About
101
Publications
233,678
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,222
Citations
Publications
Publications (101)
In the last decade, internet of things (IoT) emerged as one of the most promising fields of research. The services provided by the IoT have come as a big relief to human life due to the smartness and real-time monitoring without human intervention. IoT applications are widely used as it provides a high level of comfort, automation of the system, an...
The use of digital health records, stricter health laws and the growing need for health records exchange points towards the need for an efficient security and privacy preserving mechanism. For Health Insurance management systems, multiple entities exchange health information which is used for decision making. Since multiple authoritative entities a...
Mohapatra, NivaSingh, ShreyanshiKumar Mohanta, BhabenduJena, DebasishPrediction of the automotive accident severity plays a very crucial role in the smart transportation system. The main motive behind our research is to find out the specific features which could affect the vehicle accident severity. In this paper, some of the classification models,...
Smart city has come a long way since the development of emerging technology like Information and communications technology (ICT), Internet of Things (IoT), Machine Learning (ML), Block chain and Artificial Intelligence. The Intelligent Transportation System (ITS) is an important application in a rapidly growing smart city. Prediction of the automot...
The exponential growth in the number of connected devices as well as the data produced from these devices call for a secure and efficient access control mechanism that can ensure the privacy of both users and data. Most of the conventional key management mechanisms depend upon a trusted third party like a registration center or key generation cente...
The present research is inclined to study the relationship between two important forms of “Contract” in employment relations, psychological contract and knowledge contract, and job outcomes, i.e. employee retention and employee satisfaction. For this purpose, the data were collected from 268 employees working in the IT sector from North India. The...
The Internet of things (IoT) is widely used to implement different applications
like smart home, smart health care, smart city, and smart farming system.
The development of large smart devices/sensors enables smart technologies making
it possible to implement the smart application in real time. The IoT system has
security challenges like authentica...
The Internet of Things (IoT) is growing rapidly in the last decade. The number of interconnected smart devices has already crossed the total world’s population. The data generated by these devices are huge. The IoT is used in different applications like smart monitoring, healthcare system, smart home, where sensitive information is shared among use...
As trust-based data and message security is reliable and efficient in the case of resource and power constraints networks, it finds a new field of research for researchers in wireless sensor networks. Till now, a lot of researches have been carried out to set up trust management systems in the above network. Probability distribution functions have...
Electronic health record (EHR) stores not only the patient’s health-related data but also the sensitive individual information. Consequently, data security and access privacy are the greatest concern of EHR applications while sharing the data through the cloud. Ciphertext policy attribute-based encryption (CP-ABE) is one of the popular one-to-many...
In the contemporary dynamic business context (characterized by stiff competition, high uncertainty, growth of global as well as virtual organizations, etc.), setting up systems for recognizing and engaging employees which need constant endeavor from present-day organizations. Hence, organizations are actively exploring and adopting novel initiative...
Nowadays data is collected without any specific purpose, every activity of a machine or a human being is recorded, If needed in the future then the data will be analyzed. But here the question of trust arises as the data will go through many phases for the analysis by different parties. The data may contain some sensitive or private information tha...
Cloud storage is gaining popularity to store and share files. To secure the files, cloud storage providers supply client interfaces with the facility to encrypt the files and upload them into the cloud. When client-side encryption is done, the onus of key management lies with the cloud user. Public key proxy re-encryption mechanisms can be used to...
In the last decade internet of things (IoT) technology becomes useful in almost every application fields. IoT-cloud-based architecture is insufficient to handle the requirement of IoT like latency, bandwidth, and volume of data. Fog computing can address those problems by providing processing and services to end-users at the edge network. In centra...
VANET, a heterogeneous interconnection of smart vehicles, is a great platform to develop a smart transportation system. VANET comprises the various types of communication like Vehicle to Vehicle, Vehicle to Infrastructure based on the ad-hoc network. Resource constraints (like rechargeable power source, frequency spectrum, channels etc.), safety ma...
Computing and communication are getting increasingly ubiquitous with the inclusion of sophisticated devices like electric vehicles, smart phones and other house hold appliances. Due to the constant evolution in Internet of Things (IoT), the process of collaboration of these devices at a mass scale in order to provide improved and better services to...
Cyber-physical Systems (CPS) are reshaping the way of interaction with the physical world. Moreover, the true potential of CPS will be realized when a decentralized approach will be taken into account. Blockchain is an up-and-coming technology which can establish trust in CPS, where participants do not trust each other. Blockchain applications elim...
Internet of Things (IoT) is one of the most rapidly used technologies in the last decade in various applications. The smart things are connected in wireless or wired for communication, processing, computing, and monitoring different real-time scenarios. The things are heterogeneous and have low memory, less processing power. The implementation of t...
In today’s world, IoT technology is used vastly in different services. This Document is about IoT commercial Drone uses for Online Shopping.drone has advanced technology, camera and GPS to find out the destination point easily. Drones have been used for different kinds of applications like Social networking, Military Purpose, Medical or healthcare...
In conventional cloud computing technology, cloud resources are provided centrally
by massive data centres. Therefore, edge computing technology has been proposed, where cloud
services can be extended to the edge of the network to decrease a network congestion. The
management of the resources is a major challenge before the researcher. Therefore, i...
In the last decade internet of things (IoT) technology becomes useful in almost every application fields. IoT-cloud-based architecture is insufficient to handle the requirement of IoT like latency, bandwidth, and volume of data. Fog computing can address those problems by providing processing and services to end-users at the edge network. In centra...
Internet of Things (IoT) has lots of attention in the
last decade. The connected IoT devices are more than the total
world population. Due to its low cost, easy to deploy, and simple
to implement, application areas are large like smart city, smart
home, smart transportation, environment monitoring, agriculture and many more. There exists some secur...
Low maintenance of the roads is one of the extensive cause of increasing road accidents and vehicle breakage. Mostly roads contain potholes, wreckage or detritus which is best to be bypassed however if not sometimes lead to severe road causalities. Many car or bus accident happens over a wrecked bridge, as it slips and overturns. To avoid this kind...
Blockchain is the backbone technology behind crypto-currency and Bitcoin. By concept, Blockchain is a distributed database where transactions are recorded in an incorruptible and non-modifiable manner. Currently, Blockchain technology is envisioned as a powerful framework for open-access networks, decentralized information processing and sharing sy...
The evolution of IOT that began with computers has now developed into an ecosystem. This IOT ecosystem consists of a large number of different types of devices embedded with sensors and technology, which makes them smart enough to interact within themselves. With IOT omnipresent, the challenge would be how to ensure only authorized access to the re...
Blockchain Technology has received a lot of attention from both industry and academia due to its decentralized,
persistency, anonymity and auditability properties. In this survey, use of Blockchain technology in wide applications
area and its implementation challenges have been done. A rigorous search for journal/research article related
to Blockch...
In the era of the Internet of Things(IoT) smart
devices are connected with wire or wireless way. The IoT
devices are capable of sensing the environment and has the
ability to transmit that information to the next level. The
application area of IoT is Smart city, Smart transportation,
Healthcare sector, Agriculture, Monitoring environment. Each
of t...
Internet of Things (IoT) is excessively influencing
our day to day lives in many domains be it small smart device like
a smart-watch or large industrial enterprises. Thus, a number
of different IoT based applications are developed and deployed
for these sectors. An IoT system enables devices to communicate
among each other without human assistance/...
Internet of Things (IoT) as per estimated will connect
50 billion devices by 2020. Since its evolution, IoT technology
provides lots of flexibility to develop and implement any application.
Most of the application improves the human living standard
and also makes life easy to access and monitoring the things in
real time. Though there exist some se...
Fog computing is decentralized scalable architecture
where the fog nodes can join and leave the network arbitrary
way. The IoT devices connected to the fog network can also
have the connectivity issue. As all the fog nodes and IoT devices
are connected in a distributed way it is hard to build a secure
infrastructure in the absence of a trusted cent...
Over the past decade, a lot of evolution has happened
in the field of security specifically authentication system.
The most commonly used authentication service we use now is
OAuth 2.0 based authentication. In this method, we are dependent
on a 3rd party authentication service provider to which we need
to trust. Though this model is used extensivel...
The Internet of Things (loT) is advantageous
in many areas such as people, society, and industries as it
interconnects a different kind of devices and information entities
hence it originates a huge number of value-added services.
Typically, IoT environments are comprised of many diversified
devices but with limited resource. To establish an end-to...
The rising thought of the Internet of Things (IoT) is quickly discovering its way all through our modern life, aiming to enhance the quality of life by associating numerous smart devices, technologies, and applications. Overall, the IoT would allow for the automation of everything around us. Currently researchers have found that there is a potentia...
—In the last decade blockchain technology become
mainstream research topic because of its decentralized, peer to
peer transaction, distributed consensus, and anonymity properties.
The blockchain technology overshadows regulatory problem
and technical challenges. A smart contract is a set of programs
which are self-verifying ,self-executing and tamp...
Side-channel attacks, which exploit deficiencies in the implementations of theoretically secure systems, have been known to take a variety of forms on the mobile platforms. In this work, we present Magneto, a magnetic field based app classification mechanism. Magneto captures the Hall effect due to energy consumption by different components in a sm...
A field experiment was conducted for three consecutive seasons during 2013 and 2014 in order to study the effect of fly ash with lime and gypsum with and without FYM on heavy metal content of maize as well as its yield in an. The experiment was laid out in a randomized block design (RBD) with eight treatments namely, T-control (received no amendmen...
The Internet of things(IoT) has brought the vision of the smarter world into reality and including healthcare it has a many application domains. The convergence of IOT-cloud can play a significant role in the smart healthcare by offering better insight of healthcare content to support affordable and quality patient care. In this paper, we proposed...
Phyto-proteins of Mangifera indica L., Aegle marmelos (L.) Corrêa, Volvariella volvacea (Paddy straw mushroom), Carica papaya L., Ocimum sanctum L. and Aloe vera (L.) Burm. f. extracted in water and PBS under cold percolation are precipitated in 50% acetone and quantified after reconstitution. PBS suspension with higher protein is assayed for throm...
Image encryption is one of the most promising fields of research in the conventional scientific society. Visual cryptography is a secured encryption technique which is used to encrypt a secret image based on share generation and superimposition rather than computing. This overcomes the burden of computation but the mammoth risk of attackers is supe...
Simulation studies for electric field distribution in micro structured optical fiber (MSOF) using plane wave expansion (PWE) technique is reported in this paper, where the outcomes of electric field distribution leads to beam splitting application. Here MSOF is realized by 5 x 5 air holes on silicon substrate with defect at centre. PWE method is em...
Estimation of damage ratio of ion-implanted neodymium- doped yttrium vanadate (IINDYV) waveguide is thoroughly explored in this paper. In this research, waveguide is realized by the combination of two IINDYV layers separated by air. Different type of losses such as absorption, reflection, diffraction and polarisation are cogitated during the invest...
A leaching study was conducted in the laboratory in order to study the effect of different amendments on transport of Ca through 14 cm soil column packed with acid soil. Sandy loam soil from a maize field was collected; air dried and packed in PVC pipe of 15 cm long and 8.6 cm diameter maintaining a bulk density of 1.5 Mg m-3. There were four soil...
Galactogogues elicit pharmacological effects, resulting in increased prolactin concentration through interactions with dopamine receptors and thereby augmenting milk supply. Commercially available synthetic drugs induce adverse effect on the neuro-endocrine axis of lactation physiology. Their prolonged uses have caused toxicity which opens a detrim...
Cow is equated to mother in the Indian tradition and her urine panacea of all diseases. Cow urine is a divine medicine and is used for treatment of diabetes, blood pressure, asthma, psoriasis, eczema, heart attack, blockage in arteries, fits, cancer, AIDS, piles, prostrate, arthritis, migraine, thyroid, ulcer, acidity, constipation, gynaecological...
In 1993 Nyberg and Rupeel proposed an authenticated encryption scheme (AES) based on the DSA algorithm that reduces the computation time and communication costs for authenticated message transmission. Motivated by this, several researchers developed further AES approaches. However, when a dispute occurs between the sender and recipient, there is no...
Vehicular ad hoc networks (VANETs) are an upcoming technology that is gaining momentum in recent years. That may be the reason that the network attracts more and more attention from both industry and academia. Due to the limited bandwidth of wireless communication medium, scalability is a major problem. Data aggregation is a solution to this. The g...
In Vehicular adhoc networks, due to the limited bandwidth, high vehicle mobility and density of vehicles, scalability is a major problem. Data aggregation is a solution to this. The goal is to combine the information and disseminate this in larger regions. Another criteria is all the messages should be unaltered in the delivery and should be authen...
In this paper, a secure and efficient protocol for ve-hicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic...
Reliability, efficient bandwidth utilisation, consistency and authenticity are some of the required applications that are required for proper implementation of vehicular ad-hoc networks (VANETs). As vehicular Ad hoc Networks are expected to greatly influence and improve road safety as well as driving conditions, they are attracting much attention t...
Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt large messages. But the key management, i.e., the key should be available at both sender and receiver before communication is the most difficult part of symmetric cryptosystem. So, to encrypt large messages, we usually take the help of bot...
A wide number of Internet voting systems have been implemented over the years for voluntary and mandatory purposes with mixed results. In 2002, Wu and Sankaranarayana proposed a simple protocol for Internet voting. However, their protocol does not satisfy all properties of an ideal Internet voting protocol. In this paper, we propose an improved Int...
In this paper we review the recent advances in honeypot. Some notable proposals and there analysis have been discussed. The aspects of using honeypot in education and in hybrid environment with IDS have been explained. In this paper we also defines the use of signature technique in honeypot for traffic analysis. In the end we summarizes all these a...
Vehicular Adhoc Networks these days are attracting much attention as they are expected to greatly influence and improve road safety as well as driving conditions. But along with all the benefits that it offers, there is more chance of giving way to frequent and severe malicious attacks. Due to this reason much attention is being given to the securi...
In this paper, a modified of Jena remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unse...
Due to more overhead of asymmetric cryptosystems, traditionally, the symmetric cryptosystem is used to encrypt long messages. In case of symmetric cryptosystems, it creates the problem of key management. So to encrypt long messages, we usually, take the help of both symmetric and asymmetric cryptosystems. In this paper, we proposed an asymmetric cr...
Internet connectivity can offer enormous advantages, however security needs to be a major consideration when planning an Internet connection. There are significant security risks associated with the Internet that often are not obvious to new (and existing) users. In particular, intruder activities as well as vulnerabilities that could assist intrud...
In the past, several key agreement protocols are proposed on pre-shared password based mechanism. Due to development of communication technology, it is necessary to construct a secure end-to-end channel between clients. In this paper, an improved version of J. Kim et al proposed password-authenticated key exchange protocol has been proposed. The pr...
Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for bi...
Design of neuro-controller for complex dynamic systems is a big challenge faced by the researchers. In this paper we present a design of a robust neuro-controller for a dynamic system to make the system response fast with no overshoot. Here the control action decided by the controller completely depends on the value of the error at that point of ti...
This work presents system identification using neural network approaches for modelling a laboratory based twin rotor multi-input multi-output system (TRMS). Here we focus on a memetic algorithm based approach for training the multilayer perceptron neural network (NN) applied to nonlinear system identification. In the proposed system identification...
Hill cipher's susceptibility to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in both cryptology and linear algebra. Hill cipher requires inverse of the key matrix while decryption. In fact that not all the matrices have an inverse and therefore they will not be eligible as key matrices in the Hil...
In this paper, a novel efficient remote user authentication scheme using smart cards based on Elliptic Curve Discrete Logarithm Problem (ECDLP) has been proposed. A remote user authentication scheme is a two-party protocol whereby an authentication server confirms the identity of a remote individual logging on to the server over an untrusted, unsec...
Several gradient-based approaches such as back-propagation, conjugate gradient and Levenberg Marquardt (LM) methods have been developed for training the neural network (NN) based systems. Still, in some situations, like multimodal cost function, these procedures may lead to some local minima, therefore, the evolutionary algorithms (EAs) based proce...
Vector control of induction motor is an efficient approach to control the speed of induction motor used for industrial drives. Although the vector control is very popular method but there lies difficulty in obtaining an accurate model of induction motor (IM) owing to the variation of induction motor parameters, such as resistance, inductance and ti...
In this paper, we propose a novel protocol for smart card based on elliptic curve discrete logarithm problem (ECDLP). We believe that applications of smart card technology should be benefited more from advantages of public key cryptography, specifically, in initiation and maintenance of secure channel. This paper introduces a public key cryptograph...