Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (8)

Search Parameters:
Authors = Aniruddha Bhattacharjya ORCID = 0000-0002-0777-7918

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 2535 KiB  
Article
Research on a Secure and Reliable Runtime Patching Method for Cyber–Physical Systems and Internet of Things Devices
by Zesheng Xi, Bo Zhang, Aniruddha Bhattacharjya, Yunfan Wang and Chuan He
Symmetry 2025, 17(7), 983; https://doi.org/10.3390/sym17070983 - 21 Jun 2025
Viewed by 427
Abstract
Recent advances in technologies such as blockchain, the Internet of Things (IoT), Cyber–Physical Systems (CPSs), and the Industrial Internet of Things (IIoT) have driven the digitalization and intelligent transformation of modern industries. However, embedded control devices within power system communication infrastructures have become [...] Read more.
Recent advances in technologies such as blockchain, the Internet of Things (IoT), Cyber–Physical Systems (CPSs), and the Industrial Internet of Things (IIoT) have driven the digitalization and intelligent transformation of modern industries. However, embedded control devices within power system communication infrastructures have become increasingly susceptible to cyber threats due to escalating software complexity and extensive network exposure. We have seen that symmetric conventional patching techniques—both static and dynamic—often fail to satisfy the stringent requirements of real-time responsiveness and computational efficiency in resource-constrained environments of all kinds of power grids. To address this limitation, we have proposed a hardware-assisted runtime patching framework tailored for embedded systems in critical power system networks. Our method has integrated binary-level vulnerability modeling, execution-trace-driven fault localization, and lightweight patch synthesis, enabling dynamic, in-place code redirection without disrupting ongoing operations. By constructing a system-level instruction flow model, the framework has leveraged on-chip debug registers to deploy patches at runtime, ensuring minimal operational impact. Experimental evaluations within a simulated substation communication architecture have revealed that the proposed approach has reduced patch latency by 92% over static techniques, which are symmetrical in a working way, while incurring less than 3% CPU overhead. This work has offered a scalable and real-time model-driven defense strategy that has enhanced the cyber–physical resilience of embedded systems in modern power systems, contributing new insights into the intersection of runtime security and grid infrastructure reliability. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

21 pages, 1317 KiB  
Article
Research on Hidden Backdoor Prompt Attack Method
by Huanhuan Gu, Qianmu Li, Yufei Wang, Yu Jiang, Aniruddha Bhattacharjya, Haichao Yu and Qian Zhao
Symmetry 2025, 17(6), 954; https://doi.org/10.3390/sym17060954 - 16 Jun 2025
Viewed by 685
Abstract
Existing studies on backdoor attacks in large language models (LLMs) have contributed significantly to the literature by exploring trigger-based strategies—such as rare tokens or syntactic anomalies—that, however, limit both their stealth and generalizability, rendering them susceptible to detection. In this study, we propose [...] Read more.
Existing studies on backdoor attacks in large language models (LLMs) have contributed significantly to the literature by exploring trigger-based strategies—such as rare tokens or syntactic anomalies—that, however, limit both their stealth and generalizability, rendering them susceptible to detection. In this study, we propose HDPAttack, a novel hidden backdoor prompt attack method which is designed to overcome these limitations by leveraging the semantic and structural properties of prompts as triggers rather than relying on explicit markers. Not symmetric to traditional approaches, HDPAttack injects carefully crafted fake demonstrations into the training data, semantically re-expressing prompts to generate examples that exhibit high consistency in input semantics and corresponding labels. This method guides models to learn latent trigger patterns embedded in their deep representations, thereby enabling backdoor activation through natural language prompts without altering user inputs or introducing conspicuous anomalies. Experimental results across datasets (SST-2, SMS, AGNews, Amazon) reveal that HDPAttack achieved an average attack success rate of 99.87%, outperforming baseline methods by 2–20% while incurring a classification accuracy loss of ≤1%. These findings set a new benchmark for undetectable backdoor attacks and underscore the urgent need for advancements in prompt-based defense strategies. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

22 pages, 6400 KiB  
Article
A Novel Spherical Shortest Path Planning Method for UAVs
by Fan Liu, Pengchuan Wang, Aniruddha Bhattacharjya and Qianmu Li
Drones 2024, 8(12), 749; https://doi.org/10.3390/drones8120749 - 12 Dec 2024
Viewed by 1470
Abstract
As a central subdivision of the low-altitude economy industry, industrial and consumer drones have broad market application prospects and are becoming the primary focus of the low-altitude economy; however, with increasing aircraft density, effective planning of reasonable flight paths and avoiding conflicts between [...] Read more.
As a central subdivision of the low-altitude economy industry, industrial and consumer drones have broad market application prospects and are becoming the primary focus of the low-altitude economy; however, with increasing aircraft density, effective planning of reasonable flight paths and avoiding conflicts between flight paths have become critical issues in UAV clustering. Current UAV path planning often concentrates on 2D and 3D realistic scenes, which do not meet the actual requirements of realistic spherical paths. This paper has proposed a Gradient-Based Optimization algorithm based on the State Transition function (STGBO) to address the spherical path planning problem for UAV clusters. The state transition function is applied on the scale of medium and high-dimensional cities, balancing the stability and efficiency of the algorithm. Through evolution and comparisons with many mainstream meta-heuristic algorithms, STGBO has demonstrated superior performance and effectiveness in solving Medium-Altitude Unmanned Aerial Vehicle (MUAV) path planning problems on three-dimensional spherical surfaces, contributing to the development of the low-altitude economy. Full article
Show Figures

Figure 1

16 pages, 407 KiB  
Article
A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things
by Huanhuan Gu, Jing Shang, Pengchuan Wang, Jingfeng Mi and Aniruddha Bhattacharjya
Symmetry 2024, 16(7), 851; https://doi.org/10.3390/sym16070851 - 5 Jul 2024
Cited by 8 | Viewed by 1575
Abstract
The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also raised concerns about information security, [...] Read more.
The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also raised concerns about information security, including data security and identity authentication. IIoT devices are particularly vulnerable to attacks due to their lack of robust key management systems, efficient authentication processes, high fault tolerance, and other issues. To address these challenges, technologies such as blockchain and the formal analysis of security protocols can be utilized. And blockchain-based Industrial Internet of Things (BIIoT) is the new direction. These technologies leverage the strengths of cryptography and logical reasoning to provide secure data communication and ensure reliable identity authentication and verification, thereby becoming a crucial support for maintaining the security of the Industrial Internet. In this paper, based on the theory of the strand space attack model, we improved the Fiber Channel Password Authentication Protocol (FACP) security protocol in the network environment based on symmetric cryptography and asymmetric cryptography. Specifically, in view of the problem that the challenge value cannot reach a consensus under the symmetric cryptography system, and the subject identity cannot reach a consensus under the asymmetric cryptography system, an improved protocol is designed and implemented to meet the authentication requirements, and the corresponding attack examples are shown. Finally, the effectiveness and security of the protocol were verified by simulating different networking environments. The improved protocol has shown an increase in efficiency compared with the original protocol across three different network configurations. There was a 6.43% increase in efficiency when centralized devices were connected to centralized devices, a 5.81% increase in efficiency when centralized devices were connected to distributed devices, and a 6.32% increase in efficiency when distributed devices were connected to distributed devices. Experimental results show that this protocol can enhance the security and efficiency of communication between devices and between devices and nodes (servers, disks) in commonly used Ethernet passive optical network (EPON) environments without affecting the identity authentication function. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

22 pages, 1753 KiB  
Article
Trusted Third Party Application in Durable Medium e-Service
by Grzegorz Bazydło, Kamil Kozdrój, Remigiusz Wiśniewski and Aniruddha Bhattacharjya
Appl. Sci. 2024, 14(1), 191; https://doi.org/10.3390/app14010191 - 25 Dec 2023
Cited by 5 | Viewed by 2142
Abstract
The paper presents a novel concept of applying a trusted third party (TTP) to the blockchain-based electronic service (e-service) in the form of a durable medium. The main aim of the proposed e-service is storing, managing, and processing sensitive electronic documents. The developed [...] Read more.
The paper presents a novel concept of applying a trusted third party (TTP) to the blockchain-based electronic service (e-service) in the form of a durable medium. The main aim of the proposed e-service is storing, managing, and processing sensitive electronic documents. The developed e-service meets the requirements of both Polish law (related to the durable medium) and market needs. Firstly, the functional requirements were defined. Subsequently, the adequate e-service was designed, and then implemented in a real company in Poland. Due to the nature of the durable medium e-service, the presented research combines scientific and implementation aspects. The designed and implemented e-service is secure (because of using the immutable blockchain technology merged with symmetric and asymmetric cryptographic algorithms) and trusted (by using TTP as the e-service provider, as well as an independent arbitrator monitoring the document storage and processing flow). Finally, the presented approach was experimentally verified using Hyperledger Besu—a blockchain implementation platform. During the realization of two designed test scenarios, over 30,000 transactions were added to the blockchain. Furthermore, security analyses were performed regarding inherent blockchain properties, the use of cryptographic algorithms, and potential cyberattacks and vulnerabilities. Full article
(This article belongs to the Special Issue Security and Privacy in Cyber-Physical Systems (CPSs))
Show Figures

Figure 1

13 pages, 1194 KiB  
Article
Preferential Delegated Proof of Stake (PDPoS)—Modified DPoS with Two Layers towards Scalability and Higher TPS
by Vishal Bachani and Aniruddha Bhattacharjya
Symmetry 2023, 15(1), 4; https://doi.org/10.3390/sym15010004 - 20 Dec 2022
Cited by 34 | Viewed by 5236
Abstract
Security and a decentralized system are identical unique features of Blockchain. In recent times, blockchain-based cryptocurrency has become mainstream, but the growth and value of transactions and application services remain volatile. Among all these applications, finding a fast consensus in a large-scale blockchain [...] Read more.
Security and a decentralized system are identical unique features of Blockchain. In recent times, blockchain-based cryptocurrency has become mainstream, but the growth and value of transactions and application services remain volatile. Among all these applications, finding a fast consensus in a large-scale blockchain network frequently requires extreme energy for huge computations and storing the complete blockchain for verification. These problems prevent further commercialization. Here, we present a solution to this problem. In this paper, we introduce a revised blockchain consensus algorithm, PDPoS, to address the scalability and transaction efficiency limitations. The symmetry in between Proof of Stake (PoS) and Delegated Proof of Stake (DPoS) is PoS. However, their ways of working are dissimilar. Here, we review the existing consensus algorithms, such as Proof of work (PoW), PoS and DPoS, as they are directly relating to our proposed work: PDPoS. We highligh Delegated Proof of Stake (DPoS)–based crypto-currencies, as they have much higher transactions per second (TPS) than PoW-based currencies. Then, we describe our proposed works and the working steps of the proposed PDPoS. Simulation results of the proposed PDPoS with two layers result in improved efficiency. We used TPS as the evolution criteria for showing that the proposed PDPoS is more efficient than DPoS. This makes the proposed work more relevant to the large-scale blockchain network as it is more efficient and requires less energy consumption. Full article
Show Figures

Figure 1

17 pages, 1776 KiB  
Article
Holistic Research on Blockchain’s Consensus Protocol Mechanisms with Security and Concurrency Analysis Aspects of CPS
by Aniruddha Bhattacharjya, Remigiusz Wisniewski and Venkatram Nidumolu
Electronics 2022, 11(17), 2760; https://doi.org/10.3390/electronics11172760 - 1 Sep 2022
Cited by 16 | Viewed by 2904
Abstract
In the present era, the consensus for blockchain is of three types: consortium/permissioned, decentralized/permissionless, and somewhat decentralized. Presently, security and privacy of blockchain scenarios are in four directions: auditability and transparency, accountability and nonrepudiation, contract privacy, and transactional privacies. Blockchain works on multilayered [...] Read more.
In the present era, the consensus for blockchain is of three types: consortium/permissioned, decentralized/permissionless, and somewhat decentralized. Presently, security and privacy of blockchain scenarios are in four directions: auditability and transparency, accountability and nonrepudiation, contract privacy, and transactional privacies. Blockchain works on multilayered architectures with its consensus mechanisms. In this paper, important mechanisms of various consensus protocols for application specific usage are analyzed. In general, these consensus mechanisms have four groups of properties; all are examined and discussed. Moreover, the security analysis is shown. Furthermore, the paper examines the elliptic curve digital signature algorithm (ECDSA), which is in use by the cryptocurrencies along with many blockchain-based systems. Moreover, a variant of ECDSA (vECDSA) is also considered. In particular, ECDSA and vECDSA are compared in this research. In addition, modeling and analysis aspects related to the security and concurrency aspects of CPS are discussed. In particular, Petri-net-based models of CPS are considered, especially in terms of liveness and boundedness properties of the system. Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

19 pages, 2642 KiB  
Article
Trusted and Secure Blockchain-Based Architecture for Internet-of-Medical-Things
by Aniruddha Bhattacharjya, Kamil Kozdrój, Grzegorz Bazydło and Remigiusz Wisniewski
Electronics 2022, 11(16), 2560; https://doi.org/10.3390/electronics11162560 - 16 Aug 2022
Cited by 35 | Viewed by 3045
Abstract
The Internet of Medical Things (IoMT) global market has grown and developed significantly in recent years, and the number of IoMT devices is increasing every year. IoMT systems are now very popular and have become part of our everyday life. However, such systems [...] Read more.
The Internet of Medical Things (IoMT) global market has grown and developed significantly in recent years, and the number of IoMT devices is increasing every year. IoMT systems are now very popular and have become part of our everyday life. However, such systems should be properly protected to preventing unauthorized access to the devices. One of the most popular security methods that additionally relies on real-time communication is Blockchain. Moreover, such a technique can be supported by the Trusted Third Party (TTP), which guarantees data immutability and transparency. The research and industrial community has predicted the proliferation of Blockchain-based IoMT (BIoMT), for providing security, privacy, and effective insurance processing. A connected environment comprises some of the unique features of the IoMT in the form of sensors and devices that capture and measure, recognize and classify, assess risk, notify, make conclusions, and take action. Distributed communication is also unique due to the combination of the fact that the Blockchain cannot be tampered with and the Peer-to-Peer (P2P) technique, especially compared to the traditional cloud-based techniques where the reliance of IoMT systems on the centralized cloud makes it somewhat vulnerable. This paper proposes a Blockchain-based technique oriented on IoMT applications with a focus on maintaining Confidentiality, Integrity, and Availability (the CIA triad) of data communication in the system. The proposed solution is oriented toward trusted and secure real-time communication. The presented method is illustrated by an example of a cloud-based hospital application. Finally, the security aspects of the proposed approach are studied and analyzed in detail. Full article
(This article belongs to the Special Issue Security in Embedded Systems and IoT: Challenges and New Directions)
Show Figures

Figure 1

Back to TopTop