Rajendra Kumar Dwivedi

ORCID: 0000-0001-6682-1942
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Internet of Things and AI
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Security in Wireless Sensor Networks
  • IoT-based Smart Home Systems
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Spam and Phishing Detection
  • FinTech, Crowdfunding, Digital Finance
  • Internet Traffic Analysis and Secure E-voting
  • Video Surveillance and Tracking Methods
  • Advanced Steganography and Watermarking Techniques
  • Autonomous Vehicle Technology and Safety
  • Complex Network Analysis Techniques
  • Advanced Malware Detection Techniques
  • Imbalanced Data Classification Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Vehicle License Plate Recognition
  • Food Waste Reduction and Sustainability
  • Artificial Intelligence in Healthcare
  • Opinion Dynamics and Social Influence
  • Mobile Ad Hoc Networks

Madan Mohan Malaviya University of Technology
2017-2025

Deen Dayal Upadhyaya Gorakhpur University
2018-2022

Development of communication technologies and e-commerce has made the credit card as most common technique payment for both online regular purchases. So, security in this system is highly expected to prevent fraud transactions. Fraud transactions data transaction are increasing each year. In direction, researchers also trying novel techniques detect such frauds. However, there always a need some that should precisely efficiently these This paper proposes scheme detecting frauds which uses...

10.1109/icesc48915.2020.9155615 article EN 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) 2020-07-01

Nowadays, the Internet of Things (IoT) is an emerging technology to interconnect physical things for providing best services in hands. IoT has different applications many areas viz., Smart Health, Transportation, and Cities. Healthcare information system provide quick health patients. In medical service applications, facilitates correspondence among specialists remote patients who are equipped with wearable sensors. Patients' data critical any security violation such may lead severe...

10.23919/indiacom54597.2022.9763187 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2022-03-23

Internet of Things (IoT) fog nodes are distributed near end-user devices to mitigate the impacts low delay, position awareness, and spatial spread, which aren't permitted by numerous IoT apps. Fog computing (FC) also speeds up reaction times decreasing quantity data sent cloud. Despite these advantages, FC still has a lot work do fulfill security privacy standards. The constraints resources cause difficulties. In reality, could raise fresh concerns about security. Although problems have been...

10.4108/eetsis.3235 article EN cc-by ICST Transactions on Scalable Information Systems 2023-06-28

Blockchain (BC) is a cryptographic technology that enables the decentralized storage of an immutable record transactions. As result, many industries are interested in integrating BC into their IT systems. Although BC-based platforms used enterprise solutions, concerns regarding accessibility, privacy, performance, and scalability still legitimate. Permissioned (PBC) frameworks provide solution to securely store private records. The main objective this paper focuses on performance popular...

10.1109/icicat57735.2023.10263700 article EN 2023-06-23

These days, Internet of Things (IoT) is widely used in several real-life applications viz., smart agriculture, city, healthcare, and vehicles. Smart vehicles are interconnected deliver a variety sophisticated services to their owners, transit authorities, automobile manufacturers, other service providers. cars could be exposed number security privacy risks, including Global Positioning System (GPS) tracking remote vehicle hijacking. In vehicular IoT, data stored cloud any alteration can...

10.23919/indiacom54597.2022.9763216 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2022-03-23

Cloud Computing is an emerging technology that used not only by developers but also end-users. It has vital importance in the Information Technology (IT) industries as its future would create a great transition from conventional IT services. These days, containerization cloud computing become important research area. The selection of container orchestration tools one difficult tasks for organizations involved management vast number containers. have their strengths, weaknesses, and...

10.23919/indiacom54597.2022.9763171 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2022-03-23

Land is an asset and the transfer of ownership a piece land from one party to another important as well tedious task. Not only it involves hectic paperwork but also several middlemen multiple verifications at various levels process. This makes whole process less reliable increases chances forgery multifold. Also, it’s difficult find out previous transfers. problem can be easily taken care by using blockchain for registration system. will decrease corruption in removing increase speed, create...

10.1109/idciot56793.2023.10053494 article EN 2023-01-05

One of the important areas study that needs focus on development in all emerging countries is agriculture and its supply chain. Due to potential health risks, food safety are also attracting global attention due their significance. Using blockchain IoT technologies, we have provided a methodology this for transforming traditional into smart farming. All parties participating agricultural chain will be given an equal chance under approach, even if they not related. To minimize human...

10.1109/iitcee57236.2023.10090897 article EN 2023-01-27

In the present situation, most people are not satisfied with final result of voting system. This is because current system for centralized and fully controlled by election commission. So, there a chance that central body can be compromised or hacked tempered. this direction, decentralized, Blockchain IoT based methodology devised presented in paper. totally transparent, secured immutable technique it uses concept like encryption, decryption, hash function, consensus Merkle tree etc. which...

10.1109/idciot56793.2023.10053462 article EN 2023-01-05

Blockchain has built-in security features. Basic concepts in blockchain include cryptographic, decentralized, and consensus that guarantee integrity. It's been extremely difficult for a very long time to create safe secure electronic voting system gives the clarity versatility provided by systems, as well transparency privacy supplied present systems. In this research work, application is assessed implementing decentralized The study offers different based on tackles some of drawbacks...

10.1109/idciot56793.2023.10053410 article EN 2023-01-05

In today's world, healthcare system is improving day by using smart IoT based system. Blockchain totally a decentralized due to which attackers are unable access the confidential records easily. play an important role in controlling and management of sensitive information insurance sector. Consensus mechanisms used blockchain technology validate whichever block going be added next network. this paper we proposed hybrid solves trust issues arises blockchain. Hybrid consensus mechanism...

10.1109/iitcee57236.2023.10090882 article EN 2023-01-27

Smart information systems are based on sensors that generate a huge amount of data. This data can be stored in cloud for further processing and efficient utilization. Anomalous might present within the sensor due to various reasons (e.g., malicious activities by intruders, low quality sensors, node deployment harsh environments). Anomaly detection is crucial some applications such as healthcare monitoring systems, forest fire other internet things (IoT) systems. paper proposes Gaussian...

10.4018/ijcac.2021010103 article EN International Journal of Cloud Applications and Computing 2020-11-03

One of the important areas research that needs a global attention is agribusiness and its network supply chains. Internet Things (IoT) based smart models this system facilitates all participants in several means to make life easy. Blockchain can play an inevitable role enhance security, protect end users from potential health risks, avoid financial frauds. Therefore, some blockchain food systems have been developed provide transparency immutability. However, security such existing be...

10.1109/cictn57981.2023.10141423 article EN 2023-04-20

Given the current situation, A great number of reports about forged titles to real estate, fake land registries, undue transferring delayed ownership, and government officials' involvement in deceptive practices are regularly being reported. On other hand, this suggests that system for registering deeds is inefficient cannot reliably guarantee safety transactions between buyers sellers or ensure they settled a timely manner. To find solution issue. In paper, we suggested utilizing blockchain...

10.1109/idciot56793.2023.10053476 article EN 2023-01-05

The Supply chain was always a complex task to manage the integrity, accountability, traceability, and quality of products. food supply is more important than any other chain. India second largest producer fruits vegetables in world succeeding China. Although having low level processing, final produced goods not properly matched. Due lack proper management chain, many unauthorized small organizations produce false products that are harmful health. modern useful prevent potential fraud...

10.1109/idciot56793.2023.10053406 article EN 2023-01-05

Wireless Sensor Network (WSN) is an important research area nowadays. deployed in hostile environment consisting of hundreds to thousands nodes. They can be for various mission-critical applications, such as health care, military monitoring well civilian applications. There are security issues these networks. One issue outlier detection. In detection, data obtained by some the nodes whose behavior different from other spotted group data. But identification a little difficult. this paper,...

10.1109/confluence.2018.8442992 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2018-01-01
Coming Soon ...