Developed efficient approaches for Attribute Based Encryption for lightweight devices in which low

computation and storage overhead are crucial.

• We also proposed lightweight secure solutions for mobile clients in which the sizes of both ciphertext and secret key are constant.

2

Page 3: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

Hierarchical access control• Developed an efficient theoretical model for secure key management in a large leaf class hierarchy.

It supports dynamic access control problems efficiently.

• Handled secure broadcasting with a time-bound cryptographic key assignment scheme in whichdistinct temporal keys are assigned for each user at distinct time periods. It supports individual usersubscription along with dynamic properties.

• We also addressed key management problems in general and linear hierarchies.

Remote user authenticationWe addressed several specific problems in the following topics and also proposed efficient authenticationprotocols that are secure under the widely accepted CK-adversary model:

• Authentication for Client-Server architecture

• Single Sign-on authentication for Multi-Server environment

• Authentication for Near Field Communication

• Authentication for Smart Grid environment

• Authentication for Internet-of-Things environment

• Key management in wireless sensor networks

• Authentication in vehicular ad-hoc networks

• Attribute-Based Authentication for thin clients

RESEARCH PUBLICATIONS

Accepted/Published International Journals

1. Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, and Willy Susilo. “ecureRemote User Authenticated Key Establishment Protocol for Smart Home Environment,” in IEEETransactions on Dependable and Secure Computing, 2017. In Press. (2016 SCI Impact Factor:2.926)

2. Mohammad Wazid, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Mauro Conti, and Minho Jo.“Design of Secure User Authenticated Key Management Protocol for Generic IoT Network,” inIEEE Internet of Things Journal, 2017. In Press. (2016 SCI Impact Factor: 7.596)

3. Vanga Odelu, Ashok Kumar Das, Mohammad Wazid, and Mauro Conti, “Provably Secure Authen-ticated Key Agreement Scheme for Smart Grid,” in IEEE Transactions on Smart Grid, 2016. InPress. (2014 SCI Impact Factor: 6.645)

3

Page 4: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

4. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, “SEAP: Secure and Efficient Authenti-cation Protocol for NFC Applications Using Pseudonyms,” in IEEE Transactions on ConsumerElectronics, Vol. 62, No. 1, pp. 30-38, 2016. (2015 SCI Impact Factor: 1.694) [This article is oneof the top 50 most frequently downloaded documents for Popular Articles (April - July 2016)]

5. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, “A Secure Biometrics-Based Multi-ServerAuthentication Protocol using Smart Cards,” in IEEE Transactions on Information Forensics andSecurity, Vol. 10, No. 9, pp. 1953 - 1966, Sept. 2015. (2014 SCI Impact Factor: 4.332) [Thisarticle is one of the top 50 most frequently downloaded documents for Popular Articles during Jun.- Nov. 2015]

6. Vanga Odelu, Ashok Kumar Das, Y. Sreenivasa Rao, Saru Kumari, Muhammad Khurram Khan,and Kim-Kwang Raymond Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secretkeys for cloud environment,” Special Issue on Cloud Computing Security and Privacy: Standardsand Regulations in Computer Standards & Interfaces (Elsevier), Vol. 54, Part 1, pp. 3 - 9, 2017.(2015 SCI Impact Factor: 1.268)

7. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, “A secure effective key management schemefor dynamic access control in a large leaf class hierarchy,” in Information Sciences (Elsevier), Vol.269, No. C, pp. 270 - 285, 2014. (2014 Impact Factor: 4.038) [This article has been downloaded orviewed 468 times since publication during the period October 2013 to September 2014]

8. Vanga Odelu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Neeraj Kumar, and YoungHo Park.“Efficient and Secure Time-key Based Single Sign-on Authentication for Mobile Devices,” in IEEEAccess, 2017, In Press, DOI: 10.1109/ACCESS.2017.2777840. (2016 SCI Impact Factor: 3.224)

9. Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar, Saru Kumari, Muhammad Khur-ram Khan, and Athanasios V. Vasilakos. “An efficient ECC-based provably secure three-factor userauthentication and key agreement protocol for wireless healthcare sensor networks,” in Computers& Electrical Engineering (Elsevier), 2017, Accepted. (2016 SCI Impact Factor: 1.570)

10. Mohammad Wazid, Ashok Kumar Das, Neeraj Kumar, Vanga Odelu, Alavalapati Goutham Reddy,Kisung Park, and YoungHo Park. “Design of Lightweight Authentication and Key Agreement Pro-tocol for Vehicular Ad Hoc Networks,” in IEEE Access, 2017, Accepted. (2016 SCI Impact Factor:3.224)

11. Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, XiongLi, and Adrijit Goswami, ”A Secure Anonymity Preserving Authentication Scheme for RoamingService in Global Mobility Networks,” in Wireless Personal Communications (Springer), 2017. InPress. (2015 SCI Impact Factor: 0.701)

12. Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, andMinho Jo, ”Expressive CP-ABE Scheme for Mobile Devices in IoT satisfying Constant-size Keysand Ciphertexts,” in IEEE Access, Vol. 5, pp. 3273 - 3283, 2017. (2015 SCI Impact Factor: 1.249)

13. Ashok Kumar Das, Anil Kumar Sutrala, Vanga Odelu and Adrijit Goswami, ”A Secure Smartcard-based Anonymous User Authentication Scheme for Healthcare Applications using Wireless MedicalSensor Networks,” in Wireless Personal Communications(Springer), Vol. 94, No. 3, pp. 1899 -1933, 2017. (2015 SCI Impact Factor: 0.701)

4

Page 5: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

14. Alavalapati Goutham Reddy, Eun-Jun Yoon, Ashok Kumar Das, Vanga Odelu, and Kee-Young Yoo,”Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks forMulti-Server Environment,” in IEEE Access, Vol. 5, pp. 3622 - 3639, 2017. (2015 SCI ImpactFactor: 1.249)

15. Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das and Vanga Odelu, Attribute-Based Au-thentication on the Cloud for Thin Clients, in The Journal of Supercomputing (Springer), pp. 1-33,2017. (2015 SCI Impact Factor: 1.088)

16. Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang, and Mohammad Wazid, ”Provablysecure authenticated key agreement scheme for distributed mobile cloud computing services,” inFuture Generation Computer Systems (Elsevier), Vol. 68, pp. 74 - 88, 2017. (2015 SCI ImpactFactor: 2.430)

17. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system, in Journalof King Saud University - Computer and Information Sciences(Elsevier), Vol. 28, No. 1, pp. 68 -81, 2016.

18. Vanga Odelu and Ashok Kumar Das, Design of a new CP-ABE with constant size secret keys forlightweight devices using elliptic curve cryptography, in Security and Communication Networks(Wiley), Vol. 9, No. 17, pp. 4048 - 4059, 2016. (2014 SCI Impact Factor: 0.720)

19. Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, and Vanga Odelu, Analysis of SecurityProtocols for Mobile Healthcare, in Journal of Medical Systems (Springer), Vol. 40, No. 11, pp.229:1 - 229:10, 2016. (2014 SCI Impact Factor: 2.213)

20. Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, and Xiong Li, Provablysecure three-factor authentication and key agreement scheme for session initiation protocol, in Se-curity and Communication Networks (Wiley), Vol. 9, No. 18, pp. 5412 - 5431, 2016. (2015 SCIImpact Factor: 0.806)

21. Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das and Vanga Odelu, Jamming resistantnon-interactive anonymous and unlinkable authentication scheme for mobile satellite networks, inSecurity and Communication Networks (Wiley), Vol. 9, No. 18, pp. 5563 - 5580, 2016. (2015 SCIImpact Factor: 0.806)

22. Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, Mohammad Wazid, and Vanga Odelu,Secure anonymous mutual authentication for star two-tier wireless body area networks, in ComputerMethods and Programs in Biomedicine (Elsevier), vol. 135, pp. 37 - 50, 2016. (2015 SCI ImpactFactor: 1.862)

23. Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu and Muhammad Khurram Khan,A User Anonymous Mutual Authentication Protocol, in KSII Transactions on Internet and Infor-mation Systems, Vol. 10, No. 9, 2016. (2015 SCI Impact Factor: 0.365)

24. Anil Kumar Sutrala, Ashok Kumar Das, Vanga Odelu, Mohammad Wazid, and Saru Kumari, Se-cure anonymity-preserving password-based user authentication and session key agreement protocolfor telecare medicine information systems, in Computer Methods and Programs in Biomedicine(Elsevier), Vol. 135, pp. 167 - 185, 2016. (2015 SCI Impact Factor: 1.862)

5

Page 6: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

25. Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, and Vanga Odelu. ”Anenhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks,” inSecurity and Communication Networks (Wiley), Vol. 9, No. 17, pp. 4255 - 4271, 2016. (2015 SCIImpact Factor: 0.806)

26. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami. ”A secure and efficient time-bound hier-archical access control scheme for secure broadcasting,” in International Journal of Ad Hoc andUbiquitous Computing (InderScience), Vol. 22, No. 4, pp. 236 - 248, 2016. (2013 SCI ImpactFactor: 0.900)

27. Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, and Xinyi Huang, Provablysecure user authentication and key agreement scheme for wireless sensor networks, in Security andCommunication Networks (Wiley), Vol. 9, No. 16, pp. 3670 - 3687, 2016. (2015 SCI ImpactFactor: 0.806)

28. A. Goutham Reddy, Ashok Kumar Das, Vanga Odelu, and Kee-Young Yoo, An Enhanced BiometricBased Authentication with Key-Agreement Protocol for Multi-Server Architecture Based On Ellip-tic Curve Cryptography, in PLoS ONE, Vol. 11, No. 5, pp. 1-28, 2016.(2014 SCI Impact Factor:3.234)

29. Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and XiongLi, An efficient multi-gateway based three-factor user authentication and key agreement scheme inhierarchical wireless sensor networks, in Security and Communication Networks (Wiley), Vol. 9,No. 13, pp. 2070 - 2092, 2016. (2014 SCI Impact Factor: 0.720)

30. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, An effective and robust secure remoteuser authenticated key agreement scheme using smart cards in wireless communication systems, inWireless Personal Communications (Springer), Vol. 84, No. 4, pp 2571 - 2598, 2015. (2013 SCIImpact Factor: 0.979)

31. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, An efficient biometric-based privacy-preservingthree-party authentication with key agreement protocol using smart cards, Security and Communi-cation Networks (Wiley), Vol. 8, No. 18, pp. 4136 - 4156, 2015. (2014 SCI Impact Factor: 0.72)

32. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, An efficient ECC-based privacy-preservingclient authentication protocol with key agreement using smart card, in Journal of Information Se-curity and Applications (Elsevier), Vol. 21, pp. 1-19, 2015. Emerging Sources Citation Index(ESCI). [This article is one of the top 25 most downloaded articles, during Feb. - Dec. 2015]

33. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, DMAMA: Dynamic migration access con-trol mechanism for mobile agents in distributed networks, in Wireless Personal Communications(Springer), Vol. 84, No. 1, pp. 207 - 230, 2015. (2013 SCI Impact Factor: 0.979)

34. Ashok Kumar Das, Vanga Odelu, and Adrijit Goswami, A Secure and Robust User AuthenticatedKey Agreement Scheme for Hierarchical Multi-Medical Server Environment in TMIS, in Journalof Medical Systems (Springer), Vol. 39, No. 9, pp. 92, 2015. (2014 SCI Impact Factor: 2.213)

35. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, A secure and scalable group access controlscheme for wireless sensor networks, in Wireless Personal Communications (Springer), Vol. 85,No. 4, pp. 1765 - 1788, 2015. (2013 SCI Impact Factor: 0.979)

6

Page 7: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

36. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, A secure and efficient ECC-based useranonymity preserving single sign-on scheme for distributed computer networks, in Security andCommunication Networks (Wiley), Vol. 8, No. 9, pp. 1732-11752, 2014. (2014 SCI Impact Factor:0.72)

37. Ashok Kumar Das, Vanga Odelu, and Adrijit Goswami. ”A robust and effective smart card-basedremote user authentication mechanism using hash function,” in The Scientific World Journal (Hin-dawi Publishing Corporation), Vol. 2014, Article ID 719470, 16 pages. (2012 SCI Impact Factor:1.730)

38. Ashok Kumar Das, Adrijit Goswami, and Vanga Odelu, An efficient access control scheme in userhierarchy based on polynomial interpolation and hash function, in International Journal of Com-munication Networks and Distributed Systems (Inderscience), Vol. 12, No. 2, pp. 129-151, 2014.

39. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, An Effective and Secure Key-ManagementScheme for Hierarchical Access Control in E- Medicine System, in Journal of Medical Systems(Springer), Vol. 37, No. 2, pp. 1 - 18, 2013. (2014 Impact Factor: 2.213)

40. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, A novel linear polynomial-based dynamickey management scheme for hierarchical access control, in International Journal of Trust Man-agement in Computing and Communications (Inderscience), Vol. 1, No. 2, pp. 156-174, 2013

41. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami, A New Key Management Scheme for aUser Hierarchy based on a Hybrid Cryptosystem, in Smart Computing Review (KAIS), vol. 3, no.1, pp. 42-54, 2013.

Accepted/Published International Conference Proceedings

42. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami. ”Security Analysis of an Adaptable andScalable Group Access Control Scheme for Managing Wireless Sensor Networks,” in InternationalSymposium on Security in Computing and Communications (SSCC 2014), Communications inComputer and Information Science Series (CCIS), Vol. 467, pp. 1019, Springer-Verlag, Berlin-Heidelberg, 2014.

43. Ashok Kumar Das, Vanga Odelu, and Adrijit Goswami, Security Analysis of An Efficient SmartCard-based Remote User Authentication Scheme using Hash Function,” in International Sympo-sium on Security in Computing and Communications (SSCC 2013), Communications in Com-puter and Information Science Series (CCIS), Vol. 377, pp. 236242, Springer-Verlag, Berlin-Heidelberg, 2013.

44. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami. LHSC: An Effective Dynamic Key Man-agement Scheme for Linear Hierarchical Access Control,” in Fifth IEEE International Conferenceon COMmunication Systems and NETworkS (COMSNETS 2013), IEEE Computer Society Press,pp. 1-9, January 7-10, 2013.

45. Vanga Odelu, Ashok Kumar Das, and Adrijit Goswami. ”A Novel Key Management Mechanism forDynamic Hierarchical Access Control Based on Linear Polynomials,” in International Conferenceon Security in Computer Networks and Distributed Systems (SNDS 2012), Communications in

7

Page 8: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

Computer and Information Science Series (CCIS), Vol. 335, pp. 1 - 10, Springer-Verlag, Berlin-Heidelberg, 2012.

CONFERENCES/ WORKSHOPS/ SUMMER SCHOOLS

• Attended and presented the paper “Security Analysis of An Efficient Smart Card-based Remote UserAuthentication Scheme using Hash Function,” in International Symposium on Security in Com-puting and Communications (SSCC 2013) is co-located with Second International Conference onAdvances in Computing, Communications and Informatics (ICACCI 2013), during August 22-24,2013 in Mysore, India.

• Attended and presented the paper “LHSC: An Effective Dynamic Key Management Scheme for Lin-ear Hierarchical Access Control,” in the Fifth International conference on COMmunication Systems& NETworkS (COMSNETS-2013) is organized by IEEE Computer Society at Bangalore, Indiaduring 7th to 10th January 2013.

• Attended and presented the paper “A Novel Key Management Mechanism for Dynamic Hierarchi-cal Access Control Based on Linear polynomials,” in the International Conference on Security inComputer Networks and Distributed System (SNDS-2012) is organized by Indian Institute of In-formation Technology and Management Kerala (IIITM-K), Trivandrum, India during 11th to 12thOctober 2012.

• Attended to “The Summer School on Network and Information Security (NIS13)” is organized byIndian Institute of Information Technology and ManagementKerala (IIITM-K) in association withIndian Society for Technical Education (ISTE) and ACM Trivandrum Chapter. May 20-31, 2013.

PROFESSIONAL ACTIVITIES

Track Chair of the following conference

• Track Chair for the Intelligent Security Systems: Fifth International Conference on Mining Intel-ligence and Knowledge Exploration (MIKE 2017) will be held at Institute for Development andResearch in Banking Technology (IDRBT), Hyderabad, India.

Technical Program Committee Member

• Sixth International Symposium on Security in Computing and Communications (SSCC’18).

• International Conference on Information Society and Smart Cities. Cambridge, UK (ISC’18)

• The International Conference on Data Security (INCODS), organized by Department of Informa-tion Technology, Kalasalingam University, Tamil Nadu, India will take place during the month ofDecember 2017.

• Asia Security and Privacy Conference Jan 29- Feb 1, 2017 at NIT Surat, India

• Fifth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2016), LNMIIT, Jaipur, India.

• Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015), Kochi, India.

8

Page 9: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

Reviewer for the following international journals

• IEEE Internet of Things Journal

• IEEE Transactions on Cloud Computing

• IEEE Transactions on Smart Grid

• IEEE Transactions on Computers

• IEEE Access Journal

• Transactions on Emerging Telecommunications Technologies (Wiley)

• IEEE Transactions on Information Forensics and Security

• IEEE Network

• KSII Transactions on Internet and Information Systems

• Journal of Network and Computer Applications (Elsevier)

• Security and Communication Networks (Wiley)

• International Journal of Communication Systems (Wiley)

• Wireless Personal Communications (Springer)

• National Academy Science Letters (Springer)

• Peer-to-Peer Networking and Applications (Springer)

• Future Generation Computer Systems (Elsevier)

• Journal of Information Security and Applications (Elsevier)

• International Journal of Medical Informatics (Elsevier)

• Mobile Networks and Applications (Springer)

• Computers & Electrical Engineering (Elsevier)

Reviewer for the following conferences

• Fifth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2016), LNMIIT, Jaipur, India.

• 6th International Conference on Computer & Communication Technology (6th ICCCT-2015) Septem-ber 25-27, 2015 by MNNIT.

• Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI-2015), Kochi, India.

9

Page 10: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

• IEEE International Conference on Signal Processing, Informatics, Communication and Energy Sys-tems (IEEE SPICES-2015) by IEEE Kerala Section and National Institute of Technology Calicut(NITC)

• 9th International Conference on Information Systems Security (ICISS 2013), India, Springer-Verlag,2013. (Sub-reviewer)

• International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014),Springer-Verlag, 2014.

• Students’ Conference on Engineering and Systems, SCES-2014. Co-sponsored by IEEE Joint Soci-ety Chapter of IE/PEL/CS under IEEE UP Section and TEQIP-II, MNNIT.

Research Collaborators

A). Thrust Area of Research: Secure Remote User Authentication

Focused Subtopics: Smart Home Environment

Description: We proposed a new secure remote user authentication scheme for a smart home net-work. This scheme is suitable and efficient for resource-constrained smart devices with limitedresources. The security of the scheme is proved through the rigorous formal security analysis underthe widely accepted Real-Or-Random (ROR) model.

Collaborator(s):Prof. Willy Susilo, ARC Future FellowProfessor and Head, School of Computing and Information TechnologyCo-Director, Centre for Computer and Information Security ResearchUniversity of Wollongong, Wollongong, AUSTRALIA

B). Thrust Area of Research: Ciphertextpolicy Attributed Based Encryption

Focused Subtopics: Access Control suitable for Mobile devices in IoT and Cloud based IoT

Description: We propose a expressive CP-ABE scheme with constant size secret keys and cipher-texts with offers constant time-complexity for both decryption and encryption. We also worked ondesigning light-weight security protocols for cloud-based IoT applications. We also proposed newefficient privacy preserving time-key based single sign-on authentication protocol for a mobile cloudcomputing environment using elliptic curve cryptography.

Collaborator(s):Prof. Kim-Kwang Raymond ChooFellow, Australian Computer SocietyDepartment of Information Systems and Cyber SecurityThe University of Texas at San Antonio, San Antonio, USA

C). Thrust Area of Research: Remote user authentication

Focused Subtopics: Wireless healthcare sensor networks

10

Page 11: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

Description: We propose a provably secure three-factor user authentication and key agreement pro-tocol for wireless healthcare sensor networks. This scheme supports dynamic sensor node addition,password as well as biometrics update, smart card revocation along with other usual features re-quired for user authentication in WSNs.

Collaborator(s):Prof. Athanasios V. Vasilakos, Full ProfessorDep. of Computer Science, Electrical and Space EngineeringLulea University of Technology, SWEDEN

D). Thrust Area of Research: Identification and Authentication

Focused Subtopics: Security in Smart-grid and wireless body area networks

Description: In these works, we explored a new efficient provably secure authenticated key agree-ment schemes for smart grid as well as wireless body area networks.

Collaborator(s):

Prof. Mauro Conti, EU Marie Curie FellowHead of SPRITZ Security and Privacy Research GroupUniversity of Padua, ITALY

E). Thrust Area of Research: Remote user authentication and access control

Focused Subtopics: Access Control and authentication protocols for Mobile devices in IoT

Description: In these works, we explored a user anonymous mutual authentication schemes andexpressive CP-ABE scheme with constant size secret keys and ciphertext

Collaborator(s):

Prof. Minho JoDept. of Computer Convergence SoftwareKorea University, Sejong Metropolitan City, South Korea

F). Thrust Area of Research: Remote user authentication

Focused Subtopics: Mobile Healthcare (mHealth) and Wireless Roaming Mobile Networks

Description: We presented an enhanced roaming protocol with robust security functionalities in-cluding SK-security along with reduced computation and communication costs. In the other work,we developed a taxonomy that demonstrates the strength and weaknesses of recently proposed se-curity protocols form Health system. Some challenges in security protocols for mHealth systemswere explored towards developing cost-effective, secure and robust mHealth systems.

Collaborator(s):

– Prof. SheraliZeadallyFellow of the British Computer SocietyUniversity of Kentucky, Lexington, USA

11

Page 12: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

G). Thrust Area of Research: Remote user authentication and access control

Focused Subtopics: Access Control and authentication protocols for Mobile devices in IoT

Description: In these works, we explored a user anonymous mutual authentication schemes andexpressive CP-ABE scheme with constant size secret keys and ciphertext.

Collaborator(s):

Prof. Muhammad Khurram Khan, Full ProfessorCenter of Excellence in Information AssuranceKing Saud University, SAUDI ARABIA

H). Thrust Area of Research: Authentication and Access Control protocols

Focused Subtopics: Attribute Based Encryption, access control, Multi-server authentication envi-ronment, Group authentication protocols

Description: We explore Attribute-Based Authentication on the Cloud for Thin Clients; provablysecure authenticated key agreement scheme for distributed mobile cloud computing services and ASecure Smartcard-based Anonymous User Authentication Scheme for mHealth Applications. Wealso worked extensively on key management schemes for dynamic access control in a large leafclass hierarchy and also in hierarchical multi-medical server environment. We also explored groupauthentication protocols.

Collaborator(s):

Prof. Ashok Kumar DasCenter for Security, Theory and Algorithmic ResearchInternational Institute of Information Technology, Hyder-abad, INDIA

RESEARCH STUDENTS

PhD Student(s):

1. Name : Mr. Soumya BanerjeeSupervisor(s) : Dr. Odelu Vanga (Korea University)

: Dr. Ashok Kumar Das (IIIT Hyderabad, India): Dr. Samiran Chattopadhyay (Jadavpur University, Kolkata, India)

Status : Ongoing (Registered at Jadavpur University, Kolkata, India)

MS by Research Student(s):

1. Name : Mr. Sourav SahaSupervisor(s) : Dr. Odelu Vanga (Korea University)

: Dr. Rajendra Prasath (IIIT Sri City, Chittoor, India)Status : Ongoing (Registered at IIIT Sri City, Chittoor, India)

12

Page 13: Curriculum Vitae of Odelu Vanga - faculty.vardhaman.orgfaculty.vardhaman.org/career_resume/+919000190096... · Hierarchical access control Developed an efficient theoretical model

LIST OF REFEREES1. Name : Dr. Adrijit Goswami, PhD

: Dean, Continuing EducationDesignation : ProfessorDepartment : Department of MathematicsUniversity : Indian Institute of Technology Khragpur 721 302, IndiaTel. : +91 - 3222 - 283650; +91 - 3222 - 283651E-mail : [email protected] : http://www.iitkgp.ac.in/department/MA/faculty/ma-goswami

2. Name : Dr. Ashok Kumar Das, PhDProfessional Activities : Editor, KSII Transactions on Internet and Information SystemsDesignation : Associate ProfessorDepartment : Center for Security, Theory and Algorithmic Research

: (Department of Computer Science and Engineering)University : International Institute of Information Technology, Hyderabad, IndiaTel. : +91-40-6653-1506; Mobile: +91-9701356641E-mail(s) : [email protected], [email protected] : https://sites.google.com/site/iitkgpakdas/

I hereby declare that the provided informations are true to the best of my knowledge and belief.

Place : Sejong MetropolitanDate : February 12, 2018 Odelu Vanga

13