Faculty Directory Sudip Kumar Palit
Sudip Kumar Palit

Sudip Kumar Palit

Associate Professor

Academic Information

Ph.D. UEM, 2026

Research Interests

My research focuses on the intersection of blockchain architecture and network security, specifically enhancing the scalability and integrity of distributed systems. I specialize in developing decentralized applications (dApps) and smart contracts, underpinned by robust cryptographic protocols for lightweight authentication. By leveraging formal verification tools like AVISPA, I ensure protocol resilience against complex attack vectors. Furthermore, my work integrates SOC-SIEM frameworks and malware analysis to fortify system defenses. Combining theoretical security models with hands-on penetration testing using Wireshark and Burp Suite, I aim to build high-performance, secure decentralized infrastructures.

Courses Taught

Cyber security, python, MCA project guide

Positions Held

1. Associate Professor, Cybersecurity Centre of excellence, IEM, UEM KOLKATA
2. HOD In-Charge – Department of Computer Science, Durgapur Women’s College, Kazi Nazrul University, Asansol (Jul 2017 – Jun 2023)
Assistant Coordinator – IGNOU Study Centre – 2848, Durgapur Women’s College (May 2010 –Jun 2024)

Publications

1. "AUGChain: blockchain-based mobile user authentication scheme in global mobility network.” The Journal of Supercomputing (2021): 1-29.

2. “Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network”. The Journal of Supercomputing. 2023 Mar;79(4):3902-35.

3. “A Mobile User Authentication Technique in Global Mobility Network.” Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India. Vol. 1065. Springer Nature, 2019. [Book chapter and Conference proceedings]

4. “MASKA: Mutual Authentication and Session Key Agreement Protocol in Global Mobility Networks.” Applications of Machine Intelligence in Engineering. CRC Press, 2022. 309-321. [Book chapter and Conference proceedings]

5. “A Secure Framework of Internet of Production for Data Exchange. ” In2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT) 2024 Nov 28 (Vol. 1, pp. 1169-1175). IEEE.

6. “TLMMChain: Blockchain-Based Hierarchical Security Management Scheme for Three-Level Mobility Model in Next-Generation Networks.” In International Ethical Hacking Conference 2024 Mar 27 (pp. 183-205). Singapore: Springer Nature Singapore.

7. “Design, formal verification, and security analysis of SCMChain: A lightweight blockchain-based authentication protocol for IoT-enabled supply chain management”. Peer-to-Peer Networking and Applications. 2025 Nov;18(6):298.

8. “DEChain: Private Blockchain-based Digital Evidence Management System”, InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 253). Springer Nature.

9. “A Decentralized Application for Secure Authentication and Communication in Industry 4.0 Networks”, InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 233). Springer Nature.

10. “Meta-Transactions as a Scalable and Optimal Solution in Public Blockchains”,InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 219). Springer Nature.