National CoE Research Projects
Where groundbreaking research meets real-world impact


24
Research Projects
12
Institutes
19
Project Areas
24
CompletedResearch Projects
Project Name | Project Brief | Use Case | Area | Deliverables | Project Head | Year | Institute | Status | |
---|---|---|---|---|---|---|---|---|---|
Designing an API solution to allow Encrypted Backup and Restoration of chats for a messaging application | The project aims to address the security and privacy concerns associated with backup mechanisms in messaging applications. It involves analyzing existing backup features in popular messaging apps like WhatsApp and Facebook Messenger, identifying vulnerabilities such as encryption weaknesses and cloud storage risks, and proposing solutions to enhance data security. | Enhancing Security in Messaging Application | Secure authentication and storage | Application - providing convenient backup options in messaging applications. | Dr. Gaurav Varshney | Feb'23 | IIT Jammu | Completed | |
Image-based Robust Security Password Generation and Authentication System Using Hand Postures for IoT Enabled Devices | This project aims to create an image-based authentication system for IoT devices utilizing real-time hand gestures by forming user credentials based on hand gestures. | Authentication systems in Offices and Industry and home automation | IoT Security and Authentication systems | Design of API that will authenticate human with machine using his hand gestures | Dr. Shivani Goel | Feb'23 | Bennett University | Completed | |
Developing a Cryptanalysis Toolkit (SLNCrypt) - Desktop based toolkit for self-validation | This project aims to develop a user-friendly desktop cryptanalysis toolkit (SCrypt) for self-validating cryptographic systems. The toolkit will undergo thorough testing for effectiveness and usability, ensuring it remains current with the latest cryptographic developments. | Cryptographic system validation, Compliance, Incident Response | Cryptanalysis | Cryptanalysis Toolkit for analyzing whole cyber system | Dr. Appala Naidu | Feb'23 | CR Rao AIMSCS | Completed | |
Blockchain based lightweight authentication scheme for IoT environment | This project aims to survey and analyze blockchain-based authentication schemes for IoT, including both centralized and distributed architectures. It focuses on designing a robust, lightweight authentication mechanism leveraging blockchain technology. The project further involves behavioral analysis through modeling, simulation, and real-time deployment verification. | IoMT, IIoT | IoT Security | Software tool to carry out validation, security analysis and complexity analysis of the developed scheme using security analysis tool | Dr. Appala Naidu | Feb'23 | CR Rao AIMSCS | Completed | |
V-KAVACH: An Attack Resilient Malware Detection Framework for Virtualization Environment | This project aims to establish a test bed environment with virtualized bare metal servers and deployed introspection tools for malware log generation. Objectives include creating feature vectors based on system call frequencies, developing a deep learning-based malware detection model using learned features, and assessing model robustness using counterfactual examples. | business, governmental bodies, and security experts in a variety of fields. | Virtualization Security, Malware Detection and Analysis, Attack Resilience | A prototype of an interpretable malware analysis system for a virtualization environment in the form of a novel algorithm/technique | Dr. Preeti Mishra | Feb'23 | Doon University, Dehradun | Completed | |
Design and Development of Framework and Tool Suite for Adversarial Machine Learning Attacks | This project aims to address Adversarial Machine Learning (AML) attacks, a new attack surface. The proposed solution involves studying AML attacks with focus on Network Packet Analysers and developing tools for White box and Black box testing. | Testing Teams, ML based Product Development Companies, Can be integrated into the ML model release work flow | ML Security | Tools (White-Box Attack Tool, Black-Box Attack Tool) for ascertaining Security Posture of ML Models used specifically for Network attack detection | Dr. Pradeepthi K.V. | Feb'23 | C R Rao Advanced Institute of Mathematics | Completed | |
Mal-BI : Malware Detection on Botnet Network Traffic in IoT devices using Machine learning/Deep learning | This project aims to develop a composite detection model for efficiently identifying various types of malware in botnet detection on IoT devices. It includes creating a high-performance learning framework utilizing nature-inspired algorithms for botnet malware detection. | Healthcare, Manufacturing, Smart homes, Critical infrastructure | IoT Security, Network Security, ML and DL for Security, Threat detection and Analysis | Stand-alone and/or web-based application that help the researchers and industries to detects the malicious activities using Botnet and IoT devices. | Dr. Mohit Sajwan | Feb'23 | Bennett University | Completed | |
Developing a Secure End-to-End Communication Framework for IoT-Federated Cloud Architecture using Hybrid Blockchain System | This project aims to develop a secure end-to-end communication framework for IoT-federated cloud architecture using a hybrid blockchain system. The proposed framework enhances security by enabling the hybrid blockchain to secure communication across IoT-fog-cloud networks, including identifying edge devices, authenticating IoT devices, securing cloud storage, authorization, and remotely encrypting sensitive information. | Secure key exchange algorithms over unsecured channels, Tamper-resistant storage of keys and certificates, Missing Communication Security | IoT Security, Cloud Security, Blockchain Security and End-to-end communication Security | A Framework system for encryption from the Smart devices to the cloud in a cooperative flow Environment. | Dr. E. Suresh Babu | Feb'23 | NIT Warangal | Completed | |
Scalable and Energy Aware Robust Recommendation Aggregation in IoT Trust Management | This project aims to design a distributed recommendation management system to handle a high volume of recommendations, ensuring network scalability and energy efficiency. The objectives include deploying a Proof-of-Concept via simulation platforms and implementing device design in a test-bed environment. | Healthcare, Smart cities, Industrial IoT, Agriculture, Automotive | IoT Security | Development of the TMS module in the Simulation platform, Prototype devices designed with TMS modules | Dr. Arka Prokash Mazumdar | Feb'23 | MNIT Jaipur | Completed | |
Security Evaluation and Development of Malicious Client Handling System in Federated Setting using API | This project aims to detect malicious clients in Federated Learning (FL) systems, addressing data poisoning and fairness issues to prevent adversarial client influence with low-power devices, utilizing secure RESTful APIs for model interaction. | AI based Industries where clients need to interact with master server ML application - example - e-healthcare | Secure Federated Learning and Healthcare Cybersecurity | Server application where model interaction endpoints will be exposed via a secure RESTful API with stateless transactions | Dr. Amitesh Singh Rajput | Feb'23 | BITS Pilani | Completed | |
Deep-RW: A Deep learning tool for Ransomware Detection | This project aims to develop a deep learning-based early ransomware detection system to accurately distinguish malware from benign software. It will investigate and evaluate various deep learning architectures and algorithms for ransomware detection using a large dataset of known ransomware and benign software. | Healthcare, Financial services, Government, Education, Businesses, Individuals etc. | Threat Detection and Prevention | A deep learning-based ransomware detection system (Deep-RW) in the form of stand-alone and/or web-based applications | Dr. Simranjit Singh | Feb'23 | Bennett University | Completed | |
RobustXAI-MalDetect: Adversarially Robust and Explainable Artificial Intelligence based Malware Detection System | This project aims to design an AI-based malware detection framework to effectively identify new and old malware based on runtime behavior. Objectives include developing robust detection models to stay ahead of malware designers and ensuring stakeholder acceptance by incorporating explainability. | It will supplement/ substitute traditional technologies or act as an add-on to the present anti-malware software | Malware Detection and Cybersecurity Analytics | An API of the proposed malware detection system. | Dr. Sanjay Kumar Sahay | Feb'23 | BITS Pilani, Goa Campus | Completed | |
Two Way Offline Contactless Authentication Scheme for Digital Payments | This project aims towards a solution which enables payments in low-connectivity areas like remote villages or during crises. It's designed for intrawallet transactions initially but can expand to inter-wallet or interbank payments. It ensures at least one atomic transfer in total offline situations, aiming for multiple authenticated transactions offline. | Payments in environments of low Internet Data, Catastrophic situations - floods, earthquake and war like situations or government enforced regulated Internet access environments | Secure Authentication | A proof of working prototype | Dr. Gaurav Varshney | Feb'23 | IIT Jammu | Completed | |
RESilience-by-DEsign (RESIDE) — Open-source software tool for ranking cyber-attacks and performing quantitative safety-security risk assessments for critical infrastructures under adversarial attacks | This project introduces a decision-theoretic multi-paradigm framework for comprehensive security risk assessment, integrating enterprise resources.RESIDE provides a multi-dimensional view of security risks, boasts flexibility, modularity, and reusability, and focuses on post-attack security and response management. It allows for time-dynamic analysis and modeling of temporal, causal dependencies, and attacker attributes, enhancing resilience in cybersecurity strategies. | Medical IoT, SCADA and Smart Grids | Cybersecurity Risk Management and Cybersecurity Resilience | Entire framework supported by web-based GUI user-friendly software tool. A lighter qualitative app-based tool (christened RISKIO) for customized cyber-risk rating. | Dr. Rajesh Kumar | Feb'23 | BITS Pilani | Completed | |
ZigBSec: Enhanced Security for ZigBee Networks | This project aims to conduct a comprehensive study of ZigBee architecture to uncover both known and unknown vulnerabilities. It includes implementing novel attacks on ZigBee networks to analyze their patterns and impacts. | Home Automation, Industrial Automation, Smart healthcare, Consumer electronics | IoT Security | A modified ZigBee software stack that can be deployed on ZigBee hardware | Dr. Pilli Emmanuel Shubhakar | Feb'23 | MNIT Jaipur | Completed | |
Unified Drone Forensics Tool (UDFT) for Fly Path Reconstruction, Resident Files, Directories, Network Artifacts, Events Logs Analysis and Correlation among its Multiple Platforms | This project aims to devise methodologies for physical and logical data acquisition from drones, including internal memory and storage cards. It involves integrating features to identify accurate file systems for faster data examination and developing a framework to examine information from drone images. | Law-Enforcement agencies, Forensic Laboratories and Drone manufacturing agencies | Digital Forensics | Command line interface drone forensic tool | Dr. Upasna Singh | Feb'23 | Defence Institute of Advance Technology, Pune | Completed | |
Deep Learning-Based IDS for Defending Android-Based HTML5 Web Applications against Cross-Site Scripting (XSS) Attack | This project aims to develop a novel approach for detecting malicious scripts in web applications using Convolutional Neural Networks (CNN) within a Chrome extension. The CNN model predicts potential security threats, alerting users to harmful scripts and ensuring browsing safety. | Industry/Organization in need of safe internet/web browsing, Google chrome extension for general user. | Web Based Applications | CNN-based Deep Learning model for detecting malicious scripts, packaged as a user-friendly Chrome Extension | Dr. Shashank Gupta | Apr'21 | Bits Pilani | Completed | |
IoT Network Traffic Classification & attack detection [Network Traffic Characteristics using AI | This project focuses on analyzing IoT network traffic to improve security monitoring, resource allocation, and quality of service definition. Objectives include identifying compromised devices, detecting attacking nodes, developing a coherent structure for traffic classification, and implementing machine learning algorithms for analysis and attack scenario detection | Smart cities, Smart homes, Smart campuses | Network Security, IoT Security, AI Attack Detection | IoT security framework through the development of a coherent structure for traffic classification, implementation of ML algorithms | Dr. Gaurav Singhal | Apr'21 | Bennett University | Completed | |
HT-Pred: A complete defensive machine learning tool for Hardware Trojan Detection | This project proposes a novel test pattern generation-based technique for efficient hardware Trojan (HT) detection. The technique generates optimal test patterns to activate rare-triggered nodes. Objectives include developing a unified predictor model, creating a deep learning framework for pre-silicon detection, and designing a pattern generation framework for post-silicon testing. | IC's manufacturing company, defence, Hardware machinery utilizing organizations | Hardware Security, AI | A stand-alone or web-based application along with a unified machine learning-based framework for hardware Trojan detection | Dr. Vijaypal Singh Rathore | Apr'21 | Bennett University | Completed | |
Lightweight Image Encryption Techniques for Cloud-enabled IoT Applications using Chaotic Systems | This project focuses on utilizing Chaotic Maps (CM) for securing multimedia data communication in IoT-to-fog networks. The modified Zigzag algorithm enables encryption of images of any size, resulting in a symmetric encryption technique. The randomness and security of the cipher images are rigorously tested ensuring robust encryption for IoT applications. | Drone Companies and Defence | Image Encryption, IoT Security, Chaotic Systems | lightweight image encryption algorithm, implementing it in a mobile application | Dr. Sanjeet Kumar Nayak | Apr'21 | Bennett University | Completed | |
2PAKA (2 party Auth key agreement) protocol for devices using Post -Quantum Cryptography ld Blaze | This project focuses on enhancing secure communication within IoT networks using an identity-based two-party authenticated key agreement (LB-ID-2PAKA) protocol based on Lattices. Through rigorous security analysis and simulation, the protocol demonstrates resilience against various attacks. The proposed solution addresses the growing need for secure communication in IoT environments, ensuring reliability and integrity across diverse devices. | Smart Home Security, IIoT, Healthcare IoT, Smart Cities, Supply chain management, Agricultural IoT | IoT Security, Android, DL | a robust LB-ID-2PAKA protocol tailored for IoT devices | Dr. SK Hafizul Islam | Apr'21 | IIIT Kalyani | Completed | |
Algebraic differential cryptanalysis tool for analyzing IoT cipher (SIMON 64/128) | This project aims to leverage the benefits of the SIMON lightweight block cipher which offers comparable security to AES for a given key size, making it a popular choice for IoT devices, known for its small hardware footprint, scalable architecture, low latency, and minimal power requirements. | GIO, BPCL, HPCL, E-Commerce Industry, IoT industry | Cryptanalysis, IoT Security | combined attack strategy integrating algebraic truncated differential cryptanalysis and a statistical distinguisher for SIMON 64/128 to reduce attack complexities significantly. | Dr. Appala Naidu Tentu | Apr'21 | C R Rao AIMSCS | Completed | |
AI/ML-driven Intrusion Detection Framework for IoT enabled Cold Storage Monitoring | This project focuses on developing an intrusion detection framework for IoT-based smart cold storage monitoring systems. Malicious nodes pose threats such as false data injection and flooding attacks, prompting the need for robust security measures to enhance security and reliability in cold storage monitoring systems through effective intrusion detection mechanisms. | Cold Storage | IoT Security, AI & ML | an IDS framework tailored for cold storage monitoring systems, alongside data preprocessing to generate high-accuracy IoT-based IDS datasets | Dr. Sachin Tripathi | Apr'21 | Bennett University / IIT Dhanbad | Completed | |
A Novel DNA Based Auth for Securing Resource-limited Mobile Environments | This project proposes a DNA-based authentication system utilizing HECC for roaming service in mobile networks. By employing DNA cryptography, passwords are encrypted based on DNA sequences, ensuring secure user-server authentication. Performance evaluation demonstrates reduced communication costs and overhead, meeting security requirements for mobility environments. | IC's manufacturing company, defence, Hardware machinery | Secure Authentication, Privacy | a novel DNA-based authentication system using HECC for global roaming, offering a privacy-preserving mechanism | Dr. Shashidhar R | Apr'21 | Bennett University | Completed | |
Two Way Dynamic QR for Payments (Offline authentication) | This project aims to introduce a novel scheme utilizing Biometric Cards for contactless shopping on websites. By combining traditional NFC cards with fingerprint authentication, users can securely transact online via laptops and mobile phones supporting NFC. | Can be used in areas with low/no cellular network connectivity | Digital Payment, Secure Authentication, Cryptography | the development and implementation of a scheme using biometric cards for contactless shopping on websites | Dr. Gaurav Varshney | Apr'21 | IIT Jammu | Completed |

Collaborate with National CoE
Join Forces, Drive Innovation.
Collaboration InquiryFor queries, please drop a line to ncoe@dsci.in