Geetanjali Rathee

Geetanjali Rathee
Netaji Subhas Institute of Technology | NSITONLINE · Computer Engineering

Ph.D. CSE

About

96
Publications
15,086
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
727
Citations

Publications

Publications (96)
Article
Missing data is universal complexity for most part of the research fields which introduces the part of uncertainty into data analysis. We can take place due to many types of motives such as samples mishandling, unable to collect an observation, measurement errors, aberrant value deleted, or merely be short of study. The nourishment area is not an e...
Article
Industrial IoT has emerged as a new paradigm in the era of smart systems where interactions and transmission of messages among various entities in an industrial ecosystem are done autonomously. This includes manufacturing of products, shipment process, storage of records, and counting the data, to name a few. However, the involvement of multiple cy...
Preprint
Industrial Internet-of-Things (IIoT) is a powerful IoT application which remodels the growth of industries by ensuring transparent communication among various entities such as hubs, manufacturing places and packaging units. Introducing data science techniques within the IIoT improves the ability to analyze the collected data in a more efficient man...
Article
Full-text available
Smart social systems are ones where a number of individuals share and interact with each other via various networking devices. There exist a number of benefits to including smart-based systems in networks such as religions, economy, medicine, and other networks. However, the involvement of several cyber threats leads to adverse effects on society i...
Article
Full-text available
People communicate in a variety of ways via multimedia through the propagation of various techniques. Nowadays, variety of multimedia frameworks or techniques is used in various applications such as industries, software processing, vehicles and medical systems. The usage of multimedia frameworks in healthcare systems makes it possible to process, r...
Chapter
For pervasive applications of the artificial neural networks (ANN), the autonomous control usually affects the overall processing and analysis of data in the healthcare systems. Though, involvement of several malicious activities by the intruders may drastically affect the overall communication system. Recently, more and more engineers have applied...
Article
The Internet of Vehicles (IoV) is introduced to transfer/exchange the data among roadside units and vehicles through various smart devices in real time scenarios. However, the past works in IoV leads to various transparencies, security and privacy concerns while communicating and transferring the information among each other. This paper has propose...
Article
People communicate in a variety of ways via multimedia through the propagation of various techniques. Nowadays, variety of multimedia frameworks or techniques is used in various applications such as industries, software processing, vehicles and medical systems. The usage of multimedia frameworks in healthcare systems makes it possible to process, r...
Article
Full-text available
The automated techniques enabled with Artificial Neural Networks (ANN), Internet of Things (IoT), and cloud-based services affect the real-time analysis and processing of information in a variety of applications. In addition, multihoming is a type of network that combines various types of networks into a single environment while managing a huge amo...
Article
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide quick and immediate identification of infection, proper and immediate clinical support is needed. Researchers have proposed various machine learning and smart IoT-based schemes for categorizing COVID-19 patients. Artificial neural networks (ANNs)...
Article
Full-text available
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention. Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges. Vehicles participating within the IoV are embedded with a wide r...
Article
Full-text available
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
Article
Full-text available
A smart city refers to an intelligent environment obtained by deploying all available resources and recent technologies in a coordinated and smart manner. Intelligent sensors (Internet of Things (IoT) devices) along with 5G technology working mutually are steadily becoming more pervasive and accomplish users’ desires more effectively. Among a varie...
Article
Industrial Internet-of-Things (IIoT) refers to the next stage in the evolution of organizations where collecting, analyzing, recording the data and controlling the entire activities of the various entities is achieved with connected machines in real time with enhanced quality and minimum production cost. Although, various phenomenal schemes for cro...
Article
Full-text available
Industrial IoT in the advancement of organizations consigns to the next level in order to trace and manage every single activity of their entities. However, the interdependence, implementation and communication among such wireless devices also known as IoT devices that lead to various secrecy and personnel concerns. Even though the use of smart sen...
Chapter
In this chapter, the authors have detailed the need of blockchain technology along with its case studies in different domains. The literature survey is described that describes how blockchain technology is rising. Further, a number of domains where blockchain technology can be applied along with its case studies have been discussed. In addition, th...
Chapter
India is the largest democracy in the world, and in spite of that, it faces various challenges on a daily basis that hinder its growth like corruption and human rights violations. One of the ugliest phases of corruption and political mayhem is visible during the election process where no stone is kept unturned in order to gain power. However, it is...
Article
Full-text available
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
Article
The dynamic and highly open nature of cognitive radio (CR) makes cognitive communication extremely vulnerable to various malicious activities resulting from several security threats. Although extensive efforts have been devoted to the research and development of spectrum sharing systems, security issues are not well addressed for the cognitive radi...
Article
Full-text available
Mobile crowd sourcing offers a way for an organization to gain afar their “base of minds” of workforce offers in the form of idea competitions or innovation contests where task is divided among individuals to achieve a pooled result using mobile devices. However, mobile crowd sourcing consequence to an urban bias in addition to other key challengin...
Article
Full-text available
Conventional models in the intelligent transportation system (ITS) are confronted by large computational overheads and how they react during real-time scenarios. To appropriately manage the communication process in real-time, a trust-based mechanism can provide an efficient approach to acclimatize its deeds based on indecision sensory information....
Article
Full-text available
In this manuscript, we have considered the number of security concerns at different aspects of network communication in hybrid (centralized or distributed) cognitive radio network cell environment by distributing it into inter-domain and intra-domain. We have identified and resolved the routing and handoff process threats in both the domains by pro...
Article
A smart city refers to an intelligent environment obtained by deploying all available resources and recent technologies in a coordinated and smart manner. Intelligent Transportation System (ITS) is used for developing and maintaining a sustainable and environmental friendly transportation system leading to the evolution of the concept of a Green Ci...
Book
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the...
Article
Full-text available
Decision-making is of critical significance in Internet-of-Vehicles (IoV), where vehicles need to quickly make decisions in real-time when sharing or transferring the information. In addition, it is necessary to identify the significant factors of an entity while measuring its legitimacy or to record the real-time data generated by it. Traditional...
Article
Classical automated schemes in the Industrial Internet of Things (IIoT) are challenged by the problems related to huge record storage and the way they respond. To properly manage the manufacturing settings, cognitive systems aim to find a way to efficiently adapt their actions based on uncertainty management and sensory data. However, due to the la...
Article
The industrial Internet-of-Things (IIoT) is a powerful Internet of Things (IoT) application that enables industrial growth by ensuring transparent communication among the various entities of a company such as the manufacturing locations, design hubs, and packaging units. However, current industrial architectures are unable to efficiently deal with...
Article
Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle (IoV) where objects equipped with cognition make decisions intelligently through the understanding of both social and physical worlds. However, the spectrum availability and data sharing/transferring among vehicles are critical improving services and driving saf...
Article
Full-text available
In this paper, we have demoralized the transmission processing concerns of fog nodes and IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A secure routed and handoff mechanism is proposed in order to avoid the attack by exploring the trust value and rating of each fog IoT and fog nodes/devices based on th...
Article
Full-text available
One of the biggest challenges in political mayhem is visible during the election process where no stone is kept unturned in order to gain the power. Further, due to poll violence and waiting in the long queues to cast their votes, numbers of common citizens avoid the voting process completely in order to evade the chaos. In order to reduce these is...
Article
The rapidly growing, complex and key area of multimedia processing is medical area where the huge amount of patient?s data is disregarded. Further, medial fields used to interrelate with multimedia formats because of their daily real communication. Healthcare associations are renovating themselves into added efficient, coordinated and user-centered...
Article
Full-text available
Through the propagation of technology in recent years, people communicate in a range of ways via multimedia. The use of multimedia technique in healthcare system also makes it possible to store, process and transfer the patient's data presented in variety of forms such as images, text and audio through online using various smart objects. Healthcare...
Chapter
In this paper, we have reviewed blockchain technology along with its usage in industrial IoT. Further, the literature survey has been described that elaborates how blockchain is rising nowadays. Further, the number of applications where blockchain technology can be applied along with smart devices has been discussed. In the last section, we have co...
Article
Full-text available
The need for more efficient spectrum utilization is becoming more pronounced in our increasingly digitalized society. However, this also introduces a variety of new security threats. In this paper, we introduce a novel cognitive user emulation attack (CUEA) in a cognitive radio network (CRN), which can be exploited by intruders during spectrum hand...
Article
The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form fo...
Article
Full-text available
Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant bands/channels through the Cognitive Radio Network (CRN) cycle by executing its d...
Chapter
The cloud is a radical platform that conveys dynamic, virtualization asset pools and high convenience. Since distributed computing lays on web, security issues like information security, protection, secrecy, and verification are experienced. In order to get rid of these, an assortment of mechanisms and encryption algorithms are utilized in various...
Preprint
The Named Data Networks or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism.The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Inter...
Chapter
In this reviewed endeavour, a mathematical model is formulated to assess the spread of a distributed attack over a computer network for critical targeted resources. In this paper a mathematical model is formulated, the two sources susceptible, vaccinated, infected, recovered nanonodes in the target population (e-\( S_{t} V_{t} I_{t} R_{t} \)) and s...
Article
Full-text available
Recently, connected vehicles (CV) are becoming a promising research area leading to the concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are...
Preprint
India is the largest democracy in the world and in spite of that faces various challenges on a daily basis which hinder its growth like corruption and human rights violations. One of the ugliest phases of corruption and political mayhem is visible during the election process where no stone is kept unturned in order to gain power. However, it is the...
Article
Full-text available
Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is depend...
Preprint
Full-text available
Recently, with the development of wireless communication and vehicular industry, vehicular ad-hoc network is becoming a promising research area. With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of ve...
Research
In the context of healthcare cyber physical system, a secure, critical and continues healthcare data transmission is vital for stopping the illicit access to network services. This papers aim is to propose an energy and SLA efficient cyber physical system for E-healthcare during the data transmission services. Further, the proposed phenomenon will...
Article
Full-text available
Due to advances in technology, research in healthcare using a cyber-physical system (CPS) opens innovative dimensions of services. In this paper, the authors propose an energy-and service-level agreement (SLA)-efficient cyber physical system for E-healthcare during data transmission services. Furthermore, the proposed phenomenon will be enhanced to...
Preprint
Through the propagation of technology in recent years, people communicate in a range of ways via multimedia. The use of multimedia technique in healthcare system also makes it possible to store, process and transfer the patient’s data presented in variety of forms such as images, text and audio through online using various smart objects. Healthcare...
Preprint
Full-text available
Communicating things network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is depend...
Article
Full-text available
In this paper, we have proposed a secure handoff procedure by generating and assessing the tickets for each mesh client which are divided among various zones of mesh routers depending on their transmission range. Further, a trusted third party authentication server is proposed that is responsible for generating and assigning the tickets of each mes...
Article
Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where t...
Preprint
In the context of healthcare cyber physical system, a secure, critical and continues healthcare data transmission is vital for stopping the illicit access to network services. This papers aim is to propose an energy and SLA efficient cyber physical system for E-healthcare during the data transmission services. Further, the proposed phenomenon will...
Article
This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding node by com...
Article
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performan...
Article
Full-text available
In this paper, we have exploited the weight trusted routing (WTR) mechanism to detect and eliminate the malicious nodes involved during the routing path formation in smart-home environments where the routing between the communicating entities is performed through the mesh architecture. Further, to provide a secure communication against malicious be...
Article
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant dela...
Article
Security for network services is a prevalent requirement against fraudulent access to the conveniences in WMN. A secure communication is indispensable for stopping the unauthorized access to the network services in wireless technology. A number of researchers have proposed various security schemes but most of them are vulnerable against several per...
Article
This manuscripts aim is to intend a secure routing mechanism by doing some amendments in previously proposed efficient secure routing (ESR) protocol against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding...
Article
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performan...
Article
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant dela...
Article
Full-text available
In this paper, we have proposed a technique to detect and eliminate the malicious/misbehaving nodes involved during routing path formation in hierarchical mesh environments. In this, dijkstra's shortest path routing algorithm is used whose weights are deliberated using certain parameters (i.e. node distance, node's previous interactions, packet los...
Article
In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and eliminate the malicious nodes involved during routing path formation in mesh environments by doing some amendments in basic AODV routing phenomenon. The proposed mechanism is...
Article
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire ne...
Article
Full-text available
In dynamic nature of WMN, handoff latency is a significant parameter of research. When a mesh client leaves the range of serving mesh router and searches for accessing a new router based on good SNR (Signal to Noise) ratio, a handoff procedure takes place. Whenever a mobile client leaves the range of its Home Mesh Router (HMR) and connects to a For...
Conference Paper
The aim of this manuscript is to propose a secure handoff scheme for cognitive radio network by ensuring a secure communication among cognitive users (CU). A coordinator cognitive user (CCU) is selected based on users trust values/factor (TF) by periodically computing and updating these values of each CU, depending upon their characteristics. The C...
Conference Paper
As Wireless Mesh Network (WMN) is deliberated as a key technology in today's networking era, security during designing of such system plays a significant role. A number of techniques have been proposed by several researchers in order to provide the security, but leads to certain vulnerability, i.e. active attacks, computational overhead, network co...
Chapter
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain. Black hole and gray hole are the two major a...