Skip to main content
N a t i o n a l   C o E

National CoE Research Projects

Where groundbreaking research meets real-world impact
National CoE Research Projects
Research Projects

24

Research Projects
Institutes

12

Institutes
Project Areas

19

Project Areas
Completed

24

Completed

Research Projects

Project Name Project Brief Use Case Area Deliverables Project Head Year Institute Status
Designing an API solution to allow Encrypted Backup and Restoration of chats for a messaging application The project aims to address the security and privacy concerns associated with backup mechanisms in messaging applications. It involves analyzing existing backup features in popular messaging apps like WhatsApp and Facebook Messenger, identifying vulnerabilities such as encryption weaknesses and cloud storage risks, and proposing solutions to enhance data security. Enhancing Security in Messaging Application Secure authentication and storage Application - providing convenient backup options in messaging applications. Dr. Gaurav Varshney Feb'23 IIT Jammu Completed
Image-based Robust Security Password Generation and Authentication System Using Hand Postures for IoT Enabled Devices This project aims to create an image-based authentication system for IoT devices utilizing real-time hand gestures by forming user credentials based on hand gestures. Authentication systems in Offices and Industry and home automation IoT Security and Authentication systems Design of API that will authenticate human with machine using his hand gestures Dr. Shivani Goel Feb'23 Bennett University Completed
Developing a Cryptanalysis Toolkit (SLNCrypt) - Desktop based toolkit for self-validation This project aims to develop a user-friendly desktop cryptanalysis toolkit (SCrypt) for self-validating cryptographic systems. The toolkit will undergo thorough testing for effectiveness and usability, ensuring it remains current with the latest cryptographic developments. Cryptographic system validation, Compliance, Incident Response Cryptanalysis Cryptanalysis Toolkit for analyzing whole cyber system Dr. Appala Naidu Feb'23 CR Rao AIMSCS Completed
Blockchain based lightweight authentication scheme for IoT environment This project aims to survey and analyze blockchain-based authentication schemes for IoT, including both centralized and distributed architectures. It focuses on designing a robust, lightweight authentication mechanism leveraging blockchain technology. The project further involves behavioral analysis through modeling, simulation, and real-time deployment verification. IoMT, IIoT IoT Security Software tool to carry out validation, security analysis and complexity analysis of the developed scheme using security analysis tool Dr. Appala Naidu Feb'23 CR Rao AIMSCS Completed
V-KAVACH: An Attack Resilient Malware Detection Framework for Virtualization Environment This project aims to establish a test bed environment with virtualized bare metal servers and deployed introspection tools for malware log generation. Objectives include creating feature vectors based on system call frequencies, developing a deep learning-based malware detection model using learned features, and assessing model robustness using counterfactual examples. business, governmental bodies, and security experts in a variety of fields. Virtualization Security, Malware Detection and Analysis, Attack Resilience A prototype of an interpretable malware analysis system for a virtualization environment in the form of a novel algorithm/technique Dr. Preeti Mishra Feb'23 Doon University, Dehradun Completed
Design and Development of Framework and Tool Suite for Adversarial Machine Learning Attacks This project aims to address Adversarial Machine Learning (AML) attacks, a new attack surface. The proposed solution involves studying AML attacks with focus on Network Packet Analysers and developing tools for White box and Black box testing. Testing Teams, ML based Product Development Companies, Can be integrated into the ML model release work flow ML Security Tools (White-Box Attack Tool, Black-Box Attack Tool) for ascertaining Security Posture of ML Models used specifically for Network attack detection Dr. Pradeepthi K.V. Feb'23 C R Rao Advanced Institute of Mathematics Completed
Mal-BI : Malware Detection on Botnet Network Traffic in IoT devices using Machine learning/Deep learning This project aims to develop a composite detection model for efficiently identifying various types of malware in botnet detection on IoT devices. It includes creating a high-performance learning framework utilizing nature-inspired algorithms for botnet malware detection. Healthcare, Manufacturing, Smart homes, Critical infrastructure IoT Security, Network Security, ML and DL for Security, Threat detection and Analysis Stand-alone and/or web-based application that help the researchers and industries to detects the malicious activities using Botnet and IoT devices. Dr. Mohit Sajwan Feb'23 Bennett University Completed
Developing a Secure End-to-End Communication Framework for IoT-Federated Cloud Architecture using Hybrid Blockchain System This project aims to develop a secure end-to-end communication framework for IoT-federated cloud architecture using a hybrid blockchain system. The proposed framework enhances security by enabling the hybrid blockchain to secure communication across IoT-fog-cloud networks, including identifying edge devices, authenticating IoT devices, securing cloud storage, authorization, and remotely encrypting sensitive information. Secure key exchange algorithms over unsecured channels, Tamper-resistant storage of keys and certificates, Missing Communication Security IoT Security, Cloud Security, Blockchain Security and End-to-end communication Security A Framework system for encryption from the Smart devices to the cloud in a cooperative flow Environment. Dr. E. Suresh Babu Feb'23 NIT Warangal Completed
Scalable and Energy Aware Robust Recommendation Aggregation in IoT Trust Management This project aims to design a distributed recommendation management system to handle a high volume of recommendations, ensuring network scalability and energy efficiency. The objectives include deploying a Proof-of-Concept via simulation platforms and implementing device design in a test-bed environment. Healthcare, Smart cities, Industrial IoT, Agriculture, Automotive IoT Security Development of the TMS module in the Simulation platform, Prototype devices designed with TMS modules Dr. Arka Prokash Mazumdar Feb'23 MNIT Jaipur Completed
Security Evaluation and Development of Malicious Client Handling System in Federated Setting using API This project aims to detect malicious clients in Federated Learning (FL) systems, addressing data poisoning and fairness issues to prevent adversarial client influence with low-power devices, utilizing secure RESTful APIs for model interaction. AI based Industries where clients need to interact with master server ML application - example - e-healthcare Secure Federated Learning and Healthcare Cybersecurity Server application where model interaction endpoints will be exposed via a secure RESTful API with stateless transactions Dr. Amitesh Singh Rajput Feb'23 BITS Pilani Completed
Deep-RW: A Deep learning tool for Ransomware Detection This project aims to develop a deep learning-based early ransomware detection system to accurately distinguish malware from benign software. It will investigate and evaluate various deep learning architectures and algorithms for ransomware detection using a large dataset of known ransomware and benign software. Healthcare, Financial services, Government, Education, Businesses, Individuals etc. Threat Detection and Prevention A deep learning-based ransomware detection system (Deep-RW) in the form of stand-alone and/or web-based applications Dr. Simranjit Singh Feb'23 Bennett University Completed
RobustXAI-MalDetect: Adversarially Robust and Explainable Artificial Intelligence based Malware Detection System This project aims to design an AI-based malware detection framework to effectively identify new and old malware based on runtime behavior. Objectives include developing robust detection models to stay ahead of malware designers and ensuring stakeholder acceptance by incorporating explainability. It will supplement/ substitute traditional technologies or act as an add-on to the present anti-malware software Malware Detection and Cybersecurity Analytics An API of the proposed malware detection system. Dr. Sanjay Kumar Sahay Feb'23 BITS Pilani, Goa Campus Completed
Two Way Offline Contactless Authentication Scheme for Digital Payments This project aims towards a solution which enables payments in low-connectivity areas like remote villages or during crises. It's designed for intrawallet transactions initially but can expand to inter-wallet or interbank payments. It ensures at least one atomic transfer in total offline situations, aiming for multiple authenticated transactions offline. Payments in environments of low Internet Data, Catastrophic situations - floods, earthquake and war like situations or government enforced regulated Internet access environments Secure Authentication A proof of working prototype Dr. Gaurav Varshney Feb'23 IIT Jammu Completed
RESilience-by-DEsign (RESIDE) — Open-source software tool for ranking cyber-attacks and performing quantitative safety-security risk assessments for critical infrastructures under adversarial attacks This project introduces a decision-theoretic multi-paradigm framework for comprehensive security risk assessment, integrating enterprise resources.RESIDE provides a multi-dimensional view of security risks, boasts flexibility, modularity, and reusability, and focuses on post-attack security and response management. It allows for time-dynamic analysis and modeling of temporal, causal dependencies, and attacker attributes, enhancing resilience in cybersecurity strategies. Medical IoT, SCADA and Smart Grids Cybersecurity Risk Management and Cybersecurity Resilience Entire framework supported by web-based GUI user-friendly software tool. A lighter qualitative app-based tool (christened RISKIO) for customized cyber-risk rating. Dr. Rajesh Kumar Feb'23 BITS Pilani Completed
ZigBSec: Enhanced Security for ZigBee Networks This project aims to conduct a comprehensive study of ZigBee architecture to uncover both known and unknown vulnerabilities. It includes implementing novel attacks on ZigBee networks to analyze their patterns and impacts. Home Automation, Industrial Automation, Smart healthcare, Consumer electronics IoT Security A modified ZigBee software stack that can be deployed on ZigBee hardware Dr. Pilli Emmanuel Shubhakar Feb'23 MNIT Jaipur Completed
Unified Drone Forensics Tool (UDFT) for Fly Path Reconstruction, Resident Files, Directories, Network Artifacts, Events Logs Analysis and Correlation among its Multiple Platforms This project aims to devise methodologies for physical and logical data acquisition from drones, including internal memory and storage cards. It involves integrating features to identify accurate file systems for faster data examination and developing a framework to examine information from drone images. Law-Enforcement agencies, Forensic Laboratories and Drone manufacturing agencies Digital Forensics Command line interface drone forensic tool Dr. Upasna Singh Feb'23 Defence Institute of Advance Technology, Pune Completed
Deep Learning-Based IDS for Defending Android-Based HTML5 Web Applications against Cross-Site Scripting (XSS) Attack This project aims to develop a novel approach for detecting malicious scripts in web applications using Convolutional Neural Networks (CNN) within a Chrome extension. The CNN model predicts potential security threats, alerting users to harmful scripts and ensuring browsing safety. Industry/Organization in need of safe internet/web browsing, Google chrome extension for general user. Web Based Applications CNN-based Deep Learning model for detecting malicious scripts, packaged as a user-friendly Chrome Extension Dr. Shashank Gupta Apr'21 Bits Pilani Completed
IoT Network Traffic Classification & attack detection [Network Traffic Characteristics using AI This project focuses on analyzing IoT network traffic to improve security monitoring, resource allocation, and quality of service definition. Objectives include identifying compromised devices, detecting attacking nodes, developing a coherent structure for traffic classification, and implementing machine learning algorithms for analysis and attack scenario detection Smart cities, Smart homes, Smart campuses Network Security, IoT Security, AI Attack Detection IoT security framework through the development of a coherent structure for traffic classification, implementation of ML algorithms Dr. Gaurav Singhal Apr'21 Bennett University Completed
HT-Pred: A complete defensive machine learning tool for Hardware Trojan Detection This project proposes a novel test pattern generation-based technique for efficient hardware Trojan (HT) detection. The technique generates optimal test patterns to activate rare-triggered nodes. Objectives include developing a unified predictor model, creating a deep learning framework for pre-silicon detection, and designing a pattern generation framework for post-silicon testing. IC's manufacturing company, defence, Hardware machinery utilizing organizations Hardware Security, AI A stand-alone or web-based application along with a unified machine learning-based framework for hardware Trojan detection Dr. Vijaypal Singh Rathore Apr'21 Bennett University Completed
Lightweight Image Encryption Techniques for Cloud-enabled IoT Applications using Chaotic Systems This project focuses on utilizing Chaotic Maps (CM) for securing multimedia data communication in IoT-to-fog networks. The modified Zigzag algorithm enables encryption of images of any size, resulting in a symmetric encryption technique. The randomness and security of the cipher images are rigorously tested ensuring robust encryption for IoT applications. Drone Companies and Defence Image Encryption, IoT Security, Chaotic Systems lightweight image encryption algorithm, implementing it in a mobile application Dr. Sanjeet Kumar Nayak Apr'21 Bennett University Completed
2PAKA (2 party Auth key agreement) protocol for devices using Post -Quantum Cryptography ld Blaze This project focuses on enhancing secure communication within IoT networks using an identity-based two-party authenticated key agreement (LB-ID-2PAKA) protocol based on Lattices. Through rigorous security analysis and simulation, the protocol demonstrates resilience against various attacks. The proposed solution addresses the growing need for secure communication in IoT environments, ensuring reliability and integrity across diverse devices. Smart Home Security, IIoT, Healthcare IoT, Smart Cities, Supply chain management, Agricultural IoT IoT Security, Android, DL a robust LB-ID-2PAKA protocol tailored for IoT devices Dr. SK Hafizul Islam Apr'21 IIIT Kalyani Completed
Algebraic differential cryptanalysis tool for analyzing IoT cipher (SIMON 64/128) This project aims to leverage the benefits of the SIMON lightweight block cipher which offers comparable security to AES for a given key size, making it a popular choice for IoT devices, known for its small hardware footprint, scalable architecture, low latency, and minimal power requirements. GIO, BPCL, HPCL, E-Commerce Industry, IoT industry Cryptanalysis, IoT Security combined attack strategy integrating algebraic truncated differential cryptanalysis and a statistical distinguisher for SIMON 64/128 to reduce attack complexities significantly. Dr. Appala Naidu Tentu Apr'21 C R Rao AIMSCS Completed
AI/ML-driven Intrusion Detection Framework for IoT enabled Cold Storage Monitoring This project focuses on developing an intrusion detection framework for IoT-based smart cold storage monitoring systems. Malicious nodes pose threats such as false data injection and flooding attacks, prompting the need for robust security measures to enhance security and reliability in cold storage monitoring systems through effective intrusion detection mechanisms. Cold Storage IoT Security, AI & ML an IDS framework tailored for cold storage monitoring systems, alongside data preprocessing to generate high-accuracy IoT-based IDS datasets Dr. Sachin Tripathi Apr'21 Bennett University / IIT Dhanbad Completed
A Novel DNA Based Auth for Securing Resource-limited Mobile Environments This project proposes a DNA-based authentication system utilizing HECC for roaming service in mobile networks. By employing DNA cryptography, passwords are encrypted based on DNA sequences, ensuring secure user-server authentication. Performance evaluation demonstrates reduced communication costs and overhead, meeting security requirements for mobility environments. IC's manufacturing company, defence, Hardware machinery Secure Authentication, Privacy a novel DNA-based authentication system using HECC for global roaming, offering a privacy-preserving mechanism Dr. Shashidhar R Apr'21 Bennett University Completed
Two Way Dynamic QR for Payments (Offline authentication) This project aims to introduce a novel scheme utilizing Biometric Cards for contactless shopping on websites. By combining traditional NFC cards with fingerprint authentication, users can securely transact online via laptops and mobile phones supporting NFC. Can be used in areas with low/no cellular network connectivity Digital Payment, Secure Authentication, Cryptography the development and implementation of a scheme using biometric cards for contactless shopping on websites Dr. Gaurav Varshney Apr'21 IIT Jammu Completed
Partner with National CoE Partner with National CoE

Collaborate with National CoE

Join Forces, Drive Innovation.

Collaboration Inquiry

For queries, please drop a line to ncoe@dsci.in