Govind P Gupta

Govind P Gupta
National Institute of Technology Raipur | NIT Raipur · Department of Information Technology

Ph.D.

About

80
Publications
7,570
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,211
Citations
Citations since 2016
73 Research Items
1196 Citations
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
20162017201820192020202120220100200300400500
Introduction
Assistant Professor Department of Information Technology National Institute of Technology Raipur Raipur (India)

Publications

Publications (80)
Article
The advancement in smart agriculture through the Internet of Things (IoT) devices has increased the risk of cyber-attacks. Most of the existing malware detection techniques are unable to detect new variants of malware and suffer from poor accuracy. To overcome the challenges of new malware, this research work proposes a novel three-phase Deep Malwa...
Article
Full-text available
Android-based smart devices cater to services in almost every aspect of our lives like personal, professional, social, banking, business, etc. However, people with increasingly dependent on the smartphone, malicious attacks against these gadgets have increased exponentially. To achieve a secured smart environment for future sustainable computing, a...
Preprint
Full-text available
The integration of the Internet of Things (IoT) with traditional healthcare systems has improved quality of healthcare services. However, the wearable devices and sensors used in Healthcare System (HS) continuously monitor and transmit data to the nearby devices or servers using an unsecured open channel. This connectivity between IoT devices and s...
Chapter
Blockchain since 2009 has been gaining more popularity in various fields to use in numerous applications to overcome the security issues such as privacy, transparency, and mutability of data in the process of data sharing. Process of data sharing has many addressed and unaddressed challenges such as information encryption and decryption, data authe...
Article
Green Connected and Autonomous Vehicles (CAVs) are the future of next-generation Intelligent Transportation Systems (ITS) that will help humans to improve road safety and reduce pollution, energy consumption, and travel delays. To increase the performance of green CAV, the data generated by Autonomous Vehicles (AVs) and associated infrastructure ne...
Article
Node localization process is a crucial prerequisite in the area of Wireless Sensor Networks (WSNs). The algorithms for node localization process can either range-based or range-free. Range-free algorithms are preferred over range-based ones due to their cost-effectiveness. DV-Hop along with its variants is normally well-liked range-free algorithm b...
Article
This paper investigates sensing data acquisition issues from large-scale hazardous environments using UAVs-assisted WSNs. Most of the existing schemes suffer from low scalability, high latency, low throughput, and low service time of the deployed network. To overcome these issues, we considered a clustered WSN architecture in which multiple UAVs ar...
Preprint
The industrial healthcare system has brought in the possibility of realizing advanced real-time monitoring of patients and has enriched the quality of medical services through data sharing among intelligent wearable devices and sensors. Such system however, brings in considerable challenges related to security and privacy due to the need of continu...
Article
Full-text available
In wireless sensor networks (WSNs), energy efficient wakeup scheduling of sensor nodes is one of an efficient approach for saving the energy consumption of the network. Determining an optimal wakeup schedule of sensor nodes with satisfactory coverage and connectivity requirements is very challenging issue and known as NP-hard problem. In literature...
Article
Full-text available
Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes within the network. This service is required in various applications such as fire surveillance, intrusion detection and target detection, where sensor nodes are deployed within inaccessible...
Chapter
Remote monitoring and recognition of physical activities of elderly people within smart homes and detection of the deviations in their daily activities from previous behavior is one of the fundamental research challenges for the development of ambient assisted living system. This system is also very helpful in monitoring the health of a swiftly agi...
Chapter
Full-text available
Internet of Things (IoT) refers convergence of smart object with Internet to make surrounding smarter, autonomous and efficient for human life. Despite the several benefits of IoT and its applications, the presence of Internet-connected devices has introduced new cyber attacks targeting IoT network. Several security strategies have been proposed to...
Article
The Industrial Internet of Things (IIoT) is a fast-growing network of Internet-connected sensing and actuating devices aimed to enhance manufacturing and industrial operations. This interconnection generates a high volume of data over the IIoT network and raises serious security (e.g., the rapid evolution of hacking techniques), privacy (e.g., adve...
Chapter
With the exponential increase in usage of the Internet-based services in various smart cities, and smart environment applications, several cyber-attacks are reported in recent years in IoT network deployed for smart monitoring and observation. In order to protect the Internet of Things (IoT) network, there is a need to design a robust and fast intr...
Chapter
Blockchain since 2009 has been gaining more popularity in various fields to use in numerous applications to overcome the security issues such as privacy, transparency, and mutability of data in the process of data sharing. Process of data sharing has many addressed and unaddressed challenges such as information encryption and decryption, data authe...
Chapter
With more uses of internet-based services, the risk of cyberattacks is growing continuously. To analyze these research trends for malware and intrusion detection, the authors applied the topic modeling approach in the study by using the LDA (latent dirichlet allocation) and calculating the maximum and minimum probability of the words, which appears...
Article
The Internet of Things (IoT) is emerging as a new technology for the development of various critical applications. However, these applications are still working on centralized storage architecture and have various key challenges like privacy, security, and single point of failure. Recently, the blockchain technology has emerged as a backbone for th...
Chapter
With more popularity and advancement in Internet-based services, the use of the Android smartphone has been increasing very rapidly. The tremendous popularity of using the Android operating system has attracted malware attacks on these devices. Detecting variants of malware features that change their behavior to hide from being detected by the trad...
Article
Full-text available
Computation of an optimal coverage and connectivity aware wake-up schedule of sensor nodes is a fundamental research issue in a 3D-Wireless Sensor Networks. Most of the existing metaheuristic-based wake-up scheduling schemes do not make sure optimal solution and occasionally smacked in local minima. This paper propose a hybrid metaheuristic-based w...
Article
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Article
Full-text available
With the development of internet of things (IoT), capabilities of computing, networking infrastructure, storage of data and management have come very close to the edge of networks. This has accelerated the necessity of Fog computing paradigm. Due to availability of Internet, most of our business operations are integrated with IoT platform. Fog comp...
Chapter
Detection of malware signatures from executable files requires effective signal processing and sandboxing operations, wherein the executable file is scanned for any malignant behavior. The recent malware detection techniques are based on static approaches that use machine and deep learning for analyzing malware signatures from byte and assembly-lev...
Article
The rapid development of Automotive Industrial Internet of Things requires secure networking infrastructure towards digitalization. Cybertwin is a next generation networking architecture that serves as a communication, and digital asset owner, and can make the Vehicle-to-Everything (V2X) network flexible and secure. However, cybertwin itself can pu...
Article
Smart Agriculture (SA) incorporates low cost and low energy consuming sensors and devices to enhance quantitative and qualitative agricultural production. However, these devices uses an open channel i.e., Internet and generates large amount of data in real-time and thus, has the potential to be misused. As a consequence, the major concern in the im...
Article
Full-text available
In the Autonomous Underwater Vehicle (AUV) based Underwater Acoustic Sensor Network (UASN), efficient data collection with minimum delay and high throughput is a fundamental research challenge. Most of the existing data collection schemes using AUVs are suffered from unbalanced energy consumption, long delay, partial coverage, and incomplete data c...
Article
With the development of Internet of Vehicles (IoV), the integration of Internet of Things (IoT) and manual vehicles becomes inevitable in Intelligent Transportation Systems (ITS). In ITS, the IoVs communicate wirelessly with other IoVs, Road Side Unit (RSU) and Cloud Server using an open channel Internet. The openness of above participating entitie...
Article
Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to improve the traditional transport management systems. In C-ITS infrastructure Autonomous Vehicles (AVs) communicate wirelessly with other AVs, Road Side Units (RSUs) and Traffic Command Centres (TCCs) using an open channel Internet. However, the use of the Inter...
Article
With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...
Article
Full-text available
Recent advancement in wireless charging technologies has enabled us to design and development of Wireless Rechargeable Sensor Networks (WRSNs) for sensing and data gathering tasks for a very long duration. The fundamental research challenge in WRSN is to design efficient path scheduling for Mobile Wireless Charging Vehicles (MWCVs) such that it max...
Article
With increase in the demand for Internet of Things (IoT)-based services, the capability to detect anomalies such as malicious control, spying and other threats within IoT-based network has become a major issue. Traditional Intrusion Detection Systems (IDSs) cannot be used in typical IoT-based network due to various constraints in terms of battery l...
Article
With simple connectivity and fast-growing demand of smart devices and networks, IoT has become more prone to cyber attacks. In order to detect and prevent cyber attacks in IoT networks, intrusion detection system (IDS) plays a crucial role. However, most of the existing IDS have dimensionality curse that reduces overall IoT systems efficiency. Henc...
Conference Paper
The Software Defined Internet of Things-Fog (SDIoT-Fog) has provided a new connectivity paradigm for effective service provisioning. SDIoT-Fog uses network resource virtualization to provide services to heterogeneous IoT devices. However, data privacy, and security are the two major challenges that prevents faster realization of SDIoT-based framewo...
Article
With the advancement in sensor technology and the proliferation of low-cost electronic circuits, Internet of Things (IoT) is emerging as a promising technology for realization of smart cities. However, challenges such as security, privacy, trust, scalability, verifiability, and centralization prevent faster adaptations of IoT-driven smart cities. T...
Chapter
Analysis of daily human activities becomes more open and prevalent with the advancement of sensors embedded in mobile devices. A number of applications such as fitness tracking, health analysis or user-adaptive systems, has been developed by tracking down detailed analysis of complex human activities. In this paper, a framework for the monitoring a...
Article
Full-text available
Fundamental design goal of a typical wireless sensor network is to optimize energy consumption. Recent studies have confirmed that node clustering mechanism efficiently utilizes energy resource of the network by organizing nodes into a set of clusters and helps in extending the network lifetime. Most of the existing node clustering schemes suffers...
Chapter
Recent advancement in the wireless power transfer technology has motivated the development of a wireless rechargeable sensor network (WRSN). In WRSNs, the formation of an optimal recharging schedule for each wireless charger vehicle is a well known NP-complete problem. To determine the optimal recharging schedule for each wireless charger vehicle,...
Chapter
In wireless sensor networks, localization is one of the essential requirements. Most applications are of no use, if location information is not available. Based on cost, localization algorithms can be divided into two categories, namely range-based and range-free. Range-free are cost-effective, but they lack accuracy. In this chapter, the role of n...
Chapter
The formation of the unequal clusters of the sensor nodes is a burning research issue in wireless sensor networks (WSN). Energy-hole and non-uniform load assignment are two major issues in most of the existing node clustering schemes. This affects the network lifetime of WSN. Salp optimization-based algorithm is used to solve these problems. The pr...
Article
Localization problem has gained a significant attention in the field of wireless sensor networks in order to support location-based services or information such as supporting geographic routing protocols, tracking events, targets, and providing security protection techniques. A number of variants of DV-Hop-based localization algorithms have been pr...
Article
Full-text available
Internet of Things (IoT) is one of the big sources of Big Sensor data in which collected sensor readings often polluted due to corruption and losses of the sensor readings. In Big Sensor data analytics, fast and efficient detection of error and its localization is a challenging research issue. Most of the existing solutions for the error detection...
Article
Full-text available
In Wireless Sensor Network (WSN), the formation of the load-balanced clusters of the sensor nodes is very burning research issue. Most of the existing node clustering schemes suffer from energy-hole and non-uniform load assignment problems. These problems affect the network lifetime of the WSN severely. To solve these problems, this paper proposed...
Article
Full-text available
In wireless sensor networks, coverage and connectivity are the fundamental problems for monitoring the targets and guaranteed information dissemination to the far away base station from each node which covers the target. This problem has been proved NP-complete problem, where a set of target points are given, the objective is to find optimal number...
Article
Full-text available
Localization is an important issue in field of Wireless Sensor Networks. Range-free approach is most promising solution used for networks due to its low cost and less power consumption. The main limitation of range-free approach is low accuracy as it is affected by many factors such as node density, coverage and topology diversity. This work propos...
Chapter
Node localization is an essential difficulty in area of 3D Wireless Sensor Network (WSN). In the literature, there are different types of localization algorithms proposed for 3D WSN. But all the existing methods suffer from poor localization accuracy. This is due to the fact that all the existing methods use a less precise linear method called the...
Article
Full-text available
Localization is a significant challenge in the area of wireless sensor networks (WSNs). Distance Vector Hop (DV-Hop) algorithm is most preferable algorithm due to its low cost, distributed nature, and its feasibility for all kinds of sensor networks, but it suffers from high localization error. In order to reduce the problem of high localization er...
Chapter
In a large scale Wireless Sensor Networks (WSNs), designing an energy balanced clustering protocol has become a challenging research issues. This is due to fact that design of an energy-balanced clustering for maximizing the network lifetime of WSNs is a NP-hard problem. For solving this NP-hard problem, many meta-heuristic approach based clusterin...
Chapter
Software-defined networking (SDN) is an emerging network design and management paradigm that offers a flexible way for reducing the complexity of the network management and configuration. SDN-based wireless sensor networks (SDWSNs) consist of a set of software-defined sensor nodes equipped with different types of sensors. In SDWSN, sensor node is a...
Article
Uniform energy consumption and its optimization is a major concern for designing the clustering and routing protocol for large scale wireless sensor networks. Most of the existing nature-inspired computing based solutions for cluster-based routing problem for wireless senor network, suffer from unbalanced energy consumption issues. This is due to f...
Article
Full-text available
Wireless Sensor networks is a network of low-priced, small sized and energy constraint sensor nodes where each sensor node is programmed to sense the events and send it to the Base station using multi-hop communication. In almost all applications of Wireless Sensor Networks, event detection information is required along with the location of the eve...
Article
Full-text available
In a large-scale Wireless Sensor Networks (WSNs), designing of an energy efficient data gathering protocol has become a challenging research issues. This is due to fact that each sensor node is generally equipped with limited energy resource. In the literature, clustering-based technique for data gathering has been proved very efficient in terms of...
Chapter
Internet of Things (IoT) offers the capability to connect and integrate both digital and physical objects to the internet and to enable machine-to-machine and machine-to-human communication or interactions services. The real-time adoptions and deployments of such systems for different applications such as smart cities, smart grids, smart homes, or...
Article
In recent years, mobile agents have been employed for collaborative processing in wireless sensor networks (WSNs), where agents migrate from node to node, progressively aggregate data and return to the sink with the results. However, when an agent migrates through its itinerary, its size linearly grows and it may become bloated in size. We show thr...
Conference Paper
Localization is hot research topic in the area of WSNs. Many proposals have come in this area to develop an efficient, accurate, scalable and feasible algorithm. Distance-Vector (DV-Hop) is one standout amongst the most prominent algorithms due to its advantages, but it has still low accuracy. To improve accuracy of DV-Hop algorithm, the improvemen...
Article
Full-text available
—In wireless sensor networks, localization is a required fundamental service to know the position of a sensor node within the network. The task of localization is performed after random deployment of all sensor nodes and is very useful in different types of services such as data tagging, node tracking, and target detection. Recently, numerous local...
Article
Full-text available
Localization is one of the important requirements in wireless sensor networks for tracking and analyzing the sensed data/events. In most of the applications of wireless sensor networks, the event information without its location information has no significance. The well known traditional Distance-Vector Hop (DV Hop) algorithm and weighted centroid...
Article
Full-text available
Due to increase in internet based services, the size of network traffic data has become so large and complex that it is very difficult to process with the traditional data processing tools. Fast and efficient cyber security intrusion detection is a very challenging problem due to big and complex nature of network traffic data. A realistic cyber sec...
Conference Paper
Fast and efficient network intrusion detection is a very challenging issue as the size of network traffic has become increasingly big and complex. A real time intrusion detection system should be able to process large size of network traffic data as quickly as possible in order to prevent intrusion in the communication system as early as possible....
Conference Paper
In wireless sensor networks, a fundamental research issues in designing a protocol is how to minimize energy consumption and prolong the network lifetime, while ensuring the required spatial coverage as well as connectivity. In this paper, we present an efficient coverage and connectivity aware data gathering (ECCDG) protocol for periodic data gath...
Article
The use of mobile agents for collaborative processing in wireless sensor network has gained considerable attention. This is when mobile agents are used for data aggregation to exploit redundant and correlated data. The efficiency of agent-based data aggregation depends on the agent migration scheme. However, in general, most of the proposed schemes...
Article
Recently, the use of mobile agents in wireless sensor networks (WSNs) has emerged as the topic of extensive research due to their efficient utilization of network bandwidth and energy, and flexibility of their use for different WSN applications. Most of the proposed mobile agent based schemes use static itineraries for agents’ migration that are co...
Article
Wireless sensor networks are generally deployed for specific applications to accomplish certain objectives over a period of time. To fulfill these objectives, it is crucial that the sensor network continues to function for a long time, even if some of its nodes become faulty. Energy efficiency and fault tolerance are undoubtedly the most crucial re...
Article
Full-text available
In wireless sensor network, sensor readings generated by nearby nodes are redundant and highly correlated, both in space and time domains. Since transmitting redundant and highly correlated data incurs a huge waste of energy and bandwidth, spatial and temporal correlation should be exploited in order to reduce redundant data transmission. In this p...
Conference Paper
Due to multi-hop routing and many-to-one data traffic pattern of wireless sensor networks (WSNs), the sensor nodes near to the sink have heavier relay traffic that makes them to deplete their energy much faster than sensor nodes in other parts of the monitored space. This uneven energy consumption can cause energy hole around the sink. During this...
Conference Paper
One of the fundamental requirements of energy-constrained wireless sensor networks is to prolong the network lifetime which strongly depends on the data dissemination protocol used. A variety of different energy efficient data dissemination protocols are proposed in recent years. However there is little performance evaluation information on each pr...

Network

Cited By

Projects