Design, Implementation, and Deployment of an AI-enabled IoT System for Real-time Coal Grade Prediction through Near-Infrared Spectroscopy in Coal Handling Plants
Sponsoring Agency: TEXMiN, IIT (ISM) Dhanbad
Duration: 2024-2025 (Ongoing)
Role: Principal Investigator (PI)
Synopsis: In this project, our primary objective is to design and implement an AI-based IoT device for real-time prediction of coal grades using near-field infrared spectroscopy technology and deploy it at a coal handling plant. The implementation will include integrating NIR spectroscopy with existing laboratory techniques to provide a comprehensive assessment of coal quality, enhancing the overall analytical capabilities. We will develop Deep Neural Network models (e.g., CNNs, RNNs, and ViT models) from scratch to improve NIR spectroscopy accuracy in predicting coal quality parameters.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
SecIoT: An Integrated Framework for Comprehensive Security and Forensic Analysis of IoT-based Smart Home and Healthcare Devices & Wearables
Sponsoring Agency: DST-SERB, GoI
Duration: 2020-2022 (Completed)
Role: Principal Investigator (PI)
Synopsis: In this project, we attempt to propose a novel framework, termed SecIoT, for a holistic security analysis of state-of-the-art home and healthcare IoT devices/wearables. The framework will constitute a small-scale testbed comprising IoT devices. The test bed will emulate different environmental conditions under which the devices will be operational. Eventually, the devices’ security will be tested against a set of security requirements, and their behavior under various data and context-based attacks will be studied.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design and Development of an Integrated Security Risk Management System for an Enterprise Network (NetSecuritas)
Sponsoring Agency: Ministry of Electronics and Information Technology, New Delhi, GoI.
Duration: 2010 - 2013 (Completed)
Role: Research Consultant (RC)
Synopsis: The proposed project aims at the development of an integrated network risk management system for an enterprise network. The system will explore the network vulnerabilities and generate attack graph to assess the risk of an operational network. This includes developing the port scanning and vulnerability assessment framework, exploit knowledge base, attack graph generation, formulation of risk metrics, estimation of the network risk and suggesting mitigation techniques. A web-enabled integrated tool will be developed to realize the proposed methodology.
Technical details of the project are available here.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Design & Development of a Penetration Testing and Security Assessment Tool for Local Area Network (eJagriti)
Sponsoring Agency: HQ - IDS, Ministry of Defense, New Delhi, GoI.
Duration: 2007 - 2009 (Completed)
Role: Junior Project Officer (JPO)
Synopsis: In the last two decades, computers have become an integral part of everyday life. They are used for a variety of reasons at home and in workplaces. The organizations use many computers which are interconnected to form Enterprise LAN. As more number of such computers get connected to each other the threat of unauthorized access, denial of service, financial loss or simply loss of valuable data increases substantially. To be able to enjoy the benefits of collaborative computing and inter-connectivity it is imperative to have measures in place which prevent and detect any possible threat before they can cause the damage. Penetration Testing (PenTest) is a proactive method of detecting and removing all possible known threats and vulnerabilities which can be exploited by any hacker. PenTest is performed from a hacker’s point of view and hence gives a good insight of the loopholes in the security policies and even physical security of the LANs. While there are many existing open source and commercial tools that perform PenTest but their level of automation and process management varies considerably. The high costs and complex handling of the commercial tools make their use prohibitive, while the open source tools have an informal approach towards VA (vulnerability assessment) and PenTest. Hence, there is a need for an integrated, scalable, interactive, user-friendly, web-based framework for Penetration Testing which has been named as eJagriti in this project.
Technical details of the project are available here.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------