Dilip Kumar

ORCID: 0000-0002-0826-2086
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • IoT-based Smart Home Systems
  • Mobile Ad Hoc Networks
  • Indoor and Outdoor Localization Technologies
  • Security in Wireless Sensor Networks
  • Underwater Vehicles and Communication Systems
  • IoT Networks and Protocols
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cloud Data Security Solutions
  • Traffic control and management
  • Wireless Body Area Networks
  • Embedded Systems Design Techniques
  • Traffic Prediction and Management Techniques
  • Energy Harvesting in Wireless Networks
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Blind Source Separation Techniques
  • Advanced Malware Detection Techniques
  • Internet of Things and AI
  • ECG Monitoring and Analysis
  • Cloud Computing and Resource Management
  • Smart Agriculture and AI
  • Sensor Technology and Measurement Systems

National Institute of Technology Jamshedpur
2019-2024

Dr. Hari Singh Gour University
2024

Dayananda Sagar University
2024

Sant Longowal Institute of Engineering and Technology
2015-2023

National Institute of Technology Patna
2023

Kalasalingam Academy of Research and Education
2023

Centre for Development of Advanced Computing
2010-2013

Government of India
2011

The University of Texas at Austin
2006

10.1007/s10776-020-00483-7 article EN International Journal of Wireless Information Networks 2020-02-13

Recent advances in microelectronics have encouraged the implementation of a wireless sensor network (WSN) Intelligent Monitoring Systems (IMSs). The event data traffic IMS applications requires timely and reliable delivery order to react immediately with appropriate actions. However, node's limited energy resource forces trade-off be made between delay consumption while determining route towards BS. To cope up multi-constrained routing problem introduced by IMS, multi-objective...

10.1109/jsen.2020.3038241 article EN IEEE Sensors Journal 2020-11-16

10.1016/j.future.2022.12.040 article EN Future Generation Computer Systems 2023-01-07

Effective energy management in heterogeneous wireless sensor networks (WSNs) is a more challenging issue compared to homogeneous WSNs. Much of the existing research has often assumed nodes networks. The preservation schemes for WSNs do not perform efficiently when applied In this paper, we have presented an energy-efficient multi-hop communication routing (MCR) protocol order address traditional problem load balancing, lifetime, stability and efficiency MCR based on dividing network into...

10.1504/ijitcc.2011.039281 article EN International Journal of Information Technology Communications and Convergence 2011-01-01

Currently, wireless sensor networks (WSNs) are used in many applications, namely, environment monitoring, disaster management, industrial automation, and medical electronics. Sensor nodes carry limitations like low battery life, small memory space, limited computing capability. To create a network more energy efficient, swarm intelligence technique has been applied to resolve optimization issues WSNs. In existing clustering techniques an artificial bee colony (ABC) algorithm is utilized...

10.1155/2016/5836913 article EN Journal of Sensors 2015-12-21

This paper presents a modern approach for surveillance at remote and border areas using multifunctional robot based on current 3G technology used in defence military applications. robotic vehicle has ability to substitute the solider provide surveillance. The works both as autonomous manually controlled internet communication medium. multisensory detect human, bombs, harmful gases fire war field areas. Conventionally, wireless security obsoletes due limited frequency range manual control....

10.1109/raecs.2015.7453343 article EN 2015-12-01

The emergence of quantum computing is set to reshape the landscape cybersecurity, presenting a blend significant challenges and groundbreaking opportunities. This paper delves into growing risks tied technologies, with particular focus on post-quantum cryptography (PQC) threats posed by possible obsolescence traditional cryptographic methods. As capabilities advance at rapid pace, need for development quantum-resistant security protocols has become more urgent than ever. research...

10.52783/iej.13 article EN 2025-03-07

Traditional metering method for retrieving the energy data is not convenient and cost of logging systems high.So this paper presents design development Automatic meter reading (AMR) system.AMR system a boom remote monitoring control domestic meter.AMR give information reading, power cut, total load used, disconnect tempering on request or regularly in particular interval through SMS.This being sent received by concerned Provider Company with help Global mobile communication (GSM)...

10.5120/7244-0302 article EN International Journal of Computer Applications 2012-06-30

Owing to the extensive growth of wireless technology for sending and collecting a variety information different applications, routing is major challenge find optimal path data transmission. In this study, authors have developed new algorithm called, exponential ant colony optimisation (EACO) route discovery problem in sensor network after finding cluster heads (CHs) using fractional artificial bee (FABC) algorithm. first step, CHs are found out FABC with fitness function considering...

10.1049/iet-com.2016.0859 article EN IET Communications 2016-10-26

Research on wireless sensor networks has been studied and employed in many applications such as medical monitoring, automotive safety, more. Typically, nodes have several issues limited battery life, short radio transmission range small memory speed. However, the most severe constraint of is their energy because they cease to function when deplete. In this paper, we proposed a new cluster based efficient routing protocol obtain optimal path for data between heads base station sparse...

10.6180/jase.2011.14.4.09 article EN Journal of Applied Science and Engineering 2011-12-01

ABSTRACT Due to environmental characteristics, limited power and processing capabilities of wireless sensor networks, it is essential find new techniques that improve the flow information in network. The cluster head election among nodes an effective technique networks increase network efficiency, scalability lifetime. In this paper, we have proposed evaluated a distributed scheme for heterogeneous networks. heads based on different weighted probability. cluster’s member communicate with...

10.6180/jase.2010.13.3.13 article EN Journal of Applied Science and Engineering 2010-01-01

Abstract Localization error is the main criteria to decide efficiency on any localization approach. In case of range‐free hop‐based approaches, position coordinates estimation done through common steps like calculation minimum hop count, size, and then later applying multilateration or least square There are many improvements that have been made in form various algorithms some changes for reduction error. It has observed existing still having highest value To overcome deficiencies...

10.1002/ett.3547 article EN Transactions on Emerging Telecommunications Technologies 2018-11-28

Internet of things as the name defines is inter- networking or devices such that whole world connected through various communication protocols so advanced processing can be performed on data collected and meaningful pattern obtained. IoT an evolving technology has a very wide big scope. It could used optimistically to solve problems improve standard living. have tremendous application in field education, medicines, R&D, healthcare, agriculture. revolution with lot challenges open questions...

10.1109/icccnt45670.2019.8944807 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2019-07-01

Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on location parameters event, secure localization is mandatory must not be compromised at any cost. The main task, as if node malicious, to authenticate nodes that involved in process. In this paper, we propose a hop-based algorithm provides better accuracy. addition, maintain process, digital signature approach used. Moreover, impact malicious...

10.3390/electronics10243074 article EN Electronics 2021-12-09

Designing a scalable and efficient application layer protocols for the Internet of Things (IoT) environment is an ongoing problem. The constrained protocol (CoAP) offering RESTful services IoT devices implements simple congestion control mechanism. This study proposes analyses distance‐based CoAP (DCC‐CoAP) current state network accordingly calculate future flow rate to handle congestion. authors’ main idea use combination distance between nodes round trip time (RTT) measurements which...

10.1049/iet-com.2020.0486 article EN IET Communications 2020-11-06

Background/Objective: In most of the applications WSN from traffic monitoring to military via surveillance location node is prime concern. Various localization algorithms are there for position estimation but their capabilities varying one another in context deployment mode, accuracy determination and complexity. Hence this paper focuses on comparative analysis various range free under distributed environment. Methods/Statistical Analysis: Algorithms such as APIT, DV-Hop, MDS-MAP, Centroid,...

10.17485/ijst/2016/v9i28/98381 article EN Indian Journal of Science and Technology 2016-07-26

Tea is an aromatic beverage, obtained from the leaves of tree Camellia sinensis. It one popular beverages. Presently it matter great concern to control pest by using reduced amount chemical fertilizer. Beneficial insects that eat dangerous and mites are known as predators. But both predators cause huge loss in production. So, this article we have studied tritrophic model which consists tea plant, predator. We stability positive fixed points boundary (boundedness). For equilibrium point,...

10.1080/10236198.2023.2181026 article EN The Journal of Difference Equations and Applications 2023-02-01
Coming Soon ...