About
52
Publications
14,106
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
241
Citations
Introduction
Current institution
Additional affiliations
September 2023 - February 2025
OP JINDAL UNIVERSITY
Position
- Assistant Professor( Sr. Grade)
Publications
Publications (52)
There has been a significant paradigm shift from wired to wireless technology in in-vehicular networks. This shift is driven by the need for greater scalability, cost-effectiveness, and flexibility. In the automotive industry, traditional wired protocols such as the Local Interconnect Network (LIN) and Media Oriented Systems Transport (MOST) for no...
In today's world, maintaining good health has become increasingly paramount. The global prevalence of diabetes has surged due to the stress of modern life and unhealthy dietary habits. Detecting diabetes at an early stage has become imperative. Leveraging advancements in Cloud and Fog computing, we can create an Internet-enabled Medical Fog framewo...
In the communication model of the OSI layer, the Media access control (MAC) layer has been given higher priority than other layers. It is a sub-layer of the data link layer, mainly controlling the physical equipment and interacting with the channels over the Internet of Things (IoT) sensor nodes. Mac layers have used two protocol types: contention-...
Internet of Things applications that employ wireless sensor networks (WSNs) most often experience packet loss, delays, and sensor node battery drain. Random cluster head selection, malicious node security flaws, and scalability issues in larger networks cause LEACH (Low-Energy Adaptive Clustering Hierarchy) to use energy unequally. Cluster maintena...
The increasing prevalence of Blackhole attacks in Wireless Sensor Networks (WSNs) necessitates advanced and robust detection mechanisms. This paper presents the DLTIDS (Dual-Layer Trust-Based Intrusion Detection System), a sophisticated approach designed to counteract Blackhole attacks by leveraging a trust-based framework. DLTIDS integrates two la...
The digitization of healthcare systems has led to a rise in healthcare fraud, posing significant financial and patient safety risks. Data science techniques like predictive analytics and machine learning are essential for detecting patterns and anomalies in healthcare data, allowing for the identification of fraudulent activities. These techniques...
The increasing prevalence of Blackhole attacks in Wireless Sensor Networks (WSNs) necessitates advanced and robust detection mechanisms. This paper presents the DLTIDS (Dual-Layer Trust-Based Intrusion Detection System), a sophisticated approach designed to counteract Blackhole attacks by leveraging a trust-based framework. DLTIDS integrates two la...
Blockchain technology uses a secure and decentralised framework for transaction management and data sharing within supply chains. This is particularly crucial in the pharmaceutical industry, where product authenticity and traceability are paramount. Blockchain plays a pivotal role in preventing product loss and counterfeiting, while simultaneously...
Network security is significantly impacted by the difficult task of securing Internet of Things (IoT) ecosystems. Strong security protocols must be developed in order to protect the communication networks that link Internet-connected IoT devices. Compared to earlier networks, modern networks have a greater variety of communication protocols, standa...
The surging demand for electricity, propelled by the widespread adoption of intelligent grids and heightened consumer interaction with electricity demand and pricing, underscores the imperative for precise prognostication of optimal power plant utilization. To confront this challenge, a dataset centered on issue-centric power plans is meticulously...
Artificial intelligence (AI) can enhance operational procedures by utilizing data, advanced algorithms, and faster computational abilities. These technologies, such as robotics, machine learning, and IoT, are increasingly prevalent in modern life. They learn, adapt, and improve based on their interactions with the environment and data. This chapter...
The demand for vehicular networks is prolifically emerging as it supports advancing in capabilities and qualities of vehicle services. However, this vehicular network cannot solely carry out latency-sensitive and compute-intensive tasks, as the slightest delay may cause any catastrophe. Therefore, fog computing can be a viable solution as an integr...
This chapter discusses the potential of intelligent engineering applications in contributing to sustainable development efforts. The chapter highlights how these technologies can optimize energy efficiency, reduce waste, and enhance the sustainability of manufacturing processes and infrastructure systems. In addition, the acknowledges that implemen...
Exemplary embodiments of the present disclosure are directed towards a sign language recognition system, comprising a computing device comprising a camera,
includes a sign language recognition module operatively connect with a processing device, the camera configured to enable a user to provide visual input, the processing device configured to perf...
Wireless sensor networks (WSNs) have raised serious concerns in recent years regarding network connectivity. Multiple attacks occur during network communication, disrupting efficient operation, data flow, and data transmission. Using a trust-based management system, we have proposed an intrusion detection system (IDS) for transport layer threats. I...
Wireless Sensor Network (WSN) security is an important aspect in the world. Day to day, unauthorized access has been increasing during the network transmission process. Numbers of researchers have developed a model for detecting those attacks. But, it is not sufficient to solve the security issues. Basically, attacks hamper at the network results i...
In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks...
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoo...
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smo...
Over the first few years, a wireless sensor network has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. Wormhole attack is one of the severe attacks, which is smoothly resolved...
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WS...
Intrusion detection in wireless sensor network (WSN) has been a critical issue for the stable functioning of the networks during last decade. Wireless sensors are small and cheap devices that have a capacity to sense actions, data movement, and communicate with each other. It is a self-governing network that consists of sensor nodes deployed in a p...
In this paper, a physical layer trust based intrusion detection system (PL-IDS) is proposed to calculate the trust for wireless sensor networks (WSNs) at the physical layer. The trust value of sensor node is calculated as per the deviation of key factors at the physical layer. The proposed scheme is effective to identify the abnormal nodes in WSNs....
This paper looks at how to tackle with the new trend of complexity in IT infrastructure; security
professionals are putting immense effort to transform vulnerability management in capable to tackle risk. The main
goal of this study is to modify traditional pattern and adopt the required-modern approach of vulnerability management.
This approaches w...
Black hole attack is one of the possible attacks in WSN. In black hole attack a malicious node sends the RREP (Route Replay) message to the source node as a shortest path to the destination node then the sender node send a data packet b to the malicious node in the network. Finally the malicious node drop the entire data packet instead of forward i...
Wireless Sensor Networks (WSN) has wide application in data gathering and data transmission as per the user's requirement and it consist of number of nodes. These nodes have limited battery power, limited resources and limited computational power .Due to all these factors, WSN faces more security threats. Security issues are a vital problem to be s...
The present day is demanding more and more quality of service in broadband group communication to support huge access of internet service and multimedia application. The core based solution is able to full fill this demand a lot. In this paper effort has been put to make it more flexible in comparison to SPAN/COST through a new approach which can b...
Questions
Question (1)
Actually i want build a IDS for Wormhole attacks in WSN.