
Geetanjali RatheeNetaji Subhas Institute of Technology | NSITONLINE · Computer Engineering
Geetanjali Rathee
Ph.D. CSE
About
96
Publications
15,086
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
727
Citations
Introduction
Skills and Expertise
Publications
Publications (96)
Missing data is universal complexity for most part of the research fields which introduces the part of uncertainty into data analysis. We can take place due to many types of motives such as samples mishandling, unable to collect an observation, measurement errors, aberrant value deleted, or merely be short of study. The nourishment area is not an e...
Industrial IoT has emerged as a new paradigm in the era of smart systems where interactions and transmission of messages among various entities in an industrial ecosystem are done autonomously. This includes manufacturing of products, shipment process, storage of records, and counting the data, to name a few. However, the involvement of multiple cy...
Industrial Internet-of-Things (IIoT) is a powerful IoT application which remodels the growth of industries by ensuring transparent communication among various entities such as hubs, manufacturing places and packaging units. Introducing data science techniques within the IIoT improves the ability to analyze the collected data in a more efficient man...
Smart social systems are ones where a number of individuals share and interact with each other via various networking devices. There exist a number of benefits to including smart-based systems in networks such as religions, economy, medicine, and other networks. However, the involvement of several cyber threats leads to adverse effects on society i...
People communicate in a variety of ways via multimedia through the propagation of various techniques. Nowadays, variety of multimedia frameworks or techniques is used in various applications such as industries, software processing, vehicles and medical systems. The usage of multimedia frameworks in healthcare systems makes it possible to process, r...
For pervasive applications of the artificial neural networks (ANN), the autonomous control usually affects the overall processing and analysis of data in the healthcare systems. Though, involvement of several malicious activities by the intruders may drastically affect the overall communication system. Recently, more and more engineers have applied...
The Internet of Vehicles (IoV) is introduced to transfer/exchange the data among roadside units and vehicles through various smart devices in real time scenarios. However, the past works in IoV leads to various transparencies, security and privacy concerns while communicating and transferring the information among each other. This paper has propose...
People communicate in a variety of ways via multimedia through the propagation of various techniques. Nowadays, variety of multimedia frameworks or techniques is used in various applications such as industries, software processing, vehicles and medical systems. The usage of multimedia frameworks in healthcare systems makes it possible to process, r...
The automated techniques enabled with Artificial Neural Networks (ANN), Internet of Things (IoT), and cloud-based services affect the real-time analysis and processing of information in a variety of applications. In addition, multihoming is a type of network that combines various types of networks into a single environment while managing a huge amo...
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide quick and immediate identification of infection, proper and immediate clinical support is needed. Researchers have proposed various machine learning and smart IoT-based schemes for categorizing COVID-19 patients. Artificial neural networks (ANNs)...
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention. Recently Internet of Vehicles (IoVs) has been introduced as one of the applications of pervasive computing that addresses the road safety challenges. Vehicles participating within the IoV are embedded with a wide r...
COVID-19 is an extremely dangerous disease because of its highly infectious nature. In order to provide a quick and immediate identification of infection, a proper and immediate clinical support is needed. Researchers have proposed various Machine Learning and smart IoT based schemes for categorizing the COVID-19 patients. Artificial Neural Network...
A smart city refers to an intelligent environment obtained by deploying all available resources and recent technologies in a coordinated and smart manner. Intelligent sensors (Internet of Things (IoT) devices) along with 5G technology working mutually are steadily becoming more pervasive and accomplish users’ desires more effectively. Among a varie...
Industrial Internet-of-Things (IIoT) refers to the next stage in the evolution of organizations where collecting, analyzing, recording the data and controlling the entire activities of the various entities is achieved with connected machines in real time with enhanced quality and minimum production cost. Although, various phenomenal schemes for cro...
Industrial IoT in the advancement of organizations consigns to the next level in order to trace and manage every single activity of their entities. However, the interdependence, implementation and communication among such wireless devices also known as IoT devices that lead to various secrecy and personnel concerns. Even though the use of smart sen...
In this chapter, the authors have detailed the need of blockchain technology along with its case studies in different domains. The literature survey is described that describes how blockchain technology is rising. Further, a number of domains where blockchain technology can be applied along with its case studies have been discussed. In addition, th...
India is the largest democracy in the world, and in spite of that, it faces various challenges on a daily basis that hinder its growth like corruption and human rights violations. One of the ugliest phases of corruption and political mayhem is visible during the election process where no stone is kept unturned in order to gain power. However, it is...
Online social networking is expanding gradually in our professional as well as personal life in a variety of natures, beliefs, attitudes, and personalities. During communicating through the networks, the trust plays a very significant role while undertaking the communication process. This paper proposes a secure trusted hypothetical mathematical mo...
The dynamic and highly open nature of cognitive radio (CR) makes cognitive communication extremely vulnerable to various malicious activities resulting from several security threats. Although extensive efforts have been devoted to the research and development of spectrum sharing systems, security issues are not well addressed for the cognitive radi...
Mobile crowd sourcing offers a way for an organization to gain afar their “base of minds” of workforce offers in the form of idea competitions or innovation contests where task is divided among individuals to achieve a pooled result using mobile devices. However, mobile crowd sourcing consequence to an urban bias in addition to other key challengin...
Conventional models in the intelligent transportation system (ITS) are confronted by large computational overheads and how they react during real-time scenarios. To appropriately manage the communication process in real-time, a trust-based mechanism can provide an efficient approach to acclimatize its deeds based on indecision sensory information....
In this manuscript, we have considered the number of security concerns at different aspects of network communication in hybrid (centralized or distributed) cognitive radio network cell environment by distributing it into inter-domain and intra-domain. We have identified and resolved the routing and handoff process threats in both the domains by pro...
A smart city refers to an intelligent environment obtained by deploying all available resources and recent technologies in a coordinated and smart manner. Intelligent Transportation System (ITS) is used for developing and maintaining a sustainable and environmental friendly transportation system leading to the evolution of the concept of a Green Ci...
Data has cemented itself as a building block of daily life. However, surrounding oneself with great quantities of information heightens risks to one’s personal privacy. Additionally, the presence of massive amounts of information prompts researchers into how best to handle and disseminate it. Research is necessary to understand how to cope with the...
Decision-making is of critical significance in Internet-of-Vehicles (IoV), where vehicles need to quickly make decisions in real-time when sharing or transferring the information. In addition, it is necessary to identify the significant factors of an entity while measuring its legitimacy or to record the real-time data generated by it. Traditional...
Classical automated schemes in the Industrial Internet of Things (IIoT) are challenged by the problems related to huge record storage and the way they respond. To properly manage the manufacturing settings, cognitive systems aim to find a way to efficiently adapt their actions based on uncertainty management and sensory data. However, due to the la...
The industrial Internet-of-Things (IIoT) is a powerful Internet of Things (IoT) application that enables industrial growth by ensuring transparent communication among the various entities of a company such as the manufacturing locations, design hubs, and packaging units. However, current industrial architectures are unable to efficiently deal with...
Cognitive Radio Network (CRN) is considered as a viable solution on Internet of Vehicle (IoV) where objects equipped with cognition make decisions intelligently through the understanding of both social and physical worlds. However, the spectrum availability and data sharing/transferring among vehicles are critical improving services and driving saf...
In this paper, we have demoralized the transmission processing concerns of fog nodes and IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A secure routed and handoff mechanism is proposed in order to avoid the attack by exploring the trust value and rating of each fog IoT and fog nodes/devices based on th...
One of the biggest challenges in political mayhem is visible during the election process where no stone is kept unturned in order to gain the power. Further, due to poll violence and waiting in the long queues to cast their votes, numbers of common citizens avoid the voting process completely in order to evade the chaos. In order to reduce these is...
The rapidly growing, complex and key area of multimedia processing is medical area where the huge amount of patient?s data is disregarded. Further, medial fields used to interrelate with multimedia formats because of their daily real communication. Healthcare associations are renovating themselves into added efficient, coordinated and user-centered...
Through the propagation of technology in recent years, people communicate in a range of ways via multimedia. The use of multimedia technique in healthcare system also makes it possible to store, process and transfer the patient's data presented in variety of forms such as images, text and audio through online using various smart objects. Healthcare...
In this paper, we have reviewed blockchain technology along with its usage in industrial IoT. Further, the literature survey has been described that elaborates how blockchain is rising nowadays. Further, the number of applications where blockchain technology can be applied along with smart devices has been discussed. In the last section, we have co...
The need for more efficient spectrum utilization is becoming more pronounced in our increasingly digitalized society. However, this also introduces a variety of new security threats. In this paper, we introduce a novel cognitive user emulation attack (CUEA) in a cognitive radio network (CRN), which can be exploited by intruders during spectrum hand...
The Named Data Networks (NDN) or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism. The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form fo...
Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant bands/channels through the Cognitive Radio Network (CRN) cycle by executing its d...
The cloud is a radical platform that conveys dynamic, virtualization asset pools and high convenience. Since distributed computing lays on web, security issues like information security, protection, secrecy, and verification are experienced. In order to get rid of these, an assortment of mechanisms and encryption algorithms are utilized in various...
The Named Data Networks or Information Centric Networks (ICN) are being replaced by point-point procedures in order to ensure a reliable and efficient communication mechanism.The efficient benefits of ICN in terms of improved reliability, efficiency and fast information delivery lifted it as a highly capable interconnected networking form for Inter...
In this reviewed endeavour, a mathematical model is formulated to assess the spread of a distributed attack over a computer network for critical targeted resources. In this paper a mathematical model is formulated, the two sources susceptible, vaccinated, infected, recovered nanonodes in the target population (e-\( S_{t} V_{t} I_{t} R_{t} \)) and s...
Recently, connected vehicles (CV) are becoming a promising research area leading to the
concept of CV as a Service (CVaaS). With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of vehicular networks are...
India is the largest democracy in the world and in spite of that faces various challenges on a daily basis which hinder its growth like corruption and human rights violations. One of the ugliest phases of corruption and political mayhem is visible during the election process where no stone is kept unturned in order to gain power. However, it is the...
Communicating Things Network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is depend...
Recently, with the development of wireless communication and vehicular industry, vehicular ad-hoc network is becoming a promising research area. With the increase of connected vehicles and an exponential growth in the field of online cab booking services, new requirements such as secure, seamless and robust information exchange among vehicles of ve...
In the context of healthcare cyber physical system, a secure, critical and continues
healthcare data transmission is vital for stopping the illicit access to network services. This papers aim is to propose an energy and SLA efficient cyber physical system for E-healthcare during the data transmission services. Further, the proposed phenomenon will...
Due to advances in technology, research in healthcare using a cyber-physical system (CPS) opens innovative dimensions of services. In this paper, the authors propose an energy-and service-level agreement (SLA)-efficient cyber physical system for E-healthcare during data transmission services. Furthermore, the proposed phenomenon will be enhanced to...
Through the propagation of technology in recent years, people communicate in a range of ways via multimedia. The use of multimedia technique in healthcare system also makes it possible to store, process and transfer the patient’s data presented in variety of forms such as images, text and audio through online using various smart objects. Healthcare...
Communicating things network (CTN) is the latest paradigm in the development of smart technologies. CTN comprises a network of physical devices capable of extracting and sharing digital information. The aim of CTN is to develop smart appliances that boost productivity and provide real-time data rapidly than any structure or a network that is depend...
In this paper, we have proposed a secure handoff procedure by generating and assessing the tickets for each mesh client which are divided among various zones of mesh routers depending on their transmission range. Further, a trusted third party authentication server is proposed that is responsible for generating and assigning the tickets of each mes...
Smart phones have advanced at a very fast pace in recent years. These advancement leads to the concern of exploitation of users’ personal information due to non-restricted usage of data by any third party applications. Mobile crowdsourcing has evolved as an appropriate method for collecting the data or finding solution of a broadcasted task where t...
In the context of healthcare cyber physical system, a secure, critical and continues healthcare data transmission is vital for stopping the illicit access to network services. This papers aim is to propose an energy and SLA efficient cyber physical system for E-healthcare during the data transmission services. Further, the proposed phenomenon will...
This article aims to secure a routing mechanism by completing amendments in previously proposed efficient secure routing (ESR) protocols against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding node by com...
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performan...
In this paper, we have exploited the weight trusted routing (WTR) mechanism to detect and eliminate the malicious nodes involved during the routing path formation in smart-home environments where the routing between the communicating entities is performed through the mesh architecture. Further, to provide a secure communication against malicious be...
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant dela...
Security for network services is a prevalent requirement against fraudulent access to the conveniences in WMN. A secure communication is indispensable for stopping the unauthorized access to the network services in wireless technology. A number of researchers have proposed various security schemes but most of them are vulnerable against several per...
This manuscripts aim is to intend a secure routing mechanism by doing some amendments in previously proposed efficient secure routing (ESR) protocol against networking layer attacks in mesh networking environments. Along with generating the tickets to prove the authenticity of communicating clients, each node proves the legitimacy of its succeeding...
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performan...
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing and self-organizing characteristics. In WMN, data is forwarded through multiple hops to the destination node. One of the factors that impact the network performance is the secure communication delay. An authentication technique having significant dela...
In this paper, we have proposed a technique to detect and eliminate the malicious/misbehaving nodes involved during routing path formation in hierarchical mesh environments. In this, dijkstra's shortest path routing algorithm is used whose weights are deliberated using certain parameters (i.e. node distance, node's previous interactions, packet los...
In the context of wireless technology, a secure communication is requisite for stopping the unauthorized access to the network services. This manuscripts aim is to detect and eliminate the malicious nodes involved during routing path formation in mesh environments by doing some amendments in basic AODV routing phenomenon. The proposed mechanism is...
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire ne...
In dynamic nature of WMN, handoff latency is a significant parameter of research. When a mesh client leaves the range of serving mesh router and searches for accessing a new router based on good SNR (Signal to Noise) ratio, a handoff procedure takes place. Whenever a mobile client leaves the range of its Home Mesh Router (HMR) and connects to a For...
The aim of this manuscript is to propose a secure handoff scheme for cognitive radio network by ensuring a secure communication among cognitive users (CU). A coordinator cognitive user (CCU) is selected based on users trust values/factor (TF) by periodically computing and updating these values of each CU, depending upon their characteristics. The C...
As Wireless Mesh Network (WMN) is deliberated as a key technology in today's networking era, security during designing of such system plays a significant role. A number of techniques have been proposed by several researchers in order to provide the security, but leads to certain vulnerability, i.e. active attacks, computational overhead, network co...
Wireless mesh network (WMN) is considered as a key technology in today’s networking era. In this, security is determined as a vital constraint. Several approaches have been proposed to provide secure communication in WMN but communication security possibilities always exist and are very hard to maintain. Black hole and gray hole are the two major a...