Tarak Nandy

ORCID: 0000-0002-6370-0640
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Authentication Protocols Security
  • Traffic Prediction and Management Techniques
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Autonomous Vehicle Technology and Safety
  • Human Mobility and Location-Based Analysis
  • Cryptography and Data Security
  • Video Surveillance and Tracking Methods
  • Transportation Planning and Optimization
  • Blockchain Technology Applications and Security
  • Artificial Intelligence in Healthcare
  • Mobile Ad Hoc Networks
  • Vehicle emissions and performance
  • Cloud Computing and Resource Management
  • Cryptographic Implementations and Security
  • Traffic control and management
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Transportation and Mobility Innovations
  • UAV Applications and Optimization
  • IoT and GPS-based Vehicle Safety Systems

UCSI University
2023-2025

Czech Academy of Sciences, Institute of Computer Science
2025

University of Malaya
2019-2024

Lovely Professional University
2022

Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace provides inter-location navigation services. The interconnection drones in IoD through Things (IoT). Hence vulnerable all security privacy threats affect IoT networks. It highly required safeguard good atmosphere free from get desired performance applications. Security issues have significantly restricted overall influence paradigm. There are existing survey...

10.1109/access.2021.3072030 article EN cc-by IEEE Access 2021-01-01

Internet of things (IoT) is considered as a collection heterogeneous devices, such sensors, Radio-frequency identification (RFID) and actuators, which form huge network, enabling non-internet components in the network to produce better world services, like smart home, city, transportation, industries. On other hand, security privacy are most important aspects IoT includes authentication, authorization, data protection, security, access control. Additionally, traditional cannot be directly...

10.1109/access.2019.2947723 article EN cc-by IEEE Access 2019-01-01

Security and privacy are among the most critical challenges on internet of drones (IoD) network. The communication entities IoD network can communicate securely with use authenticated key agreement (AKA) based techniques. However, design such techniques must balance tradeoff between security lightweight features. Recently, Chen et al. proposed an authentication sharing scheme for deployment. It is, however, realized after scrutiny that technique is vulnerable to attacks under well-accepted...

10.1109/access.2021.3060420 article EN cc-by IEEE Access 2021-01-01

The vehicular network is a collection of vehicles and other components facilitated with versatile sensors to communicate, which backboned by authentication. Present authentication protocols focus on either the lightweight feature or security. On hand, privacy during essential. Moreover, existing schemes are dependent trusted authority for checking legitimacy communicating node, suffers from infrastructure-less scenario. Alternatively, secure communication channel registration phase. To...

10.1109/jsen.2021.3097172 article EN IEEE Sensors Journal 2021-08-24

With the development of an intelligent transport system (ITS), security becomes increasingly important issue. The Vehicle ad-hoc network (VANET) researchers have shown enormous on field. Among all, intrusion detection (IDS) is creating highest attraction. Additionally, a way multidisciplinary researches has proved importance IDS over VANET. In this paper, trust-based collaborative (T-BICDS) proposed. which, each car maintains score table other cars in to identify their previous pattern...

10.1109/ncetstea48365.2020.9119934 article EN 2020-02-01

The objective of the vehicular ad-hoc network (VANET) is to mobilize transportation systems along with enhancement safeguard and efficiency. Security anonymity are important aspects VANET too. Vehicle-to-vehicle (V2V) communication fulfills most requirements in except security breaches. Authentication protocols designed improve by validating legitimate users V2V communication. In this research, we proposed a two-factor authentication protocol using user biometric-based password-based, which...

10.1145/3388176.3388185 article EN 2020-03-19

Public transportation is a vital service provided to enable community carry out daily activities. One of the mass transportations used in an area bus. Moreover, smart concept integrated application technology and strategy system. Using idea key Internet Things. The ways improve management system become bottleneck for traditional data analytics solution, one answers machine learning. This paper uses Artificial Neural Network (ANN) Support Vector Machine (SVM) algorithm best prediction travel...

10.3390/su13010225 article EN Sustainability 2020-12-29

The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based protocols were proposed RFID system. However, these are not suitable because some them failed fulfil the requirements, produce high computational overhead. Recently researchers have focused on developing an mechanism...

10.1109/access.2021.3069429 article EN cc-by IEEE Access 2021-01-01

The impact of the accurate estimated time arrival (ETA) is often overlooked by bus operators. By providing ETA to riders, it gives them impression services efficient and reliable this promotes higher ridership in long run. This research project aims predict using Support Vector Regression (SVR) model which based on same theory as Machine (SVM). Urban City Bus data covering part Petaling Jaya area (route name PJ03) used work. Features related traffic such travel duration, a distance road,...

10.20944/preprints202002.0197.v1 preprint EN 2020-02-15

Optimization of data usability and privacy protection is a challenging goal. Although the released are sanitized with upgraded model semantic changer, always face scalability issues. On other hand, local anonymization may not be suitable in multi-nodal environment such as vehicular network. Alternatively, hiding sensitive attributes essential alongside discreet privacy. In this paper, we proposed collaborative privacy-preserving technique for Moreover, method capable achieving desirable...

10.1109/3ict51146.2020.9312024 article EN 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT) 2020-12-20

Communication in vehicular ad hoc networks (VANETs) is significantly increased due to several services such as location-based service (LBS), traffic management, road safety, and vehicle privacy. Authentication one of the backbones for communication network protect whole system, guarantee unforgeability effectiveness various services. On this note, above article, Nandy <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al.</i> (2021) recently...

10.1109/jsen.2022.3175591 article EN IEEE Sensors Journal 2022-07-01

Money is a fundamental requirement for every individual to meet their various needs. However, despite the growing popularity of cryptocurrency, there lack literature reviews that comprehensively examine this subject. Cryptocurrency blockchain-based technology operates as decentralized digital currency. With advancement modernization and globalization in Fourth Industrial Revolution, cryptocurrency has become increasingly popular. Despite its physical form, it functions like traditional...

10.1109/iciccs56967.2023.10142896 article EN 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) 2023-05-17

Big data analytics and Machine Learning (ML) are rapidly changing the way patient health is being tracked. Since Data generated by every individual in this world anything or everything generates if right hands, then it could help employer do wonders, most powerful weapon that underestimated but can change face of world. Analytics used helping Healthcare evolve. By identifying these issues, we keep potential issues provide solutions before situation worsens. ML technologies have a promising...

10.1109/icaisc58445.2023.10200831 article EN 2023-06-16

Vehicle ad-hoc network (VANET) faces heavy traffic with communication burden to connect various nodes in the network, uses clustering techniques neighboring vehicles, and elects a powerful efficient vehicle as cluster head. Cluster head collects all information pass them out transmit outside data other members cluster. However, issues such inability of choosing feasible stable clusters for long time. On hand, nomination heads fails adhere real-world parameters. To address these issues, this...

10.1109/r10-htc49770.2020.9356964 article EN 2020-12-01

This work is based on the vehicle positioning system using statistical approaches. Moreover, method does not depend real time devices such as GPS, or networking technologies.

10.36227/techrxiv.12866978.v1 preprint EN cc-by 2020-08-31

Vehicle monitoring and positioning become an essential factor in road management to secure safeguard the vehicular network, which influences coupling of reliability on advanced automobile technologies. Furthermore, predict exact location a car given time is challenging, because it depends myriad number elements. Moreover, knowing position vehicle helps passengers as well increase network security. In this paper, we propose mathematical model from prepopulated dataset using spline...

10.33093/jetap.2020.x1.1 article EN cc-by-nc-nd Journal of Engineering Technology and Applied Physics 2020-11-14

This work is based on the vehicle positioning system using statistical approaches. Moreover, method does not depend real time devices such as GPS, or networking technologies.

10.36227/techrxiv.12866978 preprint EN cc-by 2020-08-31
Coming Soon ...