Saru Kumari

Saru Kumari
Chaudhary Charan Singh University · Department of Mathematics

Ph.D

About

283
Publications
50,417
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,655
Citations
Citations since 2017
209 Research Items
8978 Citations
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000
201720182019202020212022202305001,0001,5002,000

Publications

Publications (283)
Article
Full-text available
Fog-based vehicular communication has received a huge interest due to rise in vehicular traffic and numerous services, like transferring messages among vehicles in an emergency and other scenarios. Secure storage, password protection, authorization, accessibility, and an authentic summary of the data flow are required in existing centralized approa...
Article
Full-text available
The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate users to access smart home services anytime and anywhere. Due to the limited resources of cloud computing, it cannot meet users’ real-time needs. Therefore, edge computing emerges as the times require, providing users with better real-time access and storag...
Article
With the exponential growth of connected Internet of Things (IoT) devices around the world, security protection and privacy preservation have risen to the forefront of design and development of innovative systems and services. For low-value IoT devices that identify and track billion of goods in various industries—such as radio-frequency identifica...
Article
Full-text available
Mobile communication is very important for an individual users, enterprisers, industries, businesses, and organizations. Since the nodes communicate through a public channel, security, and privacy become essential component for mobile communication. Both key exchange and authentication are two important security attributes to establish secure commu...
Article
Full-text available
Blockchain technology is popular due to properties such as immutability, transparency, distributed storage, and control decentralisation. Student certificates and skill verification are used for job applications and other purposes. Forgery of certificates with centralised authority is a major issue in online education. This challenge can be solved...
Article
Full-text available
The telecommunications industry covers various sectors and services such as broadband, telecom equipment, telecom infrastructure, telephone service providers, mobile virtual network operators, 5G, and the white space spectrum. Smart Cards may be chosen as one of the best mechanisms for authorized access to these services in the telecom sector. Rece...
Article
Full-text available
Offloading task to roadside units (RSUs) provides a promising solution for enhancing the real-time data processing capacity and reducing energy consumption of vehicles in the vehicular ad-hoc network (VANET). Recently, multi-agent deep reinforcement learning (MADRL)-based offloading approaches have been widely used for task offloading in VANET. How...
Article
Full-text available
One of the network communication systems in our surroundings that has a significant influence on our day-to-day lives is the satellite network. Many authentications and key agreement procedures have been developed for satellite communication systems in order to ensure secure communication. None, however, offer the satellite communication system wit...
Article
Full-text available
Mobile edge computing can meet the needs of users in real time by pushing cloud resources, such as computing, network, and storage, to the edge of a mobile network. Although mobile edge technology has brought many conveniences to mobile services, many security problems, such as mutual authentication between mobile users and servers, and the imperso...
Article
Full-text available
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All physical devices can be connected to the Internet of Things thanks to RFID. When RFID is extensively utilized and fast increasing, security and privacy concerns are unavoidable. Interception, manipulation, and replay of the wireless broadcast channel betwe...
Article
Full-text available
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in healthcare, has provided a new type of telemedicine approach. In IoHT, wearable sensors are used to collect patient health data, and information is transmitted remotely to doctors who can develop accurate treatment plans and provide timely telemedicine se...
Article
Full-text available
With the maturity and popularization of the Internet of Things, we saw the emergence of the Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic congestion, and realizes intelligent transportation. However, sensitive information, such as real-time driving data of vehicles, are transmitted on public cha...
Article
Full-text available
Because sensor nodes are deployed in public areas, these sensors are easy to capture by adversaries. Once a sensor is stolen, the sensitive information stored in it is likely to be exposed. Accordingly, designing a secure authentication protocol should consider this issue. Sadri et al. recently proposed a two-factor authentication protocol with ano...
Article
Full-text available
Because of the powerful computing and storage capability in cloud computing, machine learning as a service (MLaaS) has recently been valued by the organizations for machine learning training over some related representative datasets. When these datasets are collected from different organizations and have different distributions, multi-task learning...
Article
Full-text available
With the construction of intelligent transportation, big data with heterogeneous, multi-source and massive characteristics has become an important carrier of cooperative intelligent transportation systems (C-ITS) and plays an important role. Big data in C-ITS can break through the restrictions between regions and entities and then learning cooperat...
Article
Full-text available
With the rapid development of technology based on the Internet of Things (IoT), numerous IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role in solving the resource constraints of IoT devices and in promoting resource sharing, whereby users can access IoT services provided in various environments. However,...
Article
Full-text available
Focusing specifically on sensing devices with restricted resources, heterogeneous internet of things (HIoT) is an attractive scenario for IoT networks. Nonetheless, the very nature of wireless channels in these networks has given rise to a series of security challenges, which need to be considered while developing authentication protocols. Here, we...
Article
Full-text available
The Internet of Things (IoT) plays a crucial role in the new generation of smart cities, in which developing Internet of Energy (IoE) in the energy sector is a necessity also. Several schemes have been proposed so far and in this paper we analyze the security of a recently proposed authentication and key agreement framework for smart grid named PAL...
Preprint
Full-text available
As Internet of Things (IoT) technology continues to advance, IoT devices have permeated every part of life. The emergence of cloud computing has become a key technology for solving the memory limitation problem of IoT devices, greatly promoting resource sharing, facilitating user access to information at any time, and providing IoT services. Howeve...
Article
Full-text available
Critical infrastructures (CIs) include the vital resources for the country’s economic and health systems and should be kept secure. We face improvements in the Internet of Things which brings benefits and, at the same time, dependency for CIs. Internet of Medical Things (IoMT) is among the CI sectors that gather health-related information from pati...
Article
Full-text available
The Internet of Things (IoT) is among the most promising technologies of the future, and its development has garnered attention worldwide. However, the rise of the IoT has been accompanied by a proportionate increase in security concerns regarding communication between IoT entities. Recently, Alzahrani et al. proposed an identity-based authenticati...
Article
Full-text available
The traditional centralized cloud computing (CC) model faces a range of problems with the exponential growth of the Internet of Things (IoT) applications, like high latency, reduced bandwidth, and network instability. Fog computing (FC) takes the cloud closer to IoT computers to overcome these problems. Rather than moving them to the cloud, the FC...
Article
Full-text available
Industrial Internet of Things (IIoT) devices have been widely used for monitoring and controlling the process of the automated manufacturing. Due to limited computing capacity of the IIoT sensors in the production line, the scheduling task in production line needs to be offloaded to the edge computing servers (ECS). To obtain desired quality of ser...
Article
Full-text available
With the intelligentization of Maritime Transportation System (MTS), Internet of Thing (IoT) and machine learning technologies have been widely used to achieve intelligent control and routing planning for ships. As an important branch of machine learning, federated learning is the first choice to train an accurate joint model without sharing ships'...
Preprint
Full-text available
Advances in communication technologies as well as the availability of the Internet and Internet of Things (IoT) devices enable users to access various services on the internet. However, open communication with IoT devices can be attacked. Recently, Rana et al. proposed a secure key agreement protocol using RLWE. In this paper, we exploited the vuln...
Article
Full-text available
With rapid development of voice control technology, making speech recognition more precisely in various IoT domains have been an intractable problem to be solved. Since there are various conversation scenes, understanding the context of a dialog scene is a key issue of voice control systems. However, the reality is available training data for dialo...
Article
Full-text available
Customers generally give ratings and reviews for different services that they get online or offline. These reviews and ratings aspects are effectively helpful to both the company and customers to receive feedback and make the right decisions, respectively. However, the number of reviews and ratings can increase exponentially, bringing a new challen...
Article
Full-text available
Security in the Industrial Internet of Things (IIoT) is vital as there are some cases where IIoT devices collect sensory information for crucial social production and life. Thus, designing secure and efficient communication channels is always a research hotspot. However, end devices have memory, computation, and power-supplying capacities limitatio...
Article
Attribute-Based Signature (ABS), where messages are signed concerning a signing strategy conveyed as predicates, provides a necessary platform for implementing fine-grained access control over signed messages in an attribute-based cryptosystem. Research into ABS has seen rapid progress in recent years, and we consider it a fitting proposition to ac...
Article
Cloud storage services need cost-effective, independent, and scalable functionality to manage data. Cloud repositories provide an opportunity to manage and access essential data conveniently. This article proposes a secure authentication protocol to resolve these issues. To add a convenient sharing of data controlled by a data delegator, we use sym...
Article
Full-text available
At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-...
Article
To address the security concerns of Industry 4.0, recently, Garg et al. proposed a lightweight authentication protocol, and Akram et al. showed some of its security drawbacks. We continue this line by exposing how Garg et al.’s protocol suffers from noninvasive and invasive attacks. First, we explain that a passive attacker can trace any two commun...
Article
By integrating cloud computing and traditional wireless body area networks (WBANs), the emerging cloud-aided WBANs for smart health care have been significantly developed in recent years. However, this new technique that is now in its infancy days also suffers from some challenging issues resulted from untrustworthy cloud servers, such as data secu...
Article
Puncturable proxy re-encryption (PPRE) is envisioned to provide secure access control delegation and fine-grained forward security for asynchronous group messaging systems. Nevertheless, the existing PPRE scheme not only suffers from the burden of certificate management, but also merely achieves selective security based on the non-standard assumpti...
Article
Full-text available
A vehicular ad hoc network possesses highly advanced functioning in the intelligent transportation system. This system helps moving nodes equipped with advanced smart devices, to establish reliable communication with vehicles or usable roadside units (RSUs). It has been ascertained that the privacy of the user is essential in vehicular communicatio...
Article
Thanks to the sharp improvement in computer science and information technology , we are witnessing the emergence of new mobile - based Internet services such as telemedicine , electronic payments , and smart home management . Due to the rapid growth of mobile services , a single - server architecture that includes one server and multiple clients is...
Article
Full-text available
Searchable encryption performs satisfactorily in protecting the privacy of outsourced data in cloud storage scenarios because it encrypts data and provides a secure way of searching on the ciphertext. Dynamic searchable encryption is designed to support the insertion and deletion of outsourced data. However, insertion may cause information leakage...
Article
Contrary to the public cloud storage services that impose users to accept the security restrictions delivered by the service provider, users in the private cloud benefit from self-managed, authenticated data access services. However, this may lead to security issues. A critical challenge is the provision of secure and authenticated data storage for...
Article
Full-text available
In a modern electronic medical system, data sharing between medical institutions must have a more comprehensive understanding of the patient’s condition. However, different hospitals typically use other databases, even if the data belong to the same person. Each hospital manages its database in a centralized and closed manner. This approach makes t...
Article
Full-text available
Providing the desired security for constrained devices in the edge of Internet of Things (IoT) systems is a challenging task. Given that those devices are in shortage of the area and energy, many lightweight and ultra-lightweight protocols have been proposed so far in the literature. On the other hand, while we see many new proposals in the literat...
Article
In recent years, voice interaction-based control systems have attracted considerable attention for industrial control systems implementing Industrial Internet of Things (IIoT) technologies. The development of automated semantic understanding relates to the industrial Internet equipment used to realize remote voice control as well as to its intellig...
Article
Full-text available
In these days, satellite communication networks are playing a significant role in facilitating the crucial infrastructural services that include environmental monitoring, electronic surveillance, public safety, intelligence operations for law enforcement, government agencies, and the military. However, security researchers have uncovered that many...
Article
With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers expedite and convenient healthcare services to patients at their doorsteps. However, this architecture engenders new risks and challenges to patients’ and the server’s confidentiality, integrity and security. In order to avoid any resource abuse...
Article
Recent advances in quantum computers challenge the security of key agreement protocol that are designed with the intractability assumptions of discrete logarithmic problem and integer factorization problem. Hence, motivated to develop the key agreement protocol that is secure in post-quantum era, recently Islam proposed a provably secure two-party...
Article
Full-text available
Mobile payments makeup one of the fastest-growing mobile services available today and are widely used by smartphones for utility payments, bill payments, and online shopping, among other applications. Mobile payments are playing a vital role in the fast growth of online markets and are revolutionizing the supply chain of businesses and industries....
Article
Full-text available
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this...
Article
Full-text available
Since its inception in 2009, Bitcoin is mired in controversies for providing a haven for illegal activities. Several types of illicit users hide behind the blanket of anonymity. Uncovering these entities is key for forensic investigations. Current methods utilize machine learning for identifying these illicit entities. However, the existing approac...
Article
Full-text available
Lattice-based cryptography is one of the emerging fields of cryptography in the post-quantum world. It is resistive to quantum attacks and has performance competitive to that of prevalent cryptosystem such as Rivest–Shamir–Adleman (RSA), Diffie Hellman etc. Till now, various basic cryptographic primitives like encryption and decryption, digital sig...
Article
Full-text available
Information theory coding is an impressive and most celebrated field of research that has spawned numerous extremely important solutions to the intractable problems of secure data communications. Recent advancements in error control coding methods have seen a huge surge in using low‐density parity‐check (LDPC) code‐based decoding algorithms to solv...
Article
Recently, the Industrial Internet of Things (IIoT) has become increasingly important for applications in the industry. IIoT has essentially become a prime security focus for implementing secure communication. Among the available cryptographic tools, identity-based signcryption provide a sound solution to fulfill the security requirement of IIoT. On...
Article
Full-text available
The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmi...
Article
The advent of smart and pervasive devices have paved the way for the development of Internet of Things in which, various smart devices collect information about the daily life of people and share it to the scientists and specialists. There are numerous applications in the domain of IoT such as smart healthcare systems in which, wearable devices col...
Article
The landscape of fifth generation (5G) and beyond 5G (B5G)-enabled Internet of Things(IoT) is expected to seamlessly and ubiquitously connect everything, which includes 5G, cloud computing, artificial intelligence and other cutting-edge technologies to realize truly intelligent applications in smart cities. In this paper, we present an important ke...
Article
In recent years, Internet of things (IoT)-enabled health monitoring wearable devices have become a trend in healthcare systems, regularly collecting vital sign data from patients and uploading them to the cloud. Through on-demand search queries, data are shared with third-party healthcare service providers (HSPs) to monitor patients' health status...
Article
Full-text available
The telecare medical information system (TMIS) offers remote healthcare services to the patients at their doorstep. Including this serenity, it is compulsory to preserve privacy and to give guaranty to the patients for secured TMIS communication. Authentication protocols are usually exploited to ensure privacy and protect communication between pati...
Article
Full-text available
Accidents often occur in the earth—typhoons, floods, earthquakes, traffic accidents and so on. Whether these accidents can be timely and effectively responded to has been an important indicator to judge whether a region is advanced or not. IoT provide a possibility to solve such emergent problems by intelligent monitoring, diagnosis and repair. For...
Article
With the emergence of the Industrial Internet of Things (IIoT), numerous operations based on smart devices contribute to producing the convenience and comfortable applications for individuals and organizations. Considering the untrusted feature of the communication channels in IIoT, it is essential to ensure the authentication and incontestableness...
Article
Full-text available
With limited resources, overutilization is a challenging issue in the emerging system of smart devices, resulting in higher costs, poor performance, and low prices due to the Service Level Agreement (SLA) violations. These factors extremely annoy the customers as well as providers. External resources are hired to overcome the resources scalability...