Publications

* denotes equal contribution and joint lead authorship.
  1. Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models
    Kalyan Nakka, Jimmy Dani, and Nitesh Saxena

    In arXiv (2406.05364) 2024.

    In this paper, we present a very first study to investigate trust and ethical implications of on-device artificial intelligence (AI), focusing on ''small'' language models (SLMs) amenable for personal devices like smartphones. While on-device SLMs promise enhanced privacy, reduced latency, and improved user experience compared to cloud-based services, we posit that they might also introduce significant challenges and vulnerabilities compared to on-server counterparts. As part of our trust assessment study, we conduct a systematic evaluation of the state-of-the-art on-devices SLMs, contrasted to their on-server counterparts, based on a well-established trustworthiness measurement framework. Our results show on-device SLMs to be (statistically) significantly less trustworthy, specifically demonstrating more stereotypical, unfair and privacy-breaching behavior. Informed by these findings, we then perform our ethics assessment study by inferring whether SLMs would provide responses to potentially unethical vanilla prompts, collated from prior jailbreaking and prompt engineering studies and other sources. Strikingly, the on-device SLMs did answer valid responses to these prompts, which ideally should be rejected. Even more seriously, the on-device SLMs responded with valid answers without any filters and without the need for any jailbreaking or prompt engineering. These responses can be abused for various harmful and unethical scenarios including: societal harm, illegal activities, hate, self-harm, exploitable phishing content and exploitable code, all of which indicates the high vulnerability and exploitability of these on-device SLMs. Overall, our findings highlight gaping vulnerabilities in state-of-the-art on-device AI which seem to stem from resource constraints faced by these models and which may make typical defenses fundamentally challenging to be deployed in these environments.
  2. Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers
    Jimmy Dani, Kalyan Nakka, and Nitesh Saxena

    In arXiv (2405.19683) 2024.

    In this research, we introduce MIND-Crypt, a novel attack framework that uses deep learning (DL) and transfer learning (TL) to challenge the indistinguishability of block ciphers, specifically SPECK32/64 encryption algorithm in CBC mode (Cipher Block Chaining) against Known Plaintext Attacks (KPA). Our methodology includes training a DL model with ciphertexts of two messages encrypted using the same key. The selected messages have the same byte-length and differ by only one bit at the binary level. This DL model employs a residual network architecture. For the TL, we use the trained DL model as a feature extractor, and these features are then used to train a shallow machine learning, such as XGBoost. This dual strategy aims to distinguish ciphertexts of two encrypted messages, addressing traditional cryptanalysis challenges. Our findings demonstrate that the DL model achieves an accuracy of approximately 99% under consistent cryptographic conditions (Same Key or Rounds) with the SPECK32/64 cipher. However, performance degrades to random guessing levels (50%) when tested with ciphertext generated from different keys or different encryption rounds of SPECK32/64. To enhance the results, the DL model requires retraining with different keys or encryption rounds using larger datasets (10^7 samples). To overcome this limitation, we implement TL, achieving an accuracy of about 53% with just 10,000 samples, which is better than random guessing. Further training with 580,000 samples increases accuracy to nearly 99%, showing a substantial reduction in data requirements by over 94%. This shows that an attacker can utilize machine learning models to break indistinguishability by accessing pairs of plaintexts and their corresponding ciphertexts encrypted with the same key, without directly interacting with the communicating parties.
  3. An Energy-Efficient Irregular Hexagonal Tessellation-based Approach for Connected k-Coverage in Planar Wireless Sensor Networks
    Kalyan Nakka and Habib M. Ammari

    In Ad Hoc Networks 2024.

    In the design of planar wireless sensor networks (PWSNs), the preliminary tasks are to achieve both coverage and connectivity, which are essential for the correct operation of this type of network. A PWSN is said to be in perfect operational condition only when it is capable of guaranteeing both coverage of the field and connectivity among all the active sensor nodes. In order to achieve both coverage and connectivity in PWSNs, we intend to solve the problem of connected k-coverage in PWSNs, where each point in a field of interest is covered (or sensed) by at least k sensor nodes (k > 1) simultaneously and all the participating sensor nodes in the k-coverage process are connected to each other. In our study, we found an irregular hexagon, denoted by IrHx(rs/n), as the best polygon for tessellating a field of interest and allowing to deploy sensor nodes, where n > 1 is a natural number and rs is the radius of the sensing range of the sensor nodes. First, we construct our proposed irregular hexagon, IrHx(rs/n), which forms a tile, using the regular hexagon. Second, we compute the minimum sensor density required to k-cover a planar field of interest using our proposed IrHx(rs/n) tile. Third, we establish a relationship between the sensing and communication radii of the sensor nodes to ensure network connectivity in k-covered PWSNs. Finally, we substantiate our theory with various simulation results.
  4. Post-Quantum Cryptography (PQC)-Grade IEEE 2030.5 for Quantum Secure Distributed Energy Resources Networks

    In IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) 2024.

    Quantum era is near and advanced quantum computing will pose a huge threat to the security of the current cryptographic systems in distributed energy resources (DER)rich power grids. It is necessary to prepare now to combat quantum computing attacks with serious real-world consequences in the years ahead. Recently, post-quantum cryptography (PQC) is considered as one of the major candidates of quantum attack defense strategies, and the adoption of PQC for DER systems has not been fully studied yet. This paper discusses the adoption of PQC in a standard DER network protocol (i.e., IEEE 2030.5-PQC), and proposes a real-time hardware-in-the-loop co-simulation PQC testbed consisting of a DER physical system simulation and a cyber system simulation such as DER gateways and DER management system (DERMS) server. Universal custom-made PQC client and server software are developed to meet the compliant with IEEE 2030.5-2018 standard and implemented in the DER gateways and the DERMS server, respectively. Finally, the feasibility of the proposed PQC-grade DER network is validated by using the real-time co-simulation testbed.

2024

  1. Achieving Connected k-Coverage in Wireless Sensor Networks Using Computational Geometry-Based Approaches
    Kalyan Nakka

    In Master's Thesis at Texas A&M University-Kingsville 2023.

    The metrics, called coverage and connectivity, are often used to assess the sensor's sensing and communication capabilities in planar wireless sensor networks (PWSNs). A PWSN relies on the detection capabilities of the sensors to provide coverage. However, this is not sufficient for this type of network to function properly. In addition, having all the sensors connected, i.e., they are capable of interacting with each other, is essential for the proper operation of PWSNs. This research aims to solve the connected k-coverage problem in PWSNs by ensuring that all field locations are covered or within the sensing range of at least k sensors (k > 1). Here, we provide a solution to the connected k-coverage problem using computational geometry-based approaches. Our goal is to maximize the lifetime of PWSNs by achieving connected k-coverage with a minimum number of sensors. To begin, we propose to tile the whole field of interest with planar tiles, which are convex polygons that do not overlap with each other and do not leave any gap in the underlying field. Following this, we compute the planar sensor density that is required to achieve k-coverage of a planar field of interest using these convex polygonal tiles. In addition, we determine network connectivity by correlating the sensing range of sensors with their communication range. Moreover, we propose energy-efficient connected k-coverage protocols based on our planar convex polygonal tiles. Finally, we validate our conceptual analysis with facts from simulations.
  2. k-CSqu: Ensuring Connected k-Coverage using Cusp Squares of Square Tessellation
    Kalyan Nakka and Habib M. Ammari

    In Journal of Parallel and Distributed Computing 2023.

    In planar wireless sensor networks (PWSNs), the most essential functionalities of the sensor nodes are both sensing and communication, which are evaluated using two fundamental concepts, namely coverage and connectivity, respectively. However, coverage alone is not sufficient for the correct operation of PWSNs. Additionally, it is important that network connectivity be ensured, where all the sensors are connected to one another, so that every pair of sensors can communicate with each other. To account for both coverage and connectivity, this paper aims at solving the problem of connected k-coverage in PWSNs, where every point in a field of interest is covered by at least k sensors (k > 1) at the same time, while all the sensors are mutually connected directly or indirectly. In order to solve this problem, we initially tessellate the entire field into adjacent and non-intersecting square tiles. Then, we construct a cusp-square inside each square tile of the tessellation for sensor placement. Based on this cusp-squared square tile, we compute the minimum planar sensor density for k-coverage in PWSNs. Also, we establish a relationship between the sensing and communication radii of the sensors to guarantee network connectivity in PWSNs. Finally, we validate our theoretical analysis using simulation results.
  3. Square Tessellation for Stochastic Connected k-Coverage in Planar Wireless Sensor Networks
    Kalyan Nakka and Habib M. Ammari

    In IEEE Symposium on Computers and Communications (ISCC) 2023.

    In this paper, we focus on the problem of connected k-coverage in planar wireless sensor networks (PWSNs), where every point in a field of interest (FoI) is covered by at least k sensors simultaneously, while all the participating sensors are mutually connected, where k > 1. To this end, we develop a global framework using a square tessellation that considers both deterministic and stochastic sensing models. Initially, we tessellate a planar FoI into adjacent and congruent square tiles. In each tile of this tessellation, we construct a cusp-square area for sensor placement to achieve k-coverage. Based on this cusp-squared square tile configuration, we compute the minimum sensor density that is required for deterministic and stochastic k-coverage in PWSNs. Then, we establish the necessary relationship that should exist between the sensing and communication ranges of the sensors to maintain network connectivity in k-covered PWSNs. Finally, we propose our stochastic k-coverage protocol for sensor scheduling and substantiate our theoretical analysis with simulation results.

2023

  1. Influence of Aerodynamic Add-On devices on Aerodynamic performance of an Automobile: A Numerical Study

    In Romanian Journal of Automotive Engineering 2017.

    Aerodynamic performance is a very important criterion for an automobile, as the body design and subsystem specifications of the automobile depends on it and the performance indices like drag reduction, fuel consumption, acceleration, top speed, downward forces, skin friction and toppling moments are also influenced. The design of automotive body is primarily based on the purpose of the vehicle and the optimization of body design enhances the performance for fastback, sports and super cars. Usually sports cars implement aerodynamic add-on devices like wings/spoilers, diffusers and roof scoops, for improving the aerodynamic performance. In the present study, a numerical investigation is performed using CFD for analyzing the aerodynamic performance of a conceptual sports car and three configurations of it with aerodynamic add-on devices. The simulations results are utilized for design modifications and selection of the aerodynamic add-on devices which improve the aerodynamic performance.

2017

  1. Experimental and Numerical Study on Energy Absorption characteristics of Mild Steel and Aluminium Square Tubes under Axial loading

    In Romanian Journal of Automotive Engineering 2016.

    Energy absorbing tubes are highly used in automobile crash applications, for absorbing the energy produced during a frontal collision between automobile vehicles. These energy absorbing tubes are studied for various cross-sections, materials and operational conditions. These tubes by deforming themselves absorb the energy produced during the collision. In the present study, energy absorption characteristics of square tubes is studied for two different materials, namely Mild steel and Aluminium, under uniaxial compressive loading. The results of the compression test are used for simulating the test in ABAQUS 6.13 for understanding the deformation characteristics and validating the experimental results.
  2. Experimental and Numerical Investigation on Torsional failure of Cardan Joint of an Intermediate Steering Shaft

    In Romanian Journal of Automotive Engineering 2016.

    Intermediate steering shaft of the steering system is a linkage between the upper steering assembly and steering gear box and connects them by means of two cardan joints, namely upper cardan joint from the upper steering assembly and lower cardan joint to the steering gear box. The failure of the intermediate steering shaft happens due to the combined effect of both principal and shear stresses and strains at the localised stress-strain regions of the cardan joint. Present investigation is performed on intermediate steering shaft for studying the torsional failure of the cardan joint and a numerical structural analysis is performed in ANSYS Workbench for understanding the failure mechanism of the cardan joint and stress-strain and strain energy absorption characteristics of the cardan joint.

2016