Gulshan Kumar

Gulshan Kumar
Lovely Professional University | LPU · Discipline of Computer Science & Engineering

Doctor of Philosophy
Post Doctoral Researcher at University of Padua

About

104
Publications
17,696
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
668
Citations
Additional affiliations
August 2020 - present
University of Padova
Position
  • PostDoc Position
January 2019 - present
Lovely Professional University
Position
  • Professor (Associate)
July 2012 - January 2019
Lovely Professional University
Position
  • Professor (Assistant)

Publications

Publications (104)
Article
In this paper, we show a deep learning model for bot detection, named as DeBot, for industrial network traffic. DeBot uses a novel Cascade Forward Back Propagation Neural Network (CFBPNN) model with a subset of features using the Correlation-based Feature Selection (CFS) technique. A time series-based Nonlinear Auto-regressive Network with eXogenou...
Article
Full-text available
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made it a destructive weapon of attackers which can disrupt the services of any network including the Internet of Things. It is almost impossible to avoid DDoS attacks completely but still these attacks can be handled efficiently. It is a core security issue as the...
Article
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also increasing exponentially. Therefore, security becomes a critical issue in IoTs. Confidentiality, Integ...
Article
Full-text available
The Pb(Zr 0.5 , Ti 0.5 )O 3 (PZT) is one of the ferroelectric materials used in the non-volatile memories. However, PZT usually suffers from fatigue that degrades the polarization with metallic electrodes. The high stability associated with Sr-O bonding reduces oxygen vacancies which in turn lessens fatigue and hence Sr in introduced at Pb site. In...
Article
Full-text available
Silicon and its native oxides (SiO 2 ) have led the continuous development in the integrated circuits for decades. The excellent insulating properties of SiO 2 and silicon/SiO 2 interface quality were used as capacitor dielectrics in random-access memories (RAM’s) and transistor gate dielectrics in complementary metal-oxide semiconductor (CMOS’s),...
Article
Full-text available
Wide-scale adoption of the Internet of Everything requires decentralized security, responsibility, and trust among the stakeholders. All these can be achieved by a Distributed Ledger Technology (DLT) backbone. As a mathematical model for enabling this DLT backbone, IOTA’s Tangle is gaining popularity due to its scalability and freedom from transact...
Article
Blockchain is an emerging decentralized and distributed technology. Along with the beneficial features of decentralization, transparency, and security the consensus algorithms of blockchains form key building blocks for this technology. Consensus protocol/algorithm helps to provide a decentralized decision making process. An efficient consensus alg...
Article
In this paper, we develop a feature extraction model using the amalgamation of machine and deep learning techniques for Industrial Internet of Thing (IIoT). We train the model with the most effective feature set evaluated using machine learning algorithms and deep learning feature extraction methods. We test these features with deep learning based...
Article
In this pandemic, providing a quality environment is considered one of the essential objectives of smart wellbeing observation. Therefore, the prediction of irregular events has become a fundamental requirement of assistive or clinical consideration. By concentrating on this need, a dew computation-inspired irregular physical event determination so...
Article
The decentralization and transparency have provided wide acceptance of blockchain technology in various sectors through numerous applications. The claimed security services by blockchain have been proved using various cryptographic techniques, mainly public key infrastructure and digital signatures. However, the use of generic cryptographic primiti...
Article
The fiber optic communication is the one where the wired and the wireless communication systems are integrated to have high bandwidth, low cost, and high data rate with high user density. The RoF technology brings about high-performance network and the guaranteed quality of service for the increased demand for multimedia services. The RoF faces pro...
Article
Full-text available
Cryptographic algorithms and functions should possess some of the important functional requirements such as: non-linearity, resiliency, propagation and immunity. Several previous studies were executed to analyze these characteristics of the cryptographic functions specifically for Boolean and symmetric functions. Randomness is a requirement in pres...
Article
In the present work, we propose DHACS, a Decentralized Hybrid Access Control for Smart contract, for IIoTs. DHACS aims to provide transparency, reliability and robustness to the existing access control mechanism in IIoTs. The framework is based on blockchain feasibilities that contributes with an interconnected hybrid access control through smart c...
Article
The pandemic/epidemic of COVID-19 has affected people worldwide. A huge number of lives succumbed to death due to the sudden outbreak of this corona virus infection. The specified symptoms of COVID-19 detection are very common like as normal flu; asymptomatic version of COVID-19 has become a critical issue. Therefore, as a precautionary measurement...
Article
In this paper, an Internet of Energy (IoE) solution for providing optimal charging and control of resources in the era of electric vehicles (EVs) with energy trading and security is considered. A blockchain based security solution is presented by considering the IoE as a distributed energy system with internet of things (IoT). However, by inheritin...
Article
Full-text available
Ferroelectric (Pb0.35Sr0.65)(Zr0.5Ti0.5)O3 material with Curie temperature below room temperature was prepared by solution-gelation method on platinized silicon substrates. Structural and morphological evolution of the spin-coated films on Pt/ZrO2/SiO2/Si substrates as a function of annealing temperature were studied by X-ray diffraction and atomic...
Preprint
Full-text available
Bibliometrics is useful to analyze the research impact for measuring the research quality. Different bibliographic databases like Scopus, Web of Science, Google Scholar etc. are accessed for evaluating the trend of publications and citations from time to time. Some of these databases are free and some are subscription based. Its always debatable th...
Article
Full-text available
Sedentary behavior is very common in today’s lifestyle that causes several metabolic and cardiovascular diseases. The high scale of physical inactiveness with inadequate activities such as drinking alcohol, smoking and negligence of healthy diet causes extreme health issues. Therefore, it becomes essential to recognize health, behavioral, and envir...
Preprint
Full-text available
Numerous indexing databases keep track of the number of publications, citations, etc. in order to maintain the progress of science and individual. However, the choice of journals and articles varies among these indexing databases, hence the number of citations and h-index varies. There is no common platform exists that can provide a single count fo...
Article
Wireless Sensor Network (WSN) is one of the integral part of the present ubiquitous and pervasive computing. The smartness of the applications is incomplete without WSNs. Almost all the scenarios of WSNs require efficient and accurate localization process. However, the main disadvantage of the existing frameworks and algorithms is that they are not...
Article
Full-text available
Vehicular networks are the combination of transport systems and the internet systems formed with the main motive to increase the safety of passengers, although non-safety applications are also provided by vehicular networks. Internet of Things (IoT) has a subsection called Mobile Ad hoc Network (MANET)m which in turn has a subsection called Vehicul...
Article
Full-text available
Blockchain is the consensus-based technology used to resolve conflicts in Byzantine environments. Vehicles validate the messages received from neighboring vehicles using the gradient boosting technique (GBT). Based on the validation results, the message source vehicle generates the ratings that are to be uploaded to roadside units (RSUs), and throu...
Article
Full-text available
Industrial Internet of Things (IIoTs) are the extensions of the Internet of Things (IoTs) and have paved the way towards the industry revolution 4.0. IIoT accelerates the industry automation of internal and external working process including transport, manufacturing, and marketing units with a number of connected devices. Being the extension of IoT...
Preprint
Blockchain is the consensus-based technology to resolve the conflicts in Byzantine environments. Vehicles validate the messages received from the neighboring vehicles using Gradient Boosting Technique (GBT). Based on the validation results the message source vehicle generates the ratings that are to be uploaded to Road Side Units (RSUs) through tha...
Article
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization, and...
Article
Bronchial asthma is one of the most common chronic diseases of childhood and considered as a major health problem globally. The irregularity in meteorological factors has become a primary cause of health severity for the individuals suffering from asthma. In the presented research, a dew-cloud assisted cyber-physical system (CPS) is proposed to ana...
Article
Smart cities are developed to optimize operations across the city such as waste and traffic management, water supply management, criminal tracking, and pollution monitoring, etc. Smart cities are formed by the interconnection of various Internet of Things (IoT) devices for collecting the data from objects and humans to perform necessary actions. Bu...
Article
Full-text available
There is an increasing drive to provide improved levels of trust within an Internet-of-Things (IoTs) environments, but the devices and sensors used tend to be limited in their capabilities for dealing with traditional cryptography methods. Resource constraints and security are often the two major concerns of IIoT (Industrial IoT applications and bi...
Conference Paper
Full-text available
Internet-of-Things (IoTs) are developing each day and proving their potential value in various applications. The increasing number of devices for IoTs also posing a high security concern and authentication is one of them. Along with the traditional sign-then encryption techniques, signcryption, light weight authentication methods are also developed...
Article
Internet-of-Things (IoTs) are one of the most promising technologies in the present world. It connects people, processes and things. The increasing number of devices in IoT invoking various security and privacy issues. Authentication is one of them which should be measured at the very first level when a device comes into the network. Many authentic...
Chapter
Full-text available
Internet-of-Things (IoTs) are one of the most promising technologies in the present world. It connects people, processes and things. The increasing number of devices in IoT invoking various security and privacy issues. Authentication is one of them which should be measured at the very first level when a device comes into the network. Many authentic...
Article
Internet of Things (IoTs) composed of large number of sensing devices with a variety of features applicable for various applications. In such scenarios, due to low data handling capabilities, limited storage and security aspects, it is quite challenging to protect networks against illegal information access and utilizes storage efficiently. Though...
Article
Satisfying the expectations of quality living is essential for smart healthcare. Therefore, the determination of health afflictions in real-time has been considered as one of the most necessary parts of medical or assistive-care domain. In this article, a novel fog analytic-assisted deep learning-enabled physical stance-based irregularity recogniti...
Preprint
Full-text available
A distributed and transparent ledger system is considered for various e-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This solution, named as 'PRODCHAIN', is a generic blockchain framework with lattice-based cryptographic processes f...
Article
Full-text available
A distributed and transparent ledger system is considered for various e-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This solution, named as ‘PRODCHAIN’, is a generic blockchain framework with lattice-based cryptographic processes f...
Article
Full-text available
Industry 4.0 has brought solutions for faster data accessibility, fault identification, performance analysis, and control of machines remotely by managers. Though beneficial but dangerous as the IoT (Internet of Things) nodes communicate over the unsecured wireless medium. The communication over unsecured wireless channel opened enormous ways for t...
Article
Full-text available
Ceramic Hf0.2Zr0.6 Dy0.1Ta0.1O2 (HZDTO) has been synthesized by mixing stoichiometric HfO2, ZrO2, Dy2O3, and Ta2O5 through solid-state reaction route. Single-phase material was formed at 1600°C by calcination for 8 hours as revealed by X-Ray Diffraction analysis. Ceramics were then prepared from uni-axially pressed pellets by sintering at 1600°C. T...
Article
Due to rapid developments in technology, the supply chain becomes a bright area of interest among up-and-coming careers in various industries. People with careers in this field oversee such activities as product development, production, information systems, transportation, and day-to-day logistics. But, the rapidly evolving environments of an easy...
Article
Full-text available
Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature of this technology has given the wide acceptance to its range of applications in various sectors. Seeing the prospect of this new technology, we have chosen the field of huma...
Article
Full-text available
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resources with these huge connections. Therefore, in this paper we present a signcryption framework to addre...
Article
Interconnection and intercommunication between people, process and things have been enhanced with the development of Internet of Things (IoTs) and extended with fog computing for better efficiency. Fog computing improves the network services and circumvent the problem of escalated data management as an interface between cloud and terminal with the...
Article
Full-text available
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a longer time to charge up. Therefore, scheduling of vehicles in charging stations is required. esides, the information of the EVs and its location is also stored by the charging s...
Article
A novel trust-based range-free secure algorithm using blockchain technology is considered in hostile WSNs for localization. The trust values of beacon nodes are evaluated against reputation value, mobility, residual energy and neighbor node list. The blockchain technology is implemented then to share the beacon nodes trust value with neighbor nodes...
Article
Full-text available
In the smart environments several smart devices are continuously working together to make individuals’ lives more comfortable. Few of the examples are smart homes, smart buildings, smart airports, etc. These environments consist of many resource constrained heterogeneous entities which are interconnected, controlled, monitored and analyzed through...
Article
Confidentiality, authentication, and the integrity services of wireless sensor networks (WSNs) are the concerns at present in an era of Internet of Things (IoT) or Internet of Everything (IoE). In this context, a secured location estimation technique is developed for advanced WSN with lightweight lattice signcryption. The method inherently uses ran...
Article
Full-text available
In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-based trust as well as data-based trust. Various metrics such as closeness, honesty, intimacy and freque...
Article
Full-text available
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fastest stream ciphers and one of the easiest to implement. Unfortunately, despite its simplicity of us...
Article
Distributed storage and processing of dataset of big data have become an integrated component of data science. With the technology progress towards the Internet of Things (IoTs), big data becomes more important. Therefore, processing of such data needs utmost concern for the ease of availability and accuracy. Various research has been executed till...
Article
Full-text available
In this paper, an energy-efficient localization algorithm is proposed for precise localization in wireless sensor networks (WSNs) and the process is accomplished in three steps. Firstly, the beacon nodes discover their one-hop neighbor nodes with additional tone requests and reply packets over the media access control (MAC) layer to avoid collision...
Article
Localization is one of the most crucial part in wireless sensor networks, as various applications require accurate location of the sensor nodes. Although many algorithms have been proposed for precise location estimation, few studies have considered node mobility along with energy consumption. An advanced DV-Hop localization algorithm with minimum...
Article
Full-text available
Vehicular ad hoc network (VANET) is one of the most promising candidates for Intelligent Transport System (ITS). It is also an emerging application of Mobile ad hoc network (MANET). Along with its popularity it also comes with number of challenges such as security, routing and data dissemination. Lots of solutions are already proposed for these cha...
Article
In this paper we discussed an efficient statistical method with PoW consensus approach for cloud and fog computing. With this method, solution with precise probability in minimal time is realized. We have used the expectation maximization algorithm and polynomial matrix factorization. The advantages of this statistical method are the less iteration...
Article
Full-text available
The progress in network technology and hardware in conjunction with Internet-of-Things (IoTs) has provided the comfortability for an easier human life at present. Apart from the so called “smart” environments including smart homes, smart city, smart agriculture, IoTs have been included recently in e-healthcare systems as well for real-time diagnosi...
Article
Background Wireless Sensor Networks (WSNs) is considered one of the key research area in the recent. Various applications of WSNs need geographic location of the sensor nodes. Objective Localization in WSNs plays an important role because without knowledge of sensor nodes location the information is useless. Finding the accurate location is very c...