Dr Ashish Nanda is a Lecturer in Faculty of Engineering and Information Technologies at University of Technology Sydney, Australia. He received his PhD from University of Technology Sydney, Australia in 2018 and Bachelors of Technology (Computer Science & Engineering) from Amity University in 2014.
His current research focus is in Cyber Security, to design and develop security and privacy model for Internet of Things (IoT), Distributed Computing (Edge/Fog Computing). In credit to his research, Ashish has published Multiple ERA ranked A*/A conference and journal papers.
Web Chair & Facility Coordinator, IEEE TrustCom/BigDataSE/ICESS 2017.
Reviewer, IEEE TrustCom 2017 (ERA Rank: A).
Reviewer, IEEE Consumer Electronics Magazine.
Reviewer, KSII Transactions on Internet and Information Systems.
Reviewer, Future Generation Computer Systems.
Distributed Computing and Networking
Internet of Things (IoT)
Digital and Cyber Crime
Nanda, A, Nanda, P, He, X, Jamdagni, A & Puthal, D 2019, 'A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks', Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.View/Download from: Publisher's site
As we progress in into a digital era where most aspects of our life depend upon a network of computers,it is essential to focus on digital security. Each component of a network, be it a physical network, virtualnetwork or social network requires security when transmitting data. Hence the dynamic wireless meshnetwork must also deploy high levels of security as found in current legacy networks. This paper presentsa secure Geo-Location Oriented Routing (Secure-GLOR) protocol for wireless mesh networks, whichincorporates a hybrid encryption scheme for its multilevel security framework. The hybrid encryptiontechnique improves the network's overall performance compared to the basic encryption by using acombination of symmetric key as well as asymmetric key encryption. Using the combination of the twoencryption schemes, the performance of the network can be improved by reducing the transmitted datasize, reduced computational overhead and faster encryption–decryption cycles. In this paper discussedmultiple encryption schemes for both symmetric and asymmetric encryption, compare their performancein various experimental scenarios. Proposed security scheme achieves better performance based on theresults obtained with most viable options for our network model.
Nanda, A, Puthal, D, Rodrigues, JJPC & Kozlov, SA 2019, 'Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions', IEEE Wireless Communications, vol. 26, no. 4, pp. 60-65.View/Download from: Publisher's site
© 2002-2012 IEEE. The Internet of Things (IoT) is an emerging technology that has gained a huge user base by facilitating Internet-connected devices being used in numerous applications including smart vehicular infrastructure. In this context, we focus on the traditional vehicular ad hoc network that has evolved into a new perception called the Internet of Vehicles (IoV), and is expected to soon transform into the Internet of Autonomous Vehicles (IoAV). IoAV hopes to facilitate smart vehicular infrastructure and autonomous driving without the need for human involvement. However, as the number of connected vehicles keeps increasing, so does the need for autonomous decision making. Hence, the IoAV must provide robust, secure, seamless, and scalable communication among the vehicles as well as the roadside units. This article provides an overview of autonomous vehicle communication layers, its associated properties, and security threats. Further, this article also briefly discusses the current research trends and future research issues.
Puthal, D, Ranjan, R, Nanda, A, Nanda, P, Jayaraman, PP & Zomaya, AY 2019, 'Secure authentication and load balancing of distributed edge datacenters', Journal of Parallel and Distributed Computing, vol. 124, pp. 60-69.View/Download from: Publisher's site
© 2018 Edge computing is an emerging research area to incorporate cloud computing into edge network devices. An Edge datacenter, also referred to as EDC, processes data streams and user requests in real-time and is therefore used to decrease the latency and congestion in the network. EDC is usually setup as a distributed system and is accordingly placed between the cloud datacenter and the data source. These EDCs work as an intermediate layer in the fog hierarchy between IoT and Cloud datacenter. EDC's are aided by load balancers, responsible for distributing the workload amongst multiple EDC, in order to optimize resource utilization and response time. The load balancers make sure that the workload is equally divided amongst the available EDCs to avoid over loading of some EDCs while other remain idle as this directly impacts the user response and real-time event detection. Given the fact that EDCs are deployed in remote environments, the need for secure authentication is of major importance. In this paper we propose a novel load balancing technique that enables EDC authentication as well as identification of idle EDCs for better load balancing. The proposed load balancing technique is also compared with existing approaches and proves to be more efficient in locating EDC's with less workload. In addition to the improved efficiency, the proposed scheme also strengthens the security of the network by incorporating destination EDC authentication.
Nanda, A, Nanda, P, Obaidat, M, He, X & Puthal, D 2019, 'A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks', IEEE eXpress Conference Publishing, IEEE ComSoc, IEEE GLOBECOM, IEEE, Hilton Waikoloa Village, Hawaii, USA.View/Download from: Publisher's site
A major concern in distributed networks is the ability to provide acceptable levels of security. This is achieved by using encryption and authentication mechanisms that depend on encryption keys. However, given the ever-expanding nature of the network, it is difficult to keep setting up authorities that can aid the key-exchange process. This paper presents a novel
solution to the challenge of exchanging keys of a large, distributed network without the need to set up additional authorities. The key-exchange scheme presented takes advantage of features such as packet anonymity, random selection and a multi-path approach for the exchange process. The paper also discusses the effectiveness of the proposed scheme against various
Nanda, A, Nanda, P, He, X, Puthal, D & Jamdagni, A 2018, 'A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks', Proceedings of the 51st Hawaii International Conference on System Sciences 2018, International Conference on System Sciences, Hawaii, USA, pp. 5532-5541.
Authentication is an essential part of any network and plays a pivotal role in ensuring the security of a network by preventing unauthorised devices/users access to the network. As dynamic wireless mesh networks are evolving and being accepted in various fields, there is a strong need to improve the security of the network. It's features like self-organizing and self-healing make it great but get undermined when rigid authentication schemes are used. We propose a hybrid authentication scheme for such dynamic mesh networks under three specified scenarios; full authentication, quick authentication and new node authentication. The proposed schemes are applied on our previous works on dynamic mesh routing protocol, Geo location Oriented Routing Protocol (GLOR Simulation results show our proposed scheme is efficient in terms of resource utilization as well as defending against security threats.
Nanda, A, Nanda, P, He, X, Jamdagni, A & Puthal, D 2017, 'Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks', 2017 IEEE Trustcom/BigDataSE/ICESS, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, Sydney, Australia, pp. 269-276.View/Download from: Publisher's site
With the dawn of a new era, digital security has become one of the most essential part of any network. Be it a physical network, virtual network or social network, the demand for secure data transmission is ever increasing. Wireless mesh networks also stand the same test of security as the legacy networks. This paper presents a secure version of the Geo-Location Oriented Routing (GLOR) protocol for wireless mesh networks, incorporating a multilevel security framework. It implements authentication using the new features of the network model and enables encryption throughout the network to provide high levels of security
Nanda, A, Nanda, P & He, X 2016, 'Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network', Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications (HPCC-2016), IEEE International Conference on High Performance Computing and Communications, IEEE, Sydney, Australia.View/Download from: Publisher's site
Wireless Mesh Network is an emerging technology with great potential to become a Self-Sustained Network. Unlike the traditional networks that dominate the current communication system and rely on a large and expensive setup of wired/wireless access points to provide connection between users, the Wireless Mesh Network is formed by the user devices (referred as Nodes) which connect to each other to form a network. However, due to the use of legacy/traditional network models for mesh networks, there exist various limitations towards its implementation. This paper presents a new approach towards the Wireless Mesh Network, incorporating a new routing scheme based on the Geo-Location of the devices. It puts forward the structure, working principle and its performance during the first implementation.
Nanda, A, Nanda, P, He, X & Jamdagni, A 2016, 'A Secure Routing Scheme for Wireless Mesh Networks', ICISS 2016: Information Systems Security (LNCS), International Conference on Information Systems Security (ICISS), Springer, Jaipur, India, pp. 393-408.View/Download from: Publisher's site
Wireless Mesh Network is an emerging technology with great potential for evolving into a self-sustained network. The traditional networks, which dominate the present day communication systems, rely on large and expensive setups of wired/wireless access points for connection between users. Unlike the traditional networks, a Wireless Mesh Network is formed by the user devices which connect to each other to form a network. The security of such networks is however very low as each data packet passes through multiple devices making it susceptible to vulnerabilities. This paper discusses a new network model that implements a strong security framework over a new routing technique. The new network model, unlike any other, features a new addressing scheme that is no longer limited by the drawbacks of the legacy systems and can hence implement better security measures.