Academic Information
Ph.D. UEM, 2026
Research Areas
Research Interests
My research focuses on the intersection of blockchain architecture and network security, specifically enhancing the scalability and integrity of distributed systems. I specialize in developing decentralized applications (dApps) and smart contracts, underpinned by robust cryptographic protocols for lightweight authentication. By leveraging formal verification tools like AVISPA, I ensure protocol resilience against complex attack vectors. Furthermore, my work integrates SOC-SIEM frameworks and malware analysis to fortify system defenses. Combining theoretical security models with hands-on penetration testing using Wireshark and Burp Suite, I aim to build high-performance, secure decentralized infrastructures.
Courses Taught
Positions Held
2. HOD In-Charge – Department of Computer Science, Durgapur Women’s College, Kazi Nazrul University, Asansol (Jul 2017 – Jun 2023)
Assistant Coordinator – IGNOU Study Centre – 2848, Durgapur Women’s College (May 2010 –Jun 2024)
Publications
1. "AUGChain: blockchain-based mobile user authentication scheme in global mobility network.” The Journal of Supercomputing (2021): 1-29.
2. “Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network”. The Journal of Supercomputing. 2023 Mar;79(4):3902-35.
3. “A Mobile User Authentication Technique in Global Mobility Network.” Proceedings of International Ethical Hacking Conference 2019: eHaCON 2019, Kolkata, India. Vol. 1065. Springer Nature, 2019. [Book chapter and Conference proceedings]
4. “MASKA: Mutual Authentication and Session Key Agreement Protocol in Global Mobility Networks.” Applications of Machine Intelligence in Engineering. CRC Press, 2022. 309-321. [Book chapter and Conference proceedings]
5. “A Secure Framework of Internet of Production for Data Exchange. ” In2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT) 2024 Nov 28 (Vol. 1, pp. 1169-1175). IEEE.
6. “TLMMChain: Blockchain-Based Hierarchical Security Management Scheme for Three-Level Mobility Model in Next-Generation Networks.” In International Ethical Hacking Conference 2024 Mar 27 (pp. 183-205). Singapore: Springer Nature Singapore.
7. “Design, formal verification, and security analysis of SCMChain: A lightweight blockchain-based authentication protocol for IoT-enabled supply chain management”. Peer-to-Peer Networking and Applications. 2025 Nov;18(6):298.
8. “DEChain: Private Blockchain-based Digital Evidence Management System”, InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 253). Springer Nature.
9. “A Decentralized Application for Secure Authentication and Communication in Industry 4.0 Networks”, InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 233). Springer Nature.
10. “Meta-Transactions as a Scalable and Optimal Solution in Public Blockchains”,InProceedings of Sixth International Ethical Hacking Conference: AI and Law (eHaCON 2025) (p. 219). Springer Nature.