About
6
Publications
270
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
17
Citations
Introduction
I am pursuing a Ph.D. in CSE at the Malaviya National Institute of Technology, Jaipur, India. I received a master's in CSE from the Central University of Rajasthan in 2021. My research focuses on cybersecurity and privacy, particularly in the Dark Web, The Onion Router (Tor), security and forensics, anonymous communication networks (ACNs), and IoT security. My work aims to enhance digital security and anonymity while addressing key challenges in forensic analysis and network privacy.
Current institution
Additional affiliations
October 2021 - July 2022
Education
July 2019 - August 2021
July 2014 - May 2018
Publications
Publications (6)
The Dark Web presents a challenging and complex environment where cyber criminals conduct illicit activities with high degrees of anonymity and privacy. This chapter describes a honeypot-based data collection approach for Dark Web browsing that incorporates honeypots on three isolated virtual machines, including production honeypots, an onion-websi...
Internet of Things (IoT) connects billions of devices and tiny sensors enabled with Low-Power and Lossy Networks (LLNs) to provide real time data transfer. These LLNs work as s backbone of complete IoT ecosystem which has limited power, memory and processing capability. The routing protocol for such LLNs enabled devices is standardized by IETF in R...
In recent years, the emergence of the Internet and E-commerce has steered significant growth in digital transactions. Businesses today need mobile wallets, credit and debit cards, and e-cash to digitize payments. Digital payment systems are in transition and promise amazing advancements, but they also pose many risks and as the number of online tra...
In recent years, the emergence of the Internet of Things(IoT) has increased the number of embedded devices with Internet access for communication. The embedded device has power constraints, storage limitations, and low computability, and to resolve such issues, Cloud is integrated with embedded devices to create a new CloudIoT paradigm. It promises...
In recent years, the Internet of Things has grown visibly and soon will be an essential part of our daily lives. This increases the number of transactions in a network and with that risks to these sensitive data increase too; thus, we require a smart system to detect any unauthorized advances to an IoT network and prevent those risks. This system p...
Internet of Things is found everywhere in today’s life, they are simplifying our life and are reliable. As they are connected to the Internet for communication, they are vulnerable to security attacks. Here, we have proposed a Key generation protocol for Internet of Things (IoT) devices for securing the communication between them. The proposed prot...