Work place: Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, 572103, India
E-mail: nrsunitha@sit.ac.in
Website: https://orcid.org/0000-0003-4990-1689
Research Interests: Big data and learning analytics, Network Security, Computer Networks
Biography
Dr. N. R. Sunitha received the B.E. degree from Gulbarga University, the M.S. degree from the Birla Institute of Technology and Science, and the Ph.D. degree from Visveswaraiah Technological University, Belguam. She is currently a Professor with the Department of CS&E, Siddaganga Institute of Technology, India. She has published more than 65 peer-reviewed research articles in leading conferences and journals, such as ACM, Springer, the IEEE, and Elsevier. Her research interests include cryptography and network security, storage area networks, big data processing, industrial automation, and computer security and reliability. She was funded for her research projects from ABB GISL, AICTE, DRDO, IISc, and ICT Skill Development Society in India. She has acquired totally six patents in her research field. Dr. Sunitha possesses membership of personal bodies in the Association of Computing Machinery, USA (ACM), the Indian Society for Technical Education, India (ISTE)—Life Member, the Computer Society of India (CSI), the International Association of Engineers (IAENG), and the Institution of Engineers (FIE). She received the IBM Mentor Award, in 2014. She was a chairperson in the international conferences, such as Conference on Information Science and Technology Management (CISTM 2007), Conference on Network Security and Applications (CSNA 2010), National Conference on Advances in Computer Applications (NCACA), and International Conference on Advances in Computing (ICAdC 2012). Her biodata included in Marquis Who’s Who in Science & Engineering 2010. She is a Reviewer of the journals, such as Elsevier’s Computers and Security and International Journal of Network Security (IJNS).
By Pradeep R. N. R. Sunitha G. S. Thejas
DOI: https://doi.org/10.5815/ijcnis.2023.03.02, Pub. Date: 8 Jun. 2023
A Biometric Authentication Security (BAS) protocol is a method by which a person's unique physiological or behavioral characteristics are used to verify their identity. These characteristics can include fingerprints, facial features, voice patterns, and more. Biometric authentication has become increasingly popular in recent years due to its convenience and perceived security benefits. However, ensuring that the BAS protocols are secure and cannot be easily compromised. . Developing a highly secure biometric authentication protocol is challenging, and proving its correctness is another challenge. In this work, we present a modern mechanism for formally analyzing biometric authentication security protocol by taking a Aadhaar Level-0 Iris-based Authentication Protocol as a use case. The mechanism uses formal methods to formally verify the security of the Aadhaar Level-0 Iris-based Authentication protocol, and is based on the widely-used BAN logic (Buruccu, Abadi, and Needham). Using Scyther model checker we analyze the existing biometric authentication protocol and have shown its effectiveness in identifying potential security vulnerabilities. The proposed mechanism is based on a set of security requirements that must be met for the protocol to be considered secure. These requirements include the need for the protocol to be resistant to replay attacks, man-in-the-middle attacks, and impersonation attacks. The mechanism also considers the possibility of an attacker obtaining the biometric data of a legitimate user.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals