Research & Publications

Academic research, peer-reviewed papers, and ongoing investigations.

Published Papers

Enhancing IoT Device Security Using Zero-Knowledge Proofs: A Privacy-Preserving Authentication Approach

Aditya Mourya

Published
2025IoT Security

The exponential growth of IoT devices has created unprecedented security challenges, particularly in device authentication where traditional methods expose sensitive credentials and lack scalability. This paper presents a comprehensive authentication framework integrating Zero-Knowledge Proofs (ZKPs) with Physical Unclonable Functions (PUFs) to achieve privacy preserving device authentication. Our framework employs zk-SNARKs for efficient proof generation and verification while leveraging PUF-derived hardware-rooted identities for unclonable device fingerprints. Experimental evaluation demonstrates 20% energy reduction compared to RSA-2048, 19ms verification time, and 100% success rate across varying environmental conditions. The framework supports over 10,000 devices per verifier node while maintaining strong security against replay attacks, device impersonation, and physical tampering.

Keywords

IoT AuthenticationPhysical Unclonable FunctionsPrivacy-PreservingZero-Knowledge Proofszk-SNARKs
Read Paper

Upcoming Research

In Progress

AI-Powered Forensic Analysis: Machine Learning for Digital Evidence Classification

Expected: 2026

In Progress

AI-Powered Stegnography Tool: To hide and find data from images, videos, and audio files

Expected: 2026

In Progress

Deepfake Detection Using Convolutional Neural Networks: A Forensic Perspective

Expected: 2026

Research Interests

IoT & Embedded Systems

Security protocols, authentication mechanisms, and privacy-preserving techniques for resource-constrained devices.

AI & Machine Learning

Applying AI techniques to forensic analysis, threat detection, and synthetic media identification.

Digital Forensics

Evidence analysis, chain-of-custody protocols, and novel forensic methodologies for emerging technologies.

Cybersecurity

Cryptographic protocols, zero-knowledge proofs, and advanced security architectures for modern systems.