Priyanka Ahlawat

ORCID: 0000-0003-4695-382X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Spam and Phishing Detection
  • Advanced Authentication Protocols Security
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Cryptography and Data Security
  • Smart Grid Security and Resilience
  • Chaos-based Image/Signal Encryption
  • Text and Document Classification Technologies
  • Wireless Body Area Networks
  • Information and Cyber Security
  • Sentiment Analysis and Opinion Mining
  • IoT Networks and Protocols
  • Telecommunications and Broadcasting Technologies
  • Advanced MIMO Systems Optimization
  • Advanced Wireless Communication Techniques
  • Industrial Vision Systems and Defect Detection
  • Artificial Immune Systems Applications
  • Energy Load and Power Forecasting
  • Wireless Communication Security Techniques
  • Algorithms and Data Compression

National Institute of Technology Kurukshetra
2016-2025

National Institute of Technology Calicut
2017

The exponential rise in spam and phishing emails presents a critical challenge to the privacy, security, efficiency of users.This research introduces deep learning model with enhanced performance over existing top-tier studies.The model's strength lies its ability precisely classify into three distinct categories: legitimate (ham), unsolicited (spam), malicious (phishing).This employs two sophisticated feature selection techniques enhance classification accuracy: Principal Component Analysis...

10.12785/ijcds/150144 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2024-02-01

Social engineering attacks pose a significant threat to individuals, organizations, and governments globally. These leverage human psychology, manipulating individuals into divulging sensitive information or undertaking actions that jeopardize security. The various forms of social can lead dire consequences for the targeted victims. However, with preventive mitigation strategies such as security awareness training, policy formulation, technical controls, risks associated be diminished. This...

10.1080/19361610.2024.2372986 article EN Journal of Applied Security Research 2024-07-02

Wireless sensor network (WSN) security is a critical issue due to its inherent characteristic and unattended operation which makes it vulnerable many attacks. Key management plays fundamental role for providing services such networks. In this paper, we aim reduce the node capture impact by incorporating an efficient adversarial model cellular of WSN. The exploits several vulnerabilities present in as high density, placement sink node, neighbour influence factor compute compromise probability...

10.1016/j.procs.2017.12.028 article EN Procedia Computer Science 2018-01-01

Most of the key management schemes do not consider attacking behavior adversary making such less practical in real world. By knowing adversarial behavior, several countermeasures against them can be effectively and efficiently designed by defender/network designer. In this paper, we investigate problem node capture attack propose a secure hybrid predistribution scheme (HKP-HD) for wireless sensor networks (WSN). This combines robustness q-composite with threshold resistant polynomial scheme....

10.1016/j.jksuci.2018.03.002 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-04-03

Summary To guarantee the proper functionality of wireless sensor network even in presence potential threats, a well‐designed key management scheme is very important. The assumptions about attackers critically influence performance security mechanisms. This paper investigates problem node capture from adversarial view point which adversary intelligently exploits different vulnerabilities to establish cost‐effective attack matrix. counteract such attacks, defender or designer constructs...

10.1002/dac.3713 article EN International Journal of Communication Systems 2018-06-05

The IoT plays a vital role in all aspects of our daily lives. WSN consists tiny and compact devices, called as sensor nodes, which could be deployed remote environment to monitor an event. These devices are used gather data, sense data process it. A node has the capability communicate with other nodes through wireless channels. major concern is quality service, required for correct transmission at right time. Due several attacks, secure application reliable data. attacks includes traffic...

10.1109/sceecs48394.2020.86 article EN 2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) 2020-02-01

The prevention of node capture attack is an important issue for wireless sensor network (WSN) security. Key management plays a crucial role in providing secure communication among the nodes. resilience key scheme used by WSN considered as performance metric. During attack, keying material gets revealed leading to further compromise other non-compromised nodes/links. resistance reduces number captured nodes increases degrading security network. This paper addresses minimization and proposes...

10.1109/pdgc.2016.7913154 article EN 2016-01-01

Over the past decade, IoT has gained huge momentum in terms of technological exploration, integration, and its various applications even after having a resource-bound architecture. It is challenging to run any high-end security protocol(s) on Edge devices. These devices are highly vulnerable toward numerous cyber-attacks. network nodes need peer-to-peer security, which possible if there exists proper mutual authentication among A secure session key needs be established source destination...

10.1145/3586578 article EN ACM Transactions on Internet of Things 2023-03-06

With ever increasing use of smart devices, and things connected to Internet the capabilities these devices is also increasing. From a fridge tweeting about its contents microwave carrying out surveillance on house all via internet. These come with problems only specific IoT (Internet Things), as computation ability limited in some cases battery power too. In this work, we look at applications, facilitation architecture which they operate. The challenges are briefly discussed solution called...

10.1109/iceca.2019.8822040 article EN 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA) 2019-06-01

Low energy adaptive Hierarchical clustering Protocol (LEACH) is used to transfer the data sink node by utilizing minimum amount of energy. It forms clusters nodes that can adapt according various parameters like etc. TO enhance network lifetime modifications are proposed LEACH. These include different procedures form and select cluster head. This paper compares LEACH its enhancements. also describes active passive clustering.

10.70729/ijser15112 article EN 2015-04-27

10.1007/s13198-023-02048-2 article EN International Journal of Systems Assurance Engineering and Management 2023-08-19
Coming Soon ...