About
I am a research scholar in the Department of Computer Science & Engineering, IIT Patna, India. I am working in the Network Security Lab under the supervision of Dr. Somanath Tripathy.
In my PhD thesis work, I am currently working in the area of Security & Privacy issues in
Payment Channel Networks (PCNs), and Scalability issues in Blockchain. Presently, I am working towards mitigation techniques of various attacks in PCNs (Wormhole Attack, Balance Discovery Attack or Channel Probing Attack etc.), Routing in PCNs (Off-chain channel rebalancing, Off-chain payment path spliting etc), and Applications of Off-chain PCNs.
Research Interests
Blockchain
Wireless Sensor Networks
Artificial Intelligence
VLSI Physical Design
Google Scholar
DBLP
ResearchGate
GitHub
Linkedin
Twitter
Education
Department of Computer Science and Engineering
Overall CPI: 8.38
Indian Institute of Technology Patna (IITP), Patna, India
Research Area: Blockchain Security
School of Computer & Information Sciences (SCIS)
Overall CGPA: 9.27
University of Hyderabad (UoH), Hyderabad, India
Research Area: Wireless Sensor Networks
Department of Computer Science
Overall Percentage: 90.25
Utkal University (UU), Vani Vihar, Bhubaneswar, India
Research Area: VLSI Physical Design & Automation Algorithm
Department of Computer Science
Overall Percentage: 91.87
Govt. College (Autonomous), Angul
Utkal University (UU), Vani Vihar, Bhubaneswar, India
n-HTLC: Neo Hashed Time-Lock Commitment to Defend Against Wormhole Attack in Payment Channel Networks
Elsevier Computers & Security (Elsevier-CS), 2021 - Accepted. (SCIE, CR: B, IF: 3.579, H5: 59)
Authors: Susil Kumar Mohanty and Somanath Tripathy
In today's cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender's information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called k-TLC has been proposed. k-TLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network, Lightning network, and synthetic network of CryptoMaze. Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.
Minimizing Maximum Receiver Interference in Wireless Sensor Networks using Probabilistic Interference Model
Elsevier Engineering Applications of Artificial Intelligence (Elsevier-EAAI), 2020. (SCIE, CR: B, IF: 4.201, H5: 57)
Authors: Susil Kumar Mohanty and Siba Kumar Udgata
Now in the era of the Internet of Energy (IoE), researchers are more focused on optimal energy utilization. In the wireless sensor network, maximization of battery lifetime or network lifetime is one of the primary research objectives. There are many techniques available to enhance the network lifetime, and interference minimization is one of them. Interference minimization leads to less transmission power consumption in wireless sensor networks and thus enhances the network lifetime. The interference minimization is proven to be NP-Hard problem. In this paper, we have proposed a method to minimize receiver interference using different encoding schemes and genetic algorithm. We have used more realistic probabilistic interference model to calculate receiver interference instead of the graph-based model used in most of the literature. The Genetic Algorithm used to minimize receiver interference uses three different chromosome representation schemes, namely Prüfer code, Edge-set, and Edge-window-decoder. We have used benchmark data sets and special cases like exponential node chain, two exponential node chain, spiral model, one cluster, and two-cluster for experimental simulations. Our proposed algorithm outperforms other algorithms available in the literature like MI-S (Minimizing Interference in Sensor networks), MinMax-RIP (Minimizing Maximum Receiver Interference Problem), and MST (Minimum Spanning Tree: Prim’s algorithm) in terms of minimizing maximum receiver interference in the network.
Conferences
MAPPCN: Multi-hop, Anonymous and Privacy-Preserving Payment Channel Network
Financial Cryptography and Data Security (FC), 2020. (CR: B, H5: 46)
Authors: Somanath Tripathy and Susil Kumar Mohanty
Payment channel network (PCN) has become an indispens-able mechanism to resolve scalability issues in blockchain-based cryp-tocurrencies. On the other hand, PCNs do not provide adequate securityand privacy guarantee. Most of the existing payment schemes leak in-formation about payer or payee to the nodes in the payment path. Toaddress this issue, we propose a simple but effective, multi-hop, anony-mous, and privacy-preserving PCN(MAPPCN). MAPPCN constructionis based on Elliptic curve cryptography (ECC) and is proved to be securewhile achieving payment path privacy, sender, and receiver anonymity.MAPPCN can be performed in (3·n+ 5) Elliptic curve scalar multipli-cation (ECSM) operations for an off-chain payment operation.
An Iterative Concave-Convex Wirelength Model for Analytical Placement
2018 IEEE International Symposium on Smart Electronic Systems (IEEE-iSES), Hyderabad, India, 2018.
Authors: B. N. Bhramar Ray, Sony Singdha Sahoo, Rasheswari Bhramar Ray, and Susil Kumar Mohanty
Analytical placer very often uses half-perimeter wirelength (HPWL) model as an objective function for solving placement problem. State-of-the-art iterative wirelength models for HPWL are log-sum-exp (LSE) [1], weighted average (WA) [2], (γ, q) [3] and CHMAX [4] wirelength models. In this paper, we propose an iterative wirelength model for HPWL providing smooth approximation to max function. The new max function is the difference of two convex functions. The error upper bound of proposed model is tighter than upper bound errors of existing iterative wirelength models. Integration of new model in analytical placement engine NTUplacer, reduces the final placement wirelength by 13%, 10%, 3% and 1.5% on an average on ISPD 2005 benchmark circuits as oppose to LSE, WA, (γ, q) and CHMAX models respectively.
HPWL Formulation for Analytical Placement using Gaussian Error Function
2017 International Conference on Information Technology (ICIT), IEEE Computer Society, Bhubaneswar, India, 2017.
Authors: B. N. Bhramar Ray, Susil Kumar Mohanty, Debabrat Sethy, and Rasheswari Bhramar Ray
Placement is a crucial stage in the physical design of VLSI(Very Large Scale Integration). Analytical placer at this stage determines optical physical locations of cells in the chip while minimizing the total half-perimeter wirelength(HPWL) of the nets. The constraints imposed while minimizing the total HPWL of nets are non-overlapping of blocks, congestion, delay etc. This paper introduces a recursive smooth wirelength model for HPWL of a net using Gaussian error function, which can be used by analytical placers. The novelty of this model lies in approximating closely the HPWL of a net than other state-of-the-art wirelength models in the literature including log-sum-exponent(LSE), weighted average(WA), CHMAX and absolute wirelength(ABSWL) models. The HPWL accuracy of the proposed model for global and detailed placements for IBM ISPD 2004 benchmark suite shows less than 1% and 0.5% absolute errors in total wirelength in average respectively.
An Optimized HPWL Model for VLSI Analytical Placement
2015 International Conference on Information Technology (ICIT), IEEE Computer Society, Bhubaneswar, India, 2015.
Authors: B. N. Bhramar Ray, S. Das, K. Hazra, N. Patra, and Susil Kumar Mohanty
In VLSI physical design, placement is an important stage. Analytical placer minimizes the half-perimeter wire lengh (HPWL) of the circuit as an objective function to place blocks optimally in the chip. This paper introduces a new smooth recursive model for HPWL function which can be used inside the analytical placers. The proposed model is more accurate than widely used log-sum-exponent (LSE)[9], weighted average (WA)[3] and ABSWL[7] models. The error upper bound of new approximation is also tightest among the existing wire length models. When deployed inside placement engine NUPlacer[1], it shows reduction in wire lengh by 12.3%, 10% and 3% on ISPD 2005 placement benchmarks compared to LSE, WA and ABSWL models respectively.
Receiver Interference Minimization for Topology Control in Wireless Sensor Networks
M. Tech Project
In this project, we are using a probabilistic interference model for measuring the magnitude of the interference occurring at the receiver sensor node due to simultaneously transmitting data packets. This problem is proven to be NP-Hard and it is an optimization problem. To minimizing maximum receiver interference we have used Genetic Algorithm with three chromosome representation schemes (I. Prufer code, II. Edge-List, and III. Edge-window Decoder). Empirically, we have demonstrated that the Edge-window Decoder representation scheme is giving better results than other algorithms available in the state-of-the-art and Edge-List is the second best.
Supervisor: Prof. Siba Kumar Udgata, SCIS, UoH, India