Research
Publications
Journal Papers
Ashish Nanda, Jongkil Jay Jeong, Syed Wajid Ali Shah, Mohammad Nosouhi, and Robin Doss, "Examining Usable Security Features and User Perceptions of Physical Authentication Devices." Computers & Security, 2024 - Published
Jongkil Jay Jeong, Syed Wajid Ali Shah, Ashish Nanda, Robin Doss, Mohammad Nosouhi, and Jeb Webb, "User Characteristics and Their Impact on the Perceived Usable Security of Physical Authentication Device." IEEE Transactions on Human-Machine Systems, 2024 - Published
Ashish Nanda, Syed Wajid Ali Shah, Jongkil Jay Jeong, Robin Doss, and Jeb Webb, "Towards Higher Levels of Assurance in Remote Identity Proofing", IEEE Consumer Electronics Magazine, 2023 - Published
Mohammad Reza Nosouhi, Syed W Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram and Robin Doss, "Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism", IEEE Transactions on Information Forensics and Security, 2023 - Published
Deepak Puthal, Stanly Wilson, Ashish Nanda, Ming Liu, Srinibas Swain, Biswa P.S. Sahoo, Kumar Yelamarthi, Prashant Pillai, Hesham El-Sayed and Mukesh Prasad, "Decision tree based user-centric security solution for critical IoT infrastructure", Computers & Electrical Engineering, Volume 99, 2022 - Published
Ashish Nanda, Deepak Puthal, Joel Rodrigues and Sergei Kozlov, "Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions", IEEE Wireless Communications, 2019 - Published
Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, and Deepak Puthal, "A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks", Future Generation Computer Systems (FGCS), 2018 - Published
Ashish Nanda, Deepak Puthal, Saraju Mohanty and Uma Choppali, "A Computing Perspective of Quantum Cryptography", IEEE Consumer Electronics Magazine, 2018 - Published
Deepak Puthal, Rajiv Ranjan, Ashish Nanda, Priyadrsi Nanda, Prem P Jayaraman and Albert Y Zomaya, "Secure Authentication and Load Balancing of Distributed Edge Datacenters", Journal of Parallel and Distributed Computing, 2018 - Published
Conference Papers
Jongkil Jay Jeong, Lu-xing Yang, Robin Doss, Praveen Gauravaram, Zoe Wang, Mohamed Abdelrazek, Ashish Nanda, and Keerthivasan Viswanathan. "Addressing the Privacy by Use Challenges in Verifiable Credential based Digital Wallets", In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security (ASIA CCS '24) 2024 - Published
Amiya Kumar Sahu, Suraj Sharma, and Ashish Nanda, "A secure lightweight mutual authentication and key agreement protocol for healthcare systems.", Intelligent Data Security Solutions for e-Health Applications. Academic Press, 2020 - Published
Ashish Nanda, Priyadarsi Nanda, Mohammed S. Obaidat, Xiangjian He and Deepak Puthal, "A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks", IEEE Global Communications Conference (GLOBECOM) 2019 - Published
Ashish Nanda, Priyadarsi Nanda, Xiangjian He and Deepak Puthal, "A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks", 51st Hawaii International Conference on System Sciences (HICSS-51) 2018 - Published
Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, and Deepak Puthal, "Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks", 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17) 2017 - Published
Ashish Nanda, Priyadarsi Nanda and Xiangjian He, "Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network", 18th IEEE International Conference on High-Performance Computing and Communications (HPCC-2016) 2016 - Published
Ashish Nanda, Priyadarsi Nanda, Xiangjian He and Aruna Jamdagni, "A Secure Routing Scheme for Wireless Mesh Networks", 12th International Conference on Information Systems Security (ICISS-2016) 2016 - Published
Patents
"Continuous Authentication" - Australian Provisional Patent, June 2024 - Filed
"Digital credential wallet" - Australian Provisional Patent, Sept 2024 - Filed
Books
Ashish Nanda, "Cybersecurity and Distributed Systems: Exploring the future of secure decentralised networks" LAP Lambert Academic Publishing, Germany, ISBN 978-620-2- 68366-1, (2020) - Published
Articles
Ashish Nanda, Jongkil Jay Jeong and Robin Doss, "Australia’s new digital ID scheme falls short of global privacy standards. Here’s how it can be fixed", The Conversation, 2024 - Published
Ashish Nanda, Jeb Webb, Jongkil Jay Jeong, Mohammad Reza Nosouhi and Syed Wajid Ali Shah, "Crypto scams will increase over the holidays – here’s what you need to know to not fall victim", The Conversation, 2022 - Published
Jongkil Jay Jeong, Ashish Nanda and Syed Wajid Ali Shah, "What is multi-factor authentication, and how should I be using it?", The Conversation, 2022 - Published
Robin Doss, Jay Jeong, Syed W. Shah, Ashish Nanda and Jeb Webb, "Usable Security - the secret key to adoption of your cyber security technology", CyberAustralia, 2022-23 - Published
Ashish Nanda, Pulkit Rohilla and Yukti Mangal, "Gesture Recognition System" (ID: COG153), National Conference on Innovations in Computing and Information Technology (Cognition-2015), 2015 - Published
Media Interactions
SBS News - Interview for Online Article - 2023
"Crypto scams are on the rise. How I avoided a trap by starting a conversation with a scammer" - Link
SBS The Feed - Interview for a video - 2023
"I DM'ed a get-rich-quick scammer on Instagram | Explainer | SBS The Feed" - Link
The Guardian - Interview for Online Article - 2023
"Fake text messages on the rise, but experts warn Australians most losses are from more sophisticated scams" - Link
SBS News - Interview for Online Article - 2022
"Deliveroo collapsed a week ago. What happens to all the data they have on you?" - Link
Radio Adelaide - On Air Interview - 2022
"CyberScams are costing Australians Millions" - Link
Research Projects And Engagements
Privacy Respecting and Compliant Digital Credential Wallet
Project Lead, Principal Researcher
Task: This project focuses on addressing the inherent privacy challenges related to the usage patterns of users within Verifiable Credential Digital Wallets (VCDWs). The primary objective is to enhance privacy protections in digital wallets by addressing the limitations presented by current user behaviour and technological constraints.
Technology Used: The project is developing a smartphone wallet that incorporates privacy-by-usage principles. Utilizing a combination of Privacy Scores (entropy), Diversity Scores (Jaccard Index), selective disclosure mechanisms, and machine learning-based global optimization techniques, the initiative aims to optimise user privacy safeguards.
Project Partner: Cyber Security Cooperative Research Centre, Deakin Cyber Research and Innovation Centre (Deakin University), Tata Consulting Services
Key Outcomes: 1 Patent Filed, 1 Conference Paper published. 3 Journal/Conference Publications in progress.
Description: Despite the advantages of VCDWs in terms of security, efficiency, and user autonomy, significant privacy challenges persist, particularly concerning users' selective disclosure behaviours and the potential aggregation of Personally Identifiable Information (PII). The project aims to address these issues by developing a VCDW that not only adheres to privacy-by-usage principles but also aids users in making informed decisions about their credential disclosures. Through advanced recommendation algorithms and machine learning techniques for global optimisation, the project seeks to balance utility and privacy concerns, enabling users to share necessary information without compromising their privacy.
Development and Testing: The project's methodology includes the creation of a TestBed for the VCDW, focusing on user interaction scenarios within smart environments. An MVP has been tested to validate the system's ability to manage credential disclosures effectively, with particular attention to privacy impacts and user decision-making processes.
Recommendation Engine: A significant finding of the project is the formulation of a model that optimises users' privacy by recommending the optimal set of credentials and attributes for disclosure. This model considers various privacy aspects, such as unlinkability and anonymity, and employs Privacy Scores and Diversity Scores to ensure the best privacy outcomes for users. Additionally, machine learning-based global optimization techniques are used to adapt to changing credential usage patterns and ensure balanced and secure recommendations.
With initial successes, the project is now focused on refining the model and expanding its application across broader user scenarios. Future development will concentrate on enhancing the Trust Score capabilities and extending the TestBed to cover more extensive testing environments. Concurrently, efforts will continue to refine the recommendation model, ensuring it remains adaptable and effective in real-world applications.
2023-2024
Robust Authentication using Ambient Intelligence in Smart Environments
Project Lead, Principal Researcher
Task: The RAAISE project is focused on developing a cutting-edge continuous authentication system using ambient intelligence within smart environments. This initiative seeks to redefine secure access management by providing a non-intrusive, continuous authentication solution that enhances security and user experience in various settings, such as smart offices.
Technology Used: Leveraging cutting-edge sensor technology, the RAAISE project employs a diverse array of data collection methods, including RFID, NFC, biometric scanners, Wi-Fi, and CCTV, to create a robust Continuous Authentication System (CAS). This innovative system integrates with the Ambient Intelligence Engine (AIE), which utilises advanced algorithms to analyse and synthesise ambient data for real-time authentication.
Project Partner: Cyber Security Cooperative Research Centre, Deakin Cyber Research and Innovation Centre (Deakin University), University of New South Wales, CSIRO Data61, Tata Consulting Services
Key Outcomes: 1 Patent Filed, 4 Journal/Conference Publications in progress.
Description: RAAISE seeks to address critical security vulnerabilities present in traditional authentication methods by introducing a seamless, efficient, and user-friendly solution for continuous authentication in smart critical infrastructures. By harnessing ambient intelligence, the project aims to improve operational efficiency and user experience in environments requiring high security, such as smart airports and industrial plants. The project has been executed through a carefully structured methodology, yielding significant findings and laying out clear directions for future development.
Feeder System Integration: A critical component of the methodology was the establishment of the Feeder System. This subsystem is crucial for aggregating data from a variety of sensors and pre-processors, such as RFID, NFC, biometric, and Wi-Fi sensors. The Feeder System plays a pivotal role in capturing and processing ambient signals, which are then analysed by the AIE for authentication decisions.
TestBed and MVP Development: The initial phase involved the creation of a detailed TestBed environment tailored to smart office settings, integrating a sophisticated sensor network to collect ambient data. This was complemented by the development of a Minimum Viable Product (MVP), which underwent extensive real-world scenario testing. The objective was to validate the effectiveness of the CAS and the Ambient Intelligence Engine (AIE) in providing non-intrusive, continuous user authentication.
Ambient Intelligence Engine (AIE) Deployment: At the core of RAAISE, the AIE utilises advanced algorithms to process ambient data, adjusting authentication requirements based on the environmental context and user behaviour. This dynamic adaptation ensures enhanced security and operational efficiency.
The project has successfully demonstrated the capability to integrate and deploy a diverse range of sensors, effectively collecting ambient data essential for continuous authentication. The AIE has proven to be effective in dynamically authenticating users within smart environments, showcasing the potential of ambient intelligence in improving security measures. Preliminary results highlight RAAISE's ability to enhance both security and user experience, identifying and mitigating risks such as identity theft and unauthorised access through seamless authentication processes.
2022-2024
Enhancing Usable Security and Adoption of Multi-Factor Authentication Technologies
Co-Researcher
Task: This project embarked on a deep dive into the realms of usable security (USec) and its implications on the adoption rates of multi-factor authentication (MFA) technologies. The study aimed to bridge the gap between the security benefits of MFA and its underutilization due to usability challenges, examining how user characteristics (UCha) and perceptions influence MFA adoption.
Technology Used: The research meticulously evaluated various MFA methods—SMS-based solutions, app-generated OTPs, and physical authentication devices (PADs)—through the lens of USec. Employing a combination of quantitative and qualitative methodologies, the project explored the nuances of user interactions with physical authentication devices (PADs) to uncover actionable insights into enhancing usability without compromising security.
Project Partner: Cyber Security Cooperative Research Centre, Centre for Cyber Security Research Innovation Deakin
Key Outcomes: 2 Journal publications and 1 Article. 2 Journal Publications in progress
Description: The study was structured to tackle the ongoing challenge within cybersecurity: enhancing the security of digital platforms while ensuring that security mechanisms, like MFA, remain user-friendly. Despite the known benefits of MFA in safeguarding against unauthorised access, its adoption is hindered by usability concerns. The project's core objective was to dissect the elements that constitute 'usable security' in the context of MFA, particularly focusing on physical authentication devices (PADs). By examining user characteristics such as age, ICT qualifications, and previous MFA experience, the project sought to uncover patterns in user perceptions and behaviours that could inform the design of more accessible and widely adopted MFA solutions. This comprehensive approach aimed not only to highlight the trade-offs between security and usability but also to propose a pathway towards resolving these conflicts in favour of creating secure yet user-friendly authentication methods. The study included 2 phases:
Phase 1 (Quantitative Study): A broad survey targeting 410 participants was designed to capture how various user groups perceive the importance of different USec features in PADs. The analysis aimed to correlate these perceptions with specific user characteristics, offering insights into the demographic-specific needs and preferences.
Phase 2 (Qualitative Study): Following the quantitative analysis, a subset of participants were engaged in a hands-on study with PADs. Over four weeks, participants interacted with the devices in real-world scenarios, documenting their experiences. This phase culminated in detailed interviews, providing depth to the quantitative findings and revealing nuanced views on PAD usability and security.
Key Findings:
User Characteristics Influence on PAD Perceptions: The study conclusively found that age, education, and prior experience with MFA significantly affect users' perceptions of PAD usability. Notably, features such as simplicity, time efficiency, and information support were ranked differently in importance across various user groups, highlighting the diversity in user needs and preferences.
Important USec Features: Across different demographics, certain USec features consistently emerged as crucial for enhancing PAD adoption. These included error management, simplicity, and information support, underscoring the importance of designing PADs that are not only secure but also intuitive and user-friendly.
Challenges in PAD Adoption: Despite the recognised security benefits of PADs, their uptake remains low, primarily due to usability concerns. The study's findings suggest that addressing these concerns by tailoring PAD features to meet diverse user preferences can significantly impact their adoption rates.
This extensive study shed light on the critical balance between security and usability in the context of MFA technologies. By uncovering the nuanced preferences and perceptions of users towards PADs, the research offers valuable insights into how MFA solutions can be designed to be both secure and user-friendly, thereby encouraging wider adoption.
2021-2024
Advancements in Remote Identity Proofing for Enhanced Security and Assurance
Principal Researcher
Task: Developed an innovative framework for Remote Identity Proofing (RiDP) that addresses the critical need for higher levels of assurance in identity verification processes, which is crucial for accessing multiple services remotely. This project aimed to bridge the gap between traditional in-person identity verification methods and the burgeoning demand for reliable, remote solutions.
Technology Used: The project explored the use of technologies, including deep learning, advanced biometric analysis, and secure digital communication protocols, to establish a robust system capable of accurately validating and verifying user identities remotely.
Project Partner: Cyber Security Cooperative Research Centre, Centre for Cyber Security Research Innovation Deakin
Key Outcomes: 1 Journal publication.
Description: This project sought to address the pressing challenges faced in achieving higher assurance levels in RiDP, challenges exacerbated by sophisticated fraudulent activities, including the rise of deepfake technologies. By identifying the existing gaps in standard guidelines and proposing a multi-faceted technological solution, the project aimed to redefine the landscape of digital identity verification, making it more secure, accessible, and resilient against emerging threats.
RiDP Challenges: The project dissected the intricate challenges of modern RiDP, such as ensuring high levels of assurance amidst the growing sophistication of identity fraud methods, including deepfakes, and the inadequacy of current standards in accommodating the nuances of remote verification.
Innovative Solutions: It introduced a ground-breaking framework that melds state-of-the-art detection technologies with stringent security protocols to counteract identity fraud attempts effectively. This innovative solution highlighted enhancements in user access control, biometric verification, and the strategic use of redundancy to bolster the integrity of RiDP systems.
Implementation and Impact: With the development of actionable guidelines and a scalable RiDP solution, the project significantly advanced the domain of digital identity verification, offering robust mechanisms that cater to the evolving demands for security and reliability in digital interactions.
This pivotal project carved a path forward in the realm of remote identity proofing by addressing and surmounting key challenges. The outcomes not only fulfil the immediate need for more secure digital verification processes but also lay the groundwork for ongoing innovation and enhancement in cybersecurity practices.
The findings and solutions presented herald a new era in digital identity verification, emphasising the need for continuous adaptation and innovation to stay ahead of emerging cybersecurity threats. Future endeavours will focus on expanding the capabilities of RiDP systems, exploring new biometric technologies, and further harnessing the potential of artificial intelligence to refine detection methods and enhance user engagement.
2021-2022
Blockchain Integrated Database for Optimizing Supply Chain Financing
Principal Researcher
Task: Develop a cutting-edge solution for enhancing supply chain financing through a Blockchain Integrated Database Fabric, addressing the inefficiencies and limitations of traditional SCF systems by leveraging blockchain technology.
Technology Used: The project harnesses a combination of blockchain technology, database management systems, and advanced programming environments. Truffle Suit was used to run a local blockchain environment for testing and PoC.
Project Partner: Deakin Blockchain Innovation Lab, Industry
Key Outcomes: 1 Journal Publication in progress.
Description: The Blockchain Integrated Database Fabric (DBK Fabric) is a pioneering approach to supply chain financing that leverages the robustness of blockchain for enhanced transaction verification, performance efficiency, and cross-platform compatibility. This solution consists of three primary components:
Access Layer: Managed user access and authentication, establishing secure entry points to the system.
Blockchain Layer: Ensured transaction integrity, transparency, and security across the supply chain financing process.
Database Layer: Integrated blockchain transactions with traditional database management techniques for efficient data handling.
The incorporation of blockchain into SCF presented unique challenges, such as delays due to consensus mechanisms and complexities in user access control. The DBC Framework innovatively addressed these through:
Enhanced access control mechanisms for improved user management.
Cross-platform compatibility, facilitating seamless integration with existing systems.
Optimized processing speeds by leveraging blockchain technology more efficiently.
Implementing a blockchain-enabled SCF system brought forth significant benefits, including unmatched transparency, minimised transaction fees by direct cryptocurrency transactions, and bolstered security measures.
he analysis of Greensill Capital's collapse underscored the acute need for the transparency and efficiency offered by the blockchain-enabled SCF model, highlighting its potential to prevent similar future occurrences.
The successful development and deployment of the Blockchain Integrated Database for Supply Chain Financing marked a pivotal advancement in the field, demonstrating a viable solution to longstanding challenges. By harnessing the power of blockchain technology, the project not only set a new benchmark for supply chain finance but also paved the way for broader adoption and future innovations in this domain.
2020-2021
Enhancing Blockchain Technology for Advanced Data Management
Principal Researcher
Task: Investigation and development of innovative approaches for digitalizing physical assets, optimizing on-chain and off-chain data storage, and processing to overcome inherent limitations of traditional blockchain structures.
Technology Used: This research utilises blockchain technology, distributed ledger technology tools, data indexing techniques, and security analysis software to develop and test new blockchain functionalities.
Project Partner: Deakin Blockchain Innovation Lab, Industry
Description: As blockchain technology has grown in popularity and application scope, several limitations have come to light, necessitating innovative solutions in data storage, retrieval optimisation, and security. Our research has targeted these areas with the following approaches:
Search Optimization: Integrating identifying features within each block has streamlined the search process across blockchain databases, significantly reducing the time and resources required for data lookup. This advancement, tested on both new implementations and existing blockchains, demonstrates a promising performance boost for blockchain applications reliant on data retrieval.
Data Storage/Retrieval: Our exploration into blending blockchain with conventional cloud storage methods, alongside a unique approach mimicking the data storage and addressing mechanisms of physical storage devices, has opened up new avenues for managing large-scale data. This dual-path investigation aims to provide scalable, efficient solutions for blockchain-based data storage, drawing from the strengths of both digital and physical storage paradigms.
Data Security: Adapting the blockchain to accommodate raw data storage has necessitated an exhaustive threat analysis to ensure the modifications do not compromise security. The security framework proposed following this analysis aims to fortify the blockchain against potential vulnerabilities, ensuring the integrity and confidentiality of stored data.
This project underscores a pivotal evolution in blockchain technology, addressing critical aspects of search optimisation, data storage/retrieval, and security. The outcomes of this research promise to significantly enhance the applicability and performance of blockchain systems, with the findings poised for dissemination in respected academic journals.
2019-2020
Secure-GLOR: Geo-Location Based Routing for Dynamic Mesh Networks
Principal Researcher
Task: Research, design, and development of an innovative network model for off-grid mesh networks as part of my PhD.
Technology Used: Utilized Visual Studio for development, alongside various network simulators for testing network protocols, security analysis tools for evaluating the network's security posture, and emulation tools to mimic real-world network conditions and validate the model's effectiveness.
Key Outcomes: 1 Journal and 5 Conference Publications.
Description: The objective was to overcome the inherent limitations of existing distributed mesh networks by creating an adaptive, secure network model. This model introduces a novel routing protocol and a comprehensive security framework, aiming to enhance network scalability, reliability, and security.
The routing protocol innovates with a geolocation-based addressing system and dynamic data transmission methods, employing 'smart packets' to navigate the mesh network efficiently. This system is supported by a web register that assists in network operation and scalability.
The security framework is tailored to the dynamic topology of mesh networks, ensuring robust security without overburdening the system. It encompasses:
Authentication: Adapts to network changes and constraints, utilising real-time data to authenticate devices securely.
Encryption: Combines symmetric and asymmetric encryption to protect data while optimising resource use.
Key Management: The Multi-Path Anonymous Randomized Key (MPARK) distribution scheme enhances security by minimising the risk of key compromise through the use of anonymity, randomness, and strategic decoys.
This research aimed to address critical challenges faced by distributed mesh networks, offering a scalable, secure solution that could revolutionise connectivity in off-grid scenarios. The advancements made through this project have the potential to significantly impact how distributed networks are implemented and secured, paving the way for more resilient and efficient communication systems in remote or infrastructure-challenged environments.
2015 - 2018
Race Track Management and Event Automation System
Project Lead, Principal Developer
Task: Design and implementation of an integrated hardware and software system to automate tracking and management of car racing events for Incarnation Sports.
Technology Used: The solution integrates Arduino microcontrollers, custom circuit boards, and open-source technologies, creating a seamless operational framework.
Project Partner: Incarnation Sports.
Description: This project revolutionised the way racing events are managed by deploying an innovative system of interconnected devices throughout the race track. Utilising advanced proximity sensors, the system captures real-time data on each vehicle's position and performance. This information is then transmitted via a robust mesh network, ensuring timely and accurate data relay to a central processing unit. The system's ability to automate data collection and analysis not only enhances the accuracy of race outcomes but also significantly improves the overall efficiency of event management. By pioneering such a comprehensive solution, we were able to address the unique challenges faced in automating car racing events, marking a significant step forward in sports event technology.
2015
Advanced Hostel Management Portal for Amity University
Project Lead, Principal Developer
Task: Creation of a comprehensive web-based portal to enhance administrative efficiency and student engagement within Amity University's hostel system.
Technology Used: Developed using Visual Studio and Drupal, supported by bespoke confidential proprietary software to ensure robust performance and security.
Project Partner: Amity University Gurgaon.
Description: Aimed at modernising the hostel management experience, this project introduced an intranet-based portal designed to streamline the complaint registration process, offering students a straightforward method to voice concerns with guaranteed follow-up times. Moreover, the portal serves as a central hub for distributing vital notices and facilitates efficient information exchange between students and administrative staff. By enhancing communication and administrative processes, the portal significantly improves the overall residential experience for students, underscoring our commitment to leveraging technology for community betterment.
2014
ZAUBER: Advanced Hand Gesture Recognition for Intuitive User Interfaces
Co-Researcher
Task: Development of a Hand Gesture Recognition System (ZAUBER) as part of my Bachelor of Technology (B.Tech) Degree Final Year Research Thesis at Amity University.
Technology Used: Leveraged the .NET framework for application development and OpenCV for computer vision and gesture recognition functionalities.
Description: ZAUBER is an innovative application designed to interpret and respond to various hand gestures through a system's onboard camera. The project aimed at creating a more intuitive and interactive way of interfacing with technology, reducing reliance on traditional input methods such as keyboards and mice. By employing machine learning techniques and a comprehensive database of gesture imagery—including both active recognition regions and varied background images—the application significantly improved gesture tracking accuracy. This enhancement allowed for real-time recognition of complex gestures, enabling the system to execute associated commands or operations seamlessly. The successful development of ZAUBER showcased the potential of integrating advanced computer vision and machine learning technologies to create more natural and user-friendly human-computer interaction experiences.
2014
GUI-Based Standardized Templates for Enhanced Online Data Entry
Principal Developer
Task: Creation of a Graphical User Interface (GUI) Module featuring standardized templates for online form filling, designed for the National Informatics Centre (NIC) under the auspices of the Department of Electronics and Information Technology, Government of India.
Technology Used: The project leveraged Visual Studio for development, Drupal as the content management framework, and specialized confidential proprietary software to ensure robust security and operational efficiency.
Description: This initiative focused on constructing GUI-based templates aligned with “Metadata and Data Standards- Demographic Version 1.1,” facilitating a seamless and dynamic user experience. These templates were engineered to bolster secure data entry through comprehensive validation and verification processes, without compromising on user accessibility. The integration of these standardised templates significantly streamlines the online submission process, enhancing data accuracy and security for various governmental digital services. This development marks a critical step forward in simplifying and securing online interactions between the government and the public.
2013
Secure Geographical Data Portal for National Informatics Centre
Principal Developer
Task: Development of a comprehensive online portal and database segregation system for the National Informatics Centre (NIC), operating under the Department of Electronics and Information Technology, Government of India.
Technology Used: Employed Visual Studio for the software development, Drupal for content management, and specialized confidential proprietary software to ensure the system’s security and efficiency.
Description: This project entailed the creation of an advanced online portal aimed at providing secure access to a meticulously segregated database. This database hosts nearly a million records detailing the geographical information of various constituencies across India, making it a critical resource for government operations and public services. Accessible over the internet through www.egovstandards.gov.in, the portal serves as a key tool for data dissemination and retrieval, supporting transparency and efficiency in governmental processes. The successful deployment of this portal underscores the pivotal role of digital infrastructure in enhancing the accessibility and management of vital information.
2012
Next-Generation Secure Payroll Automation System
Project Lead, Principal Developer
Task: Development of a Secure Payroll Generation System for The State Trading Corporation of India Limited (STC), a prestigious international trading entity operated by the Government of India.
Technology Used: Utilized Microsoft Access for database management and custom proprietary systems for enhanced security and data processing capabilities.
Description: Aimed at modernising and streamlining STC's payroll operations, this project focused on creating an automated payroll system. By transitioning from manual to automated processes, the system efficiently manages monthly tasks such as generating, updating, and editing employees' salary details and statutory reports. A key feature of the system is its ability to securely transfer payroll data to banks for processing, ensuring a remarkable 99.99% accuracy rate. Following its successful implementation, the system was adopted across STC's corporate office and over ten major branches nationwide, marking a significant advancement in the company's payroll management and operational efficiency. A modified version of the system is still being used to date.
2011
Area Of Research
Cyber Security (Computer Security)
Usable Security
Authentication Technologies
Identity Management
Digital & Cyber Crime
Distributed Computing and Networking
Wireless Networks
Internet of Things (IoT)
Blockchain