Center for Security, Theory and Algorithms

The goal of the center is to do research in information security, theory and algorithms. Center for Security, Theory and Algorithms (CSTAR) is engaged in devising efficient algorithms for various problems, modeling and abstractization of various concepts, and security guarantees of the computation when operating in an adverse environment. Some of the problems lie at the intersection of multiple domains and require a combination of theoretical rigor and practical acceptability. The center is working on several cutting edge problems in several areas. Some of these areas are: - Distributed and multi-core algorithms, system and network security, data structures, secure multiparty computation, and the like. - Distributed algorithms for symmetry breaking via randomization, and a formal study of fault-tolerance of distributed computing - Secure solutions for problems arising in the field of system security and network security. - Secure algorithms for computer vision based problems such as video surveillance, security of robotic systems. - Efficient implementations of parallel algorithms on present generation architectures such as the GPU, the IBM Cell, and other multi-core architectures.

Secure Communications in Vehicular Networks

Research Area
Network Security
Vehicular Ad Hoc Networks, User Authentication, Key Agreement, Security, Ns-2 Simulation Authentication, Protocols
Technology Description
Vehicular Ad-hoc Networks (VANETs) are upcoming technology becoming essential with development of the vehicle industry and wireless communication technology. Here vehicles as mobile nodes are a subclass of mobile ad hoc networks (MANETs) to provide communications among nearby vehicles and between vehicles and nearby roadside equipment. Security is a key requirement of VANETs. This technology provides lightweight decentralized authentication and key agreement scheme for VANETs. It provides a host of approaches for security. First approach is the use of three types of mutual authentication: 1) between vehicles, 2) between vehicles and their respective cluster heads, and 3) between cluster heads and their respective roadside units. Second, secret keys between roadside units for their secure communications are maintained. Third, the cluster-based VANET network model is used to reduce the communication and computation overheads. Rigorous formal and informal security analysis assures that the proposed scheme is capable for defending various known attacks needed for securing VANET environment.
Type of Work
Current State of work
Technology thoroughly tested
Potential Applications
1. The proposed scheme is suitable for the deployment in the next generation VANETs based applications such as intelligent transportation, smart ecosystems and smart cities.
Related Publications
1. Secure Message Communication Protocol among Vehicles in Smart City, IEEE Transactions on Vehicular Technology, 2017 2. Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks, IEEE Access, Vol. 5, pp. 14966-14980, 2017