@bhairabgangulycollege.ac.in
Principal
Bhairab Ganguly College
Prof. (Dr.) Subhranil Som received his PhD in Computer Science and Engineering. He is currently Principal of Bhairab Ganguly College, Kolkata, West Bengal, India and with additional charge as the Officer on Special Duty (OSD) in IT and Technology Innovation Cell, Higher Education Department, Government of West Bengal. His fields of interest include Cryptography, Network Security, Information Security, e-Health, Robotics, IoT, Core Java, other programming languages etc.
Five PhD awarded under his supervision. He has filed sixteen Patents out of which One South African paten, Two German patents and One UK Design Patent granted and 12 Published in Official Journal of the Patent Office, India. He has published more than 110 research papers in reputed International, National journals and conferences and author of 4 books. He was attached with a WHO’s International Research Project on “e-Health for Health Care Delivery”, University of New South Wales, Sydney, Australia. He has visited to
PhD in Computer Science & Engineering
Computer Science, Software, Computer Networks and Communications, Information Systems
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Jalaj Pateria, Laxmi Ahuja, and Subhranil Som
AIP Publishing
Jalaj Pateria, Laxmi Ahuja and S. Som
Totem Publisher, Inc.
With the rapid growth of cloud or on-premises storage, widespread networking and other physical devices, complex IT infrastructure and processes for creating, processing, and storing all forms of electronic data, securing data that too in the initial compromise phase is critical, so it doesn't translate back into a cyber-attack. During the covid pandemic where the whole world was working from open networks, data breaches and cyber security issues have gone to their peak. Intruders are moving laterally compromising data intelligently following various techniques like delaying the attack cycle where the intruder enters the network, gathers information, and stays away for a couple of days so that their previous interaction goes faded. This article describes the collaborative pattern analysis and event chaining of the compromised data during the reconnaissance phase of the attack chain and enables deception technology by enhancing predictability and planning to place decoys in the network dynamically. Deception technology can understand instantaneous data and provide verdicts based on real-time interactions. If any suspicious behaviour encountered by the decoys for that instance is co-related well with the attack matrix an alarm is being raised where decoys generate lures which create a false information stream that leads attackers exposed while protecting real enterprise network and assets. However, the current setup is not enabled to a level where it can track attackers who are working from multiple endpoints at the same time or using the gained data from the scans to access in the future. We are proposing a new and efficient Event chaining-based solution (named as DT-Chains) that overcomes the limitations in earlier proposed solutions. As part of this framework, we propose to design and develop a solution that will do an analysis on reconnaissance Attack Data. This newly proposed solution is expected to enable existing deception Technology to reduce false positives and helps to track attackers which are working from multiple endpoints at the same time or using the gained data from the scans to access in the future. This will also help in predicting the attack critical path which enables automated deception triggers for decoys.
Chesta Malkani, Nitin Pandey, and Subhranil Som
IEEE
Rapid changes in technological development in the last few decades and the latest pandemic situation brought a new era of academic structure, that engaged the aspect of learning and individual’s need through communication device is called online education. This structure has influenced a lot of educational, psychological, and social behavior in children. However, today the education requires alternate approaches of learning to which anyone gets access from anywhere which is called e-learning. In this paper, we underlined the adverse factor and analyze recent data regarding e-learning and digital screen and a long-term tendency of increasing mental health among children. It is now very necessary to notify that the existence of psychological and physical problems in children growing up due to online education, which they are not even aware of, must be emphasized earlier to prevent its consequences.
Nidhi Chandra, Sunil Kumar Khatri, and Subhranil Som
Inderscience Publishers
Kishore Kumar, Sarvesh Tanwar, Subhranil Som, and Shishir Kumar
IEEE
Today, the growth in the number of people using online services using various communication tools has caused most governments, personal and business organizations to adjust the way they conduct business and handle their knowledge about their identity. Internet users, however, are vulnerable to identity theft, which is growing and costing enormous amounts to the global industry. Therefore for applications, they need to use the highly protected credential concept. And from now on, most application developers are using the simple user id and password framework to protect the same, and they have skipped considering the enhanced artificial framework and implementing the cryptographic strategies to protect further. In this paper, Artificial intelligence approaches and cryptographic concepts are widely used to mitigate these threats and as a means of managing digital identity information on existing unsecured networks to protect users and service providers' in a simple, reliable, and effective manner. Cryptographic principles will be applied to both user-id and password for optimum user identification. Additionally, the user id is available to all users, but the password is inaccessible. The effect of this technique is a new authentication method for committing legitimate and secure online access to the applications with the complexity of time and space, along with a highly protective design, being easily feasible whereas, older systems comparatively implement user authentication using passwords or Keys. For example, one has to provide a password to check that they can use that password to impersonate it.
Divya Singhal, Subhranil Som, and Laxmi Ahuja
IEEE
Smart Grid components based on IoT increase ICT significantly. With the increased digitalization and usage of the internet, the ability to generate massive amounts of data has become possible. However, the aforementioned improvement also poses a significant privacy and security risk to smart grid clients. Their billing information, as well as their daily power use, may be readily hacked and released. This study examines the challenges that smart grid components, notably smart meters face, as well as how India continues to struggle to integrate technology into smart grid infrastructure. The study also focuses on the technologies and methods that may be utilised to protect the system against cyber-attacks.
Prabhat Manocha, Subhranil Som, and Kanjam Manocha
IEEE
Land disputes in India take on an average about 20 years to be resolved. To make matters worse, land-related disputes account for nearly two-thirds of all pending court cases in India. Disputes related to land ownership affect agriculture as land is used as collateral for obtaining loans by farmers. Such issues also affect development of new infrastructure due to nonavailability of encumbrance free land, demands for higher compensation by landowners, and filing of large number of arbitration cases by landowners. Land related disputes impact urbanisation too given the acute shortage for housing in the country. Last, but not the least generation of black money through benami transactions could be pre-empted and eliminated by digitisation of land records and their regular upgradation. While the problem is humongous, digitization is, perhaps, only the first step in the right direction. The solution needs to ensure that all existing land records are accurate and free of any encumbrances. It also needs to be more all-encompassing to address issues around land ownership, so far has not addressed. Blockchain due to its characteristics of trust and immutable ledger could be the potential solution to address this problem. The paper explains how Blockchain can help improve transparency, trust and efficiency of land ownership data.
Iti Burman, Subhranil Som, and Syed Akhter Hossain
Deanship of Scientific Research
Seema Nath, Subhranil Som, and Mukesh Chandra Negi
IOS Press
The internet of things (IoT) is a multiple devices, which connects with the internet for communication, in order to obtain the updated from the cloud. The fog can act as a controller and it is located between the IoT devices and cloud. The major attacks like de-synchronization, and disclosure has arises in the devices, this has been prevented. The major contribution in this work is key generation and authentication, for key generation the “advanced encryption standard algorithm” is developed, in which the new and old keys are generated. The encryption is done under the source side, and decryption is done under the device side. The fog security is maintained through “device tag, and bit wise XOR rotational algorithm”. The security, and the computational complexity is defined in this work and it is given in table format. The implementations are carried out in the MATLAB R2016 a. The proposed algorithm is compared with the existing protocols like LMAP, M2AP, EMAP, SASI, and RAPP, from the comparison the proposed methodology makes the better knowledge about the security and prevents from various attacks.
Shobha Tyagi, Subhranil Som, and S. K. Khatri
Informa UK Limited
Mobile Ad hoc Networks (MANETs) is an infrastructure less and random mobility-based class of wireless networks with seamless possibilities of ‘on the fly’ communication through self-coordination among autonomous mobile nodes while being in the transmission range of each other. This low cost, easy to deploy, simplicity, and self-organisation of MANET altogether revolutionised wired networks and could connect otherwise unreachable terrains/sites. To handle the severity of colossal issues like dynamic topology, scarce resources and frequent rupturing of established routes in MANETs, conservation of energy becomes inevitable to administer contemporary applications. After an extensive literature survey for provisioning reliability and multicast routing in MANETs, researchers concluded the conservation of mobile nodes energy embrace a very consequential role in extending network life. The PLA (Proposed Local Adjustment) model is based on eliminating flooding, preserving nodes battery life by selectively choosing forwarder node at each hop level, and handling route failures locally, eventually makes the network more robust and resilient. The PLA model when simulated on NS2.35 against AODV on various parameters like control overhead generated, packet delivery ratio, energy conserved index, produced quite convincing and promising results, to be offered to remote and rescue-based applications in the vicinity of infrastructure less regions.
Iti Burman, Subhranil Som, Syed Akhter Hossain, and Mayank Sharma
IGI Global
Educational data mining provides various advantages to the education systems in many ways. It enhances the teaching process, the learning process, the scholastic performance of students, career selection, employability, and more. The differences in attitude of students' behavior lead to difference in their academic performance. The article covers the non-intellectual parameters of students to enhance their academic performance. The study tests the relationship between psychometric constructs of students and their academic correlate. The models for enhancing intellectual performance which involves various non-intellectual parameters are analyzed using structural equation modeling. It is observed that the values of the models were retrieved near to fit values. The results entail that the models will be beneficial for students in improving their academic performance by revising their psychological parameters.
Saurabh Singh Rajawat, Subhranil Som, and Ajay Rana
IEEE
In the present day, Security and Safety are the major concern for the personage. We use C-Mount monitors in order to monitor and identify, but the C-mount has too much ability to record and needs staff to monitor the unlawful movement. Mobile device like Smart phones and I pad are used to perform daily tasks that are handle by commercial computers and laptop. Be overcome, we have found RP-3 model using IOT RP-3 model is much lowered compared to existing system with more appropriate settlement and less power use characteristics an “Internet Of Thing based Theft Detection using Raspberry Pi” Project where we had to use live video photo processing to espy stealer using motion as well as focus the area where motion reoccurred. In this model, we use a RP-camera together RP-3 model together with a route with Virtual show infrared for night and Thumb drive for Data Storage. The model uses imaging to espy and emphasize the exact filed of movement in the camera when camera movement is espying. The model now transmits photo of the event via Internet of Thing, which the End user can view online. It also stores the footage for additional reference in a Thumb drive. The End user can now convert online memory transmitted via Internet of Thing, the Internet of Thing model to view photo of the movements via the internet live. The model thus offers an extra powerful approach to Internet of Thing larceny espy.
Shaurya, Subhranil Som, and Ajay Rana
IEEE
Internet of Things is a technology that has been growing every second and has an impact on various sectors. Internet of Things helps to connect physical objects with each other with the use of internet. In the education sector, internet of things can be used to bridge the gap between the teacher and the student. From lectures and memorization to internet-enabled learning to knowledge-producing education to innovative education, educational sector has been developing continuously. Educational sector has reached its fourth revolution, also known as education 4.0. In relation to education sector, some of the latest technologies advancements are interactive whiteboard,3d printers, eBooks, tablets, augmented reality, attendance tracking system, virtual reality, cloud computing, hologram, biometrics, paper-thin smartphones, multi-touch LCD screen etc. Many students face problems with the traditional way of teaching, such as slow speed of learning and not able to attend school due to family problems. This paper addresses the previous works done in the field of education using Internet of Things to help overcome these problems and proposes an IoT Based Educational Model for Better Teaching-Learning Environment. This model suggests that there should neither be complete digitalization nor complete verbal assistance.
Seema Nath, Subhranil Som, and Mukesh Negi
IEEE
In today’s world due to advancement in computer related technology lot of innovation were emerging in the field of communication and data transmission. This pays the way for the development of the concept IoT. In the proposed work a live monitoring system is developed based on IoT. Security risk is the major issues in the IoT related systems. So, for achieving improved security in IoT enabled system the proposed work is designed. ECC is widely used technique in IoT for secure transmission of data. In spite of it there is possibility of occurring some security error as well as this technique is tricky and complex to implement effectively. For solving this issue, an ASO based ECC is developed for security enhancement. This ASO helps in improving the efficiency of ECC and assist in selecting the best key to perform the process of encryption and decryption. Because the key generation is optimal for achieving better security. Based on the simulation results obtained through implementation the performance of the proposed system is analysed. The statistical measurements like encryption time, entropy and PSNR were evaluated and a contrast is made with the existing method. The encryption time for the proposed method is 2.7384 sec, it is very less when compared to the other existing method.
Deepraj Pradhan, Subhranil Som, and Ajay Rana
IEEE
In the digital age when technology has advanced so much that communication between people is just a text away no matter where they are geographical. But with every advancement, the technology must be secure enough so that no eavesdropping can take place. That’s where cryptography comes into play, Cryptography is necessary when communicating over any untrusted medium. Cryptography is an important field in information security, and, in this modern age, cryptography is used everywhere from surfing the internet to phone calls. The requirement for a better cryptosystem keeps increasing as the advancement of modern computers outpaces the old cryptosystems. In cryptography, the plain text is the original text and ciphertext is the encrypted text. So, the proposed technique in this paper encrypts plain text into ciphertext that is unrecognizable that makes the ciphertext unidentifiable when compared to plain text. First, we generate a very large random number that is at least 1024 bits which will be the key. Encrypting the plaintext is based on the key, first the plain text is divided into blocks of 9 bytes then the key divided into array of ‘n/2’ number of pairs, the first digit of pair being position in the block and second digit being the number of bits to shift right, the shift is circular from the position of the selected character. In the decryption the left shift is performed to the blocks, the start of decryption begins from the end of the array of key pairs.
Mudit Arora, Subhranil Som, and Ajay Rana
IEEE
Cancer is one of the fastest growing disease around the world and subpart of it Breast Cancer that is growing rapidly and mostly affecting women. Early treatment of this disease is helpful and can act as an early prevention to the upcoming major cure. However this can only be possible only if women are able to know that they are suffering with such disease and this can be only diagnosed if they come up with it and openly sharing with family and Doctors about the disease. This can lead to be a bit challenging task as to detect this disease among women using mammography as patient communication can affect mammography performance. This disease has had many ideas and myths as to how we can diagnosed it but Machine Learning the subset of Artificial Intelligence that can help Doctors and Surgeons to learn from past experiments. To treat upcoming patients with similar anomalies has had the major help of saving many patients with its set of algorithms and set of applications it provides. This paper will be focusing on five of the popular supervised Machine Learning algorithms for Diagnosing Breast Cancer this will be K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB) and Decision Tree (DT) and the algorithm Random Forest gave the best results and the K Nearest Neighbor was the second best performing algorithm that produce desired results and the algorithm Naïve Bayes was the least performing algorithm
Prabhat Manocha, Subhranil Som, and Lovneesh Chanana
IEEE
Computerized India can bring significant change the way we connect with and convey administrations. It focuses around broadcast communications, cyber security, producing web based businesses, and the sharing economy in monetary, vitality, and social insurance portions. It empowers advancement, speculation, monetary development, assembling, and employment creation. This by implication enhances effectiveness, profitability, and prosperity of India’s citizenry – a potential lift to total national output (GDP) and financial advantages.The recognizable proof of administration variables of quality would assist in correctly organizes the citizen’s beneficiary system. This paper exhibits the discoveries of an analytic investigation utilizing an online overview on Indian e-government quality variables and its implementations via social media in India.The investigation means to recognize and organize the administration quality variables in view of comparative parameters distinguished by specialists for e-government quality and can be used further to construct a structure through social media delivery platform.
Subhranil Som and Renuka Mahajan
Springer International Publishing
Seema Nath, Subhranil Som, and Mukesh Negi
IEEE
Recently, improvement of the internet usages, huge amount of multimedia data is transmitted through the network. The encryption method is introduced to secure the multimedia data for improve individual privacy, copyrights and other security reasons. In this paper proposed the LCA algorithm for chaotic logistic map based image encryption. Trendy this map of logistic parameter tuning is attained with the help of the LCA algorithm. The LCA algorithm is working based on the competition of sports teams in a league match. Various people as game groups contend in a league match for a few weeks; founded on the LCA process, logistic maps are tuned. The proposed algorithm for encryption is process constructed scheduled the two tasks such as confusion in addition diffusion. In confusion, produce the cipher image from the plain image by conversion. Second, the diffusion procedure is developed to diffuse the sequences equally. Here, the logistic maps parameters are taken as the encryption key. To prove the secure and reliable of the technique of proposed which is executed in the MATLAB and simulation results and performance analysis are described popular in paper. The presentation of proposed technique be there analysis through the way, statistical test and security test which is competitive with other freshly developed image encryption algorithm. To prove the efficiency of the proposed method which paralleled with the existing methods such as Firefly Algorithm (FA) and Particle Swarm Optimization (PSO) respectively.
Iti Burman, Subhranil Som, Syed Akhter Hossain, and Mayank Sharma
IEEE
Predicting the student behavior is important as it leads to the scope of improvement in their academic achievement. Association refers to a process of identifying the frequent item sets or patterns from the given dataset in order to provide recommendations about the instances of specific item based on the identified patterns. This paper focuses on association rule mining technique to elicit pragmatic information from the primary data collected. The work carried here explores the relationship between student's intellectual performance and their psychological factors with the use of Apriori algorithm. It aims at predicting and improving academic performance of students by reshaping their psychological parameters.
Abhinav Malhotra, Subhranil Som, and Sunil Kumar Khatri
IEEE
The generation of IoT has brought a major and a positive impact on almost all areas including that of agriculture. With the help of IoT, we can now automate the irrigation process, shift to wireless form of communication from wired, and overcome the constraints which were previously considered expensive and difficult to maintain. The advent of IoT along with Wireless Sensor Networks (WSNs) has had a major impact on agriculture sector. Low-cost sensors are now starting to be used which helps in collection of large amounts of data. Data, which, in every way is beneficial for the agriculture business. It can help in measuring and maintaining the quality and the quantity of the crops and soil. For a long time, the effects of air pollution on crops have been ignored while others like pests and diseases are being treated. Pollution leads to reduction in crop growth and yield while also damaging and reducing their nutritional values. In this paper, we will be focusing on improving the practices for agriculture in India by increasing the crop yield and quality while keeping the cost to a minimum.
Vasu Sharma, Vineeta, Subhranil Som, and Sunil Kumar Khatri
IEEE
AI and IoT are the two terms which are predicted to be the future of technology; however they are being emerged in their new forms day by day. Various sensors are placed in the devices, which are then made light and wearable for humans, these devices keep a track of various aspects of human life.Wearables have given a new face to the healthcare of humans.The proposed research has been done over the wearable devices concerning health since they track steps, provide GPS facilities, find out calories burnt etc. but the breach which should be worked upon to make them much more useful is to set a system which not only calculates the amount of burnt calories burnt but also gives the ways to set yourself at your best health by providing you the guidance of your food intake to regulate the amount of the needful components of your health.