Keyur Parmar

ORCID: 0000-0003-2012-0475
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Advanced Authentication Protocols Security
  • Vehicular Ad Hoc Networks (VANETs)
  • IoT and Edge/Fog Computing
  • Mobile Ad Hoc Networks
  • User Authentication and Security Systems
  • Spam and Phishing Detection
  • Opportunistic and Delay-Tolerant Networks
  • FinTech, Crowdfunding, Digital Finance
  • Caching and Content Delivery
  • Advanced Steganography and Watermarking Techniques
  • Cybercrime and Law Enforcement Studies
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Digital Platforms and Economics
  • Advanced Data Compression Techniques
  • Smart Grid Energy Management
  • Organ Donation and Transplantation
  • Smart Grid Security and Resilience

Sardar Vallabhbhai National Institute of Technology Surat
2014-2024

National Institute of Technology Patna
2024

Indian Institute of Information Technology Vadodara
2017-2021

Abstract Recently, Internet‐of‐Things (IoT) based applications have shifted from centralized infrastructures to decentralized ecosystems, owing user data's security and privacy limitations. The shift has opened new doors for intruders launch distributed attacks in diverse IoT scenarios that jeopardize the application environments. Moreover, as heterogeneous autonomous networks communicate, intensify, which justifies requirement of trust a key policy. blockchain‐based solutions been proposed...

10.1002/spy2.308 article EN Security and Privacy 2023-03-10

Road accidents and traffic congestion severely impact road safety, resulting in significant loss of life property. Therefore, there is a need for safety management. The wireless networks connected vehicles called Vehicular Adhoc Networks (VANETs) are designed to improve the management on highways with comfort drivers passengers. However, develop an authentication scheme that can protect privacy secure them against attacks such as insider repudiation attacks. In this article, we present...

10.1016/j.procs.2023.03.008 article EN Procedia Computer Science 2023-01-01

In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed aim preserve privacy readings while performing However, use inherently malleable homomorphism makes these vulnerable active attackers. this paper, we propose an integrity preserving protocol. We symmetric key-based homomorphic...

10.4236/jis.2015.61005 article EN Journal of Information Security 2015-01-01

Recently, blockchain-based IoT solutions have been proposed that address trust limitation by maintaining data consistency, immutability, and chronology in environments. However, ecosystems are resource-constrained low bandwidth finite computing power of sensor nodes. Thus, the inclusion blockchain requires an effective policy design regarding consensus smart contract environments heterogeneous applications. Recent studies presented as a potential solution IoT, but view to meet end...

10.22541/au.170663514.49171896/v1 preprint EN Authorea (Authorea) 2024-01-30

In this paper we have proposed digital watermarking scheme for halftone images based on visual cryptography scheme.The does not embed the watermark directly image instead will be divided into parts called as shares.The only protects but also provides an effective copyright protection scheme.At time of embedding verification share is generated and at extraction master using (2, 2) scheme.Verification are used to extract pattern.The experimental results show that robust transparent against...

10.5120/5805-8010 article EN International Journal of Computer Applications 2012-03-31

Due to the renewable and natural energy resources, there exist many opportunities use smart grids meters that enhance efficiency. With increasing supply requirements of energy, grid models have been proposed in literature. One most popular is centralized sharing model. However, model vulnerable reliability issues such as a single point failure. model, maintaining trust becomes challenging issue. In this article, we propose blockchain-based trading solve namely, failure, load balancing, price...

10.1109/indicon56171.2022.10039962 article EN 2021 IEEE 18th India Council International Conference (INDICON) 2022-11-24

In healthcare systems, users require keys and certificates to communicate share electronic health records (EHRs). The traditional EHR sharing system typically involves a single centralized trusted third-party (STTP) for authentication, auditing, key generation, storing managing patients' EHRs. To securely collect EHRs from multiple hospitals, perform cryptographic operations. operations that are generated by STTP. However, compromised or malicious STTP can disclose the users' information is...

10.1016/j.procs.2023.12.059 article EN Procedia Computer Science 2023-01-01
Coming Soon ...