- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
- Cryptography and Data Security
- Caching and Content Delivery
- Digital Transformation in Industry
- Chaos-based Image/Signal Encryption
- Neuroethics, Human Enhancement, Biomedical Innovations
- Internet of Things and AI
- Explainable Artificial Intelligence (XAI)
- Wireless Body Area Networks
- Artificial Intelligence in Healthcare and Education
- Vehicle emissions and performance
- Digital Communication and Language
- Transportation Planning and Optimization
- Physical Unclonable Functions (PUFs) and Hardware Security
- Transportation and Mobility Innovations
Nirma University
2022-2024
Sardar Vallabhbhai National Institute of Technology Surat
2023-2024
National Institute of Technology Patna
2024
Industry 4.0 have witnessed a paradigm shift from cyber-physical systems (CPS) that aims at massive automation, towards more customer-driven approach. The has been attributed to the design of hyper-cognitive systems, integration virtual and extended reality, digital machinery prototyping twin designs, trusted machine boundaries, collaborative robots, artificial intelligence (AI)-based supply chains. This new wave, termed 5.0, is expected leverage production with user-centric customization...
The Industrial Revolution has shifted towards Industry 5.0, reinventing the 4.0 operational process by introducing human elements into critical decision processes. 5.0 would present massive customization via transformative technologies like cyber-physical systems, artificial intelligence (AI), and big-data analytics. In AI models must be transparent, valid, interpretable. employ machine learning (ML) deep (DL) mechanisms to make industrial autonomous, reduce downtime, improve maintenance...
Abstract Recently, Internet‐of‐Things (IoT) based applications have shifted from centralized infrastructures to decentralized ecosystems, owing user data's security and privacy limitations. The shift has opened new doors for intruders launch distributed attacks in diverse IoT scenarios that jeopardize the application environments. Moreover, as heterogeneous autonomous networks communicate, intensify, which justifies requirement of trust a key policy. blockchain‐based solutions been proposed...
In industrial internet-of-things (IIoT), sensors, communication networks, and objects interact to exchange massive data volumes at low latency. As IIoT-driven sensor networks support a range of diverse verticals like automobiles, smart farming, logistics, large organization autonomous communicate over open channels. Thus, security privacy is prime concern. However, IIoT channels are faced with challenge lightweight communication, due limited resources, power memory. the conflicting...
Recently, blockchain-based IoT solutions have been proposed that address trust limitation by maintaining data consistency, immutability, and chronology in environments. However, ecosystems are resource-constrained low bandwidth finite computing power of sensor nodes. Thus, the inclusion blockchain requires an effective policy design regarding consensus smart contract environments heterogeneous applications. Recent studies presented as a potential solution IoT, but view to meet end...
Web 3.0 would allow users and processes to communicate interpret data semantically. It is expected employ web user (WU) behaviour data, which sampled collected at different time instants for verification. Recent approaches have suggested behaviour-based authentication (BBA), but most schemes suffer from a high rate of false positives. Motivated the gap, paper presents scheme named BeHAutH, that constructs two-factor (2FA) WU, based on real-time keystroke dynamics. We K-nearest neighbour...