- Energy Efficient Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Privacy-Preserving Technologies in Data
- Mobile Ad Hoc Networks
- Cryptography and Data Security
- Opportunistic and Delay-Tolerant Networks
- Indoor and Outdoor Localization Technologies
- Security in Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Advanced Authentication Protocols Security
- Underwater Vehicles and Communication Systems
- Domain Adaptation and Few-Shot Learning
- User Authentication and Security Systems
- Cloud Data Security Solutions
- IoT-based Smart Home Systems
- Autonomous Vehicle Technology and Safety
- Internet Traffic Analysis and Secure E-voting
- Advanced Steganography and Watermarking Techniques
- Blockchain Technology Applications and Security
- Digital Media Forensic Detection
- IoT and Edge/Fog Computing
- Cooperative Communication and Network Coding
- Energy Harvesting in Wireless Networks
- Traffic control and management
- Machine Learning and Data Classification
Indian Institute of Information Technology Allahabad
2015-2024
Chhattisgarh Swami Vivekanand Technical University
2023
Bennett University
2022
Jaypee Institute of Information Technology
2022
KIIT University
2022
Amity University
2019
ITM University
2017
International Institute of Information Technology Bangalore
2017
Maulana Azad National Institute of Technology
2014-2017
Machine Intelligence Research Labs
2016
This paper presents two-stage detectors for spectrum sensing in cognitive radio networks. The first stage consists of multiple energy detectors, where each detector (ED) has a single antenna with fixed threshold making local binary decision. If required, the second comprised ED adaptive double is invoked. detection performance proposed scheme compared cyclostationary-based method and scheme. numerical results show that improves outperforms by 12.3% 14.4% at signal-to-noise ratio (SNR)...
ABSTRACT Quorum sensing (QS) regulates group behaviors of Candida albicans such as biofilm, hyphal growth, and virulence factors. The sesquiterpene alcohol farnesol, a QS molecule produced by C. , is known to regulate the expression weapons this fungus. Fluconazole (FCZ) broad-spectrum antifungal drug that used for treatment infections. While FCZ can be cytotoxic at high concentrations, our results show much lower quercetin (QC), dietary flavonoid isolated from an edible lichen ( Usnea...
Bad road conditions are one of the main causes accidents around world. These kinds prove to be fatal as many lives lost in these that mainly caused by potholes or distress on surface roads. This paper suggests a system will not only help reducing chances making driver aware upcoming distress/potholes but also saving location which can sent respective authorities so they repaired. The authors have used technologies like image processing, computer vision, deep learning, and internet things...
In this article, we propose an efficient lattice-based ring signature scheme for message authentication in vehicular ad-hoc networks (VANETs). It provides unconditional identity privacy preservation, authentication, and location the sender vehicle. The of messages is extremely vital as it gives motivation vehicles to accept, act, further transmit other network well remain a member network. Any unauthorized vehicle cannot fraud into if are authenticated. public key cryptography-based methods...
Lane changing process is an essential maneuver, however, the responsible for large number of collisions and traffic instability. In this work, effectiveness neural network prediction future lane change trajectory based only on past vehicle path presented. Existing models do not consider uncertainties perceptions in human behavior that are involved changing. A may learn incorporate these to predict near more accurately. multilayer perceptron (MLP) has been employed train itself from existing...
Query content privacy and location of the user point interest (POI) service provider are a serious concern for location-based services (LBS). The current LBS schemes either protect query or privacy. To POI server, several have been proposed based on <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">${k}$ </tex-math></inline-formula> -anonymity, Oblivious transfer (OT), private information retrieval (PIR),...
Connected Dominating Set (CDS) problem in unit disk graph has a significant impact on an efficient design of routing protocols wireless sensor networks. In this paper, algorithm is proposed for finding Minimum (MCDS) using Set. Sets are connected by Steiner tree. The goes through three phases. first phase found, second connectors identified, third the CDS obtained pruned to obtain MCDS. MCDS so constructed needs adapt continual topology changes due deactivation node exhaustion battery power....
In VANET, the privacy of query becomes a serious concern for location-based services (LBS). An LBS scheme must, also, not breach location user vehicle. order to protect vehicle user, existing state-of-the-art schemes either reduce accuracy or insert trusted third party (TTP) between and server hosting scheme. Cryptographic constructs such as public-key encryption, Oblivious Transfer (OT), Private Information Retrieval (PIR), homomorphic encryption are used remove TTP increase previous...
In this paper, we study group signature scheme for privacy preservation of a continually transmitting mobile vehicle. A moving vehicle transmits and receives different types messages on the road. Such communication is threat to as its can be used link identity physical entity. The change size nature neighborhood changes new vehicles come in vicinity old neighbors become distant. This might warrant pseudonym update preservation. Moreover, malicious may broadcast false network using other...
In the location-based services (LBS) scheme, vehicle user sends his query to LBS server and gets data corresponding requested from it. Therefore, user's privacy server's are serious issues in LBS. Several schemes, like <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><tex-math notation="LaTeX">$k$</tex-math></inline-formula> -anonymity, private-information retrieval, homomorphic encryption-based, have been proposed solve these issues....
This work presents an uncertainty-based Trust Model (TM). It uses Dempster Shafer Theory (DST) to cater uncertainty arising due information scarcity in Vehicular Adhoc Networks (VANETs). DST combines direct and indirect trust values of vehicles sending messages build its new opinion. Malicious vehicles, albeit authenticated, may alter or drop messages. The solution is establish trust. establishment assumes that vehicle behaviour predictable, past transactions are useful for anticipating...